data
dict
{ "proceeding": { "id": "12OmNwnH4R7", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "acronym": "ichi", "groupId": "1803080", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoDifg", "doi": "10.1109/ICHI.2013.72", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "normalizedTitle": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "abstract": "Presents the results of a preliminary study on understanding how humanoid robots can successfully improve social and communication skills among children with Autism Spectrum Disorders (ASD). Children with ASD experience deficits in appropriate verbal and nonverbal communication skills including motor control, emotional facial expressions, eye-gaze attention, and joint attention. Studies have shown that positive feedback from the robot on the participants' performance is an effective way to encourage children with ASD to communicate more. Other studies have also examined the use of affect recognition based on psycho physiological responses to modify the behaviors during a robotic game. However, there is limited information on the utility of humanoid robots' positive.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the results of a preliminary study on understanding how humanoid robots can successfully improve social and communication skills among children with Autism Spectrum Disorders (ASD). Children with ASD experience deficits in appropriate verbal and nonverbal communication skills including motor control, emotional facial expressions, eye-gaze attention, and joint attention. Studies have shown that positive feedback from the robot on the participants' performance is an effective way to encourage children with ASD to communicate more. Other studies have also examined the use of affect recognition based on psycho physiological responses to modify the behaviors during a robotic game. However, there is limited information on the utility of humanoid robots' positive.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the results of a preliminary study on understanding how humanoid robots can successfully improve social and communication skills among children with Autism Spectrum Disorders (ASD). Children with ASD experience deficits in appropriate verbal and nonverbal communication skills including motor control, emotional facial expressions, eye-gaze attention, and joint attention. Studies have shown that positive feedback from the robot on the participants' performance is an effective way to encourage children with ASD to communicate more. Other studies have also examined the use of affect recognition based on psycho physiological responses to modify the behaviors during a robotic game. However, there is limited information on the utility of humanoid robots' positive.", "fno": "5089a484", "keywords": [ "Games", "Humanoid Robots", "Variable Speed Drives", "Autism", "Joints", "Educational Institutions" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Univ. of Denver, Denver, CO, USA", "fullName": "Huanghao Feng", "givenName": null, "surname": "Huanghao Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Psychol., Florida Int. Univ., Miami, FL, USA", "fullName": "Anibal Gutierrez", "givenName": "Anibal", "surname": "Gutierrez", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Univ. of Denver, Denver, CO, USA", "fullName": "Jun Zhang", "givenName": null, "surname": "Jun Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Univ. of Denver, Denver, CO, USA", "fullName": "Mohammad H. Mahoor", "givenName": "Mohammad H.", "surname": "Mahoor", "__typename": "ArticleAuthorType" } ], "idPrefix": "ichi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "484-484", "year": "2013", "issn": null, "isbn": "978-0-7695-5089-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5089a483", "articleId": "12OmNzkuKJG", "__typename": "AdjacentArticleType" }, "next": { "fno": "5089a485", "articleId": "12OmNwIHowI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2013/0820/0/06632634", "title": "Autism Spectrum Disorder children interaction skills measurement using computer games", "doi": null, "abstractUrl": "/proceedings-article/cgames/2013/06632634/12OmNwswg44", "parentPublication": { "id": "proceedings/cgames/2013/0820/0", "title": "2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948448", "title": "[Poster] An augmented and virtual reality system for training autistic children", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948448/12OmNyKa5Zf", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328405", "title": "Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328405/17D45Wuc374", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a299", "title": "Avatarizing Children with Autism Spectrum Disorder into Serious Games for Social Communication Skill Intervention", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a299/1AFsrorE4A8", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10024337", "title": "Computer-Aided Autism Spectrum Disorder Diagnosis With Behavior Signal Processing", "doi": null, "abstractUrl": "/journal/ta/5555/01/10024337/1KaB0oT2ziU", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798032", "title": "Teachers' Views on how to use Virtual Reality to Instruct Children and Adolescents Diagnosed with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798032/1cJ0YBL70AM", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204125", "title": "Augmented reality for children with Autism Spectrum Disorder - A systematic review", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204125/1nmi7vlqm9q", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a761", "title": "Developing Computational Thinking for Children with Autism using a Serious Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a761/1rSRclkCpzO", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciddt/2020/0367/0/036700a189", "title": "Design of Humanoid Robot Based Training APP on Social Skills of Children with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/iciddt/2020/036700a189/1wutJvVno3K", "parentPublication": { "id": "proceedings/iciddt/2020/0367/0", "title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrAdstw", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "acronym": "icccnt", "groupId": "1802177", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNvm6VGY", "doi": "10.1109/ICCCNT.2013.6726798", "title": "Considerations in Autism therapy using robotics", "normalizedTitle": "Considerations in Autism therapy using robotics", "abstract": "Extensive research has been carried out to luxuries the human life using robotic and artificial intelligence technologies while only few of them focus on improvising the social life of children with Autism Spectrum Disorder (ASD). Understanding the serious effects of Autism to the posterity, United Nations General Assembly has declared 2nd April as World Autism Awareness Day on 21st January 2008 [1]. Utmost expectation of any technology is to help the mankind. Hence, this paper discusses the possibilities of using Robotic tool for treating physical rehabilitation, Learning and Social interaction of Children diagnosed with ASD. This paper also discusses the psychological, physiological and social interaction difficulties faced by the subject with ASD.", "abstracts": [ { "abstractType": "Regular", "content": "Extensive research has been carried out to luxuries the human life using robotic and artificial intelligence technologies while only few of them focus on improvising the social life of children with Autism Spectrum Disorder (ASD). Understanding the serious effects of Autism to the posterity, United Nations General Assembly has declared 2nd April as World Autism Awareness Day on 21st January 2008 [1]. Utmost expectation of any technology is to help the mankind. Hence, this paper discusses the possibilities of using Robotic tool for treating physical rehabilitation, Learning and Social interaction of Children diagnosed with ASD. This paper also discusses the psychological, physiological and social interaction difficulties faced by the subject with ASD.