data
dict
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNAThXU2", "doi": "10.1109/VAST.2014.7042497", "title": "Visual exploratory tool for storyline generation", "normalizedTitle": "Visual exploratory tool for storyline generation", "abstract": "Storyline visualizations are useful to let people explore works of literature. It was first introduced in XKCD's Movie Narrative Charts as a hand-drawn illustration [1]. Tanahashi and Ma proposed some considerations on the design of the storyline visualization and automation became meaningful because of its aesthetic and clear representation style [2]. Shixia Liu and Yingcai Wu's StoryFlow had become the next step in storyline visualization [3]. With the efficient optimization approach on automation, representation of the complex stories became efficient and enabled users to track and understand the story easier. In all cases before generating the visualizations, an input file must be created manually. In this work we propose a semi-automatic exploratory visual tool for preparation of such input files.", "abstracts": [ { "abstractType": "Regular", "content": "Storyline visualizations are useful to let people explore works of literature. It was first introduced in XKCD's Movie Narrative Charts as a hand-drawn illustration [1]. Tanahashi and Ma proposed some considerations on the design of the storyline visualization and automation became meaningful because of its aesthetic and clear representation style [2]. Shixia Liu and Yingcai Wu's StoryFlow had become the next step in storyline visualization [3]. With the efficient optimization approach on automation, representation of the complex stories became efficient and enabled users to track and understand the story easier. In all cases before generating the visualizations, an input file must be created manually. In this work we propose a semi-automatic exploratory visual tool for preparation of such input files.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Storyline visualizations are useful to let people explore works of literature. It was first introduced in XKCD's Movie Narrative Charts as a hand-drawn illustration [1]. Tanahashi and Ma proposed some considerations on the design of the storyline visualization and automation became meaningful because of its aesthetic and clear representation style [2]. Shixia Liu and Yingcai Wu's StoryFlow had become the next step in storyline visualization [3]. With the efficient optimization approach on automation, representation of the complex stories became efficient and enabled users to track and understand the story easier. In all cases before generating the visualizations, an input file must be created manually. In this work we propose a semi-automatic exploratory visual tool for preparation of such input files.", "fno": "07042497", "keywords": [ "Databases", "Visualization", "Educational Institutions", "Motion Pictures", "Automation", "Tag Clouds", "Context" ], "authors": [ { "affiliation": "Sabanci University", "fullName": "Erk Ediz Akyigit", "givenName": "Erk Ediz", "surname": "Akyigit", "__typename": "ArticleAuthorType" }, { "affiliation": "Sabanci University", "fullName": "Tugkan Cengiz", "givenName": "Tugkan", "surname": "Cengiz", "__typename": "ArticleAuthorType" }, { "affiliation": "Sabanci University", "fullName": "Onur Burak Yildirim", "givenName": "Onur Burak", "surname": "Yildirim", "__typename": "ArticleAuthorType" }, { "affiliation": "Sabanci University", "fullName": "Selim Balcisoy", "givenName": "Selim", "surname": "Balcisoy", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "215-216", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042496", "articleId": "12OmNBLvlL4", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042498", "articleId": "12OmNBlXs3i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2015/7568/0/7568a114", "title": "Concentri Cloud: Word Cloud Visualization for Multiple Text Documents", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a114/12OmNA0dMO6", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biovis/2013/1658/0/06664352", "title": "Hummod browser: An exploratory visualization tool for the analysis of whole-body physiology simulation data", "doi": null, "abstractUrl": "/proceedings-article/biovis/2013/06664352/12OmNqGitXC", "parentPublication": { "id": "proceedings/biovis/2013/1658/0", "title": "2013 IEEE Symposium on Biological Data Visualization (BioVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883520", "title": "Visual analysis and coding of data-rich user behavior", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883520/12OmNzXFoyS", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122799", "title": "Living Liquid: Design and Evaluation of an Exploratory Visualization Tool for Museum Visitors", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122799/13rRUNvgyWm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122436", "title": "StoryFlow: Tracking the Evolution of Stories", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122436/13rRUwbs1Sv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2002/02/man2002020034", "title": "MARC: keystone for library automation", "doi": null, "abstractUrl": "/magazine/an/2002/02/man2002020034/13rRUwgQpwl", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122679", "title": "Design Considerations for Optimizing Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122679/13rRUwhHcQR", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192633", "title": "Visual Analysis and Dissemination of Scientific Literature Collections with SurVis", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192633/13rRUwwJWFP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440828", "title": "iStoryline: Effective Convergence to Hand-drawn Storylines", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440828/17D45XfSESS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2019/4540/0/08864538", "title": "The Development and Evaluation of the Storyline Scaffolding Tool", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2019/08864538/1e5Zt3fsrSg", "parentPublication": { "id": "proceedings/vs-games/2019/4540/0", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBUAvUQ", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNB8kHOu", "doi": "10.1109/INFVIS.2003.1249007", "title": "Design Choices when Architecting Visualizations", "normalizedTitle": "Design Choices when Architecting Visualizations", "abstract": "In this paper, we focus on some of the key design decisions we faced during the process of architecting a visualization system and present some possible choices, with their associated advantages and disadvantages. We frame this discussion within the context of Rivet, our general visualization environment designed for rapidly prototyping interactive, exploratory visualization tools for analysis. As we designed increasingly sophisticated visualizations, we needed to refine Rivet in order to be able to create these richer displays for larger and more complex data sets. The design decisions we discuss in this paper include: the internal data model, data access, semantic meta-data information the visualization can use to create effective visual encodings, the need for data transformations in a visualization tool, modular objects for flexibility, and the tradeoff between simplicity and expressiveness when providing methods for creating visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we focus on some of the key design decisions we faced during the process of architecting a visualization system and present some possible choices, with their associated advantages and disadvantages. We frame this discussion within the context of Rivet, our general visualization environment designed for rapidly prototyping interactive, exploratory visualization tools for analysis. As we designed increasingly sophisticated visualizations, we needed to refine Rivet in order to be able to create these richer displays for larger and more complex data sets. The design decisions we discuss in this paper include: the internal data model, data access, semantic meta-data information the visualization can use to create effective visual encodings, the need for data transformations in a visualization tool, modular objects for flexibility, and the tradeoff between simplicity and expressiveness when providing methods for creating visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we focus on some of the key design decisions we faced during the process of architecting a visualization system and present some possible choices, with their associated advantages and disadvantages. We frame this discussion within the context of Rivet, our general visualization environment designed for rapidly prototyping interactive, exploratory visualization tools for analysis. As we designed increasingly sophisticated visualizations, we needed to refine Rivet in order to be able to create these richer displays for larger and more complex data sets. The design decisions we discuss in this paper include: the internal data model, data access, semantic meta-data information the visualization can use to create effective visual encodings, the need for data transformations in a visualization tool, modular objects for flexibility, and the tradeoff between simplicity and expressiveness when providing methods for creating visualizations.", "fno": "20550006", "keywords": [ "Information Visualization", "System Architecture", "Semantic Meta Data", "Data Transformations", "Design Tradeoffs" ], "authors": [ { "affiliation": "Stanford University", "fullName": "Diane Tang", "givenName": "Diane", "surname": "Tang", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Chris Stolte", "givenName": "Chris", "surname": "Stolte", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Robert Bosch", "givenName": "Robert", "surname": "Bosch", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-10-01T00:00:00", "pubType": "proceedings", "pages": "6", "year": "2003", "issn": null, "isbn": "0-7695-2055-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "20550005", "articleId": "12OmNAk5HOq", "__typename": "AdjacentArticleType" }, "next": { "fno": "20550007", "articleId": "12OmNBNM8UK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpca/2000/0550/0/05500360", "title": "Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/hpca/2000/05500360/12OmNAsBFJe", "parentPublication": { "id": "proceedings/hpca/2000/0550/0", "title": "Proceedings Sixth International Symposium on High-Performance Computer Architecture. HPCA-6 (Cat. No.PR00550)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetice/2000/0798/0/07980043", "title": "Should Users Inhabit Visualizations?", "doi": null, "abstractUrl": "/proceedings-article/wetice/2000/07980043/12OmNvSbBA2", "parentPublication": { "id": "proceedings/wetice/2000/0798/0", "title": "Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2001/2410/0/24100494", "title": "Technical Visualizations in VLSI Design: Visualization", "doi": null, "abstractUrl": "/proceedings-article/dac/2001/24100494/12OmNy2Jt0h", "parentPublication": { "id": "proceedings/dac/2001/2410/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soca/2012/4773/0/06449436", "title": "Flexible information design for business process visualizations", "doi": null, "abstractUrl": "/proceedings-article/soca/2012/06449436/12OmNyyO8OH", "parentPublication": { "id": "proceedings/soca/2012/4773/0", "title": "2012 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040082", "title": "Design and Effects of Personal Visualizations", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040082/13rRUwh80Nt", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122679", "title": "Design Considerations for Optimizing Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122679/13rRUwhHcQR", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2015/03/07058341", "title": "Uncertainty Representation in Visualizations of Learning Analytics for Learners: Current Approaches and Opportunities", "doi": null, "abstractUrl": "/journal/lt/2015/03/07058341/13rRUygT7pf", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08233127", "title": "Atom: A Grammar for Unit Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/12/08233127/14H4WLzSYsE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506578", "title": "Comparative Visualizations through Parameterization and Variability", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506578/17D45WaTki5", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09916137", "title": "Revisiting the Design Patterns of Composite Visualizations", "doi": null, "abstractUrl": "/journal/tg/5555/01/09916137/1HojAjSAGNq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBV9Icj", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "acronym": "etvis", "groupId": "1818666", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGRGbW", "doi": "10.1109/ETVIS.2016.7851163", "title": "Storyline visualizations of eye tracking of movie viewing", "normalizedTitle": "Storyline visualizations of eye tracking of movie viewing", "abstract": "Storyline visualization is a technique that captures the spatiotemporal characteristics of individual entities and simultaneously illustrates emerging group behaviors. We developed a storyline visualization leveraging dynamic time warping to parse and cluster eye tracking sequences. Visualization of the results captures the similarities and differences across a group of observers performing acommontask. Weappliedourstorylineapproachtogazepatterns of people watching dynamic movie clips. We use these to illustrate variations in the spatio-temporal patterns of observers as captured by different data encoding techniques. We illustrate that storylines further aid in the identification of modal patterns and noteworthy individual differences within a corpus of eye tracking data. ", "abstracts": [ { "abstractType": "Regular", "content": "Storyline visualization is a technique that captures the spatiotemporal characteristics of individual entities and simultaneously illustrates emerging group behaviors. We developed a storyline visualization leveraging dynamic time warping to parse and cluster eye tracking sequences. Visualization of the results captures the similarities and differences across a group of observers performing acommontask. Weappliedourstorylineapproachtogazepatterns of people watching dynamic movie clips. We use these to illustrate variations in the spatio-temporal patterns of observers as captured by different data encoding techniques. We illustrate that storylines further aid in the identification of modal patterns and noteworthy individual differences within a corpus of eye tracking data. ", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Storyline visualization is a technique that captures the spatiotemporal characteristics of individual entities and simultaneously illustrates emerging group behaviors. We developed a storyline visualization leveraging dynamic time warping to parse and cluster eye tracking sequences. Visualization of the results captures the similarities and differences across a group of observers performing acommontask. Weappliedourstorylineapproachtogazepatterns of people watching dynamic movie clips. We use these to illustrate variations in the spatio-temporal patterns of observers as captured by different data encoding techniques. We illustrate that storylines further aid in the identification of modal patterns and noteworthy individual differences within a corpus of eye tracking data. ", "fno": "07851163", "keywords": [ "Observers", "Data Visualization", "Gaze Tracking", "Layout", "Visualization", "Time Series Analysis", "Algorithm Design And Analysis" ], "authors": [ { "affiliation": "George Mason University", "fullName": "J. Timothy Balint", "givenName": "J. Timothy", "surname": "Balint", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Laboratory", "fullName": "Dustin Arendt", "givenName": "Dustin", "surname": "Arendt", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Laboratory", "fullName": "Leslie M. Blaha", "givenName": "Leslie M.", "surname": "Blaha", "__typename": "ArticleAuthorType" } ], "idPrefix": "etvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "35-39", "year": "2016", "issn": null, "isbn": "978-1-5090-4731-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07851162", "articleId": "12OmNAq3hKc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07851164", "articleId": "12OmNyUnEDW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042497", "title": "Visual exploratory tool for storyline generation", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042497/12OmNAThXU2", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851169", "title": "In the pursuit of (ground) truth: a hand-labelling tool for eye movements recorded during dynamic scene viewing", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851169/12OmNAnuTy9", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851171", "title": "Eye tracking data in multimedia containers for instantaneous visualizations", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851171/12OmNCmGNXy", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851157", "title": "Gaze self-similarity plots as a useful tool for eye movement characteristics analysis", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851157/12OmNy3RRHa", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122679", "title": "Design Considerations for Optimizing Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122679/13rRUwhHcQR", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/06/07015617", "title": "An Efficient Framework for Generating Storyline Visualizations from Streaming Data", "doi": null, "abstractUrl": "/journal/tg/2015/06/07015617/13rRUwwJWFO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09917516", "title": "Geo-Storylines: Integrating Maps into Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09917516/1HrexIf2zZe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2019/05/08713835", "title": "Human Eye Movements Reveal Video Frame Importance", "doi": null, "abstractUrl": "/magazine/co/2019/05/08713835/1a31lyCQdiM", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222335", "title": "PlotThread: Creating Expressive Storyline Visualizations using Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222335/1nTqzC75UfS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a236", "title": "Integrated Spatio-temporal Storyline Visualization with Low Crossover", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a236/1rSR7y0mRfW", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa78", "title": "Design Automation Conference", "acronym": "dac", "groupId": "1000196", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2Jt0h", "doi": "10.1109/DAC.2001.935559", "title": "Technical Visualizations in VLSI Design: Visualization", "normalizedTitle": "Technical Visualizations in VLSI Design: Visualization", "abstract": "Visualization techniques were applied to several different types of VLSI design and simulation data. A number of different visualizations have been tried, with varying results. Examples include 3D visualization of voltage and currents from fullwave interconnect analysis, on-chip clock distribution networks, chip/package power supply noise analysis, wire congestion, chip layout imaging, and static circuit tuning. The goals, successes, and failures of these examples will be discussed, along with some unexpected benefits from our ability to easily see patterns in complex visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization techniques were applied to several different types of VLSI design and simulation data. A number of different visualizations have been tried, with varying results. Examples include 3D visualization of voltage and currents from fullwave interconnect analysis, on-chip clock distribution networks, chip/package power supply noise analysis, wire congestion, chip layout imaging, and static circuit tuning. The goals, successes, and failures of these examples will be discussed, along with some unexpected benefits from our ability to easily see patterns in complex visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization techniques were applied to several different types of VLSI design and simulation data. A number of different visualizations have been tried, with varying results. Examples include 3D visualization of voltage and currents from fullwave interconnect analysis, on-chip clock distribution networks, chip/package power supply noise analysis, wire congestion, chip layout imaging, and static circuit tuning. The goals, successes, and failures of these examples will be discussed, along with some unexpected benefits from our ability to easily see patterns in complex visualizations.", "fno": "24100494", "keywords": [ "VLSI Design", "Circuit Optimization", "Clock Distribution", "Inductance", "Interconnect", "Visualization" ], "authors": [ { "affiliation": "IBM T. J. Watson Research Center, Yorktown Heights, NY", "fullName": "Phillip J. Restle", "givenName": "Phillip J.", "surname": "Restle", "__typename": "ArticleAuthorType" } ], "idPrefix": "dac", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-06-01T00:00:00", "pubType": "proceedings", "pages": "494-499", "year": "2001", "issn": null, "isbn": "1-58113-297-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24100490", "articleId": "12OmNvDqsHc", "__typename": "AdjacentArticleType" }, "next": { "fno": "24100500", "articleId": "12OmNvD8RGl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzzxuy8", "title": "2013 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzcxZ6N", "doi": "10.1109/CW.2013.36", "title": "A Study on Enhancing Timeline-Like Visualization with Verbal Text", "normalizedTitle": "A Study on Enhancing Timeline-Like Visualization with Verbal Text", "abstract": "There has been a long-standing question of whether sound or audio annotations may assist in data visualization tasks. This paper presents our study focusing on enhancing timeline/storyline like visualizations with audio annotations. Timeline visualizations are widely used to illustrate interactions among different entities over time. This type of visualizations facilitate reviewing important activities and their associations. For a long timeline, however, it is difficult for the viewer to remember all the essential information found in the visualization process. Since hearing is another primary human sense for perceiving information, we conjecture that adding audio annotations to selected sections of a timeline visualization can help improve the viewer's recall of important events. We have designed a user study based on augmenting storyline visualizations with verbal text, and tested subjects with three different settings: visual cues only, verbal text only, and both. While our test results do not give a strong indication of the clear advantage of adding verbal text, the lessons learned in our study suggest directions for further study and will help us and others design audio-augmented visualization systems.", "abstracts": [ { "abstractType": "Regular", "content": "There has been a long-standing question of whether sound or audio annotations may assist in data visualization tasks. This paper presents our study focusing on enhancing timeline/storyline like visualizations with audio annotations. Timeline visualizations are widely used to illustrate interactions among different entities over time. This type of visualizations facilitate reviewing important activities and their associations. For a long timeline, however, it is difficult for the viewer to remember all the essential information found in the visualization process. Since hearing is another primary human sense for perceiving information, we conjecture that adding audio annotations to selected sections of a timeline visualization can help improve the viewer's recall of important events. We have designed a user study based on augmenting storyline visualizations with verbal text, and tested subjects with three different settings: visual cues only, verbal text only, and both. While our test results do not give a strong indication of the clear advantage of adding verbal text, the lessons learned in our study suggest directions for further study and will help us and others design audio-augmented visualization systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There has been a long-standing question of whether sound or audio annotations may assist in data visualization tasks. This paper presents our study focusing on enhancing timeline/storyline like visualizations with audio annotations. Timeline visualizations are widely used to illustrate interactions among different entities over time. This type of visualizations facilitate reviewing important activities and their associations. For a long timeline, however, it is difficult for the viewer to remember all the essential information found in the visualization process. Since hearing is another primary human sense for perceiving information, we conjecture that adding audio annotations to selected sections of a timeline visualization can help improve the viewer's recall of important events. We have designed a user study based on augmenting storyline visualizations with verbal text, and tested subjects with three different settings: visual cues only, verbal text only, and both. While our test results do not give a strong indication of the clear advantage of adding verbal text, the lessons learned in our study suggest directions for further study and will help us and others design audio-augmented visualization systems.", "fno": "2246a206", "keywords": [ "Data Visualization", "Visualization", "Speech", "Image Color Analysis", "Data Mining", "Terminology", "Cellular Phones", "Verbal Text", "Improving Recall", "Timeline Storyline Visualization" ], "authors": [ { "affiliation": "NTUST, Taipei, Taiwan", "fullName": "Jia-Kai Chou", "givenName": null, "surname": "Jia-Kai Chou", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Davis, Davis, CA, USA", "fullName": "Isaac Liao", "givenName": "Isaac", "surname": "Liao", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Davis, Davis, CA, USA", "fullName": "Kwan-Liu Ma", "givenName": null, "surname": "Kwan-Liu Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "NTUST, Taipei, Taiwan", "fullName": "Chuan-Kai Yang", "givenName": null, "surname": "Chuan-Kai Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "206-213", "year": "2013", "issn": null, "isbn": "978-1-4799-2246-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2246a199", "articleId": "12OmNBPtJDx", "__typename": "AdjacentArticleType" }, "next": { "fno": "2246a214", "articleId": "12OmNsdo6u8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07364125", "title": "A timeline visualization system for road traffic big data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364125/12OmNASILUo", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a225", "title": "SchemaLine: Timeline Visualization for Sensemaking", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a225/12OmNvjQ92N", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcity/2015/1893/0/1893a676", "title": "TiQ: A Timeline Query Processing System over Road Traffic Data", "doi": null, "abstractUrl": "/proceedings-article/smartcity/2015/1893a676/12OmNyyO8HF", "parentPublication": { "id": "proceedings/smartcity/2015/1893/0", "title": "2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122679", "title": "Design Considerations for Optimizing Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122679/13rRUwhHcQR", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2021/2420/0/242000a804", "title": "Mashuprium and Timeline Visualization: Implementation of 3D Space and Timeline Visualization for Automatic Mashup Creation", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2021/242000a804/1Eb2ClhUYbS", "parentPublication": { "id": "proceedings/iiai-aai/2021/2420/0", "title": "2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807266", "title": "Towards Automated Infographic Design: Deep Learning-based Auto-Extraction of Extensible Timeline", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807266/1cG6bYWFt3W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2019/3891/0/08925033", "title": "Joint analysis of verbal and nonverbal interactions in collaborative E-learning", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2019/08925033/1fHFeQOK8b6", "parentPublication": { "id": "proceedings/aciiw/2019/3891/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a236", "title": "Integrated Spatio-temporal Storyline Visualization with Low Crossover", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a236/1rSR7y0mRfW", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552250", "title": "VideoModerator: A Risk-aware Framework for Multimodal Video Moderation in E-Commerce", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552250/1xic6GuRQ76", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/03/09615008", "title": "Explaining With Examples: Lessons Learned From Crowdsourced Introductory Description of Information Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/03/09615008/1yyho082gEw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rSR7vfukX6", "title": "2020 24th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rSR7y0mRfW", "doi": "10.1109/IV51561.2020.00046", "title": "Integrated Spatio-temporal Storyline Visualization with Low Crossover", "normalizedTitle": "Integrated Spatio-temporal Storyline Visualization with Low Crossover", "abstract": "A story is a chain of events. Each event has multiple dimensions, including time, location, characters, actions, and context. Storyline visualizations attempt to visually present the many dimensions of a story's events and their relationships. Integrating the temporal and spatial dimension in a single visualization view is often desirable but highly challenging. One of the main reasons is that spatial data is inherently 2D while temporal data is inherently 1D. We propose a storyline visualization technique that integrate both time and location information in a single view. We have developed a timeline-based visualization method that maintains regular ordering of temporal and spatial dimensions. We also developed a heuristic method to reduce excessive line crossovers for large data sets. Through case studies, we show that this visualization method provide a good balance in integrating temporal and spatial dimensions.", "abstracts": [ { "abstractType": "Regular", "content": "A story is a chain of events. Each event has multiple dimensions, including time, location, characters, actions, and context. Storyline visualizations attempt to visually present the many dimensions of a story's events and their relationships. Integrating the temporal and spatial dimension in a single visualization view is often desirable but highly challenging. One of the main reasons is that spatial data is inherently 2D while temporal data is inherently 1D. We propose a storyline visualization technique that integrate both time and location information in a single view. We have developed a timeline-based visualization method that maintains regular ordering of temporal and spatial dimensions. We also developed a heuristic method to reduce excessive line crossovers for large data sets. Through case studies, we show that this visualization method provide a good balance in integrating temporal and spatial dimensions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A story is a chain of events. Each event has multiple dimensions, including time, location, characters, actions, and context. Storyline visualizations attempt to visually present the many dimensions of a story's events and their relationships. Integrating the temporal and spatial dimension in a single visualization view is often desirable but highly challenging. One of the main reasons is that spatial data is inherently 2D while temporal data is inherently 1D. We propose a storyline visualization technique that integrate both time and location information in a single view. We have developed a timeline-based visualization method that maintains regular ordering of temporal and spatial dimensions. We also developed a heuristic method to reduce excessive line crossovers for large data sets. Through case studies, we show that this visualization method provide a good balance in integrating temporal and spatial dimensions.", "fno": "913400a236", "keywords": [ "Data Visualisation", "Spatial Data", "Temporal Data", "Location Information", "Timeline Based Visualization Method", "Temporal Dimension", "Spatial Dimension", "Excessive Line Crossovers", "Data Sets", "Temporal Dimensions", "Spatial Dimensions", "Integrated Spatio Temporal Storyline Visualization", "Multiple Dimensions", "Single Visualization View", "Data Analysis", "Two Dimensional Displays", "Data Visualization", "Spatial Databases", "Synchronization", "Storyline Visualization", "Spatio Temporal Visualization", "Storygraph" ], "authors": [ { "affiliation": "Wuzhou University,College of Data Science and Software Engineering,Wuzhou,China", "fullName": "Xi He", "givenName": "Xi", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia State University,Creative Media Industries Institute,Atlanta,USA", "fullName": "Ying Zhu", "givenName": "Ying", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "236-241", "year": "2020", "issn": null, "isbn": "978-1-7281-9134-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "913400a226", "articleId": "1rSR80IGZ4A", "__typename": "AdjacentArticleType" }, "next": { "fno": "913400a242", "articleId": "1rSRaQV3b3y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/e-science/2017/2686/0/08109153", "title": "TaRDIS, a Visual Analytics System for Spatial and Temporal Data in Archaeo-Related Disciplines", "doi": null, "abstractUrl": "/proceedings-article/e-science/2017/08109153/12OmNB0X8qi", "parentPublication": { "id": "proceedings/e-science/2017/2686/0", "title": "2017 IEEE 13th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256b217", "title": "Spatial and Spatio-temporal Data Mining", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256b217/12OmNCgrDcQ", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851163", "title": "Storyline visualizations of eye tracking of movie viewing", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851163/12OmNqGRGbW", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032f534", "title": "Learning Spatio-Temporal Representation with Pseudo-3D Residual Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f534/12OmNvAAtvl", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/05/07420745", "title": "Embedding Spatio-Temporal Information into Maps by Route-Zooming", "doi": null, "abstractUrl": "/journal/tg/2017/05/07420745/13rRUwd9CLS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122679", "title": "Design Considerations for Optimizing Storyline Visualizations", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122679/13rRUwhHcQR", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2002/04/k0881", "title": "Spatio-Temporal Predicates", "doi": null, "abstractUrl": "/journal/tk/2002/04/k0881/13rRUxAASTo", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585487", "title": "The “y” of it Matters, Even for Storyline Visualization", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585487/17D45Vw15wO", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600c159", "title": "An Empirical Investigation of Efficient Spatio-Temporal Modeling in Video Restoration", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600c159/1iTvt63mtRS", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a223", "title": "A Taxonomy of Spatial-Temporal Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a223/1y4oJ9f6FuU", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBbx", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "acronym": "icinis", "groupId": "1002524", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNAQJzSh", "doi": "10.1109/ICINIS.2009.102", "title": "A Framework for Multi-devices Based Intelligent Interactions", "normalizedTitle": "A Framework for Multi-devices Based Intelligent Interactions", "abstract": "Nowadays, intelligent interaction and multi-devices interaction have attracted great attention from researchers and industry, yet there are still no framework combining these two interactions together. We study this problem and present a feasible framework to solve it. This framework is based on multi-devices, and it combines interaction-data collecting, data managing and user modeling together. Furthermore, it provides flexible interfaces for application development and proposes an algorithm for integrating group model, individual model and feedback model. We developed several demos based on this framework, which demonstrate its effectiveness empirically.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, intelligent interaction and multi-devices interaction have attracted great attention from researchers and industry, yet there are still no framework combining these two interactions together. We study this problem and present a feasible framework to solve it. This framework is based on multi-devices, and it combines interaction-data collecting, data managing and user modeling together. Furthermore, it provides flexible interfaces for application development and proposes an algorithm for integrating group model, individual model and feedback model. We developed several demos based on this framework, which demonstrate its effectiveness empirically.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, intelligent interaction and multi-devices interaction have attracted great attention from researchers and industry, yet there are still no framework combining these two interactions together. We study this problem and present a feasible framework to solve it. This framework is based on multi-devices, and it combines interaction-data collecting, data managing and user modeling together. Furthermore, it provides flexible interfaces for application development and proposes an algorithm for integrating group model, individual model and feedback model. We developed several demos based on this framework, which demonstrate its effectiveness empirically.", "fno": "3852a374", "keywords": [ "Human Computer Interaction", "Intelligent Interaction", "User Modeling", "Multi Devices Interaction", "Interaction Framework", "Group Model", "Individual Model", "Feedback Model" ], "authors": [ { "affiliation": null, "fullName": "Chao Dong", "givenName": "Chao", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ji-Zhi Tan", "givenName": "Ji-Zhi", "surname": "Tan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heng Wang", "givenName": "Heng", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guo-Ping Wang", "givenName": "Guo-Ping", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icinis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "374-377", "year": "2009", "issn": null, "isbn": "978-0-7695-3852-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3852a370", "articleId": "12OmNAYGlrG", "__typename": "AdjacentArticleType" }, "next": { "fno": "05366871", "articleId": "17D45XwUAJ4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cso/2009/3605/1/3605a082", "title": "A Smart MVC-iTV Framework for Interactive TV", "doi": null, "abstractUrl": "/proceedings-article/cso/2009/3605a082/12OmNBTawx0", "parentPublication": { "id": "cso/2009/3605/1", "title": "2009 International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aswec/2006/2251/0/22510070", "title": "A Runtime Monitoring and Validation Framework for Web Service Interactions", "doi": null, "abstractUrl": "/proceedings-article/aswec/2006/22510070/12OmNqN6QXw", "parentPublication": { "id": "proceedings/aswec/2006/2251/0", "title": "Software Engineering Conference, Australian", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/achi/2010/3957/0/3957a079", "title": "A Simulation Framework for Human-Robot Interaction", "doi": null, "abstractUrl": "/proceedings-article/achi/2010/3957a079/12OmNqOffu5", "parentPublication": { "id": "proceedings/achi/2010/3957/0", "title": "International Conference on Advances in Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a697", "title": "A Method of Two-Handed Gesture Interactions with Applications Based on Commodity Devices", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a697/12OmNyRPgvw", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2006/0224/0/02240135", "title": "Optical Tracking and Automatic Model Estimation of Composite Interaction Devices", "doi": null, "abstractUrl": "/proceedings-article/vr/2006/02240135/12OmNyfdOJM", "parentPublication": { "id": "proceedings/vr/2006/0224/0", "title": "IEEE Virtual Reality Conference (VR 2006)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a356", "title": "Ensuring Coordination of Multi-business Interactions", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a356/12OmNzn38Zl", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2012/02/mpc2012020014", "title": "Informing the Design of Proxemic Interactions", "doi": null, "abstractUrl": "/magazine/pc/2012/02/mpc2012020014/13rRUIJcWxl", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061149", "title": "A Framework of Interaction Costs in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061149/13rRUxAASSX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2012/08/06095563", "title": "Discriminative Latent Models for Recognizing Contextual Group Activities", "doi": null, "abstractUrl": "/journal/tp/2012/08/06095563/13rRUxYIN5s", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2021/2835/0/283500a405", "title": "FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices", "doi": null, "abstractUrl": "/proceedings-article/candarw/2021/283500a405/1zw5G6APqb6", "parentPublication": { "id": "proceedings/candarw/2021/2835/0", "title": "2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBfZSj8", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3o50f", "doi": "10.1109/VAST.2012.6400506", "title": "Visual analytics for network security", "normalizedTitle": "Visual analytics for network security", "abstract": "To visualize the VAST 2012 Mini Challenge 2 datasets, we use the InfoVis Toolkit (IVTK). Custom visualizations as well as extra interaction capabilities have been added to the toolkit. Custom-made Python scripts are used for data preprocessing purposes. In this work, we show how visualization tools may be combined to leverage network forensic analysis tasks.", "abstracts": [ { "abstractType": "Regular", "content": "To visualize the VAST 2012 Mini Challenge 2 datasets, we use the InfoVis Toolkit (IVTK). Custom visualizations as well as extra interaction capabilities have been added to the toolkit. Custom-made Python scripts are used for data preprocessing purposes. In this work, we show how visualization tools may be combined to leverage network forensic analysis tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To visualize the VAST 2012 Mini Challenge 2 datasets, we use the InfoVis Toolkit (IVTK). Custom visualizations as well as extra interaction capabilities have been added to the toolkit. Custom-made Python scripts are used for data preprocessing purposes. In this work, we show how visualization tools may be combined to leverage network forensic analysis tasks.", "fno": "06400506", "keywords": [ "User Interfaces Interaction Systems", "H 5 2 Information Interfaces And Presentation" ], "authors": [ { "affiliation": "Nile University", "fullName": "Ahmed Bahey", "givenName": "Ahmed", "surname": "Bahey", "__typename": "ArticleAuthorType" }, { "affiliation": "Modern Sciences and Arts University", "fullName": "Georgiy Shurkhovetskyy", "givenName": "Georgiy", "surname": "Shurkhovetskyy", "__typename": "ArticleAuthorType" }, { "affiliation": "Modern Sciences and Arts University", "fullName": "Mohammad Ghoniem", "givenName": "Mohammad", "surname": "Ghoniem", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "301-302", "year": "2012", "issn": null, "isbn": "978-1-4673-4752-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06400528", "articleId": "12OmNC8Msue", "__typename": "AdjacentArticleType" }, "next": { "fno": "06400527", "articleId": "12OmNxEjY8U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400525", "title": "Visual analytics for situation awareness of a large-scale network: VAST 2012 Mini Challenge #1 award: “Effective video presentation”", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400525/12OmNB6UI9w", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a589", "title": "An Avatar-based Interface for the Italian Sign Language", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a589/12OmNBEpnvg", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400515", "title": "Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400515/12OmNBNM8T6", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400557", "title": "Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400557/12OmNCdTeNI", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402572", "title": "ClonAR: Rapid redesign of real-world objects", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402572/12OmNro0HZa", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400523", "title": "OWLAP — Using OLAP approach in anomaly detection: Award: Good support for the data preparation, analysis, and presentation process", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400523/12OmNvjgWXB", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400518", "title": "HIVEBEAT — A highly interactive visualization environment for broad-scale exploratory analysis and tracing: VAST 2012 Mini Challenge 1 award: Honorable mention for comprehensive visualization suite", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400518/12OmNyS6RMt", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400503", "title": "situ: Situational understanding and discovery for cyber attacks", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400503/12OmNzJbQU8", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122689", "title": "Beyond Mouse and Keyboard: Expanding Design Considerations for Information Visualization Interactions", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122689/13rRUwInvsO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05651204", "title": "VisWorks text and network visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05651204/1eof34V7mPS", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZQ", "title": "2008 IEEE International Symposium on Service-Oriented System Engineering", "acronym": "sose", "groupId": "1002082", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNvDI3HS", "doi": "10.1109/SOSE.2008.51", "title": "Integrating Service Composition Flow with User Interactions", "normalizedTitle": "Integrating Service Composition Flow with User Interactions", "abstract": "Web service technologies are best exploited by composing services, and BPEL (Web Services Business Process Execution Language) is adopted industrial-wide as the defacto service composition standard. However, BPEL is applied mainly in the design of composite services and fully automated processes, and user interaction, that should be included in service delivery, but presently is not included in the BPEL standard. To integrate the composite service flow with user interactions, in this work we propose a framework to extend BPEL to new activities that describe user involvement and user interfaces. An enhanced BPEL engine with a UI rendering engine was accordingly developed.", "abstracts": [ { "abstractType": "Regular", "content": "Web service technologies are best exploited by composing services, and BPEL (Web Services Business Process Execution Language) is adopted industrial-wide as the defacto service composition standard. However, BPEL is applied mainly in the design of composite services and fully automated processes, and user interaction, that should be included in service delivery, but presently is not included in the BPEL standard. To integrate the composite service flow with user interactions, in this work we propose a framework to extend BPEL to new activities that describe user involvement and user interfaces. An enhanced BPEL engine with a UI rendering engine was accordingly developed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Web service technologies are best exploited by composing services, and BPEL (Web Services Business Process Execution Language) is adopted industrial-wide as the defacto service composition standard. However, BPEL is applied mainly in the design of composite services and fully automated processes, and user interaction, that should be included in service delivery, but presently is not included in the BPEL standard. To integrate the composite service flow with user interactions, in this work we propose a framework to extend BPEL to new activities that describe user involvement and user interfaces. An enhanced BPEL engine with a UI rendering engine was accordingly developed.", "fno": "3499a103", "keywords": [ "Service Composition", "Service Flow", "BPEL", "User Interaction", "User Interface", "Service Presentation", "Service Delivery" ], "authors": [ { "affiliation": null, "fullName": "Jonathan Lee", "givenName": "Jonathan", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying-Yan Lin", "givenName": "Ying-Yan", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shang-Pin Ma", "givenName": "Shang-Pin", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yao-Chiang Wang", "givenName": "Yao-Chiang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shin-Jie Lee", "givenName": "Shin-Jie", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "sose", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "103-108", "year": "2008", "issn": null, "isbn": "978-0-7695-3499-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3499a097", "articleId": "12OmNwF0BNE", "__typename": "AdjacentArticleType" }, "next": { "fno": "3499a109", "articleId": "12OmNyUFfQO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2008/3310/0/3310a621", "title": "Transparent Reputation Management for Composite Web Services", "doi": null, "abstractUrl": "/proceedings-article/icws/2008/3310a621/12OmNAolH6T", "parentPublication": { "id": "proceedings/icws/2008/3310/0", "title": "2008 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2012/4654/0/4654a306", "title": "An MDA-Based Approach for WS Composition Using UML Scenarios", "doi": null, "abstractUrl": "/proceedings-article/itng/2012/4654a306/12OmNs0C9XA", "parentPublication": { "id": "proceedings/itng/2012/4654/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2010/4128/0/4128a559", "title": "Mashing-Up Rich User Interfaces for Human-Interaction in WS-BPEL", "doi": null, "abstractUrl": "/proceedings-article/icws/2010/4128a559/12OmNwEJ0Jl", "parentPublication": { "id": "proceedings/icws/2010/4128/0", "title": "2010 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nwesp/2008/3455/0/3455a191", "title": "Transforming BPEL into Intermediate Format Language for Web Services Composition Testing", "doi": null, "abstractUrl": "/proceedings-article/nwesp/2008/3455a191/12OmNwp74Ds", "parentPublication": { "id": "proceedings/nwesp/2008/3455/0", "title": "Next Generation Web Services Practices, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2009/3810/0/3810a216", "title": "An Approach to Validating Transactional Properties of WS-BPEL Composition", "doi": null, "abstractUrl": "/proceedings-article/skg/2009/3810a216/12OmNxYL5aI", "parentPublication": { "id": "proceedings/skg/2009/3810/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecows/2008/3399/0/3399a053", "title": "Automatic Timed Test Case Generation for Web Services Composition", "doi": null, "abstractUrl": "/proceedings-article/ecows/2008/3399a053/12OmNy3RRIs", "parentPublication": { "id": "proceedings/ecows/2008/3399/0", "title": "Web Services, European Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2013/4944/0/4944a274", "title": "Automation of Test Case Generation and Execution for Testing Web Service Orchestrations", "doi": null, "abstractUrl": "/proceedings-article/sose/2013/4944a274/12OmNy3iFur", "parentPublication": { "id": "proceedings/sose/2013/4944/0", "title": "2013 IEEE Seventh International Symposium on Service-Oriented System Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kse/2012/4760/0/4760a060", "title": "Securing Data in Composite Web Services", "doi": null, "abstractUrl": "/proceedings-article/kse/2012/4760a060/12OmNyRPgpJ", "parentPublication": { "id": "proceedings/kse/2012/4760/0", "title": "Knowledge and Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/perser/2005/9032/0/01506549", "title": "Web services user agent supporting interactions between mobile users and service flows", "doi": null, "abstractUrl": "/proceedings-article/perser/2005/01506549/12OmNzSQdr5", "parentPublication": { "id": "proceedings/perser/2005/9032/0", "title": "Proceedings. International Conference on Pervasive Services 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcai/2009/3615/0/3615a623", "title": "Analyzing Service Composition Patterns in BPEL", "doi": null, "abstractUrl": "/proceedings-article/jcai/2009/3615a623/12OmNzYeARK", "parentPublication": { "id": "proceedings/jcai/2009/3615/0", "title": "2009 International Joint Conference on Artificial Intelligence (JCAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNA0dMML", "title": "2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "acronym": "esem", "groupId": "1001929", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwHhoWH", "doi": "10.1109/ESEM.2013.34", "title": "Classification of Language Interactions", "normalizedTitle": "Classification of Language Interactions", "abstract": "Context: the presence of several languages interacting each other within the same project is an almost universal feature in software development. Earlier work shows that this interaction might be source of problems. Objective: we aim at identifying and characterizing the cross-language interactions at semantic level. Method: we took the commits of an open source project and analyzed the cross-language pairs of files occurring in the same commit to identify possible semantic interactions. We both defined a taxonomy and applied it. Result: we identified 6 categories of semantic interactions. The most common category is the one based on shared ids, the next is when an artifact provides a description of another artifact. Conclusion: the deeper knowledge of cross-language interactions represents the basis for implementing a tool supporting the management of this kind of interactions and the detection of related problems at compile time.", "abstracts": [ { "abstractType": "Regular", "content": "Context: the presence of several languages interacting each other within the same project is an almost universal feature in software development. Earlier work shows that this interaction might be source of problems. Objective: we aim at identifying and characterizing the cross-language interactions at semantic level. Method: we took the commits of an open source project and analyzed the cross-language pairs of files occurring in the same commit to identify possible semantic interactions. We both defined a taxonomy and applied it. Result: we identified 6 categories of semantic interactions. The most common category is the one based on shared ids, the next is when an artifact provides a description of another artifact. Conclusion: the deeper knowledge of cross-language interactions represents the basis for implementing a tool supporting the management of this kind of interactions and the detection of related problems at compile time.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Context: the presence of several languages interacting each other within the same project is an almost universal feature in software development. Earlier work shows that this interaction might be source of problems. Objective: we aim at identifying and characterizing the cross-language interactions at semantic level. Method: we took the commits of an open source project and analyzed the cross-language pairs of files occurring in the same commit to identify possible semantic interactions. We both defined a taxonomy and applied it. Result: we identified 6 categories of semantic interactions. The most common category is the one based on shared ids, the next is when an artifact provides a description of another artifact. Conclusion: the deeper knowledge of cross-language interactions represents the basis for implementing a tool supporting the management of this kind of interactions and the detection of related problems at compile time.", "fno": "5056a287", "keywords": [ "Semantics", "Java", "Software", "Loading", "XML", "Taxonomy", "Couplings" ], "authors": [ { "affiliation": "Dept. of Control & Comput. Eng., Politec. di Torino, Turin, Italy", "fullName": "Federico Tomassetti", "givenName": "Federico", "surname": "Tomassetti", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Control & Comput. Eng., Politec. di Torino, Turin, Italy", "fullName": "Marco Torchiano", "givenName": "Marco", "surname": "Torchiano", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Control & Comput. Eng., Politec. di Torino, Turin, Italy", "fullName": "Antonio Vetro", "givenName": "Antonio", "surname": "Vetro", "__typename": "ArticleAuthorType" } ], "idPrefix": "esem", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-10-01T00:00:00", "pubType": "proceedings", "pages": "287-290", "year": "2013", "issn": "1938-6451", "isbn": "978-0-7695-5056-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5056a283", "articleId": "12OmNxcvh5y", "__typename": "AdjacentArticleType" }, "next": { "fno": "5056a291", "articleId": "12OmNCfSqMr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csmr-wcre/2014/3752/0/06747189", "title": "Spotting automatically cross-language relations", "doi": null, "abstractUrl": "/proceedings-article/csmr-wcre/2014/06747189/12OmNBDyAbv", "parentPublication": { "id": "proceedings/csmr-wcre/2014/3752/0", "title": "2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2016/0811/0/0811a372", "title": "Semantic Similarity/Relatedness for Cross Language Plagiarism Detection", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2016/0811a372/12OmNBE7MsE", "parentPublication": { "id": "proceedings/cgiv/2016/0811/0", "title": "2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2013/6447/0/06595300", "title": "A model-based approach to language integration", "doi": null, "abstractUrl": "/proceedings-article/mise/2013/06595300/12OmNCesr9J", "parentPublication": { "id": "proceedings/mise/2013/6447/0", "title": "2013 5th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ast/2017/1548/0/07962328", "title": "Generating Unit Tests with Structured System Interactions", "doi": null, "abstractUrl": "/proceedings-article/ast/2017/07962328/12OmNwp74wZ", "parentPublication": { "id": "proceedings/ast/2017/1548/0", "title": "2017 IEEE/ACM 12th International Workshop on Automation of Software Testing (AST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmi/2002/1834/0/18340411", "title": "Designing Transition Networks for Multimodal VR-Interactions Using a Markup Language", "doi": null, "abstractUrl": "/proceedings-article/icmi/2002/18340411/12OmNxH9Xf9", "parentPublication": { "id": "proceedings/icmi/2002/1834/0", "title": "Proceedings Fourth IEEE International Conference on Multimodal Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2013/2931/0/06671306", "title": "Comparing and combining evolutionary couplings from interactions and commits", "doi": null, "abstractUrl": "/proceedings-article/wcre/2013/06671306/12OmNzVoBBr", "parentPublication": { "id": "proceedings/wcre/2013/2931/0", "title": "2013 20th Working Conference on Reverse Engineering (WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-nier/2018/5662/0/566201a033", "title": "Hierarchical Learning of Cross-Language Mappings Through Distributed Vector Representations for Code", "doi": null, "abstractUrl": "/proceedings-article/icse-nier/2018/566201a033/13bd1eY1x3q", "parentPublication": { "id": "proceedings/icse-nier/2018/5662/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: New Ideas and Emerging Technologies Results (ICSE-NIER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a390", "title": "Unified Abstract Syntax Tree Representation Learning for Cross-Language Program Classification", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a390/1EpKNR8BStG", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219640", "title": "Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text Classification", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219640/1nRPgGZ8UKI", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2021/2882/0/288200a378", "title": "Cross-language Code Coupling Detection: A Preliminary Study on Android Applications", "doi": null, "abstractUrl": "/proceedings-article/icsme/2021/288200a378/1yNh96CX55K", "parentPublication": { "id": "proceedings/icsme/2021/2882/0", "title": "2021 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwcl7Jt", "title": "Electronic Design, Test and Applications, IEEE International Workshop on", "acronym": "delta", "groupId": "1001663", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNwK7o9Q", "doi": "10.1109/DELTA.2008.59", "title": "Efficient VLSI Layout of Edge Product Networks", "normalizedTitle": "Efficient VLSI Layout of Edge Product Networks", "abstract": "The interconnection network between the processor cores in multiprocessors on chip has a crucial impact on the performance. Efficient VLSI layout area of such networks can result in lower costs and better performance. Layouts with more compact area can lead in shorter wires and therefore the signal propagation through the wires may take place in shorter time. In this paper, we study the VLSI layout bounds of a new product network, called the Edge Graph Product. Lower bounds are usually computed by the crossing number and bisection width of the topological graphs. For computing the bisection width and crossing number of the edge graph product, we use the obtained upper bound on maximal congestion.We also represent efficient upper bounds on the layout area and maximum wire length by constructing layouts based on separators and bifurcators.", "abstracts": [ { "abstractType": "Regular", "content": "The interconnection network between the processor cores in multiprocessors on chip has a crucial impact on the performance. Efficient VLSI layout area of such networks can result in lower costs and better performance. Layouts with more compact area can lead in shorter wires and therefore the signal propagation through the wires may take place in shorter time. In this paper, we study the VLSI layout bounds of a new product network, called the Edge Graph Product. Lower bounds are usually computed by the crossing number and bisection width of the topological graphs. For computing the bisection width and crossing number of the edge graph product, we use the obtained upper bound on maximal congestion.We also represent efficient upper bounds on the layout area and maximum wire length by constructing layouts based on separators and bifurcators.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The interconnection network between the processor cores in multiprocessors on chip has a crucial impact on the performance. Efficient VLSI layout area of such networks can result in lower costs and better performance. Layouts with more compact area can lead in shorter wires and therefore the signal propagation through the wires may take place in shorter time. In this paper, we study the VLSI layout bounds of a new product network, called the Edge Graph Product. Lower bounds are usually computed by the crossing number and bisection width of the topological graphs. For computing the bisection width and crossing number of the edge graph product, we use the obtained upper bound on maximal congestion.We also represent efficient upper bounds on the layout area and maximum wire length by constructing layouts based on separators and bifurcators.", "fno": "3110a555", "keywords": [ "Edge Graph Product", "VLSI Layout", "Interconnection Networks", "Networks On Chip", "Collinear Layout" ], "authors": [ { "affiliation": null, "fullName": "Saeedeh Bakhshi", "givenName": "Saeedeh", "surname": "Bakhshi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hamid Sarbazi-Azad", "givenName": "Hamid", "surname": "Sarbazi-Azad", "__typename": "ArticleAuthorType" } ], "idPrefix": "delta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-01-01T00:00:00", "pubType": "proceedings", "pages": "555-560", "year": "2008", "issn": null, "isbn": "978-0-7695-3110-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3110a549", "articleId": "12OmNvnwVn7", "__typename": "AdjacentArticleType" }, "next": { "fno": "3110a561", "articleId": "12OmNz61cUW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/focs/1982/5428/0/542800369", "title": "On driving many long lines in a VLSI layout", "doi": null, "abstractUrl": "/proceedings-article/focs/1982/542800369/12OmNAXPy2u", "parentPublication": { "id": "proceedings/focs/1982/5428/0", "title": "23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2008/3348/0/3348a031", "title": "Recognizing Geometric Path from Polygon-Based Integrated Circuit Layout", "doi": null, "abstractUrl": "/proceedings-article/sec/2008/3348a031/12OmNAoUTuW", "parentPublication": { "id": "proceedings/sec/2008/3348/0", "title": "Embedded Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1995/7195/0/71950681", "title": "Bisection widths of transposition graphs", "doi": null, "abstractUrl": "/proceedings-article/spdp/1995/71950681/12OmNrHSD21", "parentPublication": { "id": "proceedings/spdp/1995/7195/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan/1994/6507/0/00367166", "title": "Bounds on the VLSI layout complexity of homogeneous product networks", "doi": null, "abstractUrl": "/proceedings-article/ispan/1994/00367166/12OmNvA1hol", "parentPublication": { "id": "proceedings/ispan/1994/6507/0", "title": "Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipc/1997/8067/0/80670422", "title": "A Tight Layout of the Cube-Connected Cycles", "doi": null, "abstractUrl": "/proceedings-article/hipc/1997/80670422/12OmNvk7K2M", "parentPublication": { "id": "proceedings/hipc/1997/8067/0", "title": "Fourth International Conference on High-Performance Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1988/0864/0/00014734", "title": "A module area estimator for VLSI layout", "doi": null, "abstractUrl": "/proceedings-article/dac/1988/00014734/12OmNwvVrJN", "parentPublication": { "id": "proceedings/dac/1988/0864/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/1995/7165/0/71650224", "title": "EPNR: an energy-efficient automated layout synthesis package", "doi": null, "abstractUrl": "/proceedings-article/iccd/1995/71650224/12OmNyGbIi9", "parentPublication": { "id": "proceedings/iccd/1995/7165/0", "title": "Proceedings of ICCD '95 International Conference on Computer Design. VLSI in Computers and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sfcs/1982/9999/0/04568412", "title": "On driving many long lines in a VLSI layout", "doi": null, "abstractUrl": "/proceedings-article/sfcs/1982/04568412/12OmNyLiuAt", "parentPublication": { "id": "proceedings/sfcs/1982/9999/0", "title": "23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1997/10/t1070", "title": "Efficient VLSI Layouts for Homogeneous Product Networks", "doi": null, "abstractUrl": "/journal/tc/1997/10/t1070/13rRUwcAqpn", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1986/12/01676713", "title": "An Array Layout Methodology for VLSI Circuits", "doi": null, "abstractUrl": "/journal/tc/1986/12/01676713/13rRUxlgxSk", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvDI3Md", "title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "acronym": "hpcc-icess", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwnYG0W", "doi": "10.1109/HPCC.2011.146", "title": "Prototyping Smart Objects for the Mass", "normalizedTitle": "Prototyping Smart Objects for the Mass", "abstract": "Several do-it-yourself projects and toolkits aim to empower people in bringing intelligence into their personal environments. This is particularly challenging because there is still a large gap between people who can imagine how technology could simplify their life and engineers who can actually make things behave smart. To unite both camps, we present a platform that enables ordinary people to become the inventor of their own smart objects, assisted by a community of field experts. Our software, called D-TALE, fosters the creativity of people by giving them a forum where they can express and prototype their innovative ideas. Moreover, D-TALE gives rise to a crowd-sourcing platform where non-technical users can request developers to provide an implementation for their project. Our approach is outlined in a preliminary case study.", "abstracts": [ { "abstractType": "Regular", "content": "Several do-it-yourself projects and toolkits aim to empower people in bringing intelligence into their personal environments. This is particularly challenging because there is still a large gap between people who can imagine how technology could simplify their life and engineers who can actually make things behave smart. To unite both camps, we present a platform that enables ordinary people to become the inventor of their own smart objects, assisted by a community of field experts. Our software, called D-TALE, fosters the creativity of people by giving them a forum where they can express and prototype their innovative ideas. Moreover, D-TALE gives rise to a crowd-sourcing platform where non-technical users can request developers to provide an implementation for their project. Our approach is outlined in a preliminary case study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Several do-it-yourself projects and toolkits aim to empower people in bringing intelligence into their personal environments. This is particularly challenging because there is still a large gap between people who can imagine how technology could simplify their life and engineers who can actually make things behave smart. To unite both camps, we present a platform that enables ordinary people to become the inventor of their own smart objects, assisted by a community of field experts. Our software, called D-TALE, fosters the creativity of people by giving them a forum where they can express and prototype their innovative ideas. Moreover, D-TALE gives rise to a crowd-sourcing platform where non-technical users can request developers to provide an implementation for their project. Our approach is outlined in a preliminary case study.", "fno": "4538a995", "keywords": [ "Smart Objects", "Di Y Prototyping", "Crowd Sourcing" ], "authors": [], "idPrefix": "hpcc-icess", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "995-1000", "year": "2011", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4538a989", "articleId": "12OmNBdrubV", "__typename": "AdjacentArticleType" }, "next": { "fno": "4538b001", "articleId": "12OmNxecS6t", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/imis/2011/4372/0/4372a229", "title": "Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management", "doi": null, "abstractUrl": "/proceedings-article/imis/2011/4372a229/12OmNvjyy2Z", "parentPublication": { "id": "proceedings/imis/2011/4372/0", "title": "Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2010/4237/0/4237a351", "title": "The Big Picture, from Grids and Clouds to Crowds: A Data Collective Computational Intelligence Case Proposal for Managing Disasters", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2010/4237a351/12OmNvlg8ib", "parentPublication": { "id": "proceedings/3pgcic/2010/4237/0", "title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2011/4426/0/4426a194", "title": "From Smart Objects to Smarter Workflows -- An Architectural Approach", "doi": null, "abstractUrl": "/proceedings-article/edocw/2011/4426a194/12OmNvvc5NI", "parentPublication": { "id": "proceedings/edocw/2011/4426/0", "title": "2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e764", "title": "Influential Aspects of the Smart City", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e764/12OmNwMFMmP", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euc/2010/4322/0/4322a416", "title": "Ambient Intelligence, Smart Objects and Sensor Networks: Practical Experiences", "doi": null, "abstractUrl": "/proceedings-article/euc/2010/4322a416/12OmNxveNSZ", "parentPublication": { "id": "proceedings/euc/2010/4322/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wowmom/2012/1238/0/WSIoTSoSSecureCommunicationforSmartIoTObjectsProto", "title": "Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2012/WSIoTSoSSecureCommunicationforSmartIoTObjectsProto/12OmNyRxFAc", "parentPublication": { "id": "proceedings/wowmom/2012/1238/0", "title": "2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2010/01/mic2010010044", "title": "Smart Objects as Building Blocks for the Internet of Things", "doi": null, "abstractUrl": "/magazine/ic/2010/01/mic2010010044/13rRUwkfAVi", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2007/04/mpc2007040086", "title": "Smart Phones to the Rescue: The Virtual Blood Bank Project", "doi": null, "abstractUrl": "/magazine/pc/2007/04/mpc2007040086/13rRUxAStY0", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1989/06/i0632", "title": "On the Recognition of Curved Objects", "doi": null, "abstractUrl": "/journal/tp/1989/06/i0632/13rRUxASuNW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2004/03/b3074", "title": "Physical Prototyping with Smart-Its", "doi": null, "abstractUrl": "/magazine/pc/2004/03/b3074/13rRUyogGxr", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzVGcJb", "title": "IEEE Network Science Workshop", "acronym": "nsw", "groupId": "1800468", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzvhvAx", "doi": "10.1109/NSW.2011.6004630", "title": "Time spring layout for visualization of dynamic social networks", "normalizedTitle": "Time spring layout for visualization of dynamic social networks", "abstract": "Common layout techniques for dynamic networks typically either keep node positions static as the graph changes, or operate by \"tweening\" optimized layouts between adjacent time slices. These techniques can be problematic because (in the first case) there is significant visual \"noise\" caused by unnecessary edge crossings, and (in the second case) the nodes change so much from one time slice to another that animation is required to display node movement. This paper describes techniques to balance the benefits of keeping node positions relatively static while allowing enough layout adjustment between slices to demonstrate the changing graph. Comparisons are provided against the common layout procedures for a graph with 20 time slices.", "abstracts": [ { "abstractType": "Regular", "content": "Common layout techniques for dynamic networks typically either keep node positions static as the graph changes, or operate by \"tweening\" optimized layouts between adjacent time slices. These techniques can be problematic because (in the first case) there is significant visual \"noise\" caused by unnecessary edge crossings, and (in the second case) the nodes change so much from one time slice to another that animation is required to display node movement. This paper describes techniques to balance the benefits of keeping node positions relatively static while allowing enough layout adjustment between slices to demonstrate the changing graph. Comparisons are provided against the common layout procedures for a graph with 20 time slices.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Common layout techniques for dynamic networks typically either keep node positions static as the graph changes, or operate by \"tweening\" optimized layouts between adjacent time slices. These techniques can be problematic because (in the first case) there is significant visual \"noise\" caused by unnecessary edge crossings, and (in the second case) the nodes change so much from one time slice to another that animation is required to display node movement. This paper describes techniques to balance the benefits of keeping node positions relatively static while allowing enough layout adjustment between slices to demonstrate the changing graph. Comparisons are provided against the common layout procedures for a graph with 20 time slices.", "fno": "06004630", "keywords": [ "Dynamic Graph Visualization", "Time Spring Layout", "Dynamic Social Network Visualization", "Optimized Layout Tweening", "Adjacent Time Slices", "Visual Noise", "Layout Adjustment", "Changing Graph" ], "authors": [ { "affiliation": "Appl. Phys. Lab., Johns Hopkins Univ., Laurel, MD, USA", "fullName": "E. Peterson", "givenName": "E.", "surname": "Peterson", "__typename": "ArticleAuthorType" } ], "idPrefix": "nsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-06-01T00:00:00", "pubType": "proceedings", "pages": "98-104", "year": "2011", "issn": null, "isbn": "978-1-4577-1049-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06004663", "articleId": "12OmNBRbkr8", "__typename": "AdjacentArticleType" }, "next": { "fno": "06004631", "articleId": "12OmNyTOskw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2016/2303/0/2303a119", "title": "A Dynamic Network Layout Visualization Method Based on Structural Similarity", "doi": null, "abstractUrl": "/proceedings-article/cw/2016/2303a119/12OmNAPSMmj", "parentPublication": { "id": "proceedings/cw/2016/2303/0", "title": "2016 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2007/2928/0/29280447", "title": "Applying Graph Layout Techniques to Web Information Visualization and Navigation", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2007/29280447/12OmNCcKQB5", "parentPublication": { "id": "proceedings/cgiv/2007/2928/0", "title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/20550008", "title": "MoireGraphs: Radial Focus+Context Visualization and Interaction for Graphs with Visual Nodes", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550008/12OmNxiKrV4", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1998/8712/0/87120056", "title": "Competitive Learning of Network Diagram Layout", "doi": null, "abstractUrl": "/proceedings-article/vl/1998/87120056/12OmNyRPgyj", "parentPublication": { "id": "proceedings/vl/1998/8712/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790191", "title": "Dynamic Drawing of Clustered Graphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790191/12OmNyugyVo", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004088", "title": "Node-attribute Graph Layout for Small-World Networks", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004088/12OmNyxFKbt", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539319", "title": "Probabilistic Graph Layout for Uncertain Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539319/13rRUwh80Hi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061301", "title": "Rapid Graph Layout Using Space Filling Curves", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061301/13rRUx0xPIx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/06/ttg2013060953", "title": "CiSE: A Circular Spring Embedder Layout Algorithm", "doi": null, "abstractUrl": "/journal/tg/2013/06/ttg2013060953/13rRUxASuhz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdia/2020/2232/0/223200a125", "title": "Graph Layout Based on Network Embedding and Improved Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/bigdia/2020/223200a125/1stvA7W3Ota", "parentPublication": { "id": "proceedings/bigdia/2020/2232/0", "title": "2020 6th International Conference on Big Data and Information Analytics (BigDIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirT", "title": "2018 International Conference on Advanced Computing and Applications (ACOMP)", "acronym": "acomp", "groupId": "1812104", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xi9rVG", "doi": "10.1109/ACOMP.2018.00022", "title": "Multi-Diagram Representation of Enterprise Architecture: Layout and Aesthetics", "normalizedTitle": "Multi-Diagram Representation of Enterprise Architecture: Layout and Aesthetics", "abstract": "Visual modeling is essential for documenting and sharing enterprise models. Most modeling languages for enterprise architecture are defined in term of the abstract syntax and the concrete syntax, leaving aesthetic issues in enterprise modeling such as diagram layouts on the sidelines. In this paper, we specifically address the diagrammatic layout and aesthetics in enterprise modeling by revisiting SeamCAD - a modeling language and an accompanying toolkit that emphasize hierarchies in the representation of enterprise architecture. The modeling notation of SeamCAD comes with distinctive layout and diagrammatic aesthetics for the purposes of visually capturing the hierarchical containment in EA models. We walk through real-life EA applications to demonstrate the aesthetic aspects of our visual language.", "abstracts": [ { "abstractType": "Regular", "content": "Visual modeling is essential for documenting and sharing enterprise models. Most modeling languages for enterprise architecture are defined in term of the abstract syntax and the concrete syntax, leaving aesthetic issues in enterprise modeling such as diagram layouts on the sidelines. In this paper, we specifically address the diagrammatic layout and aesthetics in enterprise modeling by revisiting SeamCAD - a modeling language and an accompanying toolkit that emphasize hierarchies in the representation of enterprise architecture. The modeling notation of SeamCAD comes with distinctive layout and diagrammatic aesthetics for the purposes of visually capturing the hierarchical containment in EA models. We walk through real-life EA applications to demonstrate the aesthetic aspects of our visual language.