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Extensive research has been carried out to luxuries the human life using robotic and artificial intelligence technologies while only few of them focus on improvising the social life of children with Autism Spectrum Disorder (ASD). Understanding the serious effects of Autism to the posterity, United Nations General Assembly has declared 2nd April as World Autism Awareness Day on 21st January 2008 [1]. Utmost expectation of any technology is to help the mankind. Hence, this paper discusses the possibilities of using Robotic tool for treating physical rehabilitation, Learning and Social interaction of Children diagnosed with ASD. This paper also discusses the psychological, physiological and social interaction difficulties faced by the subject with ASD.", "fno": "06726798", "keywords": [ "Autism", "Variable Speed Drives", "Pediatrics", "Educational Institutions", "Robot Sensing Systems", "BCI", "Autism Spectrum Disorder", "Autism Therapy", "Modular Robotics", "Human Robot Interaction" ], "authors": [ { "affiliation": "Dept. of Sci. & Eng., Univ. Autonoma De Ciudad Juarez, Ciudad Juarez, Mexico", "fullName": "Jaishankar Bharatharaj", "givenName": "Jaishankar", "surname": "Bharatharaj", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electron. & Instrum., Bharath Univ., Chennai, India", "fullName": "S. Senthil Kumar", "givenName": "S.", "surname": "Senthil Kumar", "__typename": "ArticleAuthorType" } ], "idPrefix": "icccnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2013", "issn": null, "isbn": "978-1-4799-3926-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06726797", "articleId": "12OmNvjQ8SV", "__typename": "AdjacentArticleType" }, "next": { "fno": "06726799", "articleId": "12OmNB0nW9n", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493421", "title": "Enable an Innovative Prolonged Exposure Therapy of Attention Deficits on Autism Spectrum through Adaptive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493421/14tNJuA5rDa", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10024337", "title": "Computer-Aided Autism Spectrum Disorder Diagnosis With Behavior Signal Processing", "doi": null, "abstractUrl": "/journal/ta/5555/01/10024337/1KaB0oT2ziU", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2019/9214/0/921400a625", "title": "Visual Attention Modeling for Autism Spectrum Disorder by Semantic Features", "doi": null, "abstractUrl": "/proceedings-article/icmew/2019/921400a625/1cJ0EqHvcT6", "parentPublication": { "id": "proceedings/icmew/2019/9214/0", "title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a630", "title": "Application of Reconstructed Phase Space in Autism Intervention", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a630/1cYiwZcclRm", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925474/1fHGE1f2lNe", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a847", "title": "Deep Learning Based Multimedia Data Mining for Autism Spectrum Disorder (ASD) Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a847/1gAwWdB8K9G", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313278", "title": "Predicting eye movement and fixation patterns on scenic images using Machine Learning for Children with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313278/1qmg2QvsNK8", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a243", "title": "Augmented Reality and Autism Spectrum Disorder Rehabilitation: Scoping review", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a243/1qpzAvoH5K0", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBhpS6P", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "acronym": "passat-socialcom", "groupId": "1800612", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNxxvAI5", "doi": "10.1109/SocialCom-PASSAT.2012.101", "title": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "normalizedTitle": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "abstract": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "abstracts": [ { "abstractType": "Regular", "content": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "fno": "06406398", "keywords": [ "Variable Speed Drives", "Face", "Protocols", "Feature Extraction", "Physiology", "Humanoid Robots", "Autism Spectrum Disorder", "Social Robot", "Human Robot Interaction", "Statistics", "Pattern Recognition", "Scene Analysis", "Gesture Recognition", "Physiological Signals" ], "authors": [ { "affiliation": null, "fullName": "Daniele Mazzei", "givenName": "Daniele", "surname": "Mazzei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alberto Greco", "givenName": "Alberto", "surname": "Greco", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nicole Lazzeri", "givenName": "Nicole", "surname": "Lazzeri", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Abolfazl Zaraki", "givenName": "Abolfazl", "surname": "Zaraki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio Lanatà", "givenName": "Antonio", "surname": "Lanatà", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roberta Igliozzi", "givenName": "Roberta", "surname": "Igliozzi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alice Mancini", "givenName": "Alice", "surname": "Mancini", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Francesca Stoppa", "givenName": "Francesca", "surname": "Stoppa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Enzo Pasquale Scilingo", "givenName": "Enzo Pasquale", "surname": "Scilingo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Filippo Muratori", "givenName": "Filippo", "surname": "Muratori", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Danilo De Rossi", "givenName": "Danilo", "surname": "De Rossi", "__typename": "ArticleAuthorType" } ], "idPrefix": "passat-socialcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "766-771", "year": "2012", "issn": null, "isbn": "978-1-4673-5638-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06406397", "articleId": "12OmNBhHtgf", "__typename": "AdjacentArticleType" }, "next": { "fno": "06406399", "articleId": "12OmNvonIIB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726798", "title": "Considerations in Autism therapy using robotics", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726798/12OmNvm6VGY", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406352", "title": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406352/12OmNzhELjd", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a630", "title": "Application of Reconstructed Phase Space in Autism Intervention", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a630/1cYiwZcclRm", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925474/1fHGE1f2lNe", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b181", "title": "Attention-Based Autism Spectrum Disorder Screening With Privileged Modality", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b181/1hVleV0Wije", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204125", "title": "Augmented reality for children with Autism Spectrum Disorder - A systematic review", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204125/1nmi7vlqm9q", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313278", "title": "Predicting eye movement and fixation patterns on scenic images using Machine Learning for Children with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313278/1qmg2QvsNK8", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyR5", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyfdOR4", "doi": "10.1109/ACII.2015.7344621", "title": "Cognitive state measurement from eye gaze analysis in an intelligent virtual reality driving system for autism intervention", "normalizedTitle": "Cognitive state measurement from eye gaze analysis in an intelligent virtual reality driving system for autism intervention", "abstract": "Autism Spectrum Disorder (ASD) is a group of neurodevelopmental disabilities with a high prevalence rate. While much research has focused on improving social communication deficits in ASD populations, less emphasis has been devoted to improving skills relevant for adult independent living, such as driving. In this paper, a novel virtual reality (VR)-based driving system with different difficulty levels of tasks is presented to train and improve driving skills of teenagers with ASD. The goal of this paper is to measure the cognitive load experienced by an individual with ASD while he is driving in the VR-based driving system. Several eye gaze features are identified that varied with cognitive load in an experiment participated by 12 teenagers with ASD. Several machine learning methods were compared and the ability of these methods to accurately measure cognitive load was validated with respect to the subjective rating of a therapist. Results will be used to build models in an intelligent VR-based driving system that can sense a participant's real-time cognitive load and offer driving tasks at an appropriate difficulty level in order to maximize the participant's long-term performance.", "abstracts": [ { "abstractType": "Regular", "content": "Autism Spectrum Disorder (ASD) is a group of neurodevelopmental disabilities with a high prevalence rate. While much research has focused on improving social communication deficits in ASD populations, less emphasis has been devoted to improving skills relevant for adult independent living, such as driving. In this paper, a novel virtual reality (VR)-based driving system with different difficulty levels of tasks is presented to train and improve driving skills of teenagers with ASD. The goal of this paper is to measure the cognitive load experienced by an individual with ASD while he is driving in the VR-based driving system. Several eye gaze features are identified that varied with cognitive load in an experiment participated by 12 teenagers with ASD. Several machine learning methods were compared and the ability of these methods to accurately measure cognitive load was validated with respect to the subjective rating of a therapist. Results will be used to build models in an intelligent VR-based driving system that can sense a participant's real-time cognitive load and offer driving tasks at an appropriate difficulty level in order to maximize the participant's long-term performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Autism Spectrum Disorder (ASD) is a group of neurodevelopmental disabilities with a high prevalence rate. While much research has focused on improving social communication deficits in ASD populations, less emphasis has been devoted to improving skills relevant for adult independent living, such as driving. In this paper, a novel virtual reality (VR)-based driving system with different difficulty levels of tasks is presented to train and improve driving skills of teenagers with ASD. The goal of this paper is to measure the cognitive load experienced by an individual with ASD while he is driving in the VR-based driving system. Several eye gaze features are identified that varied with cognitive load in an experiment participated by 12 teenagers with ASD. Several machine learning methods were compared and the ability of these methods to accurately measure cognitive load was validated with respect to the subjective rating of a therapist. Results will be used to build models in an intelligent VR-based driving system that can sense a participant's real-time cognitive load and offer driving tasks at an appropriate difficulty level in order to maximize the participant's long-term performance.", "fno": "07344621", "keywords": [ "Variable Speed Drives", "Atmospheric Measurements", "Particle Measurements", "Physiology", "Autism", "Electroencephalography", "Tracking", "Eye Gaze Features", "Autism", "Autism Intervention", "Virtual Reality", "Driving", "Cognitive Load Measurement" ], "authors": [ { "affiliation": "Electrical Engineering and Computer Science Department, Vanderbilt University, Nashville, TN 37212", "fullName": "Lian Zhang", "givenName": "Lian", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Electrical Engineering and Computer Science Department, Vanderbilt University, Nashville, TN 37212", "fullName": "Joshua Wade", "givenName": "Joshua", "surname": "Wade", "__typename": "ArticleAuthorType" }, { "affiliation": "Treatment and Research in Autism Spectrum Disorder (TRIAD), Vanderbilt University, Nashville, TN 37212", "fullName": "Amy Swanson", "givenName": "Amy", "surname": "Swanson", "__typename": "ArticleAuthorType" }, { "affiliation": "Treatment and Research in Autism Spectrum Disorder (TRIAD), Pediatrics and Psychiatry Department, Vanderbilt University, Nashville, TN 37212", "fullName": "Amy Weitlauf", "givenName": "Amy", "surname": "Weitlauf", "__typename": "ArticleAuthorType" }, { "affiliation": "Treatment and Research in Autism Spectrum Disorder (TRIAD), Pediatrics and Psychiatry Department, Vanderbilt University, Nashville, TN 37212", "fullName": "Zachary Warren", "givenName": "Zachary", "surname": "Warren", "__typename": "ArticleAuthorType" }, { "affiliation": "Mechanical Engineering Department, Electrical Engineering and Computer Science Department, Vanderbilt University, Nashville, TN 37212", "fullName": "Nilanjan Sarkar", "givenName": "Nilanjan", "surname": "Sarkar", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "532-538", "year": "2015", "issn": "2156-8111", "isbn": "978-1-4799-9953-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07344620", "articleId": "12OmNAXxXgt", "__typename": "AdjacentArticleType" }, "next": { "fno": "07344622", "articleId": "12OmNrJAdSl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732559", "title": "An evaluation of identification of suspected autism spectrum disorder (ASD) cases in early intervention (EI) records", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732559/12OmNvT2oJ3", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726798", "title": "Considerations in Autism therapy using robotics", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726798/12OmNvm6VGY", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/02/07495013", "title": "Cognitive Load Measurement in a Virtual Reality-Based Driving System for Autism Intervention", "doi": null, "abstractUrl": "/journal/ta/2017/02/07495013/13rRUwhpBMP", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493421", "title": "Enable an Innovative Prolonged Exposure Therapy of Attention Deficits on Autism Spectrum through Adaptive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493421/14tNJuA5rDa", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2018/04/07867778", "title": "Gaze-Sensitive Virtual Reality Based Social Communication Platform for Individuals with Autism", "doi": null, "abstractUrl": "/journal/ta/2018/04/07867778/17D45XwUAMY", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798032", "title": "Teachers' Views on how to use Virtual Reality to Instruct Children and Adolescents Diagnosed with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798032/1cJ0YBL70AM", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a630", "title": "Application of Reconstructed Phase Space in Autism Intervention", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a630/1cYiwZcclRm", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925474/1fHGE1f2lNe", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBhpS6P", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "acronym": "passat-socialcom", "groupId": "1800612", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNzhELjd", "doi": "10.1109/SocialCom-PASSAT.2012.99", "title": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "normalizedTitle": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "abstract": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "abstracts": [ { "abstractType": "Regular", "content": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Autism Spectrum Disorder (ASD) is a neural development disorder characterized by specific patterns of behavioral and social difficulties. Beyond these core symptoms, additional problems such as absence of gender differences identification, interactional distortions of environmental and family responses are often present. Taking into account these emotional and behavioral problems researchers and clinicians are focusing on the design of innovative therapeutic approaches aimed to improve social capabilities of subjects with ASD. Thanks to the technological and scientific progresses of the last years, nowadays it is possible to create human-like robots with social and emotional capabilities. Furthermore it is also possible to analyze physiological signals inferring subjects' psycho-physiological state which can be compared with a behavioral analysis in order to obtain a deeper understanding of subjects reactions to treatments. In this work a preliminary evaluation of an innovative social robot-based treatment for subjects with ASD is described. The treatment consists in a complex stimulation and acquisition platform composed of a social robot, a multi-parametric acquisition system and a therapeutic protocol. During the preliminary tests of the treatment the subject's physiological signals and behavioral parameters have been recorded and used together with the therapists' annotations to infer the subjects' induced reactions. Physiological signals were analyzed and statistically evaluated demonstrating the possibility to correctly discern the two groups (ASD and normally developing subjects) with a classification percentage higher than 92%. Statistical analysis also highlighted the treatment capability to induce different affective states in subjects with ASDs more than in control subjects, demonstrating that the treatment is well designed and tuned on ASDs deficits and behavioral lacks.", "fno": "06406352", "keywords": [ "Handicapped Aids", "Humanoid Robots", "Human Robot Interaction", "Medical Robotics", "Neurophysiology", "Patient Treatment", "Robot Vision", "Social Sciences Computing", "Statistical Analysis", "Robotic Social Therapy", "Children With Autism", "Multiparametric Analysis", "Autism Spectrum Disorder", "ASD", "Neural Development Disorder", "Behavioral Difficulties", "Social Difficulties", "Gender Differences Identification", "Interactional Distortions", "Environmental Responses", "Family Responses", "Emotional Problems", "Behavioral Problems", "Social Capabilities Improvement", "Human Like Robots", "Social Capabilities", "Emotional Capabilities", "Innovative Social Robot Based Treatment", "Multiparametric Acquisition System", "Therapeutic Protocol", "Physiological Signals", "Statistical Analysis", "Variable Speed Drives", "Face", "Protocols", "Feature Extraction", "Physiology", "Humanoid Robots", "Autism Spectrum Disorder", "Social Robot", "Human Robot Interaction", "Statistics", "Pattern Recognition", "Scene Analysis", "Gesture Recognition", "Physiological Signals" ], "authors": [ { "affiliation": null, "fullName": "Daniele Mazzei", "givenName": "Daniele", "surname": "Mazzei", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alberto Greco", "givenName": "Alberto", "surname": "Greco", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nicole Lazzeri", "givenName": "Nicole", "surname": "Lazzeri", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Abolfazl Zaraki", "givenName": "Abolfazl", "surname": "Zaraki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio Lanatà", "givenName": "Antonio", "surname": "Lanatà", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roberta Igliozzi", "givenName": "Roberta", "surname": "Igliozzi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alice Mancini", "givenName": "Alice", "surname": "Mancini", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Francesca