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual modeling is essential for documenting and sharing enterprise models. Most modeling languages for enterprise architecture are defined in term of the abstract syntax and the concrete syntax, leaving aesthetic issues in enterprise modeling such as diagram layouts on the sidelines. In this paper, we specifically address the diagrammatic layout and aesthetics in enterprise modeling by revisiting SeamCAD - a modeling language and an accompanying toolkit that emphasize hierarchies in the representation of enterprise architecture. The modeling notation of SeamCAD comes with distinctive layout and diagrammatic aesthetics for the purposes of visually capturing the hierarchical containment in EA models. We walk through real-life EA applications to demonstrate the aesthetic aspects of our visual language.", "fno": "918600a088", "keywords": [ "Unified Modeling Language", "Layout", "Collaboration", "Visualization", "Stakeholders", "Computational Modeling", "Visualization Cognition Layout Enterprise Architecture UML" ], "authors": [ { "affiliation": null, "fullName": "Lam-Son Lê", "givenName": "Lam-Son", "surname": "Lê", "__typename": "ArticleAuthorType" } ], "idPrefix": "acomp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "88-95", "year": "2018", "issn": null, "isbn": "978-1-5386-9186-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "918600a083", "articleId": "17D45WGGoLg", "__typename": "AdjacentArticleType" }, "next": { "fno": "918600a096", "articleId": "17D45Xbl4NU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edocw/2014/5467/0/5467a041", "title": "Implementing a Software Prototype for Enterprise Architecture Rationalization: Lessons Learned", "doi": null, "abstractUrl": "/proceedings-article/edocw/2014/5467a041/12OmNA0vnYY", "parentPublication": { "id": "proceedings/edocw/2014/5467/0", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e546", "title": "An Executable Model Driven Framework for Enterprise Architecture Application to the Smart Grids Context", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e546/12OmNAs2trQ", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2015/9331/0/9331a079", "title": "A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources", "doi": null, "abstractUrl": "/proceedings-article/edocw/2015/9331a079/12OmNx9FhNA", "parentPublication": { "id": "proceedings/edocw/2015/9331/0", "title": "2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718914", "title": "An Approach to Building Effective Enterprise Architectures", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718914/12OmNxGAL06", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2012/4786/0/4786a019", "title": "Visual Analysis of Enterprise Models", "doi": null, "abstractUrl": "/proceedings-article/edocw/2012/4786a019/12OmNy4r3LL", "parentPublication": { "id": "proceedings/edocw/2012/4786/0", "title": "2012 IEEE 16th International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2010/7965/0/05629053", "title": "Conceptual Models for Cross-Cutting Aspects in Enterprise Architecture Modeling", "doi": null, "abstractUrl": "/proceedings-article/edocw/2010/05629053/12OmNz61d9J", "parentPublication": { "id": "proceedings/edocw/2010/7965/0", "title": "2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2014/5467/0/5467a227", "title": "A Unified Framework for Enterprise Architecture Analysis", "doi": null, "abstractUrl": "/proceedings-article/edocw/2014/5467a227/12OmNzDNtpN", "parentPublication": { "id": "proceedings/edocw/2014/5467/0", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edoc/2018/4139/0/413900a051", "title": "A Probabilistic Enterprise Architecture Model Evolution", "doi": null, "abstractUrl": "/proceedings-article/edoc/2018/413900a051/17D45XERmkH", "parentPublication": { "id": "proceedings/edoc/2018/4139/0", "title": "2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2019/04/08738151", "title": "Enterprise Architecture", "doi": null, "abstractUrl": "/magazine/so/2019/04/08738151/1aW6krOuAaQ", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273899", "title": "Information Systems Students’ Impressions on Learning Modeling Enterprise Architectures", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273899/1phRSAHnqBG", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeMivKnMmA", "doi": "10.1109/CVPR46437.2021.01090", "title": "LayoutGMN: Neural Graph Matching for Structural Layout Similarity", "normalizedTitle": "LayoutGMN: Neural Graph Matching for Structural Layout Similarity", "abstract": "We present a deep neural network to predict structural similarity between 2D layouts by leveraging Graph Matching Networks (GMN). Our network, coined LayoutGMN, learns the layout metric via neural graph matching, using an attention-based GMN designed under a triplet network setting. To train our network, we utilize weak labels obtained by pixel-wise Intersection-over-Union (IoUs) to define the triplet loss. Importantly, LayoutGMN is built with a structural bias which can effectively compensate for the lack of structure awareness in IoUs. We demonstrate this on two prominent forms of layouts, viz., floorplans and UI designs, via retrieval experiments on large-scale datasets. In particular, retrieval results by our network better match human judgement of structural layout similarity compared to both IoUs and other baselines including a state-of-the-art method based on graph neural networks and image convolution. In addition, LayoutGMN is the first deep model to offer both metric learning of structural layout similarity and structural matching between layout elements.", "abstracts": [ { "abstractType": "Regular", "content": "We present a deep neural network to predict structural similarity between 2D layouts by leveraging Graph Matching Networks (GMN). Our network, coined LayoutGMN, learns the layout metric via neural graph matching, using an attention-based GMN designed under a triplet network setting. To train our network, we utilize weak labels obtained by pixel-wise Intersection-over-Union (IoUs) to define the triplet loss. Importantly, LayoutGMN is built with a structural bias which can effectively compensate for the lack of structure awareness in IoUs. We demonstrate this on two prominent forms of layouts, viz., floorplans and UI designs, via retrieval experiments on large-scale datasets. In particular, retrieval results by our network better match human judgement of structural layout similarity compared to both IoUs and other baselines including a state-of-the-art method based on graph neural networks and image convolution. In addition, LayoutGMN is the first deep model to offer both metric learning of structural layout similarity and structural matching between layout elements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a deep neural network to predict structural similarity between 2D layouts by leveraging Graph Matching Networks (GMN). Our network, coined LayoutGMN, learns the layout metric via neural graph matching, using an attention-based GMN designed under a triplet network setting. To train our network, we utilize weak labels obtained by pixel-wise Intersection-over-Union (IoUs) to define the triplet loss. Importantly, LayoutGMN is built with a structural bias which can effectively compensate for the lack of structure awareness in IoUs. We demonstrate this on two prominent forms of layouts, viz., floorplans and UI designs, via retrieval experiments on large-scale datasets. In particular, retrieval results by our network better match human judgement of structural layout similarity compared to both IoUs and other baselines including a state-of-the-art method based on graph neural networks and image convolution. In addition, LayoutGMN is the first deep model to offer both metric learning of structural layout similarity and structural matching between layout elements.", "fno": "450900l1043", "keywords": [ "Deep Learning Artificial Intelligence", "Graph Theory", "Image Representation", "Image Resolution", "Io Us", "Structure Awareness", "Match Human Judgement", "Structural Layout Similarity", "Graph Neural Networks", "Image Convolution", "Structural Matching", "Layout Elements", "Neural Graph Matching", "Deep Neural Network", "Structural Similarity", "Graph Matching Networks", "Coined Layout GMN", "Layout Metric", "Attention Based GMN", "Triplet Network Setting", "Pixel Wise Intersection Over Union", "Measurement", "Deep Learning", "Computer Vision", "Convolution", "Computational Modeling", "Layout", "Graph Neural Networks" ], "authors": [ { "affiliation": "Simon Fraser University", "fullName": "Akshay Gadi Patil", "givenName": "Akshay Gadi", "surname": "Patil", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Manyi Li", "givenName": "Manyi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Matthew Fisher", "givenName": "Matthew", "surname": "Fisher", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Manolis Savva", "givenName": "Manolis", "surname": "Savva", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Hao Zhang", "givenName": "Hao", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "11043-11052", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeMiq5xzAQ", "name": "pcvpr202145090-09577459s1-mm_450900l1043.zip", "size": "8.71 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09577459s1-mm_450900l1043.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900l1033", "articleId": "1yeMkfmUsZa", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900l1053", "articleId": "1yeIuz1Nz7q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2016/2303/0/2303a119", "title": "A Dynamic Network Layout Visualization Method Based on Structural Similarity", "doi": null, "abstractUrl": "/proceedings-article/cw/2016/2303a119/12OmNAPSMmj", "parentPublication": { "id": "proceedings/cw/2016/2303/0", "title": "2016 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031595", "title": "Visualizing the uncertainty induced by graph layout algorithms", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031595/12OmNs0C9DQ", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2015/8020/0/07450427", "title": "Facade Layout Symmetrization", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2015/07450427/12OmNviHKiH", "parentPublication": { "id": "proceedings/cad-graphics/2015/8020/0", "title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2008/3337/0/3337a415", "title": "Structural Mixtures for Statistical Layout Analysis", "doi": null, "abstractUrl": "/proceedings-article/das/2008/3337a415/12OmNyugyZi", "parentPublication": { "id": "proceedings/das/2008/3337/0", "title": "2008 The Eighth IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009060961", "title": "A Comparison of User-Generated and Automatic Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009060961/13rRUwbaqLs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010101", "title": "Automatic Metro Map Layout Using Multicriteria Optimization", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010101/13rRUx0xPIA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000c051", "title": "LayoutNet: Reconstructing the 3D Room Layout from a Single RGB Image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000c051/17D45W9KVIS", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805452", "title": "A Deep Generative Model for Graph Layout", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805452/1cG4LsVN2zS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900d731", "title": "LayoutTransformer: Scene Layout Generation with Conceptual and Spatial Diversity", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900d731/1yeKJqXSUh2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvoWV11", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "acronym": "dexa", "groupId": "1000180", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNBW0vAr", "doi": "10.1109/DEXA.2008.50", "title": "FleXplorer: A Framework for Providing Faceted and Dynamic Taxonomy-Based Information Exploration", "normalizedTitle": "FleXplorer: A Framework for Providing Faceted and Dynamic Taxonomy-Based Information Exploration", "abstract": "Faceted and dynamic taxonomies are increasingly used nowadays in a plethora of applications. For developing user interfaces grounded on this interaction paradigm, it is advantageous to have a framework that enables the manipulation of the underlying information structure and provides the basic functionalities required. This paper introduces a formal model that captures faceted materialized taxonomies and the associated interaction-related notions. Subsequently, it discusses the current design (and implementation) of a general purpose framework grounded on this formal model. Finally, the paper reports some preliminary experimental and empirical results from using this framework and relational DBMSs.", "abstracts": [ { "abstractType": "Regular", "content": "Faceted and dynamic taxonomies are increasingly used nowadays in a plethora of applications. For developing user interfaces grounded on this interaction paradigm, it is advantageous to have a framework that enables the manipulation of the underlying information structure and provides the basic functionalities required. This paper introduces a formal model that captures faceted materialized taxonomies and the associated interaction-related notions. Subsequently, it discusses the current design (and implementation) of a general purpose framework grounded on this formal model. Finally, the paper reports some preliminary experimental and empirical results from using this framework and relational DBMSs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Faceted and dynamic taxonomies are increasingly used nowadays in a plethora of applications. For developing user interfaces grounded on this interaction paradigm, it is advantageous to have a framework that enables the manipulation of the underlying information structure and provides the basic functionalities required. This paper introduces a formal model that captures faceted materialized taxonomies and the associated interaction-related notions. Subsequently, it discusses the current design (and implementation) of a general purpose framework grounded on this formal model. Finally, the paper reports some preliminary experimental and empirical results from using this framework and relational DBMSs.", "fno": "3299a392", "keywords": [ "Information Exploration", "Faceted Taxonomies", "Dynamic Taxonomies", "Framework" ], "authors": [ { "affiliation": null, "fullName": "Yannis Tzitzikas", "givenName": "Yannis", "surname": "Tzitzikas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nikos Armenatzoglou", "givenName": "Nikos", "surname": "Armenatzoglou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Panagiotis Papadakos", "givenName": "Panagiotis", "surname": "Papadakos", "__typename": "ArticleAuthorType" } ], "idPrefix": "dexa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-09-01T00:00:00", "pubType": "proceedings", "pages": "392-396", "year": "2008", "issn": "1529-4188", "isbn": "978-0-7695-3299-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3299a387", "articleId": "12OmNvq5jwm", "__typename": "AdjacentArticleType" }, "next": { "fno": "3299a397", "articleId": "12OmNyvoXf5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2011/4398/0/4398a193", "title": "Faceted Navigation for Software Exploration", "doi": null, "abstractUrl": "/proceedings-article/icpc/2011/4398a193/12OmNAo45FL", "parentPublication": { "id": "proceedings/icpc/2011/4398/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/1/3801a474", "title": "FaSet: A Set Theory Model for Faceted Search", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801a474/12OmNBOCWt5", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/1", "title": "2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2007/2932/0/29320207", "title": "Faceted Taxonomy-based Information Management", "doi": null, "abstractUrl": "/proceedings-article/dexa/2007/29320207/12OmNC8uRh1", "parentPublication": { "id": "proceedings/dexa/2007/2932/0", "title": "18th International Workshop on Database and Expert Systems Applications (DEXA 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2013/5083/0/06683908", "title": "Lens: A Faceted Browser for Research Networking Platforms", "doi": null, "abstractUrl": "/proceedings-article/e-science/2013/06683908/12OmNqzu6Pn", "parentPublication": { "id": "proceedings/e-science/2013/5083/0", "title": "2013 IEEE 9th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2007/2932/0/29320201", "title": "Research Results in Dynamic Taxonomy and Faceted Search Systems", "doi": null, "abstractUrl": "/proceedings-article/dexa/2007/29320201/12OmNrJ11Av", "parentPublication": { "id": "proceedings/dexa/2007/2932/0", "title": "18th International Workshop on Database and Expert Systems Applications (DEXA 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a387", "title": "DT-Miner: Data Mining for the People", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a387/12OmNvq5jwm", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b463", "title": "DynaCet: Building Dynamic Faceted Search Systems over Databases", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b463/12OmNwwuDXF", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2008/3310/0/3310a177", "title": "A Faceted Classification Based Approach to Search and Rank Web APIs", "doi": null, "abstractUrl": "/proceedings-article/icws/2008/3310a177/12OmNxw5BiB", "parentPublication": { "id": "proceedings/icws/2008/3310/0", "title": "2008 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a377", "title": "Agile Browsing of a Document Collection with Dynamic Taxonomies", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a377/12OmNyKa698", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122080", "title": "Interactive Exploration of Implicit and Explicit Relations in Faceted Datasets", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122080/13rRUwI5U2F", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbws", "title": "Content-Based Multimedia Indexing, International Workshop on", "acronym": "cbmi", "groupId": "1001802", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBtUdMc", "doi": "10.1109/CBMI.2009.23", "title": "A Multi-faceted Browsing Interface for Digital Photo Collections", "normalizedTitle": "A Multi-faceted Browsing Interface for Digital Photo Collections", "abstract": "Managing photos by using visual features (e.g., color and texture) is known to be a powerful, yet imprecise, retrieval paradigm because of the semantic gap problem. The same is true if search relies only on keywords (or tags), derived from either the image context or user-provided annotations. In this paper we present a new multi-faceted image search and browsing system, named Scenique, that allows the user to manage her photo collections by using both visual features and tags, possibly organized into multiple dimensions (or facets). Each facet can be seen as a coordinate of a multidimensional space describing the image content (for example, the visual appearance, the content type, the geographic location, and so on). We present the basic principles of Scenique and provide evidence of the effectiveness of its visual tools. Feedback supplied by a set of real users indicates that the proposed interface is intuitive, easy-to-use, and that satisfies users' expectations in managing photo collections and quickly locating images of interest.", "abstracts": [ { "abstractType": "Regular", "content": "Managing photos by using visual features (e.g., color and texture) is known to be a powerful, yet imprecise, retrieval paradigm because of the semantic gap problem. The same is true if search relies only on keywords (or tags), derived from either the image context or user-provided annotations. In this paper we present a new multi-faceted image search and browsing system, named Scenique, that allows the user to manage her photo collections by using both visual features and tags, possibly organized into multiple dimensions (or facets). Each facet can be seen as a coordinate of a multidimensional space describing the image content (for example, the visual appearance, the content type, the geographic location, and so on). We present the basic principles of Scenique and provide evidence of the effectiveness of its visual tools. Feedback supplied by a set of real users indicates that the proposed interface is intuitive, easy-to-use, and that satisfies users' expectations in managing photo collections and quickly locating images of interest.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Managing photos by using visual features (e.g., color and texture) is known to be a powerful, yet imprecise, retrieval paradigm because of the semantic gap problem. The same is true if search relies only on keywords (or tags), derived from either the image context or user-provided annotations. In this paper we present a new multi-faceted image search and browsing system, named Scenique, that allows the user to manage her photo collections by using both visual features and tags, possibly organized into multiple dimensions (or facets). Each facet can be seen as a coordinate of a multidimensional space describing the image content (for example, the visual appearance, the content type, the geographic location, and so on). We present the basic principles of Scenique and provide evidence of the effectiveness of its visual tools. Feedback supplied by a set of real users indicates that the proposed interface is intuitive, easy-to-use, and that satisfies users' expectations in managing photo collections and quickly locating images of interest.", "fno": "3662a237", "keywords": [ "Multi Structural Databases", "Classification Dimensions", "Facet Trees", "Tags", "Visual Features" ], "authors": [ { "affiliation": null, "fullName": "Ilaria Bartolini", "givenName": "Ilaria", "surname": "Bartolini", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbmi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "237-242", "year": "2009", "issn": null, "isbn": "978-0-7695-3662-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3662a231", "articleId": "12OmNzTH0PC", "__typename": "AdjacentArticleType" }, "next": { "fno": "3662a243", "articleId": "12OmNvAAtKV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccp/2010/7023/0/05585099", "title": "Search-and-replace editing for personal photo collections", "doi": null, "abstractUrl": "/proceedings-article/iccp/2010/05585099/12OmNBqv2e7", "parentPublication": { "id": "proceedings/iccp/2010/7023/0", "title": "2010 IEEE International Conference on Computational Photography (ICCP 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/07780824", "title": "Adaptive 3D Face Reconstruction from Unconstrained Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/07780824/12OmNqBtiNO", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840b193", "title": "Event Recognition in Photo Collections with a Stopwatch HMM", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840b193/12OmNvmXJ8v", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2015/7079/0/07169813", "title": "Learning personalized expectation-oriented photo selection models for personal photo collections", "doi": null, "abstractUrl": "/proceedings-article/icmew/2015/07169813/12OmNwudQTk", "parentPublication": { "id": "proceedings/icmew/2015/7079/0", "title": "2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2006/0366/0/04037007", "title": "User-Assisted Image Classification on Personal Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/icme/2006/04037007/12OmNxdVgPR", "parentPublication": { "id": "proceedings/icme/2006/0366/0", "title": "2006 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a982", "title": "Family Member Identification from Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a982/12OmNxecRZS", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2013/2171/0/06746818", "title": "MultiFacet: A Faceted Interface for Browsing Large Multimedia Collections", "doi": null, "abstractUrl": "/proceedings-article/ism/2013/06746818/12OmNyv7mvX", "parentPublication": { "id": "proceedings/ism/2013/2171/0", "title": "2013 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2015/8332/0/8332a460", "title": "Shadow Detection and Sun Direction in Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/3dv/2015/8332a460/12OmNzwpUq0", "parentPublication": { "id": "proceedings/3dv/2015/8332/0", "title": "2015 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/02/ttg2014020262", "title": "Personal Photograph Enhancement Using Internet Photo Collections", "doi": null, "abstractUrl": "/journal/tg/2014/02/ttg2014020262/13rRUxcKzVl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/07/08651349", "title": "Ambiguity-Free Radiometric Calibration for Internet Photo Collections", "doi": null, "abstractUrl": "/journal/tp/2020/07/08651349/1koL5eVW1lC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzXFowc", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNClQ0Bk", "doi": "10.1109/HICSS.2001.927165", "title": "New methods for studying global virtual teams: towards a multi-faceted approach", "normalizedTitle": "New methods for studying global virtual teams: towards a multi-faceted approach", "abstract": "Virtual teams are increasingly global, creating challenges for communication and coordination due to greater distances, multiple time zones and cultural differences. A longitudinal research program investigating communication and collaboration in globally distributed engineering design teams is described. Preliminary results illustrate the value of combining quantitative and qualitative sources of information on team communication, working patterns and outcomes. Quantitative data includes communication logs, system usage data and questionnaires. Qualitative data includes participant observation, interviews, transcripts of team events and incident reports. Findings focus on the appropriation of technology by teams, the \"stickiness\" of media usage patterns, the sometimes opposing effects of group technology on team perceptions and the impact of cultural and power issues on communication practices. Qualitative and quantitative data offer distinct but complementary insights into team dynamics, supporting the view that understanding virtual team processes requires multi-faceted research approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual teams are increasingly global, creating challenges for communication and coordination due to greater distances, multiple time zones and cultural differences. A longitudinal research program investigating communication and collaboration in globally distributed engineering design teams is described. Preliminary results illustrate the value of combining quantitative and qualitative sources of information on team communication, working patterns and outcomes. Quantitative data includes communication logs, system usage data and questionnaires. Qualitative data includes participant observation, interviews, transcripts of team events and incident reports. Findings focus on the appropriation of technology by teams, the \"stickiness\" of media usage patterns, the sometimes opposing effects of group technology on team perceptions and the impact of cultural and power issues on communication practices. Qualitative and quantitative data offer distinct but complementary insights into team dynamics, supporting the view that understanding virtual team processes requires multi-faceted research approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual teams are increasingly global, creating challenges for communication and coordination due to greater distances, multiple time zones and cultural differences. A longitudinal research program investigating communication and collaboration in globally distributed engineering design teams is described. Preliminary results illustrate the value of combining quantitative and qualitative sources of information on team communication, working patterns and outcomes. Quantitative data includes communication logs, system usage data and questionnaires. Qualitative data includes participant observation, interviews, transcripts of team events and incident reports. Findings focus on the appropriation of technology by teams, the \"stickiness\" of media usage patterns, the sometimes opposing effects of group technology on team perceptions and the impact of cultural and power issues on communication practices. Qualitative and quantitative data offer distinct but complementary insights into team dynamics, supporting the view that understanding virtual team processes requires multi-faceted research approaches.", "fno": "00927165", "keywords": [ "Virtual Groups", "Cultural Differences", "Global Communication", "Collaborative Work", "Energy Management", "Project Management", "Design Engineering", "Information Resources", "Appropriate Technology", "Group Technology" ], "authors": [ { "affiliation": "Michigan State Univ., East Lansing, MI, USA", "fullName": "C. Steinfield", "givenName": "C.", "surname": "Steinfield", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M. Huysman", "givenName": "M.", "surname": "Huysman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. David", "givenName": "K.", "surname": "David", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chyng Yang Jang", "givenName": null, "surname": "Chyng Yang Jang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Poot", "givenName": "J.", "surname": "Poot", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M. Huis in 't Veld", "givenName": "M.", "surname": "Huis in 't Veld", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "I. Mulder", "givenName": "I.", "surname": "Mulder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "E. Goodman", "givenName": "E.", "surname": "Goodman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Lloyd", "givenName": "J.", "surname": "Lloyd", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "T. Hinds", "givenName": "T.", "surname": "Hinds", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "E. Andriessen", "givenName": "E.", "surname": "Andriessen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. Jarvis", "givenName": "K.", "surname": "Jarvis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "K. van der Werff", "givenName": "K.", "surname": "van der Werff", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "A. Cabrera", "givenName": "A.", "surname": "Cabrera", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "10 pp.", "year": "2001", "issn": null, "isbn": "0-7695-0981-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00927162", "articleId": "12OmNz2TCyV", "__typename": "AdjacentArticleType" }, "next": { "fno": "00927166", "articleId": "12OmNwDACh1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzSh1aw", "title": "2010 International Conference on Complex, Intelligent and Software Intensive Systems", "acronym": "cisis", "groupId": "1002005", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNqJZgy1", "doi": "10.1109/CISIS.2010.122", "title": "Browsing and Visualizing Semantically Enriched Information Resources", "normalizedTitle": "Browsing and Visualizing Semantically Enriched Information Resources", "abstract": "We are developing an approach to organizing bookmarks and other information resources by annotating them with metadata in the form of synsets taken from WordNet. This paper shows how a collection of annotated bookmarks can be semantically enriched by adding hyper-/hyponym relations from WordNet. It then illustrates how the semantically enriched bookmark collection can be browsed and visualized using the Longwell faceted browser. Our initial investigation suggests that the rich semantics of WordNet synsets combined with Longwell’s faceted browsing provide users with a useful aid for navigating and comprehending complex annotated information resources.", "abstracts": [ { "abstractType": "Regular", "content": "We are developing an approach to organizing bookmarks and other information resources by annotating them with metadata in the form of synsets taken from WordNet. This paper shows how a collection of annotated bookmarks can be semantically enriched by adding hyper-/hyponym relations from WordNet. It then illustrates how the semantically enriched bookmark collection can be browsed and visualized using the Longwell faceted browser. Our initial investigation suggests that the rich semantics of WordNet synsets combined with Longwell’s faceted browsing provide users with a useful aid for navigating and comprehending complex annotated information resources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We are developing an approach to organizing bookmarks and other information resources by annotating them with metadata in the form of synsets taken from WordNet. This paper shows how a collection of annotated bookmarks can be semantically enriched by adding hyper-/hyponym relations from WordNet. It then illustrates how the semantically enriched bookmark collection can be browsed and visualized using the Longwell faceted browser. Our initial investigation suggests that the rich semantics of WordNet synsets combined with Longwell’s faceted browsing provide users with a useful aid for navigating and comprehending complex annotated information resources.", "fno": "3967a968", "keywords": [ "Semantical Annotation", "Semantical Enrichment", "Word Net", "Information Management", "Information Visualization", "Faceted Browsing", "Longwell" ], "authors": [ { "affiliation": null, "fullName": "Csaba Veres", "givenName": "Csaba", "surname": "Veres", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kristian Johansen", "givenName": "Kristian", "surname": "Johansen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andreas L. Opdahl", "givenName": "Andreas L.", "surname": "Opdahl", "__typename": "ArticleAuthorType" } ], "idPrefix": "cisis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-02-01T00:00:00", "pubType": "proceedings", "pages": "968-973", "year": "2010", "issn": null, "isbn": "978-0-7695-3967-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3967a962", "articleId": "12OmNBO3K9H", "__typename": "AdjacentArticleType" }, "next": { "fno": "3967a974", "articleId": "12OmNB9t6wM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2009/3800/0/3800a414", "title": "Automated Discovery, Categorization and Retrieval of Personalized Semantically Enriched E-learning Resources", "doi": null, "abstractUrl": "/proceedings-article/icsc/2009/3800a414/12OmNrAdsuG", "parentPublication": { "id": "proceedings/icsc/2009/3800/0", "title": "2009 IEEE International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2010/3992/0/3992a042", "title": "Learning Animal Concepts with Semantic Hierarchy-Based Location-Aware Image Browsing and Ecology Task Generator", "doi": null, "abstractUrl": "/proceedings-article/wmute/2010/3992a042/12OmNvonINT", "parentPublication": { "id": "proceedings/wmute/2010/3992/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799b272", "title": "An Interests Discovery Approach in Social Networks Based on Semantically Enriched Graphs", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799b272/12OmNz61dwZ", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwD1pUh", "title": "2009 42nd Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJAdTE", "doi": "10.1109/HICSS.2009.874", "title": "Proposition of a Faceted Classification Model to Support Corporate Information Organization and Digital Records Management", "normalizedTitle": "Proposition of a Faceted Classification Model to Support Corporate Information Organization and Digital Records Management", "abstract": "The employees of an organization often use a personal hierarchical classification scheme to organize digital documents that are stored on their own workstations. As this may make it hard for other employees to retrieve these documents, there is a risk that the organization will lose track of needed documentation. Furthermore, the inherent boundaries of such a hierarchical structure require making arbitrary decisions about which specific criteria the classification will be based on (for instance, the administrative activity or the document type, although a document can have several attributes and require classification in several classes).A faceted classification model to support corporate information organization is proposed. Partially based on Ranganathan's facets theory, this model aims not only to standardize the organization of digital documents, but also to simplify the management of a document throughout its life cycle for both individuals and organizations, while ensuring compliance to regulatory and policy requirements.", "abstracts": [ { "abstractType": "Regular", "content": "The employees of an organization often use a personal hierarchical classification scheme to organize digital documents that are stored on their own workstations. As this may make it hard for other employees to retrieve these documents, there is a risk that the organization will lose track of needed documentation. Furthermore, the inherent boundaries of such a hierarchical structure require making arbitrary decisions about which specific criteria the classification will be based on (for instance, the administrative activity or the document type, although a document can have several attributes and require classification in several classes).A faceted classification model to support corporate information organization is proposed. Partially based on Ranganathan's facets theory, this model aims not only to standardize the organization of digital documents, but also to simplify the management of a document throughout its life cycle for both individuals and organizations, while ensuring compliance to regulatory and policy requirements.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The employees of an organization often use a personal hierarchical classification scheme to organize digital documents that are stored on their own workstations. As this may make it hard for other employees to retrieve these documents, there is a risk that the organization will lose track of needed documentation. Furthermore, the inherent boundaries of such a hierarchical structure require making arbitrary decisions about which specific criteria the classification will be based on (for instance, the administrative activity or the document type, although a document can have several attributes and require classification in several classes).A faceted classification model to support corporate information organization is proposed. Partially based on Ranganathan's facets theory, this model aims not only to standardize the organization of digital documents, but also to simplify the management of a document throughout its life cycle for both individuals and organizations, while ensuring compliance to regulatory and policy requirements.", "fno": "03-01-01", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Sabine Mas", "givenName": "Sabine", "surname": "Mas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yves Marleau", "givenName": "Yves", "surname": "Marleau", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2009", "issn": null, "isbn": "978-0-7695-3450-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02-12-09", "articleId": "12OmNzzP5Hx", "__typename": "AdjacentArticleType" }, "next": { "fno": "03-01-02", "articleId": "12OmNyYDDDk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/alpit/2007/2930/0/2930a542", "title": "Classification Tree Embedded XML Document Structure Design for Enhanced Web Document Utilization", "doi": null, "abstractUrl": "/proceedings-article/alpit/2007/2930a542/12OmNBRsVzo", "parentPublication": { "id": "proceedings/alpit/2007/2930/0", "title": "Advanced Language Processing and Web Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762a595", "title": "Document Filing Approaches Using an Internal Based Folder Organization", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762a595/12OmNx5Yvj8", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iw-mmdbms/1998/8676/0/86760020", "title": "A Process for Constructing a Personal Folder Organization", "doi": null, "abstractUrl": "/proceedings-article/iw-mmdbms/1998/86760020/12OmNy314ad", "parentPublication": { "id": "proceedings/iw-mmdbms/1998/8676/0", "title": "Multimedia Database Management Systems, International Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithingscpscom/2011/4580/0/4580a537", "title": "Multi-faceted Navigation of Legal Documents", "doi": null, "abstractUrl": "/proceedings-article/ithingscpscom/2011/4580a537/12OmNyXMQni", "parentPublication": { "id": "proceedings/ithingscpscom/2011/4580/0", "title": "International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iatw/2006/2749/0/27490291", "title": "Knowledge Discovery from Semi-Structured Data for Conceptual Organization", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2006/27490291/12OmNzUPpGo", "parentPublication": { "id": "proceedings/wi-iatw/2006/2749/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/la-web/2006/2693/0/26930067", "title": "Construction, Implementation and Maintenance of Ontologies of Records", "doi": null, "abstractUrl": "/proceedings-article/la-web/2006/26930067/12OmNzdoMRf", "parentPublication": { "id": "proceedings/la-web/2006/2693/0", "title": "Web Congress, Latin American", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2000/0493/3/04933007", "title": "Self-Organization of Digital Documents Based on Process-Oriented Relations", "doi": null, "abstractUrl": "/proceedings-article/hicss/2000/04933007/12OmNzkuKzU", "parentPublication": { "id": "proceedings/hicss/2000/0493/3", "title": "Proceedings of the 33rd Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/1999/0265/0/02650128", "title": "Self-Organization of Distributed Document Archives", "doi": null, "abstractUrl": "/proceedings-article/ideas/1999/02650128/12OmNzzP5L0", "parentPublication": { "id": "proceedings/ideas/1999/0265/0", "title": "Database Engineering and Applications Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2002/03/k0599", "title": "ACIRD: Intelligent Internet Document Organization and Retrieval", "doi": null, "abstractUrl": "/journal/tk/2002/03/k0599/13rRUxjQyca", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2004/02/x2068", "title": "Hybrid Neural Document Clustering Using Guided Self-Organization and WordNet", "doi": null, "abstractUrl": "/magazine/ex/2004/02/x2068/13rRUygT7eu", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxYUQ", "title": "2007 IEEE 23rd International Conference on Data Engineering", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUWR1v", "doi": "10.1109/ICDE.2007.369047", "title": "Faceted Browsing over Large Databases of Text-Annotated Objects", "normalizedTitle": "Faceted Browsing over Large Databases of Text-Annotated Objects", "abstract": "We demonstrate a fully working system for multifaceted browsing over large collections of text-annotated data, such as annotated images, that are stored in relational databases. Typically, such databases can be browsed across multiple facets (by topic, genre, location, and so on) and previous user studies showed that multifaceted interfaces improve substantially the ability of users to identify items of interest in the database. We demonstrate a scalable system that automatically generates multifaceted browsing hierarchies on top of a relational database that stores the underlying text-annotated objects. Our system supports a wide range of ranking alternatives for selecting and displaying the best facets and the best portions of the generated hierarchies, to facilitate browsing. We combine our ranking schemes with Rapid Serial Visual Presentation (RSVP), an advanced visualization technique, which further enhances the browsing experience and demonstrate how to use prefetching techniques to overcome the latency issues that are inherent when browsing the contents of a relational database using multifaceted interfaces.", "abstracts": [ { "abstractType": "Regular", "content": "We demonstrate a fully working system for multifaceted browsing over large collections of text-annotated data, such as annotated images, that are stored in relational databases. Typically, such databases can be browsed across multiple facets (by topic, genre, location, and so on) and previous user studies showed that multifaceted interfaces improve substantially the ability of users to identify items of interest in the database. We demonstrate a scalable system that automatically generates multifaceted browsing hierarchies on top of a relational database that stores the underlying text-annotated objects. Our system supports a wide range of ranking alternatives for selecting and displaying the best facets and the best portions of the generated hierarchies, to facilitate browsing. We combine our ranking schemes with Rapid Serial Visual Presentation (RSVP), an advanced visualization technique, which further enhances the browsing experience and demonstrate how to use prefetching techniques to overcome the latency issues that are inherent when browsing the contents of a relational database using multifaceted interfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We demonstrate a fully working system for multifaceted browsing over large collections of text-annotated data, such as annotated images, that are stored in relational databases. Typically, such databases can be browsed across multiple facets (by topic, genre, location, and so on) and previous user studies showed that multifaceted interfaces improve substantially the ability of users to identify items of interest in the database. We demonstrate a scalable system that automatically generates multifaceted browsing hierarchies on top of a relational database that stores the underlying text-annotated objects. Our system supports a wide range of ranking alternatives for selecting and displaying the best facets and the best portions of the generated hierarchies, to facilitate browsing. We combine our ranking schemes with Rapid Serial Visual Presentation (RSVP), an advanced visualization technique, which further enhances the browsing experience and demonstrate how to use prefetching techniques to overcome the latency issues that are inherent when browsing the contents of a relational database using multifaceted interfaces.", "fno": "04221837", "keywords": [ "Data Visualisation", "Query Processing", "Relational Databases", "Storage Management", "User Interfaces", "Very Large Databases", "Faceted Browsing", "Large Databases", "Text Annotated Objects", "Relational Databases", "Ranking Schemes", "Rapid Serial Visual Presentation", "Prefetching Techniques", "Multifaceted Interfaces", "Image Databases", "Relational Databases", "Visual Databases", "Visualization", "Prefetching", "Animals", "Spatial Databases", "Face", "Costs", "Delay" ], "authors": [ { "affiliation": "Columbia University, wisam@cs.columbia.edu", "fullName": "Wisam Dakka", "givenName": "Wisam", "surname": "Dakka", "__typename": "ArticleAuthorType" }, { "affiliation": "New York University, panos@nyu.edu", "fullName": "Panagiotis G. Ipeirotis", "givenName": "Panagiotis G.", "surname": "Ipeirotis", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, krw@microsoft.com", "fullName": "Kenneth R. Wood", "givenName": "Kenneth R.", "surname": "Wood", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-04-01T00:00:00", "pubType": "proceedings", "pages": "1489-1490", "year": "2007", "issn": "1063-6382", "isbn": "1-4244-0802-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04221841", "articleId": "12OmNx8fifi", "__typename": "AdjacentArticleType" }, "next": { "fno": "04221842", "articleId": "12OmNzfXauE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/adc/2000/0528/0/05280012", "title": "Querying Databases of Annotated Speech", "doi": null, "abstractUrl": "/proceedings-article/adc/2000/05280012/12OmNAfy7GE", "parentPublication": { "id": "proceedings/adc/2000/0528/0", "title": "Proceedings 11th Australasian Database Conference. ADC 2000 (Cat. No.PR00528)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbmi/2009/3662/0/3662a237", "title": "A Multi-faceted Browsing Interface for Digital Photo Collections", "doi": null, "abstractUrl": "/proceedings-article/cbmi/2009/3662a237/12OmNBtUdMc", "parentPublication": { "id": "proceedings/cbmi/2009/3662/0", "title": "Content-Based Multimedia Indexing, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wvl/1990/2090/0/00128393", "title": "Browsing in geographic databases: an object-oriented approach", "doi": null, "abstractUrl": "/proceedings-article/wvl/1990/00128393/12OmNCvumPo", "parentPublication": { "id": "proceedings/wvl/1990/2090/0", "title": "Proceedings of the 1990 IEEE Workshop on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ims/1991/2205/0/00153697", "title": "Interoperability of heterogeneous databases with schematic discrepancies", "doi": null, "abstractUrl": "/proceedings-article/ims/1991/00153697/12OmNvTjZXg", "parentPublication": { "id": "proceedings/ims/1991/2205/0", "title": "Proceedings First International Workshop on Interoperability in Multidatabase Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2006/354/0/04119164", "title": "Interface design for browsing faceted metadata", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2006/04119164/12OmNvoFjST", "parentPublication": { "id": "proceedings/jcdl/2006/354/0", "title": "2006 IEEE/ACM 6th Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbmi/2009/3662/0/3662a249", "title": "Picadomo: Faceted Image Browsing for Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/cbmi/2009/3662a249/12OmNxA3Z6b", "parentPublication": { "id": "proceedings/cbmi/2009/3662/0", "title": "Content-Based Multimedia Indexing, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2016/3207/0/3207a058", "title": "Modeling Integration and Reuse of Heterogeneous Terminologies in Faceted Browsing Systems", "doi": null, "abstractUrl": "/proceedings-article/iri/2016/3207a058/12OmNy2rRWM", "parentPublication": { "id": "proceedings/iri/2016/3207/0", "title": "2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2013/2171/0/06746818", "title": "MultiFacet: A Faceted Interface for Browsing Large Multimedia Collections", "doi": null, "abstractUrl": "/proceedings-article/ism/2013/06746818/12OmNyv7mvX", "parentPublication": { "id": "proceedings/ism/2013/2171/0", "title": "2013 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/2/01394309", "title": "Cluster-temporal browsing of large news video databases", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394309/12OmNzC5Tdm", "parentPublication": { "id": "proceedings/icme/2004/8603/2", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/1988/04/s4077", "title": "Multikey, Extensible Hashing for Relational Databases", "doi": null, "abstractUrl": "/magazine/so/1988/04/s4077/13rRUx0gexG", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzZmZqY", "title": "International Conference on Computer Graphics, Imaging and Visualisation (CGIV'06)", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzuZUxz", "doi": "10.1109/CGIV.2006.20", "title": "Analysis and Visualization of Co-authorship Networks for Understanding Academic Collaboration and Knowledge Domain of Individual Researchers", "normalizedTitle": "Analysis and Visualization of Co-authorship Networks for Understanding Academic Collaboration and Knowledge Domain of Individual Researchers", "abstract": "This paper proposed a new approach for collecting, analyzing and visualizing co-authoring data of individuals. This approach can be used for understanding the academic collaboration and knowledge domain of individual researchers in a past period through repetitive co-published works. Particularly we extracted the co-authoring data from the DBLP which is one of the largest on-line Computer Science bibliographic databases available on the Internet. To help users to understand the academic collaboration and knowledge domain of individuals, we developed an InterRing visualizer which shows not only the weight of co-authorship of an individual with other researchers in particular academic year, but also the knowledge domain of the individual that was covered by his/her publications published in a past period.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposed a new approach for collecting, analyzing and visualizing co-authoring data of individuals. This approach can be used for understanding the academic collaboration and knowledge domain of individual researchers in a past period through repetitive co-published works. Particularly we extracted the co-authoring data from the DBLP which is one of the largest on-line Computer Science bibliographic databases available on the Internet. To help users to understand the academic collaboration and knowledge domain of individuals, we developed an InterRing visualizer which shows not only the weight of co-authorship of an individual with other researchers in particular academic year, but also the knowledge domain of the individual that was covered by his/her publications published in a past period.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposed a new approach for collecting, analyzing and visualizing co-authoring data of individuals. This approach can be used for understanding the academic collaboration and knowledge domain of individual researchers in a past period through repetitive co-published works. Particularly we extracted the co-authoring data from the DBLP which is one of the largest on-line Computer Science bibliographic databases available on the Internet. To help users to understand the academic collaboration and knowledge domain of individuals, we developed an InterRing visualizer which shows not only the weight of co-authorship of an individual with other researchers in particular academic year, but also the knowledge domain of the individual that was covered by his/her publications published in a past period.", "fno": "26060018", "keywords": [ "Co Authorship", "Information Visualization", "Information Analysis" ], "authors": [ { "affiliation": "University of Technology, Australia", "fullName": "Tze-Haw Huang", "givenName": "Tze-Haw", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Technology, Australia", "fullName": "Mao Lin Huang", "givenName": "Mao Lin", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "18-23", "year": "2006", "issn": null, "isbn": "0-7695-2606-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "26060012", "articleId": "12OmNzcxZ4q", "__typename": "AdjacentArticleType" }, "next": { "fno": "26060024", "articleId": "12OmNqBKTWt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sccc/2010/4400/0/4400a131", "title": "A New Approach to Detect Communities in Multi-weighted Co-authorship Networks", "doi": null, "abstractUrl": "/proceedings-article/sccc/2010/4400a131/12OmNArthbY", "parentPublication": { "id": "proceedings/sccc/2010/4400/0", "title": "2010 XXIX International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2008/3167/0/3167a265", "title": "CAWS: An Awareness Based Wiki System to Improve Team Collaboration", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a265/12OmNCcKQtC", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2009/3726/1/3726a599", "title": "Temporally Robust Software Features for Authorship Attribution", "doi": null, "abstractUrl": "/proceedings-article/compsac/2009/3726a599/12OmNqGiu07", "parentPublication": { "id": "proceedings/compsac/2009/3726/1", "title": "2009 33rd Annual IEEE International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbake/2009/3692/0/3692a034", "title": "Authorship Invarianceness for Writer Identification", "doi": null, "abstractUrl": "/proceedings-article/icbake/2009/3692a034/12OmNwl8GE2", "parentPublication": { "id": "proceedings/icbake/2009/3692/0", "title": "Biometrics and Kansei Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a147", "title": "Comparison of Co-authorship Networks across Scientific Fields Using Motifs", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a147/12OmNxEBz20", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esciencew/2011/4598/0/4598a053", "title": "Towards Automatic Discovery of co-authorship Networks in the Brazilian Academic Areas", "doi": null, "abstractUrl": "/proceedings-article/esciencew/2011/4598a053/12OmNxGSm0d", "parentPublication": { "id": "proceedings/esciencew/2011/4598/0", "title": "e-Science Workshops, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2007/2928/0/29280465", "title": "Visualization of Individual?s Knowledge by Analyzing the Citation Networks", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2007/29280465/12OmNyQph7E", "parentPublication": { "id": "proceedings/cgiv/2007/2928/0", "title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/3/4513c134", "title": "Visualization-Based Support of Hypothesis Verification for Research Survey with Co-authorship Networks", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513c134/12OmNyoAA3q", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pci/2012/4825/0/4825a150", "title": "Co-authorship Networks in Academic Research Communities: The Role of Network Strength", "doi": null, "abstractUrl": "/proceedings-article/pci/2012/4825a150/12OmNzBOhR2", "parentPublication": { "id": "proceedings/pci/2012/4825/0", "title": "2012 16th Panhellenic Conference on Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/1/4513a332", "title": "Predicting Researchers' Future Activities Using Visualization System for Co-authorship Networks", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513a332/12OmNzzP5D7", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zJmQt5adCU", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zJmVJPs7Nm", "doi": "10.1109/JCDL52503.2021.00033", "title": "Visualizing Feature-based Similarity for Research Paper Recommendation", "normalizedTitle": "Visualizing Feature-based Similarity for Research Paper Recommendation", "abstract": "Research paper recommender systems are widely used by academics to discover and explore the most relevant publications on a topic. While existing recommendation interfaces present researchers with a ranked list of publications based on a global relevance score, they fail to visualize the full range of non-textual features uniquely present in academic publications: citations, figures, charts, or images, and mathematical formulae or expressions. Especially for STEM literature, examining such non-textual features efficiently can provide utility to researchers interested in answering specialized research questions or information needs. If research paper search and recommender systems are to consider the similarity of such features as one facet of a content-based similarity assessment for academic literature, new methods for visualizing these non-textual features are needed. In this paper, we review the state-of-the-art in visualizing feature-based similarity in documents. We subsequently propose a set of user-customizable visualization approaches tailored to STEM literature and the research paper recommendation context. Results from a study with 10 expert users show that the interactive visualization interface we propose for the exploration of non-textual features in publications can effectively address specialized information retrieval tasks, which cannot be addressed by existing research paper search or recommendation interfaces.", "abstracts": [ { "abstractType": "Regular", "content": "Research paper recommender systems are widely used by academics to discover and explore the most relevant publications on a topic. While existing recommendation interfaces present researchers with a ranked list of publications based on a global relevance score, they fail to visualize the full range of non-textual features uniquely present in academic publications: citations, figures, charts, or images, and mathematical formulae or expressions. Especially for STEM literature, examining such non-textual features efficiently can provide utility to researchers interested in answering specialized research questions or information needs. If research paper search and recommender systems are to consider the similarity of such features as one facet of a content-based similarity assessment for academic literature, new methods for visualizing these non-textual features are needed. In this paper, we review the state-of-the-art in visualizing feature-based similarity in documents. We subsequently propose a set of user-customizable visualization approaches tailored to STEM literature and the research paper recommendation context. Results from a study with 10 expert users show that the interactive visualization interface we propose for the exploration of non-textual features in publications can effectively address specialized information retrieval tasks, which cannot be addressed by existing research paper search or recommendation interfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research paper recommender systems are widely used by academics to discover and explore the most relevant publications on a topic. While existing recommendation interfaces present researchers with a ranked list of publications based on a global relevance score, they fail to visualize the full range of non-textual features uniquely present in academic publications: citations, figures, charts, or images, and mathematical formulae or expressions. Especially for STEM literature, examining such non-textual features efficiently can provide utility to researchers interested in answering specialized research questions or information needs. If research paper search and recommender systems are to consider the similarity of such features as one facet of a content-based similarity assessment for academic literature, new methods for visualizing these non-textual features are needed. In this paper, we review the state-of-the-art in visualizing feature-based similarity in documents. We subsequently propose a set of user-customizable visualization approaches tailored to STEM literature and the research paper recommendation context. Results from a study with 10 expert users show that the interactive visualization interface we propose for the exploration of non-textual features in publications can effectively address specialized information retrieval tasks, which cannot be addressed by existing research paper search or recommendation interfaces.", "fno": "177000a212", "keywords": [ "Data Visualisation", "Information Retrieval", "Recommender Systems", "Global Relevance Score", "Nontextual Features", "Academic Publications", "STEM Literature", "Content Based Similarity Assessment", "Academic Literature", "Feature Based Similarity", "User Customizable Visualization", "Interactive Visualization Interface", "Research Paper Recommender Systems", "Recommendation Interfaces", "Visualization", "Image Resolution", "Navigation", "Layout", "Feature Extraction", "Information Retrieval", "Libraries", "Recommender Systems", "Interactive Information Retrieval", "Feature Analysis", "Information Visualization", "User Studies" ], "authors": [ { "affiliation": "Univ. of Konstanz & University of Wuppertal,Dept. of Computer and Information Science,Germany", "fullName": "Corinna Breitinger", "givenName": "Corinna", "surname": "Breitinger", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Konstanz,Dept. of Computer and Information Science,Germany", "fullName": "Harald Reiterer", "givenName": "Harald", "surname": "Reiterer", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "212-221", "year": "2021", "issn": null, "isbn": "978-1-6654-1770-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "177000a202", "articleId": "1zJmTELDV2E", "__typename": "AdjacentArticleType" }, "next": { "fno": "177000a222", "articleId": "1zJmRF7UMik", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic3k/2015/8164/1/07526989", "title": "Author's paper Similarity Prediction based on the Similarity of Textual References to Visual Features", "doi": null, "abstractUrl": "/proceedings-article/ic3k/2015/07526989/12OmNAXxXjU", "parentPublication": { "id": "proceedings/ic3k/2015/8164/1", "title": "2015 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2017/3861/0/07991602", "title": "Information Needs for Anime Recommendation: Analyzing Anime Users' Online Forum Queries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2017/07991602/12OmNBSBkgc", "parentPublication": { "id": "proceedings/jcdl/2017/3861/0", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921649", "title": "Personalized paper recommendation in online social scholar system", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921649/12OmNx965I4", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2013/0215/0/06693088", "title": "Automatic recommendation of API methods from feature requests", "doi": null, "abstractUrl": "/proceedings-article/ase/2013/06693088/12OmNxecRV2", "parentPublication": { "id": "proceedings/ase/2013/0215/0", "title": "2013 IEEE/ACM 28th International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742381", "title": "The NETSPEAK WORDGRAPH: Visualizing keywords in context", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742381/12OmNy2rRZ8", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a563", "title": "FF-PRec: A Feature Fusion-Based Paper Recommendation Method on Academic Big Data of Heterogeneous Network", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a563/1BmOo5oEeli", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a047", "title": "Research Paper Recommendation Based on Content Similarity, Peer Reviews, Authority, and Popularity", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a047/1pP3tKiqI00", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2020/7628/0/762800a224", "title": "A Sentiment-based Similarity Model for Recommendation Systems", "doi": null, "abstractUrl": "/proceedings-article/synasc/2020/762800a224/1rtXDt1d3Qk", "parentPublication": { "id": "proceedings/synasc/2020/7628/0", "title": "2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2021/1770/0/177000a318", "title": "Incorporating Fairness in Paper Recommendation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2021/177000a318/1zJmWcj16QE", "parentPublication": { "id": "proceedings/jcdl/2021/1770/0", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2021/1770/0/177000a001", "title": "A Comparative Analysis of Article Recommendation Platforms", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2021/177000a001/1zJmXn8xY2Y", "parentPublication": { "id": "proceedings/jcdl/2021/1770/0", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbwv", "title": "International Symposium ELMAR", "acronym": "elmar", "groupId": "1001484", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNwFid4i", "doi": "10.1109/ELMAR.2006.329535", "title": "Audio ? Visual Interaction: Multimedia Applications", "normalizedTitle": "Audio ? Visual Interaction: Multimedia Applications", "abstract": "The entire experience of our environment is obtained by interaction of multiple senses. The most obvious example of such interaction which we encounter in every day life is speech and its comprehension which is affected by vision and hearing. The most significant factor which affects speech comprehensibility during audio-visual interaction is by all means the time synchrony of audio and video notation. The goal of our experiment is to determine the boundaries of sound delay with respect to picture, and vice versa, within which a human being experiences the audio-visual stimuli as synchronous, and to determine to what extent asynchrony of stimuli negatively affects the subjective experience of the observer", "abstracts": [ { "abstractType": "Regular", "content": "The entire experience of our environment is obtained by interaction of multiple senses. The most obvious example of such interaction which we encounter in every day life is speech and its comprehension which is affected by vision and hearing. The most significant factor which affects speech comprehensibility during audio-visual interaction is by all means the time synchrony of audio and video notation. The goal of our experiment is to determine the boundaries of sound delay with respect to picture, and vice versa, within which a human being experiences the audio-visual stimuli as synchronous, and to determine to what extent asynchrony of stimuli negatively affects the subjective experience of the observer", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The entire experience of our environment is obtained by interaction of multiple senses. The most obvious example of such interaction which we encounter in every day life is speech and its comprehension which is affected by vision and hearing. The most significant factor which affects speech comprehensibility during audio-visual interaction is by all means the time synchrony of audio and video notation. The goal of our experiment is to determine the boundaries of sound delay with respect to picture, and vice versa, within which a human being experiences the audio-visual stimuli as synchronous, and to determine to what extent asynchrony of stimuli negatively affects the subjective experience of the observer", "fno": "04127508", "keywords": [ "Multimedia Application", "Audio Visual Interaction" ], "authors": [ { "affiliation": "Fac. of Electr. Eng.&Comput., Zagreb Univ.", "fullName": "S. Zonja", "givenName": "S.", "surname": "Zonja", "__typename": "ArticleAuthorType" }, { "affiliation": "Fac. of Electr. Eng.&Comput., Zagreb Univ.", "fullName": "N. Livun", "givenName": "N.", "surname": "Livun", "__typename": "ArticleAuthorType" }, { "affiliation": "Fac. of Electr. Eng.&Comput., Zagreb Univ.", "fullName": "K. Jambrosic", "givenName": "K.", "surname": "Jambrosic", "__typename": "ArticleAuthorType" } ], "idPrefix": "elmar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-06-01T00:00:00", "pubType": "proceedings", "pages": "143-146", "year": "2006", "issn": null, "isbn": "953-7044-03-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04127507", "articleId": "12OmNwcUjVg", "__typename": "AdjacentArticleType" }, "next": { "fno": "04127509", "articleId": "12OmNy6ZrZ8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isda/2008/3382/3/3382c575", "title": "An Actor-Based Video Segmentation System Using Visual and Audio Information in E-Learning", "doi": null, "abstractUrl": "/proceedings-article/isda/2008/3382c575/12OmNBtUdIH", "parentPublication": { "id": "proceedings/isda/2008/3382/3", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327194", "title": "Audio-visual graphical models for speech processing", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327194/12OmNqGiu1n", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2005/9331/0/01521551", "title": "Audio-visual affect recognition in activation-evaluation space", "doi": null, "abstractUrl": "/proceedings-article/icme/2005/01521551/12OmNvStcxD", "parentPublication": { "id": "proceedings/icme/2005/9331/0", "title": "2005 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2010/4115/1/4115a204", "title": "Research of Visual Features Detection and Tracking Methods about Audio-Visual Bimodal Speech Recognition", "doi": null, "abstractUrl": "/proceedings-article/ifita/2010/4115a204/12OmNvTjZUh", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539667", "title": "Audio-Visual Content Analysis for Content-Based Video Indexing", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539667/12OmNvkYx8L", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a912", "title": "Audio-Visual Emotion Recognition Based on a DBN Model with Constrained Asynchrony", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a912/12OmNx5piOz", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/2/73102579", "title": "Speech-assisted lip synchronization in audio-visual communications", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73102579/12OmNyQph9e", "parentPublication": { "id": "proceedings/icip/1995/7310/2", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2011/01/mmu2011010088", "title": "Visual Rhythm Detection and Its Applications in Interactive Multimedia", "doi": null, "abstractUrl": "/magazine/mu/2011/01/mmu2011010088/13rRUB7a0XR", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1991/04/mcg1991040052", "title": "Developing multimedia applications", "doi": null, "abstractUrl": "/magazine/cg/1991/04/mcg1991040052/13rRUEgs2vs", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2013/02/mmu2013020072", "title": "MPEG Unified Speech and Audio Coding", "doi": null, "abstractUrl": "/magazine/mu/2013/02/mmu2013020072/13rRUwfZC31", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvs4vpI", "title": "Visual Languages, IEEE Symposium on", "acronym": "vl", "groupId": "1000793", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNxaw59T", "doi": "10.1109/VL.1999.795874", "title": "Dimensions of Visual Interaction Design", "normalizedTitle": "Dimensions of Visual Interaction Design", "abstract": "We refine our design methodology for visual interactive systems based on the visual sentence theory. We explore the dimensions of time and space in visual interaction and discuss the importance of the notions of scaffold and frame of reference. Usable visual systems are realized by designing an augmented version of the user task visual language and a scaffold visual language supporting user navigation and action execution. However, the frame effect, i.e. user's perception of persistent characteristic structures in different images, must be explicitly considered, to avoid user disorientation. Some examples of positive and negative use of the frame of reference are included and some design guidelines are derived.", "abstracts": [ { "abstractType": "Regular", "content": "We refine our design methodology for visual interactive systems based on the visual sentence theory. We explore the dimensions of time and space in visual interaction and discuss the importance of the notions of scaffold and frame of reference. Usable visual systems are realized by designing an augmented version of the user task visual language and a scaffold visual language supporting user navigation and action execution. However, the frame effect, i.e. user's perception of persistent characteristic structures in different images, must be explicitly considered, to avoid user disorientation. Some examples of positive and negative use of the frame of reference are included and some design guidelines are derived.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We refine our design methodology for visual interactive systems based on the visual sentence theory. We explore the dimensions of time and space in visual interaction and discuss the importance of the notions of scaffold and frame of reference. Usable visual systems are realized by designing an augmented version of the user task visual language and a scaffold visual language supporting user navigation and action execution. However, the frame effect, i.e. user's perception of persistent characteristic structures in different images, must be explicitly considered, to avoid user disorientation. Some examples of positive and negative use of the frame of reference are included and some design guidelines are derived.", "fno": "02160048", "keywords": [ "Design Of Visual Languages", "Systems Of Visual Languages", "Dimensions Of Interaction" ], "authors": [ { "affiliation": "Universit? \"La Sapienza\"", "fullName": "P. Bottoni", "givenName": "P.", "surname": "Bottoni", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit? \"La Sapienza\"", "fullName": "S. Levialdi", "givenName": "S.", "surname": "Levialdi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pittsburgh", "fullName": "S.-K. Chang", "givenName": "S.-K.", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit? di Bari", "fullName": "M.F. Costabile", "givenName": "M.F.", "surname": "Costabile", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit? di Brescia", "fullName": "P. Mussio", "givenName": "P.", "surname": "Mussio", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-09-01T00:00:00", "pubType": "proceedings", "pages": "48", "year": "1999", "issn": "1049-2615", "isbn": "0-7695-0216-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02160038", "articleId": "12OmNA0dMF4", "__typename": "AdjacentArticleType" }, "next": { "fno": "02160058", "articleId": "12OmNzTYBZV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdVh2r", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQ7FJe", "doi": "10.1109/PACIFICVIS.2017.8031580", "title": "Interaction+: Interaction enhancement for web-based visualizations", "normalizedTitle": "Interaction+: Interaction enhancement for web-based visualizations", "abstract": "In this work, we present Interaction+, a tool that enhances the interactive capability of existing web-based visualizations. Different from the toolkits for authoring interactions during the visualization construction, Interaction+ takes existing visualizations as input, analyzes the visual objects, and provides users with a suite of interactions to facilitate the visual exploration, including selection, aggregation, arrangement, comparison, filtering, and annotation. Without accessing the underlying data or process how the visualization is constructed, Interaction+ is application-independent and can be employed in various visualizations on the web. We demonstrate its usage in two scenarios and evaluate its effectiveness with a qualitative user study.