Stoppa", "givenName": "Francesca", "surname": "Stoppa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Enzo Pasquale Scilingo", "givenName": "Enzo Pasquale", "surname": "Scilingo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Filippo Muratori", "givenName": "Filippo", "surname": "Muratori", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Danilo De Rossi", "givenName": "Danilo", "surname": "De Rossi", "__typename": "ArticleAuthorType" } ], "idPrefix": "passat-socialcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "955-960", "year": "2012", "issn": null, "isbn": "978-1-4673-5638-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06406351", "articleId": "12OmNzZWbF1", "__typename": "AdjacentArticleType" }, "next": { "fno": "06406353", "articleId": "12OmNyqzM4c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726798", "title": "Considerations in Autism therapy using robotics", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726798/12OmNvm6VGY", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406398", "title": "Robotic Social Therapy on Children with Autism: Preliminary Evaluation through Multi-parametric Analysis", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406398/12OmNxxvAI5", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a630", "title": "Application of Reconstructed Phase Space in Autism Intervention", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a630/1cYiwZcclRm", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925474/1fHGE1f2lNe", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b181", "title": "Attention-Based Autism Spectrum Disorder Screening With Privileged Modality", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b181/1hVleV0Wije", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204125", "title": "Augmented reality for children with Autism Spectrum Disorder - A systematic review", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204125/1nmi7vlqm9q", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313278", "title": "Predicting eye movement and fixation patterns on scenic images using Machine Learning for Children with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313278/1qmg2QvsNK8", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipT", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "acronym": "dasc-picom-datacom-cyberscitech", "groupId": "1001364", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45Wuc374", "doi": "10.1109/DASC-PICom-DataCom-CyberSciTec.2017.62", "title": "Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism", "normalizedTitle": "Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism", "abstract": "Even though avatar-based virtual reality systems have been used to improve social skills of children and adolescents with Autism Spectrum Disorder (ASD), such systems do not address the fundamental emotional and social needs of children. In this paper, we propose a virtual life coaching system called Buddy to address this unmet need. The system aims to reduce the financial cost of autism care, and promises to significantly improve the emotion and mental state of children and adolescents with ASD. Different from other systems, we propose that the life coaching materials be aligned closely with the intense interests of individuals with ASD. This could be essential for the usability and effectiveness of the virtual life coaching system. Such a system would be better in engaging children and adolescents with ASD and in winning their trust for long-term use.", "abstracts": [ { "abstractType": "Regular", "content": "Even though avatar-based virtual reality systems have been used to improve social skills of children and adolescents with Autism Spectrum Disorder (ASD), such systems do not address the fundamental emotional and social needs of children. In this paper, we propose a virtual life coaching system called Buddy to address this unmet need. The system aims to reduce the financial cost of autism care, and promises to significantly improve the emotion and mental state of children and adolescents with ASD. Different from other systems, we propose that the life coaching materials be aligned closely with the intense interests of individuals with ASD. This could be essential for the usability and effectiveness of the virtual life coaching system. Such a system would be better in engaging children and adolescents with ASD and in winning their trust for long-term use.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Even though avatar-based virtual reality systems have been used to improve social skills of children and adolescents with Autism Spectrum Disorder (ASD), such systems do not address the fundamental emotional and social needs of children. In this paper, we propose a virtual life coaching system called Buddy to address this unmet need. The system aims to reduce the financial cost of autism care, and promises to significantly improve the emotion and mental state of children and adolescents with ASD. Different from other systems, we propose that the life coaching materials be aligned closely with the intense interests of individuals with ASD. This could be essential for the usability and effectiveness of the virtual life coaching system. Such a system would be better in engaging children and adolescents with ASD and in winning their trust for long-term use.", "fno": "08328405", "keywords": [ "Avatars", "Handicapped Aids", "Medical Disorders", "Virtual Life Coaching System", "Adolescents", "High Functioning Autism", "Avatar Based Virtual Reality Systems", "Autism Spectrum Disorder", "ASD", "Life Coaching Materials", "Children", "Buddy", "Autism Care", "Autism", "Avatars", "Sensors", "Biomedical Monitoring", "Training", "Monitoring", "Emotion Recognition", "Autism Spectrum Disorder", "Virtual Reality", "Avatars", "Affective Computing", "Emotion Recognition" ], "authors": [ { "affiliation": null, "fullName": "Xiongyi Liu", "givenName": "Xiongyi", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wenbing Zhao", "givenName": "Wenbing", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "dasc-picom-datacom-cyberscitech", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "293-298", "year": "2017", "issn": null, "isbn": "978-1-5386-1956-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08328404", "articleId": "17D45XDIXTH", "__typename": "AdjacentArticleType" }, "next": { "fno": "08328406", "articleId": "17D45XwUAKY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504695", "title": "Multimodal adaptive social interaction in virtual environment (MASI-VR) for children with Autism spectrum disorders (ASD)", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504695/12OmNwBT1na", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2013/0820/0/06632634", "title": "Autism Spectrum Disorder children interaction skills measurement using computer games", "doi": null, "abstractUrl": "/proceedings-article/cgames/2013/06632634/12OmNwswg44", "parentPublication": { "id": "proceedings/cgames/2013/0820/0", "title": "2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a299", "title": "Avatarizing Children with Autism Spectrum Disorder into Serious Games for Social Communication Skill Intervention", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a299/1AFsrorE4A8", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798032", "title": "Teachers' Views on how to use Virtual Reality to Instruct Children and Adolescents Diagnosed with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798032/1cJ0YBL70AM", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2020/02/08998323", "title": "Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder", "doi": null, "abstractUrl": "/magazine/co/2020/02/08998323/1hrH6aow132", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a761", "title": "Developing Computational Thinking for Children with Autism using a Serious Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a761/1rSRclkCpzO", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a050", "title": "A Collaborative Virtual Reality Supermarket Training Application to Teach Shopping Skills to Young Individuals with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a050/1tnXsKvd5vy", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0YBL70AM", "doi": "10.1109/VR.2019.8798032", "title": "Teachers' Views on how to use Virtual Reality to Instruct Children and Adolescents Diagnosed with Autism Spectrum Disorder", "normalizedTitle": "Teachers' Views on how to use Virtual Reality to Instruct Children and Adolescents Diagnosed with Autism Spectrum Disorder", "abstract": "Virtual Reality (VR) technologies are becoming more and more adopted for treatment of mental health, especially due to the availability of low cost and usable hardware and software solutions. In this paper we present the views of three teachers on how to use VR to instruct children and adolescents diagnosed with Autism Spectrum Disorder (ASD). All three teachers work with students diagnosed with ASD on a daily basis. Three categories of skills that would benefit from being taught using VR emerged from the discussion with the teachers: everyday living skills, social skills, and academic skills. Skills within these categories as well as some of the main advantages of VR according to the teachers are discussed in this paper.