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we present Interaction+, a tool that enhances the interactive capability of existing web-based visualizations. Different from the toolkits for authoring interactions during the visualization construction, Interaction+ takes existing visualizations as input, analyzes the visual objects, and provides users with a suite of interactions to facilitate the visual exploration, including selection, aggregation, arrangement, comparison, filtering, and annotation. Without accessing the underlying data or process how the visualization is constructed, Interaction+ is application-independent and can be employed in various visualizations on the web. We demonstrate its usage in two scenarios and evaluate its effectiveness with a qualitative user study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we present Interaction+, a tool that enhances the interactive capability of existing web-based visualizations. Different from the toolkits for authoring interactions during the visualization construction, Interaction+ takes existing visualizations as input, analyzes the visual objects, and provides users with a suite of interactions to facilitate the visual exploration, including selection, aggregation, arrangement, comparison, filtering, and annotation. Without accessing the underlying data or process how the visualization is constructed, Interaction+ is application-independent and can be employed in various visualizations on the web. We demonstrate its usage in two scenarios and evaluate its effectiveness with a qualitative user study.", "fno": "08031580", "keywords": [ "Data Visualization", "Visualization", "Data Mining", "Electronic Mail", "Bars", "Libraries", "Proposals", "H 5 2 Information Interfaces And Presentation User Interfaces Graphical User Interface" ], "authors": [ { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Min Lu", "givenName": null, "surname": "Min Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Engineer and Information Technology, The University of Technology, Sydney, Australia", "fullName": "Jie Liang", "givenName": null, "surname": "Jie Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Yu Zhang", "givenName": null, "surname": "Yu Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Guozheng Li", "givenName": null, "surname": "Guozheng Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Siming Chen", "givenName": null, "surname": "Siming Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Zongru Li", "givenName": null, "surname": "Zongru Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Machine Perception (Ministry of Education), Peking University, China", "fullName": "Xiaoru Yuan", "givenName": "Xiaoru", "surname": "Yuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "61-70", "year": "2017", "issn": "2165-8773", "isbn": "978-1-5090-5738-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08031579", "articleId": "12OmNzt0ILY", "__typename": "AdjacentArticleType" }, "next": { "fno": "08031581", "articleId": "12OmNAsBFOA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/1996/7668/0/76680029", "title": "On the semantics of interactive visualizations", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1996/76680029/12OmNBtUdJb", "parentPublication": { "id": "proceedings/ieee-infovis/1996/7668/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2017/2089/0/2089a142", "title": "Building Immersive Data Visualizations for the Web", "doi": null, "abstractUrl": "/proceedings-article/cw/2017/2089a142/12OmNx6PiB6", "parentPublication": { "id": "proceedings/cw/2017/2089/0", "title": "2017 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a203", "title": "Promoting Insight: A Case Study of How to Incorporate Interaction in Existing Data Visualizations", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a203/12OmNx7G68T", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/07/08354901", "title": "Task-Based Effectiveness of Basic Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/07/08354901/13rRUwd9CLU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122396", "title": "An Interaction Model for Visualizations Beyond The Desktop", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122396/13rRUxBa5nm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454489", "title": "Patterns and Pace: Quantifying Diverse Exploration Behavior with Visualizations on the Web", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454489/17D45W1Oa3s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/02/08281629", "title": "Exploration Strategies for Discovery of Interactivity in Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/02/08281629/17D45WB0qaL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506578", "title": "Comparative Visualizations through Parameterization and Variability", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506578/17D45WaTki5", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09916137", "title": "Revisiting the Design Patterns of Composite Visualizations", "doi": null, "abstractUrl": "/journal/tg/5555/01/09916137/1HojAjSAGNq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933747", "title": "EasyPZ.js: Interaction Binding for Pan and Zoom Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933747/1fTgFR19dTi", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LIRuWyLf5C", "title": "2019 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "acronym": "mlui", "groupId": "1849158", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1LIRvsHYwsE", "doi": "10.1109/MLUI52769.2019.10075565", "title": "DeepVA: Bridging Cognition and Computation through Semantic Interaction and Deep Learning", "normalizedTitle": "DeepVA: Bridging Cognition and Computation through Semantic Interaction and Deep Learning", "abstract": "This paper examines how deep learning (DL) representations, in contrast to traditional engineered features, can support semantic interaction (SI) in visual analytics. SI attempts to model user’s cognitive reasoning via their interaction with data items, based on the data features. We hypothesize that DL representations contain meaningful high-level abstractions that can better capture users’ high-level cognitive intent. To bridge the gap between cognition and computation in visual analytics, we propose DeepVA (Deep Visual Analytics), which uses high-level deep learning representations for semantic interaction instead of low-level hand-crafted data features. To evaluate DeepVA and compare to SI models with lower-level features, we design and implement a system that extends a traditional SI pipeline with features at three different levels of abstraction. To test the relationship between task abstraction and feature abstraction in SI, we perform visual concept learning tasks at three different task abstraction levels, using semantic interaction with three different feature abstraction levels. DeepVA effectively hastened interactive convergence between cognitive understanding and computational modeling of the data, especially in high abstraction tasks.", "abstracts": [ { "abstractType": "Regular", "content": "This paper examines how deep learning (DL) representations, in contrast to traditional engineered features, can support semantic interaction (SI) in visual analytics. SI attempts to model user’s cognitive reasoning via their interaction with data items, based on the data features. We hypothesize that DL representations contain meaningful high-level abstractions that can better capture users’ high-level cognitive intent. To bridge the gap between cognition and computation in visual analytics, we propose DeepVA (Deep Visual Analytics), which uses high-level deep learning representations for semantic interaction instead of low-level hand-crafted data features. To evaluate DeepVA and compare to SI models with lower-level features, we design and implement a system that extends a traditional SI pipeline with features at three different levels of abstraction. To test the relationship between task abstraction and feature abstraction in SI, we perform visual concept learning tasks at three different task abstraction levels, using semantic interaction with three different feature abstraction levels. DeepVA effectively hastened interactive convergence between cognitive understanding and computational modeling of the data, especially in high abstraction tasks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper examines how deep learning (DL) representations, in contrast to traditional engineered features, can support semantic interaction (SI) in visual analytics. SI attempts to model user’s cognitive reasoning via their interaction with data items, based on the data features. We hypothesize that DL representations contain meaningful high-level abstractions that can better capture users’ high-level cognitive intent. To bridge the gap between cognition and computation in visual analytics, we propose DeepVA (Deep Visual Analytics), which uses high-level deep learning representations for semantic interaction instead of low-level hand-crafted data features. To evaluate DeepVA and compare to SI models with lower-level features, we design and implement a system that extends a traditional SI pipeline with features at three different levels of abstraction. To test the relationship between task abstraction and feature abstraction in SI, we perform visual concept learning tasks at three different task abstraction levels, using semantic interaction with three different feature abstraction levels. DeepVA effectively hastened interactive convergence between cognitive understanding and computational modeling of the data, especially in high abstraction tasks.", "fno": "10075565", "keywords": [ "Cognition", "Cognitive Systems", "Data Analysis", "Data Visualisation", "Deep Learning Artificial Intelligence", "Feature Extraction", "Learning Artificial Intelligence", "Cognition", "Cognitive Understanding", "Computational Modeling", "Data Items", "Deep Visual Analytics", "Deep VA", "Different Feature Abstraction Levels", "Different Task Abstraction Levels", "High Abstraction Tasks", "High Level Abstractions", "High Level Cognitive Intent", "High Level Deep Learning Representations", "Interactive Convergence", "Low Level Hand Crafted Data Features", "Lower Level Features", "Semantic Interaction", "SI Models", "Traditional Engineered Features", "Traditional SI Pipeline", "User", "Visual Concept", "Deep Learning", "Visual Analytics", "Computational Modeling", "Semantics", "Pipelines", "Data Visualization", "Cognition", "Semantic Interaction", "Sensemaking", "Deep Learning", "Visual Analytics" ], "authors": [ { "affiliation": "Virginia Tech", "fullName": "Yali Bian", "givenName": "Yali", "surname": "Bian", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech", "fullName": "John Wenskovitch", "givenName": "John", "surname": "Wenskovitch", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech", "fullName": "Chris North", "givenName": "Chris", "surname": "North", "__typename": "ArticleAuthorType" } ], "idPrefix": "mlui", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2019", "issn": null, "isbn": "978-1-6654-4064-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10075566", "articleId": "1LIRv2QM5Og", "__typename": "AdjacentArticleType" }, "next": { "fno": "10075560", "articleId": "1LIRveJELtK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718615", "title": "Expanding the Scope: Interaction Design Perspectives for Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718615/12OmNxGSm6x", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a352", "title": "Visualization for Visual Analytics: Micro-visualization, Abstraction, and Physical Appeal", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a352/12OmNySG3Oy", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b427", "title": "Mixed-Initiative for Big Data: The Intersection of Human + Visual Analytics + Prediction", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b427/12OmNzVGcUy", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122908", "title": "The User Puzzle—Explaining the Interaction with Visual Analytics Systems", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122908/13rRUIIVlcH", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/04/mcg2014040008", "title": "Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation", "doi": null, "abstractUrl": "/magazine/cg/2014/04/mcg2014040008/13rRUwwslv3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040094", "title": "Semantic Interaction: Coupling Cognition and Computation through Usable Interactive Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040094/13rRUxOveck", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192662", "title": "A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192662/13rRUyuegha", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09745848", "title": "A Model for Types and Levels of Automation in Visual Analytics: a Survey, a Taxonomy, and Examples", "doi": null, "abstractUrl": "/journal/tg/5555/01/09745848/1CbVnSejsjK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2018/4063/0/10075562", "title": "A Bidirectional Pipeline for Semantic Interaction", "doi": null, "abstractUrl": "/proceedings-article/mlui/2018/10075562/1LIRzmx4WUo", "parentPublication": { "id": "proceedings/mlui/2018/4063/0", "title": "2018 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805424", "title": "What is Interaction for Data Visualization?", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805424/1cG4MsovTO0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvA1hw1", "title": "Computer Modeling and Simulation, International Conference on", "acronym": "uksim", "groupId": "1001885", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBdJ5j0", "doi": "10.1109/UKSIM.2010.94", "title": "Case Study: Visualization Methodology for Analysing Network Data", "normalizedTitle": "Case Study: Visualization Methodology for Analysing Network Data", "abstract": "Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dimensional (2D), three-dimensional (3D) and high multidimensional data can be presented by using relevant visualization techniques. Most of the visualization techniques exist in generating the captured network data into informative graphical 2D or 3D view. However, there are no tools or systems that are able to identify as well as analyses the types of given network data and presents it into the robust and meaningful illustration based on user requirements. This paper explored a new algorithm that would be used to solve the constraints which have been mentioned above. We also presented how the algorithm can facilitate the current visualization methodology. By the end of this, our proposed methodology should be able to analyse different types of network data automatically and effectively.", "abstracts": [ { "abstractType": "Regular", "content": "Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dimensional (2D), three-dimensional (3D) and high multidimensional data can be presented by using relevant visualization techniques. Most of the visualization techniques exist in generating the captured network data into informative graphical 2D or 3D view. However, there are no tools or systems that are able to identify as well as analyses the types of given network data and presents it into the robust and meaningful illustration based on user requirements. This paper explored a new algorithm that would be used to solve the constraints which have been mentioned above. We also presented how the algorithm can facilitate the current visualization methodology. By the end of this, our proposed methodology should be able to analyse different types of network data automatically and effectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dimensional (2D), three-dimensional (3D) and high multidimensional data can be presented by using relevant visualization techniques. Most of the visualization techniques exist in generating the captured network data into informative graphical 2D or 3D view. However, there are no tools or systems that are able to identify as well as analyses the types of given network data and presents it into the robust and meaningful illustration based on user requirements. This paper explored a new algorithm that would be used to solve the constraints which have been mentioned above. We also presented how the algorithm can facilitate the current visualization methodology. By the end of this, our proposed methodology should be able to analyse different types of network data automatically and effectively.", "fno": "4016a482", "keywords": [ "Network Traffic", "Network Malicious", "Information Visualization", "Automated Visualization Methodology", "Visualization Technique" ], "authors": [ { "affiliation": null, "fullName": "Doris Wong Hooi Ten", "givenName": "Doris Wong Hooi", "surname": "Ten", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sureswaran Ramadass", "givenName": "Sureswaran", "surname": "Ramadass", "__typename": "ArticleAuthorType" } ], "idPrefix": "uksim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "482-484", "year": "2010", "issn": null, "isbn": "978-0-7695-4016-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4016a474", "articleId": "12OmNwDACbX", "__typename": "AdjacentArticleType" }, "next": { "fno": "4016a485", "articleId": "12OmNBdJ5im", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498teoh", "title": "Case Study: Interactive Visualization for Internet Security", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498teoh/12OmNAYXWIv", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cybersecurity/2012/5014/0/5014a016", "title": "Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks", "doi": null, "abstractUrl": "/proceedings-article/cybersecurity/2012/5014a016/12OmNBQ2VYY", "parentPublication": { "id": "proceedings/cybersecurity/2012/5014/0", "title": "International Conference on Cyber Security (CyberSecurity)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300070", "title": "Visualization, Optimization, and Business Strategy: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300070/12OmNBlFQUx", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ems/2009/3886/0/3886a445", "title": "Study on Advanced Visualization Tools In Network Monitoring Platform", "doi": null, "abstractUrl": "/proceedings-article/ems/2009/3886a445/12OmNscOUdD", "parentPublication": { "id": "proceedings/ems/2009/3886/0", "title": "Computer Modeling and Simulation, UKSIM European Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498gresh", "title": "PRIMA: A Case Study of Using Information Visualization Techniques for Patient Record Analysis", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498gresh/12OmNwekjvY", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2001/1342/0/13420153", "title": "Case Study: E-Commerce Clickstream Visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2001/13420153/12OmNxxNbQW", "parentPublication": { "id": "proceedings/ieee-infovis/2001/1342/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2006/0591/0/04035756", "title": "Monitoring Network Traffic with Radial Traffic Analyzer", "doi": null, "abstractUrl": "/proceedings-article/vast/2006/04035756/12OmNz4SOzs", "parentPublication": { "id": "proceedings/vast/2006/0591/0", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1991/2245/0/00175837", "title": "Visualization in computational fluid dynamics: a case study", "doi": null, "abstractUrl": "/proceedings-article/visual/1991/00175837/12OmNzXFoGx", "parentPublication": { "id": "proceedings/visual/1991/2245/0", "title": "1991 Proceeding Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/01/v0059", "title": "Comparing 2D Vector Field Visualization Methods: A User Study", "doi": null, "abstractUrl": "/journal/tg/2005/01/v0059/13rRUxBJhmI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/01/mcg2013010058", "title": "Spectrum-Based Network Visualization for Topology Analysis", "doi": null, "abstractUrl": "/magazine/cg/2013/01/mcg2013010058/13rRUygT7Aq", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqBtiPE", "title": "Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06)", "acronym": "isorc", "groupId": "1000514", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNBhZ4gE", "doi": "10.1109/ISORC.2006.30", "title": "Deterministic \\delta -Connected Overlay for Peer-to-Peer Networks", "normalizedTitle": "Deterministic \\delta -Connected Overlay for Peer-to-Peer Networks", "abstract": "The network connectivity is a basic requirement while implementing fundamental communication and storage abstractions in P2P networks, featuring scalability and faulttolerance. The quality of services of abstractions like for example multicast, publish/subscribe, group membership or persistent storage is strongly related to the connectivity degree of the underlying overlay. Intuitively, a higher overlay connectivity ensures a reinforced reliability and consequently, the deployment of distributed applications with real-time constraints on top of these overlays becomes feasible even in environments characterized by a high dyndynamicity, i.e., nodes arriving and departing at a high rate. Our paper proposes a novel \\delta -connected DHT-free P2P overlay. Our overlay offers strong connectivity guarantees despite the system dynamicity. The construction and the maintenance of our overlay is completely decentralized and handled strictly locally, through deterministic algorithms whose correctness is rigorously proved.", "abstracts": [ { "abstractType": "Regular", "content": "The network connectivity is a basic requirement while implementing fundamental communication and storage abstractions in P2P networks, featuring scalability and faulttolerance. The quality of services of abstractions like for example multicast, publish/subscribe, group membership or persistent storage is strongly related to the connectivity degree of the underlying overlay. Intuitively, a higher overlay connectivity ensures a reinforced reliability and consequently, the deployment of distributed applications with real-time constraints on top of these overlays becomes feasible even in environments characterized by a high dyndynamicity, i.e., nodes arriving and departing at a high rate. Our paper proposes a novel \\delta -connected DHT-free P2P overlay. Our overlay offers strong connectivity guarantees despite the system dynamicity. The construction and the maintenance of our overlay is completely decentralized and handled strictly locally, through deterministic algorithms whose correctness is rigorously proved.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The network connectivity is a basic requirement while implementing fundamental communication and storage abstractions in P2P networks, featuring scalability and faulttolerance. The quality of services of abstractions like for example multicast, publish/subscribe, group membership or persistent storage is strongly related to the connectivity degree of the underlying overlay. Intuitively, a higher overlay connectivity ensures a reinforced reliability and consequently, the deployment of distributed applications with real-time constraints on top of these overlays becomes feasible even in environments characterized by a high dyndynamicity, i.e., nodes arriving and departing at a high rate. Our paper proposes a novel \\delta -connected DHT-free P2P overlay. Our overlay offers strong connectivity guarantees despite the system dynamicity. The construction and the maintenance of our overlay is completely decentralized and handled strictly locally, through deterministic algorithms whose correctness is rigorously proved.", "fno": "25610159", "keywords": [], "authors": [ { "affiliation": "University of Nevada Las Vegas, USA", "fullName": "A. K. Datta", "givenName": "A. K.", "surname": "Datta", "__typename": "ArticleAuthorType" }, { "affiliation": "IRISA, INRIA - Rennes, France", "fullName": "M. Gradinariu", "givenName": "M.", "surname": "Gradinariu", "__typename": "ArticleAuthorType" }, { "affiliation": "Universita di Roma - \"La Sapienza\", Italy", "fullName": "A. Virgillito", "givenName": "A.", "surname": "Virgillito", "__typename": "ArticleAuthorType" } ], "idPrefix": "isorc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-04-01T00:00:00", "pubType": "proceedings", "pages": "159-168", "year": "2006", "issn": null, "isbn": "0-7695-2561-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "25610151", "articleId": "12OmNrMZpEo", "__typename": "AdjacentArticleType" }, "next": { "fno": "25610169", "articleId": "12OmNxRnvVl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdcs/2007/2837/0/28370032", "title": "Scale-Free Overlay Topologies with Hard Cutoffs for Unstructured Peer-to-Peer Networks", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2007/28370032/12OmNAle6nU", "parentPublication": { "id": "proceedings/icdcs/2007/2837/0", "title": "27th International Conference on Distributed Computing Systems (ICDCS '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itnac/2016/0919/0/07878807", "title": "Node allocation in Peer-to-peer overlay networks based remote instrumentation with smart devices", "doi": null, "abstractUrl": "/proceedings-article/itnac/2016/07878807/12OmNB8kHQB", "parentPublication": { "id": "proceedings/itnac/2016/0919/0", "title": "2016 26th International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/3/3336e863", "title": "Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336e863/12OmNBSjITk", "parentPublication": { "id": "proceedings/csse/2008/3336/3", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicic/2008/3161/0/31610210", "title": "D-Overlay: A Delay-Aware Overlay for Gaming Services", "doi": null, "abstractUrl": "/proceedings-article/icicic/2008/31610210/12OmNvSKNI8", "parentPublication": { "id": "proceedings/icicic/2008/3161/0", "title": "Innovative Computing ,Information and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scalcom-embeddedcom/2009/3825/0/3825a183", "title": "A Novel Hierarchical Overlay for Structured Peer-to-Peer Network", "doi": null, "abstractUrl": "/proceedings-article/scalcom-embeddedcom/2009/3825a183/12OmNyQYtei", "parentPublication": { "id": "proceedings/scalcom-embeddedcom/2009/3825/0", "title": "Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftdcs/2004/2118/0/21180312", "title": "Towards an Integrated Architecture for Peer-to-Peer and Ad Hoc Overlay Network Applications", "doi": null, "abstractUrl": "/proceedings-article/ftdcs/2004/21180312/12OmNywxlPQ", "parentPublication": { "id": "proceedings/ftdcs/2004/2118/0", "title": "10th IEEE International Workshop on Future Trends of Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/srds/2002/1659/0/16590347", "title": "Implementing IPv6 as a Peer-to-Peer Overlay Network", "doi": null, "abstractUrl": "/proceedings-article/srds/2002/16590347/12OmNzmLxIH", "parentPublication": { "id": "proceedings/srds/2002/1659/0", "title": "Reliable Distributed Systems, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2005/2421/0/24210764", "title": "An Efficient and Secure Peer-to-Peer Overlay Network", "doi": null, "abstractUrl": "/proceedings-article/lcn/2005/24210764/12OmNzmtWsq", "parentPublication": { "id": "proceedings/lcn/2005/2421/0", "title": "The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2009/05/ttd2009050667", "title": "Limited Scale-Free Overlay Topologies for Unstructured Peer-to-Peer Networks", "doi": null, "abstractUrl": "/journal/td/2009/05/ttd2009050667/13rRUwkfAYQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyfdOIO", "title": "2008 IEEE Symposium on Computers and Communications", "acronym": "iscc", "groupId": "1000156", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNBt3qi2", "doi": "10.1109/ISCC.2008.4625672", "title": "Using Visualization Techniques for SNMP Traffic Analyses", "normalizedTitle": "Using Visualization Techniques for SNMP Traffic Analyses", "abstract": "The network management area is currently dealing with huge amounts of information, which are produced, for example, by large scale and high-speed networks, heterogeneous devices, and monitoring and notification systems. Researchers and network administrators are frequently supported by information visualization techniques in the task of analyzing these large data sets. The simple network management protocol (SNMP) is the de facto standard for TCP/IP networks management. Despite its importance, there are no specific visualizations defined for SNMP traffic traces. In this paper we present a study on techniques for visualizing SNMP trace files, motivated by the fact that general purpose network traffic visualizations available today are not suitable for SNMP observation. Our proposed techniques have been prototyped in a software tool called management traffic analyzer, which has been used to analyze and visualize SNMP traces.", "abstracts": [ { "abstractType": "Regular", "content": "The network management area is currently dealing with huge amounts of information, which are produced, for example, by large scale and high-speed networks, heterogeneous devices, and monitoring and notification systems. Researchers and network administrators are frequently supported by information visualization techniques in the task of analyzing these large data sets. The simple network management protocol (SNMP) is the de facto standard for TCP/IP networks management. Despite its importance, there are no specific visualizations defined for SNMP traffic traces. In this paper we present a study on techniques for visualizing SNMP trace files, motivated by the fact that general purpose network traffic visualizations available today are not suitable for SNMP observation. Our proposed techniques have been prototyped in a software tool called management traffic analyzer, which has been used to analyze and visualize SNMP traces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The network management area is currently dealing with huge amounts of information, which are produced, for example, by large scale and high-speed networks, heterogeneous devices, and monitoring and notification systems. Researchers and network administrators are frequently supported by information visualization techniques in the task of analyzing these large data sets. The simple network management protocol (SNMP) is the de facto standard for TCP/IP networks management. Despite its importance, there are no specific visualizations defined for SNMP traffic traces. In this paper we present a study on techniques for visualizing SNMP trace files, motivated by the fact that general purpose network traffic visualizations available today are not suitable for SNMP observation. Our proposed techniques have been prototyped in a software tool called management traffic analyzer, which has been used to analyze and visualize SNMP traces.", "fno": "04625672", "keywords": [ "Data Visualisation", "Telecommunication Network Management", "Telecommunication Traffic", "Transport Protocols", "Visualization Techniques", "SNMP Traffic Analyses", "Simple Network Management Protocol", "TCP IP Networks Management", "SNMP Trace Files", "Management Traffic Analyzer", "Visualization", "Data Visualization", "Color", "Histograms", "Telecommunication Traffic", "Network Topology", "Monitoring" ], "authors": [ { "affiliation": "Federal University of Rio Grande do Sul, Institute of Informatics, Porto Alegre, RS ç Brazil", "fullName": "Ewerton Monteiro Salvador", "givenName": "Ewerton Monteiro", "surname": "Salvador", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Rio Grande do Sul, Institute of Informatics, Porto Alegre, RS ç Brazil", "fullName": "Lisandro Zambenedetti Granville", "givenName": "Lisandro Zambenedetti", "surname": "Granville", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "806-811", "year": "2008", "issn": "1530-1346", "isbn": "978-1-4244-2702-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04625671", "articleId": "12OmNBZHiiz", "__typename": "AdjacentArticleType" }, "next": { "fno": "04625673", "articleId": "12OmNBuL1iy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2014/3689/0/06799724", "title": "A collaborative solution for SNMP traces visualization", "doi": null, "abstractUrl": "/proceedings-article/icoin/2014/06799724/12OmNBTawqe", "parentPublication": { "id": "proceedings/icoin/2014/3689/0", "title": "2014 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2010/6685/0/05429593", "title": "Graph visualization techniques for conceptual Web site traffic analysis", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2010/05429593/12OmNCgJe5z", "parentPublication": { "id": "proceedings/pacificvis/2010/6685/0", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2011/4492/0/4492a364", "title": "Multiresolution Semantic Visualization of Network Traffic", "doi": null, "abstractUrl": "/proceedings-article/icsc/2011/4492a364/12OmNqGA5dQ", "parentPublication": { "id": "proceedings/icsc/2011/4492/0", "title": "2011 IEEE Fifth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/1994/6680/0/00386580", "title": "Network management's impact on managed networks", "doi": null, "abstractUrl": "/proceedings-article/lcn/1994/00386580/12OmNqzcvIA", "parentPublication": { "id": "proceedings/lcn/1994/6680/0", "title": "Proceedings of 19th Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/2001/7016/1/00916739", "title": "Admission control schemes for bursty multimedia traffic", "doi": null, "abstractUrl": "/proceedings-article/infcom/2001/00916739/12OmNy6HQST", "parentPublication": { "id": "proceedings/infcom/2001/7016/1", "title": "Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infocom/1996/7292/0/72920473", "title": "Techniques for automated Network Map Generation using SNMP", "doi": null, "abstractUrl": "/proceedings-article/infocom/1996/72920473/12OmNyVes57", "parentPublication": { "id": "proceedings/infocom/1996/7292/0", "title": "IEEE Computer and Communications Societies, Annual Joint Conference of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2015/8657/0/8657a188", "title": "Interactive Visualization of Netflow Traffic", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a188/12OmNzRZpX3", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2009/3728/0/3728a434", "title": "The Design and Implementation of Multifunction Probe Based on SNMP", "doi": null, "abstractUrl": "/proceedings-article/case/2009/3728a434/12OmNzcxZfx", "parentPublication": { "id": "proceedings/case/2009/3728/0", "title": "2009 IITA International Conference on Control, Automation and Systems Engineering, CASE 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsm/2019/24/0/09012669", "title": "Deep Learning Models For Aggregated Network Traffic Prediction", "doi": null, "abstractUrl": "/proceedings-article/cnsm/2019/09012669/1hQqZloibGo", "parentPublication": { "id": "proceedings/cnsm/2019/24/0", "title": "2019 15th International Conference on Network and Service Management (CNSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2005/2421/0/01550850", "title": "On the feasibility of utilizing correlations between user populations for traffic inference", "doi": null, "abstractUrl": "/proceedings-article/lcn/2005/01550850/1hVjttCIhaM", "parentPublication": { "id": "proceedings/lcn/2005/2421/0", "title": "The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwvVrMO", "title": "Security Technology, International Conference on", "acronym": "sectech", "groupId": "1002595", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNxxvAGm", "doi": "10.1109/SecTech.2008.47", "title": "A Novel Visualization Approach for Efficient Network Scans Detection", "normalizedTitle": "A Novel Visualization Approach for Efficient Network Scans Detection", "abstract": "Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc. In this paper a visual interactive network scans detection system called ScanViewer is designed to represent traffic activities that reside in network flows and their patterns. The ScanViewer combines the characteristics of network scan with novel visual structures, and utilizes a set of different visual concepts to map the collected datagram to the graphs that emphasize their patterns. Additionally, a new tool named Local port is designed for to capture large-scale ports information. The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.", "abstracts": [ { "abstractType": "Regular", "content": "Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc. In this paper a visual interactive network scans detection system called ScanViewer is designed to represent traffic activities that reside in network flows and their patterns. The ScanViewer combines the characteristics of network scan with novel visual structures, and utilizes a set of different visual concepts to map the collected datagram to the graphs that emphasize their patterns. Additionally, a new tool named Local port is designed for to capture large-scale ports information. The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc. In this paper a visual interactive network scans detection system called ScanViewer is designed to represent traffic activities that reside in network flows and their patterns. The ScanViewer combines the characteristics of network scan with novel visual structures, and utilizes a set of different visual concepts to map the collected datagram to the graphs that emphasize their patterns. Additionally, a new tool named Local port is designed for to capture large-scale ports information. The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.", "fno": "3486a023", "keywords": [ "Network Security", "Information Visualization", "Network Scan" ], "authors": [ { "affiliation": null, "fullName": "Zhang Jiawan", "givenName": "Zhang", "surname": "Jiawan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li Liang", "givenName": "Li", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lu Liangfu", "givenName": "Lu", "surname": "Liangfu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhou Ning", "givenName": "Zhou", "surname": "Ning", "__typename": "ArticleAuthorType" } ], "idPrefix": "sectech", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "23-26", "year": "2008", "issn": null, "isbn": "978-0-7695-3486-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3486a017", "articleId": "12OmNzd7bSP", "__typename": "AdjacentArticleType" }, "next": { "fno": "3486a027", "articleId": "12OmNxdm4wi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498teoh", "title": "Case Study: Interactive Visualization for Internet Security", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498teoh/12OmNAYXWIv", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2005/9477/0/01532063", "title": "A visualization methodology for characterization of network scans", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2005/01532063/12OmNBd9T40", "parentPublication": { "id": "proceedings/vizsec/2005/9477/0", "title": "IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3pgcic/2015/9473/0/9473a584", "title": "Analysis of Techniques for Visualizing Security Risks and Threats", "doi": null, "abstractUrl": "/proceedings-article/3pgcic/2015/9473a584/12OmNBhHt5P", "parentPublication": { "id": "proceedings/3pgcic/2015/9473/0", "title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a227", "title": "Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a227/12OmNCxbXAF", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2008/3095/0/3095a771", "title": "Automated Classification of Port-Scans from Distributed Sensors", "doi": null, "abstractUrl": "/proceedings-article/aina/2008/3095a771/12OmNvAiSxK", "parentPublication": { "id": "proceedings/aina/2008/3095/0", "title": "22nd International Conference on Advanced Information Networking and Applications (aina 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nswctc/2009/3610/1/3610a434", "title": "NetViewer: A Visualization Tool for Network Security Events", "doi": null, "abstractUrl": "/proceedings-article/nswctc/2009/3610a434/12OmNwE9OD4", "parentPublication": { "id": "proceedings/nswctc/2009/3610/1", "title": "Networks Security, Wireless Communications and Trusted Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2009/3596/0/3596a016", "title": "A Novel Approach to Scan Detection on the Backbone", "doi": null, "abstractUrl": "/proceedings-article/itng/2009/3596a016/12OmNzICERk", "parentPublication": { "id": "proceedings/itng/2009/3596/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061515", "title": "Multimodal Vessel Visualization of Mouse Aorta PET/CT Scans", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061515/13rRUxAAT0K", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/08/06007132", "title": "A Survey of Visualization Systems for Network Security", "doi": null, "abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/06/08617765", "title": "A Novel Radial Visualization of Intrusion Detection Alerts", "doi": null, "abstractUrl": "/magazine/cg/2018/06/08617765/17D45Vw15tt", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuIjeX", "title": "The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l", "acronym": "lcn", "groupId": "1000419", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNyKa5Zg", "doi": "10.1109/LCN.2005.146", "title": "Resilience Provisioning in Provider-Based Overlay Networks", "normalizedTitle": "Resilience Provisioning in Provider-Based Overlay Networks", "abstract": "Guaranteed levels of network resilience are essential for many emerging and future Internet services. Currently, the only network model that can support stringent resilience requirements is a provider-based overlay network. In such an environment, resilience can be implemented either in the overlay networks or in the physical network. In this paper we look at how the network provider revenue is affected by where resilience is implemented. The idea is to measure the revenue in the two implementation scenarios and compare the generated revenues to find out if the network provider has something to gain by implementing resilience in the physical network and if so under what circmstances. The results of our linear programming based experiments show that network providers can potentially double its revenue when resilience is implemented in the physical network. The customers benefit as well since the overlay networks are significantly less complex and can be built at the same or lower cost than when resilience is implemented in the overlay networks.", "abstracts": [ { "abstractType": "Regular", "content": "Guaranteed levels of network resilience are essential for many emerging and future Internet services. Currently, the only network model that can support stringent resilience requirements is a provider-based overlay network. In such an environment, resilience can be implemented either in the overlay networks or in the physical network. In this paper we look at how the network provider revenue is affected by where resilience is implemented. The idea is to measure the revenue in the two implementation scenarios and compare the generated revenues to find out if the network provider has something to gain by implementing resilience in the physical network and if so under what circmstances. The results of our linear programming based experiments show that network providers can potentially double its revenue when resilience is implemented in the physical network. The customers benefit as well since the overlay networks are significantly less complex and can be built at the same or lower cost than when resilience is implemented in the overlay networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Guaranteed levels of network resilience are essential for many emerging and future Internet services. Currently, the only network model that can support stringent resilience requirements is a provider-based overlay network. In such an environment, resilience can be implemented either in the overlay networks or in the physical network. In this paper we look at how the network provider revenue is affected by where resilience is implemented. The idea is to measure the revenue in the two implementation scenarios and compare the generated revenues to find out if the network provider has something to gain by implementing resilience in the physical network and if so under what circmstances. The results of our linear programming based experiments show that network providers can potentially double its revenue when resilience is implemented in the physical network. The customers benefit as well since the overlay networks are significantly less complex and can be built at the same or lower cost than when resilience is implemented in the overlay networks.", "fno": "24210427", "keywords": [ "Overlay Network", "Resilience", "Online Routing", "Traffic Engineering" ], "authors": [ { "affiliation": "University of New South Wales, Australia", "fullName": "Gustav Rosenbaum", "givenName": "Gustav", "surname": "Rosenbaum", "__typename": "ArticleAuthorType" }, { "affiliation": "University of New South Wales, Australia", "fullName": "Sanjay Jha", "givenName": "Sanjay", "surname": "Jha", "__typename": "ArticleAuthorType" } ], "idPrefix": "lcn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-11-01T00:00:00", "pubType": "proceedings", "pages": "427-432", "year": "2005", "issn": "0742-1303", "isbn": "0-7695-2421-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24210418", "articleId": "12OmNyxFKcC", "__typename": "AdjacentArticleType" }, "next": { "fno": "24210433", "articleId": "12OmNC8dgdE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sasow/2008/3553/0/3553a214", "title": "Small World Networks as (Semi)-Structured Overlay Networks", "doi": null, "abstractUrl": "/proceedings-article/sasow/2008/3553a214/12OmNCmpcSg", "parentPublication": { "id": "proceedings/sasow/2008/3553/0", "title": "Self-Adaptive and Self-Organizing Systems Workshops, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/srds/2003/1955/0/19550047", "title": "Network Awareness and Failure Resilience in Self-Organising Overlay Networks", "doi": null, "abstractUrl": "/proceedings-article/srds/2003/19550047/12OmNCxtyLb", "parentPublication": { "id": "proceedings/srds/2003/1955/0", "title": "Reliable Distributed Systems, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2010/9992/0/05711719", "title": "Computer networks resilience challenges: Routing protocols", "doi": null, "abstractUrl": "/proceedings-article/isspit/2010/05711719/12OmNqFrGxI", "parentPublication": { "id": "proceedings/isspit/2010/9992/0", "title": "2010 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2017/1792/0/1792c581", "title": "Evaluating Connection Resilience for the Overlay Network Kademlia", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792c581/12OmNqOwQGp", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2014/4277/0/06912489", "title": "A self-managed resilient overlay network for interactive multimedia communications", "doi": null, "abstractUrl": "/proceedings-article/iscc/2014/06912489/12OmNrNh0LF", "parentPublication": { "id": "proceedings/iscc/2014/4277/0", "title": "2014 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2010/3967/0/3967b117", "title": "Resilience and Multicast Aspects of the Structured Network Overlay GP3", "doi": null, "abstractUrl": "/proceedings-article/cisis/2010/3967b117/12OmNviZli5", "parentPublication": { "id": "proceedings/cisis/2010/3967/0", "title": "2010 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2010/4360/0/4360a259", "title": "Multihomed Multicasting by Overlay Proxies", "doi": null, "abstractUrl": "/proceedings-article/isise/2010/4360a259/12OmNxbEtLe", "parentPublication": { "id": "proceedings/isise/2010/4360/0", "title": "2010 Third International Symposium on Information Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2017/1792/0/1792b771", "title": "Structured Overlay Networks for a New Generation of Internet Services", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2017/1792b771/12OmNzlD9e0", "parentPublication": { "id": "proceedings/icdcs/2017/1792/0", "title": "2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2009/3613/0/3613a058", "title": "QoSMap: Achieving Quality and Resilience through Overlay Construction", "doi": null, "abstractUrl": "/proceedings-article/iciw/2009/3613a058/12OmNzlD9ud", "parentPublication": { "id": "proceedings/iciw/2009/3613/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2020/5809/0/580900a540", "title": "Service-Based Resilience for Embedded IoT Networks", "doi": null, "abstractUrl": "/proceedings-article/dsn/2020/580900a540/1lUFilWwU4E", "parentPublication": { "id": "proceedings/dsn/2020/5809/0", "title": "2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwp74rg", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzRZpX3", "doi": "10.1109/EISIC.2015.51", "title": "Interactive Visualization of Netflow Traffic", "normalizedTitle": "Interactive Visualization of Netflow Traffic", "abstract": "We introduce a novel tool for visualizing netflow traffic on enterprise networks called 3D Parallel Coordinate Planes (3DPCP). This tool provides operators with the ability to manipulate the visual flow of network traffic information by arranging two-dimensional planes along a vertical time axis in 3D space.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a novel tool for visualizing netflow traffic on enterprise networks called 3D Parallel Coordinate Planes (3DPCP). This tool provides operators with the ability to manipulate the visual flow of network traffic information by arranging two-dimensional planes along a vertical time axis in 3D space.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a novel tool for visualizing netflow traffic on enterprise networks called 3D Parallel Coordinate Planes (3DPCP). This tool provides operators with the ability to manipulate the visual flow of network traffic information by arranging two-dimensional planes along a vertical time axis in 3D space.", "fno": "8657a188", "keywords": [ "Three Dimensional Displays", "Visualization", "Decision Trees", "Europe", "Security", "Informatics", "Telecommunication Traffic", "Mission", "Parallel Coordinate", "3 D Visualization" ], "authors": [ { "affiliation": null, "fullName": "Thomas C. Eskridge", "givenName": "Thomas C.", "surname": "Eskridge", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marco Carvalho", "givenName": "Marco", "surname": "Carvalho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fitzroy Nembhard", "givenName": "Fitzroy", "surname": "Nembhard", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hari Thotempudi", "givenName": "Hari", "surname": "Thotempudi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Peter J. Polack", "givenName": "Peter J.", "surname": "Polack", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "188-188", "year": "2015", "issn": null, "isbn": "978-1-4799-8657-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8657a187", "articleId": "12OmNAXglRM", "__typename": "AdjacentArticleType" }, "next": { "fno": "8657a189", "articleId": "12OmNBqv2nn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscc/2008/2702/0/04625672", "title": "Using Visualization Techniques for SNMP Traffic Analyses", "doi": null, "abstractUrl": "/proceedings-article/iscc/2008/04625672/12OmNBt3qi2", "parentPublication": { "id": "proceedings/iscc/2008/2702/0", "title": "2008 IEEE Symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfcc/2009/3591/0/3591a700", "title": "P2P Traffic Identification Based on NetFlow TCP Flag", "doi": null, "abstractUrl": "/proceedings-article/icfcc/2009/3591a700/12OmNrYCXKk", "parentPublication": { "id": "proceedings/icfcc/2009/3591/0", "title": "2009 International Conference on Future Computer and Communication (ICFCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2010/4212/1/4212b006", "title": "Next Generation Internet Traffic Monitoring System Based on NetFlow", "doi": null, "abstractUrl": "/proceedings-article/isdea/2010/4212b006/12OmNscxj3A", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ivs/2005/8961/0/01505192", "title": "An enhanced traffic simulation system for interactive traffic environment", "doi": null, "abstractUrl": "/proceedings-article/ivs/2005/01505192/12OmNxEjXPc", "parentPublication": { "id": "proceedings/ivs/2005/8961/0", "title": "2005 IEEE Intelligent Vehicles Symposium Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2009/3858/0/05368793", "title": "Netpy: Advanced Network Traffic Monitoring", "doi": null, "abstractUrl": "/proceedings-article/incos/2009/05368793/12OmNxGALhw", "parentPublication": { "id": "proceedings/incos/2009/3858/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024622", "title": "CEFF: An efficient approach for traffic anomaly detection and classification", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024622/12OmNyYDDAS", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2005/8963/0/01452059", "title": "WNN-based NGN traffic prediction", "doi": null, "abstractUrl": "/proceedings-article/isads/2005/01452059/12OmNzcxZjc", "parentPublication": { "id": "proceedings/isads/2005/8963/0", "title": "Proceedings. ISADS 2005. 2005 International Symposium on Autonomous Decentralized Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2018/8303/0/08648777", "title": "A Design and Implementation of Network Billing System on Campus Based on Hadoop and Netflow", "doi": null, "abstractUrl": "/proceedings-article/nana/2018/08648777/181W9py1h2b", "parentPublication": { "id": "proceedings/nana/2018/8303/0", "title": "2018 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b069", "title": "Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b069/1BBz7h4eRC8", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000b474", "title": "Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network Traffic", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000b474/1FJ5Ma8umR2", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyNQSGW", "title": "2008 IEEE Congress on Services - Part I", "acronym": "services", "groupId": "1800492", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzvhvLD", "doi": "10.1109/SERVICES-1.2008.47", "title": "Pipe Network 3D Visualization Service Architecture", "normalizedTitle": "Pipe Network 3D Visualization Service Architecture", "abstract": "The visualization of pipe network has become one of the essential characteristics of urban pipe network management system. But for the distribution of related resources (e.g., data storage, modeling platform, etc.) and complex structure, the design and implementation of a pipe network visualization application is always a challenge. This contribution presents a service view in design and deployment phase to cope with the questions mentioned above, which takes separate resources as individual services and then make an integration to present Pipe network 3D visualization service architecture with those services. With this architecture, service providers will be able to assemble a pipe network 3D visualization service that serves the needs of a company (or authority) responsible for some particular underground pipe network systems. This paper presents the pipe network visualization service architecture and a developed pipe network visualization service prototype.", "abstracts": [ { "abstractType": "Regular", "content": "The visualization of pipe network has become one of the essential characteristics of urban pipe network management system. But for the distribution of related resources (e.g., data storage, modeling platform, etc.) and complex structure, the design and implementation of a pipe network visualization application is always a challenge. This contribution presents a service view in design and deployment phase to cope with the questions mentioned above, which takes separate resources as individual services and then make an integration to present Pipe network 3D visualization service architecture with those services. With this architecture, service providers will be able to assemble a pipe network 3D visualization service that serves the needs of a company (or authority) responsible for some particular underground pipe network systems. This paper presents the pipe network visualization service architecture and a developed pipe network visualization service prototype.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The visualization of pipe network has become one of the essential characteristics of urban pipe network management system. But for the distribution of related resources (e.g., data storage, modeling platform, etc.) and complex structure, the design and implementation of a pipe network visualization application is always a challenge. This contribution presents a service view in design and deployment phase to cope with the questions mentioned above, which takes separate resources as individual services and then make an integration to present Pipe network 3D visualization service architecture with those services. With this architecture, service providers will be able to assemble a pipe network 3D visualization service that serves the needs of a company (or authority) responsible for some particular underground pipe network systems. This paper presents the pipe network visualization service architecture and a developed pipe network visualization service prototype.", "fno": "3286a495", "keywords": [ "Pipe Network", "3 D Visualization", "Service", "GIS", "Pipe Network 3 D Visualization Service Architecture", "Service Architecture", "Java 3 D" ], "authors": [ { "affiliation": null, "fullName": "Liutong Xu", "givenName": "Liutong", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guanhui Geng", "givenName": "Guanhui", "surname": "Geng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Min Shi", "givenName": "Min", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Suping Lin", "givenName": "Suping", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "services", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "495-502", "year": "2008", "issn": null, "isbn": "978-0-7695-3286-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3286a487", "articleId": "12OmNxveNNJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3286a503", "articleId": "12OmNqI04Rz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ifita/2009/3600/1/3600a098", "title": "Spatial Data Model for Visualization System of GIS Based Urban Pipe Network", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600a098/12OmNAndimX", "parentPublication": { "id": "proceedings/ifita/2009/3600/3", "title": "Information Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/3/4296e063", "title": "Research on Quantitative Identification of Pipe Crack Based on Vibration", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296e063/12OmNBfZSma", "parentPublication": { "id": "proceedings/icmtma/2011/4296/3", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2009/3600/1/3600a131", "title": "Thematic Maps Service for GIS Based Urban Pipe Network Visualization System", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600a131/12OmNCzsKHw", "parentPublication": { "id": "proceedings/ifita/2009/3600/3", "title": "Information Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a561", "title": "Service Oriented Architecture for Data Visualization in Smart Devices", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a561/12OmNqIQSaq", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2009/3595/0/3595a483", "title": "Online 3D Terrain Visualization: A Comparison of Three Different GIS Software", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a483/12OmNrkBwq3", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2011/4523/2/4523b522", "title": "A PIPE Based System for Checking Temporal Constraints in Service Composition", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523b522/12OmNwLOYUe", "parentPublication": { "id": "proceedings/iciii/2011/4523/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2012/4855/0/4855a017", "title": "Applications and Solutions of Virtual Marine Environment Spatio-Temporal Visualization Service", "doi": null, "abstractUrl": "/proceedings-article/icinis/2012/4855a017/12OmNwNeYBk", "parentPublication": { "id": "proceedings/icinis/2012/4855/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdciem/2011/4350/0/4350a881", "title": "Influence of Sewage Pipe Network on COD Reduction Efficiency in Sewage Treatment Plant", "doi": null, "abstractUrl": "/proceedings-article/cdciem/2011/4350a881/12OmNy5zsqF", "parentPublication": { "id": "proceedings/cdciem/2011/4350/0", "title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2014/6636/0/6636a936", "title": "City Pipe Network Intelligent Service Based on GIS and Internet of Things", "doi": null, "abstractUrl": "/proceedings-article/icicta/2014/6636a936/12OmNynJMOo", "parentPublication": { "id": "proceedings/icicta/2014/6636/0", "title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2009/3600/1/3600a342", "title": "A Service Stack for 3D Visualization of GIS Based Urban Pipe Network", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600a342/12OmNyrqzyQ", "parentPublication": { "id": "proceedings/ifita/2009/3600/3", "title": "Information Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1IbQpotibKM", "title": "2022 IEEE Symposium on Visualization for Cyber Security (VizSec)", "acronym": "vizsec", "groupId": "9941351", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1IbQpEa3wvS", "doi": "10.1109/VizSec56996.2022.9941388", "title": "Portola: A Hybrid Tree and Network Visualization Technique for Network Segmentation", "normalizedTitle": "Portola: A Hybrid Tree and Network Visualization Technique for Network Segmentation", "abstract": "Network security is critical for organizations to secure their network resources from intrusion and attacks. A security policy is a rule enforced in the network to allow or block network traffic. To write security policies, network analysts divide their networks into segments or parts with similar security needs. Segmentation makes writing security policies manageable and identifies robust security policies for the network. Visualizations can help analysts to understand the segmented network and define security policies. We contribute Portola, a hybrid tree and network visualization technique to display a segmented computer network. Portola presents an overview of the segmentation as a hierarchy and displays connections within the network. Using Portola, analysts can explore a segmented network, identify nodes and connections of interest through exploratory network analysis, and drill down on elements of interest to reason about the patterns of relationships in the network. Through this work, we also discuss the goals of network analysts who work with segmented networks and discuss the lessons learned from the user-centered iterative design of Portola.", "abstracts": [ { "abstractType": "Regular", "content": "Network security is critical for organizations to secure their network resources from intrusion and attacks. A security policy is a rule enforced in the network to allow or block network traffic. To write security policies, network analysts divide their networks into segments or parts with similar security needs. Segmentation makes writing security policies manageable and identifies robust security policies for the network. Visualizations can help analysts to understand the segmented network and define security policies. We contribute Portola, a hybrid tree and network visualization technique to display a segmented computer network. Portola presents an overview of the segmentation as a hierarchy and displays connections within the network. Using Portola, analysts can explore a segmented network, identify nodes and connections of interest through exploratory network analysis, and drill down on elements of interest to reason about the patterns of relationships in the network. Through this work, we also discuss the goals of network analysts who work with segmented networks and discuss the lessons learned from the user-centered iterative design of Portola.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Network security is critical for organizations to secure their network resources from intrusion and attacks. A security policy is a rule enforced in the network to allow or block network traffic. To write security policies, network analysts divide their networks into segments or parts with similar security needs. Segmentation makes writing security policies manageable and identifies robust security policies for the network. Visualizations can help analysts to understand the segmented network and define security policies. We contribute Portola, a hybrid tree and network visualization technique to display a segmented computer network. Portola presents an overview of the segmentation as a hierarchy and displays connections within the network. Using Portola, analysts can explore a segmented network, identify nodes and connections of interest through exploratory network analysis, and drill down on elements of interest to reason about the patterns of relationships in the network. Through this work, we also discuss the goals of network analysts who work with segmented networks and discuss the lessons learned from the user-centered iterative design of Portola.", "fno": "09941388", "keywords": [ "Computer Displays", "Computer Network Security", "Data Visualisation", "Network Theory Graphs", "Telecommunication Traffic", "User Centered Iterative Design", "Network Visualization Technique", "Computer Network Segmentation", "Robust Security Policies", "Network Traffic", "Security Policy", "Network Resources", "Network Security", "Network Segmentation", "Hybrid Tree", "Network Analysts", "Exploratory Network Analysis", "Portola", "Visualization", "Telecommunication Traffic", "Organizations", "Network Analyzers", "Writing", "Network Security", "Computer Networks", "Human Centered Computing", "Visualization", "Visualization Techniques", "Trees Networks" ], "authors": [ { "affiliation": "Illumio", "fullName": "Kuhu Gupta", "givenName": "Kuhu", "surname": "Gupta", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University", "fullName": "Aditeya Pandey", "givenName": "Aditeya", "surname": "Pandey", "__typename": "ArticleAuthorType" }, { "affiliation": "Illumio", "fullName": "Larry Chan", "givenName": "Larry", "surname": "Chan", "__typename": "ArticleAuthorType" }, { "affiliation": "Illumio", "fullName": "Ambika Yadav", "givenName": "Ambika", "surname": "Yadav", "__typename": "ArticleAuthorType" }, { "affiliation": "Illumio", "fullName": "Brian Staats", "givenName": "Brian", "surname": "Staats", "__typename": "ArticleAuthorType" }, { "affiliation": "Illumio", "fullName": "Michelle A. Borkin", "givenName": "Michelle A.", "surname": "Borkin", "__typename": "ArticleAuthorType" } ], "idPrefix": "vizsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2022", "issn": null, "isbn": "978-1-6654-6148-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09941392", "articleId": "1IbQqcnzuG4", "__typename": "AdjacentArticleType" }, "next": { "fno": "09941431", "articleId": "1IbQqItnAuk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a151", "title": "An Information Visualization Tool with Multiple Coordinated Views for Network Traffic Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a151/12OmNBKEyuH", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2015/7599/0/07312766", "title": "Ensemble visualization for cyber situation awareness of network security data", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2015/07312766/12OmNC4eSCa", "parentPublication": { "id": "proceedings/vizsec/2015/7599/0", "title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2011/2135/0/06120855", "title": "CNSSA: A Comprehensive Network Security Situation Awareness System", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2011/06120855/12OmNwe2Iou", "parentPublication": { "id": "proceedings/trustcom/2011/2135/0", "title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706b832", "title": "The Network Security Regime for the Hybrid Connection of Healthcare Entities", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706b832/12OmNwwd2Rk", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imitec/2021/1749/0/09714593", "title": "Packet Forensic Analysis in Intrusion Detection Systems", "doi": null, "abstractUrl": "/proceedings-article/imitec/2021/09714593/1BaZLM1MtIk", "parentPublication": { "id": "proceedings/imitec/2021/1749/0", "title": "2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2021/1732/0/173200a305", "title": "Security Assessment of Enterprise Networks Based on Analytic Network Process and Evidence Theory", "doi": null, "abstractUrl": "/proceedings-article/aiam/2021/173200a305/1BzTIw2Yvfy", "parentPublication": { "id": "proceedings/aiam/2021/1732/0", "title": "2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903291", "title": "Understanding Barriers to Network Exploration with Visualization: A Report from the Trenches", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903291/1GZojtBEfvi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2022/8018/0/09894328", "title": "APEX: Characterizing Attack Behaviors from Network Anomalies", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2022/09894328/1HpCwEad2fu", "parentPublication": { "id": "proceedings/ipccc/2022/8018/0", "title": "2022 IEEE International Performance, Computing, and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068720", "title": "Visualization of Influential Blog Networks Using BlogTracker", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068720/1LKx2CvMbK0", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiea/2021/3265/0/326500a308", "title": "An analysis of Network Traffic Identification based on Decision Tree", "doi": null, "abstractUrl": "/proceedings-article/aiea/2021/326500a308/1wzsDTUv3LG", "parentPublication": { "id": "proceedings/aiea/2021/3265/0", "title": "2021 International Conference on Artificial Intelligence and Electromechanical Automation (AIEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa77", "title": "Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)", "acronym": "compsac", "groupId": "1000143", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNA0dMRh", "doi": "10.1109/CMPSAC.1997.624696", "title": "The Architectural Style of Component Programming", "normalizedTitle": "The Architectural Style of Component Programming", "abstract": "Component programming is a multiparadigm approach to software construction based on highly generic components. Because component programming is concerned with source code components, it is assumed by many to be a low-level approach to software development that affects only the development of source code libraries. On the contrary, this paper shows that the concepts of component programming go beyond library and source code issues, but define a new conceptual attempt to software development with generic components. We show that component programming is an architectural style that supports the building of classes of software architectures in a specific domain. Component programming can be applied in the early stages of software development when architectural issues are to be determined. All the benefits of using an architectural style, therefore, can also be gained by using component programming: it guides the engineer in the problem decomposition towards design and implementation of a system. The paper presents the architectural style of component programming and the insights we gained about component programming as we tried to define it as an architectural style.", "abstracts": [ { "abstractType": "Regular", "content": "Component programming is a multiparadigm approach to software construction based on highly generic components. Because component programming is concerned with source code components, it is assumed by many to be a low-level approach to software development that affects only the development of source code libraries. On the contrary, this paper shows that the concepts of component programming go beyond library and source code issues, but define a new conceptual attempt to software development with generic components. We show that component programming is an architectural style that supports the building of classes of software architectures in a specific domain. Component programming can be applied in the early stages of software development when architectural issues are to be determined. All the benefits of using an architectural style, therefore, can also be gained by using component programming: it guides the engineer in the problem decomposition towards design and implementation of a system. The paper presents the architectural style of component programming and the insights we gained about component programming as we tried to define it as an architectural style.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Component programming is a multiparadigm approach to software construction based on highly generic components. Because component programming is concerned with source code components, it is assumed by many to be a low-level approach to software development that affects only the development of source code libraries. On the contrary, this paper shows that the concepts of component programming go beyond library and source code issues, but define a new conceptual attempt to software development with generic components. We show that component programming is an architectural style that supports the building of classes of software architectures in a specific domain. Component programming can be applied in the early stages of software development when architectural issues are to be determined. All the benefits of using an architectural style, therefore, can also be gained by using component programming: it guides the engineer in the problem decomposition towards design and implementation of a system. The paper presents the architectural style of component programming and the insights we gained about component programming as we tried to define it as an architectural style.", "fno": "81050018", "keywords": [ "Component Programming", "Architectural Style", "Genericity", "Standard Template Library" ], "authors": [ { "affiliation": "Technical University of Vienna", "fullName": "Harald Gall", "givenName": "Harald", "surname": "Gall", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Vienna", "fullName": "Mehdi Jazayeri", "givenName": "Mehdi", "surname": "Jazayeri", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Vienna", "fullName": "Rene Kloesch", "givenName": "Rene", "surname": "Kloesch", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Vienna", "fullName": "Georg Trausmuth", "givenName": "Georg", "surname": "Trausmuth", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-08-01T00:00:00", "pubType": "proceedings", "pages": "18", "year": "1997", "issn": "0730-3157", "isbn": "0-8186-8105-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "81050014", "articleId": "12OmNyS6RIH", "__typename": "AdjacentArticleType" }, "next": { "fno": "81050678", "articleId": "12OmNrY3Lrc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwt5sgJ", "title": "CVPR 2011", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNB7LvH3", "doi": "10.1109/CVPR.2011.5995661", "title": "Style transfer matrix learning for writer adaptation", "normalizedTitle": "Style transfer matrix learning for writer adaptation", "abstract": "In this paper, we propose a novel framework of style transfer matrix (STM) learning to reduce the writing style variation in handwriting recognition. After writer-specific style transfer learning, the data of different writers is projected onto a style-free space, where a writer independent classifier can yield high accuracy. We combine STM learning with a specific nearest prototype classifier: learning vector quantization (LVQ) with discriminative feature extraction (DFE), where both the prototypes and the subspace transformation matrix are learned via online discriminative learning. To adapt the basic classifier (trained with writer-independent data) to particular writers, we first propose two supervised models, one based on incremental learning and the other based on supervised STM learning. To overcome the lack of labeled samples for particular writers, we propose an unsupervised model to learn the STM using the self-taught strategy (also known as self-training). Experiments on a large-scale Chinese online handwriting database demonstrate that STM learning can reduce recognition errors significantly, and the unsupervised adaptation model performs even better than the supervised models.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a novel framework of style transfer matrix (STM) learning to reduce the writing style variation in handwriting recognition. After writer-specific style transfer learning, the data of different writers is projected onto a style-free space, where a writer independent classifier can yield high accuracy. We combine STM learning with a specific nearest prototype classifier: learning vector quantization (LVQ) with discriminative feature extraction (DFE), where both the prototypes and the subspace transformation matrix are learned via online discriminative learning. To adapt the basic classifier (trained with writer-independent data) to particular writers, we first propose two supervised models, one based on incremental learning and the other based on supervised STM learning. To overcome the lack of labeled samples for particular writers, we propose an unsupervised model to learn the STM using the self-taught strategy (also known as self-training). Experiments on a large-scale Chinese online handwriting database demonstrate that STM learning can reduce recognition errors significantly, and the unsupervised adaptation model performs even better than the supervised models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a novel framework of style transfer matrix (STM) learning to reduce the writing style variation in handwriting recognition. After writer-specific style transfer learning, the data of different writers is projected onto a style-free space, where a writer independent classifier can yield high accuracy. We combine STM learning with a specific nearest prototype classifier: learning vector quantization (LVQ) with discriminative feature extraction (DFE), where both the prototypes and the subspace transformation matrix are learned via online discriminative learning. To adapt the basic classifier (trained with writer-independent data) to particular writers, we first propose two supervised models, one based on incremental learning and the other based on supervised STM learning. To overcome the lack of labeled samples for particular writers, we propose an unsupervised model to learn the STM using the self-taught strategy (also known as self-training). Experiments on a large-scale Chinese online handwriting database demonstrate that STM learning can reduce recognition errors significantly, and the unsupervised adaptation model performs even better than the supervised models.", "fno": "05995661", "keywords": [ "Unsupervised Adaptation Model", "Writer Adaptation", "Style Transfer Matrix Learning", "Writing Style Variation", "Handwriting Recognition", "Writer Specific Style Transfer Learning", "Style Free Space", "Writer Independent Classifier", "Nearest Prototype Classifier", "Learning Vector Quantization", "Discriminative Feature Extraction", "Subspace Transformation Matrix", "Online Discriminative Learning", "Incremental Learning", "Supervised STM Learning Classifier", "Self Taught Strategy", "Self Training", "Large Scale Chinese Online Handwriting Database", "Error Recognition" ], "authors": [ { "affiliation": "Nat. Lab. of Pattern Recognition (NLPR), Chinese Acad. of Sci., Beijing, China", "fullName": "Xu-Yao Zhang", "givenName": null, "surname": "Xu-Yao Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nat. Lab. of Pattern Recognition (NLPR), Chinese Acad. of Sci., Beijing, China", "fullName": "Cheng-Lin Liu", "givenName": null, "surname": "Cheng-Lin Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-06-01T00:00:00", "pubType": "proceedings", "pages": "393-400", "year": "2011", "issn": null, "isbn": "978-1-4577-0394-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05995660", "articleId": "12OmNzd7bEv", "__typename": "AdjacentArticleType" }, "next": { "fno": "05995662", "articleId": "12OmNC3XhuA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2009/3725/0/3725a056", "title": "Impact of Alphabet Knowledge on Online Writer Identification", "doi": null, "abstractUrl": "/proceedings-article/icdar/2009/3725a056/12OmNBQkx4c", "parentPublication": { "id": "proceedings/icdar/2009/3725/0", "title": "2009 10th International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a145", "title": "Writer Retrieval and Writer Identification Using Local Features", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a145/12OmNqJHFAH", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a998", "title": "Handwriting Style Mixture Adaptation", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a998/12OmNwdtwdx", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a739", "title": "OCR-Driven Writer Identification and Adaptation in an HMM Handwriting Recognition System", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a739/12OmNx6PiD2", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwfhr/2004/2187/0/21870167", "title": "Using HMM Based Recognizers for Writer Identification and Verification", "doi": null, "abstractUrl": "/proceedings-article/iwfhr/2004/21870167/12OmNxYtu9j", "parentPublication": { "id": "proceedings/iwfhr/2004/2187/0", "title": "Proceedings. Ninth International Workshop on Frontiers in Handwriting Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2005/2420/0/24200600", "title": "Writer Profiling Using Handwriting Copybook Styles", "doi": null, "abstractUrl": "/proceedings-article/icdar/2005/24200600/12OmNzb7Zvk", "parentPublication": { "id": "proceedings/icdar/2005/2420/0", "title": "Eighth International Conference on Document Analysis and Recognition (ICDAR'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2007/3124/0/3124a193", "title": "Off-Line Writer Recognition for Farsi Text", "doi": null, "abstractUrl": "/proceedings-article/micai/2007/3124a193/12OmNzdoMMR", "parentPublication": { "id": "proceedings/micai/2007/3124/0", "title": "2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/07/ttp2013071773", "title": "Writer Adaptation with Style Transfer Mapping", "doi": null, "abstractUrl": "/journal/tp/2013/07/ttp2013071773/13rRUwIF6ms", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1988/12/t1506", "title": "Constructing Two-Writer Atomic Registers", "doi": null, "abstractUrl": "/journal/tc/1988/12/t1506/13rRUwjoNvI", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2002/03/i0329", "title": "Writer Adaptation for Online Handwriting Recognition", "doi": null, "abstractUrl": "/journal/tp/2002/03/i0329/13rRUx0gegf", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgood28Alq", "title": "Convergence Information Technology, International Conference on", "acronym": "iccit", "groupId": "1001590", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNCd2rPt", "doi": "10.1109/ICCIT.2008.330", "title": "Expressive Information Visualization Taxonomy for Decision Support Environment", "normalizedTitle": "Expressive Information Visualization Taxonomy for Decision Support Environment", "abstract": "This paper proposes expressive information visualization (IV) taxonomy to support cognitive and perceptual needs for decision support environment. Four key dimensions have been identified, namely representation, organization, interaction and content. The effects of these expressive dimensions on user satisfaction were examined. Results suggest that these dimensions are important and affect their satisfaction. Further analysis was conducted and results indicate that there are significant differences across IV techniques and decision style. This suggests and provides empirical evidence that the proposed Expressive IV Taxonomy is important to consider in the design and evaluation of IV in particular and user interface in general", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes expressive information visualization (IV) taxonomy to support cognitive and perceptual needs for decision support environment. Four key dimensions have been identified, namely representation, organization, interaction and content. The effects of these expressive dimensions on user satisfaction were examined. Results suggest that these dimensions are important and affect their satisfaction. Further analysis was conducted and results indicate that there are significant differences across IV techniques and decision style. This suggests and provides empirical evidence that the proposed Expressive IV Taxonomy is important to consider in the design and evaluation of IV in particular and user interface in general", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes expressive information visualization (IV) taxonomy to support cognitive and perceptual needs for decision support environment. Four key dimensions have been identified, namely representation, organization, interaction and content. The effects of these expressive dimensions on user satisfaction were examined. Results suggest that these dimensions are important and affect their satisfaction. Further analysis was conducted and results indicate that there are significant differences across IV techniques and decision style. This suggests and provides empirical evidence that the proposed Expressive IV Taxonomy is important to consider in the design and evaluation of IV in particular and user interface in general", "fno": "3407a088", "keywords": [ "Expressive Information Visualization", "Information Visualization Taxonomy", "Decision Style", "Human Computer Interaction" ], "authors": [ { "affiliation": null, "fullName": "Wan Adilah Wan Adnan", "givenName": "Wan Adilah Wan", "surname": "Adnan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nik Ghazali Nik Daud", "givenName": "Nik Ghazali Nik", "surname": "Daud", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nor Laila Md Noor", "givenName": "Nor Laila Md", "surname": "Noor", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "88-93", "year": "2008", "issn": null, "isbn": "978-0-7695-3407-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3407a082", "articleId": "12OmNAYoKp9", "__typename": "AdjacentArticleType" }, "next": { "fno": "3407a094", "articleId": "12OmNC3o50q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156366", "title": "Text visualization techniques: Taxonomy, visual survey, and community insights", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156366/12OmNqAU6t7", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684794", "title": "A taxonomy of exercises to support individual learning paths in initial programming learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684794/12OmNrIrPwY", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2016/4840/0/4840a267", "title": "A Security Threats Taxonomy for Routing System Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/cis/2016/4840a267/12OmNwIHoy9", "parentPublication": { "id": "proceedings/cis/2016/4840/0", "title": "2016 12th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2003/8131/1/01261489", "title": "A taxonomy of visualization techniques for simulation in production and logistics", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261489/12OmNwNOaNo", "parentPublication": { "id": "proceedings/wsc/2003/8131/1", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2000/0804/0/08040077", "title": "GADGET/IV: A Taxonomic Approach to Semi-Automatic Design of Information Visualization Applications Using Modular Visualization Environment", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2000/08040077/12OmNx7ov0k", "parentPublication": { "id": "proceedings/ieee-infovis/2000/0804/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790151", "title": "Rethinking Visualization: A High-Level Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790151/12OmNxRWIbh", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scivis/2015/9785/0/07429511", "title": "A proposed multivariate visualization taxonomy from user data", "doi": null, "abstractUrl": "/proceedings-article/scivis/2015/07429511/12OmNzmLxKh", "parentPublication": { "id": "proceedings/scivis/2015/9785/0", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/02/08476234", "title": "A Task-Based Taxonomy of Cognitive Biases for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/02/08476234/13WBGLOgq3z", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09060980", "title": "Visualization Techniques in Augmented Reality: A Taxonomy, Methods and Patterns", "doi": null, "abstractUrl": "/journal/tg/2021/09/09060980/1iRo7RmpTa0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a223", "title": "A Taxonomy of Spatial-Temporal Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a223/1y4oJ9f6FuU", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNB6D70V", "title": "2011 International Conference on Cyberworlds", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNClQ0to", "doi": "10.1109/CW.2011.27", "title": "Continuous Control of Style through Linear Interpolation in Hidden Markov Model Based Stylistic Walk Synthesis", "normalizedTitle": "Continuous Control of Style through Linear Interpolation in Hidden Markov Model Based Stylistic Walk Synthesis", "abstract": "In this work, we present a Hidden Markov Model (HMM) based stylistic walk synthesizer, where the synthesized styles are combinations or exaggerations of the walk styles present in the training database. In a first stage, Hidden Markov Models of eleven different styles of gait are trained, using a database of motion capture walk sequences. In a second stage, the probability density functions inside the stylistic models are interpolated or extrapolated in order to synthesize walks with styles or style intensities that were not present in the training database. A continuous model of the style parameter space is thus constructed around the eleven original walk styles. An informal user evaluation of the synthesized sequences showed that the naturalness of motions is preserved after linear interpolation.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we present a Hidden Markov Model (HMM) based stylistic walk synthesizer, where the synthesized styles are combinations or exaggerations of the walk styles present in the training database. In a first stage, Hidden Markov Models of eleven different styles of gait are trained, using a database of motion capture walk sequences. In a second stage, the probability density functions inside the stylistic models are interpolated or extrapolated in order to synthesize walks with styles or style intensities that were not present in the training database. A continuous model of the style parameter space is thus constructed around the eleven original walk styles. An informal user evaluation of the synthesized sequences showed that the naturalness of motions is preserved after linear interpolation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we present a Hidden Markov Model (HMM) based stylistic walk synthesizer, where the synthesized styles are combinations or exaggerations of the walk styles present in the training database. In a first stage, Hidden Markov Models of eleven different styles of gait are trained, using a database of motion capture walk sequences. In a second stage, the probability density functions inside the stylistic models are interpolated or extrapolated in order to synthesize walks with styles or style intensities that were not present in the training database. A continuous model of the style parameter space is thus constructed around the eleven original walk styles. An informal user evaluation of the synthesized sequences showed that the naturalness of motions is preserved after linear interpolation.", "fno": "4467a232", "keywords": [ "HMM", "Gait", "Style", "Control", "Synthesis" ], "authors": [ { "affiliation": null, "fullName": "Joëlle Tilmanne", "givenName": "Joëlle", "surname": "Tilmanne", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thierry Dutoit", "givenName": "Thierry", "surname": "Dutoit", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "232-236", "year": "2011", "issn": null, "isbn": "978-0-7695-4467-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4467a227", "articleId": "12OmNBa2iAQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "4467a237", "articleId": "12OmNviHK8f", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dac/1992/2822/0/00227807", "title": "Superpipelined control and data path synthesis", "doi": null, "abstractUrl": "/proceedings-article/dac/1992/00227807/12OmNA0MYV3", "parentPublication": { "id": "proceedings/dac/1992/2822/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hics/1998/8341/0/83410214", "title": "Making the Most of Ecological Interface Design: The Role of Cognitive Style", "doi": null, "abstractUrl": "/proceedings-article/hics/1998/83410214/12OmNAtst5R", "parentPublication": { "id": "proceedings/hics/1998/8341/0", "title": "Human Interaction with Complex Systems, Annual Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/1/71280489", "title": "A set of handwriting families: style recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71280489/12OmNB8TU6j", "parentPublication": { "id": "proceedings/icdar/1995/7128/1", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ivc/1995/7082/0/70820106", "title": "Writing style for architectural synthesis", "doi": null, "abstractUrl": "/proceedings-article/ivc/1995/70820106/12OmNCgrCUU", "parentPublication": { "id": "proceedings/ivc/1995/7082/0", "title": "Verilog HDL Conference, IEEE International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/4/3336g496", "title": "An Increment-Based Random Walk Approach to Sampling Hidden Databases", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336g496/12OmNrMHOhE", "parentPublication": { "id": "csse/2008/3336/4", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/1/73100342", "title": "Color image retrieval based on hidden Markov models", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73100342/12OmNyY4ru4", "parentPublication": { "id": "proceedings/icip/1995/7310/1", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122739", "title": "Evaluating the Effect of Style in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122739/13rRUB7a1fO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/1991/03/k0307", "title": "Logic Programming with Arrays", "doi": null, "abstractUrl": "/journal/tk/1991/03/k0307/13rRUwInv4E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlD94f", "title": "Machine Learning and Applications, Fourth International Conference on", "acronym": "icmla", "groupId": "1001544", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNrkT7vh", "doi": "10.1109/ICMLA.2010.153", "title": "Automatic Synonym and Phrase Replacement Show Promise for Style Transformation", "normalizedTitle": "Automatic Synonym and Phrase Replacement Show Promise for Style Transformation", "abstract": "Style transformation refers to the process by which a piece of text written in a certain style of writing is transformed into another text exhibiting a distinctly different style of writing without significant change to the meaning of individual sentences. In this paper we continue investigation into the linguistic style transformation problem and demonstrate current achievements in transformation on sample texts from a standard authorship attribution corpus. Specifically, we use simple synonym and phrase replacement on the source text to strengthen the stylistic markers of a given target corpus. We validate our results using Java Graphical Authorship Attribution Program (JGAAP). We are able to demonstrate that simple replacements can alter the linguistic style of writing as detected by an independent process.", "abstracts": [ { "abstractType": "Regular", "content": "Style transformation refers to the process by which a piece of text written in a certain style of writing is transformed into another text exhibiting a distinctly different style of writing without significant change to the meaning of individual sentences. In this paper we continue investigation into the linguistic style transformation problem and demonstrate current achievements in transformation on sample texts from a standard authorship attribution corpus. Specifically, we use simple synonym and phrase replacement on the source text to strengthen the stylistic markers of a given target corpus. We validate our results using Java Graphical Authorship Attribution Program (JGAAP). We are able to demonstrate that simple replacements can alter the linguistic style of writing as detected by an independent process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Style transformation refers to the process by which a piece of text written in a certain style of writing is transformed into another text exhibiting a distinctly different style of writing without significant change to the meaning of individual sentences. In this paper we continue investigation into the linguistic style transformation problem and demonstrate current achievements in transformation on sample texts from a standard authorship attribution corpus. Specifically, we use simple synonym and phrase replacement on the source text to strengthen the stylistic markers of a given target corpus. We validate our results using Java Graphical Authorship Attribution Program (JGAAP). We are able to demonstrate that simple replacements can alter the linguistic style of writing as detected by an independent process.", "fno": "4300a958", "keywords": [ "Computational Stylistics", "Style Processcing", "Natural Langauge Processing", "Machine Learning", "Computational Linguistics" ], "authors": [ { "affiliation": null, "fullName": "Foaad Khosmood", "givenName": "Foaad", "surname": "Khosmood", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Robert Levinson", "givenName": "Robert", "surname": "Levinson", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmla", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "958-961", "year": "2010", "issn": null, "isbn": "978-0-7695-4300-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4300a954", "articleId": "12OmNs0TKYU", "__typename": "AdjacentArticleType" }, "next": { "fno": "4300a965", "articleId": "12OmNvxbhIl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2013/5145/1/5145a459", "title": "Style Features for Authors in Two Languages", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2013/5145a459/12OmNBqdrgk", "parentPublication": { "id": "proceedings/wi-iat/2013/5145/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2008/3278/0/3278a477", "title": "Stylometric Watermarking", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2008/3278a477/12OmNqFJhOc", "parentPublication": { "id": "proceedings/iih-msp/2008/3278/0", "title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2009/3726/1/3726a599", "title": "Temporally Robust Software Features for Authorship Attribution", "doi": null, "abstractUrl": "/proceedings-article/compsac/2009/3726a599/12OmNqGiu07", "parentPublication": { "id": "proceedings/compsac/2009/3726/1", "title": "2009 33rd Annual IEEE International Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2017/3077/0/08284311", "title": "Authorship attribution for textual data on online social networks", "doi": null, "abstractUrl": "/proceedings-article/ic3/2017/08284311/12OmNs0TKZw", "parentPublication": { "id": "proceedings/ic3/2017/3077/0", "title": "2017 Tenth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752272", "title": "Authorship identification in Bengali language: A graph based approach", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752272/12OmNwMobcI", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2016/3566/0/07839612", "title": "Authorship Attribution via Network Motifs Identification", "doi": null, "abstractUrl": "/proceedings-article/bracis/2016/07839612/12OmNzXFoEz", "parentPublication": { "id": "proceedings/bracis/2016/3566/0", "title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2003/04/x4034", "title": "New Feature Sets for Summarization by Sentence Extraction", "doi": null, "abstractUrl": "/magazine/ex/2003/04/x4034/13rRUxDItdc", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633681", "title": "Neural Embeddings for Idiolect Identification", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633681/17D45VTRowT", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000b614", "title": "Exploring Author Profiling for Fake News Detection", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000b614/1FJ5LzgCEnu", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/05/09551764", "title": "A Review of Text Style Transfer Using Deep Learning", "doi": null, "abstractUrl": "/journal/ai/2022/05/09551764/1xgx5fmhGzC", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrFTr6T", "title": "2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)", "acronym": "iccps", "groupId": "1800417", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNviZlju", "doi": "10.1109/ICCPS.2014.6843713", "title": "Style-based abstractions for human motion classification", "normalizedTitle": "Style-based abstractions for human motion classification", "abstract": "This paper presents an approach to motion analysis for robotics in which a quantitative definition of “style of motion” is used to classify movements. In particular, we present a method for generating a “best match” signal for empirical data via a two stage optimal control formulation. The first stage consists of the generation of trajectories that mimic empirical data. In the second stage, an inverse problem is solved in order to obtain the “stylistic parameters” that best recreate the empirical data. This method is amenable to human motion analysis in that it not only produces a matching trajectory but, in doing so, classifies its quality. This classification allows for the production of additional trajectories, between any two endpoints, in the same style as the empirical reference data. The method not only enables robotic mimicry of human style but can also provide insights into genres of stylized movement, equipping cy-berphysical systems with a deeper interpretation of human movement.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents an approach to motion analysis for robotics in which a quantitative definition of “style of motion” is used to classify movements. In particular, we present a method for generating a “best match” signal for empirical data via a two stage optimal control formulation. The first stage consists of the generation of trajectories that mimic empirical data. In the second stage, an inverse problem is solved in order to obtain the “stylistic parameters” that best recreate the empirical data. This method is amenable to human motion analysis in that it not only produces a matching trajectory but, in doing so, classifies its quality. This classification allows for the production of additional trajectories, between any two endpoints, in the same style as the empirical reference data. The method not only enables robotic mimicry of human style but can also provide insights into genres of stylized movement, equipping cy-berphysical systems with a deeper interpretation of human movement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents an approach to motion analysis for robotics in which a quantitative definition of “style of motion” is used to classify movements. In particular, we present a method for generating a “best match” signal for empirical data via a two stage optimal control formulation. The first stage consists of the generation of trajectories that mimic empirical data. In the second stage, an inverse problem is solved in order to obtain the “stylistic parameters” that best recreate the empirical data. This method is amenable to human motion analysis in that it not only produces a matching trajectory but, in doing so, classifies its quality. This classification allows for the production of additional trajectories, between any two endpoints, in the same style as the empirical reference data. The method not only enables robotic mimicry of human style but can also provide insights into genres of stylized movement, equipping cy-berphysical systems with a deeper interpretation of human movement.", "fno": "06843713", "keywords": [], "authors": [ { "affiliation": "University of Virginia, Systems and Information Engineering, Charlottesville, VA USA", "fullName": "Amy LaViers", "givenName": "Amy", "surname": "LaViers", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology, School of Electrical and Computer Engineering, Atlanta, GA USA", "fullName": "Magnus Egerstedt", "givenName": "Magnus", "surname": "Egerstedt", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccps", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-04-01T00:00:00", "pubType": "proceedings", "pages": "84-91", "year": "2014", "issn": null, "isbn": "978-1-4799-4931-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06843712", "articleId": "12OmNAY79px", "__typename": "AdjacentArticleType" }, "next": { "fno": "06843714", "articleId": "12OmNqFJhG4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2004/2159/7/215970118", "title": "Extraction and Temporal Segmentation of Multiple Motion Trajectories in Human Motion", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2004/215970118/12OmNwMobcY", "parentPublication": { "id": "proceedings/cvprw/2004/2159/7", "title": "2004 Conference on Computer Vision and Pattern Recognition Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmamh/2007/3065/0/30650129", "title": "Style-Based Motion Editing", "doi": null, "abstractUrl": "/proceedings-article/dmamh/2007/30650129/12OmNx7XGZA", "parentPublication": { "id": "proceedings/dmamh/2007/3065/0", "title": "Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvmp/2010/4268/0/4268a009", "title": "Camera Motion Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvmp/2010/4268a009/12OmNyPQ4O1", "parentPublication": { "id": "proceedings/cvmp/2010/4268/0", "title": "2010 Conference on Visual Media Production", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/04/mcg2017040042", "title": "Fast Neural Style Transfer for Motion Data", "doi": null, "abstractUrl": "/magazine/cg/2017/04/mcg2017040042/13rRUxbCbsI", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2021/04/08669824", "title": "Survey on Style in 3D Human Body Motion: Taxonomy, Data, Recognition and Its Applications", "doi": null, "abstractUrl": "/journal/ta/2021/04/08669824/18wIZlDXxy8", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859776", "title": "Unpaired Motion Style Transfer with Motion-Oriented Projection Flow Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859776/1G9E21CBr44", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g583", "title": "Style-ERD: Responsive and Coherent Online Motion Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g583/1H0NZuIQvyE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700a878", "title": "GlocalNet: Class-aware Long-term Human Motion Synthesis", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700a878/1uqGGnoSQ36", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a393", "title": "Simulating Realistic Human Motion Trajectories of Mid-Air Gesture Typing", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a393/1yeCVRK9bri", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFJXDP", "doi": "10.1109/IV.2009.94", "title": "Measuring Aesthetics for Information Visualization", "normalizedTitle": "Measuring Aesthetics for Information Visualization", "abstract": "Aesthetics is an unsolved problem of information visualization, because there is no satisfactory understanding of what constitutes aesthetic effect. This survey paper gives an overview of approaches to model aesthetics, starting with Birkhoff’s aesthetic measure and continuing to recent ones based on mathematical and information theoretical concepts. Common concepts in the different models are highlighted, such as the effects of order and complexity. Further, practical techniques for generating aesthetic visualizations are shown together with examples of recent work in this field. Finally, the paper discusses some of the key issues regarding aesthetics and the human factor in the visualization process. Empirical studies have shown a correlation between perceived aesthetics and usability, meaning that a better understanding of aesthetics could improve the usability of visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "Aesthetics is an unsolved problem of information visualization, because there is no satisfactory understanding of what constitutes aesthetic effect. This survey paper gives an overview of approaches to model aesthetics, starting with Birkhoff’s aesthetic measure and continuing to recent ones based on mathematical and information theoretical concepts. Common concepts in the different models are highlighted, such as the effects of order and complexity. Further, practical techniques for generating aesthetic visualizations are shown together with examples of recent work in this field. Finally, the paper discusses some of the key issues regarding aesthetics and the human factor in the visualization process. Empirical studies have shown a correlation between perceived aesthetics and usability, meaning that a better understanding of aesthetics could improve the usability of visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aesthetics is an unsolved problem of information visualization, because there is no satisfactory understanding of what constitutes aesthetic effect. This survey paper gives an overview of approaches to model aesthetics, starting with Birkhoff’s aesthetic measure and continuing to recent ones based on mathematical and information theoretical concepts. Common concepts in the different models are highlighted, such as the effects of order and complexity. Further, practical techniques for generating aesthetic visualizations are shown together with examples of recent work in this field. Finally, the paper discusses some of the key issues regarding aesthetics and the human factor in the visualization process. Empirical studies have shown a correlation between perceived aesthetics and usability, meaning that a better understanding of aesthetics could improve the usability of visualizations.", "fno": "3733a579", "keywords": [ "Aesthetics", "Visualization", "Measures", "Usability" ], "authors": [ { "affiliation": null, "fullName": "Daniel Filonik", "givenName": "Daniel", "surname": "Filonik", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dominikus Baur", "givenName": "Dominikus", "surname": "Baur", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "579-584", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a572", "articleId": "12OmNxG1ySa", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a585", "articleId": "12OmNzJbQUP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2007/2900/0/29000087", "title": "Towards a Model of Information Aesthetics in Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000087/12OmNAoDhQU", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2012/4777/0/4777a303", "title": "Modeling and Evaluating User Interface Aesthetics Employing ISO 25010 Quality Standard", "doi": null, "abstractUrl": "/proceedings-article/quatic/2012/4777a303/12OmNsbY6Uk", "parentPublication": { "id": "proceedings/quatic/2012/4777/0", "title": "2012 Eighth International Conference on the Quality of Information and Communications Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ozchi/1998/9206/0/92060064", "title": "Aesthetic Measures for Screen Design", "doi": null, "abstractUrl": "/proceedings-article/ozchi/1998/92060064/12OmNvSKNSk", "parentPublication": { "id": "proceedings/ozchi/1998/9206/0", "title": "Computer-Human Interaction, Australasian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004043", "title": "Exploratory to Presentation Visualization, and Everything In-between: Providing Flexibility in Aesthetics, Interactions and Visual Layering", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004043/12OmNwNeYw0", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032a638", "title": "Personalized Image Aesthetics", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032a638/12OmNxZkhuy", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770245", "title": "Aesthetics and Inspiration for Visualization Design: Bridging the Gap between Art and Science", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770245/12OmNyXMQhm", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsem/2010/4223/1/4223a257", "title": "The Geometrical Design of Industrial Products Based on the Machine Aesthetics", "doi": null, "abstractUrl": "/proceedings-article/icsem/2010/4223a257/12OmNz5JC3T", "parentPublication": { "id": "proceedings/icsem/2010/4223/1", "title": "2010 International Conference on System Science, Engineering Design and Manufacturing Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061245", "title": "Stacked Graphs – Geometry & Aesthetics", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061245/13rRUILLkDJ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903341", "title": "BeauVis: A Validated Scale for Measuring the Aesthetic Pleasure of Visual Representations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903341/1GZonh0vssw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933570", "title": "Visualization Assessment: A Machine Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933570/1fTgFdztlbq", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxYbSWo", "title": "2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)", "acronym": "iri", "groupId": "1001046", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2Jt9O", "doi": "10.1109/IRI.2016.30", "title": "Clustering Web Pages Based on Structure and Style Similarity (Application Paper)", "normalizedTitle": "Clustering Web Pages Based on Structure and Style Similarity (Application Paper)", "abstract": "We consider cluster analysis task on web pages based on various techniques to group the pages. While grouping the web pages based on the semantic meaning expressed in the content is required for some applications, we focus on clustering based on the web page structure and style for applications like categorization, cleaning, schema detection and automatic extractions. This paper describes some of the applications of similarity measures and a clustering technique to group the web pages into clusters. The structural similarity of HTML pages is measured by using Tree Edit Distance measure on DOM trees. The stylistic similarity is measured by using Jaccard similarity on CSS class names. An aggregated similarity measure is computed by combining structural and stylistic measures. A clustering method is then applied to this aggregated similarity measure to group the documents.", "abstracts": [ { "abstractType": "Regular", "content": "We consider cluster analysis task on web pages based on various techniques to group the pages. While grouping the web pages based on the semantic meaning expressed in the content is required for some applications, we focus on clustering based on the web page structure and style for applications like categorization, cleaning, schema detection and automatic extractions. This paper describes some of the applications of similarity measures and a clustering technique to group the web pages into clusters. The structural similarity of HTML pages is measured by using Tree Edit Distance measure on DOM trees. The stylistic similarity is measured by using Jaccard similarity on CSS class names. An aggregated similarity measure is computed by combining structural and stylistic measures. A clustering method is then applied to this aggregated similarity measure to group the documents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider cluster analysis task on web pages based on various techniques to group the pages. While grouping the web pages based on the semantic meaning expressed in the content is required for some applications, we focus on clustering based on the web page structure and style for applications like categorization, cleaning, schema detection and automatic extractions. This paper describes some of the applications of similarity measures and a clustering technique to group the web pages into clusters. The structural similarity of HTML pages is measured by using Tree Edit Distance measure on DOM trees. The stylistic similarity is measured by using Jaccard similarity on CSS class names. An aggregated similarity measure is computed by combining structural and stylistic measures. A clustering method is then applied to this aggregated similarity measure to group the documents.", "fno": "3207a175", "keywords": [ "Web Pages", "Vegetation", "HTML", "Cascading Style Sheets", "World Wide Web", "Data Models", "Videos", "Documents", "Jaccard", "Similarity", "Tika", "Metadata", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Thamme Gowda", "givenName": "Thamme", "surname": "Gowda", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chris A. Mattmann", "givenName": "Chris A.", "surname": "Mattmann", "__typename": "ArticleAuthorType" } ], "idPrefix": "iri", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "175-180", "year": "2016", "issn": null, "isbn": "978-1-5090-3207-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3207a166", "articleId": "12OmNAle6Nm", "__typename": "AdjacentArticleType" }, "next": { "fno": "3207a181", "articleId": "12OmNyRPgpQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itcc/2004/2108/1/210810344", "title": "Exploring Similarity among Web Pages Using the Hyperlink Structure", "doi": null, "abstractUrl": "/proceedings-article/itcc/2004/210810344/12OmNAS9zCF", "parentPublication": { "id": "proceedings/itcc/2004/2108/2", "title": "Information Technology: Coding and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2016/5575/0/5575a361", "title": "Detecting and Localizing Visual Inconsistencies in Web Applications", "doi": null, "abstractUrl": "/proceedings-article/apsec/2016/5575a361/12OmNAlvHvJ", "parentPublication": { "id": "proceedings/apsec/2016/5575/0", "title": "2016 23rd Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2018/5012/0/501201a215", "title": "Automated Repair of Internationalization Presentation Failures in Web Pages Using Style Similarity Clustering and Search-Based Techniques", "doi": null, "abstractUrl": "/proceedings-article/icst/2018/501201a215/12OmNCfSqNs", "parentPublication": { "id": "proceedings/icst/2018/5012/0", "title": "2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2018/5012/0/501201a182", "title": "Automatic Detection of Visibility Faults by Layout Changes in HTML5 Web Pages", "doi": null, "abstractUrl": "/proceedings-article/icst/2018/501201a182/12OmNwdL7jS", "parentPublication": { "id": "proceedings/icst/2018/5012/0", "title": "2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2016/3845/0/07582802", "title": "Migrating cascading style sheets to preprocessors by introducing mixins", "doi": null, "abstractUrl": "/proceedings-article/ase/2016/07582802/12OmNxFsmLQ", "parentPublication": { "id": "proceedings/ase/2016/3845/0", "title": "2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2015/0025/0/0025a709", "title": "Automatic Detection of Potential Layout Faults Following Changes to Responsive Web Pages (N)", "doi": null, "abstractUrl": "/proceedings-article/ase/2015/0025a709/12OmNy5zsl6", "parentPublication": { "id": "proceedings/ase/2015/0025/0", "title": "2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2016/1827/0/1827a202", "title": "Detecting and Localizing Internationalization Presentation Failures in Web Applications", "doi": null, "abstractUrl": "/proceedings-article/icst/2016/1827a202/12OmNy6HQS6", "parentPublication": { "id": "proceedings/icst/2016/1827/0", "title": "2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2015/7125/0/07102586", "title": "Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques", "doi": null, "abstractUrl": "/proceedings-article/icst/2015/07102586/12OmNyjccCu", "parentPublication": { "id": "proceedings/icst/2015/7125/0", "title": "2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2018/5638/0/563801a140", "title": "Automated Repair of Mobile Friendly Problems in Web Pages", "doi": null, "abstractUrl": "/proceedings-article/icse/2018/563801a140/13l5NXDXub4", "parentPublication": { "id": "proceedings/icse/2018/5638/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2019/1736/0/173600a183", "title": "Automatic Visual Verification of Layout Failures in Responsively Designed Web Pages", "doi": null, "abstractUrl": "/proceedings-article/icst/2019/173600a183/1aDT7byKOYw", "parentPublication": { "id": "proceedings/icst/2019/1736/0", "title": "2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC1oT6n", "title": "Multimedia Information Networking and Security, International Conference on", "acronym": "mines", "groupId": "1003021", "volume": "1", "displayVolume": "1", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdGntC", "doi": "10.1109/MINES.2009.194", "title": "A New Accelerated Algorithm of Image Style Study", "normalizedTitle": "A New Accelerated Algorithm of Image Style Study", "abstract": "The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity measure operator. 2 Take Image difference measure operator as characteristic quantification IA method applicable scope. 3 To proposed one kind of new acceleration algorithm to Difference small image. 4 Has designed the image style study sorter effective enhancement image style study efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity measure operator. 2 Take Image difference measure operator as characteristic quantification IA method applicable scope. 3 To proposed one kind of new acceleration algorithm to Difference small image. 4 Has designed the image style study sorter effective enhancement image style study efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity measure operator. 2 Take Image difference measure operator as characteristic quantification IA method applicable scope. 3 To proposed one kind of new acceleration algorithm to Difference small image. 4 Has designed the image style study sorter effective enhancement image style study efficiency.", "fno": "3843a244", "keywords": [ "Image Analogy", "Texture Synthesis", "Style Study" ], "authors": [ { "affiliation": null, "fullName": "Li Tang", "givenName": "Li", "surname": "Tang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "JinYi Chang", "givenName": "JinYi", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jian Li", "givenName": "Jian", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "RongWei Yu", "givenName": "RongWei", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "mines", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "244-248", "year": "2009", "issn": null, "isbn": "978-0-7695-3843-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3843a239", "articleId": "12OmNviZly0", "__typename": "AdjacentArticleType" }, "next": { "fno": "3843a249", "articleId": "12OmNz5apHX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2011/4467/0/4467a232", "title": "Continuous Control of Style through Linear Interpolation in Hidden Markov Model Based Stylistic Walk Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cw/2011/4467a232/12OmNClQ0to", "parentPublication": { "id": "proceedings/cw/2011/4467/0", "title": "2011 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762a555", "title": "Non-expansion Hiding Secret Image in Visual Secret Sharing with Shift Style", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762a555/12OmNvpewar", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2010/4222/0/4222a547", "title": "Example-Based Facial Portraiture Style Learning", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2010/4222a547/12OmNyv7m94", "parentPublication": { "id": "proceedings/iih-msp/2010/4222/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2016/04/mmu2016040060", "title": "Example-Based Image Textural Style Transfer", "doi": null, "abstractUrl": "/magazine/mu/2016/04/mmu2016040060/13rRUB6SpXp", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600b745", "title": "Style-Guided Inference of Transformer for High-resolution Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600b745/1L6LvvTP96M", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2019/9214/0/921400a066", "title": "Saliency-Guided Image Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmew/2019/921400a066/1cJ0zw9Ceru", "parentPublication": { "id": "proceedings/icmew/2019/9214/0", "title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a910", "title": "Semantic GAN: Application for Cross-Domain Image Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a910/1cdOFuQjESA", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412647", "title": "Mask-based Style-Controlled Image Synthesis Using a Mask Style Encoder", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412647/1tmjpKdJTA4", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09427066", "title": "Learning Layout and Style Reconfigurable GANs for Controllable Image Synthesis", "doi": null, "abstractUrl": "/journal/tp/2022/09/09427066/1tuvzMfndhS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428305", "title": "Anime Style Transfer With Spatially-Adaptive Normalization", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428305/1uilyIAzYXu", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyED", "title": "Knowledge Acquisition and Modeling, International Symposium on", "acronym": "kam", "groupId": "1002562", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzxyiFN", "doi": "10.1109/KAM.2008.60", "title": "The Adaptive Learning System Based on Learning Style and Cognitive State", "normalizedTitle": "The Adaptive Learning System Based on Learning Style and Cognitive State", "abstract": "Adaptive learning system, in essence, is a kind of online learning environment that supports the individual learning. It changes the traditional \"just put it on the web\" approach, and provides the customized learning according to the individual differences. In order to reducing the \"cognition overload\" and \"disoriented\", an architecture of Adaptive Learning System based on Learning Style and Cognitive State (ALS-LSCS) is put forward in this paper. Referencing AHAM model, the architecture of ALS-LSCS is mainly composed of the Media Space, Domain Model, Instruction Model, Learner Model, Adaptive Model and the User Interface. To record the cognitive state and learning style of learners, Learner Model combines the Stereotype with the Multi-layered Overlay Model. According to the Felder-Silverman categories, learning style is represented in Stereotype. Cognitive state is recorded in Multi-layered Overlay Model. ALS-LSCS selects the learning content based on learner’s cognitive state, and presents learning content through selecting teaching media based on learner’s learning style.", "abstracts": [ { "abstractType": "Regular", "content": "Adaptive learning system, in essence, is a kind of online learning environment that supports the individual learning. It changes the traditional \"just put it on the web\" approach, and provides the customized learning according to the individual differences. In order to reducing the \"cognition overload\" and \"disoriented\", an architecture of Adaptive Learning System based on Learning Style and Cognitive State (ALS-LSCS) is put forward in this paper. Referencing AHAM model, the architecture of ALS-LSCS is mainly composed of the Media Space, Domain Model, Instruction Model, Learner Model, Adaptive Model and the User Interface. To record the cognitive state and learning style of learners, Learner Model combines the Stereotype with the Multi-layered Overlay Model. According to the Felder-Silverman categories, learning style is represented in Stereotype. Cognitive state is recorded in Multi-layered Overlay Model. ALS-LSCS selects the learning content based on learner’s cognitive state, and presents learning content through selecting teaching media based on learner’s learning style.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Adaptive learning system, in essence, is a kind of online learning environment that supports the individual learning. It changes the traditional \"just put it on the web\" approach, and provides the customized learning according to the individual differences. In order to reducing the \"cognition overload\" and \"disoriented\", an architecture of Adaptive Learning System based on Learning Style and Cognitive State (ALS-LSCS) is put forward in this paper. Referencing AHAM model, the architecture of ALS-LSCS is mainly composed of the Media Space, Domain Model, Instruction Model, Learner Model, Adaptive Model and the User Interface. To record the cognitive state and learning style of learners, Learner Model combines the Stereotype with the Multi-layered Overlay Model. According to the Felder-Silverman categories, learning style is represented in Stereotype. Cognitive state is recorded in Multi-layered Overlay Model. ALS-LSCS selects the learning content based on learner’s cognitive state, and presents learning content through selecting teaching media based on learner’s learning style.", "fno": "3488a302", "keywords": [ "Adaptive Learning System", "Learning Style", "Cognitive State" ], "authors": [ { "affiliation": null, "fullName": "Shipin Chen", "givenName": "Shipin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianping Zhang", "givenName": "Jianping", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "kam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "302-306", "year": "2008", "issn": null, "isbn": "978-0-7695-3488-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3488a298", "articleId": "12OmNvk7K17", "__typename": "AdjacentArticleType" }, "next": { "fno": "3488a307", "articleId": "12OmNvDqsNh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hics/1998/8341/0/83410214", "title": "Making the Most of Ecological Interface Design: The Role of Cognitive Style", "doi": null, "abstractUrl": "/proceedings-article/hics/1998/83410214/12OmNAtst5R", "parentPublication": { "id": "proceedings/hics/1998/8341/0", "title": "Human Interaction with Complex Systems, Annual Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i820", "title": "Personalized Learning System Based on Solomon Learning Style", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i820/12OmNBOUxt7", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a293", "title": "Effects of Cognitive Style on User Acceptance of Blogs and Podcasts", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a293/12OmNC2OSK2", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2012/4702/0/4702a359", "title": "How Cognitive Styles Affect the E-learning Process", "doi": null, "abstractUrl": "/proceedings-article/icalt/2012/4702a359/12OmNCxbXBU", "parentPublication": { "id": "proceedings/icalt/2012/4702/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/2/3407c268", "title": "Discovering Learning Pattern in Different Cognitive Style of Learners", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407c268/12OmNvs4vsk", "parentPublication": { "id": "proceedings/iccit/2008/3407/2", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2011/4375/0/4375a403", "title": "A Comparison of Cognitive Styles on the Behavior of Obtaining Knowledge: Field Independence vs. Field Dependence", "doi": null, "abstractUrl": "/proceedings-article/asonam/2011/4375a403/12OmNxFsmB3", "parentPublication": { "id": "proceedings/asonam/2011/4375/0", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2008/3381/0/3381a051", "title": "Relationships between User Cognitive Styles and Browsing Behaviors of an Online Learning Web Site", "doi": null, "abstractUrl": "/proceedings-article/cw/2008/3381a051/12OmNxd4tsC", "parentPublication": { "id": "proceedings/cw/2008/3381/0", "title": "2008 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417883", "title": "The study of cognitive-style-oriented online game learning system", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417883/12OmNySG3Ph", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2010/4212/1/4212a784", "title": "Gender Differences in Cognitive Style and Personalized Foreign Language Teaching Strategy", "doi": null, "abstractUrl": "/proceedings-article/isdea/2010/4212a784/12OmNyaoDDy", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a329", "title": "Eye-Tracking Users' Behavior in Relation to Cognitive Style within an E-learning Environment", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a329/12OmNzahc19", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqMPfS8", "title": "Computer Graphics and Applications, Pacific Conference on", "acronym": "pg", "groupId": "1000130", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNB9KHwC", "doi": "10.1109/PCCGA.2002.1167883", "title": "Visualization of Multidimensional, Multivariate Volume Data Using Hardware-Accelerated Non-Photorealistic Rendering Techniques", "normalizedTitle": "Visualization of Multidimensional, Multivariate Volume Data Using Hardware-Accelerated Non-Photorealistic Rendering Techniques", "abstract": "This paper presents a set of feature enhancement techniques coupled with hardware-accelerated non-photorealistic rendering for generating more perceptually effective visualizations of multidimensional, multivariate volume data, such as those obtained from typical computational fluid dynamics simulations. For time-invariant data, one or more variables are used to either highlight important features in another variable, or add contextural information to the visualization. For time-varying data, rendering of each time step also takes into account the values at neighboring time steps to reinforce the perception of the changing features in the data over time. With hardware-accelerated rendering, interactive visualization becomes possible leading to increased explorability and comprehension of the data.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a set of feature enhancement techniques coupled with hardware-accelerated non-photorealistic rendering for generating more perceptually effective visualizations of multidimensional, multivariate volume data, such as those obtained from typical computational fluid dynamics simulations. For time-invariant data, one or more variables are used to either highlight important features in another variable, or add contextural information to the visualization. For time-varying data, rendering of each time step also takes into account the values at neighboring time steps to reinforce the perception of the changing features in the data over time. With hardware-accelerated rendering, interactive visualization becomes possible leading to increased explorability and comprehension of the data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a set of feature enhancement techniques coupled with hardware-accelerated non-photorealistic rendering for generating more perceptually effective visualizations of multidimensional, multivariate volume data, such as those obtained from typical computational fluid dynamics simulations. For time-invariant data, one or more variables are used to either highlight important features in another variable, or add contextural information to the visualization. For time-varying data, rendering of each time step also takes into account the values at neighboring time steps to reinforce the perception of the changing features in the data over time. With hardware-accelerated rendering, interactive visualization becomes possible leading to increased explorability and comprehension of the data.", "fno": "17840394", "keywords": [ "Animation", "Hardware Accelerated Rendering", "Multidimensional Data", "Multivariate Data", "Non Photorealistic Rendering", "Scientific Visualization", "Streamlines", "Stroke Based Rendering", "Vector Field", "Visual Perception", "Volume Rendering" ], "authors": [ { "affiliation": "University of California at Davis", "fullName": "Aleksander Stompel", "givenName": "Aleksander", "surname": "Stompel", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California at Davis", "fullName": "Eric B. Lum", "givenName": "Eric B.", "surname": "Lum", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California at Davis", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "pg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-10-01T00:00:00", "pubType": "proceedings", "pages": "394", "year": "2002", "issn": null, "isbn": "0-7695-1784-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "17840386", "articleId": "12OmNALlckX", "__typename": "AdjacentArticleType" }, "next": { "fno": "17840403", "articleId": "12OmNqJZgA3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2000/6478/0/64780037", "title": "Volume Illustration: Non-Photorealistic Rendering of Volume Models", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780037/12OmNC0y5FO", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ettandgrs/2008/3563/2/3563b743", "title": "A Method Based on Chinese Landscape Painting Style of Non-photorealistic Rendering", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b743/12OmNxdDFOQ", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training & Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498lu", "title": "Non-Photorealistic Volume Rendering Using Stippling Techniques", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498lu/12OmNy9Prft", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvgip/2008/3476/0/3476a568", "title": "Real-Time Painterly Rendering of Terrains", "doi": null, "abstractUrl": "/proceedings-article/icvgip/2008/3476a568/12OmNyen1vF", "parentPublication": { "id": "proceedings/icvgip/2008/3476/0", "title": "Computer Vision, Graphics & Image Processing, Indian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1997/8262/0/82620191", "title": "Accelerated volume rendering using homogeneous region encoding", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1997/82620191/12OmNzVoBzB", "parentPublication": { "id": "proceedings/ieee-vis/1997/8262/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2004/2178/0/21780215", "title": "Non-Photorealistic Outdoor Scene Rendering: Techniques and Application", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2004/21780215/12OmNzZmZtZ", "parentPublication": { "id": "proceedings/cgiv/2004/2178/0", "title": "Proceedings. International Conference on Computer Graphics, Imaging and Visualization, 2004. CGIV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2007/01/c1013", "title": "Stylized Rendering for Anatomic Visualization", "doi": null, "abstractUrl": "/magazine/cs/2007/01/c1013/13rRUwcAqmF", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/04376192", "title": "Transform Coding for Hardware-accelerated Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2007/06/04376192/13rRUxC0SW3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1600", "title": "Transform Coding for Hardware-accelerated Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1600/13rRUyeTVhV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/04/mcg2009040081", "title": "Non-photorealistic Rendering: Unleashing the Artist's Imagination [Graphically Speaking]", "doi": null, "abstractUrl": "/magazine/cg/2009/04/mcg2009040081/13rRUzp02qq", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyFCvPp", "title": "Tenth International Conference on Information Visualisation (IV'06)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNBDgZ1k", "doi": "10.1109/IV.2006.97", "title": "Sketchy Illustrations for Presenting the Design of Interactive CSG", "normalizedTitle": "Sketchy Illustrations for Presenting the Design of Interactive CSG", "abstract": "communicate visual ideas and can be used to present and reconsider drafts and concepts in product design. This paper introduces a real-time illustration technique that sketches the design and spatial assembly of CSG models. The illustration technique generates a graphical decomposition of the CSG model into disjunctive layers to extract 1) the perceptually important edges that outline the model?s outer and inner features and 2) the surface shading of the outer and inner faces. Then, the technique applies uncertainty to these layers to simulate a sketchy effect. Finally, the technique composes the sketched layers in depth-sorted order while ensuring a correct depth behavior in the frame buffer. Because the sketchy illustrations are frame-to-frame coherent, the technique can be used as a tool for interactive presentation and reconsideration of the design and spatial assembly of CSG models.", "abstracts": [ { "abstractType": "Regular", "content": "communicate visual ideas and can be used to present and reconsider drafts and concepts in product design. This paper introduces a real-time illustration technique that sketches the design and spatial assembly of CSG models. The illustration technique generates a graphical decomposition of the CSG model into disjunctive layers to extract 1) the perceptually important edges that outline the model?s outer and inner features and 2) the surface shading of the outer and inner faces. Then, the technique applies uncertainty to these layers to simulate a sketchy effect. Finally, the technique composes the sketched layers in depth-sorted order while ensuring a correct depth behavior in the frame buffer. Because the sketchy illustrations are frame-to-frame coherent, the technique can be used as a tool for interactive presentation and reconsideration of the design and spatial assembly of CSG models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "communicate visual ideas and can be used to present and reconsider drafts and concepts in product design. This paper introduces a real-time illustration technique that sketches the design and spatial assembly of CSG models. The illustration technique generates a graphical decomposition of the CSG model into disjunctive layers to extract 1) the perceptually important edges that outline the model?s outer and inner features and 2) the surface shading of the outer and inner faces. Then, the technique applies uncertainty to these layers to simulate a sketchy effect. Finally, the technique composes the sketched layers in depth-sorted order while ensuring a correct depth behavior in the frame buffer. Because the sketchy illustrations are frame-to-frame coherent, the technique can be used as a tool for interactive presentation and reconsideration of the design and spatial assembly of CSG models.", "fno": "26020772", "keywords": [ "Illustrative Visualization", "NPR" ], "authors": [ { "affiliation": "University of Potsdam", "fullName": "Marc Nienhaus", "givenName": "Marc", "surname": "Nienhaus", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Potsdam", "fullName": "Florian Kirsch", "givenName": "Florian", "surname": "Kirsch", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Potsdam", "fullName": "J?rgen Dollner", "givenName": "J?rgen", "surname": "Dollner", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "772-777", "year": "2006", "issn": "1550-6037", "isbn": "0-7695-2602-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "26020766", "articleId": "12OmNBlFR2E", "__typename": "AdjacentArticleType" }, "next": { "fno": "26020778", "articleId": "12OmNwDSdGX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vv/1998/9180/0/91800007", "title": "3D Scan Conversion of CSG Models into Distance Volumes", "doi": null, "abstractUrl": "/proceedings-article/vv/1998/91800007/12OmNroij17", "parentPublication": { "id": "proceedings/vv/1998/9180/0", "title": "Volume Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660085", "title": "VolumeShop: An Interactive System for Direct Volume Illustration", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660085/12OmNwIpNlJ", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2004/2171/0/21710370", "title": "CSG Operations with Voxelized Solids", "doi": null, "abstractUrl": "/proceedings-article/cgi/2004/21710370/12OmNy2Jtay", "parentPublication": { "id": "proceedings/cgi/2004/2171/0", "title": "Proceedings. Computer Graphics International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2011/4548/0/4548a101", "title": "Illustrative Volume Visualization for Unstructured Meshes Based on Photic Extremum Lines", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2011/4548a101/12OmNy5R3zz", "parentPublication": { "id": "proceedings/sibgrapi/2011/4548/0", "title": "2011 24th SIBGRAPI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1994/6240/0/00323993", "title": "A particle system using CSG for description and visualization", "doi": null, "abstractUrl": "/proceedings-article/ca/1994/00323993/12OmNzcPAji", "parentPublication": { "id": "proceedings/ca/1994/6240/0", "title": "Proceedings of Computer Animation '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/05/v1004", "title": "CST: Constructive Solid Trimming for Rendering BReps and CSG", "doi": null, "abstractUrl": "/journal/tg/2007/05/v1004/13rRUEgs2tk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1989/03/mcg1989030020", "title": "Near Real-Time CSG Rendering Using Tree Normalization and Geometric Pruning", "doi": null, "abstractUrl": "/magazine/cg/1989/03/mcg1989030020/13rRUxC0SJO", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1995/06/mcg1995060056", "title": "A New Space Subdivision for Ray Tracing CSG Solids", "doi": null, "abstractUrl": "/magazine/cg/1995/06/mcg1995060056/13rRUy0qnIS", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122749", "title": "Sketchy Rendering for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122749/13rRUzp02oj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynJMVy", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "acronym": "ipdpsw", "groupId": "1800044", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxaNGq2", "doi": "10.1109/IPDPSW.2016.127", "title": "High Performance Molecular Visualization: In-Situ and Parallel Rendering with EGL", "normalizedTitle": "High Performance Molecular Visualization: In-Situ and Parallel Rendering with EGL", "abstract": "Large scale molecular dynamics simulations produce terabytes of data that is impractical to transfer to remote facilities. It is therefore necessary to perform visualization tasks in-situ as the data are generated, or by running interactive remote visualization sessions and batch analyses co-located with direct access to high performance storage systems. A significant challenge for deploying visualization software within clouds, clusters, and supercomputers involves the operating system software required to initialize and manage graphics acceleration hardware. Recently, it has become possible for applications to use the Embedded-system Graphics Library (EGL) to eliminate the requirement for windowing system software on compute nodes, thereby eliminating a significant obstacle to broader use of high performance visualization applications. We outline the potential benefits of this approach in the context of visualization applications used in the cloud, on commodity clusters, and supercomputers. We discuss the implementation of EGL support in VMD, a widely used molecular visualization application, and we outline benefits of the approach for molecular visualization tasks on petascale computers, clouds, and remote visualization servers. We then provide a brief evaluation of the use of EGL in VMD, with tests using developmental graphics drivers on conventional workstations and on Amazon EC2 G2 GPU-accelerated cloud instance types. We expect that the techniques described here will be of broad benefit to many other visualization applications.", "abstracts": [ { "abstractType": "Regular", "content": "Large scale molecular dynamics simulations produce terabytes of data that is impractical to transfer to remote facilities. It is therefore necessary to perform visualization tasks in-situ as the data are generated, or by running interactive remote visualization sessions and batch analyses co-located with direct access to high performance storage systems. A significant challenge for deploying visualization software within clouds, clusters, and supercomputers involves the operating system software required to initialize and manage graphics acceleration hardware. Recently, it has become possible for applications to use the Embedded-system Graphics Library (EGL) to eliminate the requirement for windowing system software on compute nodes, thereby eliminating a significant obstacle to broader use of high performance visualization applications. We outline the potential benefits of this approach in the context of visualization applications used in the cloud, on commodity clusters, and supercomputers. We discuss the implementation of EGL support in VMD, a widely used molecular visualization application, and we outline benefits of the approach for molecular visualization tasks on petascale computers, clouds, and remote visualization servers. We then provide a brief evaluation of the use of EGL in VMD, with tests using developmental graphics drivers on conventional workstations and on Amazon EC2 G2 GPU-accelerated cloud instance types. We expect that the techniques described here will be of broad benefit to many other visualization applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large scale molecular dynamics simulations produce terabytes of data that is impractical to transfer to remote facilities. It is therefore necessary to perform visualization tasks in-situ as the data are generated, or by running interactive remote visualization sessions and batch analyses co-located with direct access to high performance storage systems. A significant challenge for deploying visualization software within clouds, clusters, and supercomputers involves the operating system software required to initialize and manage graphics acceleration hardware. Recently, it has become possible for applications to use the Embedded-system Graphics Library (EGL) to eliminate the requirement for windowing system software on compute nodes, thereby eliminating a significant obstacle to broader use of high performance visualization applications. We outline the potential benefits of this approach in the context of visualization applications used in the cloud, on commodity clusters, and supercomputers. We discuss the implementation of EGL support in VMD, a widely used molecular visualization application, and we outline benefits of the approach for molecular visualization tasks on petascale computers, clouds, and remote visualization servers. We then provide a brief evaluation of the use of EGL in VMD, with tests using developmental graphics drivers on conventional workstations and on Amazon EC2 G2 GPU-accelerated cloud instance types. We expect that the techniques described here will be of broad benefit to many other visualization applications.", "fno": "3682b014", "keywords": [ "Data Visualization", "Software", "Servers", "Rendering Computer Graphics", "Supercomputers", "Libraries", "Molecular Visualization", "In Situ Visualization", "Remote Visualization", "Parallel Rendering" ], "authors": [ { "affiliation": null, "fullName": "John E. Stone", "givenName": "John E.", "surname": "Stone", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Peter Messmer", "givenName": "Peter", "surname": "Messmer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Robert Sisneros", "givenName": "Robert", "surname": "Sisneros", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Klaus Schulten", "givenName": "Klaus", "surname": "Schulten", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdpsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "1014-1023", "year": "2016", "issn": null, "isbn": "978-1-5090-3682-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3682b007", "articleId": "12OmNwcCIXo", "__typename": "AdjacentArticleType" }, "next": { "fno": "3682b024", "articleId": "12OmNwnH4Ms", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mpidc/1996/7533/0/75330104", "title": "Parallel Molecular Dynamics Visualization using MPI with MPE Graphics", "doi": null, "abstractUrl": "/proceedings-article/mpidc/1996/75330104/12OmNApu5kl", "parentPublication": { "id": "proceedings/mpidc/1996/7533/0", "title": "MPI Developers Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2004/8788/0/87880243", "title": "TexMol: Interactive Visual Exploration of Large Flexible Multi-Component Molecular Complexes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880243/12OmNxWLTrf", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571171", "title": "Molecular Rendering with Medieval and Renaissance Color Theory", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571171/12OmNxj23hk", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/varms-ieeevr/2015/6926/0/07151719", "title": "Visualization of molecular properties at the qantum mechanical level using blender", "doi": null, "abstractUrl": "/proceedings-article/varms-ieeevr/2015/07151719/12OmNy3RRLj", "parentPublication": { "id": "proceedings/varms-ieeevr/2015/6926/0", "title": "2015 IEEE 1st International Workshop on Virtual and Augmented Reality for Molecular Science (VARMS@IEEEVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2016/8815/0/8815a276", "title": "Performance Modeling of In Situ Rendering", "doi": null, "abstractUrl": "/proceedings-article/sc/2016/8815a276/12OmNyTfg9O", "parentPublication": { "id": "proceedings/sc/2016/8815/0", "title": "SC16: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2016/3682/0/3682b048", "title": "Immersive Molecular Visualization with Omnidirectional Stereoscopic Ray Tracing and Remote Rendering", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682b048/12OmNzA6GQL", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/xsw/2013/3691/0/3691a043", "title": "Early experiences scaling VMD molecular visualization and analysis jobs on blue waters", "doi": null, "abstractUrl": "/proceedings-article/xsw/2013/3691a043/12OmNzTppHR", "parentPublication": { "id": "proceedings/xsw/2013/3691/0", "title": "2013 Extreme Scaling Workshop (XSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1996/03/v0186", "title": "RIVA: A Versatile Parallel Rendering System for Interactive Scientific Visualization", "doi": null, "abstractUrl": "/journal/tg/1996/03/v0186/13rRUEgs2BJ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122749", "title": "Sketchy Rendering for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122749/13rRUzp02oj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944369", "title": "PxStream: Remote Visualization for Distributed Rendering Frameworks", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944369/1grOFLtqVIk", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAY79oC", "title": "Computer Vision, Graphics & Image Processing, Indian Conference on", "acronym": "icvgip", "groupId": "1800020", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNyen1vF", "doi": "10.1109/ICVGIP.2008.82", "title": "Real-Time Painterly Rendering of Terrains", "normalizedTitle": "Real-Time Painterly Rendering of Terrains", "abstract": "We present a non-photo realistic, real-time painterly rendering technique for terrains. The painterly appearance and the impression of terrains is created by effectively rendering several brush strokes. The strokes have fixed locations on the surfaces of the terrain during animation to enable frame to frame coherency. The strokes are rendered as alpha blended sprites in two-dimensions and are oriented along the slope of terrain analogous to the way artists paint on canvas. By exploiting the regular nature of terrain data, we create pre-decided rendering depth orders for primitives for any camera orientation. With this, we avoid the necessity of sorting the primitives of sprites required for alpha blending. We use DirectX10/SM4.0 based shaders to render strokes to improve performance. Being distributed on terrain, strokes get cluttered when they are closely located on screen. We follow a level of detail scheme that maintains a uniform stroke density in screen space. Various styles can be achieved with different stroke variations. Phong shading the rendered output in real-time is possible for more varied styles. We achieve painterly rendering in real-time with a combination of object space positioning and image space rendering of strokes. We illustrate our method with images and performance results.", "abstracts": [ { "abstractType": "Regular", "content": "We present a non-photo realistic, real-time painterly rendering technique for terrains. The painterly appearance and the impression of terrains is created by effectively rendering several brush strokes. The strokes have fixed locations on the surfaces of the terrain during animation to enable frame to frame coherency. The strokes are rendered as alpha blended sprites in two-dimensions and are oriented along the slope of terrain analogous to the way artists paint on canvas. By exploiting the regular nature of terrain data, we create pre-decided rendering depth orders for primitives for any camera orientation. With this, we avoid the necessity of sorting the primitives of sprites required for alpha blending. We use DirectX10/SM4.0 based shaders to render strokes to improve performance. Being distributed on terrain, strokes get cluttered when they are closely located on screen. We follow a level of detail scheme that maintains a uniform stroke density in screen space. Various styles can be achieved with different stroke variations. Phong shading the rendered output in real-time is possible for more varied styles. We achieve painterly rendering in real-time with a combination of object space positioning and image space rendering of strokes. We illustrate our method with images and performance results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a non-photo realistic, real-time painterly rendering technique for terrains. The painterly appearance and the impression of terrains is created by effectively rendering several brush strokes. The strokes have fixed locations on the surfaces of the terrain during animation to enable frame to frame coherency. The strokes are rendered as alpha blended sprites in two-dimensions and are oriented along the slope of terrain analogous to the way artists paint on canvas. By exploiting the regular nature of terrain data, we create pre-decided rendering depth orders for primitives for any camera orientation. With this, we avoid the necessity of sorting the primitives of sprites required for alpha blending. We use DirectX10/SM4.0 based shaders to render strokes to improve performance. Being distributed on terrain, strokes get cluttered when they are closely located on screen. We follow a level of detail scheme that maintains a uniform stroke density in screen space. Various styles can be achieved with different stroke variations. Phong shading the rendered output in real-time is possible for more varied styles. We achieve painterly rendering in real-time with a combination of object space positioning and image space rendering of strokes. We illustrate our method with images and performance results.", "fno": "3476a568", "keywords": [ "Non Photorealistic Rendering", "NPR", "Painterly Rendering", "Terrain", "GPU" ], "authors": [ { "affiliation": null, "fullName": "Shiben Bhattacharjee", "givenName": "Shiben", "surname": "Bhattacharjee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "P.J. Narayanan", "givenName": "P.J.", "surname": "Narayanan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvgip", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "568-575", "year": "2008", "issn": null, "isbn": "978-0-7695-3476-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3476a679", "articleId": "12OmNzahckk", "__typename": "AdjacentArticleType" }, "next": { "fno": "3476a576", "articleId": "12OmNwEJ0Jg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2004/2140/0/21400293", "title": "Interactive Point-Based Painterly Rendering", "doi": null, "abstractUrl": "/proceedings-article/cw/2004/21400293/12OmNApcus6", "parentPublication": { "id": "proceedings/cw/2004/2140/0", "title": "2004 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/3/3682c716", "title": "Ringlike Level of Detail in Real-Time Terrain Rendering", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682c716/12OmNBtCCDl", "parentPublication": { "id": "proceedings/esiat/2009/3682/3", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2010/3941/1/3941a198", "title": "Real-Time Rendering for 3D Game Terrain with GPU Optimization", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a198/12OmNBziBaj", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvgip/2008/3476/0/3476a551", "title": "Real-Time Rendering and Manipulation of Large Terrains", "doi": null, "abstractUrl": "/proceedings-article/icvgip/2008/3476a551/12OmNqFrGFh", "parentPublication": { "id": "proceedings/icvgip/2008/3476/0", "title": "Computer Vision, Graphics & Image Processing, Indian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2009/3789/0/3789a180", "title": "Real-time Rendering System of Large-Scale Terrain in Flight Simulation: Design and Implementation", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2009/3789a180/12OmNxWLTiF", "parentPublication": { "id": "proceedings/cgiv/2009/3789/0", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/psivt/2010/4285/0/4285a462", "title": "Artistic Emulation - Filter Blending for Painterly Rendering", "doi": null, "abstractUrl": "/proceedings-article/psivt/2010/4285a462/12OmNyRg48N", "parentPublication": { "id": "proceedings/psivt/2010/4285/0", "title": "Image and Video Technology, Pacific-Rim Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2006/2606/0/26060378", "title": "Enhancement of Moment Based Painterly Rendering Using Connected Components", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2006/26060378/12OmNzAoi1l", "parentPublication": { "id": "proceedings/cgiv/2006/2606/0", "title": "International Conference on Computer Graphics, Imaging and Visualisation (CGIV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispaw/2011/4429/0/4429a055", "title": "Brushstroke Control from Image Saliency", "doi": null, "abstractUrl": "/proceedings-article/ispaw/2011/4429a055/12OmNzXnNsj", "parentPublication": { "id": "proceedings/ispaw/2011/4429/0", "title": "Parallel and Distributed Processing with Applications Workshops, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/02/v0235", "title": "Image-Based Color Ink Diffusion Rendering", "doi": null, "abstractUrl": "/journal/tg/2007/02/v0235/13rRUxASuSC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/01/v0061", "title": "Stylized and Abstract Painterly Rendering System Using a Multiscale Segmented Sphere Hierarchy", "doi": null, "abstractUrl": "/journal/tg/2006/01/v0061/13rRUxBJhFm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2Yv", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNyrqzty", "doi": "10.1109/VISUAL.2000.885729", "title": "Combining Local and Remote Visualization Techniques for Interactive Volume Rendering in Medical Applications", "normalizedTitle": "Combining Local and Remote Visualization Techniques for Interactive Volume Rendering in Medical Applications", "abstract": "For a comprehensive understanding of tomographic image data in medical routine, interactive and high-quality direct volume rendering is an essential prerequisite. This is provided by visualization using 3D texture mapping which is still limited to high-end graphics hardware. In order to make it available in a clinical environment, we present a system which uniquely combines local desktop computers and remote high-end graphics hardware. In this context, we exploit the standard visualization capabilities to a maximum which are available in the clinical environment. For 3D representations of high resolution and quality we access the remote specialized hardware. Various tools for 2D and 3D visualization are provided which meet the requirements of a medical diagnosis. This is demonstrated with examples from the field of neuroradiology which show the value of our strategy in practice.", "abstracts": [ { "abstractType": "Regular", "content": "For a comprehensive understanding of tomographic image data in medical routine, interactive and high-quality direct volume rendering is an essential prerequisite. This is provided by visualization using 3D texture mapping which is still limited to high-end graphics hardware. In order to make it available in a clinical environment, we present a system which uniquely combines local desktop computers and remote high-end graphics hardware. In this context, we exploit the standard visualization capabilities to a maximum which are available in the clinical environment. For 3D representations of high resolution and quality we access the remote specialized hardware. Various tools for 2D and 3D visualization are provided which meet the requirements of a medical diagnosis. This is demonstrated with examples from the field of neuroradiology which show the value of our strategy in practice.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For a comprehensive understanding of tomographic image data in medical routine, interactive and high-quality direct volume rendering is an essential prerequisite. This is provided by visualization using 3D texture mapping which is still limited to high-end graphics hardware. In order to make it available in a clinical environment, we present a system which uniquely combines local desktop computers and remote high-end graphics hardware. In this context, we exploit the standard visualization capabilities to a maximum which are available in the clinical environment. For 3D representations of high resolution and quality we access the remote specialized hardware. Various tools for 2D and 3D visualization are provided which meet the requirements of a medical diagnosis. This is demonstrated with examples from the field of neuroradiology which show the value of our strategy in practice.", "fno": "64780021", "keywords": [ "Medical Data Visualization", "Volume Visualization", "Distributed Systems", "PC Graphics Hardware", "Remote Rendering" ], "authors": [ { "affiliation": "University of Stuttgart", "fullName": "Klaus Engel", "givenName": "Klaus", "surname": "Engel", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stuttgart", "fullName": "Peter Hastreiter", "givenName": "Peter", "surname": "Hastreiter", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stuttgart", "fullName": "Bernd Tomandl", "givenName": "Bernd", "surname": "Tomandl", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stuttgart", "fullName": "Knut E.W. Eberhardt", "givenName": "Knut E.W.", "surname": "Eberhardt", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Stuttgart", "fullName": "Thomas Ertl", "givenName": "Thomas", "surname": "Ertl", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "21", "year": "2000", "issn": "1070-2385", "isbn": "0-7803-6478-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "64780020", "articleId": "12OmNA0vnOj", "__typename": "AdjacentArticleType" }, "next": { "fno": "64780022", "articleId": "12OmNrYCY0N", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sccompanion/2012/4956/0/4956b481", "title": "Poster: Remote Visualization for Large-Scale Simulation Using Particle-Based Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/sccompanion/2012/4956b481/12OmNAoUTbm", "parentPublication": { "id": "proceedings/sccompanion/2012/4956/0", "title": "2012 SC Companion: High Performance Computing, Networking Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910006", "title": "SLIC: Scheduled Linear Image Compositing for Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910006/12OmNCdBDUq", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/2/3682b575", "title": "Rapid Texture-based Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682b575/12OmNx7G5VW", "parentPublication": { "id": "esiat/2009/3682/2", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccompanion/2012/4956/0/4956b479", "title": "Abstract: Remote Visualization for Large-Scale Simulation Using Particle-Based Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/sccompanion/2012/4956b479/12OmNxGSmft", "parentPublication": { "id": "proceedings/sccompanion/2012/4956/0", "title": "2012 SC Companion: High Performance Computing, Networking Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910010", "title": "Real-Time Volume Rendering of Time-Varying Data Using a Fragment-Shader Compression Approach", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910010/12OmNyaGeMm", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1995/7187/0/71870011", "title": "Interactive Maximum Projection Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870011/12OmNzZmZv2", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1995/04/mcg1995040047", "title": "Preprocessing and Volume Rendering of 3D Ultrasonic Data", "doi": null, "abstractUrl": "/magazine/cg/1995/04/mcg1995040047/13rRUNvPLce", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1648", "title": "Uncertainty Visualization in Medical Volume Rendering Using Probabilistic Animation", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1648/13rRUwh80H4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122946", "title": "Lighting Design for Globally Illuminated Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122946/13rRUwvBy8U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2005/03/mcg2005030031", "title": "Illustration Motifs for Effective Medical Volume Illustration", "doi": null, "abstractUrl": "/magazine/cg/2005/03/mcg2005030031/13rRUyft7x2", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxQOjzF", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNzBOhZy", "doi": "10.1109/IV.2003.1217947", "title": "Proceedings Seventh International Conference on Information Visualization - IV 2003 - International Conference on Computer Visualization and Graphics Applications", "normalizedTitle": "Proceedings Seventh International Conference on Information Visualization - IV 2003 - International Conference on Computer Visualization and Graphics Applications", "abstract": "The following topics are dealt with: computer graphics application; rendering; visual data mining; digital art; graph theory application; geovisualization; Web graphics; semantic Web visualization; medical information visualization; business information visualization; collaborative information visualization; augmented virtual reality; multimedia visualization.", "abstracts": [ { "abstractType": "Regular", "content": "The following topics are dealt with: computer graphics application; rendering; visual data mining; digital art; graph theory application; geovisualization; Web graphics; semantic Web visualization; medical information visualization; business information visualization; collaborative information visualization; augmented virtual reality; multimedia visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The following topics are dealt with: computer graphics application; rendering; visual data mining; digital art; graph theory application; geovisualization; Web graphics; semantic Web visualization; medical information visualization; business information visualization; collaborative information visualization; augmented virtual reality; multimedia visualization.", "fno": "01217947", "keywords": [ "Data Visualisation", "Rendering Computer Graphics", "Data Mining", "Art", "Medical Computing", "Graph Theory", "Geophysics Computing", "Internet", "Business Data Processing", "Groupware", "Virtual Reality", "Multimedia Computing", "Computer Graphics Application", "Rendering", "Visual Data Mining", "Digital Art", "Graph Theory Application", "Geovisualization", "Web Graphics", "Semantic Web Visualization", "Medical Information Visualization", "Business Information Visualization", "Collaborative Information Visualization", "Augmented Virtual Reality", "Multimedia Visualization", "Visualization", "Rendering Computer Graphics", "Art", "Biomedical Computing", "Graph Theory", "Internet", "Business Data Processing", "Collaborative Work", "Virtual Reality", "Multimedia Computing" ], "authors": [], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2003", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": null, "next": { "fno": "1988xii", "articleId": "12OmNwIYZDF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/nicoint/2016/2305/0/2305a135", "title": "The Analysis of Physical Visualization in Artistic Creation", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a135/12OmNAnuTkv", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2003/1960/1/01227617", "title": "Proceedings Seventh International Conference on Document Analysis and Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2003/01227617/12OmNButq7v", "parentPublication": { "id": "proceedings/icdar/2003/1960/1", "title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ds-rt/2003/2036/0/01242989", "title": "Proceedings Seventh IEEE International Symposium on Distributed Simulation and Real-Time Applications", "doi": null, "abstractUrl": "/proceedings-article/ds-rt/2003/01242989/12OmNCf1DsY", "parentPublication": { "id": "proceedings/ds-rt/2003/2036/0", "title": "Distributed Simulation and Real Time Applications, IEEE/ACM International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/collaboratecom/2009/9999/0/05364933", "title": "Comparing visualization techniques to structure collaborative concepts", "doi": null, "abstractUrl": "/proceedings-article/collaboratecom/2009/05364933/12OmNvzJGeV", "parentPublication": { "id": "proceedings/collaboratecom/2009/9999/0", "title": "2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dodugc/2005/2496/0/24960388", "title": "Performance Comparisons of Visualization Architectures", "doi": null, "abstractUrl": "/proceedings-article/dodugc/2005/24960388/12OmNxX3urW", "parentPublication": { "id": "proceedings/dodugc/2005/2496/0", "title": "2005 Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2003/1960/0/01227617", "title": "Proceedings Seventh International Conference on Document Analysis and Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2003/01227617/12OmNy6qfPp", "parentPublication": { "id": "proceedings/icdar/2003/1960/0", "title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2003/1967/0/01215012", "title": "Proceedings 3rd IEEE International Conference on Advanced Technologies", "doi": null, "abstractUrl": "/proceedings-article/icalt/2003/01215012/12OmNyQYthD", "parentPublication": { "id": "proceedings/icalt/2003/1967/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2003/1960/2/01227617", "title": "Proceedings Seventh International Conference on Document Analysis and Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2003/01227617/12OmNzXWZMU", "parentPublication": { "id": "proceedings/icdar/2003/1960/2", "title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700z019", "title": "D-Art Gallery: IV 2022", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700z019/1KaH25455mw", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2004/8788/0/01372243", "title": "Panel 1: Can We Determine the Top Unresolved Problems of Visualization?", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/01372243/1htBtc8KENO", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAiScQ", "doi": "10.1109/IV.2016.61", "title": "Evaluation of Sketchiness as a Visual Variable for 2.5D Treemaps", "normalizedTitle": "Evaluation of Sketchiness as a Visual Variable for 2.5D Treemaps", "abstract": "Treemaps serve as generic, effective tools to display, explore, and analyze multi-variate tree data in a scalable, interactive, and consistent way. In this paper, we discuss and evaluate sketchiness as visual variable of 2.5D treemaps. Sketchy rendering techniques allow us to map data, e.g., about uncertainty, imprecision, or vagueness, independently from mappings to other visual variables such as size, color, and height. To this end, we present a design space for sketchy rendering for 2.5D treemaps and corresponding implementation of a real-time sketchy rendering technique. The results of three user studies carried out indicate that sketchiness is a promising candidate for an independent visual variable for 2.5D treemaps, in particular to map ordinal data with a small range such as data that qualifies map items, it shows no strong interference with other visual variables such as color and height due to the regular gestalt of blocks and, hence, allows us to extend the expressiveness of 2.5D treemaps.", "abstracts": [ { "abstractType": "Regular", "content": "Treemaps serve as generic, effective tools to display, explore, and analyze multi-variate tree data in a scalable, interactive, and consistent way. In this paper, we discuss and evaluate sketchiness as visual variable of 2.5D treemaps. Sketchy rendering techniques allow us to map data, e.g., about uncertainty, imprecision, or vagueness, independently from mappings to other visual variables such as size, color, and height. To this end, we present a design space for sketchy rendering for 2.5D treemaps and corresponding implementation of a real-time sketchy rendering technique. The results of three user studies carried out indicate that sketchiness is a promising candidate for an independent visual variable for 2.5D treemaps, in particular to map ordinal data with a small range such as data that qualifies map items, it shows no strong interference with other visual variables such as color and height due to the regular gestalt of blocks and, hence, allows us to extend the expressiveness of 2.5D treemaps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Treemaps serve as generic, effective tools to display, explore, and analyze multi-variate tree data in a scalable, interactive, and consistent way. In this paper, we discuss and evaluate sketchiness as visual variable of 2.5D treemaps. Sketchy rendering techniques allow us to map data, e.g., about uncertainty, imprecision, or vagueness, independently from mappings to other visual variables such as size, color, and height. To this end, we present a design space for sketchy rendering for 2.5D treemaps and corresponding implementation of a real-time sketchy rendering technique. The results of three user studies carried out indicate that sketchiness is a promising candidate for an independent visual variable for 2.5D treemaps, in particular to map ordinal data with a small range such as data that qualifies map items, it shows no strong interference with other visual variables such as color and height due to the regular gestalt of blocks and, hence, allows us to extend the expressiveness of 2.5D treemaps.", "fno": "8942a183", "keywords": [ "Data Visualisation", "Rendering Computer Graphics", "Sketchiness Evaluation", "Visual Variable", "2 5 D Treemaps", "Multivariate Tree Data Analysis", "Design Space", "Real Time Sketchy Rendering Technique", "Ordinal Data Mapping", "Visualization", "Rendering Computer Graphics", "Image Color Analysis", "Three Dimensional Displays", "Uncertainty", "Real Time Systems", "Software", "Treemap", "Sketchiness", "Visual Variable", "Uncertainty", "Visual Analytics", "Real Time Rendering" ], "authors": [ { "affiliation": null, "fullName": "Daniel Limberger", "givenName": "Daniel", "surname": "Limberger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carolin Fiedler", "givenName": "Carolin", "surname": "Fiedler", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sebastian Hahn", "givenName": "Sebastian", "surname": "Hahn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthias Trapp", "givenName": "Matthias", "surname": "Trapp", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jürgen Döllner", "givenName": "Jürgen", "surname": "Döllner", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "183-189", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a177", "articleId": "12OmNBiygBo", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a190", "articleId": "12OmNzt0IP6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a164", "title": "Mixed-Projection Treemaps: A Novel Approach Mixing 2D and 2.5D Treemaps", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a164/12OmNxWLTmv", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019293", "title": "Animating pictures using procedural 2.5D water flow simulation", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019293/12OmNzvz6Hl", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/02/ttg2013020225", "title": "Double-Sided 2.5D Graphics", "doi": null, "abstractUrl": "/journal/tg/2013/02/ttg2013020225/13rRUEgs2M0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122769", "title": "Evaluating Sketchiness as a Visual Variable for the Depiction of Qualitative Uncertainty", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122769/13rRUxlgy3F", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017613", "title": "Bubble Treemaps for Uncertainty Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017613/13rRUyuvRoQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122749", "title": "Sketchy Rendering for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122749/13rRUzp02oj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08443124", "title": "Temporal Treemaps: Static Visualization of Evolving Trees", "doi": null, "abstractUrl": "/journal/tg/2019/01/08443124/17D45Wda7eb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300a324", "title": "2.5D Visual Sound", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300a324/1gyr7Ur9QLC", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086235", "title": "Uncertainty Treemaps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086235/1kuHly3FEwU", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a080", "title": "BDLoc: Global Localization from 2.5D Building Map", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a080/1yeCVFqROFO", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVbR", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNvqmUJz", "doi": "10.1109/ICME.2013.6607572", "title": "Video saliency incorporating spatiotemporal cues and uncertainty weighting", "normalizedTitle": "Video saliency incorporating spatiotemporal cues and uncertainty weighting", "abstract": "We propose a method to detect visual saliency from video signals by combing both spatial and temporal information and statistical uncertainty measures. The main novelty of the proposed method is twofold. First, separate spatial and temporal saliency maps are generated, where the computation of temporal saliency incorporates a recent psychological study of human visual speed perception, where the perceptual prior probability distribution of the speed of motion is measured through a series of psychovisual experiments. Second, the spatial and temporal saliency maps are merged into one using a spatiotemporally adaptive entropy-based uncertainty weighting approach. Experimental results show that the proposed method significantly outperforms state-of-the-art video saliency detection models.