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual Reality (VR) technologies are becoming more and more adopted for treatment of mental health, especially due to the availability of low cost and usable hardware and software solutions. In this paper we present the views of three teachers on how to use VR to instruct children and adolescents diagnosed with Autism Spectrum Disorder (ASD). All three teachers work with students diagnosed with ASD on a daily basis. Three categories of skills that would benefit from being taught using VR emerged from the discussion with the teachers: everyday living skills, social skills, and academic skills. Skills within these categories as well as some of the main advantages of VR according to the teachers are discussed in this paper.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual Reality (VR) technologies are becoming more and more adopted for treatment of mental health, especially due to the availability of low cost and usable hardware and software solutions. In this paper we present the views of three teachers on how to use VR to instruct children and adolescents diagnosed with Autism Spectrum Disorder (ASD). All three teachers work with students diagnosed with ASD on a daily basis. Three categories of skills that would benefit from being taught using VR emerged from the discussion with the teachers: everyday living skills, social skills, and academic skills. Skills within these categories as well as some of the main advantages of VR according to the teachers are discussed in this paper.", "fno": "08798032", "keywords": [ "Biomedical Education", "Computer Aided Instruction", "Handicapped Aids", "Medical Computing", "Medical Disorders", "Patient Treatment", "Virtual Reality", "Teachers", "VR", "Mental Health", "Usable Hardware", "Software Solutions", "ASD", "Everyday Living Skills", "Social Skills", "Academic Skills", "Autism Spectrum Disorder", "Adolescents Diagnosis", "Virtual Reality Technologies", "Resists", "Variable Speed Drives", "Education", "Avatars", "Virtual Environments", "Autism", "K 3 2 Learning Knowledge Acquisition", "K 3 1 Computer Uses In Education", "Computer Assisted Instruction CAI H 5 2 User Centered Design I 3 7 I 3 7 Three Dimensional Graphic And Realism Virtual Reality" ], "authors": [ { "affiliation": "Multisensory Experience Lab Aalborg, University Copenhagen", "fullName": "Ali Adjorlu", "givenName": "Ali", "surname": "Adjorlu", "__typename": "ArticleAuthorType" }, { "affiliation": "Multisensory Experience Lab Aalborg, University Copenhagen", "fullName": "Stefania Serafin", "givenName": "Stefania", "surname": "Serafin", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1439-1442", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08797729", "articleId": "1cJ0R5bFWRW", "__typename": "AdjacentArticleType" }, "next": { "fno": "08797805", "articleId": "1cJ13iaKgve", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2013/5089/0/5089a484", "title": "Can NAO Robot Improve Eye-Gaze Attention of Children with High Functioning Autism?", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a484/12OmNAoDifg", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732559", "title": "An evaluation of identification of suspected autism spectrum disorder (ASD) cases in early intervention (EI) records", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732559/12OmNvT2oJ3", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a606", "title": "VLSS -- Virtual Learning and Social Stories for Children with Autism", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a606/12OmNwCJOQ9", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a294", "title": "Daily Living Skills Training in Virtual Reality to Help Children with Autism Spectrum Disorder in a Real Shopping Scenario", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a294/12OmNx3Zj9Y", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344621", "title": "Cognitive state measurement from eye gaze analysis in an intelligent virtual reality driving system for autism intervention", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344621/12OmNyfdOR4", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328405", "title": "Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328405/17D45Wuc374", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10024337", "title": "Computer-Aided Autism Spectrum Disorder Diagnosis With Behavior Signal Processing", "doi": null, "abstractUrl": "/journal/ta/5555/01/10024337/1KaB0oT2ziU", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2020/02/08998323", "title": "Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder", "doi": null, "abstractUrl": "/magazine/co/2020/02/08998323/1hrH6aow132", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204125", "title": "Augmented reality for children with Autism Spectrum Disorder - A systematic review", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204125/1nmi7vlqm9q", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1bwKL9IvjX2", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "acronym": "compsac", "groupId": "1000143", "volume": "1", "displayVolume": "1", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cYiwZcclRm", "doi": "10.1109/COMPSAC.2019.00096", "title": "Application of Reconstructed Phase Space in Autism Intervention", "normalizedTitle": "Application of Reconstructed Phase Space in Autism Intervention", "abstract": "ASD (Autism Spectrum Disorder) is a physiological condition that inhibits individuals from functioning in society. Such individuals suffer from high anxiety levels. This leads to both verbal and non-verbal communicative impairments and impedes self-expression. While there is no cure, there are structured interventions that teach children with ASD to cope with anxiety and function in society. However, these interventions do not account for the variability within the population with ASD. As a consequence, certain interventions fail to make a meaningful impact and, in certain scenarios, prove to be detrimental to the mental health of the participant. While there are screening measures, such as surveys conducted to avoid such circumstances, their effectiveness in identifying prospective successful candidates is poor. In this paper we propose a data driven intervention screening method that would enable Autism clinics to screen individuals most likely to benefit from the intervention and, more importantly, identify individuals that would be negatively affected.", "abstracts": [ { "abstractType": "Regular", "content": "ASD (Autism Spectrum Disorder) is a physiological condition that inhibits individuals from functioning in society. Such individuals suffer from high anxiety levels. This leads to both verbal and non-verbal communicative impairments and impedes self-expression. While there is no cure, there are structured interventions that teach children with ASD to cope with anxiety and function in society. However, these interventions do not account for the variability within the population with ASD. As a consequence, certain interventions fail to make a meaningful impact and, in certain scenarios, prove to be detrimental to the mental health of the participant. While there are screening measures, such as surveys conducted to avoid such circumstances, their effectiveness in identifying prospective successful candidates is poor. In this paper we propose a data driven intervention screening method that would enable Autism clinics to screen individuals most likely to benefit from the intervention and, more importantly, identify individuals that would be negatively affected.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "ASD (Autism Spectrum Disorder) is a physiological condition that inhibits individuals from functioning in society. Such individuals suffer from high anxiety levels. This leads to both verbal and non-verbal communicative impairments and impedes self-expression. While there is no cure, there are structured interventions that teach children with ASD to cope with anxiety and function in society. However, these interventions do not account for the variability within the population with ASD. As a consequence, certain interventions fail to make a meaningful impact and, in certain scenarios, prove to be detrimental to the mental health of the participant. While there are screening measures, such as surveys conducted to avoid such circumstances, their effectiveness in identifying prospective successful candidates is poor. In this paper we propose a data driven intervention screening method that would enable Autism clinics to screen individuals most likely to benefit from the intervention and, more importantly, identify individuals that would be negatively affected.", "fno": "260701a630", "keywords": [ "Medical Disorders", "Neurophysiology", "Psychology", "Teaching", "Mental Health", "Nonverbal Communicative Impairments", "High Anxiety Levels", "Physiological Condition", "Autism Spectrum Disorder", "Autism Intervention", "Reconstructed Phase Space", "Autism Clinics", "Data Driven Intervention Screening Method", "ASD", "Autism", "Physiology", "Pediatrics", "Statistics", "Sociology", "Medical