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a method to detect visual saliency from video signals by combing both spatial and temporal information and statistical uncertainty measures. The main novelty of the proposed method is twofold. First, separate spatial and temporal saliency maps are generated, where the computation of temporal saliency incorporates a recent psychological study of human visual speed perception, where the perceptual prior probability distribution of the speed of motion is measured through a series of psychovisual experiments. Second, the spatial and temporal saliency maps are merged into one using a spatiotemporally adaptive entropy-based uncertainty weighting approach. Experimental results show that the proposed method significantly outperforms state-of-the-art video saliency detection models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a method to detect visual saliency from video signals by combing both spatial and temporal information and statistical uncertainty measures. The main novelty of the proposed method is twofold. First, separate spatial and temporal saliency maps are generated, where the computation of temporal saliency incorporates a recent psychological study of human visual speed perception, where the perceptual prior probability distribution of the speed of motion is measured through a series of psychovisual experiments. Second, the spatial and temporal saliency maps are merged into one using a spatiotemporally adaptive entropy-based uncertainty weighting approach. Experimental results show that the proposed method significantly outperforms state-of-the-art video saliency detection models.", "fno": "06607572", "keywords": [ "Uncertainty", "Visualization", "Computational Modeling", "Spatiotemporal Phenomena", "Feature Extraction", "Image Color Analysis", "Measurement Uncertainty", "Uncertainty Weighting", "Visual Attention", "Video Saliency", "Spatiotemporal Saliency Detection" ], "authors": [ { "affiliation": "School of Computer Engineering, Nanyang Technological University, Singapore", "fullName": "Yuming Fang", "givenName": "Yuming", "surname": "Fang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Waterloo, ON, Canada", "fullName": "Zhou Wang", "givenName": "Zhou", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering, Nanyang Technological University, Singapore", "fullName": "Weisi Lin", "givenName": "Weisi", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2013", "issn": "1945-7871", "isbn": "978-1-4799-0015-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06607571", "articleId": "12OmNqI04FB", "__typename": "AdjacentArticleType" }, "next": { "fno": "06607573", "articleId": "12OmNyrIay0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2007/1016/0/04285023", "title": "An Information Theoretic Model of Spatiotemporal Visual Saliency", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04285023/12OmNBv2ChM", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2015/7079/0/07169845", "title": "Video saliency map detection based on global motion estimation", "doi": null, "abstractUrl": "/proceedings-article/icmew/2015/07169845/12OmNqzcvEY", "parentPublication": { "id": "proceedings/icmew/2015/7079/0", "title": "2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2017/0560/0/08026300", "title": "SpatioTemporal utilization of deep features for video saliency detection", "doi": null, "abstractUrl": "/proceedings-article/icmew/2017/08026300/12OmNwDACx6", "parentPublication": { "id": "proceedings/icmew/2017/0560/0", "title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2017/4062/0/08054898", "title": "Pattern mining based video saliency detection", "doi": null, "abstractUrl": "/proceedings-article/iscv/2017/08054898/12OmNxd4tlx", "parentPublication": { "id": "proceedings/iscv/2017/4062/0", "title": "2017 Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a248", "title": "Video Retargeting Based on Adaptive Spatiotemporal Saliency Mapping", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a248/12OmNz5JC6y", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2012/4711/0/4711a158", "title": "Spatiotemporal Saliency Detection via Sparse Representation", "doi": null, "abstractUrl": "/proceedings-article/icme/2012/4711a158/12OmNzAoi3b", "parentPublication": { "id": "proceedings/icme/2012/4711/0", "title": "2012 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206525", "title": "Dense saliency-based spatiotemporal feature points for action recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206525/12OmNzVGcSQ", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/01/ttp2010010171", "title": "Spatiotemporal Saliency in Dynamic Scenes", "doi": null, "abstractUrl": "/journal/tp/2010/01/ttp2010010171/13rRUB6Sq1w", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2018/5321/0/08499257", "title": "Saliency-Based Spatiotemporal Attention for Video Captioning", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499257/17D45WLdYRP", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a328", "title": "Target Tracking Based on Spatiotemporal Saliency and Multiscale Appearance Cue Fusion", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a328/1KYt0aYr3by", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyQd", "title": "Image and Video Technology, Pacific-Rim Symposium on", "acronym": "psivt", "groupId": "1800241", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNylKAU1", "doi": "10.1109/PSIVT.2010.63", "title": "Color to Gray: Attention Preservation", "normalizedTitle": "Color to Gray: Attention Preservation", "abstract": "In this paper, we propose an approach to preserve a crucial visual cue in color to grayscale transformation: attention. The main contributions are three folds: 1) preserving visual attention is more biological plausible than preserving other low level cues, which makes our method more reasonable in theory from both biological and psychological aspects, 2) We treat the saliency map from visual attention analysis as a classifier and aim to preserve attention area in the output grayscale image. 3) A simple minimizing function toward this specific problem is established and can be easily solved. Experimental results on test images indicate that our method is both practical and effective in preserving visual attention from the original color image to corresponding grayscale image.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose an approach to preserve a crucial visual cue in color to grayscale transformation: attention. The main contributions are three folds: 1) preserving visual attention is more biological plausible than preserving other low level cues, which makes our method more reasonable in theory from both biological and psychological aspects, 2) We treat the saliency map from visual attention analysis as a classifier and aim to preserve attention area in the output grayscale image. 3) A simple minimizing function toward this specific problem is established and can be easily solved. Experimental results on test images indicate that our method is both practical and effective in preserving visual attention from the original color image to corresponding grayscale image.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose an approach to preserve a crucial visual cue in color to grayscale transformation: attention. The main contributions are three folds: 1) preserving visual attention is more biological plausible than preserving other low level cues, which makes our method more reasonable in theory from both biological and psychological aspects, 2) We treat the saliency map from visual attention analysis as a classifier and aim to preserve attention area in the output grayscale image. 3) A simple minimizing function toward this specific problem is established and can be easily solved. Experimental results on test images indicate that our method is both practical and effective in preserving visual attention from the original color image to corresponding grayscale image.", "fno": "4285a337", "keywords": [ "Color To Gray", "Visual Attention" ], "authors": [ { "affiliation": null, "fullName": "Yezhou Yang", "givenName": "Yezhou", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mingli Song", "givenName": "Mingli", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiajun Bu", "givenName": "Jiajun", "surname": "Bu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chun Chen", "givenName": "Chun", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cheng Jin", "givenName": "Cheng", "surname": "Jin", "__typename": "ArticleAuthorType" } ], "idPrefix": "psivt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-11-01T00:00:00", "pubType": "proceedings", "pages": "337-342", "year": "2010", "issn": null, "isbn": "978-0-7695-4285-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4285a331", "articleId": "12OmNB9t6tp", "__typename": "AdjacentArticleType" }, "next": { "fno": "4285a343", "articleId": "12OmNAtaRWG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcai/2009/3615/0/3615a390", "title": "Bayesian Visual Inference and Attention", "doi": null, "abstractUrl": "/proceedings-article/jcai/2009/3615a390/12OmNApLGPo", "parentPublication": { "id": "proceedings/jcai/2009/3615/0", "title": "2009 International Joint Conference on Artificial Intelligence (JCAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2001/1195/0/11950085", "title": "Query by Attention: Visually Searchable Information Maps", "doi": null, "abstractUrl": "/proceedings-article/iv/2001/11950085/12OmNC4eSGU", "parentPublication": { "id": "proceedings/iv/2001/1195/0", "title": "Proceedings Fifth International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2000/0878/0/08780036", "title": "A Visual Attention Model for Tracking Regions Based on Color Correlograms", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2000/08780036/12OmNwl8GIr", "parentPublication": { "id": "proceedings/sibgrapi/2000/0878/0", "title": "Proceedings 13th Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00878)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997d840", "title": "Construction of a Course Video Resource System Based on Students' Visual Attention", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997d840/12OmNybfqYn", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/3982/2/3982b196", "title": "Color Image to Grayscale Image Conversion", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/3982b196/12OmNzV70CO", "parentPublication": { "id": "proceedings/iccea/2010/3982/2", "title": "Computer Engineering and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2011/4607/1/4607a096", "title": "An Attention-Based Image Retrieval System", "doi": null, "abstractUrl": "/proceedings-article/icmla/2011/4607a096/12OmNzXFoHO", "parentPublication": { "id": "proceedings/icmla/2011/4607/1", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a261", "title": "A Hybrid Visual Attention Method Based on Itti Model", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a261/12OmNzYwc20", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2018/5892/0/08466453", "title": "Color Image Enhancement with Preservation of Gamut Range", "doi": null, "abstractUrl": "/proceedings-article/icis/2018/08466453/13WBGNqsOYg", "parentPublication": { "id": "proceedings/icis/2018/5892/0", "title": "2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/09/ttp2010091537", "title": "Color to Gray: Visual Cue Preservation", "doi": null, "abstractUrl": "/journal/tp/2010/09/ttp2010091537/13rRUwbaqMF", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05963660", "title": "Attention and Visual Memory in Visualization and Computer Graphics", "doi": null, "abstractUrl": "/journal/tg/2012/07/05963660/13rRUxBa5xf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0Gha6BQ4", "doi": "10.1109/VR.2019.8798194", "title": "Augmented Concentration: Concentration Improvement by Visual Noise Reduction with a Video See-Through HMD", "normalizedTitle": "Augmented Concentration: Concentration Improvement by Visual Noise Reduction with a Video See-Through HMD", "abstract": "We propose a concentration improvement technique by using a video see-through head mounted display (HMD). Our technique reduces the visual noise or disturbing visual stimulus, such as moving objects near the central visual field, by lowering its visual saliency in real-time. Earphones and noise cancelling headphones are often used to shutdown auditory noise from surroundings when we need to concentrate on the job. Several studies have proven the effectiveness of such noise reduction on improving the concentration and learning efficiencies. We apply this analogy to the visual noise and propose a visual noise reduction HMD to improve concentration. In this article, we report on two preliminary user studies we conducted to investigate the effectiveness of our method. In the prototype system, we manually specify a part of the visual field as the working area and apply grayscale and blur filters outside it in real-time. We compared two conditions “no effect” and “strong blur” (for Exp 1) or “weak blur” (for Exp 2), using a simple math task. Our preliminary results show that visual noise reduction improves the task completion time by 10% for Exp 1 and 7.9% for Exp 2 on average.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a concentration improvement technique by using a video see-through head mounted display (HMD). Our technique reduces the visual noise or disturbing visual stimulus, such as moving objects near the central visual field, by lowering its visual saliency in real-time. Earphones and noise cancelling headphones are often used to shutdown auditory noise from surroundings when we need to concentrate on the job. Several studies have proven the effectiveness of such noise reduction on improving the concentration and learning efficiencies. We apply this analogy to the visual noise and propose a visual noise reduction HMD to improve concentration. In this article, we report on two preliminary user studies we conducted to investigate the effectiveness of our method. In the prototype system, we manually specify a part of the visual field as the working area and apply grayscale and blur filters outside it in real-time. We compared two conditions “no effect” and “strong blur” (for Exp 1) or “weak blur” (for Exp 2), using a simple math task. Our preliminary results show that visual noise reduction improves the task completion time by 10% for Exp 1 and 7.9% for Exp 2 on average.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a concentration improvement technique by using a video see-through head mounted display (HMD). Our technique reduces the visual noise or disturbing visual stimulus, such as moving objects near the central visual field, by lowering its visual saliency in real-time. Earphones and noise cancelling headphones are often used to shutdown auditory noise from surroundings when we need to concentrate on the job. Several studies have proven the effectiveness of such noise reduction on improving the concentration and learning efficiencies. We apply this analogy to the visual noise and propose a visual noise reduction HMD to improve concentration. In this article, we report on two preliminary user studies we conducted to investigate the effectiveness of our method. In the prototype system, we manually specify a part of the visual field as the working area and apply grayscale and blur filters outside it in real-time. We compared two conditions “no effect” and “strong blur” (for Exp 1) or “weak blur” (for Exp 2), using a simple math task. Our preliminary results show that visual noise reduction improves the task completion time by 10% for Exp 1 and 7.9% for Exp 2 on average.", "fno": "08798194", "keywords": [ "Earphones", "Headphones", "Helmet Mounted Displays", "Image Denoising", "Augmented Concentration", "Concentration Improvement Technique", "Head Mounted Display", "Central Visual Field", "Visual Saliency", "Noise Cancelling Headphones", "Learning Efficiencies", "Visual Noise Reduction HMD", "Visual Stimulus", "Video See Through HMD", "Visualization", "Streaming Media", "Task Analysis", "Resists", "Gray Scale", "Noise Reduction", "Noise Measurement", "Human Centered Computing", "Human Computer Interaction HCI", "Interaction Paradigms", "Mixed Augmented Reality", "Computing Methodologies", "Computer Graphics", "Graphics Systems And Interfaces", "Perception" ], "authors": [ { "affiliation": "Nara Institute of Science and Technology, Japan", "fullName": "Masaki Koshi", "givenName": "Masaki", "surname": "Koshi", "__typename": "ArticleAuthorType" }, { "affiliation": "Nara Institute of Science and Technology, Japan", "fullName": "Nobuchika Sakata", "givenName": "Nobuchika", "surname": "Sakata", "__typename": "ArticleAuthorType" }, { "affiliation": "Nara Institute of Science and Technology, Japan", "fullName": "Kiyoshi Kiyokawa", "givenName": "Kiyoshi", "surname": "Kiyokawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1030-1031", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08798346", "articleId": "1cJ0NSIEQda", "__typename": "AdjacentArticleType" }, "next": { "fno": "08798139", "articleId": "1cJ157IzTri", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/003P1A03", "title": "Motion-aware noise filtering for deblurring of noisy and blurry images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/003P1A03/12OmNAmmuOf", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2013/5033/0/06686367", "title": "A Novel Method of Medical Image Denoising Using Bilateral and NLm Filtering", "doi": null, "abstractUrl": "/proceedings-article/icacc/2013/06686367/12OmNBqMDzU", "parentPublication": { "id": "proceedings/icacc/2013/5033/0", "title": "2013 Third International Conference on Advances in Computing and Communications (ICACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890296", "title": "Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890296/12OmNqIzh0V", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2010/4271/0/4271a417", "title": "Improved Reconstruction of Flutter Shutter Images for Motion Blur Reduction", "doi": null, "abstractUrl": "/proceedings-article/dicta/2010/4271a417/12OmNx3HIac", "parentPublication": { "id": "proceedings/dicta/2010/4271/0", "title": "2010 International Conference on Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c870", "title": "Using Projection Kurtosis Concentration of Natural Images for Blind Noise Covariance Matrix Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c870/12OmNyRPgxi", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/1/3583a206", "title": "Design and Noise Control of the Portable Wear Debris Concentration Detector", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583a206/12OmNyuy9NC", "parentPublication": { "id": "proceedings/icmtma/2009/3583/3", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d291", "title": "Learning to See in the Dark", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d291/17D45VUZMVg", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859632", "title": "A Noise-Aware Framework for Blind Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859632/1G9Eys1sYog", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09874254", "title": "Gaze-Vergence-Controlled See-Through Vision in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2022/11/09874254/1GjwOCjuXkY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900l1931", "title": "Digital Gimbal: End-to-end Deep Image Stabilization with Learnable Exposure Times", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900l1931/1yeJTKHiG76", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hrMyj7tm00", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hrMA4QhVkc", "doi": "10.1109/VAST47406.2019.8986930", "title": "HeatMosaic: Interactive Uncertainty Analysis of Disaster Events - 2019 VAST Challenge Honorable Mention Award for Visualization of Uncertainty", "normalizedTitle": "HeatMosaic: Interactive Uncertainty Analysis of Disaster Events - 2019 VAST Challenge Honorable Mention Award for Visualization of Uncertainty", "abstract": "The visual analytics system HeatMosaic aims to reveal spatial-temporal patterns and uncertainty from a large dataset of crowd-sourcing disaster damage reports. The system consists of real-time monitoring and aftermath analysis tools does not empower fast discovering adversity and damage patterns and reliable removal of uncertainty, but also provides just-in-time scanning and rewinding on damage reports. This paper summarises the system's design and architecture, followed by the data interpretation and insights gained by adopting the system.", "abstracts": [ { "abstractType": "Regular", "content": "The visual analytics system HeatMosaic aims to reveal spatial-temporal patterns and uncertainty from a large dataset of crowd-sourcing disaster damage reports. The system consists of real-time monitoring and aftermath analysis tools does not empower fast discovering adversity and damage patterns and reliable removal of uncertainty, but also provides just-in-time scanning and rewinding on damage reports. This paper summarises the system's design and architecture, followed by the data interpretation and insights gained by adopting the system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The visual analytics system HeatMosaic aims to reveal spatial-temporal patterns and uncertainty from a large dataset of crowd-sourcing disaster damage reports. The system consists of real-time monitoring and aftermath analysis tools does not empower fast discovering adversity and damage patterns and reliable removal of uncertainty, but also provides just-in-time scanning and rewinding on damage reports. This paper summarises the system's design and architecture, followed by the data interpretation and insights gained by adopting the system.", "fno": "08986930", "keywords": [ "Cartography", "Data Analysis", "Data Visualisation", "Disasters", "Emergency Management", "Aftermath Analysis Tools", "Damage Patterns", "Just In Time Scanning", "Interactive Uncertainty Analysis", "Disaster Events", "2019 VAST Challenge Honorable Mention Award", "Spatial Temporal Patterns", "Crowd Sourcing Disaster Damage Reports", "Real Time Monitoring", "Heat Mosaic Visual Analytics System", "Heating Systems", "Strips", "Uncertainty", "Image Color Analysis", "Real Time Systems", "Earthquakes", "Seismic Measurements", "Human Centered Computing", "Visualization", "Visualization Techniques", "Heat Maps", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Cerebri AI, Inc.,Austin,TX,USA", "fullName": "Wenjie Wu", "givenName": "Wenjie", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Cerebri AI, Inc.,Austin,TX,USA", "fullName": "Zheng Zhou", "givenName": "Zheng", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University,Department of Computer Graphics Technology,West Lafayette,IN,USA", "fullName": "Yingjie Victor Chen", "givenName": "Yingjie Victor", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University,Department of Industrial and Interaction Design,West Lafayette,IN,USA", "fullName": "Zhenyu Cheryl Qian", "givenName": "Zhenyu Cheryl", "surname": "Qian", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "112-113", "year": "2019", "issn": null, "isbn": "978-1-7281-2284-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08986919", "articleId": "1hrMA8BTNni", "__typename": "AdjacentArticleType" }, "next": { "fno": "08986939", "articleId": "1hrMyq3vE3K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400515", "title": "Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400515/12OmNBNM8T6", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400521", "title": "Visualizing large scale patterns and anomalies in geospatial data: VAST 2012 Mini Challenge #1 award: Honorable mention for good visual design", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400521/12OmNCwlalT", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400519", "title": "Enhancing the “think loop process” with consistent interactions: VAST 2012 Mini Challenge 1 award: Honorable mention for good interaction techniques", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400519/12OmNvmG7Uf", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400516", "title": "NetSecRadar: A real-time visualization system for network security - VAST 2012 Mini Challenge. Award: Honorable mention for interesting use of radial visualization technique", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400516/12OmNwEJ0Cj", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042565", "title": "Safeguarding Abila: Spatio-temporal activity modeling VAST 2014 Mini Challenge 2 award: Honorable mention for effective presentation", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042565/12OmNzIl3tK", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a037", "title": "Extreme Scale Earthquake Simulation with Uncertainty Quantification", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a037/1I0bSKzWyk0", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a037", "title": "Extreme Scale Earthquake Simulation with Uncertainty Quantification", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a037/1L07oBLJLoc", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2019/2284/0/08986938", "title": "MC2 - SUA: A Sensor Uncertainty Analysis Tool of Radiation Measurement Data (VAST Challenge 2019 Award - Integrated Tool with Rich Data Encodings)", "doi": null, "abstractUrl": "/proceedings-article/vast/2019/08986938/1hrMyIXOZgc", "parentPublication": { "id": "proceedings/vast/2019/2284/0", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2019/2284/0/08986916", "title": "Earthquake Damage Report Interactive Dashboard Using Bayesian Structural Time Series and Value-Suppressing Uncertainty Palettes", "doi": null, "abstractUrl": "/proceedings-article/vast/2019/08986916/1hrMzArvpDO", "parentPublication": { "id": "proceedings/vast/2019/2284/0", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a778", "title": "UGLLI Face Alignment: Estimating Uncertainty with Gaussian Log-Likelihood Loss", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a778/1i5mD4Vpsas", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyYm2vR", "title": "Multimedia Computing and Systems, International Conference on", "acronym": "icmcs", "groupId": "1000479", "volume": "1", "displayVolume": "1", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNqFrGxW", "doi": "10.1109/MMCS.1999.779238", "title": "Multimodal Integration in the Muesli Project", "normalizedTitle": "Multimodal Integration in the Muesli Project", "abstract": "The rapid acceptance of the World Wide Web (WWW) has led to a lot of interest in the use of online shopping or e-commerce. This is driving forward new interface designs which offer a more natural and human-like interaction. MUeSLI is a system which allows a user to browse through fabrics and apply them to a virtual sitting room by talking to a synthetic persona and touching objects and fabrics in the room. This paper outlines the programme and progress of the MUeSLI project currently being undertaken at BT Laboratories. The main focus of the project is the integration of two or more modes of interaction within a real-world application. The application has been through a number of iterations: a focus group, Wizard of Oz trials and is currently being developed into a fully automatic system. The development of the architecture has highlighted the complexities surrounding the interpretation of more than one mode, and a number of pertinent issues are discussed. Further trials, eventually using members of the public, will allow us to investigate the effective design of robust interfaces.", "abstracts": [ { "abstractType": "Regular", "content": "The rapid acceptance of the World Wide Web (WWW) has led to a lot of interest in the use of online shopping or e-commerce. This is driving forward new interface designs which offer a more natural and human-like interaction. MUeSLI is a system which allows a user to browse through fabrics and apply them to a virtual sitting room by talking to a synthetic persona and touching objects and fabrics in the room. This paper outlines the programme and progress of the MUeSLI project currently being undertaken at BT Laboratories. The main focus of the project is the integration of two or more modes of interaction within a real-world application. The application has been through a number of iterations: a focus group, Wizard of Oz trials and is currently being developed into a fully automatic system. The development of the architecture has highlighted the complexities surrounding the interpretation of more than one mode, and a number of pertinent issues are discussed. Further trials, eventually using members of the public, will allow us to investigate the effective design of robust interfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The rapid acceptance of the World Wide Web (WWW) has led to a lot of interest in the use of online shopping or e-commerce. This is driving forward new interface designs which offer a more natural and human-like interaction. MUeSLI is a system which allows a user to browse through fabrics and apply them to a virtual sitting room by talking to a synthetic persona and touching objects and fabrics in the room. This paper outlines the programme and progress of the MUeSLI project currently being undertaken at BT Laboratories. The main focus of the project is the integration of two or more modes of interaction within a real-world application. The application has been through a number of iterations: a focus group, Wizard of Oz trials and is currently being developed into a fully automatic system. The development of the architecture has highlighted the complexities surrounding the interpretation of more than one mode, and a number of pertinent issues are discussed. Further trials, eventually using members of the public, will allow us to investigate the effective design of robust interfaces.", "fno": "02539407", "keywords": [ "Multimodal Spoken Dialogue Wizard Of Oz" ], "authors": [ { "affiliation": "BT Laboratories", "fullName": "Gavin E Churcher", "givenName": "Gavin E", "surname": "Churcher", "__typename": "ArticleAuthorType" }, { "affiliation": "BT Laboratories", "fullName": "Peter J Wyard", "givenName": "Peter J", "surname": "Wyard", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmcs", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-06-01T00:00:00", "pubType": "proceedings", "pages": "9407", "year": "1999", "issn": "1530-2032", "isbn": "0-7695-0253-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02539400", "articleId": "12OmNBUS77C", "__typename": "AdjacentArticleType" }, "next": { "fno": "02539413", "articleId": "12OmNzcxYWe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNA0MYZ9", "title": "Proceedings. Ninth International Workshop on Frontiers in Handwriting Recognition", "acronym": "iwfhr", "groupId": "1000298", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJRPnW", "doi": "10.1109/IWFHR.2004.106", "title": "Use of Chatroom Abbreviations and Shorthand Symbols in Pen Computing", "normalizedTitle": "Use of Chatroom Abbreviations and Shorthand Symbols in Pen Computing", "abstract": "This paper describes an efficient system for entering data into a pen-enabled computer, particularly handheld devices. While keyboard input typically is faster than handwriting input, this is not true for the small PDA interfaces. For this reason, we designed and developed a prototype that uses chatroom abbreviations and shorthand symbols to increase the speed of data entry for these devices. This system was also developed as a prototype system that would enable persons with speech impairments to rapidly convert hand-drawn symbols on a pen-enabled device into speech output. We created a library of chatroom abbreviations and shorthand symbols, and developed a k-nn classification system to recognize the symbols. Experimental results show the effectiveness of the system in terms of speed and accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes an efficient system for entering data into a pen-enabled computer, particularly handheld devices. While keyboard input typically is faster than handwriting input, this is not true for the small PDA interfaces. For this reason, we designed and developed a prototype that uses chatroom abbreviations and shorthand symbols to increase the speed of data entry for these devices. This system was also developed as a prototype system that would enable persons with speech impairments to rapidly convert hand-drawn symbols on a pen-enabled device into speech output. We created a library of chatroom abbreviations and shorthand symbols, and developed a k-nn classification system to recognize the symbols. Experimental results show the effectiveness of the system in terms of speed and accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes an efficient system for entering data into a pen-enabled computer, particularly handheld devices. While keyboard input typically is faster than handwriting input, this is not true for the small PDA interfaces. For this reason, we designed and developed a prototype that uses chatroom abbreviations and shorthand symbols to increase the speed of data entry for these devices. This system was also developed as a prototype system that would enable persons with speech impairments to rapidly convert hand-drawn symbols on a pen-enabled device into speech output. We created a library of chatroom abbreviations and shorthand symbols, and developed a k-nn classification system to recognize the symbols. Experimental results show the effectiveness of the system in terms of speed and accuracy.", "fno": "21870575", "keywords": [ "Pen Computing", "Chatroom Abbreviations", "Online Character Recognition" ], "authors": [ { "affiliation": "Pace University", "fullName": "William B. Huber", "givenName": "William B.", "surname": "Huber", "__typename": "ArticleAuthorType" }, { "affiliation": "Pace University", "fullName": "Sung-Hyuk Cha", "givenName": "Sung-Hyuk", "surname": "Cha", "__typename": "ArticleAuthorType" }, { "affiliation": "Pace University", "fullName": "Charles C. Tapper", "givenName": "Charles C.", "surname": "Tapper", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM T. J. Watson Research Center", "fullName": "Vicki L. Hanson", "givenName": "Vicki L.", "surname": "Hanson", "__typename": "ArticleAuthorType" } ], "idPrefix": "iwfhr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-10-01T00:00:00", "pubType": "proceedings", "pages": "575-579", "year": "2004", "issn": "1550-5235", "isbn": "0-7695-2187-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21870569", "articleId": "12OmNA1mbez", "__typename": "AdjacentArticleType" }, "next": { "fno": "21870580", "articleId": "12OmNy7yEdg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2011/4520/0/4520b384", "title": "Reliable Online Stroke Recovery from Offline Data with the Data-Embedding Pen", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520b384/12OmNAkWvOI", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/253", "title": "Poster: Distinguishing scientific abbreviations and genes in bio-medical literature mining", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/253/12OmNAqCtOU", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/plt/2007/2942/0/2942a035", "title": "Pen-Centric Shorthand Handwriting Recognition Interfaces", "doi": null, "abstractUrl": "/proceedings-article/plt/2007/2942a035/12OmNBUAw08", "parentPublication": { "id": "proceedings/plt/2007/2942/0", "title": "First International Workshop on Pen-Based Learning Technologies (PLT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2009/3711/0/3711a267", "title": "Developing an Innovative and Pen-Based Simulator to Enhance Education and Research in Computer Systems", "doi": null, "abstractUrl": "/proceedings-article/icalt/2009/3711a267/12OmNvCRgld", "parentPublication": { "id": "proceedings/icalt/2009/3711/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2010/4221/0/4221a160", "title": "Handwriting Reconstruction for a Camera Pen Using Random Dot Patterns", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2010/4221a160/12OmNxaNGpm", "parentPublication": { "id": "proceedings/icfhr/2010/4221/0", "title": "Frontiers in Handwriting Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1999/0318/0/03180422", "title": "A Study of Representations for Pen Based Handwriting Recognition of Tamil Characters", "doi": null, "abstractUrl": "/proceedings-article/icdar/1999/03180422/12OmNxdDFzG", "parentPublication": { "id": "proceedings/icdar/1999/0318/0", "title": "Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR '99 (Cat. No.PR00318)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04418042", "title": "Work in progress - assessing the impact of penbased computing and collaboration-facilitating software in the classroom", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04418042/12OmNzRZpZ9", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/2/71281065", "title": "Intelligent document assistant processor for pen-based computing systems", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71281065/12OmNzYwcfV", "parentPublication": { "id": "proceedings/icdar/1995/7128/2", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2008/04/mmu2008040014", "title": "Applications and Issues in Pen-Centric Computing", "doi": null, "abstractUrl": "/magazine/mu/2008/04/mmu2008040014/13rRUwInvG1", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2002/03/i0313", "title": "Visual Input for Pen-Based Computers", "doi": null, "abstractUrl": "/journal/tp/2002/03/i0313/13rRUxDqS9k", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPP2", "title": "Document Analysis Systems, IAPR International Workshop on", "acronym": "das", "groupId": "1002506", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8wThP", "doi": "10.1109/DAS.2012.78", "title": "Seamless Integration of Handwriting Recognition into Pen-Enabled Displays for Fast User Interaction", "normalizedTitle": "Seamless Integration of Handwriting Recognition into Pen-Enabled Displays for Fast User Interaction", "abstract": "This paper proposes a framework for the integration of handwriting recognition into natural user interfaces. As more and more pen-enabled touch displays are available, we make use of the distinction between touch actions and pen actions. Furthermore, we apply a recently introduced mode detection approach to distinguish between handwritten strokes and graphics drawn with the pen. These ideas are implemented in the Touch & Write SDK which can be used for various applications. In order to evaluate the effectiveness of our approach, we have conducted experiments for an annotation scenario. We asked several users to mark and label several objects in videos. We have measured the labeling time when using our novel user interaction system and compared it to the time needed when using common labeling tools. Furthermore, we compare our handwritten input paradigm to other existing systems. It turns out that the annotation is performed much faster when using our method and the user experience is also much better.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a framework for the integration of handwriting recognition into natural user interfaces. As more and more pen-enabled touch displays are available, we make use of the distinction between touch actions and pen actions. Furthermore, we apply a recently introduced mode detection approach to distinguish between handwritten strokes and graphics drawn with the pen. These ideas are implemented in the Touch & Write SDK which can be used for various applications. In order to evaluate the effectiveness of our approach, we have conducted experiments for an annotation scenario. We asked several users to mark and label several objects in videos. We have measured the labeling time when using our novel user interaction system and compared it to the time needed when using common labeling tools. Furthermore, we compare our handwritten input paradigm to other existing systems. It turns out that the annotation is performed much faster when using our method and the user experience is also much better.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a framework for the integration of handwriting recognition into natural user interfaces. As more and more pen-enabled touch displays are available, we make use of the distinction between touch actions and pen actions. Furthermore, we apply a recently introduced mode detection approach to distinguish between handwritten strokes and graphics drawn with the pen. These ideas are implemented in the Touch & Write SDK which can be used for various applications. In order to evaluate the effectiveness of our approach, we have conducted experiments for an annotation scenario. We asked several users to mark and label several objects in videos. We have measured the labeling time when using our novel user interaction system and compared it to the time needed when using common labeling tools. Furthermore, we compare our handwritten input paradigm to other existing systems. It turns out that the annotation is performed much faster when using our method and the user experience is also much better.", "fno": "4661a364", "keywords": [ "Handwriting Recognition", "Applications", "HCI", "Mode Detection", "Touch Write" ], "authors": [ { "affiliation": null, "fullName": "Marcus Liwicki", "givenName": "Marcus", "surname": "Liwicki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Markus Weber", "givenName": "Markus", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tobias Zimmermann", "givenName": "Tobias", "surname": "Zimmermann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andreas Dengel", "givenName": "Andreas", "surname": "Dengel", "__typename": "ArticleAuthorType" } ], "idPrefix": "das", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-03-01T00:00:00", "pubType": "proceedings", "pages": "364-368", "year": "2012", "issn": null, "isbn": "978-0-7695-4661-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4661a359", "articleId": "12OmNzTYC6X", "__typename": "AdjacentArticleType" }, "next": { "fno": "4661a369", "articleId": "12OmNqFrGzg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/das/2012/4661/0/4661a017", "title": "Koios++: A Query-Answering System for Handwritten Input", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a017/12OmNBCqbIF", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2005/2420/0/24200026", "title": "An HMM Implementation for On-line Handwriting Recognition - Based on Pen-Coordinate Feature and Pen-Direction Feature", "doi": null, "abstractUrl": "/proceedings-article/icdar/2005/24200026/12OmNqIhG2g", "parentPublication": { "id": "proceedings/icdar/2005/2420/0", "title": "Eighth International Conference on Document Analysis and Recognition (ICDAR'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a957", "title": "MCS for Online Mode Detection: Evaluation on Pen-Enabled Multi-touch Interfaces", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a957/12OmNscOU9M", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2014/4335/0/06981047", "title": "A Database of On-Line Handwritten Mixed Objects Named \"Kondate\"", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2014/06981047/12OmNwFzNXW", "parentPublication": { "id": "proceedings/icfhr/2014/4335/0", "title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d038", "title": "Recognition of Pen-Based Music Notation: The HOMUS Dataset", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d038/12OmNxVV5YN", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a037", "title": "CASIA Online and Offline Chinese Handwriting Databases", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a037/12OmNyoSbgy", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156378", "title": "SketchInsight: Natural data exploration on interactive whiteboards leveraging pen and touch interaction", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156378/12OmNzVXNTn", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122779", "title": "Understanding Pen and Touch Interaction for Data Exploration on Interactive Whiteboards", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122779/13rRUIJcWlm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2005/11/i1733", "title": "Estimating the Pen Trajectories of Static Signatures Using Hidden Markov Models", "doi": null, "abstractUrl": "/journal/tp/2005/11/i1733/13rRUyuvRpW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2020/9966/0/996600a295", "title": "Digitizing Handwriting with a Sensor Pen: A Writer-Independent Recognizer", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2020/996600a295/1p2VuWU6WgE", "parentPublication": { "id": "proceedings/icfhr/2020/9966/0", "title": "2020 17th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNs6", "title": "2011 15th Panhellenic Conference on Informatics", "acronym": "pci", "groupId": "1002434", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxdDFSk", "doi": "10.1109/PCI.2011.8", "title": "Evaluation of Tip-Activated and Push-Button Infrared Pens for Interactive Whiteboards", "normalizedTitle": "Evaluation of Tip-Activated and Push-Button Infrared Pens for Interactive Whiteboards", "abstract": "Many schools are replacing traditional whiteboards with interactive versions connected to computers and operated with a digital pen. Previous research has established that interactive whiteboards facilitate the learning activities, but there is limited research on the usability of the available digital pens. In particular, the Wiimote project is a cheap interactive whiteboard that employs an infrared pen, which is available in two versions: 1) push button and 2) tip activated. The push button is a pen which functions is similar to that of a mouse and the tip activated is a pen that acts like a \"real\" pen. In this article, we present an experiment that compares the usability of two infrared pens (push button and tip activated) in a target acquisition and a docking task. In addition to those typical input device tasks, we developed a more realistic drawing task, in order to assess the accuracy of each input device. We found that the tip activated pen is more usable, more accurate, and creates less fatigue.", "abstracts": [ { "abstractType": "Regular", "content": "Many schools are replacing traditional whiteboards with interactive versions connected to computers and operated with a digital pen. Previous research has established that interactive whiteboards facilitate the learning activities, but there is limited research on the usability of the available digital pens. In particular, the Wiimote project is a cheap interactive whiteboard that employs an infrared pen, which is available in two versions: 1) push button and 2) tip activated. The push button is a pen which functions is similar to that of a mouse and the tip activated is a pen that acts like a \"real\" pen. In this article, we present an experiment that compares the usability of two infrared pens (push button and tip activated) in a target acquisition and a docking task. In addition to those typical input device tasks, we developed a more realistic drawing task, in order to assess the accuracy of each input device. We found that the tip activated pen is more usable, more accurate, and creates less fatigue.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many schools are replacing traditional whiteboards with interactive versions connected to computers and operated with a digital pen. Previous research has established that interactive whiteboards facilitate the learning activities, but there is limited research on the usability of the available digital pens. In particular, the Wiimote project is a cheap interactive whiteboard that employs an infrared pen, which is available in two versions: 1) push button and 2) tip activated. The push button is a pen which functions is similar to that of a mouse and the tip activated is a pen that acts like a \"real\" pen. In this article, we present an experiment that compares the usability of two infrared pens (push button and tip activated) in a target acquisition and a docking task. In addition to those typical input device tasks, we developed a more realistic drawing task, in order to assess the accuracy of each input device. We found that the tip activated pen is more usable, more accurate, and creates less fatigue.", "fno": "4389a287", "keywords": [ "Usability", "Wiimote Project", "Interactive Whiteboard", "Infrared Pen", "Push Button", "Tip Activated", "Target Acquisition", "Docking" ], "authors": [ { "affiliation": null, "fullName": "Dimitrios Kravvaris", "givenName": "Dimitrios", "surname": "Kravvaris", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eleni Thanou", "givenName": "Eleni", "surname": "Thanou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Konstantinos Chorianopoulos", "givenName": "Konstantinos", "surname": "Chorianopoulos", "__typename": "ArticleAuthorType" } ], "idPrefix": "pci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "287-291", "year": "2011", "issn": null, "isbn": "978-0-7695-4389-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4389a282", "articleId": "12OmNyO8tU7", "__typename": "AdjacentArticleType" }, "next": { "fno": "4389a292", "articleId": "12OmNxd4tvK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icfhr/2010/4221/0/4221a125", "title": "A Model Based Text Line Segmentation Method for Off-line Handwritten Documents", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2010/4221a125/12OmNz2kqeL", "parentPublication": { "id": "proceedings/icfhr/2010/4221/0", "title": "Frontiers in Handwriting Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2009/3725/0/3725b236", "title": "Capturing Digital Ink as Retrieving Fragments of Document Images", "doi": null, "abstractUrl": "/proceedings-article/icdar/2009/3725b236/12OmNzSyCcW", "parentPublication": { "id": "proceedings/icdar/2009/3725/0", "title": "2009 10th International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100b793", "title": "Push-Button Synthesis of Watch Companions for Android Apps", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100b793/1EmsiBXPJCw", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgX7", "title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)", "acronym": "3dui", "groupId": "1001623", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNyqRn58", "doi": "10.1109/3DUI.2010.5444729", "title": "Keynote address: Interactive \"smart\" computers", "normalizedTitle": "Keynote address: Interactive \"smart\" computers", "abstract": "Current user interfaces are not very \"smart\" in that computers dumbly do what the user explicitly commands it to do via buttons or menus. As the computers become more capable and applications become complicated, more \"smart\" user interfaces are desired. We are exploring possible \"smart\" user interfaces in the domain of pen-based computing and interactive 3D graphics. The idea is to allow the user to intu-itively express his/her intention by combining sketching and direct manipulation, and have the computer take appropriate actions without explicit commands. This talk consists of many live demonstrations to illustrate the idea of interactive \"smart\" interfaces. I plan to show 2D geometric drawing program, electronic whiteboard system, sketch-based 3D modeling, automatic zooming, clothing manipulation interfaces, and other interesting systems.", "abstracts": [ { "abstractType": "Regular", "content": "Current user interfaces are not very \"smart\" in that computers dumbly do what the user explicitly commands it to do via buttons or menus. As the computers become more capable and applications become complicated, more \"smart\" user interfaces are desired. We are exploring possible \"smart\" user interfaces in the domain of pen-based computing and interactive 3D graphics. The idea is to allow the user to intu-itively express his/her intention by combining sketching and direct manipulation, and have the computer take appropriate actions without explicit commands. This talk consists of many live demonstrations to illustrate the idea of interactive \"smart\" interfaces. I plan to show 2D geometric drawing program, electronic whiteboard system, sketch-based 3D modeling, automatic zooming, clothing manipulation interfaces, and other interesting systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current user interfaces are not very \"smart\" in that computers dumbly do what the user explicitly commands it to do via buttons or menus. As the computers become more capable and applications become complicated, more \"smart\" user interfaces are desired. We are exploring possible \"smart\" user interfaces in the domain of pen-based computing and interactive 3D graphics. The idea is to allow the user to intu-itively express his/her intention by combining sketching and direct manipulation, and have the computer take appropriate actions without explicit commands. This talk consists of many live demonstrations to illustrate the idea of interactive \"smart\" interfaces. I plan to show 2D geometric drawing program, electronic whiteboard system, sketch-based 3D modeling, automatic zooming, clothing manipulation interfaces, and other interesting systems.", "fno": "05444729", "keywords": [ "Clothing Manipulation Interfaces", "Interactive Smart Computers", "Smart User Interfaces", "Pen Based Computing", "Interactive 3 D Graphics", "2 D Geometric Drawing Program", "Electronic Whiteboard System", "Sketch Based 3 D Modeling", "Automatic Zooming" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Univ. of Tokyo, Tokyo, Japan", "fullName": "Takeo Igarashi", "givenName": "Takeo", "surname": "Igarashi", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dui", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "x", "year": "2010", "issn": null, "isbn": "978-1-4244-6846-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05444734", "articleId": "12OmNyqRnbd", "__typename": "AdjacentArticleType" }, "next": { "fno": "05444739", "articleId": "12OmNBr4eKB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzKb", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzVXNTn", "doi": "10.1109/PACIFICVIS.2015.7156378", "title": "SketchInsight: Natural data exploration on interactive whiteboards leveraging pen and touch interaction", "normalizedTitle": "SketchInsight: Natural data exploration on interactive whiteboards leveraging pen and touch interaction", "abstract": "In this work, we advance research efforts in combining the casual sketching approach of whiteboards with the machine's computing power. We present SketchInsight, a system that applies the familiar and collaborative features of a whiteboard interface to the accurate data exploration capabilities of interactive visualizations. SketchInsight enables data analysis with more fluid interaction, allowing people to visually explore their data by drawing simple charts and directly manipulating them. In addition, we report results from a qualitative study conducted to evaluate user experience in exploring data with SketchInsight, expanding our understanding on how people use a pen- and touch-enabled digital whiteboard for data exploration. We also discuss the challenges in building a working system that supports data analytic capabilities with pen and touch interaction and freeform annotation.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we advance research efforts in combining the casual sketching approach of whiteboards with the machine's computing power. We present SketchInsight, a system that applies the familiar and collaborative features of a whiteboard interface to the accurate data exploration capabilities of interactive visualizations. SketchInsight enables data analysis with more fluid interaction, allowing people to visually explore their data by drawing simple charts and directly manipulating them. In addition, we report results from a qualitative study conducted to evaluate user experience in exploring data with SketchInsight, expanding our understanding on how people use a pen- and touch-enabled digital whiteboard for data exploration. We also discuss the challenges in building a working system that supports data analytic capabilities with pen and touch interaction and freeform annotation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we advance research efforts in combining the casual sketching approach of whiteboards with the machine's computing power. We present SketchInsight, a system that applies the familiar and collaborative features of a whiteboard interface to the accurate data exploration capabilities of interactive visualizations. SketchInsight enables data analysis with more fluid interaction, allowing people to visually explore their data by drawing simple charts and directly manipulating them. In addition, we report results from a qualitative study conducted to evaluate user experience in exploring data with SketchInsight, expanding our understanding on how people use a pen- and touch-enabled digital whiteboard for data exploration. We also discuss the challenges in building a working system that supports data analytic capabilities with pen and touch interaction and freeform annotation.", "fno": "07156378", "keywords": [ "Data Visualization", "Fluids", "Shape", "Energy Consumption", "Software", "Fingers", "Sociology", "Whiteboard", "Pen And Touch", "Interaction", "Visualization", "Data Exploration" ], "authors": [ { "affiliation": "Microsoft Research, USA", "fullName": "Bongshin Lee", "givenName": "Bongshin", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, USA", "fullName": "Greg Smith", "givenName": "Greg", "surname": "Smith", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, USA", "fullName": "Nathalie Henry Riche", "givenName": "Nathalie Henry", "surname": "Riche", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research, USA", "fullName": "Amy Karlson", "givenName": "Amy", "surname": "Karlson", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Calgary, Canada", "fullName": "Sheelagh Carpendale", "givenName": "Sheelagh", "surname": "Carpendale", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "199-206", "year": "2015", "issn": null, "isbn": "978-1-4673-6879-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07156377", "articleId": "12OmNrYCXXM", "__typename": "AdjacentArticleType" }, "next": { "fno": "07156379", "articleId": "12OmNyY4rqE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2011/4520/0/4520a957", "title": "MCS for Online Mode Detection: Evaluation on Pen-Enabled Multi-touch Interfaces", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a957/12OmNscOU9M", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460902", "title": "Tablet owner authentication based on behavioral characteristics of multi-touch actions", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460902/12OmNxWLTgE", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549380", "title": "Touch & move: A portable stereoscopic multi-touch table", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549380/12OmNxXCGEs", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2007/2916/0/29160066", "title": "A Lightweight Open Space for the Classroom -- Collaborative Learning with Whiteboards and Pen-Tablets", "doi": null, "abstractUrl": "/proceedings-article/icalt/2007/29160066/12OmNxwENHU", "parentPublication": { "id": "proceedings/icalt/2007/2916/0", "title": "2007 International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwmc/2007/2796/0/27960087", "title": "Screen Coverage: A Pen-Interaction Problem for PDA's and Touch Screen Computers", "doi": null, "abstractUrl": "/proceedings-article/icwmc/2007/27960087/12OmNyRg4DP", "parentPublication": { "id": "proceedings/icwmc/2007/2796/0", "title": "Wireless and Mobile Communications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816756", "title": "dbTouch in action database kernels for touch-based data exploration", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816756/12OmNzEmFEu", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876039", "title": "PanoramicData: Data Analysis through Pen & Touch", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876039/13rRUEgs2M4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122779", "title": "Understanding Pen and Touch Interaction for Data Exploration on Interactive Whiteboards", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122779/13rRUIJcWlm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122416", "title": "SketchStory: Telling More Engaging Stories with Data through Freeform Sketching", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122416/13rRUwIF69k", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/06/08977320", "title": "Touch? Speech? or Touch and Speech? Investigating Multimodal Interaction for Visual Network Exploration and Analysis", "doi": null, "abstractUrl": "/journal/tg/2020/06/08977320/1h2AIkwYg4E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqGA5ib", "title": "International Conference on Ubi-Media Computing", "acronym": "u-media", "groupId": "1002010", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNAOKnXO", "doi": "10.1109/U-MEDIA.2011.25", "title": "One-to-One Complementary Collaborative Learning Based on Blue-Red Trees and Performance Analysis for Social Network", "normalizedTitle": "One-to-One Complementary Collaborative Learning Based on Blue-Red Trees and Performance Analysis for Social Network", "abstract": "In this paper, we used the Rule-Space Model to infer reasonable learning effects represented as Blue-Red trees and their definitions by analyzing all learning objects of courses within a system. We can derive nine learning groups of social network grouping algorithms and classify particular Blue-Red trees that belong to a specific learning group from previous definitions. An example for a course with the Rule-Space Model analysis of learning objects is illustrated and proved. From this example, thirty-six learning effects as Blue-Red trees can be created that are grouped under nine learning groups of social network, and inferred one-to-one complementary collaborative learning group algorithms of strong learning. Thus, the algorithms within the system will recommend those specific Blue-Red trees that satisfy one-to-one complementary collaborative learning group of strong learning and analyze these learning performances of all Blue-Red trees. They will be the basis of verification for one-to-one complementary collaborative learning.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we used the Rule-Space Model to infer reasonable learning effects represented as Blue-Red trees and their definitions by analyzing all learning objects of courses within a system. We can derive nine learning groups of social network grouping algorithms and classify particular Blue-Red trees that belong to a specific learning group from previous definitions. An example for a course with the Rule-Space Model analysis of learning objects is illustrated and proved. From this example, thirty-six learning effects as Blue-Red trees can be created that are grouped under nine learning groups of social network, and inferred one-to-one complementary collaborative learning group algorithms of strong learning. Thus, the algorithms within the system will recommend those specific Blue-Red trees that satisfy one-to-one complementary collaborative learning group of strong learning and analyze these learning performances of all Blue-Red trees. They will be the basis of verification for one-to-one complementary collaborative learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we used the Rule-Space Model to infer reasonable learning effects represented as Blue-Red trees and their definitions by analyzing all learning objects of courses within a system. We can derive nine learning groups of social network grouping algorithms and classify particular Blue-Red trees that belong to a specific learning group from previous definitions. An example for a course with the Rule-Space Model analysis of learning objects is illustrated and proved. From this example, thirty-six learning effects as Blue-Red trees can be created that are grouped under nine learning groups of social network, and inferred one-to-one complementary collaborative learning group algorithms of strong learning. Thus, the algorithms within the system will recommend those specific Blue-Red trees that satisfy one-to-one complementary collaborative learning group of strong learning and analyze these learning performances of all Blue-Red trees. They will be the basis of verification for one-to-one complementary collaborative learning.", "fno": "4493a083", "keywords": [ "Rule Space Model", "Blue Red Tree", "Social Network", "Collaborative Learning", "Complementary Collaborative Learning Group" ], "authors": [ { "affiliation": null, "fullName": "Yung-Hui Chen", "givenName": "Yung-Hui", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lawrence Y. Deng", "givenName": "Lawrence Y.", "surname": "Deng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shwu-Huey Yen", "givenName": "Shwu-Huey", "surname": "Yen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wu-Hsiao Hsu", "givenName": "Wu-Hsiao", "surname": "Hsu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bruce C. Kao", "givenName": "Bruce C.", "surname": "Kao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu-Che Haieh", "givenName": "Yu-Che", "surname": "Haieh", "__typename": "ArticleAuthorType" } ], "idPrefix": "u-media", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "83-88", "year": "2011", "issn": null, "isbn": "978-0-7695-4493-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4493a077", "articleId": "12OmNCfjeE1", "__typename": "AdjacentArticleType" }, "next": { "fno": "4493a089", "articleId": "12OmNxG1yQK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csse/2008/3336/5/3336i675", "title": "Red or Blue? The Importance of Digital Literacy in African Rural Communities", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i675/12OmNB7LvFI", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/1/3925a416", "title": "High-Level Methodology for Carrying out Combined Red and Blue Teams", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a416/12OmNBaT61n", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sccc/1997/8052/0/80520093", "title": "Concurrent rebalancing on HyperRed-Black trees", "doi": null, "abstractUrl": "/proceedings-article/sccc/1997/80520093/12OmNqG0T3l", "parentPublication": { "id": "proceedings/sccc/1997/8052/0", "title": "Proceedings 17th International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2011/1953/0/06081410", "title": "Blue team red team approach to hardware trust assessment", "doi": null, "abstractUrl": "/proceedings-article/iccd/2011/06081410/12OmNroijcR", "parentPublication": { "id": "proceedings/iccd/2011/1953/0", "title": "2011 IEEE 29th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a466", "title": "The Best Learning Order Inference Based on Blue-Red Trees of Rule-Space Model for Social Network -- Case in ITE Course", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a466/12OmNx0A7MW", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdciem/2011/4350/0/4350c193", "title": "Removal of Reactive Red 2 and Methylene Blue from Aqueous Solutions by Adsorption Using Soybean Meal as Adsorbent", "doi": null, "abstractUrl": "/proceedings-article/cdciem/2011/4350c193/12OmNxHJ9oR", "parentPublication": { "id": "proceedings/cdciem/2011/4350/0", "title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2012/4655/0/4655a200", "title": "The Research of an Improved Algorithm for Active Queue Management with BP", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a200/12OmNz4SOrm", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2012/04/tta2012040394", "title": "Red-Pill Robots Only, Please", "doi": null, "abstractUrl": "/journal/ta/2012/04/tta2012040394/13rRUwjGoK0", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/secdev/2020/8388/0/838800a074", "title": "Network Attack Surface Simplification for Red and Blue Teams", "doi": null, "abstractUrl": "/proceedings-article/secdev/2020/838800a074/1o6LpdDagPC", "parentPublication": { "id": "proceedings/secdev/2020/8388/0", "title": "2020 IEEE Secure Development (SecDev)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2022/01/09591272", "title": "An Expert Systems Journey—Red Pepper and Blue Martini", "doi": null, "abstractUrl": "/magazine/an/2022/01/09591272/1y2Fg6sAspy", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF2u", "title": "Advanced Learning Technologies, IEEE International Conference on", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAXxX7r", "doi": "10.1109/ICALT.2012.135", "title": "Using Semantic Similarities to Instrument Informal Learning Activities in Ubiquitous Environments", "normalizedTitle": "Using Semantic Similarities to Instrument Informal Learning Activities in Ubiquitous Environments", "abstract": "Our work focuses on the support of informal learning during museums visits. We consider the use of mobile devices to provide to visitors two categories of situated interactions within the museum : exploration (i.e. to suggest visitors other artworks, styles, themes or artist he may consider) and assessment (to allow visitors to assess their knowledge using micro-games). To take into account the situated nature of a museum visit, these interactions are contextualized depending on the visitor's profile (e.g. interest) and physical situation (e.g. artworks around him, history of visit). To that end, we propose a semantic model of artworks and visitor's context and define semantic similarities and contextual adequacy computation over this model to propose relevant interactions depending on the artwork considered by the user together with his cognitive and contextual situation.", "abstracts": [ { "abstractType": "Regular", "content": "Our work focuses on the support of informal learning during museums visits. We consider the use of mobile devices to provide to visitors two categories of situated interactions within the museum : exploration (i.e. to suggest visitors other artworks, styles, themes or artist he may consider) and assessment (to allow visitors to assess their knowledge using micro-games). To take into account the situated nature of a museum visit, these interactions are contextualized depending on the visitor's profile (e.g. interest) and physical situation (e.g. artworks around him, history of visit). To that end, we propose a semantic model of artworks and visitor's context and define semantic similarities and contextual adequacy computation over this model to propose relevant interactions depending on the artwork considered by the user together with his cognitive and contextual situation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Our work focuses on the support of informal learning during museums visits. We consider the use of mobile devices to provide to visitors two categories of situated interactions within the museum : exploration (i.e. to suggest visitors other artworks, styles, themes or artist he may consider) and assessment (to allow visitors to assess their knowledge using micro-games). To take into account the situated nature of a museum visit, these interactions are contextualized depending on the visitor's profile (e.g. interest) and physical situation (e.g. artworks around him, history of visit). To that end, we propose a semantic model of artworks and visitor's context and define semantic similarities and contextual adequacy computation over this model to propose relevant interactions depending on the artwork considered by the user together with his cognitive and contextual situation.", "fno": "4702a618", "keywords": [ "Semantics", "Context", "Games", "Context Modeling", "Cultural Differences", "Adaptation Models", "Ontologies", "Mobile Learning", "Semantic Similarity", "Context Aware Computing", "Ontology", "Informal Learning" ], "authors": [ { "affiliation": null, "fullName": "Pierre-Yves Gicquel", "givenName": "Pierre-Yves", "surname": "Gicquel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dominique Lenne", "givenName": "Dominique", "surname": "Lenne", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "618-620", "year": "2012", "issn": null, "isbn": "978-1-4673-1642-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4702a613", "articleId": "12OmNvD8RyS", "__typename": "AdjacentArticleType" }, "next": { "fno": "4702a621", "articleId": "12OmNzmLxRQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wmute/2012/4662/0/4662a337", "title": "Ambient learning displays: distributed mixed reality information mash-ups to support ubiquitous learning", "doi": null, "abstractUrl": "/proceedings-article/wmute/2012/4662a337/12OmNAio741", "parentPublication": { "id": "proceedings/wmute/2012/4662/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c231", "title": "Automatic Group Formation for Informal Collaborative Learning", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c231/12OmNC2fGyf", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2008/3108/0/3108a095", "title": "Identifying Personalized Context-Aware Knowledge Structure for Individual User in Ubiquitous Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/wmute/2008/3108a095/12OmNClQ0DM", "parentPublication": { "id": "proceedings/wmute/2008/3108/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sutc/2008/3158/0/3158a524", "title": "A Computer-Assisted Approach for Designing Context-Aware Ubiquitous Learning Activities", "doi": null, "abstractUrl": "/proceedings-article/sutc/2008/3158a524/12OmNs59JSu", "parentPublication": { "id": "proceedings/sutc/2008/3158/0", "title": "2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2008/3108/0/3108a082", "title": "Conducting Situated Learning in a Context-Aware Ubiquitous Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/wmute/2008/3108a082/12OmNscOUeg", "parentPublication": { "id": "proceedings/wmute/2008/3108/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sutc/2006/2553/2/255320078", "title": "Context Model and Context Acquisition for Ubiquitous Content Access in ULearning Environments", "doi": null, "abstractUrl": "/proceedings-article/sutc/2006/255320078/12OmNwHQBbn", "parentPublication": { "id": "proceedings/sutc/2006/2553/2", "title": "Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907504", "title": "Artworks Sequences Recommendations for Groups in Museums", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907504/12OmNxaw59R", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122799", "title": "Living Liquid: Design and Evaluation of an Exploratory Visualization Tool for Museum Visitors", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122799/13rRUNvgyWm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122789", "title": "The DeepTree Exhibit: Visualizing the Tree of Life to Facilitate Informal Learning", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122789/13rRUxBa5bW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2016/01/07115952", "title": "Development and Evaluation of an Active Learning Support System for Context-Aware Ubiquitous Learning", "doi": null, "abstractUrl": "/journal/lt/2016/01/07115952/13rRUy08MuS", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBQ2VPW", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "acronym": "wi-iat", "groupId": "1001411", "volume": "3", "displayVolume": "3", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNC2fGyf", "doi": "10.1109/WI-IAT.2009.270", "title": "Automatic Group Formation for Informal Collaborative Learning", "normalizedTitle": "Automatic Group Formation for Informal Collaborative Learning", "abstract": "Ability to find appropriate collaborators and learning materials is crucial for informal collaborative learning. However, traditional group formation models are not applicable/effective in informal learning settings since little is known about learners and learning materials and teacher's assistance is not available. We propose the data-driven group formation model that automatically extracts information about learners and learning materials from multiple data sources (databases of academic publications, wikis, social networking cites, blogs, forums, etc) and automatically forms collaborative learning groups. The open source implementation of the model (a part of WebClass-RAPSODY learning management system) consists of loosely coupled modules (implementing the proposed methods for data mashup, mining and inference) integrated through the web services interface; allowing for easy adaptation, extension and customization of the model.", "abstracts": [ { "abstractType": "Regular", "content": "Ability to find appropriate collaborators and learning materials is crucial for informal collaborative learning. However, traditional group formation models are not applicable/effective in informal learning settings since little is known about learners and learning materials and teacher's assistance is not available. We propose the data-driven group formation model that automatically extracts information about learners and learning materials from multiple data sources (databases of academic publications, wikis, social networking cites, blogs, forums, etc) and automatically forms collaborative learning groups. The open source implementation of the model (a part of WebClass-RAPSODY learning management system) consists of loosely coupled modules (implementing the proposed methods for data mashup, mining and inference) integrated through the web services interface; allowing for easy adaptation, extension and customization of the model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ability to find appropriate collaborators and learning materials is crucial for informal collaborative learning. However, traditional group formation models are not applicable/effective in informal learning settings since little is known about learners and learning materials and teacher's assistance is not available. We propose the data-driven group formation model that automatically extracts information about learners and learning materials from multiple data sources (databases of academic publications, wikis, social networking cites, blogs, forums, etc) and automatically forms collaborative learning groups. The open source implementation of the model (a part of WebClass-RAPSODY learning management system) consists of loosely coupled modules (implementing the proposed methods for data mashup, mining and inference) integrated through the web services interface; allowing for easy adaptation, extension and customization of the model.", "fno": "3801c231", "keywords": [ "Automatic Group Formation", "Computer Supported Collaborative Learning CSCL", "Informal Learning", "Expertise Finding", "Mashup", "Data Mining", "Similarity Based Learning" ], "authors": [ { "affiliation": null, "fullName": "Neil Rubens", "givenName": "Neil", "surname": "Rubens", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mikko Vilenius", "givenName": "Mikko", "surname": "Vilenius", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Toshio Okamoto", "givenName": "Toshio", "surname": "Okamoto", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "231-234", "year": "2009", "issn": null, "isbn": "978-0-7695-3801-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3801c227", "articleId": "12OmNyQGSmb", "__typename": "AdjacentArticleType" }, "next": { "fno": "3801c235", "articleId": "12OmNzUxO8W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a330", "title": "Managing Knowledge Diversity: Towards Automatic Semantic Group Formation", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a330/12OmNAlvHUw", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2009/3769/0/3769a182", "title": "Designing an Efficient Collaborative Learning Model to Construct a Consensus Based on Binary Tree Structure", "doi": null, "abstractUrl": "/proceedings-article/ncm/2009/3769a182/12OmNAo45An", "parentPublication": { "id": "proceedings/ncm/2009/3769/0", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2008/3108/0/3108a191", "title": "The Emergence of Mobile Devices Influencing Learning from the Viewpoint of Convergences", "doi": null, "abstractUrl": "/proceedings-article/wmute/2008/3108a191/12OmNBzAciK", "parentPublication": { "id": "proceedings/wmute/2008/3108/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i649", "title": "A Case Study on Undergraduates' Informal Learning Supported by QQ", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i649/12OmNC2xhCK", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/achi/2010/3957/0/3957a179", "title": "The 3A Interaction Model: Towards Bridging the Gap between Formal and Informal Learning", "doi": null, "abstractUrl": "/proceedings-article/achi/2010/3957a179/12OmNrYCXZe", "parentPublication": { "id": "proceedings/achi/2010/3957/0", "title": "International Conference on Advances in Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a305", "title": "How to Learn Chinese through Online Tools? From the Perspective of Informal Learning to Culture Immersion", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a305/12OmNwbLVlD", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a272", "title": "Facilitating Informal Learning in a Mobile Application for a Group of Type 2 Diabetics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a272/12OmNxUv6gc", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c227", "title": "An Exploration of Formal and Informal Learning Flows in LMS 2.0: Case Study Edu 2.0", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c227/12OmNyQGSmb", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2008/3099/0/3099b148", "title": "CoLeP: An Agent-Based Collaborative System for Pervasive Learning", "doi": null, "abstractUrl": "/proceedings-article/itng/2008/3099b148/12OmNzd7bTv", "parentPublication": { "id": "proceedings/itng/2008/3099/0", "title": "2008 5th International Conference on Information Technology: New Generation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833100", "title": "\"There’s no way to keep up!\": Diverse Motivations and Challenges Faced by Informal Learners of ML", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833100/1FUSFaxztHG", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwbcJ3s", "title": "International Conference on Advances in Computer-Human Interaction", "acronym": "achi", "groupId": "1001548", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNrYCXZe", "doi": "10.1109/ACHI.2010.38", "title": "The 3A Interaction Model: Towards Bridging the Gap between Formal and Informal Learning", "normalizedTitle": "The 3A Interaction Model: Towards Bridging the Gap between Formal and Informal Learning", "abstract": "This paper discusses the adoption of bottom- up social software tools in formal learning environments. This is believed to enhance the learning experience of today’s young generation characterized by being technology savvy and keen on social networking. As a first step towards this objective, the 3A interaction model that aims at aiding the design of personal and collaborative learning platforms is presented. It accounts for interaction paradigms widely used in Web 2.0 applications and builds on Distributed Cognition and Activity Theory while remaining at the right level of abstraction to be easily “translatable” into tangible applications supporting both formal and informal learning.", "abstracts": [ { "abstractType": "Regular", "content": "This paper discusses the adoption of bottom- up social software tools in formal learning environments. This is believed to enhance the learning experience of today’s young generation characterized by being technology savvy and keen on social networking. As a first step towards this objective, the 3A interaction model that aims at aiding the design of personal and collaborative learning platforms is presented. It accounts for interaction paradigms widely used in Web 2.0 applications and builds on Distributed Cognition and Activity Theory while remaining at the right level of abstraction to be easily “translatable” into tangible applications supporting both formal and informal learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper discusses the adoption of bottom- up social software tools in formal learning environments. This is believed to enhance the learning experience of today’s young generation characterized by being technology savvy and keen on social networking. As a first step towards this objective, the 3A interaction model that aims at aiding the design of personal and collaborative learning platforms is presented. It accounts for interaction paradigms widely used in Web 2.0 applications and builds on Distributed Cognition and Activity Theory while remaining at the right level of abstraction to be easily “translatable” into tangible applications supporting both formal and informal learning.", "fno": "3957a179", "keywords": [ "Collaborative Learning", "CSCW", "CSCL", "Web 2 0", "Interaction Model", "Social Software" ], "authors": [ { "affiliation": null, "fullName": "Sandy El Helou", "givenName": "Sandy El", "surname": "Helou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Na Li", "givenName": "Na", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Denis Gillet", "givenName": "Denis", "surname": "Gillet", "__typename": "ArticleAuthorType" } ], "idPrefix": "achi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-02-01T00:00:00", "pubType": "proceedings", "pages": "179-184", "year": "2010", "issn": null, "isbn": "978-0-7695-3957-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3957a175", "articleId": "12OmNCbCrIq", "__typename": "AdjacentArticleType" }, "next": { "fno": "3957a185", "articleId": "12OmNvDqsKO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2008/3167/0/3167a536", "title": "Interaction Analysis as a Multi-Support Approach of Social Computing for Learning, in the ?Collaborative Era?: Lessons Learned by Using the DIAS System", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a536/12OmNB9bvlq", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c231", "title": "Automatic Group Formation for Informal Collaborative Learning", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c231/12OmNC2fGyf", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2008/3167/0/3167a539", "title": "Interaction-Aware Design for Learning Applications ? Reflections from the CSCL Field", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a539/12OmNCgrD0f", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a515", "title": "E-Portfolios in Both Formal and Informal Learning Contexts", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a515/12OmNrkT7wn", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2008/3167/0/3167a685", "title": "Paper-Centric Structuring in Learning Processes", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a685/12OmNvRU0oh", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a248", "title": "Blended Assessment Concepts for Formal and Informal Engineering Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a248/12OmNvjQ91p", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c227", "title": "An Exploration of Formal and Informal Learning Flows in LMS 2.0: Case Study Edu 2.0", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c227/12OmNyQGSmb", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2010/719/2/06062152", "title": "CUTA4UML: bridging the gap between informal and formal requirements for dynamic system aspects", "doi": null, "abstractUrl": "/proceedings-article/icse/2010/06062152/12OmNz4SOBX", "parentPublication": { "id": "proceedings/icse/2010/719/2", "title": "2010 32nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a142", "title": "Bridging the Gap between PLE and LMS", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a142/12OmNzmclDe", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1991/05/e0454", "title": "Informal and Formal Requirements Specification Languages: Bridging the Gap", "doi": null, "abstractUrl": "/journal/ts/1991/05/e0454/13rRUzp02pO", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwpGgL9", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "acronym": "csse", "groupId": "1002553", "volume": "5", "displayVolume": "5", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNvA1hdL", "doi": "10.1109/CSSE.2008.181", "title": "JCLS: JXTA-Based Collaborative Learning System", "normalizedTitle": "JCLS: JXTA-Based Collaborative Learning System", "abstract": "Utilizing JXTA platform and adopting P2P structure, a collaborative learning system, JCLS (JXTA-based Collaborative Learning System), is designed and implemented. JCLS integrates instant messaging and file sharing. The concept of virtual learning community is introduced. The purpose of JCLS lies in helping students and teachers to break through the restrictions of time and space, to communicate conveniently, so that learning efficiency can be improved and study cost can be saved. P2P network structure is applied to education field and it facilitates carrying on further exploration for the networked education.", "abstracts": [ { "abstractType": "Regular", "content": "Utilizing JXTA platform and adopting P2P structure, a collaborative learning system, JCLS (JXTA-based Collaborative Learning System), is designed and implemented. JCLS integrates instant messaging and file sharing. The concept of virtual learning community is introduced. The purpose of JCLS lies in helping students and teachers to break through the restrictions of time and space, to communicate conveniently, so that learning efficiency can be improved and study cost can be saved. P2P network structure is applied to education field and it facilitates carrying on further exploration for the networked education.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Utilizing JXTA platform and adopting P2P structure, a collaborative learning system, JCLS (JXTA-based Collaborative Learning System), is designed and implemented. JCLS integrates instant messaging and file sharing. The concept of virtual learning community is introduced. The purpose of JCLS lies in helping students and teachers to break through the restrictions of time and space, to communicate conveniently, so that learning efficiency can be improved and study cost can be saved. P2P network structure is applied to education field and it facilitates carrying on further exploration for the networked education.", "fno": "3336i164", "keywords": [ "JXTA", "Collaborative Learning System", "P 2 P" ], "authors": [ { "affiliation": null, "fullName": "Zhenhua Wang", "givenName": "Zhenhua", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Derong Shen", "givenName": "Derong", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaolu Wang", "givenName": "Xiaolu", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "csse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "164-167", "year": "2008", "issn": null, "isbn": "978-0-7695-3336-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3336i161", "articleId": "12OmNCctfl0", "__typename": "AdjacentArticleType" }, "next": { "fno": "3336i168", "articleId": "12OmNBE7Mul", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aina/2009/3638/0/3638a800", "title": "Implementation of an E-learning System Using P2P, Web and Sensor Technologies", "doi": null, "abstractUrl": "/proceedings-article/aina/2009/3638a800/12OmNA0dMFJ", "parentPublication": { "id": "proceedings/aina/2009/3638/0", "title": "2009 International Conference on Advanced Information Networking and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a364", "title": "A Knowledge Sharing P2P System between Robots Using JXTA-Overlay", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a364/12OmNApcumT", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a484", "title": "A Fuzzy-Based Trustworthiness System for JXTA-Overlay P2P Platform", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a484/12OmNBkfRk4", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/4/3570d328", "title": "Performance Evaluation of JXTA Transport Mechanism", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570d328/12OmNBtl1wI", "parentPublication": { "id": "proceedings/wcse/2009/3570/4", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2008/3504/0/3504a625", "title": "The Design and Implementation of a Collaborative Monitoring System Based on JXTA", "doi": null, "abstractUrl": "/proceedings-article/iccee/2008/3504a625/12OmNqGitVW", "parentPublication": { "id": "proceedings/iccee/2008/3504/0", "title": "2008 International Conference on Computer and Electrical Engineering (ICCEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2010/4167/0/4167a133", "title": "JXTA-Overlay P2P Platform and Its Application for Robot Control", "doi": null, "abstractUrl": "/proceedings-article/nbis/2010/4167a133/12OmNvpw7dg", "parentPublication": { "id": "proceedings/nbis/2010/4167/0", "title": "2010 13th International Conference on Network-Based Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainaw/2008/3096/0/3096a407", "title": "Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment", "doi": null, "abstractUrl": "/proceedings-article/ainaw/2008/3096a407/12OmNweTvQL", "parentPublication": { "id": "proceedings/ainaw/2008/3096/0", "title": "2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2009/3575/0/3575a231", "title": "Stimulation Effects of SmartBox for E-learning Using JXTA-Overlay P2P System", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575a231/12OmNxwWoJs", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccm/2008/3290/1/3290a215", "title": "A JXTA-Based Communication Model for OSGi Framework with Extension to P2P Networks", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a215/12OmNyLiuu0", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2008/3109/0/3109a035", "title": "Extending JXTA Protocols for P2P File Sharing Systems", "doi": null, "abstractUrl": "/proceedings-article/cisis/2008/3109a035/12OmNyugyMV", "parentPublication": { "id": "proceedings/cisis/2008/3109/0", "title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxTEiSt", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvjgWmL", "doi": "10.1109/PACIFICVIS.2016.7465282", "title": "Fostering comparisons: Designing an interactive exhibit that visualizes marine animal behaviors", "normalizedTitle": "Fostering comparisons: Designing an interactive exhibit that visualizes marine animal behaviors", "abstract": "We share our challenges and lessons learned in designing our exhibit prototype that encourages museum visitors to learn about marine animal behaviors through interactive visualization and data exploration. Our intent is to have visitors draw comparisons between animal behaviors, similarly to how scientists would, to make insights and discoveries. In our efforts, we have designed a set of visual encodings around the Tagging of Pelagic Predator (TOPP) data set to create the appropriate abstractions of this rich and complex field data. We have incorporated Multiple External Representations (MERs) and tangible user interfaces (TUIs) to provide a complementary representation of the data and promote self-learning. Through the formative evaluation, we can identify a few strengths and weaknesses of our prototype design. Our evaluation results suggest that we are progressing in the right direction — we observed the public making some comparisons and inferences — but still require further design iterations to improve our visualization exhibit.", "abstracts": [ { "abstractType": "Regular", "content": "We share our challenges and lessons learned in designing our exhibit prototype that encourages museum visitors to learn about marine animal behaviors through interactive visualization and data exploration. Our intent is to have visitors draw comparisons between animal behaviors, similarly to how scientists would, to make insights and discoveries. In our efforts, we have designed a set of visual encodings around the Tagging of Pelagic Predator (TOPP) data set to create the appropriate abstractions of this rich and complex field data. We have incorporated Multiple External Representations (MERs) and tangible user interfaces (TUIs) to provide a complementary representation of the data and promote self-learning. Through the formative evaluation, we can identify a few strengths and weaknesses of our prototype design. Our evaluation results suggest that we are progressing in the right direction — we observed the public making some comparisons and inferences — but still require further design iterations to improve our visualization exhibit.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We share our challenges and lessons learned in designing our exhibit prototype that encourages museum visitors to learn about marine animal behaviors through interactive visualization and data exploration. Our intent is to have visitors draw comparisons between animal behaviors, similarly to how scientists would, to make insights and discoveries. In our efforts, we have designed a set of visual encodings around the Tagging of Pelagic Predator (TOPP) data set to create the appropriate abstractions of this rich and complex field data. We have incorporated Multiple External Representations (MERs) and tangible user interfaces (TUIs) to provide a complementary representation of the data and promote self-learning. Through the formative evaluation, we can identify a few strengths and weaknesses of our prototype design. Our evaluation results suggest that we are progressing in the right direction — we observed the public making some comparisons and inferences — but still require further design iterations to improve our visualization exhibit.", "fno": "07465282", "keywords": [], "authors": [ { "affiliation": "University of California, Davis", "fullName": "Chien-Hsin Hsueh", "givenName": "Chien-Hsin", "surname": "Hsueh", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Davis", "fullName": "Jacqueline Chu", "givenName": "Jacqueline", "surname": "Chu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Davis", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Exploratorium", "fullName": "Joyce Ma", "givenName": "Joyce", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Exploratorium", "fullName": "Jennifer Frazier", "givenName": "Jennifer", "surname": "Frazier", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-04-01T00:00:00", "pubType": "proceedings", "pages": "259-263", "year": "2016", "issn": "2165-8773", "isbn": "978-1-5090-1451-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07465281", "articleId": "12OmNCbkQCA", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wmute/2010/3992/0/3992a225", "title": "Studying Different Methods of Providing Input to Collaborative Interactive Museum Exhibit Using Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/wmute/2010/3992a225/12OmNBAIANY", "parentPublication": { "id": "proceedings/wmute/2010/3992/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-amh/2010/9339/0/05643290", "title": "A day at the museum: An augmented fine-art exhibit", "doi": null, "abstractUrl": "/proceedings-article/ismar-amh/2010/05643290/12OmNvStcA2", "parentPublication": { "id": "proceedings/ismar-amh/2010/9339/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2018/4886/0/488601b075", "title": "An Animal Detection Pipeline for Identification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2018/488601b075/12OmNwM6zXM", "parentPublication": { "id": "proceedings/wacv/2018/4886/0", "title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icniconsmcl/2006/2552/0/25520210", "title": "Development and Evaluation of a Pavilion Exhibit Feedback System for a World Expo 2005 by Using a Comment Card Database System for Mobile Phones", "doi": null, "abstractUrl": "/proceedings-article/icniconsmcl/2006/25520210/12OmNwl8GD5", "parentPublication": { "id": "proceedings/icniconsmcl/2006/2552/0", "title": "Mobile Communications and Learning Technologies, Conference on Networking, Conference on Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/est/2013/5077/0/5077a001", "title": "Development and Evaluation of a Forensic Exhibit for Science Centres", "doi": null, "abstractUrl": "/proceedings-article/est/2013/5077a001/12OmNy6HQXE", "parentPublication": { "id": "proceedings/est/2013/5077/0", "title": "2013 Fourth International Conference on Emerging Security Technologies (EST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209e310", "title": "First-Person Animal Activity Recognition from Egocentric Videos", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209e310/12OmNyq0zOF", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9001", "title": "Animal Kingdom: A Large and Diverse Dataset for Animal Behavior Understanding", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9001/1H0LAZjYlTG", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300j497", "title": "Cross-Domain Adaptation for Animal Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300j497/1hVlNVJbWgw", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-dsci-smartcns/2019/5209/0/520900a386", "title": "Trusted Autonomous Vehicles: an Interactive Exhibit", "doi": null, "abstractUrl": "/proceedings-article/iucc-dsci-smartcns/2019/520900a386/1hgrNc6BkpG", "parentPublication": { "id": "proceedings/iucc-dsci-smartcns/2019/5209/0", "title": "2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2019/2627/0/262700b077", "title": "Animal Stamp Rally Application using Image Recognition", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2019/262700b077/1hrLzjCJkfS", "parentPublication": { "id": "proceedings/iiai-aai/2019/2627/0", "title": "2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFtz", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNx76THM", "doi": "10.1109/HICSS.2008.87", "title": "Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?", "normalizedTitle": "Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?", "abstract": "Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.", "abstracts": [ { "abstractType": "Regular", "content": "Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, with whom, and when to share. Is a P2P network an ideal vehicle for information sharing in collaborative learning? This study adopts the theory of planned behavior as a basis to study the sharing behaviors on a P2P network. Due to the lack of empirical data, we built a P2P network platform to conduct an experiment in a collaborative learning setting. Through the analysis we found the intention of sharing is only positively related with subjective norm. Based on this result, we assert that subjective norm, especially the discipline from the instructor, plays a critical role in motivating students to share knowledge on a P2P network for collaborative learning. From this empirical study, a hybrid architecture combining P2P networks with servers could be more favorable for collaborative learning.", "fno": "04438709", "keywords": [ "Learning Artificial Intelligence", "Peer To Peer Computing", "Peer To Peer Networks", "Collaborative Learning", "File Sharing", "Peer To Peer Computing", "Collaborative Work", "Network Servers", "File Servers", "Technology Management", "Information Management", "Vehicles", "Web Server", "Shape", "Internet" ], "authors": [ { "affiliation": null, "fullName": "Fu-ren Lin", "givenName": "Fu-ren", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sheng-cheng Lin", "givenName": "Sheng-cheng", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying-fen Wang", "givenName": "Ying-fen", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-01-01T00:00:00", "pubType": "proceedings", "pages": "5-5", "year": "2008", "issn": "1530-1605", "isbn": "978-0-7695-3075-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04438708", "articleId": "12OmNzlD99a", "__typename": "AdjacentArticleType" }, "next": { "fno": "04438710", "articleId": "12OmNButq3b", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2008/3075/0/04439003", "title": "Can a P2P File-Sharing Network Become an e-Marketplace?", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439003/12OmNA14AiE", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/colcom/2005/0030/0/01651215", "title": "Scheduling algorithms for peer-to-peer collaborative file distribution", "doi": null, "abstractUrl": "/proceedings-article/colcom/2005/01651215/12OmNBNM8Q8", "parentPublication": { "id": "proceedings/colcom/2005/0030/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2002/1582/0/15820368", "title": "A Framework for Classifying Peer-to-Peer Technologies", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2002/15820368/12OmNBqdr2z", "parentPublication": { "id": "proceedings/ccgrid/2002/1582/0", "title": "2nd IEEE/ACM International Symposium on Cluster Computing and the Grid", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284579", "title": "On the Efficiency of Peer-to-Peer File Sharing", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284579/12OmNxGSmgu", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2018/2290/0/08343092", "title": "DTNDocs: A delay tolerant peer-to-peer collaborative editing system", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343092/12OmNxeusYA", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aict-iciw/2006/2522/0/25220097", "title": "SemreX: a Semantic Peer-to-Peer Scientific References Sharing System", "doi": null, "abstractUrl": "/proceedings-article/aict-iciw/2006/25220097/12OmNxw5BiR", "parentPublication": { "id": "proceedings/aict-iciw/2006/2522/0", "title": "Advanced International Conference on Telecommunications / Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gpc-workshops/2008/3177/0/3177a275", "title": "A Peer-to-Peer File Resource Sharing System for Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/gpc-workshops/2008/3177a275/12OmNyen1kw", "parentPublication": { "id": "proceedings/gpc-workshops/2008/3177/0", "title": "GPC Workshops - 2008 3rd International Conference on Grid and Pervasive Computing Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2002/1573/0/01015498", "title": "On reliable and scalable peer-to-peer Web document sharing", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2002/01015498/12OmNyo1o7L", "parentPublication": { "id": "proceedings/ipdps/2002/1573/1", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2008/3095/0/3095b021", "title": "XOP: Sharing XML Data Objects through Peer-to-Peer Networks", "doi": null, "abstractUrl": "/proceedings-article/aina/2008/3095b021/12OmNzgeLBN", "parentPublication": { "id": "proceedings/aina/2008/3095/0", "title": "22nd International Conference on Advanced Information Networking and Applications (aina 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icn/2007/2805/0/04196219", "title": "Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks", "doi": null, "abstractUrl": "/proceedings-article/icn/2007/04196219/17D45WWzW5C", "parentPublication": { "id": "proceedings/icn/2007/2805/0", "title": "International Conference on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNArbG4n", "title": "2008 5th International Conference on Information Technology: New Generation", "acronym": "itng", "groupId": "1001685", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzd7bTv", "doi": "10.1109/ITNG.2008.189", "title": "CoLeP: An Agent-Based Collaborative System for Pervasive Learning", "normalizedTitle": "CoLeP: An Agent-Based Collaborative System for Pervasive Learning", "abstract": "Collaborative learning is one of the intense topics from electronic learning (e-learning) to pervasive learning (p-learning) based on the diverse technology. This study attempts to shift the paradigm from e-learning to p-learning by combining pervasive computing technology. We consider students around the campus need to learn anytime anywhere except formal learning in the classroom. Consequently, this paper proposes an informal learning system called CoLeP to support pervasive learning. CoLeP system overcomes the existing learning problems such as learning in the fixed locations, teaching students accordingly with their aptitude, and interacting with limited devices. Finally, this work identifies three major contributions: (1) sharing knowledge immediately, (2) discussing collaboratively, and (3) learning anytime and anywhere.", "abstracts": [ { "abstractType": "Regular", "content": "Collaborative learning is one of the intense topics from electronic learning (e-learning) to pervasive learning (p-learning) based on the diverse technology. This study attempts to shift the paradigm from e-learning to p-learning by combining pervasive computing technology. We consider students around the campus need to learn anytime anywhere except formal learning in the classroom. Consequently, this paper proposes an informal learning system called CoLeP to support pervasive learning. CoLeP system overcomes the existing learning problems such as learning in the fixed locations, teaching students accordingly with their aptitude, and interacting with limited devices. Finally, this work identifies three major contributions: (1) sharing knowledge immediately, (2) discussing collaboratively, and (3) learning anytime and anywhere.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Collaborative learning is one of the intense topics from electronic learning (e-learning) to pervasive learning (p-learning) based on the diverse technology. This study attempts to shift the paradigm from e-learning to p-learning by combining pervasive computing technology. We consider students around the campus need to learn anytime anywhere except formal learning in the classroom. Consequently, this paper proposes an informal learning system called CoLeP to support pervasive learning. CoLeP system overcomes the existing learning problems such as learning in the fixed locations, teaching students accordingly with their aptitude, and interacting with limited devices. Finally, this work identifies three major contributions: (1) sharing knowledge immediately, (2) discussing collaboratively, and (3) learning anytime and anywhere.", "fno": "3099b148", "keywords": [ "Collaborative Learning System", "Pervasive Environment", "Informal Learning" ], "authors": [ { "affiliation": null, "fullName": "Wei-Lun Chang", "givenName": "Wei-Lun", "surname": "Chang", "__typename": "ArticleAuthorType" } ], "idPrefix": "itng", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-04-01T00:00:00", "pubType": "proceedings", "pages": "1148-1149", "year": "2008", "issn": null, "isbn": "978-0-7695-3099-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3099b146", "articleId": "12OmNya72pJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3099b150", "articleId": "12OmNAZfxIY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2009/3575/0/3575a543", "title": "A Parameter-Based Scheme for Service Composition in Pervasive Computing Environment", "doi": null, "abstractUrl": "/proceedings-article/cisis/2009/3575a543/12OmNANkolV", "parentPublication": { "id": "proceedings/cisis/2009/3575/0", "title": "2009 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2004/2245/0/22450726", "title": "Agent-Based Web Services Evolution for Pervasive Computing", "doi": null, "abstractUrl": "/proceedings-article/apsec/2004/22450726/12OmNAY79iT", "parentPublication": { "id": "proceedings/apsec/2004/2245/0", "title": "11th Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcc/2005/2315/2/231520277", "title": "Towards an Intrusion Detection System for Pervasive Computing Environments", "doi": null, "abstractUrl": "/proceedings-article/itcc/2005/231520277/12OmNBKmXll", "parentPublication": { "id": "proceedings/itcc/2005/2315/1", "title": "Proceedings. ITCC 2005 International Conference on Information Technology: Coding and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icppw/2007/2934/0/29340027", "title": "An On-line Instruction/Learning Environment for Supporting Individualized Learning in Java Programming", "doi": null, "abstractUrl": "/proceedings-article/icppw/2007/29340027/12OmNvnwViU", "parentPublication": { "id": "proceedings/icppw/2007/2934/0", "title": "2007 International Conference on Parallel Processing Workshops (ICPPW 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2007/2846/0/28460604", "title": "Fuzzy Recommendation towards QoS-Aware Pervasive Learning", "doi": null, "abstractUrl": "/proceedings-article/aina/2007/28460604/12OmNwpXRXr", "parentPublication": { "id": "proceedings/aina/2007/2846/0", "title": "21st International Conference on Advanced Information Networking and Applications (AINA '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2008/3095/0/3095a386", "title": "Performance Evaluation of Trust Management in Pervasive Computing", "doi": null, "abstractUrl": "/proceedings-article/aina/2008/3095a386/12OmNxvNZXi", "parentPublication": { "id": "proceedings/aina/2008/3095/0", "title": "22nd International Conference on Advanced Information Networking and Applications (aina 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc/2009/3737/0/3737a094", "title": "Context and Adaptivity in Context-Aware Pervasive Computing Environments", "doi": null, "abstractUrl": "/proceedings-article/uic-atc/2009/3737a094/12OmNy7h3a3", "parentPublication": { "id": "proceedings/uic-atc/2009/3737/0", "title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2011/4346/0/4346a014", "title": "A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning", "doi": null, "abstractUrl": "/proceedings-article/icalt/2011/4346a014/12OmNzvhvuS", "parentPublication": { "id": "proceedings/icalt/2011/4346/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/artcom/2009/3845/0/3845a453", "title": "The Learning Transformation through Pervasive Interfaces", "doi": null, "abstractUrl": "/proceedings-article/artcom/2009/3845a453/12OmNzw8jbI", "parentPublication": { "id": "proceedings/artcom/2009/3845/0", "title": "Advances in Recent Technologies in Communication and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2005/04/b4081", "title": "Service Discovery in Pervasive Computing Environments", "doi": null, "abstractUrl": "/magazine/pc/2005/04/b4081/13rRUxC0SBm", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AFsmcKrISQ", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "acronym": "eitt", "groupId": "1804904", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AFsw9Zc4aQ", "doi": "10.1109/EITT53287.2021.00041", "title": "Design of Blended Collaborative Learning in the Vocational Education and Training(VET) System: An Under-investigated Domain in China", "normalizedTitle": "Design of Blended Collaborative Learning in the Vocational Education and Training(VET) System: An Under-investigated Domain in China", "abstract": "Blended collaborative learning in the VET system is an under-investigated domain in China. This paper attempts to initially depict the status quo of collaborative learning of VET, understanding teachers' and students' perceptions and attitudes, and revealing existing problems of design and implementation of collaborative learning in the VET system. Through case analysis and questionnaires, this study identifies that VET students prefer collaborative learning to individual learning. The teachers are in definite need of support of design methods and tools of collaborative learning activities. Besides, free-riding, poor communication, and shallow collaboration are common problems in the collaborative learning practice of VET. Moreover, because of the diversity of the learning environment in the VET system, further exploration would be carried out in the field of blended collaborative learning, both in theoretical research and instructional practice. According to initial findings in this study, some suggestions on blended collaborative learning design and future research work are discussed at last.", "abstracts": [ { "abstractType": "Regular", "content": "Blended collaborative learning in the VET system is an under-investigated domain in China. This paper attempts to initially depict the status quo of collaborative learning of VET, understanding teachers' and students' perceptions and attitudes, and revealing existing problems of design and implementation of collaborative learning in the VET system. Through case analysis and questionnaires, this study identifies that VET students prefer collaborative learning to individual learning. The teachers are in definite need of support of design methods and tools of collaborative learning activities. Besides, free-riding, poor communication, and shallow collaboration are common problems in the collaborative learning practice of VET. Moreover, because of the diversity of the learning environment in the VET system, further exploration would be carried out in the field of blended collaborative learning, both in theoretical research and instructional practice. According to initial findings in this study, some suggestions on blended collaborative learning design and future research work are discussed at last.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Blended collaborative learning in the VET system is an under-investigated domain in China. This paper attempts to initially depict the status quo of collaborative learning of VET, understanding teachers' and students' perceptions and attitudes, and revealing existing problems of design and implementation of collaborative learning in the VET system. Through case analysis and questionnaires, this study identifies that VET students prefer collaborative learning to individual learning. The teachers are in definite need of support of design methods and tools of collaborative learning activities. Besides, free-riding, poor communication, and shallow collaboration are common problems in the collaborative learning practice of VET. Moreover, because of the diversity of the learning environment in the VET system, further exploration would be carried out in the field of blended collaborative learning, both in theoretical research and instructional practice. According to initial findings in this study, some suggestions on blended collaborative learning design and future research work are discussed at last.", "fno": "275700a167", "keywords": [ "Blended Learning", "Educational Courses", "Educational Institutions", "Further Education", "Groupware", "Vocational Training", "VET System", "Collaborative Learning Activities", "Learning Environment", "Blended Collaborative Learning Design", "Vocational Education And Training System", "China", "Technological Innovation", "Design Methodology", "Education", "Collaboration", "Collaborative Work", "Blended Collaborative Learning", "VET In China", "Collaborative Learning Design", "Status Survey" ], "authors": [ { "affiliation": "Institute of Education, Tsinghua University,Beijing,China", "fullName": "Wanruo Shi", "givenName": "Wanruo", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, Tsinghua University,Beijing,China", "fullName": "Yingqun Liu", "givenName": "Yingqun", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Education, Tsinghua University,Beijing,China", "fullName": "Xibin Han", "givenName": "Xibin", "surname": "Han", "__typename": "ArticleAuthorType" } ], "idPrefix": "eitt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "167-172", "year": "2021", "issn": null, "isbn": "978-1-6654-2757-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "275700a163", "articleId": "1AFstSLtfWM", "__typename": "AdjacentArticleType" }, "next": { "fno": "275700a173", "articleId": "1AFssDbRXZC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iset/2017/3031/0/08005433", "title": "A Study of Vocational and Professional Education and Training (VPET) Students and Teachers’ Preferred Support for Technology Based Blended Learning", "doi": null, "abstractUrl": "/proceedings-article/iset/2017/08005433/12OmNqyUUHA", "parentPublication": { "id": "proceedings/iset/2017/3031/0", "title": "2017 International Symposium on Educational Technology (ISET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/04722973", "title": "Assessment in Blended Learning: A Framework for Design and Implementation", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/04722973/12OmNvRU0dk", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2017/4868/0/07832279", "title": "The Construction of Excellent Teachers' Teaching Evaluation System in the Blended Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2017/07832279/12OmNxzuMB4", "parentPublication": { "id": "proceedings/icmtma/2017/4868/0", "title": "2017 9th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2012/4702/0/4702a129", "title": "Collaborative Learning, Social Presence and Student Satisfaction in a Blended Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/icalt/2012/4702a129/12OmNzRZpVu", "parentPublication": { "id": "proceedings/icalt/2012/4702/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a648", "title": "The Design and Implementation of Blended Collaborative Learning", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a648/17D45WKWnJt", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a157", "title": "Designing Teacher Training Scaffolds: Improving Blended Teaching Competencies and Attitudes", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a157/1AFstDvFOxO", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a028", "title": "Which One Is More Effective for Pre-service Teachers' Learning, Online or Blended Flipped Learning with Gamification?", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a028/1AFsu0ZyqGI", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2022/9248/0/924800a076", "title": "Blended Learning in VET: How Does the Teacher Plan to Use it and How Appropriate is It?", "doi": null, "abstractUrl": "/proceedings-article/eitt/2022/924800a076/1MrSMC1NVKM", "parentPublication": { "id": "proceedings/eitt/2022/9248/0", "title": "2022 Eleventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2022/9248/0/924800a025", "title": "What Makes Good Blended Collaborative Learning: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/eitt/2022/924800a025/1MrSOeWugOQ", "parentPublication": { "id": "proceedings/eitt/2022/9248/0", "title": "2022 Eleventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2020/9171/0/917100a193", "title": "Development of Online Flipped Blended Teaching Mode in Higher Vocational Education during COVID-19 outbreak: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/eitt/2020/917100a193/1qyxrdDG8pi", "parentPublication": { "id": "proceedings/eitt/2020/9171/0", "title": "2020 Ninth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yNiM8rfAGc", "title": "2021 IEEE VIS Arts Program (VISAP)", "acronym": "visap", "groupId": "1824484", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yNiMRzKS4g", "doi": "10.1109/VISAP52981.2021.00007", "title": "Visualizing Life in the Deep: A Creative Pipeline for Data-Driven Animations to Facilitate Marine Mammal Research, Outreach, and Conservation", "normalizedTitle": "Visualizing Life in the Deep: A Creative Pipeline for Data-Driven Animations to Facilitate Marine Mammal Research, Outreach, and Conservation", "abstract": "In this paper, we introduce a creative pipeline to incorporate physiological and behavioral data from contemporary marine mammal research into data-driven animations, leveraging functionality from industry tools and custom scripts to promote scientific insights, public awareness, and conservation outcomes. Our framework can flexibly transform data describing animals’ orientation, position, heart rate, and swimming stroke rate to control the position, rotation, and behavior of 3D models, to render animations, and to drive data sonification. Additionally, we explore the challenges of unifying disparate datasets gathered by an interdisciplinary team of researchers, and outline our design process for creating meaningful data visualization tools and animations. As part of our pipeline, we clean and process raw acceleration and electrophysiological signals to expedite complex multi-stream data analysis and the identification of critical foraging and escape behaviors. We provide details about four animation projects illustrating marine mammal datasets. These animations, commissioned by scientists to achieve outreach and conservation outcomes, have successfully increased the reach and engagement of the scientific projects they describe. These impactful visualizations help scientists identify behavioral responses to disturbance, increase public awareness of human-caused disturbance, and help build momentum for targeted conservation efforts backed by scientific evidence.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we introduce a creative pipeline to incorporate physiological and behavioral data from contemporary marine mammal research into data-driven animations, leveraging functionality from industry tools and custom scripts to promote scientific insights, public awareness, and conservation outcomes. Our framework can flexibly transform data describing animals’ orientation, position, heart rate, and swimming stroke rate to control the position, rotation, and behavior of 3D models, to render animations, and to drive data sonification. Additionally, we explore the challenges of unifying disparate datasets gathered by an interdisciplinary team of researchers, and outline our design process for creating meaningful data visualization tools and animations. As part of our pipeline, we clean and process raw acceleration and electrophysiological signals to expedite complex multi-stream data analysis and the identification of critical foraging and escape behaviors. We provide details about four animation projects illustrating marine mammal datasets. These animations, commissioned by scientists to achieve outreach and conservation outcomes, have successfully increased the reach and engagement of the scientific projects they describe. These impactful visualizations help scientists identify behavioral responses to disturbance, increase public awareness of human-caused disturbance, and help build momentum for targeted conservation efforts backed by scientific evidence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we introduce a creative pipeline to incorporate physiological and behavioral data from contemporary marine mammal research into data-driven animations, leveraging functionality from industry tools and custom scripts to promote scientific insights, public awareness, and conservation outcomes. Our framework can flexibly transform data describing animals’ orientation, position, heart rate, and swimming stroke rate to control the position, rotation, and behavior of 3D models, to render animations, and to drive data sonification. Additionally, we explore the challenges of unifying disparate datasets gathered by an interdisciplinary team of researchers, and outline our design process for creating meaningful data visualization tools and animations. As part of our pipeline, we clean and process raw acceleration and electrophysiological signals to expedite complex multi-stream data analysis and the identification of critical foraging and escape behaviors. We provide details about four animation projects illustrating marine mammal datasets. These animations, commissioned by scientists to achieve outreach and conservation outcomes, have successfully increased the reach and engagement of the scientific projects they describe. These impactful visualizations help scientists identify behavioral responses to disturbance, increase public awareness of human-caused disturbance, and help build momentum for targeted conservation efforts backed by scientific evidence.", "fno": "402100a001", "keywords": [ "Computer Animation", "Data Analysis", "Data Visualisation", "Geophysics Computing", "Rendering Computer Graphics", "Underwater Sound", "Data Driven Animations", "Creative Pipeline", "Physiological Data", "Behavioral Data", "Contemporary Marine Mammal Research", "Public Awareness", "Conservation Outcomes", "Animals", "Swimming Stroke Rate", "Data Sonification", "Meaningful Data Visualization Tools", "Process Raw Acceleration", "Electrophysiological Signals", "Complex Multistream Data Analysis", "Animation Projects", "Marine Mammal Datasets", "Solid Modeling", "Three Dimensional Displays", "Pipelines", "Data Visualization", "Transforms", "Tools", "Animation", "Data Driven Animation", "Marine Mammals", "Art Science Research", "Science Communication", "Ocean Sciences" ], "authors": [ { "affiliation": "UC Santa Cruz,Ecology & Evolutionary Biology", "fullName": "Jessica Kendall-Bar", "givenName": "Jessica", "surname": "Kendall-Bar", "__typename": "ArticleAuthorType" }, { "affiliation": "Kendall-Bar Studios", "fullName": "Nicolas Kendall-Bar", "givenName": "Nicolas", "surname": "Kendall-Bar", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Santa Cruz,Computational Media", "fullName": "Angus G. Forbes", "givenName": "Angus G.", "surname": "Forbes", "__typename": "ArticleAuthorType" }, { "affiliation": "San Jose State University,Moss Landing Marine Laboratories", "fullName": "Gitte McDonald", "givenName": "Gitte", "surname": "McDonald", "__typename": "ArticleAuthorType" }, { "affiliation": "UC San Diego,Scripps Institution of Oceanography", "fullName": "Paul J. Ponganis", "givenName": "Paul J.", "surname": "Ponganis", "__typename": "ArticleAuthorType" }, { "affiliation": "National Marine Mammal Foundation", "fullName": "Cassondra Williams", "givenName": "Cassondra", "surname": "Williams", "__typename": "ArticleAuthorType" }, { "affiliation": "Wildlife Technology Frontiers", "fullName": "Markus Horning", "givenName": "Markus", "surname": "Horning", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Nevada,School of Life Sciences,Las Vegas", "fullName": "Allyson Hindle", "givenName": "Allyson", "surname": "Hindle", "__typename": "ArticleAuthorType" }, { "affiliation": "Cornell University,Center for Conservation Bioacoustics", "fullName": "Holger Klinck", "givenName": "Holger", "surname": "Klinck", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Santa Cruz,Ecology & Evolutionary Biology", "fullName": "Roxanne S. Beltran", "givenName": "Roxanne S.", "surname": "Beltran", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Santa Cruz,Institute of Marine Sciences", "fullName": "Ari S. Friedlaender", "givenName": "Ari S.", "surname": "Friedlaender", "__typename": "ArticleAuthorType" }, { "affiliation": "National Oceanic and Atmospheric Administration,Stellwagen Bank National Marine Sanctuary", "fullName": "David Wiley", "givenName": "David", "surname": "Wiley", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Santa Cruz,Ecology & Evolutionary Biology", "fullName": "Daniel P. Costa", "givenName": "Daniel P.", "surname": "Costa", "__typename": "ArticleAuthorType" }, { "affiliation": "UC Santa Cruz,Ecology & Evolutionary Biology", "fullName": "Terrie M. Williams", "givenName": "Terrie M.", "surname": "Williams", "__typename": "ArticleAuthorType" } ], "idPrefix": "visap", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2021", "issn": null, "isbn": "978-1-6654-4021-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "402100z010", "articleId": "1yNiMvzyGWc", "__typename": "AdjacentArticleType" }, "next": { "fno": "402100a011", "articleId": "1yNiQ6Quukw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2013/6097/0/06550227", "title": "Poster: Puppetooner: A puppet-based system to interconnect real and virtual spaces for 3D animations", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550227/12OmNBcShSg", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2013/2510/0/2510a453", "title": "Web-Based Tool for Programming Interactive 3D Animations in Terms of State-Transition Diagrams", "doi": null, "abstractUrl": "/proceedings-article/nbis/2013/2510a453/12OmNC1Guan", "parentPublication": { "id": "proceedings/nbis/2013/2510/0", "title": "2013 16th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2017/3588/0/3588a078", "title": "The Development of a Facial Animation System Based on Performance and the Use of an RGB-D Camera", "doi": null, "abstractUrl": "/proceedings-article/svr/2017/3588a078/12OmNxV4iA1", "parentPublication": { "id": "proceedings/svr/2017/3588/0", "title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2012/4779/0/4779a893", "title": "Authoring Tool for Flash 3D Animations in Terms of State-Transition Diagrams", "doi": null, "abstractUrl": "/proceedings-article/nbis/2012/4779a893/12OmNyKrHia", "parentPublication": { "id": "proceedings/nbis/2012/4779/0", "title": "2012 15th International Conference on Network-Based Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2015/8037/0/07446154", "title": "The Application of Three-Dimensional Interactive Animation in Physical Teaching", "doi": null, "abstractUrl": "/proceedings-article/eitt/2015/07446154/12OmNz6iOqm", "parentPublication": { "id": "proceedings/eitt/2015/8037/0", "title": "2015 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446364", "title": "Empirical Evaluation of Virtual Human Conversational and Affective Animations on Visual Attention in Inter-Personal Simulations", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446364/13bd1hyoTxR", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328451", "title": "Graphical Animations of State Machines", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328451/17D45XfSEUP", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10076832", "title": "StyleVR: Stylizing Character Animations with Normalizing Flows", "doi": null, "abstractUrl": "/journal/tg/5555/01/10076832/1LFQ6Ir6DEQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807314", "title": "Multi-Scale Procedural Animations of Microtubule Dynamics Based on Measured Data", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807314/1cG6t88WKuk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2021/1898/0/189800a364", "title": "Survey and Consistency Checking of Formal Requirements Animations", "doi": null, "abstractUrl": "/proceedings-article/rew/2021/189800a364/1y2JRpiW0Bq", "parentPublication": { "id": "proceedings/rew/2021/1898/0", "title": "2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Yts", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNApculv", "doi": "10.1109/HICSS.2015.249", "title": "Perspectives of Emerging Museum Professionals on the Role of Big Data in Museums", "normalizedTitle": "Perspectives of Emerging Museum Professionals on the Role of Big Data in Museums", "abstract": "The Big Data movement is sweeping across all sectors in society including museums. These organizations are being encouraged to explore new ways to generate, track, link, and analyze data to better understand their visitors and refine their business practices. While tapping into Big Data's potential seems promising for museums, little is known about how museum professionals -- that is, those who are responsible for building the museum-to-Big-Data bridge -- speak of this trend in the context of their work. To begin to address this problem, we conducted an exploratory study consisting of a focus group with museum professionals having ten years or fewer of museum work experience. Preliminary findings point to enthusiasm for a number of perceived opportunities and benefits associated with Big Data. While limited resources such as money, skills, and infrastructure were identified as barriers, participants expressed very few concerns with the convergence of Big Data and museums.", "abstracts": [ { "abstractType": "Regular", "content": "The Big Data movement is sweeping across all sectors in society including museums. These organizations are being encouraged to explore new ways to generate, track, link, and analyze data to better understand their visitors and refine their business practices. While tapping into Big Data's potential seems promising for museums, little is known about how museum professionals -- that is, those who are responsible for building the museum-to-Big-Data bridge -- speak of this trend in the context of their work. To begin to address this problem, we conducted an exploratory study consisting of a focus group with museum professionals having ten years or fewer of museum work experience. Preliminary findings point to enthusiasm for a number of perceived opportunities and benefits associated with Big Data. While limited resources such as money, skills, and infrastructure were identified as barriers, participants expressed very few concerns with the convergence of Big Data and museums.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Big Data movement is sweeping across all sectors in society including museums. These organizations are being encouraged to explore new ways to generate, track, link, and analyze data to better understand their visitors and refine their business practices. While tapping into Big Data's potential seems promising for museums, little is known about how museum professionals -- that is, those who are responsible for building the museum-to-Big-Data bridge -- speak of this trend in the context of their work. To begin to address this problem, we conducted an exploratory study consisting of a focus group with museum professionals having ten years or fewer of museum work experience. Preliminary findings point to enthusiasm for a number of perceived opportunities and benefits associated with Big Data. While limited resources such as money, skills, and infrastructure were identified as barriers, participants expressed very few concerns with the convergence of Big Data and museums.", "fno": "7367c075", "keywords": [ "Big Data", "Joining Processes", "Context", "Organizations", "Art", "Cultural Differences", "Nonprofit", "Museums", "Big Data", "Linked Data", "Emerging Museum Professionals" ], "authors": [ { "affiliation": null, "fullName": "Rose Paquet Kinsley", "givenName": "Rose Paquet", "surname": "Kinsley", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jason Portenoy", "givenName": "Jason", "surname": "Portenoy", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2015-01-01T00:00:00", "pubType": "proceedings", "pages": "2075-2084", "year": "2015", "issn": "1530-1605", "isbn": "978-1-4799-7367-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7367c074", "articleId": "12OmNAKuoUA", "__typename": "AdjacentArticleType" }, "next": { "fno": "7367c085", "articleId": "12OmNy68EIa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2015/7644/0/7644a568", "title": "New Approach of Museums Information Dissemination in the Digital Age - Taking the Development and Design of Museum APP as an Example", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a568/12OmNqEji0N", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-amh/2012/4663/0/06483992", "title": "Tailoring the Adaptive Augmented Reality (A2R) museum visit: Identifying Cultural Heritage professionals' motivations and needs", "doi": null, "abstractUrl": "/proceedings-article/ismar-amh/2012/06483992/12OmNvyjGfR", "parentPublication": { "id": "proceedings/ismar-amh/2012/4663/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities (ISMAR-AMH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialsens/2018/6165/0/616501a038", "title": "5 Steps to Make Art Museums Tweet Influentially", "doi": null, "abstractUrl": "/proceedings-article/socialsens/2018/616501a038/12OmNx0A7Cz", "parentPublication": { "id": "proceedings/socialsens/2018/6165/0", "title": "2018 International Workshop on Social Sensing (SocialSens)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a247", "title": "Smart Museum Collection and Analysis for User Online Behavior", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a247/1H2phVff2ww", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a237", "title": "Bringing Museums to Juvenile Prison Inmates through Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a237/1KmF7KbR0Pu", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2018/6956/0/695600a382", "title": "The Virtual Museum Based on HoloLens and Vuforia", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2018/695600a382/1dUo37asgFO", "parentPublication": { "id": "proceedings/icnisc/2018/6956/0", "title": "2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcime/2019/5586/0/558600a414", "title": "Construction of Educational Resources and Design of Learning Activities in Facilitating Museum Education", "doi": null, "abstractUrl": "/proceedings-article/ijcime/2019/558600a414/1j9wyvP5YCQ", "parentPublication": { "id": "proceedings/ijcime/2019/5586/0", "title": "2019 International Joint Conference on Information, Media and Engineering (IJCIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a263", "title": "Reflection on the experience mode of Heritage Museum under the new media environment", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a263/1rSRfFxUOjK", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icid/2020/1481/0/440500a267", "title": "Research on Cultural and Creative Products Combined with Mobile Virtual Applications for Chinese Museums", "doi": null, "abstractUrl": "/proceedings-article/icid/2020/440500a267/1taFtWM75ni", "parentPublication": { "id": "proceedings/icid/2020/1481/0", "title": "2020 International Conference on Intelligent Design (ICID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2021/4854/0/485400a606", "title": "Visualization Digital System of Digital Museum Based on Big Data Technology", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2021/485400a606/1wB6FhJocvu", "parentPublication": { "id": "proceedings/icitbs/2021/4854/0", "title": "2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyPQ4uZ", "title": "Advanced Learning Technologies, IEEE International Conference on", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNx57HOa", "doi": "10.1109/ICALT.2009.57", "title": "Uncovering the Richness of an Authentic Living Museum through Pervasive Learning Environment", "normalizedTitle": "Uncovering the Richness of an Authentic Living Museum through Pervasive Learning Environment", "abstract": "The Pielinen Museum has a rich collection of untagged authentic houses, structures, and objects to exhibit. Problems emerge when visitors attempt to establish meaningful connections between the myriad of unmarked exhibits. Additionally, negative attitude towards museums especially among younger generation is a known problem. The LieksaMystpervasive learning environment helps the visitor to discover temporal and thematic connections among exhibits. LieksaMyst's story-based role-playing game is aimed to attract and motivate particularly children and young adults.", "abstracts": [ { "abstractType": "Regular", "content": "The Pielinen Museum has a rich collection of untagged authentic houses, structures, and objects to exhibit. Problems emerge when visitors attempt to establish meaningful connections between the myriad of unmarked exhibits. Additionally, negative attitude towards museums especially among younger generation is a known problem. The LieksaMystpervasive learning environment helps the visitor to discover temporal and thematic connections among exhibits. LieksaMyst's story-based role-playing game is aimed to attract and motivate particularly children and young adults.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Pielinen Museum has a rich collection of untagged authentic houses, structures, and objects to exhibit. Problems emerge when visitors attempt to establish meaningful connections between the myriad of unmarked exhibits. Additionally, negative attitude towards museums especially among younger generation is a known problem. The LieksaMystpervasive learning environment helps the visitor to discover temporal and thematic connections among exhibits. LieksaMyst's story-based role-playing game is aimed to attract and motivate particularly children and young adults.", "fno": "3711a655", "keywords": [ "Pervasive Learning Environment", "Mobile Learning", "Museum" ], "authors": [ { "affiliation": null, "fullName": "Teemu H. Laine", "givenName": "Teemu H.", "surname": "Laine", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carolina Islas Sedano", "givenName": "Carolina Islas", "surname": "Sedano", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mikko Vinni", "givenName": "Mikko", "surname": "Vinni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Erkki Sutinen", "givenName": "Erkki", "surname": "Sutinen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "655-657", "year": "2009", "issn": null, "isbn": "978-0-7695-3711-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3711a652", "articleId": "12OmNClQ0tP", "__typename": "AdjacentArticleType" }, "next": { "fno": "3711a658", "articleId": "12OmNwNwzL5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccbss/2006/2515/0/01595743", "title": "Discovery and composition of services in dynamic mobile environments", "doi": null, "abstractUrl": "/proceedings-article/iccbss/2006/01595743/12OmNC3Xhvl", "parentPublication": { "id": "proceedings/iccbss/2006/2515/0", "title": "Fifth International Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2008/3108/0/3108a095", "title": "Identifying Personalized Context-Aware Knowledge Structure for Individual User in Ubiquitous Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/wmute/2008/3108a095/12OmNClQ0DM", "parentPublication": { "id": "proceedings/wmute/2008/3108/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2010/3992/0/3992a156", "title": "MoMAt: A Mobile Museum Adaptive Tour", "doi": null, "abstractUrl": "/proceedings-article/wmute/2010/3992a156/12OmNvpNIue", "parentPublication": { "id": "proceedings/wmute/2010/3992/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2011/0680/0/05983968", "title": "iMuse Mobile Tour: A personalized multimedia museum guide opens to groups", "doi": null, "abstractUrl": "/proceedings-article/iscc/2011/05983968/12OmNx38vN6", "parentPublication": { "id": "proceedings/iscc/2011/0680/0", "title": "2011 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122799", "title": "Living Liquid: Design and Evaluation of an Exploratory Visualization Tool for Museum Visitors", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122799/13rRUNvgyWm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2012/02/mpc2012020074", "title": "Localization and Classification through Adaptive Pathway Analysis", "doi": null, "abstractUrl": "/magazine/pc/2012/02/mpc2012020074/13rRUNvgzfG", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2007/02/u2016", "title": "Enabling Mobile Phones To Support Large-Scale Museum Guidance", "doi": null, "abstractUrl": "/magazine/mu/2007/02/u2016/13rRUwgyOda", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/04/mcg2008040098", "title": "Mobile Phone-Enabled Museum Guidance with Adaptive Classification", "doi": null, "abstractUrl": "/magazine/cg/2008/04/mcg2008040098/13rRUygBw22", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J2XO4LxJkc", "title": "2022 International Conference on Artificial Intelligence and Autonomous Robot Systems (AIARS)", "acronym": "aiars", "groupId": "9942816", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J2XXMgp9qo", "doi": "10.1109/AIARS57204.2022.00060", "title": "Realization of Digital Museum Design System Based on 3D Technology", "normalizedTitle": "Realization of Digital Museum Design System Based on 3D Technology", "abstract": "With the development of science and technology, computers have gradually been applied to interior design. The emergence of 3D technology has brought an immersive experience to the museum, and users can more intuitively recognize and understand cultural relics. Relying on the maturity and development of 3D technology and the popularization of network technology, the realization of 3D digital museums becomes possible. Therefore, this article studies the subject of “the realization of a digital museum design system based on three-dimensional technology”. This paper investigates the architectural examples of the M city museum and evaluates the space design of the museum. From the perspective of interior space design, this paper combines intelligent interactive lighting technology and VR technology, and uses location information-based museum space positioning algorithms to design the cultural relics exhibition hall and 3D digital museum of the digital museum. According to survey data, regarding the demand for museum space design, the situation of the juvenile group is: 56.4% of people choose “interesting”, and 53% of people choose “multifunctional”. The situation of the elderly group is: 67.6% of the people choose “easy rest”, and 56.5% of the people choose “suitable environment.” It can be seen that it is very necessary to use 3D technology and related technologies to create museums with diverse functions and suitable environmental atmosphere for all ages.", "abstracts": [ { "abstractType": "Regular", "content": "With the development of science and technology, computers have gradually been applied to interior design. The emergence of 3D technology has brought an immersive experience to the museum, and users can more intuitively recognize and understand cultural relics. Relying on the maturity and development of 3D technology and the popularization of network technology, the realization of 3D digital museums becomes possible. Therefore, this article studies the subject of “the realization of a digital museum design system based on three-dimensional technology”. This paper investigates the architectural examples of the M city museum and evaluates the space design of the museum. From the perspective of interior space design, this paper combines intelligent interactive lighting technology and VR technology, and uses location information-based museum space positioning algorithms to design the cultural relics exhibition hall and 3D digital museum of the digital museum. According to survey data, regarding the demand for museum space design, the situation of the juvenile group is: 56.4% of people choose “interesting”, and 53% of people choose “multifunctional”. The situation of the elderly group is: 67.6% of the people choose “easy rest”, and 56.5% of the people choose “suitable environment.” It can be seen that it is very necessary to use 3D technology and related technologies to create museums with diverse functions and suitable environmental atmosphere for all ages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the development of science and technology, computers have gradually been applied to interior design. The emergence of 3D technology has brought an immersive experience to the museum, and users can more intuitively recognize and understand cultural relics. Relying on the maturity and development of 3D technology and the popularization of network technology, the realization of 3D digital museums becomes possible. Therefore, this article studies the subject of “the realization of a digital museum design system based on three-dimensional technology”. This paper investigates the architectural examples of the M city museum and evaluates the space design of the museum. From the perspective of interior space design, this paper combines intelligent interactive lighting technology and VR technology, and uses location information-based museum space positioning algorithms to design the cultural relics exhibition hall and 3D digital museum of the digital museum. According to survey data, regarding the demand for museum space design, the situation of the juvenile group is: 56.4% of people choose “interesting”, and 53% of people choose “multifunctional”. The situation of the elderly group is: 67.6% of the people choose “easy rest”, and 56.5% of the people choose “suitable environment.” It can be seen that it is very necessary to use 3D technology and related technologies to create museums with diverse functions and suitable environmental atmosphere for all ages.", "fno": "545700a237", "keywords": [ "Exhibitions", "Museums", "Virtual Reality", "3 D Digital Museums", "3 D Technology", "Cultural Relics Exhibition Hall", "Digital Museum Design System", "Intelligent Interactive Lighting Technology", "Interior Design", "Interior Space Design", "Location Information Based Museum Space Positioning Algorithms", "M City Museum", "Museum Space Design", "Network Technology", "Three Dimensional Technology", "VR Technology", "Computers", "Three Dimensional Displays", "Urban Areas", "Lighting", "Immersive Experience", "Information Age", "Museums", "Virtual Reality", "Three Dimensional Technology", "Digital Museum", "Interior Design" ], "authors": [ { "affiliation": "Shenyang Jianzhu University,Shenyang,China,110168", "fullName": "Yi Fu", "givenName": "Yi", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Shenyang Jianzhu University,Shenyang,China,110168", "fullName": "Heng Zhao", "givenName": "Heng", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "aiars", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "237-241", "year": "2022", "issn": null, "isbn": "978-1-6654-5457-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "545700a233", "articleId": "1J2XOHES9ig", "__typename": "AdjacentArticleType" }, "next": { "fno": "545700a242", "articleId": "1J2XVhZpXmo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2018/3365/0/08446581", "title": "VR Touch Museum", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446581/13bd1fKQxrI", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2012/04/mco2012040095", "title": "Mobile Applications and Museum Visitation", "doi": null, "abstractUrl": "/magazine/co/2012/04/mco2012040095/13rRUxASu4q", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icipmc/2022/6872/0/687200a120", "title": "Application of Digital Audio-Visual Technology in Museum Exhibitions of Ancient Paintings—Taking the Nanjing Museum as an Example", "doi": null, "abstractUrl": "/proceedings-article/icipmc/2022/687200a120/1GIura5rZBu", "parentPublication": { "id": "proceedings/icipmc/2022/6872/0", "title": "2022 International Conference on Image Processing and Media Computing (ICIPMC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2022/7726/0/772600a350", "title": "Digital Twin of Overseas Opera Relics: Case Study of Arhat Costumes in the Collection of the Metropolitan Museum of Art", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2022/772600a350/1M4reJ8GY6c", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2022/7726/0", "title": "2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcsit/2022/6353/0/635300a037", "title": "The Theme Space Design of Marine Elements Based on Computer Vision—Taking Busan Oceanographic Museum as an Example", "doi": null, "abstractUrl": "/proceedings-article/fcsit/2022/635300a037/1Ml2a07lfTG", "parentPublication": { "id": "proceedings/fcsit/2022/6353/0", "title": "2022 Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2022/9248/0/924800a120", "title": "Integration of Virtual Reality Technology in the Primary School: Students' Creativity and Learning Engagement", "doi": null, "abstractUrl": "/proceedings-article/eitt/2022/924800a120/1MrSNKNSTy8", "parentPublication": { "id": "proceedings/eitt/2022/9248/0", "title": "2022 Eleventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2021/3263/0/326300a151", "title": "Design Pattern of Intelligent Display Equipment in Digital Museum Based on Digital Technology", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2021/326300a151/1vb9lBqiBOw", "parentPublication": { "id": "proceedings/icsgea/2021/3263/0", "title": "2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2021/4854/0/485400a606", "title": "Visualization Digital System of Digital Museum Based on Big Data Technology", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2021/485400a606/1wB6FhJocvu", "parentPublication": { "id": "proceedings/icitbs/2021/4854/0", "title": "2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a177", "title": "Research on the Development Trend of Cultural and Creative Products under 3D Digital Technology", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a177/1ziPhP8HrFu", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2021/3225/0/322500a102", "title": "Digital Fabrication: Machine Learning-based Immersive Experiencing for the Virtual Space in a Future Museum", "doi": null, "abstractUrl": "/proceedings-article/aivr/2021/322500a102/1zxLztob44M", "parentPublication": { "id": "proceedings/aivr/2021/3225/0", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Lz2cJPyixW", "title": "2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)", "acronym": "ici2st", "groupId": "10063747", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Lz2fp83zPi", "doi": "10.1109/ICI2ST57350.2022.00015", "title": "Evaluating Extended Reality Application for a Virtual Museum. Case Study: Remigio Crespo Museum", "normalizedTitle": "Evaluating Extended Reality Application for a Virtual Museum. Case Study: Remigio Crespo Museum", "abstract": "The COVID-19 pandemic was the main reason why many organisations decided to include information and communication technologies in their processes to allow them to continue with their activities, be it providing services to users (food, medicine, etc.), training/education or disseminating culture. In the field of culture, some museums incorporated technology into their operating environment, moving from face-to-face visits to virtual visits. However, in many museums, the lack of apps designed to solve the problem of virtual visits caused some to stop receiving visitors during the pandemic. In this context, this paper describes the development of an application with a user-centred design that incorporates extended reality to allow virtual visits to the Remigio Crespo Museum in the city of Cuenca (Ecuador). The evaluation carried out to verify the application's usability and learnability is also included. The results obtained indicate that users/visitors found the application usable and easy to learn.", "abstracts": [ { "abstractType": "Regular", "content": "The COVID-19 pandemic was the main reason why many organisations decided to include information and communication technologies in their processes to allow them to continue with their activities, be it providing services to users (food, medicine, etc.), training/education or disseminating culture. In the field of culture, some museums incorporated technology into their operating environment, moving from face-to-face visits to virtual visits. However, in many museums, the lack of apps designed to solve the problem of virtual visits caused some to stop receiving visitors during the pandemic. In this context, this paper describes the development of an application with a user-centred design that incorporates extended reality to allow virtual visits to the Remigio Crespo Museum in the city of Cuenca (Ecuador). The evaluation carried out to verify the application's usability and learnability is also included. The results obtained indicate that users/visitors found the application usable and easy to learn.