Treatment", "Variable Speed Drives", "Affective Computing", "Computational Interventions", "Autism Spectrum Disorder", "ASD", "Machine Learning", "Reconstructed Phase Space", "Time Embedded Delay" ], "authors": [ { "affiliation": "Direct Supply", "fullName": "Piyush Saxena", "givenName": "Piyush", "surname": "Saxena", "__typename": "ArticleAuthorType" }, { "affiliation": "Marquette University", "fullName": "Devansh Saxena", "givenName": "Devansh", "surname": "Saxena", "__typename": "ArticleAuthorType" }, { "affiliation": "Direct Supply", "fullName": "Xiao Nie", "givenName": "Xiao", "surname": "Nie", "__typename": "ArticleAuthorType" }, { "affiliation": "Direct Supply", "fullName": "Aaron Helmers", "givenName": "Aaron", "surname": "Helmers", "__typename": "ArticleAuthorType" }, { "affiliation": "Direct Supply", "fullName": "Nithin Ramachandran", "givenName": "Nithin", "surname": "Ramachandran", "__typename": "ArticleAuthorType" }, { "affiliation": "Marquette University", "fullName": "Alana McVey", "givenName": "Alana", "surname": "McVey", "__typename": "ArticleAuthorType" }, { "affiliation": "Marquette University", "fullName": "Amy VanHecke", "givenName": "Amy", "surname": "VanHecke", "__typename": "ArticleAuthorType" }, { "affiliation": "Marquette University", "fullName": "Sheikh Ahamed", "givenName": "Sheikh", "surname": "Ahamed", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "630-637", "year": "2019", "issn": "0730-3157", "isbn": "978-1-7281-2607-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "260701a129", "articleId": "1cYizEsqQ6c", "__typename": "AdjacentArticleType" }, "next": { "fno": "260701a139", "articleId": "1cYiwDT9cv6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2013/0015/0/06607615", "title": "Analysis of psycholinguistic processes and topics in online autism communities", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607615/12OmNAFFdIw", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344544", "title": "Potential clinical impact of positive affect in robot interactions for autism intervention", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344544/12OmNAIvcYw", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732559", "title": "An evaluation of identification of suspected autism spectrum disorder (ASD) cases in early intervention (EI) records", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732559/12OmNvT2oJ3", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2013/3926/0/06726798", "title": "Considerations in Autism therapy using robotics", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2013/06726798/12OmNvm6VGY", "parentPublication": { "id": "proceedings/icccnt/2013/3926/0", "title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344621", "title": "Cognitive state measurement from eye gaze analysis in an intelligent virtual reality driving system for autism intervention", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344621/12OmNyfdOR4", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/02/07495013", "title": "Cognitive Load Measurement in a Virtual Reality-Based Driving System for Autism Intervention", "doi": null, "abstractUrl": "/journal/ta/2017/02/07495013/13rRUwhpBMP", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2015/04/mmu2015040004", "title": "Integrating Multimedia into Autism Intervention", "doi": null, "abstractUrl": "/magazine/mu/2015/04/mmu2015040004/13rRUxYrbIN", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925474/1fHGE1f2lNe", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a243", "title": "Augmented Reality and Autism Spectrum Disorder Rehabilitation: Scoping review", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a243/1qpzAvoH5K0", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHGzrmKhCU", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHGE1f2lNe", "doi": "10.1109/ACII.2019.8925474", "title": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "normalizedTitle": "Computational Modeling of Psycho-physiological Arousal and Social Initiation of children with Autism in Interventions through Full-Body Interaction", "abstract": "This study is part of a larger project that wants to foster social initiation behaviors in children with Autism Spectrum Disorder (ASD). We approach this through a full-body interactive Mixed Reality (MR) experience that mediates a face-to-face play session between an ASD child and a non-ASD child. The goal of this study is to obtain a data model that allows us to evaluate the goodness of the MR system compared to a typical social intervention strategy based on construction tools (in this case LEGO bricks) which acts as the control condition. In this paper we present our first analysis of the arousal generated by the MR experience compared to that generated in the control condition. We address this by analyzing psychophysiological data recorded during the social interaction behaviors in the ASD child while playing with the non-ASD child. We followed a repeated-measures design with two conditions: our full-body interaction MR environment and the typical social intervention strategy based on LEGO bricks. To measure physiology, Electrocardiogram (ECG), Electrodermal Activity (EDA) and Accelerometer (ACC) data were acquired through a wearable designed by our lab. We used machine learning techniques to analyze the huge amount of multimodal data from the ASD children obtained during 18 trials (3 female and 15 male). As a result, we were capable of classifying social initiation behaviors of ASD children during the MR environment sessions and those occurring during the LEGO construction sessions based on the psycho-physiological data sources. This is a first sign showing that our MR system has specific properties, compared to a traditional construction-based intervention, which potentially provide a new interesting context to intervention in ASD.", "abstracts": [ { "abstractType": "Regular", "content": "This study is part of a larger project that wants to foster social initiation behaviors in children with Autism Spectrum Disorder (ASD). We approach this through a full-body interactive Mixed Reality (MR) experience that mediates a face-to-face play session between an ASD child and a non-ASD child. The goal of this study is to obtain a data model that allows us to evaluate the goodness of the MR system compared to a typical social intervention strategy based on construction tools (in this case LEGO bricks) which acts as the control condition. In this paper we present our first analysis of the arousal generated by the MR experience compared to that generated in the control condition. We address this by analyzing psychophysiological data recorded during the social interaction behaviors in the ASD child while playing with the non-ASD child. We followed a repeated-measures design with two conditions: our full-body interaction MR environment and the typical social intervention strategy based on LEGO bricks. To measure physiology, Electrocardiogram (ECG), Electrodermal Activity (EDA) and Accelerometer (ACC) data were acquired through a wearable designed by our lab. We used machine learning techniques to analyze the huge amount of multimodal data from the ASD children obtained during 18 trials (3 female and 15 male). As a result, we were capable of classifying social initiation behaviors of ASD children during the MR environment sessions and those occurring during the LEGO construction sessions based on the psycho-physiological data sources. This is a first sign showing that our MR system has specific properties, compared to a traditional construction-based intervention, which potentially provide a new interesting context to intervention in ASD.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study is part of a larger project that wants to foster social initiation behaviors in children with Autism Spectrum Disorder (ASD). We approach this through a full-body interactive Mixed Reality (MR) experience that mediates a face-to-face play session between an ASD child and a non-ASD child. The goal of this study is to obtain a data model that allows us to evaluate the goodness of the MR system compared to a typical social intervention strategy based on construction tools (in this case LEGO bricks) which acts as the control condition. In this paper we present our first analysis of the arousal generated by the MR experience compared to that generated in the control condition. We address this by analyzing psychophysiological data recorded during the social interaction behaviors in the ASD child while playing with the non-ASD child. We followed a repeated-measures design with two conditions: our full-body interaction MR environment and the typical social intervention strategy based on LEGO bricks. To measure physiology, Electrocardiogram (ECG), Electrodermal Activity (EDA) and Accelerometer (ACC) data were acquired through a wearable designed by our lab. We used machine learning techniques to analyze the huge amount of multimodal data from the ASD children obtained during 18 trials (3 female and 15 male). As a result, we were capable of classifying social initiation behaviors of ASD children during the MR environment sessions and those occurring during the LEGO construction sessions based on the