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The COVID-19 pandemic was the main reason why many organisations decided to include information and communication technologies in their processes to allow them to continue with their activities, be it providing services to users (food, medicine, etc.), training/education or disseminating culture. In the field of culture, some museums incorporated technology into their operating environment, moving from face-to-face visits to virtual visits. However, in many museums, the lack of apps designed to solve the problem of virtual visits caused some to stop receiving visitors during the pandemic. In this context, this paper describes the development of an application with a user-centred design that incorporates extended reality to allow virtual visits to the Remigio Crespo Museum in the city of Cuenca (Ecuador). The evaluation carried out to verify the application's usability and learnability is also included. The results obtained indicate that users/visitors found the application usable and easy to learn.", "fno": "551700a049", "keywords": [ "Diseases", "Epidemics", "Museums", "User Centred Design", "Virtual Reality", "Communication Technologies", "COVID 19 Pandemic", "Extended Reality Application", "Face To Face Visits", "Museums", "Remigio Crespo Museum", "User Centred Design", "Virtual Museum", "Virtual Visits", "COVID 19", "Pandemics", "Extended Reality", "User Centered Design", "Urban Areas", "Virtual Museums", "Software", "Extended Reality", "Virtual Museum", "User Centred Design", "Usability" ], "authors": [ { "affiliation": "Universidad de Cuenca,Computer Science Department,Cuenca,Ecuador", "fullName": "Christian Barreto-Paredes", "givenName": "Christian", "surname": "Barreto-Paredes", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de Cuenca,Computer Science Department,Cuenca,Ecuador", "fullName": "Dayana Agudo", "givenName": "Dayana", "surname": "Agudo", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de Cuenca,Computer Science Department,Cuenca,Ecuador", "fullName": "Maria Fernanda Granda", "givenName": "Maria Fernanda", "surname": "Granda", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de Cuenca,Computer Science Department,Cuenca,Ecuador", "fullName": "Otto Parra", "givenName": "Otto", "surname": "Parra", "__typename": "ArticleAuthorType" } ], "idPrefix": "ici2st", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "49-56", "year": "2022", "issn": null, "isbn": "978-1-6654-5517-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "551700a044", "articleId": "1Lz2dbTQZ1u", "__typename": "AdjacentArticleType" }, "next": { "fno": "551700a057", "articleId": "1Lz2e7ZWFEc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eitt/2015/8037/0/07446155", "title": "Mobile Application Used in Museum Learning and Its Case Study", "doi": null, "abstractUrl": "/proceedings-article/eitt/2015/07446155/12OmNA0dMUa", "parentPublication": { "id": "proceedings/eitt/2015/8037/0", "title": "2015 International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2018/6580/0/658001a144", "title": "On the Interactive Display of Virtual Aerospace Museum Based on Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icris/2018/658001a144/12OmNqzu6Oe", "parentPublication": { "id": "proceedings/icris/2018/6580/0", "title": "2018 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vsmm/2001/1402/0/14020280", "title": "Diversity and Aesthetic Appeal for a Virtual Reality World of Chinese Art", "doi": null, "abstractUrl": "/proceedings-article/vsmm/2001/14020280/12OmNxG1yPP", "parentPublication": { "id": "proceedings/vsmm/2001/1402/0", "title": "Proceedings Seventh International Conference on Virtual Systems and MultiMedia Enhanced Realities: Augmented and Unplugged", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122799", "title": "Living Liquid: Design and Evaluation of an Exploratory Visualization Tool for Museum Visitors", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122799/13rRUNvgyWm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700c344", "title": "The Application of Augmented Reality Technology in Museum Display Design", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700c344/1DND5QhoUzm", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a234", "title": "Representing Cross-Cultural Links of Artifacts in Museums with Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a234/1KmF8PPuKwE", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a225", "title": "Toward inclusivity: Virtual reality museums for the visually impaired", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a225/1KmF9FKnXyg", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2019/3485/0/348500a357", "title": "Towards Enhancing User Experience through a Web-Based Augmented Reality Museum", "doi": null, "abstractUrl": "/proceedings-article/icalt/2019/348500a357/1cYi0fAR90A", "parentPublication": { "id": "proceedings/icalt/2019/3485/2161-377X", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaie/2020/6659/0/665900a443", "title": "Research of Evaluation Method for Museum Visit", "doi": null, "abstractUrl": "/proceedings-article/icaie/2020/665900a443/1oZBGkI3eM0", "parentPublication": { "id": "proceedings/icaie/2020/6659/0", "title": "2020 International Conference on Artificial Intelligence and Education (ICAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2021/3225/0/322500a106", "title": "Towards a Standard Approach for the Design of a both Physical and Virtual Museum", "doi": null, "abstractUrl": "/proceedings-article/aivr/2021/322500a106/1zxLC7rtrYA", "parentPublication": { "id": "proceedings/aivr/2021/3225/0", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cYi06q10li", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYi0fAR90A", "doi": "10.1109/ICALT.2019.00110", "title": "Towards Enhancing User Experience through a Web-Based Augmented Reality Museum", "normalizedTitle": "Towards Enhancing User Experience through a Web-Based Augmented Reality Museum", "abstract": "Museums act as a vehicle to collect, preserve and demonstrate historical, cultural and scientific heritage to a larger community of end users. However, there is neither increase in the number of physical visitors nor visitors to online museum, despite their availability on the web. On the other hand, Augmented Reality has emerged as a potential technology to support and enhance experience of end users in different communities especially in digital heritage. In this paper, we propose Augmented Reality Museum (ARM) as an application that can enhance online museum visitor experience. Augmented Reality can be integrated as a mobile application that provides 3D view of an artifact, along with information about its historic, artistic and/or scientific importance. We present the design and development of ARM and demonstrate it for the case study of Online British Museum. Our user experience study conducted with 21 volunteers shows that ARM is potentially a good way to enhance user experience.", "abstracts": [ { "abstractType": "Regular", "content": "Museums act as a vehicle to collect, preserve and demonstrate historical, cultural and scientific heritage to a larger community of end users. However, there is neither increase in the number of physical visitors nor visitors to online museum, despite their availability on the web. On the other hand, Augmented Reality has emerged as a potential technology to support and enhance experience of end users in different communities especially in digital heritage. In this paper, we propose Augmented Reality Museum (ARM) as an application that can enhance online museum visitor experience. Augmented Reality can be integrated as a mobile application that provides 3D view of an artifact, along with information about its historic, artistic and/or scientific importance. We present the design and development of ARM and demonstrate it for the case study of Online British Museum. Our user experience study conducted with 21 volunteers shows that ARM is potentially a good way to enhance user experience.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Museums act as a vehicle to collect, preserve and demonstrate historical, cultural and scientific heritage to a larger community of end users. However, there is neither increase in the number of physical visitors nor visitors to online museum, despite their availability on the web. On the other hand, Augmented Reality has emerged as a potential technology to support and enhance experience of end users in different communities especially in digital heritage. In this paper, we propose Augmented Reality Museum (ARM) as an application that can enhance online museum visitor experience. Augmented Reality can be integrated as a mobile application that provides 3D view of an artifact, along with information about its historic, artistic and/or scientific importance. We present the design and development of ARM and demonstrate it for the case study of Online British Museum. Our user experience study conducted with 21 volunteers shows that ARM is potentially a good way to enhance user experience.", "fno": "348500a357", "keywords": [ "Augmented Reality", "Internet", "Mobile Computing", "Museums", "Cultural Heritage", "Scientific Heritage", "Digital Heritage", "Online Museum Visitor Experience", "Mobile Application", "Online British Museum", "Museums Act", "Historical Heritage", "User Experience", "Web Based Augmented Reality Museum", "Three Dimensional Displays", "Solid Modeling", "Augmented Reality", "Two Dimensional Displays", "Cultural Differences", "User Experience", "Visualization", "Augmented Reality", "Museums", "Web", "Unity 3 D" ], "authors": [ { "affiliation": "Indian Institute of Technology, Tirupati", "fullName": "Akhila Sri Manasa Venigalla", "givenName": "Akhila Sri Manasa", "surname": "Venigalla", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Technology, Tirupati", "fullName": "Sridhar Chimalakonda", "givenName": "Sridhar", "surname": "Chimalakonda", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "357-358", "year": "2019", "issn": null, "isbn": "978-1-7281-3485-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "348500a354", "articleId": "1cYi0vn0ReU", "__typename": "AdjacentArticleType" }, "next": { "fno": "348500a359", "articleId": "1cYi2MX9YK4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar-amh/2010/9339/0/05643290", "title": "A day at the museum: An augmented fine-art exhibit", "doi": null, "abstractUrl": "/proceedings-article/ismar-amh/2010/05643290/12OmNvStcA2", "parentPublication": { "id": "proceedings/ismar-amh/2010/9339/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality - Arts, Media, and Humanities", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2016/2722/0/07590376", "title": "Virtual Museum: Playful Visitor Experience in the Real and Virtual World", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2016/07590376/12OmNvq5jys", "parentPublication": { "id": "proceedings/vs-games/2016/2722/0", "title": "2016 8th International Conference on Games and Virtual Worlds for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2016/5698/0/07907500", "title": "An Interactive 3D Holographic Pyramid for Museum Exhibition", "doi": null, "abstractUrl": "/proceedings-article/sitis/2016/07907500/12OmNwNeYxP", "parentPublication": { "id": "proceedings/sitis/2016/5698/0", "title": "2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a466", "title": "ARCoins. An Augmented Reality App for Learning about Numismatics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a466/12OmNyqRn48", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493434", "title": "Momap - An Interactive Gamified App for the Museum of Mineralogy", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493434/14tNJqSJyx3", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204253", "title": "V-Museum: A Virtual Museum Based on Augmented and Virtual Realities for Cultural Heritage Mediation", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204253/1nmi6wdZpG8", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a263", "title": "Reflection on the experience mode of Heritage Museum under the new media environment", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a263/1rSRfFxUOjK", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a669", "title": "ARThings – enhancing the visitors’ experience in museums through collaborative AR", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a669/1tnWQP8py0w", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a513", "title": "Deepfake Portraits in Augmented Reality for Museum Exhibits", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a513/1yeQTODhIJ2", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a013", "title": "CubeMuseum: An Augmented Reality Prototype of Embodied Virtual Museum", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a013/1yeQTz52lRS", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBaT5ZE", "title": "International Conference on Cyber Security (CyberSecurity)", "acronym": "cybersecurity", "groupId": "1802711", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNqFrGvW", "doi": "10.1109/CyberSecurity.2012.32", "title": "A Compose Language-Based Framework for Secure Service Composition", "normalizedTitle": "A Compose Language-Based Framework for Secure Service Composition", "abstract": "Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.", "abstracts": [ { "abstractType": "Regular", "content": "Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Security is crucial in service composition. Any changes made to the composition may result in undesirable security properties for the composed system. An effective monitoring and analysis mechanism is needed to protect the dynamically changing service composition at run-time. This paper introduces a modelling platform that allows the demonstration and testing of secure service composition as the composition develops over time. With its graphical user interface, participating services and their relationships are easily monitored and analysed. A script composition language is also explained in the paper. It has been used to implement security policies for the service composition.", "fno": "5014a195", "keywords": [ "Security Analysis", "Service Composition", "Security Policy", "Compose Language" ], "authors": [ { "affiliation": null, "fullName": "Bo Zhou", "givenName": "Bo", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Llewellyn-Jones", "givenName": "David", "surname": "Llewellyn-Jones", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qi Shi", "givenName": "Qi", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Muhammad Asim", "givenName": "Muhammad", "surname": "Asim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Madjid Merabti", "givenName": "Madjid", "surname": "Merabti", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Lamb", "givenName": "David", "surname": "Lamb", "__typename": "ArticleAuthorType" } ], "idPrefix": "cybersecurity", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "195-202", "year": "2012", "issn": null, "isbn": "978-1-4799-0219-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5014a187", "articleId": "12OmNBuL1lr", "__typename": "AdjacentArticleType" }, "next": { "fno": "5014a203", "articleId": "12OmNzBOhTi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scc/2011/4462/0/4462a402", "title": "Cultural Language Service: A Discovery, Composition and Organization", "doi": null, "abstractUrl": "/proceedings-article/scc/2011/4462a402/12OmNBpmDCS", "parentPublication": { "id": "proceedings/scc/2011/4462/0", "title": "2011 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialcom/2010/4211/0/4211a873", "title": "The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2010/4211a873/12OmNButpZb", "parentPublication": { "id": "proceedings/socialcom/2010/4211/0", "title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2010/4227/0/4227a222", "title": "A Language-Based Framework for Analyzing Service Representation Models and Service Composition Approaches", "doi": null, "abstractUrl": "/proceedings-article/icebe/2010/4227a222/12OmNC2xhFz", "parentPublication": { "id": "proceedings/icebe/2010/4227/0", "title": "2010 IEEE 7th International Conference on E-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2010/4266/0/4266a176", "title": "Aspect Oriented Approach to Building Secure Service Composition", "doi": null, "abstractUrl": "/proceedings-article/apsec/2010/4266a176/12OmNvjyxW9", "parentPublication": { "id": "proceedings/apsec/2010/4266/0", "title": "2010 Asia Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a235", "title": "QoS Analysis for Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a235/12OmNvrvjf5", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2012/4756/0/4756a184", "title": "Constructing Secure Service Compositions with Patterns", "doi": null, "abstractUrl": "/proceedings-article/services/2012/4756a184/12OmNvy25cS", "parentPublication": { "id": "proceedings/services/2012/4756/0", "title": "2012 IEEE Eighth World Congress on Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2008/3401/0/3401a509", "title": "Service Search based on Service Composition Social Network", "doi": null, "abstractUrl": "/proceedings-article/skg/2008/3401a509/12OmNxIzWNB", "parentPublication": { "id": "proceedings/skg/2008/3401/0", "title": "2008 Fourth International Conference on Semantics, Knowledge and Grid (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a486", "title": "Service Composition Based on Natural Language Requests", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a486/12OmNxWuirB", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2008/3504/0/3504a582", "title": "Solutions on Composition Estimation Problems of Service Composition", "doi": null, "abstractUrl": "/proceedings-article/iccee/2008/3504a582/12OmNyvGyj6", "parentPublication": { "id": "proceedings/iccee/2008/3504/0", "title": "2008 International Conference on Computer and Electrical Engineering (ICCEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2010/3973/0/3973a437", "title": "Context-Aware Pervasive Service Composition", "doi": null, "abstractUrl": "/proceedings-article/isms/2010/3973a437/12OmNzkMlQT", "parentPublication": { "id": "proceedings/isms/2010/3973/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgop5XeEHm", "title": "2009 International Conference on Computational Science and Engineering", "acronym": "cse", "groupId": "1002115", "volume": "1", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNvzJFSQ", "doi": "10.1109/CSE.2009.161", "title": "VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service Composition", "normalizedTitle": "VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service Composition", "abstract": "Web services provide an avenue of the loosely coupled service-oriented architecture and facilitate the process of enterprise application integration by encapsulating information, software and other existing resources. To exploit the true potential of web services, it is vital to develop technologies and tools for web service composition. However, for most of end-users, due to the lack of the knowledge about web services, it is hard for them to understand the existing complex web service compositions and satisfy their demands based on such poor understanding. While numerous web service composition tools have been developed for professionals to study and compose web services in the past, very little has been done towards the tooling to facilitate the composition process for end-users. In this paper, we visualize the composition process of web services and formalize end-users’ demands via presenting an ontology-based tool VFT (Visualization and Formalization Tool) which is able to ease the process of web service composition for end-users by using their ontological descriptions and relationships to other services. We elaborate on the design of the tool and discuss its usability based on the findings of a user survey.", "abstracts": [ { "abstractType": "Regular", "content": "Web services provide an avenue of the loosely coupled service-oriented architecture and facilitate the process of enterprise application integration by encapsulating information, software and other existing resources. To exploit the true potential of web services, it is vital to develop technologies and tools for web service composition. However, for most of end-users, due to the lack of the knowledge about web services, it is hard for them to understand the existing complex web service compositions and satisfy their demands based on such poor understanding. While numerous web service composition tools have been developed for professionals to study and compose web services in the past, very little has been done towards the tooling to facilitate the composition process for end-users. In this paper, we visualize the composition process of web services and formalize end-users’ demands via presenting an ontology-based tool VFT (Visualization and Formalization Tool) which is able to ease the process of web service composition for end-users by using their ontological descriptions and relationships to other services. We elaborate on the design of the tool and discuss its usability based on the findings of a user survey.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Web services provide an avenue of the loosely coupled service-oriented architecture and facilitate the process of enterprise application integration by encapsulating information, software and other existing resources. To exploit the true potential of web services, it is vital to develop technologies and tools for web service composition. However, for most of end-users, due to the lack of the knowledge about web services, it is hard for them to understand the existing complex web service compositions and satisfy their demands based on such poor understanding. While numerous web service composition tools have been developed for professionals to study and compose web services in the past, very little has been done towards the tooling to facilitate the composition process for end-users. In this paper, we visualize the composition process of web services and formalize end-users’ demands via presenting an ontology-based tool VFT (Visualization and Formalization Tool) which is able to ease the process of web service composition for end-users by using their ontological descriptions and relationships to other services. We elaborate on the design of the tool and discuss its usability based on the findings of a user survey.", "fno": "3823a271", "keywords": [ "Web Service Composition", "Visualization", "Formalization", "Ontology", "End User" ], "authors": [ { "affiliation": null, "fullName": "Chao Ma", "givenName": "Chao", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanxiang He", "givenName": "Yanxiang", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Naixue Xiong", "givenName": "Naixue", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Laurence T. Yang", "givenName": "Laurence T.", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "271-276", "year": "2009", "issn": null, "isbn": "978-0-7695-3823-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3823a265", "articleId": "12OmNwDACxK", "__typename": "AdjacentArticleType" }, "next": { "fno": "3823a277", "articleId": "12OmNAndikl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wism/2009/3817/0/3817a570", "title": "An Ontology-Based Service Composition Approach for Integrating E-Learning Tools", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a570/12OmNAle6FV", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/1/3557b042", "title": "Web Service Composition Based on the Annotated Ontology", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557b042/12OmNCbkQAn", "parentPublication": { "id": "proceedings/etcs/2009/3557/2", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2009/3888/1/3888a103", "title": "Formalization and Verification of Automatic Composition Based on Pi-Calculus for Semantic Web Service", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888a103/12OmNCuDzqH", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/1/3801a418", "title": "Semantic Web Service Composition Using Planning and Ontology Concept Relevance", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801a418/12OmNqFJhBT", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/1", "title": "2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cec-east/2004/2206/0/22060270", "title": "An Ontology Modeling Method in Semantic Composition of Web Services", "doi": null, "abstractUrl": "/proceedings-article/cec-east/2004/22060270/12OmNwK7o7E", "parentPublication": { "id": "proceedings/cec-east/2004/2206/0", "title": "E-Commerce Technology for Dynamic E-Business, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifita/2009/3600/3/3600c604", "title": "Design for Web Service Composition Tool Based on Qos Ontology and BPEL", "doi": null, "abstractUrl": "/proceedings-article/ifita/2009/3600c604/12OmNwcUk4B", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2009/3842/0/3842a365", "title": "An Ontology-Driven Discovery Architecture to Support Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icebe/2009/3842a365/12OmNwvVrzY", "parentPublication": { "id": "proceedings/icebe/2009/3842/0", "title": "2009 IEEE International Conference on e-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wism/2009/3817/0/3817a342", "title": "An Approach for Visualization and Formalization of Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a342/12OmNz2TCJV", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2010/4279/2/4279b110", "title": "Leveraging Ontology-aided AI Planning for Automatic Composition of Semantic Web Services", "doi": null, "abstractUrl": "/proceedings-article/iciii/2010/4279b110/12OmNzR8Czv", "parentPublication": { "id": "proceedings/iciii/2010/4279/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2010/4324/0/4324a449", "title": "Ant-Inspired Technique for Automatic Web Service Composition and Selection", "doi": null, "abstractUrl": "/proceedings-article/synasc/2010/4324a449/12OmNzV70Pj", "parentPublication": { "id": "proceedings/synasc/2010/4324/0", "title": "2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4Iq", "title": "2011 IEEE International Conference on Web Services", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxRnvQB", "doi": "10.1109/ICWS.2011.15", "title": "Semi-empirical Service Composition: A Clustering Based Approach", "normalizedTitle": "Semi-empirical Service Composition: A Clustering Based Approach", "abstract": "Service composition has the capability of constructing coarse-grained solutions by dynamically aggregating a set of services to satisfy complex requirements, but it suffers from dramatic decrease on the efficiency of determining the best composition solution when large scale candidate services are available. Most current approaches look for the optimal composition solution by real-time computation, and the composition efficiency greatly depends on the adopted algorithms. To eliminate such deficiency, this paper proposes a semi-empirical composition approach which incorporates two stages, i.e., periodical clustering and real-time composition. The former partitions the candidate services and historical requirements into clusters based on similarity measurement, and then the probabilistic correspondences between service clusters and requirement clusters are identified by statistical analysis. The latter deals with a new requirement by firstly finding its most similar requirement cluster and the corresponding service clusters by leveraging Bayesian inference, then a set of concrete services are optimally selected from such reduced solution space and constitute the final composition solution. Instead of relying on solely historical data exploration or on pure real-time computation, our approach distinguishes from traditional methods by combining the two perspectives together. Experiments demonstrate the advantages of this approach.", "abstracts": [ { "abstractType": "Regular", "content": "Service composition has the capability of constructing coarse-grained solutions by dynamically aggregating a set of services to satisfy complex requirements, but it suffers from dramatic decrease on the efficiency of determining the best composition solution when large scale candidate services are available. Most current approaches look for the optimal composition solution by real-time computation, and the composition efficiency greatly depends on the adopted algorithms. To eliminate such deficiency, this paper proposes a semi-empirical composition approach which incorporates two stages, i.e., periodical clustering and real-time composition. The former partitions the candidate services and historical requirements into clusters based on similarity measurement, and then the probabilistic correspondences between service clusters and requirement clusters are identified by statistical analysis. The latter deals with a new requirement by firstly finding its most similar requirement cluster and the corresponding service clusters by leveraging Bayesian inference, then a set of concrete services are optimally selected from such reduced solution space and constitute the final composition solution. Instead of relying on solely historical data exploration or on pure real-time computation, our approach distinguishes from traditional methods by combining the two perspectives together. Experiments demonstrate the advantages of this approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Service composition has the capability of constructing coarse-grained solutions by dynamically aggregating a set of services to satisfy complex requirements, but it suffers from dramatic decrease on the efficiency of determining the best composition solution when large scale candidate services are available. Most current approaches look for the optimal composition solution by real-time computation, and the composition efficiency greatly depends on the adopted algorithms. To eliminate such deficiency, this paper proposes a semi-empirical composition approach which incorporates two stages, i.e., periodical clustering and real-time composition. The former partitions the candidate services and historical requirements into clusters based on similarity measurement, and then the probabilistic correspondences between service clusters and requirement clusters are identified by statistical analysis. The latter deals with a new requirement by firstly finding its most similar requirement cluster and the corresponding service clusters by leveraging Bayesian inference, then a set of concrete services are optimally selected from such reduced solution space and constitute the final composition solution. Instead of relying on solely historical data exploration or on pure real-time computation, our approach distinguishes from traditional methods by combining the two perspectives together. Experiments demonstrate the advantages of this approach.", "fno": "4463a219", "keywords": [ "Web Service Composition", "Qo S", "Bayesian Inference", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Xianzhi Wang", "givenName": "Xianzhi", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhongjie Wang", "givenName": "Zhongjie", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaofei Xu", "givenName": "Xiaofei", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "219-226", "year": "2011", "issn": null, "isbn": "978-0-7695-4463-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4463a211", "articleId": "12OmNxWcH9I", "__typename": "AdjacentArticleType" }, "next": { "fno": "4463a227", "articleId": "12OmNzsJ7Hk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icebe/2010/4227/0/4227a256", "title": "A Structure-Wise Service Selection Approach for Efficient Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icebe/2010/4227a256/12OmNAkWvNC", "parentPublication": { "id": "proceedings/icebe/2010/4227/0", "title": "2010 IEEE 7th International Conference on E-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gpc/2009/3677/0/3677a011", "title": "A Workflow Framework for Intelligent Service Composition", "doi": null, "abstractUrl": "/proceedings-article/gpc/2009/3677a011/12OmNBSBjZU", "parentPublication": { "id": "proceedings/gpc/2009/3677/0", "title": "Grid and Pervasive Computing Conference, Workshops at the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wism/2009/3817/0/3817a297", "title": "A Learning Automation Solution to the QoS-Aware Service Composition", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a297/12OmNC2OSNN", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwcse/2009/3881/2/3881b462", "title": "Analyzing Feasibility of Requirement Driven Service Composition", "doi": null, "abstractUrl": "/proceedings-article/iwcse/2009/3881b462/12OmNCcKQDw", "parentPublication": { "id": "proceedings/iwcse/2009/3881/2", "title": "Computer Science and Engineering, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b733", "title": "Towards Composition as a Service - A Quality of Service Driven Approach", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b733/12OmNCh0Pcp", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2009/3964/0/3964a376", "title": "Immune-inspired Web Service Composition Framework", "doi": null, "abstractUrl": "/proceedings-article/synasc/2009/3964a376/12OmNrFTrah", "parentPublication": { "id": "proceedings/synasc/2009/3964/0", "title": "2009 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a235", "title": "QoS Analysis for Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a235/12OmNvrvjf5", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecows/2010/4310/0/4310a067", "title": "QoS-Aware Service Composition: A Survey", "doi": null, "abstractUrl": "/proceedings-article/ecows/2010/4310a067/12OmNwIHoBT", "parentPublication": { "id": "proceedings/ecows/2010/4310/0", "title": "Web Services, European Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icie/2009/3679/1/3679a422", "title": "Reliable Transactional Web Service Composition Using Refinement Method", "doi": null, "abstractUrl": "/proceedings-article/icie/2009/3679a422/12OmNyaoDwx", "parentPublication": { "id": "proceedings/icie/2009/3679/1", "title": "2009 WASE International Conference on Information Engineering (ICIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soca/2019/5411/0/541100a041", "title": "Towards Scalable Semantic Service Composition", "doi": null, "abstractUrl": "/proceedings-article/soca/2019/541100a041/1gysLTKGTUA", "parentPublication": { "id": "proceedings/soca/2019/5411/0", "title": "2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuIjeS", "title": "2011 IEEE International Conference on Services Computing", "acronym": "scc", "groupId": "1001209", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxeut3K", "doi": "10.1109/SCC.2011.10", "title": "CBBCM: Clustering Based Automatic Service Composition", "normalizedTitle": "CBBCM: Clustering Based Automatic Service Composition", "abstract": "Automatic web services composition approaches aim at automatically composing services to satisfy users' request according to the information of users' input. As the number of web services is increasing, the performance of automatic service composition is faced with challenges. In this paper, we propose an approach based on backward chaining method to compose web services with high performance and good Qos, called Clustering Based Backward Chaining Method (CBBCM). We use k-means method to cluster services as the preliminary work. Services are clustered according to the semantic similarities of their output parameters. Skyline is used as an optimization to set services with good Qos on the top of each cluster. Then the adapted backward chaining method is applied to compose services. We evaluate our approach and the backward chaining method through experiment with different datasets. It is proved that our algorithm has a high performance and gets the composition results with better Qos.", "abstracts": [ { "abstractType": "Regular", "content": "Automatic web services composition approaches aim at automatically composing services to satisfy users' request according to the information of users' input. As the number of web services is increasing, the performance of automatic service composition is faced with challenges. In this paper, we propose an approach based on backward chaining method to compose web services with high performance and good Qos, called Clustering Based Backward Chaining Method (CBBCM). We use k-means method to cluster services as the preliminary work. Services are clustered according to the semantic similarities of their output parameters. Skyline is used as an optimization to set services with good Qos on the top of each cluster. Then the adapted backward chaining method is applied to compose services. We evaluate our approach and the backward chaining method through experiment with different datasets. It is proved that our algorithm has a high performance and gets the composition results with better Qos.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automatic web services composition approaches aim at automatically composing services to satisfy users' request according to the information of users' input. As the number of web services is increasing, the performance of automatic service composition is faced with challenges. In this paper, we propose an approach based on backward chaining method to compose web services with high performance and good Qos, called Clustering Based Backward Chaining Method (CBBCM). We use k-means method to cluster services as the preliminary work. Services are clustered according to the semantic similarities of their output parameters. Skyline is used as an optimization to set services with good Qos on the top of each cluster. Then the adapted backward chaining method is applied to compose services. We evaluate our approach and the backward chaining method through experiment with different datasets. It is proved that our algorithm has a high performance and gets the composition results with better Qos.", "fno": "4462a354", "keywords": [ "Service Composition", "Backward Chaining Method", "Semantic Similarity" ], "authors": [ { "affiliation": null, "fullName": "Ying Ma", "givenName": "Ying", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Liang Chen", "givenName": "Liang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jian Hui", "givenName": "Jian", "surname": "Hui", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jian Wu", "givenName": "Jian", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "scc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "354-361", "year": "2011", "issn": null, "isbn": "978-0-7695-4462-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4462a346", "articleId": "12OmNyshmHF", "__typename": "AdjacentArticleType" }, "next": { "fno": "4462a362", "articleId": "12OmNzUPpkk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2008/3310/0/3310a764", "title": "Transforming Abstract QoS Requirements, Preferences, and Logic Constraints for Automatic Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icws/2008/3310a764/12OmNBqMDfj", "parentPublication": { "id": "proceedings/icws/2008/3310/0", "title": "2008 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997c288", "title": "A Semantic Web Service Composition Method Based on an Enhanced Planning Graph", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997c288/12OmNCbU2S8", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c390", "title": "Automated Composition of Semantic Web Service Using Data Mediator and Complete Backward Tree", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c390/12OmNCwUmxb", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2009/3964/0/3964a376", "title": "Immune-inspired Web Service Composition Framework", "doi": null, "abstractUrl": "/proceedings-article/synasc/2009/3964a376/12OmNrFTrah", "parentPublication": { "id": "proceedings/synasc/2009/3964/0", "title": "2009 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2009/3836/2/3836b136", "title": "Modeling and Transforming Abstract Constraints for Automatic Service Composition", "doi": null, "abstractUrl": "/proceedings-article/cit/2009/3836b136/12OmNwF0BJ5", "parentPublication": { "id": "proceedings/cit/2009/3836/2", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cec/2009/3755/0/3755a523", "title": "A QoS-Driven Approach for Semantic Service Composition", "doi": null, "abstractUrl": "/proceedings-article/cec/2009/3755a523/12OmNx7ouIU", "parentPublication": { "id": "proceedings/cec/2009/3755/0", "title": "2009 IEEE Conference on Commerce and Enterprise Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbcars/2012/4917/0/4917a111", "title": "Applying Ontological Similarity to Automatic Service Composition to Generate Alternative Business Processes", "doi": null, "abstractUrl": "/proceedings-article/sbcars/2012/4917a111/12OmNxcMSkh", "parentPublication": { "id": "proceedings/sbcars/2012/4917/0", "title": "2012 Sixth Brazilian Symposium on Software Components, Architectures and Reuse", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2011/4463/0/4463a089", "title": "QoS-Aware Automatic Service Composition by Applying Functional Clustering", "doi": null, "abstractUrl": "/proceedings-article/icws/2011/4463a089/12OmNy7QfkN", "parentPublication": { "id": "proceedings/icws/2011/4463/0", "title": "2011 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2010/4323/0/4323a369", "title": "A QoS-Optimal Automatic Service Composition Method Based on Backtracting Theory", "doi": null, "abstractUrl": "/proceedings-article/cse/2010/4323a369/12OmNyrqzCG", "parentPublication": { "id": "proceedings/cse/2010/4323/0", "title": "2010 13th IEEE International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2010/4324/0/4324a449", "title": "Ant-Inspired Technique for Automatic Web Service Composition and Selection", "doi": null, "abstractUrl": "/proceedings-article/synasc/2010/4324a449/12OmNzV70Pj", "parentPublication": { "id": "proceedings/synasc/2010/4324/0", "title": "2010 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqwi", "title": "Digital Libraries: Research and Practice, Kyoto International Conference on", "acronym": "kyotodl", "groupId": "1002219", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNxiKrVo", "doi": "10.1109/DLRP.2000.942205", "title": "View Composition for Digital Libraries", "normalizedTitle": "View Composition for Digital Libraries", "abstract": "In this paper, we propose a novel visual interface for digital libraries, which employs a collection of views and a compositional mechanism of views. While the views capture and visualize specific aspects of digital libraries, their compositions can be utilized to give deeper and richer insights into a set of retrieved data. Two types of composition - superimposition and neighboring - of views are introduced. Some mathematical properties and functions associated with view composition are also described.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a novel visual interface for digital libraries, which employs a collection of views and a compositional mechanism of views. While the views capture and visualize specific aspects of digital libraries, their compositions can be utilized to give deeper and richer insights into a set of retrieved data. Two types of composition - superimposition and neighboring - of views are introduced. Some mathematical properties and functions associated with view composition are also described.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a novel visual interface for digital libraries, which employs a collection of views and a compositional mechanism of views. While the views capture and visualize specific aspects of digital libraries, their compositions can be utilized to give deeper and richer insights into a set of retrieved data. Two types of composition - superimposition and neighboring - of views are introduced. Some mathematical properties and functions associated with view composition are also described.", "fno": "10220426", "keywords": [ "Information Visualization", "View Composition", "Information Outlining" ], "authors": [ { "affiliation": "IBM Research, Japan", "fullName": "Koichi Takeda", "givenName": "Koichi", "surname": "Takeda", "__typename": "ArticleAuthorType" } ], "idPrefix": "kyotodl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-11-01T00:00:00", "pubType": "proceedings", "pages": "426", "year": "2000", "issn": null, "isbn": "0-7695-1022-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10220418", "articleId": "12OmNCdk2uD", "__typename": "AdjacentArticleType" }, "next": { "fno": "10220434", "articleId": "12OmNrkBwEz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2006/2632/0/263200257", "title": "ASIDE: An Architecture for Supporting Interoperability between Digital Libraries and ELearning Applications", "doi": null, "abstractUrl": "/proceedings-article/icalt/2006/263200257/12OmNAOsMNL", "parentPublication": { "id": "proceedings/icalt/2006/2632/0", "title": "Sixth International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336099", "title": "Digital trail libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336099/12OmNBqv28C", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118623", "title": "Evaluating digital libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118623/12OmNCcKQD2", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2006/354/0/04119185", "title": "Using citations for ranking in digital libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2006/04119185/12OmNqFJhQ8", "parentPublication": { "id": "proceedings/jcdl/2006/354/0", "title": "2006 IEEE/ACM 6th Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecows/2005/2484/0/24840170", "title": "A View-based Approach for Tracking Composite Web Services", "doi": null, "abstractUrl": "/proceedings-article/ecows/2005/24840170/12OmNwpoFBJ", "parentPublication": { "id": "proceedings/ecows/2005/2484/0", "title": "Proceedings. Third European Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336170", "title": "Dynamically generating conceptual browsing interfaces for digital libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336170/12OmNxzMnUM", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559555", "title": "Future digital libraries: Research and responsibilities", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559555/12OmNzA6GLN", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2001/2287/0/22870106", "title": "A Multi-View Intelligent Editor for Digital Video Libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2001/22870106/12OmNzA6GS3", "parentPublication": { "id": "proceedings/jcdl/2001/2287/0", "title": "Digital Libraries, Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1993/11/ry079", "title": "Digital libraries", "doi": null, "abstractUrl": "/magazine/co/1993/11/ry079/13rRUygT7dr", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2013/01/tts2013010063", "title": "Language-Independent and Automated Software Composition: The FeatureHouse Experience", "doi": null, "abstractUrl": "/journal/ts/2013/01/tts2013010063/13rRUyuvRqI", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4Iq", "title": "2011 IEEE International Conference on Web Services", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNy7QfkN", "doi": "10.1109/ICWS.2011.32", "title": "QoS-Aware Automatic Service Composition by Applying Functional Clustering", "normalizedTitle": "QoS-Aware Automatic Service Composition by Applying Functional Clustering", "abstract": "With the steadily growing number of service providers the competition becomes more and more intense. In order to find a distinctive edge over other competitors, automatic service composition can be applied to further adapt to the requirements of the users. Most of the current composition approaches can be categorized as either planning or selection algorithms. The former automatically create workflows and tend to neglect Quality-of-Service (QoS) concerns, drawing compositions useless if user constraints are violated. Selection algorithms on the other hand optimize the QoS but provide no functional flexibility. In this paper we show how the strengths of both approaches can be combined by leveraging common characteristics of service registries. Therefore we utilize a data structure which arranges functionally similar services in clusters and computes the QoS of each cluster. Our planning tool composes workflows consisting of these clusters, taking the QoS of the clusters into account. This way, the utility in general and the reliability of the composed workflows are significantly increased. We prove the feasibility and the benefits of our functional clustering in our detailed evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "With the steadily growing number of service providers the competition becomes more and more intense. In order to find a distinctive edge over other competitors, automatic service composition can be applied to further adapt to the requirements of the users. Most of the current composition approaches can be categorized as either planning or selection algorithms. The former automatically create workflows and tend to neglect Quality-of-Service (QoS) concerns, drawing compositions useless if user constraints are violated. Selection algorithms on the other hand optimize the QoS but provide no functional flexibility. In this paper we show how the strengths of both approaches can be combined by leveraging common characteristics of service registries. Therefore we utilize a data structure which arranges functionally similar services in clusters and computes the QoS of each cluster. Our planning tool composes workflows consisting of these clusters, taking the QoS of the clusters into account. This way, the utility in general and the reliability of the composed workflows are significantly increased. We prove the feasibility and the benefits of our functional clustering in our detailed evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the steadily growing number of service providers the competition becomes more and more intense. In order to find a distinctive edge over other competitors, automatic service composition can be applied to further adapt to the requirements of the users. Most of the current composition approaches can be categorized as either planning or selection algorithms. The former automatically create workflows and tend to neglect Quality-of-Service (QoS) concerns, drawing compositions useless if user constraints are violated. Selection algorithms on the other hand optimize the QoS but provide no functional flexibility. In this paper we show how the strengths of both approaches can be combined by leveraging common characteristics of service registries. Therefore we utilize a data structure which arranges functionally similar services in clusters and computes the QoS of each cluster. Our planning tool composes workflows consisting of these clusters, taking the QoS of the clusters into account. This way, the utility in general and the reliability of the composed workflows are significantly increased. We prove the feasibility and the benefits of our functional clustering in our detailed evaluation.", "fno": "4463a089", "keywords": [ "Quality Of Services", "Automatic Service Composition" ], "authors": [ { "affiliation": null, "fullName": "Florian Wagner", "givenName": "Florian", "surname": "Wagner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fuyuki Ishikawa", "givenName": "Fuyuki", "surname": "Ishikawa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shinichi Honiden", "givenName": "Shinichi", "surname": "Honiden", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "89-96", "year": "2011", "issn": null, "isbn": "978-0-7695-4463-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4463a081", "articleId": "12OmNroijhi", "__typename": "AdjacentArticleType" }, "next": { "fno": "4463a097", "articleId": "12OmNqJq4zX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2012/4752/0/4752a234", "title": "Multi-objective Service Composition with Time- and Input-Dependent QoS", "doi": null, "abstractUrl": "/proceedings-article/icws/2012/4752a234/12OmNAIMOal", "parentPublication": { "id": "proceedings/icws/2012/4752/0", "title": "2012 IEEE 19th International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2009/3709/0/3709a655", "title": "A Dynamic Approach toward QoS-Aware Service Workflow Composition", "doi": null, "abstractUrl": "/proceedings-article/icws/2009/3709a655/12OmNANkoaO", "parentPublication": { "id": "proceedings/icws/2009/3709/0", "title": "2009 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2012/4752/0/4752a050", "title": "Continuous Query for QoS-Aware Automatic Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icws/2012/4752a050/12OmNvAiStr", "parentPublication": { "id": "proceedings/icws/2012/4752/0", "title": "2012 IEEE 19th International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2013/5025/0/5025a010", "title": "Dynamic Service Composition with Service-Dependent QoS Attributes", "doi": null, "abstractUrl": "/proceedings-article/icws/2013/5025a010/12OmNvlxJnO", "parentPublication": { "id": "proceedings/icws/2013/5025/0", "title": "2013 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a235", "title": "QoS Analysis for Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a235/12OmNvrvjf5", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2012/4752/0/4752a431", "title": "Redundant Service Removal in QoS-Aware Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icws/2012/4752a431/12OmNwdL7p5", "parentPublication": { "id": "proceedings/icws/2012/4752/0", "title": "2012 IEEE 19th International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edoc/2009/3785/0/3785a151", "title": "An End-to-End Approach for QoS-Aware Service Composition", "doi": null, "abstractUrl": "/proceedings-article/edoc/2009/3785a151/12OmNwfb6Sq", "parentPublication": { "id": "proceedings/edoc/2009/3785/0", "title": "2009 IEEE International Enterprise Distributed Object Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2009/3516/0/3516a509", "title": "Research on QoS-Based Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icacc/2009/3516a509/12OmNxwnckN", "parentPublication": { "id": "proceedings/icacc/2009/3516/0", "title": "2009 International Conference on Advanced Computer Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2013/01/tsc2013010020", "title": "QoS-Driven Service Composition with Reconfigurable Services", "doi": null, "abstractUrl": "/journal/sc/2013/01/tsc2013010020/13rRUwbs1Y7", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2004/05/e0311", "title": "QoS-Aware Middleware for Web Services Composition", "doi": null, "abstractUrl": "/journal/ts/2004/05/e0311/13rRUygT7aQ", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPPB", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRPgQe", "doi": "10.1109/INFVIS.2001.963278", "title": "Getting Along: Composition of Visualization Paradigms", "normalizedTitle": "Getting Along: Composition of Visualization Paradigms", "abstract": "This paper describes how focus+context techniques can be composed with other high-level visualization paradigms to mutual advantage. Examples are given showing composition both with a pan\\&zoom system, and with a treemap implementation. The examples illustrate how focus+context can be used as an exploration and navigation tool within those paradigms.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes how focus+context techniques can be composed with other high-level visualization paradigms to mutual advantage. Examples are given showing composition both with a pan\\&zoom system, and with a treemap implementation. The examples illustrate how focus+context can be used as an exploration and navigation tool within those paradigms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes how focus+context techniques can be composed with other high-level visualization paradigms to mutual advantage. Examples are given showing composition both with a pan\\&zoom system, and with a treemap implementation. The examples illustrate how focus+context can be used as an exploration and navigation tool within those paradigms.", "fno": "13420037", "keywords": [ "Information Visualization", "Nonlinear Magnification", "Treemaps", "Pan And Zoom", "Fisheye", "Composition" ], "authors": [ { "affiliation": "Visual Insights, Inc.", "fullName": "T. Alan Keahey", "givenName": "T. Alan", "surname": "Keahey", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-10-01T00:00:00", "pubType": "proceedings", "pages": "37", "year": "2001", "issn": "1522-404X", "isbn": "0-7695-1342-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00963295", "articleId": "12OmNwJPN0E", "__typename": "AdjacentArticleType" }, "next": { "fno": "00963296", "articleId": "12OmNzXFoB1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs4S8wp", "title": "Web Information Systems and Mining, International Conference on", "acronym": "wism", "groupId": "1003020", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2TCJV", "doi": "10.1109/WISM.2009.77", "title": "An Approach for Visualization and Formalization of Web Service Composition", "normalizedTitle": "An Approach for Visualization and Formalization of Web Service Composition", "abstract": "Web services provide a complete new way of the loosely coupled service-oriented architecture and facilitate the process of application integration by encapsulating information and existing softwares. To exploit the true potential of web services, it is vital to develop methodologies and tools for automatic web service composition. Numerous web service composition description languages have been developed for professionals to study and compose web services in the past. However, current web service composition description languages like OWL-S, WSMO and METEOR-S still have many limitations such as the lack of elements to describe dynamic transformations among components of web service compositions. In this paper, we propose a Fast Web Service Composition Approach (FWSCA) which adopts the Extended OWL-S web service semantic description language(OWL-ES). OWL-ES is able to describe dynamic transformations among components of web service compositions by extending the existing process model of OWL-S. We elaborate on the design of FWSCA and discuss its usability by using an example of web service composition. For the tooling part of FWSCA, we develop an automatic web service composition Visualization and Formalization Tool (VFT) which is able to ease the process of web service composition for end-users.", "abstracts": [ { "abstractType": "Regular", "content": "Web services provide a complete new way of the loosely coupled service-oriented architecture and facilitate the process of application integration by encapsulating information and existing softwares. To exploit the true potential of web services, it is vital to develop methodologies and tools for automatic web service composition. Numerous web service composition description languages have been developed for professionals to study and compose web services in the past. However, current web service composition description languages like OWL-S, WSMO and METEOR-S still have many limitations such as the lack of elements to describe dynamic transformations among components of web service compositions. In this paper, we propose a Fast Web Service Composition Approach (FWSCA) which adopts the Extended OWL-S web service semantic description language(OWL-ES). OWL-ES is able to describe dynamic transformations among components of web service compositions by extending the existing process model of OWL-S. We elaborate on the design of FWSCA and discuss its usability by using an example of web service composition. For the tooling part of FWSCA, we develop an automatic web service composition Visualization and Formalization Tool (VFT) which is able to ease the process of web service composition for end-users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Web services provide a complete new way of the loosely coupled service-oriented architecture and facilitate the process of application integration by encapsulating information and existing softwares. To exploit the true potential of web services, it is vital to develop methodologies and tools for automatic web service composition. Numerous web service composition description languages have been developed for professionals to study and compose web services in the past. However, current web service composition description languages like OWL-S, WSMO and METEOR-S still have many limitations such as the lack of elements to describe dynamic transformations among components of web service compositions. In this paper, we propose a Fast Web Service Composition Approach (FWSCA) which adopts the Extended OWL-S web service semantic description language(OWL-ES). OWL-ES is able to describe dynamic transformations among components of web service compositions by extending the existing process model of OWL-S. We elaborate on the design of FWSCA and discuss its usability by using an example of web service composition. For the tooling part of FWSCA, we develop an automatic web service composition Visualization and Formalization Tool (VFT) which is able to ease the process of web service composition for end-users.", "fno": "3817a342", "keywords": [ "FWSCA", "OWL ES", "Web Service Composition", "Visualization", "Formalization", "Ontology", "End User" ], "authors": [ { "affiliation": null, "fullName": "Chao Ma", "givenName": "Chao", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanxiang He", "givenName": "Yanxiang", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "wism", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "342-346", "year": "2009", "issn": null, "isbn": "978-0-7695-3817-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3817a336", "articleId": "12OmNARRYi7", "__typename": "AdjacentArticleType" }, "next": { "fno": "3817a347", "articleId": "12OmNyrZLDT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cimca/2008/3514/0/3514a271", "title": "Automatic Web Service Composition Using OWL-S and Fluent Calculus", "doi": null, "abstractUrl": "/proceedings-article/cimca/2008/3514a271/12OmNAMtANT", "parentPublication": { "id": "proceedings/cimca/2008/3514/0", "title": "2008 International Conference on Computational Intelligence for Modelling Control & Automation (CIMCA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2008/3302/0/3302a187", "title": "Hierarchical Composition of OWL-S Web Services", "doi": null, "abstractUrl": "/proceedings-article/sera/2008/3302a187/12OmNARiM7C", "parentPublication": { "id": "proceedings/sera/2008/3302/0", "title": "Software Engineering Research, Management and Applications, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2008/3310/0/3310a228", "title": "A Framework for the Semantic Composition of Web Services Handling User Constraints", "doi": null, "abstractUrl": "/proceedings-article/icws/2008/3310a228/12OmNBc1uy2", "parentPublication": { "id": "proceedings/icws/2008/3310/0", "title": "2008 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2009/3888/1/3888a103", "title": "Formalization and Verification of Automatic Composition Based on Pi-Calculus for Semantic Web Service", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888a103/12OmNCuDzqH", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2010/4126/0/4126a234", "title": "Describing and Verifying Web Service Composition Using TLA Reasoning", "doi": null, "abstractUrl": "/proceedings-article/scc/2010/4126a234/12OmNqOwQHZ", "parentPublication": { "id": "proceedings/scc/2010/4126/0", "title": "2010 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/1/3823a271", "title": "VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823a271/12OmNvzJFSQ", "parentPublication": { "id": "cse/2009/3823/1", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2009/3900/0/3900a810", "title": "A Symmetric Matchmaking Engine for Web Service Composition", "doi": null, "abstractUrl": "/proceedings-article/icpads/2009/3900a810/12OmNwDSdIm", "parentPublication": { "id": "proceedings/icpads/2009/3900/0", "title": "Parallel and Distributed Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2009/3888/1/3888a164", "title": "Verification Web Services Composition Based on OWL-S", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888a164/12OmNx5Yvke", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2010/4129/0/4129a193", "title": "Distributed Service Composition and Execution Framework in GloServ", "doi": null, "abstractUrl": "/proceedings-article/services/2010/4129a193/12OmNzcPAAh", "parentPublication": { "id": "proceedings/services/2010/4129/0", "title": "2010 6th World Congress on Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2004/04/x4042", "title": "Filtering and Selecting Semantic Web Services with Interactive Composition Techniques", "doi": null, "abstractUrl": "/magazine/ex/2004/04/x4042/13rRUyZaxuI", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir9", "title": "2018 22nd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XeKguS", "doi": "10.1109/iV.2018.00064", "title": "Visualizing Student Flows to Track Retention and Graduation Rates", "normalizedTitle": "Visualizing Student Flows to Track Retention and Graduation Rates", "abstract": "Understanding, modeling and visualizing student performance and academic progress have attracted considerable research attention recently. In particular, early leaving and retention of students are central problems associated with significant personal and social cost. In this study, we provide an efficient visualization tool to analyze student flow patterns by alluvial and Sankey diagrams. We tracked the progress of more than 30,000 undergraduate students from Budapest University of Technology and Economics enrolled between 2010 and 2017. Our method allows decision-makers to gain better insight on how students are progressing. This tool also makes easier to understand the effects of some policy changes on retention and graduation rates.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding, modeling and visualizing student performance and academic progress have attracted considerable research attention recently. In particular, early leaving and retention of students are central problems associated with significant personal and social cost. In this study, we provide an efficient visualization tool to analyze student flow patterns by alluvial and Sankey diagrams. We tracked the progress of more than 30,000 undergraduate students from Budapest University of Technology and Economics enrolled between 2010 and 2017. Our method allows decision-makers to gain better insight on how students are progressing. This tool also makes easier to understand the effects of some policy changes on retention and graduation rates.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding, modeling and visualizing student performance and academic progress have attracted considerable research attention recently. In particular, early leaving and retention of students are central problems associated with significant personal and social cost. In this study, we provide an efficient visualization tool to analyze student flow patterns by alluvial and Sankey diagrams. We tracked the progress of more than 30,000 undergraduate students from Budapest University of Technology and Economics enrolled between 2010 and 2017. Our method allows decision-makers to gain better insight on how students are progressing. This tool also makes easier to understand the effects of some policy changes on retention and graduation rates.", "fno": "720200a338", "keywords": [ "Data Visualisation", "Educational Administrative Data Processing", "Educational Institutions", "Further Education", "Graduation Rates", "Academic Progress", "Social Cost", "Student Flow Patterns", "Retention Rates", "Personal Cost", "Visualization Tool", "Undergraduate Students", "Student Performance Visualization", "Student Flows Visualization", "Alluvial Diagrams", "Sankey Diagrams", "Budapest University Of Technology And Economics", "Education", "Economics", "Visualization", "Tools", "Data Visualization", "Europe", "Trajectory", "Student Flow", "Alluvial Diagram", "Sankey Diagram", "Dropout" ], "authors": [ { "affiliation": null, "fullName": "Dániel Márton Horváth", "givenName": "Dániel Márton", "surname": "Horváth", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roland Molontay", "givenName": "Roland", "surname": "Molontay", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mihály Szabó", "givenName": "Mihály", "surname": "Szabó", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "338-343", "year": "2018", "issn": null, "isbn": "978-1-5386-7202-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720200a332", "articleId": "17D45Xq6dBz", "__typename": "AdjacentArticleType" }, "next": { "fno": "720200a344", "articleId": "17D45WgziTw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2013/5261/0/06684805", "title": "Implementation of Just in Time and revamped engineering math courses to improve retention and graduation rates", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684805/12OmNCbCrQ9", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408748", "title": "Gender trends in engineering retention", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408748/12OmNCd2roX", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01611931", "title": "Graduation rates, grade-point average, and changes of major of female and minority students entering engineering", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01611931/12OmNxj23k6", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720327", "title": "'Plus Two' Peer-Led Team Learning improves student success, retention, and timely graduation", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720327/12OmNyuPLbC", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01612215", "title": "Retention initiatives for ICT based courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01612215/12OmNyywxCf", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659215", "title": "Improving Freshman Retention and Graduation Rates through a Two-Tier Tenure Track System", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659215/18j92ykmKgo", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658450", "title": "Understanding Students’ Online Reviews to Improve College Experience and Graduation Rates of STEM Programs at the Largest Post-Secondary Institution: A Learner-Centered Study", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658450/18j9lwVXGIU", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658548", "title": "Promoting Students’ Social Interactions Results in an Improvement in Performance, Class Attendance and Retention in First Year Computing Courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658548/18j9vMrz88o", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637129", "title": "Analyzing College Students' Advising Records To Improve Retention And Graduation Outcome", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637129/1zuvTRfFBFS", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637207", "title": "An Overview on the Use of Educational Data Mining for Constructing Recommendation Systems to Mitigate Retention in Higher Education", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637207/1zuw0f9gSsM", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAR1b0Z", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNC943E6", "doi": "10.1109/CVPRW.2017.24", "title": "Classification of Puck Possession Events in Ice Hockey", "normalizedTitle": "Classification of Puck Possession Events in Ice Hockey", "abstract": "Group activity recognition in sports is often challenging due to the complex dynamics and interaction among the players. In this paper, we propose a recurrent neural network to classify puck possession events in ice hockey. Our method extracts features from the whole frame and appearances of the players using a pre-trained convolutional neural network. In this way, our model captures the context information, individual attributes and interaction among the players. Our model requires only the player positions on the image and does not need any explicit annotations for the individual actions or player trajectories, greatly simplifying the input of the system. We evaluate our model on a new Ice Hockey Dataset. Experimental results show that our model produces competitive results on this challenging dataset with much simpler inputs compared with the previous work.", "abstracts": [ { "abstractType": "Regular", "content": "Group activity recognition in sports is often challenging due to the complex dynamics and interaction among the players. In this paper, we propose a recurrent neural network to classify puck possession events in ice hockey. Our method extracts features from the whole frame and appearances of the players using a pre-trained convolutional neural network. In this way, our model captures the context information, individual attributes and interaction among the players. Our model requires only the player positions on the image and does not need any explicit annotations for the individual actions or player trajectories, greatly simplifying the input of the system. We evaluate our model on a new Ice Hockey Dataset. Experimental results show that our model produces competitive results on this challenging dataset with much simpler inputs compared with the previous work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Group activity recognition in sports is often challenging due to the complex dynamics and interaction among the players. In this paper, we propose a recurrent neural network to classify puck possession events in ice hockey. Our method extracts features from the whole frame and appearances of the players using a pre-trained convolutional neural network. In this way, our model captures the context information, individual attributes and interaction among the players. Our model requires only the player positions on the image and does not need any explicit annotations for the individual actions or player trajectories, greatly simplifying the input of the system. We evaluate our model on a new Ice Hockey Dataset. Experimental results show that our model produces competitive results on this challenging dataset with much simpler inputs compared with the previous work.", "fno": "0733a147", "keywords": [ "Feature Extraction", "Ice", "Logic Gates", "Computer Vision", "Activity Recognition", "Context Modeling", "Trajectory" ], "authors": [ { "affiliation": null, "fullName": "Moumita Roy Tora", "givenName": "Moumita Roy", "surname": "Tora", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianhui Chen", "givenName": "Jianhui", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "James J. Little", "givenName": "James J.", "surname": "Little", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "147-154", "year": "2017", "issn": "2160-7516", "isbn": "978-1-5386-0733-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0733a139", "articleId": "12OmNrJRPis", "__typename": "AdjacentArticleType" }, "next": { "fno": "0733a155", "articleId": "12OmNB836P9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733a085", "title": "Hockey Action Recognition via Integrated Stacked Hourglass Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a085/12OmNAoDieU", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icseng/2017/0610/0/0610a333", "title": "Developing an Air Hockey Game in LabVIEW", "doi": null, "abstractUrl": "/proceedings-article/icseng/2017/0610a333/12OmNy2JsZU", "parentPublication": { "id": "proceedings/icseng/2017/0610/0", "title": "2017 25th International Conference on Systems Engineering (ICSEng)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2000/0909/0/09090352", "title": "Support based measures applied to ice hockey scoring summaries", "doi": null, "abstractUrl": "/proceedings-article/ictai/2000/09090352/12OmNzlUKKE", "parentPublication": { "id": "proceedings/ictai/2000/0909/0", "title": "Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2018/6481/0/648101a313", "title": "HyperStackNet: A Hyper Stacked Hourglass Deep Convolutional Neural Network Architecture for Joint Player and Stick Pose Estimation in Hockey", "doi": null, "abstractUrl": "/proceedings-article/crv/2018/648101a313/17D45XeKgrf", "parentPublication": { "id": "proceedings/crv/2018/6481/0", "title": "2018 15th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500b636", "title": "Keep Your Eye on the Puck: Automatic Hockey Videography", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500b636/18j8MxlOXTy", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900d450", "title": "Ice hockey player identification via transformers and weakly supervised learning", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900d450/1G560PDMJMs", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2019/1838/0/183800a181", "title": "Two-Stream Action Recognition in Ice Hockey using Player Pose Sequences and Optical Flows", "doi": null, "abstractUrl": "/proceedings-article/crv/2019/183800a181/1cMGuTEHiNi", "parentPublication": { "id": "proceedings/crv/2019/1838/0", "title": "2019 16th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150721", "title": "A System for Acquisition and Modelling of Ice-Hockey Stick Shape Deformation from Player Shot Videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150721/1lPHm2gPlv2", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e562", "title": "Puck localization and multi-task event recognition in broadcast hockey videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e562/1yVzREt5r8Y", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e515", "title": "Detecting and Matching Related Objects with One Proposal Multiple Predictions", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e515/1yq2w8BOlos", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4L", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNqAU6pq", "doi": "10.1109/VAST.2006.261439", "title": "Toward a Multi-Analyst, Collaborative Framework for Visual Analytics", "normalizedTitle": "Toward a Multi-Analyst, Collaborative Framework for Visual Analytics", "abstract": "We describe a framework for the display of complex, multidimensional data, designed to facilitate exploration, analysis, and collaboration among multiple analysts. This framework aims to support human collaboration by making it easier to share representations, to translate from one point of view to another, to explain arguments, to update conclusions when underlying assumptions change, and to justify or account for decisions or actions. Multidimensional visualization techniques are used with interactive, context-sensitive, and tunable graphs. Visual representations are flexibly generated using a knowledge representation scheme based on annotated logic; this enables not only tracking and fusing different viewpoints, but also unpacking them. Fusing representations supports the creation of multidimensional meta-displays as well as the translation or mapping from one point of view to another. At the same time, analysts also need to be able to unpack one another's complex chains of reasoning, especially if they have reached different conclusions, and to determine the implications, if any, when underlying assumptions or evidence turn out to be false. The framework enables us to support a variety of scenarios as well as to systematically generate and test experimental hypotheses about the impact of different kinds of visual representations upon interactive collaboration by teams of distributed analysts", "abstracts": [ { "abstractType": "Regular", "content": "We describe a framework for the display of complex, multidimensional data, designed to facilitate exploration, analysis, and collaboration among multiple analysts. This framework aims to support human collaboration by making it easier to share representations, to translate from one point of view to another, to explain arguments, to update conclusions when underlying assumptions change, and to justify or account for decisions or actions. Multidimensional visualization techniques are used with interactive, context-sensitive, and tunable graphs. Visual representations are flexibly generated using a knowledge representation scheme based on annotated logic; this enables not only tracking and fusing different viewpoints, but also unpacking them. Fusing representations supports the creation of multidimensional meta-displays as well as the translation or mapping from one point of view to another. At the same time, analysts also need to be able to unpack one another's complex chains of reasoning, especially if they have reached different conclusions, and to determine the implications, if any, when underlying assumptions or evidence turn out to be false. The framework enables us to support a variety of scenarios as well as to systematically generate and test experimental hypotheses about the impact of different kinds of visual representations upon interactive collaboration by teams of distributed analysts", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We describe a framework for the display of complex, multidimensional data, designed to facilitate exploration, analysis, and collaboration among multiple analysts. This framework aims to support human collaboration by making it easier to share representations, to translate from one point of view to another, to explain arguments, to update conclusions when underlying assumptions change, and to justify or account for decisions or actions. Multidimensional visualization techniques are used with interactive, context-sensitive, and tunable graphs. Visual representations are flexibly generated using a knowledge representation scheme based on annotated logic; this enables not only tracking and fusing different viewpoints, but also unpacking them. Fusing representations supports the creation of multidimensional meta-displays as well as the translation or mapping from one point of view to another. At the same time, analysts also need to be able to unpack one another's complex chains of reasoning, especially if they have reached different conclusions, and to determine the implications, if any, when underlying assumptions or evidence turn out to be false. The framework enables us to support a variety of scenarios as well as to systematically generate and test experimental hypotheses about the impact of different kinds of visual representations upon interactive collaboration by teams of distributed analysts", "fno": "04035757", "keywords": [ "Visual Knowledge Discovery", "Interactive Collaboration", "Visual Analytics", "Multidimensional Visualization", "Visual Representation", "Knowledge Representation", "Collaborative Visualization", "Distributed Visualization", "Data Management" ], "authors": [ { "affiliation": "Stony Brook Univ., NY", "fullName": "S.E. Brennan", "givenName": "S.E.", "surname": "Brennan", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook Univ., NY", "fullName": "K. Mueller", "givenName": "K.", "surname": "Mueller", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook Univ., NY", "fullName": "G. Zelinsky", "givenName": "G.", "surname": "Zelinsky", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook Univ., NY", "fullName": "I. Ramakrishnan", "givenName": "I.", "surname": "Ramakrishnan", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook Univ., NY", "fullName": "D.S. Warren", "givenName": "D.S.", "surname": "Warren", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook Univ., NY", "fullName": "A. Kaufman", "givenName": "A.", "surname": "Kaufman", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "129-136", "year": "2006", "issn": null, "isbn": "1-4244-0591-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04035756", "articleId": "12OmNz4SOzs", "__typename": "AdjacentArticleType" }, "next": { "fno": "04035758", "articleId": "12OmNqBtj1L", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2012/12/ttg2012122819", "title": "SnapShot: Visualization to Propel Ice Hockey Analytics", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122819/13rRUwjGoG1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070047", "title": "Real-Time Visual Analytics for Text Streams", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070047/13rRUxAStVJ", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070030", "title": "Visual Analytics Support for Intelligence Analysis", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070030/13rRUxD9h0P", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/06/v1399", "title": "Graph Signatures for Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2006/06/v1399/13rRUxYrbUv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/01/v0052", "title": "Polaris: A System for Query, Analysis, and Visualization of Multidimensional Relational Databases", "doi": null, "abstractUrl": "/journal/tg/2002/01/v0052/13rRUypp57w", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534019", "title": "Multiple Workspaces in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534019/17D45W9KVIu", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2017/2558/0/255801a208", "title": "Research on Equipment Knowledge Representation Based on Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/skg/2017/255801a208/1i5m8aChW6c", "parentPublication": { "id": "proceedings/skg/2017/2558/0", "title": "2017 13th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0/764700a648", "title": "An Integrated Platform for Collaborative Data Analytics", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2020/764700a648/1pVHn3xexoI", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a081", "title": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a081/1qROrjfqgSI", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/03/09632413", "title": "RCMVis: A Visual Analytics System for Route Choice Modeling", "doi": null, "abstractUrl": "/journal/tg/2023/03/09632413/1yYPkLFxoTC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBfZSj8", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyPQ4EL", "doi": "10.1109/VAST.2012.6400507", "title": "Agile visual analytics for banking cyber “big data”", "normalizedTitle": "Agile visual analytics for banking cyber “big data”", "abstract": "This paper describes the rapid development of a tailored cyber situational awareness and analysis application for the 2012 IEEE VAST Mini-Challenge 1 (MC1) — Cyber Situation Awareness. The novel aspect of this project was in the process of developing the tailored solution for a “big data” application. Aperture is an open, adaptable, and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer-based approach to visualization assembly, and a data mapping API that simplifies the process of transformation of data or analytic results into visual forms and properties.