psycho-physiological data sources. This is a first sign showing that our MR system has specific properties, compared to a traditional construction-based intervention, which potentially provide a new interesting context to intervention in ASD.", "fno": "08925474", "keywords": [ "Variable Speed Drives", "Virtual Reality", "Pediatrics", "Physiology", "Electrodes", "Autism", "Electrocardiography", "Autism Spectrum Condition", "Mixed Reality", "Embodied Interaction", "Social Initiation", "Arousal", "Psychophysiology", "Computational Modeling" ], "authors": [ { "affiliation": "Universitat Pompeu Fabra Barcelona,Department of Information and Communication Technologies,Barcelona,Spain", "fullName": "Batuhan Sayis", "givenName": "Batuhan", "surname": "Sayis", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitat Pompeu Fabra Barcelona,Department of Information and Communication Technologies,Barcelona,Spain", "fullName": "Ciera Crowell", "givenName": "Ciera", "surname": "Crowell", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitat Pompeu Fabra Barcelona,Department of Information and Communication Technologies,Barcelona,Spain", "fullName": "Juan Benitez", "givenName": "Juan", "surname": "Benitez", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitat Pompeu Fabra Barcelona,Department of Information and Communication Technologies,Barcelona,Spain", "fullName": "Rafael Ramirez", "givenName": "Rafael", "surname": "Ramirez", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitat Pompeu Fabra Barcelona,Department of Information and Communication Technologies,Barcelona,Spain", "fullName": "Narcis Pares", "givenName": "Narcis", "surname": "Pares", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "573-579", "year": "2019", "issn": null, "isbn": "978-1-7281-3888-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08925458", "articleId": "1fHGIJU2Ezm", "__typename": "AdjacentArticleType" }, "next": { "fno": "08925440", "articleId": "1fHGAVC5XsQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504695", "title": "Multimodal adaptive social interaction in virtual environment (MASI-VR) for children with Autism spectrum disorders (ASD)", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504695/12OmNwBT1na", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a368", "title": "Familiar Video Stories as a Means for Children with Autism: An Analytics Approach", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a368/12OmNyeECsx", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040711", "title": "Understanding How Adolescents with Autism Respond to Facial Expressions in Virtual Reality Environments", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040711/13rRUwcAqqf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2017/02/07495013", "title": "Cognitive Load Measurement in a Virtual Reality-Based Driving System for Autism Intervention", "doi": null, "abstractUrl": "/journal/ta/2017/02/07495013/13rRUwhpBMP", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2020/04/08326711", "title": "Physiological Detection of Affective States in Children with Autism Spectrum Disorder", "doi": null, "abstractUrl": "/journal/ta/2020/04/08326711/13rRUyYBlfe", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258388", "title": "Predicting efficacy of therapeutic services for autism spectrum disorder using scientific workflows", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258388/17D45Xh13u8", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2021/2757/0/275700a299", "title": "Avatarizing Children with Autism Spectrum Disorder into Serious Games for Social Communication Skill Intervention", "doi": null, "abstractUrl": "/proceedings-article/eitt/2021/275700a299/1AFsrorE4A8", "parentPublication": { "id": "proceedings/eitt/2021/2757/0", "title": "2021 Tenth International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a598", "title": "Application of Artificial Intelligence in Clinical Diagnosis of Children with Autism Spectrum Disorders", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a598/1BQiCDoeSis", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a630", "title": "Application of Reconstructed Phase Space in Autism Intervention", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a630/1cYiwZcclRm", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2020/02/08998323", "title": "Virtual Avatar-Based Life Coaching for Children With Autism Spectrum Disorder", "doi": null, "abstractUrl": "/magazine/co/2020/02/08998323/1hrH6aow132", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqA", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "acronym": "scivis", "groupId": "1811924", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNx6Piuq", "doi": "10.1109/SciVis.2015.7429483", "title": "VIS capstone address: Architectures physical and digital", "normalizedTitle": "VIS capstone address: Architectures physical and digital", "abstract": "How do computer architectures and physical architectures inform each other? This talk will explore the interconnection of data and visualization through an architectural and computational lens over the last 50 years, including the work of Steven Coons, Christopher Alexander, Richard Saul Wurman and others.", "abstracts": [ { "abstractType": "Regular", "content": "How do computer architectures and physical architectures inform each other? This talk will explore the interconnection of data and visualization through an architectural and computational lens over the last 50 years, including the work of Steven Coons, Christopher Alexander, Richard Saul Wurman and others.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "How do computer architectures and physical architectures inform each other? This talk will explore the interconnection of data and visualization through an architectural and computational lens over the last 50 years, including the work of Steven Coons, Christopher Alexander, Richard Saul Wurman and others.", "fno": "07429483", "keywords": [], "authors": [ { "affiliation": "Carnegie Mellon", "fullName": "Molly Wright Steenson", "givenName": "Molly Wright", "surname": "Steenson", "__typename": "ArticleAuthorType" } ], "idPrefix": "scivis", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2015", "issn": null, "isbn": "978-1-4673-9785-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07429482", "articleId": "12OmNBA9oye", "__typename": "AdjacentArticleType" }, "next": { "fno": "07429484", "articleId": "12OmNzcPAsS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwB2dUd", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "acronym": "3dui", "groupId": "1001623", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzt0IxZ", "doi": "10.1109/3DUI.2016.7460022", "title": "Keynote speaker: Getting real", "normalizedTitle": "Keynote speaker: Getting real", "abstract": "Wide-FOV, 6DOF-tracked, consumer head-worn displays are no longer just dev kits, bimanual 3D input devices can be found at Best Buy, and full-fledged graphics packages are built into web browsers. Meanwhile, augmented reality is poised to make the return trip from hand-held phones and tablets, back to the head-worn displays in which it was born. 3D is here for real. Yet, we all know how difficult it is to create effective 3D user interfaces. In this talk, I will discuss my thoughts about why this is so, and what we can do about it. I will present some of the research directions that my lab has been exploring, and suggest where I think our field may be headed next.", "abstracts": [ { "abstractType": "Regular", "content": "Wide-FOV, 6DOF-tracked, consumer head-worn displays are no longer just dev kits, bimanual 3D input devices can be found at Best Buy, and full-fledged graphics packages are built into web browsers. Meanwhile, augmented reality is poised to make the return trip from hand-held phones and tablets, back to the head-worn displays in which it was born. 3D is here for real. Yet, we all know how difficult it is to create effective 3D user interfaces. In this talk, I will discuss my thoughts about why this is so, and what we can do about it. I will present some of the research directions that my lab has been exploring, and suggest where I think our field may be headed next.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Wide-FOV, 6DOF-tracked, consumer head-worn displays are no longer just dev kits, bimanual 3D input devices can be found at Best Buy, and full-fledged graphics packages are built into web browsers. Meanwhile, augmented reality is poised to make the return trip from hand-held phones and tablets, back to the head-worn displays in which it was born. 3D is here for real. Yet, we all know how difficult it is to create effective 3D user interfaces. In this talk, I will discuss my thoughts about why this is so, and what we can do about it. I will present some of the research directions that my lab has been exploring, and suggest where I think our field may be headed next.", "fno": "07460022", "keywords": [], "authors": [ { "affiliation": "Computer Graphics And User Interfaces Lab, Columbia University", "fullName": "Steven K. Feiner", "givenName": "Steven K.", "surname": "Feiner", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dui", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2016-03-01T00:00:00", "pubType": "proceedings", "pages": "xi-xi", "year": "2016", "issn": null, "isbn": "978-1-5090-0842-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07460021", "articleId": "12OmNx4yvqr", "__typename": "AdjacentArticleType" }, "next": { "fno": "07460023", "articleId": "12OmNBr4eHb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1cJ6WsGCn96", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1cJ6WL6h2iA", "doi": "10.1109/VAST.2018.8802482", "title": "VIS Capstone Address: Can I believe what I see?-Information theoretic algorithm validation", "normalizedTitle": "VIS Capstone Address: Can I believe what I see?-Information theoretic algorithm validation", "abstract": "Data Science promises us a methodology and algorithms to gain insights in ubiquitous Big Data. Sophisticated algorithmic techniques seek to identify and visualize non-accidental patterns that may be (causally) linked to mechanisms in the natural sciences, but also in the social sciences, medicine, technology, and governance. When we use machine learning algorithms to inspect the often high-dimensional, uncertain, and high-volume data to filter out and visualize relevant information, we aim to abstract from accidental factors in our experiments and thereby generalize over data fluctuations. Doing this, we often rely on highly nonlinear algorithms. This talk presents arguments advocating an information theoretic framework for algorithm analysis, where an algorithm is characterized as a computational evolution of a posterior distribution on the output space with a quantitative stopping criterion. The method allows us to investigate complex data analysis pipelines, such as those found in computational neuroscience, neurology, and molecular biology. I will demonstrate this concept for the validation of algorithms using the example of a statistical analysis of diffusion tensor imaging data. In addition, on the example of gene expression data, I will demonstrate how different spectral clustering methods can be validated by showing their robustness to data fluctuations and yet sufficient sensitivity to changes in the data. All in all, an information-theoretical method is presented for validating data analysis algorithms, offering the potential of more trustful results in Visual Analytics.", "abstracts": [ { "abstractType": "Regular", "content": "Data Science promises us a methodology and algorithms to gain insights in ubiquitous Big Data. Sophisticated algorithmic techniques seek to identify and visualize non-accidental patterns that may be (causally) linked to mechanisms in the natural sciences, but also in the social sciences, medicine, technology, and governance. When we use machine learning algorithms to inspect the often high-dimensional, uncertain, and high-volume data to filter out and visualize relevant information, we aim to abstract from accidental factors in our experiments and thereby generalize over data fluctuations. Doing this, we often rely on highly nonlinear algorithms. This talk presents arguments advocating an information theoretic framework for algorithm analysis, where an algorithm is characterized as a computational evolution of a posterior distribution on the output space with a quantitative stopping criterion. The method allows us to investigate complex data analysis pipelines, such as those found in computational neuroscience, neurology, and molecular biology. I will demonstrate this concept for the validation of algorithms using the example of a statistical analysis of diffusion tensor imaging data. In addition, on the example of gene expression data, I will demonstrate how different spectral clustering methods can be validated by showing their robustness to data fluctuations and yet sufficient sensitivity to changes in the data. All in all, an information-theoretical method is presented for validating data analysis algorithms, offering the potential of more trustful results in Visual Analytics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data Science promises us a methodology and algorithms to gain insights in ubiquitous Big Data. Sophisticated algorithmic techniques seek to identify and visualize non-accidental patterns that may be (causally) linked to mechanisms in the natural sciences, but also in the social sciences, medicine, technology, and governance. When we use machine learning algorithms to inspect the often high-dimensional, uncertain, and high-volume data to filter out and visualize relevant information, we aim to abstract from accidental factors in our experiments and thereby generalize over data fluctuations. Doing this, we often rely on highly nonlinear algorithms. This talk presents arguments advocating an information theoretic framework for algorithm analysis, where an algorithm is characterized as a computational evolution of a posterior distribution on the output space with a quantitative stopping criterion. The method allows us to investigate complex data analysis pipelines, such as those found in computational neuroscience, neurology, and molecular biology. I will demonstrate this concept for the validation of algorithms using the example of a statistical analysis of diffusion tensor imaging data. In addition, on the example of gene expression data, I will demonstrate how different spectral clustering methods can be validated by showing their robustness to data fluctuations and yet sufficient sensitivity to changes in the data. All in all, an information-theoretical method is presented for validating data analysis algorithms, offering the potential of more trustful results in Visual Analytics.", "fno": "08802482", "keywords": [ "Big Data", "Biodiffusion", "Biology Computing", "Biomedical MRI", "Data Analysis", "Data Visualisation", "Genetics", "Learning Artificial Intelligence", "Medical Computing", "Medical Image Processing", "Neurophysiology", "Pattern Clustering", "Statistical Analysis", "Information Theoretic Algorithm Validation", "Data Science", "Ubiquitous Big Data", "Sophisticated Algorithmic Techniques", "Nonaccidental Patterns", "Natural Sciences", "Social Sciences", "High Volume Data", "Accidental Factors", "Data Fluctuations", "Highly Nonlinear Algorithms", "Information Theoretic Framework", "Algorithm Analysis", "Computational Evolution", "Quantitative Stopping Criterion", "Complex Data Analysis Pipelines", "Computational Neuroscience", "Statistical Analysis", "Gene Expression Data", "Different Spectral Clustering Methods", "Information Theoretical Method", "Data Analysis Algorithms", "Visual Analytics", "VIS Capstone", "Signal Processing Algorithms", "Machine Learning Algorithms", "Pattern Recognition", "Neuroscience", "Machine Learning", "Data Visualization", "Data Analysis" ], "authors": [ { "affiliation": "ETH Zurich", "fullName": "Joachim M. Buhmann", "givenName": "Joachim M.", "surname": "Buhmann", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2018", "issn": null, "isbn": "978-1-5386-6861-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08802427", "articleId": "1cJ6YTM2KGc", "__typename": "AdjacentArticleType" }, "next": { "fno": "08802449", "articleId": "1cJ6X5kCs5G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2012/4905/0/4905z030", "title": "Tutorial i: Outlier detection in high dimensional data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905z030/12OmNyuPLek", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2016/01/07448389", "title": "AlgorithmSeer: A System for Extracting and Searching for Algorithms in Scholarly Big Data", "doi": null, "abstractUrl": "/journal/bd/2016/01/07448389/13rRUx0Pquv", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0/08328539", "title": "An Online-Offline Combined Big Data Mining Platform", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2017/08328539/17D45Wc1IJY", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2017/1956/0", "title": "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258276", "title": "Using machine learning methods to identify atrocity perpetrators", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258276/17D45XreC7M", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/10/08700263", "title": "Automatic Classification of Algorithm Citation Functions in Scientific Literature", "doi": null, "abstractUrl": "/journal/tk/2020/10/08700263/19xNoWg5fUs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/09721661", "title": "SpongeTraining: Achieving High Efficiency and Accuracy for Wireless Edge-assisted Online Distributed Learning", "doi": null, "abstractUrl": "/journal/tm/5555/01/09721661/1BhyVsWGxLa", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2019/2284/0/08986953", "title": "VIS Capstone Address: Visualizing Temporality and Chronologies for the Humanities", "doi": null, "abstractUrl": "/proceedings-article/vast/2019/08986953/1ifhkTytY9a", "parentPublication": { "id": "proceedings/vast/2019/2284/0", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a308", "title": "You see a set of wagons - I see one train: Towards a unified view of local and global arbitrarily oriented subspace clusters", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a308/1rgGmUj67i8", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2020/9638/0/963800a455", "title": "