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the rapid development of a tailored cyber situational awareness and analysis application for the 2012 IEEE VAST Mini-Challenge 1 (MC1) — Cyber Situation Awareness. The novel aspect of this project was in the process of developing the tailored solution for a “big data” application. Aperture is an open, adaptable, and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer-based approach to visualization assembly, and a data mapping API that simplifies the process of transformation of data or analytic results into visual forms and properties.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the rapid development of a tailored cyber situational awareness and analysis application for the 2012 IEEE VAST Mini-Challenge 1 (MC1) — Cyber Situation Awareness. The novel aspect of this project was in the process of developing the tailored solution for a “big data” application. Aperture is an open, adaptable, and extensible Web 2.0 visualization framework, designed to produce visualizations for analysts and decision makers in any common web browser. Aperture utilizes a novel layer-based approach to visualization assembly, and a data mapping API that simplifies the process of transformation of data or analytic results into visual forms and properties.", "fno": "06400507", "keywords": [ "Human Information Interaction", "Visual Analytics", "Visualization", "Big Data", "Agile", "Framework", "Toolkit" ], "authors": [ { "affiliation": "Oculus Info Inc.", "fullName": "Casey Canfield", "givenName": "Casey", "surname": "Canfield", "__typename": "ArticleAuthorType" }, { "affiliation": "Oculus Info Inc.", "fullName": "Peter Schretlen", "givenName": "Peter", "surname": "Schretlen", "__typename": "ArticleAuthorType" }, { "affiliation": "Oculus Info Inc.", "fullName": "Scott Langevin", "givenName": "Scott", "surname": "Langevin", "__typename": "ArticleAuthorType" }, { "affiliation": "Oculus Info Inc.", "fullName": "David Jonker", "givenName": "David", "surname": "Jonker", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "299-300", "year": "2012", "issn": null, "isbn": "978-1-4673-4752-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06400527", "articleId": "12OmNxEjY8U", "__typename": "AdjacentArticleType" }, "next": { "fno": "06400508", "articleId": "12OmNwMXnoH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vizsec/2015/7599/0/07312765", "title": "Visual analytics for cyber red teaming", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2015/07312765/12OmNC8uRzJ", "parentPublication": { "id": "proceedings/vizsec/2015/7599/0", "title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b485", "title": "Aperture: An Open Web 2.0 Visualization Framework", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b485/12OmNCgrD1q", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2015/7599/0/07312764", "title": "PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2015/07312764/12OmNwJybSA", "parentPublication": { "id": "proceedings/vizsec/2015/7599/0", "title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400529", "title": "VAST Challenge 2012: Visual analytics for big data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400529/12OmNwlqhST", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a273", "title": "Visual Analytics for the Detection of Anomalous Maritime Behavior", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a273/12OmNyVerZM", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a157", "title": "Information Visualization for Agile Software Development", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a157/12OmNyvGykE", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2007/1659/0/04388994", "title": "Visual Analytics on Mobile Devices for Emergency Response", "doi": null, "abstractUrl": "/proceedings-article/vast/2007/04388994/12OmNzZWbHg", "parentPublication": { "id": "proceedings/vast/2007/1659/0", "title": "2007 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029565", "title": "Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029565/17D45WIXbRN", "parentPublication": { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0", "title": "2017 IEEE Trustcom/BigDataSE/ICESS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659299", "title": "Evaluation of Cyber Defense Exercises Using Visual Analytics Process", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659299/18j9ko6L8uQ", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a336", "title": "VaBank: Visual Analytics for Banking Transactions", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a336/1rSRewueIso", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18j8Ecq0jn2", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18j8MxlOXTy", "doi": "10.1109/WACV.2019.00179", "title": "Keep Your Eye on the Puck: Automatic Hockey Videography", "normalizedTitle": "Keep Your Eye on the Puck: Automatic Hockey Videography", "abstract": "While hockey involves a large playing surface, instantaneous play is typically localized to a smaller region of the ice. Live spectators thus attentively shift their gaze to follow play, and professional sports videographers pan and tilt their cameras to mimic this process. Unfortunately, manual videography is economically prohibitive below the elite level. Here we propose a system for automatically tracking play, allowing a high-definition video feed to be dynamically cropped and retargeted to a spectator's display device. We employ the puck as an objective surrogate for the location of play, and develop a novel method for ground-truthing puck location from high-definition video. This allows us to train a deep network regressor that uses the video imagery, optic flow, estimated player positions and team affiliation to predict the location of play. We show that our algorithm outperforms a simple 'follow the herd' strategy and results in a practical system for delivering high-quality curated video of amateur-level hockey games to remote spectators.", "abstracts": [ { "abstractType": "Regular", "content": "While hockey involves a large playing surface, instantaneous play is typically localized to a smaller region of the ice. Live spectators thus attentively shift their gaze to follow play, and professional sports videographers pan and tilt their cameras to mimic this process. Unfortunately, manual videography is economically prohibitive below the elite level. Here we propose a system for automatically tracking play, allowing a high-definition video feed to be dynamically cropped and retargeted to a spectator's display device. We employ the puck as an objective surrogate for the location of play, and develop a novel method for ground-truthing puck location from high-definition video. This allows us to train a deep network regressor that uses the video imagery, optic flow, estimated player positions and team affiliation to predict the location of play. We show that our algorithm outperforms a simple 'follow the herd' strategy and results in a practical system for delivering high-quality curated video of amateur-level hockey games to remote spectators.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While hockey involves a large playing surface, instantaneous play is typically localized to a smaller region of the ice. Live spectators thus attentively shift their gaze to follow play, and professional sports videographers pan and tilt their cameras to mimic this process. Unfortunately, manual videography is economically prohibitive below the elite level. Here we propose a system for automatically tracking play, allowing a high-definition video feed to be dynamically cropped and retargeted to a spectator's display device. We employ the puck as an objective surrogate for the location of play, and develop a novel method for ground-truthing puck location from high-definition video. This allows us to train a deep network regressor that uses the video imagery, optic flow, estimated player positions and team affiliation to predict the location of play. We show that our algorithm outperforms a simple 'follow the herd' strategy and results in a practical system for delivering high-quality curated video of amateur-level hockey games to remote spectators.", "fno": "197500b636", "keywords": [ "Cameras", "Image Sequences", "Regression Analysis", "Sport", "Video Cameras", "Video Recording", "Video Signal Processing", "Objective Surrogate", "Ground Truthing Puck Location", "Deep Network Regressor", "Video Imagery", "Optic Flow", "Estimated Player Positions", "Practical System", "High Quality Curated Video", "Amateur Level Hockey Games", "Remote Spectators", "Automatic Hockey Videography", "Playing Surface", "Instantaneous Play", "Smaller Region", "Ice", "Live Spectators", "Professional Sports Videographers Pan", "Cameras", "Manual Videography", "High Definition Video Feed", "Cameras", "Sports", "Observers", "Ice", "Games", "Standards", "Planning" ], "authors": [ { "affiliation": null, "fullName": "Hemanth Pidaparthy", "givenName": "Hemanth", "surname": "Pidaparthy", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "James Elder", "givenName": "James", "surname": "Elder", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-01-01T00:00:00", "pubType": "proceedings", "pages": "1636-1644", "year": "2019", "issn": "1550-5790", "isbn": "978-1-7281-1975-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "197500b626", "articleId": "18j8FIomLfi", "__typename": "AdjacentArticleType" }, "next": { "fno": "197500b645", "articleId": "18j8EH8n91S", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733a085", "title": "Hockey Action Recognition via Integrated Stacked Hourglass Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a085/12OmNAoDieU", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2012/4976/0/06395040", "title": "Air Hockey iOS Game That Uses Fuzzy-Logic for Game-Balancing", "doi": null, "abstractUrl": "/proceedings-article/taai/2012/06395040/12OmNBsLPeh", "parentPublication": { "id": "proceedings/taai/2012/4976/0", "title": "2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733a147", "title": "Classification of Puck Possession Events in Ice Hockey", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a147/12OmNC943E6", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccairo/2017/6536/0/6536a022", "title": "Learning Control for Air Hockey Striking Using Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/iccairo/2017/6536a022/12OmNwpGgKW", "parentPublication": { "id": "proceedings/iccairo/2017/6536/0", "title": "2017 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2005/2319/0/23190152", "title": "Analysis of Player Actions in Selected Hockey Game Situations", "doi": null, "abstractUrl": "/proceedings-article/crv/2005/23190152/12OmNxw5Bj7", "parentPublication": { "id": "proceedings/crv/2005/2319/0", "title": "The 2nd Canadian Conference on Computer and Robot Vision (CRV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icseng/2017/0610/0/0610a333", "title": "Developing an Air Hockey Game in LabVIEW", "doi": null, "abstractUrl": "/proceedings-article/icseng/2017/0610a333/12OmNy2JsZU", "parentPublication": { "id": "proceedings/icseng/2017/0610/0", "title": "2017 25th International Conference on Systems Engineering (ICSEng)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2018/6481/0/648101a313", "title": "HyperStackNet: A Hyper Stacked Hourglass Deep Convolutional Neural Network Architecture for Joint Player and Stick Pose Estimation in Hockey", "doi": null, "abstractUrl": "/proceedings-article/crv/2018/648101a313/17D45XeKgrf", "parentPublication": { "id": "proceedings/crv/2018/6481/0", "title": "2018 15th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900d450", "title": "Ice hockey player identification via transformers and weakly supervised learning", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900d450/1G560PDMJMs", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e580", "title": "Automatic Play Segmentation of Hockey Videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e580/1yJYvwMxq7K", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e562", "title": "Puck localization and multi-task event recognition in broadcast hockey videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e562/1yVzREt5r8Y", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G55WEFExd6", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G560PDMJMs", "doi": "10.1109/CVPRW56347.2022.00389", "title": "Ice hockey player identification via transformers and weakly supervised learning", "normalizedTitle": "Ice hockey player identification via transformers and weakly supervised learning", "abstract": "Identifying players in video is a foundational step in computer vision-based sports analytics. Obtaining player identities is essential for analyzing the game and is used in downstream tasks such as game event recognition. Transformers are the existing standard in natural language processing (NLP) and are swiftly gaining traction in computer vision. Motivated by the increasing success of transformers in computer vision, we introduce a transformer network for recognizing players through their jersey numbers in broadcast National Hockey League (NHL) videos. The transformer takes temporal sequences of player frames (called player tracklets) as input and outputs the probabilities of jersey numbers present in the frames. The proposed network performs better than the previous benchmark on the same dataset. We implement a weakly-supervised training approach by generating approximate frame-level labels for jersey number presence and use the frame-level labels for faster training. We also utilize player shifts available in the NHL play-by-play data by reading the game time using optical character recognition (OCR) to get the players on the ice rink at a certain game time. Using player-shifts improved the player identification accuracy by 6%.", "abstracts": [ { "abstractType": "Regular", "content": "Identifying players in video is a foundational step in computer vision-based sports analytics. Obtaining player identities is essential for analyzing the game and is used in downstream tasks such as game event recognition. Transformers are the existing standard in natural language processing (NLP) and are swiftly gaining traction in computer vision. Motivated by the increasing success of transformers in computer vision, we introduce a transformer network for recognizing players through their jersey numbers in broadcast National Hockey League (NHL) videos. The transformer takes temporal sequences of player frames (called player tracklets) as input and outputs the probabilities of jersey numbers present in the frames. The proposed network performs better than the previous benchmark on the same dataset. We implement a weakly-supervised training approach by generating approximate frame-level labels for jersey number presence and use the frame-level labels for faster training. We also utilize player shifts available in the NHL play-by-play data by reading the game time using optical character recognition (OCR) to get the players on the ice rink at a certain game time. Using player-shifts improved the player identification accuracy by 6%.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Identifying players in video is a foundational step in computer vision-based sports analytics. Obtaining player identities is essential for analyzing the game and is used in downstream tasks such as game event recognition. Transformers are the existing standard in natural language processing (NLP) and are swiftly gaining traction in computer vision. Motivated by the increasing success of transformers in computer vision, we introduce a transformer network for recognizing players through their jersey numbers in broadcast National Hockey League (NHL) videos. The transformer takes temporal sequences of player frames (called player tracklets) as input and outputs the probabilities of jersey numbers present in the frames. The proposed network performs better than the previous benchmark on the same dataset. We implement a weakly-supervised training approach by generating approximate frame-level labels for jersey number presence and use the frame-level labels for faster training. We also utilize player shifts available in the NHL play-by-play data by reading the game time using optical character recognition (OCR) to get the players on the ice rink at a certain game time. Using player-shifts improved the player identification accuracy by 6%.", "fno": "873900d450", "keywords": [ "Computer Games", "Computer Vision", "Learning Artificial Intelligence", "Natural Language Processing", "Optical Character Recognition", "Probability", "Sport", "Video Signal Processing", "Player Identification Accuracy", "Ice Hockey Player Identification", "Identifying Players", "Foundational Step", "Computer Vision Based Sports Analytics", "Player Identities", "Downstream Tasks", "Game Event Recognition", "Existing Standard", "Natural Language Processing", "Transformer Network", "Jersey Numbers", "Broadcast National Hockey League Videos", "Player Frames", "Player Tracklets", "Weakly Supervised Training Approach", "Approximate Frame Level Labels", "Jersey Number Presence", "Player Shifts", "NHL Play By Play Data", "Game Time", "Player Shifts", "Training", "Computer Vision", "Optical Character Recognition", "Supervised Learning", "Games", "Transformers", "Ice" ], "authors": [ { "affiliation": "University of Waterloo,Systems Design Engineering", "fullName": "Kanav Vats", "givenName": "Kanav", "surname": "Vats", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo,Systems Design Engineering", "fullName": "William McNally", "givenName": "William", "surname": "McNally", "__typename": "ArticleAuthorType" }, { "affiliation": "Stathletes Inc", "fullName": "Pascale Walters", "givenName": "Pascale", "surname": "Walters", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo,Systems Design Engineering", "fullName": "David A. Clausi", "givenName": "David A.", "surname": "Clausi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo,Systems Design Engineering", "fullName": "John S. Zelek", "givenName": "John S.", "surname": "Zelek", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "3450-3459", "year": "2022", "issn": null, "isbn": "978-1-6654-8739-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "873900d443", "articleId": "1G56y4h56gw", "__typename": "AdjacentArticleType" }, "next": { "fno": "873900d460", "articleId": "1G56wfpxHI4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733a147", "title": "Classification of Puck Possession Events in Ice Hockey", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a147/12OmNC943E6", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2013/0820/0/06632639", "title": "A players clustering method to enhance the players' experience in multi-player games", "doi": null, "abstractUrl": "/proceedings-article/cgames/2013/06632639/12OmNwtWfKJ", "parentPublication": { "id": "proceedings/cgames/2013/0820/0", "title": "2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icseng/2017/0610/0/0610a333", "title": "Developing an Air Hockey Game in LabVIEW", "doi": null, "abstractUrl": "/proceedings-article/icseng/2017/0610a333/12OmNy2JsZU", "parentPublication": { "id": "proceedings/icseng/2017/0610/0", "title": "2017 25th International Conference on Systems Engineering (ICSEng)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pci/2009/3788/0/3788a030", "title": "Data Mining for Player Modeling in Videogames", "doi": null, "abstractUrl": "/proceedings-article/pci/2009/3788a030/12OmNzSQdmo", "parentPublication": { "id": "proceedings/pci/2009/3788/0", "title": "2009 13th Panhellenic Conference on Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2018/6481/0/648101a313", "title": "HyperStackNet: A Hyper Stacked Hourglass Deep Convolutional Neural Network Architecture for Joint Player and Stick Pose Estimation in Hockey", "doi": null, "abstractUrl": "/proceedings-article/crv/2018/648101a313/17D45XeKgrf", "parentPublication": { "id": "proceedings/crv/2018/6481/0", "title": "2018 15th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927995", "title": "Western Hockey League (WHL) Regularized Adjusted Plus-Minus", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927995/1J4CyoRPgPK", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150721", "title": "A System for Acquisition and Modelling of Ice-Hockey Stick Shape Deformation from Player Shot Videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150721/1lPHm2gPlv2", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2019/6303/0/09162377", "title": "Usage and Spending on Mobile Games: A Comparison Between Australian Single-Player Gamers and Multi-Player Gamers", "doi": null, "abstractUrl": "/proceedings-article/csde/2019/09162377/1m6hOd2M6c0", "parentPublication": { "id": "proceedings/csde/2019/6303/0", "title": "2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e562", "title": "Puck localization and multi-task event recognition in broadcast hockey videos", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e562/1yVzREt5r8Y", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e523", "title": "Contrastive Learning for Sports Video: Unsupervised Player Classification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e523/1yXsQiwDQUo", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1y4oEtZzwCQ", "title": "2021 25th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1y4oI1vKfmg", "doi": "10.1109/IV53921.2021.00019", "title": "VisuaLeague: Visual Analytics of Multiple Games", "normalizedTitle": "VisuaLeague: Visual Analytics of Multiple Games", "abstract": "One of the most popular eSports (electronic sports) game types practiced is the Multiplayer Online Battle Arena (MOBA) genre, represented by one of the most popular competitive games, League of Legends (LoL). As in many traditional sports, to improve player and team performance, players and coaches analyze all the game events, such as, the positions and trajectories of the players, representing their movements, events and actions they performed during the game (spatial and temporal data). This paper presents VisuaLeague, a visualization tool for analysis of LoL matches for single player, teams, professional matches, and multiple games. The tool offers interaction with the visualizations, filtering and aggregation of data, and clustering to solve the common problems presented in analysis with voluminous amount of data, like cluttering and overlapping. We evaluated VisuaLeague through a user study covering the various types of analysis with two professional coaches. Results indicate that the tool was overall intuitive, useful, efficient and innovative and coaches show a particular interest in the analysis of professional training matches and multiple games as those provide visualizations that often lack in common tools, specially, regarding spatio-temporal data.", "abstracts": [ { "abstractType": "Regular", "content": "One of the most popular eSports (electronic sports) game types practiced is the Multiplayer Online Battle Arena (MOBA) genre, represented by one of the most popular competitive games, League of Legends (LoL). As in many traditional sports, to improve player and team performance, players and coaches analyze all the game events, such as, the positions and trajectories of the players, representing their movements, events and actions they performed during the game (spatial and temporal data). This paper presents VisuaLeague, a visualization tool for analysis of LoL matches for single player, teams, professional matches, and multiple games. The tool offers interaction with the visualizations, filtering and aggregation of data, and clustering to solve the common problems presented in analysis with voluminous amount of data, like cluttering and overlapping. We evaluated VisuaLeague through a user study covering the various types of analysis with two professional coaches. Results indicate that the tool was overall intuitive, useful, efficient and innovative and coaches show a particular interest in the analysis of professional training matches and multiple games as those provide visualizations that often lack in common tools, specially, regarding spatio-temporal data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One of the most popular eSports (electronic sports) game types practiced is the Multiplayer Online Battle Arena (MOBA) genre, represented by one of the most popular competitive games, League of Legends (LoL). As in many traditional sports, to improve player and team performance, players and coaches analyze all the game events, such as, the positions and trajectories of the players, representing their movements, events and actions they performed during the game (spatial and temporal data). This paper presents VisuaLeague, a visualization tool for analysis of LoL matches for single player, teams, professional matches, and multiple games. The tool offers interaction with the visualizations, filtering and aggregation of data, and clustering to solve the common problems presented in analysis with voluminous amount of data, like cluttering and overlapping. We evaluated VisuaLeague through a user study covering the various types of analysis with two professional coaches. Results indicate that the tool was overall intuitive, useful, efficient and innovative and coaches show a particular interest in the analysis of professional training matches and multiple games as those provide visualizations that often lack in common tools, specially, regarding spatio-temporal data.", "fno": "382700a054", "keywords": [ "Computer Games", "Data Aggregation", "Data Analysis", "Data Visualisation", "Pattern Clustering", "Sport", "Visua League", "Visualization Tool", "Visual Analytics", "Electronic Sports", "Spatial Data", "E Sports Game Types", "MOBA", "Multiplayer Online Battle Arena Genre", "League Of Legends", "Lo L Match Visualization", "Data Filtering", "Data Aggregation", "Data Clustering", "Training", "Filtering", "Visual Analytics", "Data Visualization", "Games", "Tools", "Spatial Databases", "Game Data Visualization", "Spatio Temporal Data", "Aggregated Data Visualization", "Visual Analytics", "MOBA Games" ], "authors": [ { "affiliation": "Universidade de Lisboa,LASIGE, Faculdade de Ciências,Portugal", "fullName": "Ana Paula Afonso", "givenName": "Ana Paula", "surname": "Afonso", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade de Lisboa,LASIGE, Faculdade de Ciências,Portugal", "fullName": "Maria Beatriz Carmo", "givenName": "Maria Beatriz", "surname": "Carmo", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade de Lisboa,LASIGE, Faculdade de Ciências,Portugal", "fullName": "Rafael Afonso", "givenName": "Rafael", "surname": "Afonso", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "54-62", "year": "2021", "issn": null, "isbn": "978-1-6654-3827-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "382700a048", "articleId": "1y4oENGqh4k", "__typename": "AdjacentArticleType" }, "next": { "fno": "382700a063", "articleId": "1y4oKeqVIrK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2017/01/07534855", "title": "A Visual Analytics Approach for Understanding Reasons behind Snowballing and Comeback in MOBA Games", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534855/13rRUxjQybV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b830", "title": "Soccer: Who Has the Ball? Generating Visual Analytics and Player Statistics", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b830/17D45VObpOM", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534019", "title": "Multiple Workspaces in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534019/17D45W9KVIu", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454905", "title": "DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454905/17D45WnnFYf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904482", "title": "OBTracker: Visual Analytics of Off-ball Movements in Basketball", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904482/1H0GhtN7zkA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2022/7668/0/766800a006", "title": "Data Feel: Exploring Visual Effects in Video Games to Support Sensemaking Tasks", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2022/766800a006/1J2XIfWP19C", "parentPublication": { "id": "proceedings/vis4dh/2022/7668/0", "title": "2022 IEEE 7th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a118", "title": "Comparison of Visualization Tools for Matches Analysis of a MOBA Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a118/1cMF9MduQU0", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/2/260702a097", "title": "Micro-Level Analysis and Visualization of Tennis Shot Patterns with Fractal Tables", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260702a097/1cYipyP6afS", "parentPublication": { "id": "compsac/2019/2607/2", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08795584", "title": "CourtTime: Generating Actionable Insights into Tennis Matches Using Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08795584/1csHUeq7TB6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/09411869", "title": "Tac-Miner: Visual Tactic Mining for Multiple Table Tennis Matches", "doi": null, "abstractUrl": "/journal/tg/2021/06/09411869/1t2ii7r7RcI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWi", "title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)", "acronym": "cloud", "groupId": "1002911", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNAZx8Mk", "doi": "10.1109/CLOUD.2014.58", "title": "Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines", "normalizedTitle": "Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines", "abstract": "Traditional metrics for live migration of virtual machines (VM) include total migration time, downtime, network overhead, and application degradation. In this paper, we introduce a new metric, \"eviction time\", defined as the time to evict the entire state of a VM from the source host. Eviction time determines how quickly the source host can be taken offline, or the freed resources re-purposed for other VMs. In traditional approaches for live VM migration, such as pre-copy and post-copy, eviction time is equal to the total migration time, because the source and destination hosts are coupled for the duration of the migration. Eviction time increases if the destination host is slow to receive the incoming VM, such as due to insufficient memory or network bandwidth, thus tying up the source host. We present a new approach, called \"Scatter-Gather\" live migration, which reduces the eviction time when the destination host is resource constrained. The key idea is to decouple the source and the destination hosts. The source scatters the VM's memory state quickly to multiple intermediaries (hosts or middleboxes) in the cluster. Concurrently, the destination gathers the VM's memory from the intermediaries using a variant of post-copy VM migration. We have implemented a prototype of Scatter-Gather in the KVM/QEMU platform. In our evaluations, Scatter-Gather reduces the VM eviction time by up to a factor of 6 while maintaining comparable total migration time against traditional pre-copy and post-copy for a resource constrained destination.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional metrics for live migration of virtual machines (VM) include total migration time, downtime, network overhead, and application degradation. In this paper, we introduce a new metric, \"eviction time\", defined as the time to evict the entire state of a VM from the source host. Eviction time determines how quickly the source host can be taken offline, or the freed resources re-purposed for other VMs. In traditional approaches for live VM migration, such as pre-copy and post-copy, eviction time is equal to the total migration time, because the source and destination hosts are coupled for the duration of the migration. Eviction time increases if the destination host is slow to receive the incoming VM, such as due to insufficient memory or network bandwidth, thus tying up the source host. We present a new approach, called \"Scatter-Gather\" live migration, which reduces the eviction time when the destination host is resource constrained. The key idea is to decouple the source and the destination hosts. The source scatters the VM's memory state quickly to multiple intermediaries (hosts or middleboxes) in the cluster. Concurrently, the destination gathers the VM's memory from the intermediaries using a variant of post-copy VM migration. We have implemented a prototype of Scatter-Gather in the KVM/QEMU platform. In our evaluations, Scatter-Gather reduces the VM eviction time by up to a factor of 6 while maintaining comparable total migration time against traditional pre-copy and post-copy for a resource constrained destination.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional metrics for live migration of virtual machines (VM) include total migration time, downtime, network overhead, and application degradation. In this paper, we introduce a new metric, \"eviction time\", defined as the time to evict the entire state of a VM from the source host. Eviction time determines how quickly the source host can be taken offline, or the freed resources re-purposed for other VMs. In traditional approaches for live VM migration, such as pre-copy and post-copy, eviction time is equal to the total migration time, because the source and destination hosts are coupled for the duration of the migration. Eviction time increases if the destination host is slow to receive the incoming VM, such as due to insufficient memory or network bandwidth, thus tying up the source host. We present a new approach, called \"Scatter-Gather\" live migration, which reduces the eviction time when the destination host is resource constrained. The key idea is to decouple the source and the destination hosts. The source scatters the VM's memory state quickly to multiple intermediaries (hosts or middleboxes) in the cluster. Concurrently, the destination gathers the VM's memory from the intermediaries using a variant of post-copy VM migration. We have implemented a prototype of Scatter-Gather in the KVM/QEMU platform. In our evaluations, Scatter-Gather reduces the VM eviction time by up to a factor of 6 while maintaining comparable total migration time against traditional pre-copy and post-copy for a resource constrained destination.", "fno": "5063a376", "keywords": [ "Servers", "Bandwidth", "Optimization", "Message Systems", "Measurement", "Random Access Memory", "Kernel", "Deprovisioning", "Virtual Machine", "Live Migration" ], "authors": [ { "affiliation": null, "fullName": "Umesh Deshpande", "givenName": "Umesh", "surname": "Deshpande", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yang You", "givenName": "Yang", "surname": "You", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Danny Chan", "givenName": "Danny", "surname": "Chan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nilton Bila", "givenName": "Nilton", "surname": "Bila", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kartik Gopalan", "givenName": "Kartik", "surname": "Gopalan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cloud", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "376-383", "year": "2014", "issn": "2159-6190", "isbn": "978-1-4799-5063-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5063a368", "articleId": "12OmNyuy9P6", "__typename": "AdjacentArticleType" }, "next": { "fno": "5063a384", "articleId": "12OmNBtCCDs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sose/2014/3616/0/3616a082", "title": "DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage", "doi": null, "abstractUrl": "/proceedings-article/sose/2014/3616a082/12OmNqG0SKW", "parentPublication": { "id": "proceedings/sose/2014/3616/0", "title": "2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2016/2140/0/2140b061", "title": "Agile Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2016/2140b061/12OmNvDI3ZW", "parentPublication": { "id": "proceedings/ipdps/2016/2140/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2015/8006/0/8006a051", "title": "Traffic-Sensitive Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2015/8006a051/12OmNwe2Iww", "parentPublication": { "id": "proceedings/ccgrid/2015/8006/0", "title": "2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2010/4220/0/4220a088", "title": "Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration", "doi": null, "abstractUrl": "/proceedings-article/cluster/2010/4220a088/12OmNwtn3Cg", "parentPublication": { "id": "proceedings/cluster/2010/4220/0", "title": "2010 IEEE International Conference on Cluster Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-css-icess/2014/6123/0/07056750", "title": "Harnessing Memory Page Distribution for Network-Efficient Live Migration", "doi": null, "abstractUrl": "/proceedings-article/hpcc-css-icess/2014/07056750/12OmNzBwGne", "parentPublication": { "id": "proceedings/hpcc-css-icess/2014/6123/0", "title": "2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2016/09/07328706", "title": "Guaranteeing Delay of Live Virtual Machine Migration by Determining and Provisioning Appropriate Bandwidth", "doi": null, "abstractUrl": "/journal/tc/2016/09/07328706/13rRUxBa5wC", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2018/01/07274710", "title": "Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/journal/cc/2018/01/07274710/13rRUxCitAB", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ficloud/2018/7503/0/750300a251", "title": "Analysis and Comparison of Live Virtual Machine Migration Methods", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2018/750300a251/13xI8AH0qz3", "parentPublication": { "id": "proceedings/ficloud/2018/7503/0", "title": "2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2018/7445/0/744500a040", "title": "Fix Page Fault in Post-Copy Live Migration with RemotePF Page Table Assistant", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2018/744500a040/17D45WHONjJ", "parentPublication": { "id": "proceedings/dcabes/2018/7445/0", "title": "2018 17th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpbd&is/2019/0466/0/08735491", "title": "Optimizing Virtual Machine Live Migration in Distributed Edge Servers Based on Hybrid Memory", "doi": null, "abstractUrl": "/proceedings-article/hpbd&is/2019/08735491/1aPuSDB5A6Q", "parentPublication": { "id": "proceedings/hpbd&is/2019/0466/0", "title": "2019 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyYm2wq", "title": "SC Conference", "acronym": "sc", "groupId": "1000729", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNB1wkJZ", "doi": "10.1145/1362622.1362684", "title": "Efficient gather and scatter operations on graphics processors", "normalizedTitle": "Efficient gather and scatter operations on graphics processors", "abstract": "Gather and scatter are two fundamental data-parallel operations, where a large number of data items are read (gathered) from or are written (scattered) to given locations. In this paper, we study these two operations on graphics processing units (GPUs). With superior computing power and high memory bandwidth, GPUs have become a commodity multiprocessor platform for general-purpose high-performance computing. However, due to the random access nature of gather and scatter, a naive implementation of the two operations suffers from a low utilization of the memory bandwidth and consequently a long, unhidden memory latency. Additionally, the architectural details of the GPUs, in particular, the memory hierarchy design, are unclear to the programmers. Therefore, we design multi-pass gather and scatter operations to improve their data access locality, and develop a performance model to help understand and optimize these two operations. We have evaluated our algorithms in sorting, hashing, and the sparse matrix-vector multiplication in comparison with their optimized CPU counterparts. Our results show that these optimizations yield 2--4X improvement on the GPU bandwidth utilization and 30--50% improvement on the response time. Overall, our optimized GPU implementations are 2--7X faster than their optimized CPU counterparts.", "abstracts": [ { "abstractType": "Regular", "content": "Gather and scatter are two fundamental data-parallel operations, where a large number of data items are read (gathered) from or are written (scattered) to given locations. In this paper, we study these two operations on graphics processing units (GPUs). With superior computing power and high memory bandwidth, GPUs have become a commodity multiprocessor platform for general-purpose high-performance computing. However, due to the random access nature of gather and scatter, a naive implementation of the two operations suffers from a low utilization of the memory bandwidth and consequently a long, unhidden memory latency. Additionally, the architectural details of the GPUs, in particular, the memory hierarchy design, are unclear to the programmers. Therefore, we design multi-pass gather and scatter operations to improve their data access locality, and develop a performance model to help understand and optimize these two operations. We have evaluated our algorithms in sorting, hashing, and the sparse matrix-vector multiplication in comparison with their optimized CPU counterparts. Our results show that these optimizations yield 2--4X improvement on the GPU bandwidth utilization and 30--50% improvement on the response time. Overall, our optimized GPU implementations are 2--7X faster than their optimized CPU counterparts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gather and scatter are two fundamental data-parallel operations, where a large number of data items are read (gathered) from or are written (scattered) to given locations. In this paper, we study these two operations on graphics processing units (GPUs). With superior computing power and high memory bandwidth, GPUs have become a commodity multiprocessor platform for general-purpose high-performance computing. However, due to the random access nature of gather and scatter, a naive implementation of the two operations suffers from a low utilization of the memory bandwidth and consequently a long, unhidden memory latency. Additionally, the architectural details of the GPUs, in particular, the memory hierarchy design, are unclear to the programmers. Therefore, we design multi-pass gather and scatter operations to improve their data access locality, and develop a performance model to help understand and optimize these two operations. We have evaluated our algorithms in sorting, hashing, and the sparse matrix-vector multiplication in comparison with their optimized CPU counterparts. Our results show that these optimizations yield 2--4X improvement on the GPU bandwidth utilization and 30--50% improvement on the response time. Overall, our optimized GPU implementations are 2--7X faster than their optimized CPU counterparts.", "fno": "37640046", "keywords": [ "Cache Optimization", "Gather", "Graphics Processors", "Parallel Processing", "Scatter" ], "authors": [ { "affiliation": "Hong Kong Univ. of Science and Technology", "fullName": "Bingsheng He", "givenName": "Bingsheng", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Corp.", "fullName": "Naga K. Govindaraju", "givenName": "Naga K.", "surname": "Govindaraju", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong Univ. of Science and Technology", "fullName": "Qiong Luo", "givenName": "Qiong", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Corp.", "fullName": "Burton Smith", "givenName": "Burton", "surname": "Smith", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-11-01T00:00:00", "pubType": "proceedings", "pages": "1-12", "year": "2007", "issn": null, "isbn": "978-1-59593-764-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "37640045", "articleId": "12OmNzXnNsW", "__typename": "AdjacentArticleType" }, "next": { "fno": "37640047", "articleId": "12OmNAq3hF4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cloud/2014/5063/0/5063a376", "title": "Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/proceedings-article/cloud/2014/5063a376/12OmNAZx8Mk", "parentPublication": { "id": "proceedings/cloud/2014/5063/0", "title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2003/1926/0/19260101a", "title": "Load-Balancing Scatter Operations for Grid Computing", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2003/19260101a/12OmNAsBFP3", "parentPublication": { "id": "proceedings/ipdps/2003/1926/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1998/8255/3/00656148", "title": "On the implementation of broadcast, scatter and gather in a heterogeneous architecture", "doi": null, "abstractUrl": "/proceedings-article/hicss/1998/00656148/12OmNro0Ide", "parentPublication": { "id": "proceedings/hicss/1998/8255/3", "title": "Proceedings of the Thirty-First Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/2008/2682/0/04625444", "title": "A gather/scatter hardware support for efficient Fast Fourier Transform", "doi": null, "abstractUrl": "/proceedings-article/acsac/2008/04625444/12OmNs0kyHB", "parentPublication": { "id": "proceedings/acsac/2008/2682/0", "title": "2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2017/4825/0/07995271", "title": "Modeling and evaluation for gather/scatter operations in Vector-SIMD architectures", "doi": null, "abstractUrl": "/proceedings-article/asap/2017/07995271/12OmNwbcJ57", "parentPublication": { "id": "proceedings/asap/2017/4825/0", "title": "2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2004/2132/1/213210080", "title": "Hierarchical Gather/Scatter Algorithms with Graceful Degradation", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2004/213210080/12OmNy314em", "parentPublication": { "id": "proceedings/ipdps/2004/2132/1", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2009/08/ttc2009081035", "title": "A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations", "doi": null, "abstractUrl": "/journal/tc/2009/08/ttc2009081035/13rRUILtJyK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2018/01/07274710", "title": "Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/journal/cc/2018/01/07274710/13rRUxCitAB", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122829", "title": "Scatter/Gather Clustering: Flexibly Incorporating User Feedback to Steer Clustering Results", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122829/13rRUypp57E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/09/08642840", "title": "On Optimal Trees for Irregular Gather and Scatter Collectives", "doi": null, "abstractUrl": "/journal/td/2019/09/08642840/17PYEksVpK1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwseER2", "title": "2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "acronym": "asap", "groupId": "1000037", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwbcJ57", "doi": "10.1109/ASAP.2017.7995271", "title": "Modeling and evaluation for gather/scatter operations in Vector-SIMD architectures", "normalizedTitle": "Modeling and evaluation for gather/scatter operations in Vector-SIMD architectures", "abstract": "Gather/scatter are state of the art vector memory access modes in Vector-SIMD architectures. However, because of the stochastic and complicated properties, the hardware design of gather/scatter operations lacks theoretical analysis and modeling. This paper proposes a model for gather/scatter operations on local vector memory for the first time. The model can not only give all the possible distributions of access locations, calculate the probability of access conflicts and predict the number of access conflicts, but also can provide the theoretical guidance for the performance optimization. This model is validated through experiments which can guide users to more specifically design and optimize the implementation of gather/scatter operations.", "abstracts": [ { "abstractType": "Regular", "content": "Gather/scatter are state of the art vector memory access modes in Vector-SIMD architectures. However, because of the stochastic and complicated properties, the hardware design of gather/scatter operations lacks theoretical analysis and modeling. This paper proposes a model for gather/scatter operations on local vector memory for the first time. The model can not only give all the possible distributions of access locations, calculate the probability of access conflicts and predict the number of access conflicts, but also can provide the theoretical guidance for the performance optimization. This model is validated through experiments which can guide users to more specifically design and optimize the implementation of gather/scatter operations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gather/scatter are state of the art vector memory access modes in Vector-SIMD architectures. However, because of the stochastic and complicated properties, the hardware design of gather/scatter operations lacks theoretical analysis and modeling. This paper proposes a model for gather/scatter operations on local vector memory for the first time. The model can not only give all the possible distributions of access locations, calculate the probability of access conflicts and predict the number of access conflicts, but also can provide the theoretical guidance for the performance optimization. This model is validated through experiments which can guide users to more specifically design and optimize the implementation of gather/scatter operations.", "fno": "07995271", "keywords": [ "Optimisation", "Parallel Processing", "Probability", "Software Architecture", "Storage Management", "Vectors", "Gather Scatter Operations", "Vector SIMD Architectures", "Vector Memory Access Modes", "Access Conflicts Probability", "Access Conflicts Prediction", "Performance Optimization", "Mathematical Model", "Picture Archiving And Communication Systems", "Bandwidth", "Roads", "Electronic Mail", "Hardware", "Predictive Models", "Gather Scatter", "Random Access", "Location Distribution", "Access Conflict", "Maximum Conflict Per Cycle" ], "authors": [ { "affiliation": "National University of Defense Technology, Deya Road 109, Kaifu Street, Changsha, China", "fullName": "Hongbing Tan", "givenName": "Hongbing", "surname": "Tan", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology, Deya Road 109, Kaifu Street, Changsha, China", "fullName": "Sheng Liu", "givenName": "Sheng", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology, Deya Road 109, Kaifu Street, Changsha, China", "fullName": "Haiyan Chen", "givenName": "Haiyan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Defense Technology, Deya Road 109, Kaifu Street, Changsha, China", "fullName": "Jianguo Wu", "givenName": "Jianguo", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "asap", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "143-148", "year": "2017", "issn": "2160-052X", "isbn": "978-1-5090-4825-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07995270", "articleId": "12OmNz4SOrI", "__typename": "AdjacentArticleType" }, "next": { "fno": "07995272", "articleId": "12OmNxFsmzZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cloud/2014/5063/0/5063a376", "title": "Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/proceedings-article/cloud/2014/5063a376/12OmNAZx8Mk", "parentPublication": { "id": "proceedings/cloud/2014/5063/0", "title": "2014 IEEE 7th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2007/3764/0/37640046", "title": "Efficient gather and scatter operations on graphics processors", "doi": null, "abstractUrl": "/proceedings-article/sc/2007/37640046/12OmNB1wkJZ", "parentPublication": { "id": "proceedings/sc/2007/3764/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2008/3174/0/3174a441", "title": "Atomic Vector Operations on Chip Multiprocessors", "doi": null, "abstractUrl": "/proceedings-article/isca/2008/3174a441/12OmNC3FG5g", "parentPublication": { "id": "proceedings/isca/2008/3174/0", "title": "Computer Architecture, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/2008/2682/0/04625444", "title": "A gather/scatter hardware support for efficient Fast Fourier Transform", "doi": null, "abstractUrl": "/proceedings-article/acsac/2008/04625444/12OmNs0kyHB", "parentPublication": { "id": "proceedings/acsac/2008/2682/0", "title": "2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2008/2639/0/04663792", "title": "Gather-arrange-scatter: Node-level request reordering for parallel file systems on multi-core clusters", "doi": null, "abstractUrl": "/proceedings-article/cluster/2008/04663792/12OmNviHK8I", "parentPublication": { "id": "proceedings/cluster/2008/2639/0", "title": "2008 IEEE International Conference on Cluster Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2004/2132/1/213210080", "title": "Hierarchical Gather/Scatter Algorithms with Graceful Degradation", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2004/213210080/12OmNy314em", "parentPublication": { "id": "proceedings/ipdps/2004/2132/1", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2018/01/07274710", "title": "Scatter-Gather Live Migration of Virtual Machines", "doi": null, "abstractUrl": "/journal/cc/2018/01/07274710/13rRUxCitAB", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122829", "title": "Scatter/Gather Clustering: Flexibly Incorporating User Feedback to Steer Clustering Results", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122829/13rRUypp57E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/09/08642840", "title": "On Optimal Trees for Irregular Gather and Scatter Collectives", "doi": null, "abstractUrl": "/journal/td/2019/09/08642840/17PYEksVpK1", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ia3/2019/5987/0/598700a059", "title": "A Hardware Prefetching Mechanism for Vector Gather Instructions", "doi": null, "abstractUrl": "/proceedings-article/ia3/2019/598700a059/1grOgrkZkIg", "parentPublication": { "id": "proceedings/ia3/2019/5987/0", "title": "2019 IEEE/ACM 9th Workshop on Irregular Applications: Architectures and Algorithms (IA3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4IC", "title": "2009 International Conference on Computer and Automation Engineering. ICCAE 2009", "acronym": "iccae", "groupId": "1002685", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwkzupb", "doi": "10.1109/ICCAE.2009.33", "title": "Using Data Clustering to Optimize Scatter Bitmap Index for Membership Queries", "normalizedTitle": "Using Data Clustering to Optimize Scatter Bitmap Index for Membership Queries", "abstract": "Decision support systems that retrieve information from a data warehouse environment are usually designed to process complex and ad hoc queries. Indexing techniques based on bitmap representations can be used to improve the efficiency of information retrieval. Scatter Bitmap Index uses less space and is more CPU-efficient than other bitmap indexing techniques. It is simple to represent, and improves query processing time by utilizing low-cost Boolean operations and multiple index scans. The Scatter Bitmap Index technique performs simple predicate conditions on the index level before going to the primary data source. Furthermore, Scatter Bitmap Index can be optimized by applying K-mode Clustering, which finds relationships among attribute values in queries. In this paper, we show that Data Clustering with Scatter Bitmap Index can improve query processing time for membership queries.", "abstracts": [ { "abstractType": "Regular", "content": "Decision support systems that retrieve information from a data warehouse environment are usually designed to process complex and ad hoc queries. Indexing techniques based on bitmap representations can be used to improve the efficiency of information retrieval. Scatter Bitmap Index uses less space and is more CPU-efficient than other bitmap indexing techniques. It is simple to represent, and improves query processing time by utilizing low-cost Boolean operations and multiple index scans. The Scatter Bitmap Index technique performs simple predicate conditions on the index level before going to the primary data source. Furthermore, Scatter Bitmap Index can be optimized by applying K-mode Clustering, which finds relationships among attribute values in queries. In this paper, we show that Data Clustering with Scatter Bitmap Index can improve query processing time for membership queries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Decision support systems that retrieve information from a data warehouse environment are usually designed to process complex and ad hoc queries. Indexing techniques based on bitmap representations can be used to improve the efficiency of information retrieval. Scatter Bitmap Index uses less space and is more CPU-efficient than other bitmap indexing techniques. It is simple to represent, and improves query processing time by utilizing low-cost Boolean operations and multiple index scans. The Scatter Bitmap Index technique performs simple predicate conditions on the index level before going to the primary data source. Furthermore, Scatter Bitmap Index can be optimized by applying K-mode Clustering, which finds relationships among attribute values in queries. In this paper, we show that Data Clustering with Scatter Bitmap Index can improve query processing time for membership queries.", "fno": "3569a174", "keywords": [ "Data Warehouse", "Bitmap Index", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Weahason Weahama", "givenName": "Weahason", "surname": "Weahama", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sirirut Vanichayobon", "givenName": "Sirirut", "surname": "Vanichayobon", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jarin Manfuekphan", "givenName": "Jarin", "surname": "Manfuekphan", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccae", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-03-01T00:00:00", "pubType": "proceedings", "pages": "174-178", "year": "2009", "issn": null, "isbn": "978-0-7695-3569-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3569a169", "articleId": "12OmNBZHiiu", "__typename": "AdjacentArticleType" }, "next": { "fno": "3569a181", "articleId": "12OmNAQJzVp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2004/2065/0/20650837", "title": "Bitmap-Tree Indexing for Set Operations on Free Text", "doi": null, "abstractUrl": "/proceedings-article/icde/2004/20650837/12OmNBKEyBu", "parentPublication": { "id": "proceedings/icde/2004/2065/0", "title": "Proceedings. 20th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2008/3504/0/3504a511", "title": "Optimizing Encoded Bitmap Index Using Frequent Itemsets Mining", "doi": null, "abstractUrl": "/proceedings-article/iccee/2008/3504a511/12OmNrJAecR", "parentPublication": { "id": "proceedings/iccee/2008/3504/0", "title": "2008 International Conference on Computer and Electrical Engineering (ICCEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2009/3595/0/3595a142", "title": "Speed up the Search in Bitmap Based Compressed Sparse Arrays", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a142/12OmNrJiCGy", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660022", "title": "Query-Driven Visualization of Large Data Sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660022/12OmNvAAtDg", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2009/4027/0/4027a085", "title": "CasAB: Building Precise Bitmap Indices via Cascaded Bloom Filters", "doi": null, "abstractUrl": "/proceedings-article/icicse/2009/4027a085/12OmNvlxJvY", "parentPublication": { "id": "proceedings/icicse/2009/4027/0", "title": "2009 Fourth International Conference on Internet Computing for Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2006/0054/0/01639304", "title": "Bitmap indexes for large scientific data sets: a case study", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2006/01639304/12OmNwp74Nh", "parentPublication": { "id": "proceedings/ipdps/2006/0054/0", "title": "Proceedings 20th IEEE International Parallel & Distributed Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nss/2010/4159/0/4159a477", "title": "Spatio-temporal Knowledge Discovery in Very Large METOC Data Sets", "doi": null, "abstractUrl": "/proceedings-article/nss/2010/4159a477/12OmNyuy9TY", "parentPublication": { "id": "proceedings/nss/2010/4159/0", "title": "Network and System Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssdbm/2001/1218/0/12180158", "title": "BitCube: A Three-Dimensional Bitmap Indexing for XML Documents", "doi": null, "abstractUrl": "/proceedings-article/ssdbm/2001/12180158/12OmNzmLxCv", "parentPublication": { "id": "proceedings/ssdbm/2001/1218/0", "title": "Scientific and Statistical Database Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/09/ttk2012091570", "title": "Efficient Iceberg Query Evaluation Using Compressed Bitmap Index", "doi": null, "abstractUrl": "/journal/tk/2012/09/ttk2012091570/13rRUIIVlkJ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a036", "title": "Temporal Querying of Faces in Videos Using Bitmap Index", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a036/19wB2fJ6jNm", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTH0Gt", "title": "Parallel and Distributed Processing Symposium, International", "acronym": "ipdps", "groupId": "1000530", "volume": "1", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNy314em", "doi": "10.1109/IPDPS.2004.1303019", "title": "Hierarchical Gather/Scatter Algorithms with Graceful Degradation", "normalizedTitle": "Hierarchical Gather/Scatter Algorithms with Graceful Degradation", "abstract": "We present and implement simple, binomial-tree based algorithms for the gather and scatter operations of MPI (the Message Passing Interface). For small data sets, data are gathered (scattered) in a tree-like fashion. As the size of the data increases, the algorithms gracefully degrade toward the serial algorithm in which the root process gathers (scatters) data from (to) one process after the next. We extend these algorithms to the more difficult irregular gather/scatter operations in which the processes send/receive different amounts of data. The algorithms are furthermore adopted to the hierarchical communication structure of SMP-clusters. We compare the new algorithms to the straightforward, serial implementations of the gather/scatter primitives, and demonstrate substantial improvements both on a 32-node, 2-way SMP cluster, and on a 4-node NEC SX-6 vector supercomputer with 8 processors per node. For the regular gather/scatter operations improvements of a factor of 3 to 7 are achieved for critical data sizes on the SMP-system, and a factor of 3 to 4 on the SX-6. On 256 nodes of the Earth Simulator the improvement for scattering small data is more than a factor of 60. Comparable improvements are achieved for the irregular operations, despite preprocessing and communication overhead for dynamic tree construction. We discuss issues in modeling and analyzing the performance of the algorithms for the irregular collectives in particular.", "abstracts": [ { "abstractType": "Regular", "content": "We present and implement simple, binomial-tree based algorithms for the gather and scatter operations of MPI (the Message Passing Interface). For small data sets, data are gathered (scattered) in a tree-like fashion. As the size of the data increases, the algorithms gracefully degrade toward the serial algorithm in which the root process gathers (scatters) data from (to) one process after the next. We extend these algorithms to the more difficult irregular gather/scatter operations in which the processes send/receive different amounts of data. The algorithms are furthermore adopted to the hierarchical communication structure of SMP-clusters. We compare the new algorithms to the straightforward, serial implementations of the gather/scatter primitives, and demonstrate substantial improvements both on a 32-node, 2-way SMP cluster, and on a 4-node NEC SX-6 vector supercomputer with 8 processors per node. For the regular gather/scatter operations improvements of a factor of 3 to 7 are achieved for critical data sizes on the SMP-system, and a factor of 3 to 4 on the SX-6. On 256 nodes of the Earth Simulator the improvement for scattering small data is more than a factor of 60. Comparable improvements are achieved for the irregular operations, despite preprocessing and communication overhead for dynamic tree construction. We discuss issues in modeling and analyzing the performance of the algorithms for the irregular collectives in particular.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present and implement simple, binomial-tree based algorithms for the gather and scatter operations of MPI (the Message Passing Interface). For small data sets, data are gathered (scattered) in a tree-like fashion. As the size of the data increases, the algorithms gracefully degrade toward the serial algorithm in which the root process gathers (scatters) data from (to) one process after the next. We extend these algorithms to the more difficult irregular gather/scatter operations in which the processes send/receive different amounts of data. The algorithms are furthermore adopted to the hierarchical communication structure of SMP-clusters. We compare the new algorithms to the straightforward, serial implementations of the gather/scatter primitives, and demonstrate substantial improvements both on a 32-node, 2-way SMP cluster, and on a 4-node NEC SX-6 vector supercomputer with 8 processors per node. For the regular gather/scatter operations improvements of a factor of 3 to 7 are achieved for critical data sizes on the SMP-system, and a factor of 3 to 4 on the SX-6. On 256 nodes of the Earth Simulator the improvement for scattering small data is more than a factor of 60. Comparable improvements are achieved for the irregular operations, despite preprocessing and communication overhead for dynamic tree construction. We discuss issues in modeling and analyzing the performance of the algorithms for the irregular collectives in particular.", "fno": "213210080", "keywords": [], "authors": [ { "affiliation": "NEC Europe Ltd.", "fullName": "Jesper Larsson Trä", "givenName": "Jesper Larsson", "surname": "Trä", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdps", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-04-01T00:00:00", "pubType": "proceedings", "pages": "80", "year": "2004", "issn": null, "isbn": "0-7695-2132-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "213210079b", "articleId": "12OmNx3HIaQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "213210082a", "articleId": "12OmNz5JBVt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTH0FY", "title": "2011 IEEE 11th International Conference on Data Mining", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzE54wW", "doi": "10.1109/ICDM.2011.36", "title": "Clustering with Attribute-Level Constraints", "normalizedTitle": "Clustering with Attribute-Level Constraints", "abstract": "In many clustering applications the incorporation of background knowledge in the form of constraints is desirable. In this paper, we introduce a new constraint type and the corresponding clustering problem: attribute constrained clustering. The goal is to induce clusters of binary instances that satisfy constraints on the attribute level. These constraints specify whether instances may or may not be grouped to a cluster, depending on specific attribute values. We show how the well-established instance-level constraints, must-link and cannot-link, can be adapted to the attribute level. A variant of the k-Medoids algorithm taking into account attribute level constraints is evaluated on synthetic and real-world data. Experimental results show that such constraints may provide better clustering results at lower specification costs if constraints can be expressed on the attribute level.", "abstracts": [ { "abstractType": "Regular", "content": "In many clustering applications the incorporation of background knowledge in the form of constraints is desirable. In this paper, we introduce a new constraint type and the corresponding clustering problem: attribute constrained clustering. The goal is to induce clusters of binary instances that satisfy constraints on the attribute level. These constraints specify whether instances may or may not be grouped to a cluster, depending on specific attribute values. We show how the well-established instance-level constraints, must-link and cannot-link, can be adapted to the attribute level. A variant of the k-Medoids algorithm taking into account attribute level constraints is evaluated on synthetic and real-world data. Experimental results show that such constraints may provide better clustering results at lower specification costs if constraints can be expressed on the attribute level.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In many clustering applications the incorporation of background knowledge in the form of constraints is desirable. In this paper, we introduce a new constraint type and the corresponding clustering problem: attribute constrained clustering. The goal is to induce clusters of binary instances that satisfy constraints on the attribute level. These constraints specify whether instances may or may not be grouped to a cluster, depending on specific attribute values. We show how the well-established instance-level constraints, must-link and cannot-link, can be adapted to the attribute level. A variant of the k-Medoids algorithm taking into account attribute level constraints is evaluated on synthetic and real-world data. Experimental results show that such constraints may provide better clustering results at lower specification costs if constraints can be expressed on the attribute level.", "fno": "4408b206", "keywords": [ "Constrained Clustering", "Attribute Level" ], "authors": [ { "affiliation": null, "fullName": "Jana Schmidt", "givenName": "Jana", "surname": "Schmidt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Elisabeth Maria Brändle", "givenName": "Elisabeth Maria", "surname": "Brändle", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Stefan Kramer", "givenName": "Stefan", "surname": "Kramer", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-12-01T00:00:00", "pubType": "proceedings", "pages": "1206-1211", "year": "2011", "issn": "1550-4786", "isbn": "978-0-7695-4408-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4408b200", "articleId": "12OmNANBZot", "__typename": "AdjacentArticleType" }, "next": { "fno": "4408b212", "articleId": "12OmNzC5SRf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/6/3735f087", "title": "An Attribute Reduct Algorithm Based on Clustering", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735f087/12OmNAYoKgt", "parentPublication": { "id": "proceedings/fskd/2009/3735/6", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2008/3112/0/3112a068", "title": "The Discovery of Attribute Feature Cluster for Any Clustering Result Based on Outlier Detection Technique", "doi": null, "abstractUrl": "/proceedings-article/icicse/2008/3112a068/12OmNAgY7m9", "parentPublication": { "id": "proceedings/icicse/2008/3112/0", "title": "2008 International Conference on Internet Computing in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/1/3801a264", "title": "Active Learning of Instance-Level Constraints for Semi-supervised Document Clustering", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801a264/12OmNB8kI1D", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/1", "title": "2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wkdd/2010/5397/0/05432668", "title": "Hierarchical Agglomerative Clustering with Ordering Constraints", "doi": null, "abstractUrl": "/proceedings-article/wkdd/2010/05432668/12OmNBhHt7c", "parentPublication": { "id": "proceedings/wkdd/2010/5397/0", "title": "2010 3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2012/4880/3/4880c079", "title": "Clustering with Extended Constraints by Co-Training", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2012/4880c079/12OmNrJiCGc", "parentPublication": { "id": "proceedings/wi-iat/2012/4880/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a877", "title": "Clustering with Partition Level Side Information", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a877/12OmNrkT7Af", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2012/4722/0/4722a094", "title": "CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing", "doi": null, "abstractUrl": "/proceedings-article/nas/2012/4722a094/12OmNwnYFWV", "parentPublication": { "id": "proceedings/nas/2012/4722/0", "title": "2012 IEEE Seventh International Conference on Networking, Architecture, and Storage", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270a709", "title": "An Attribute Reduction Algorithm Based on Clustering and Attribute-Activity Sorting", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a709/12OmNzUPpvp", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2011/4601/0/4601a305", "title": "Evolutionary Composite Attribute Clustering", "doi": null, "abstractUrl": "/proceedings-article/taai/2011/4601a305/12OmNzdoMud", "parentPublication": { "id": "proceedings/taai/2011/4601/0", "title": "2011 International Conference on Technologies and Applications of Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/01/ttk2012010127", "title": "Mutual Information-Based Supervised Attribute Clustering for Microarray Sample Classification", "doi": null, "abstractUrl": "/journal/tk/2012/01/ttk2012010127/13rRUxBa5cl", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOhWk", "title": "2010 IEEE International Conference on Data Mining", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzzP5OV", "doi": "10.1109/ICDM.2010.119", "title": "Active Spectral Clustering", "normalizedTitle": "Active Spectral Clustering", "abstract": "The technique of spectral clustering is widely used to segment a range of data from graphs to images. Our work marks a natural progression of spectral clustering from the original passive unsupervised formulation to our active semi-supervised formulation. We follow the widely used area of constrained clustering and allow supervision in the form of pair wise relations between two nodes: Must-Link and Cannot-Link. Unlike most previous constrained clustering work, our constraints are specified incrementally by querying an oracle (domain expert). Since in practice, each query comes with a cost, our goal is to maximally improve the result with as few queries as possible. The advantages of our approach include: 1) it is principled by querying the constraints which maximally reduce the expected error, 2) it can incorporate both hard and soft constraints which are prevalent in practice. We empirically show that our method significantly outperforms the baseline approach, namely constrained spectral clustering with randomly selected constraints, on UCI benchmark data sets.", "abstracts": [ { "abstractType": "Regular", "content": "The technique of spectral clustering is widely used to segment a range of data from graphs to images. Our work marks a natural progression of spectral clustering from the original passive unsupervised formulation to our active semi-supervised formulation. We follow the widely used area of constrained clustering and allow supervision in the form of pair wise relations between two nodes: Must-Link and Cannot-Link. Unlike most previous constrained clustering work, our constraints are specified incrementally by querying an oracle (domain expert). Since in practice, each query comes with a cost, our goal is to maximally improve the result with as few queries as possible. The advantages of our approach include: 1) it is principled by querying the constraints which maximally reduce the expected error, 2) it can incorporate both hard and soft constraints which are prevalent in practice. We empirically show that our method significantly outperforms the baseline approach, namely constrained spectral clustering with randomly selected constraints, on UCI benchmark data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The technique of spectral clustering is widely used to segment a range of data from graphs to images. Our work marks a natural progression of spectral clustering from the original passive unsupervised formulation to our active semi-supervised formulation. We follow the widely used area of constrained clustering and allow supervision in the form of pair wise relations between two nodes: Must-Link and Cannot-Link. Unlike most previous constrained clustering work, our constraints are specified incrementally by querying an oracle (domain expert). Since in practice, each query comes with a cost, our goal is to maximally improve the result with as few queries as possible. The advantages of our approach include: 1) it is principled by querying the constraints which maximally reduce the expected error, 2) it can incorporate both hard and soft constraints which are prevalent in practice. We empirically show that our method significantly outperforms the baseline approach, namely constrained spectral clustering with randomly selected constraints, on UCI benchmark data sets.", "fno": "4256a561", "keywords": [ "Spectral Clustering", "Active Learning", "Constrained Clustering" ], "authors": [ { "affiliation": null, "fullName": "Xiang Wang", "givenName": "Xiang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ian Davidson", "givenName": "Ian", "surname": "Davidson", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "561-568", "year": "2010", "issn": "1550-4786", "isbn": "978-0-7695-4256-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4256a551", "articleId": "12OmNqGRGd8", "__typename": "AdjacentArticleType" }, "next": { "fno": "4256a569", "articleId": "12OmNvSKO1Z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2012/4905/0/4905b146", "title": "Labels vs. Pairwise Constraints: A Unified View of Label Propagation and Constrained Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b146/12OmNAXxWSg", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2010/4300/0/4300a649", "title": "Feature Selection in Clustering with Constraints: Application to Active Exploration of Music Collections", "doi": null, "abstractUrl": "/proceedings-article/icmla/2010/4300a649/12OmNB1eJED", "parentPublication": { "id": "proceedings/icmla/2010/4300/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/1/3801a264", "title": "Active Learning of Instance-Level Constraints for Semi-supervised Document Clustering", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801a264/12OmNB8kI1D", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/1", "title": "2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2011/4584/0/4584b367", "title": "Spectral Clustering and its Research Progress", "doi": null, "abstractUrl": "/proceedings-article/cis/2011/4584b367/12OmNrAdsAp", "parentPublication": { "id": "proceedings/cis/2011/4584/0", "title": "2011 Seventh International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/1/3735a529", "title": "Spectral Clustering for Chinese Word", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735a529/12OmNyrqzkV", "parentPublication": { "id": "proceedings/fskd/2009/3735/1", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109c969", "title": "An Efficient Active Constraint Selection Algorithm for Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c969/12OmNz2kqhe", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2011/4541/0/4541a362", "title": "Inverse-degree Sampling for Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icig/2011/4541a362/12OmNzaQo8K", "parentPublication": { "id": "proceedings/icig/2011/4541/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2008/3508/1/3508a001", "title": "Self-Tuning Semi-Supervised Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/cis/2008/3508a001/12OmNzhELhY", "parentPublication": { "id": "proceedings/cis/2008/3508/1", "title": "2008 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09813560", "title": "Self-Constrained Spectral Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/04/09813560/1EJBgKzjkOY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413298", "title": "Constrained Spectral Clustering Network with Self-Training", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413298/1tmhXskG8tG", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyqRn7f", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "4", "displayVolume": "4", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNApLGP4", "doi": "10.1109/ICPR.2000.902941", "title": "Image-Based Document Vectors for Text Retrieval", "normalizedTitle": "Image-Based Document Vectors for Text Retrieval", "abstract": "We propose a method for constructing a vector for a document image to represent its content to facilitate text retrieval. The method is based on an N-Gram algorithm for text similarity measure based on the frequency of occurrence of n-character strings appearing in the electronic text. Instead of using ASCII values, the present study investigates the use of character images to obtain the document vector and has found promising results for use in our news article retrieval project.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a method for constructing a vector for a document image to represent its content to facilitate text retrieval. The method is based on an N-Gram algorithm for text similarity measure based on the frequency of occurrence of n-character strings appearing in the electronic text. Instead of using ASCII values, the present study investigates the use of character images to obtain the document vector and has found promising results for use in our news article retrieval project.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a method for constructing a vector for a document image to represent its content to facilitate text retrieval. The method is based on an N-Gram algorithm for text similarity measure based on the frequency of occurrence of n-character strings appearing in the electronic text. Instead of using ASCII values, the present study investigates the use of character images to obtain the document vector and has found promising results for use in our news article retrieval project.", "fno": "07504393", "keywords": [ "Document Image", "Text Retrieval", "Similarity Measure", "N Gram Algorithm" ], "authors": [ { "affiliation": "National University of Singapore", "fullName": "Zhaohui Yu", "givenName": "Zhaohui", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore", "fullName": "Chew Lim Tan", "givenName": "Chew Lim", "surname": "Tan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-09-01T00:00:00", "pubType": "proceedings", "pages": "4393", "year": "2000", "issn": null, "isbn": "0-7695-0750-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07504389", "articleId": "12OmNC2xhFB", "__typename": "AdjacentArticleType" }, "next": { "fno": "07504397", "articleId": "12OmNzkMlOe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }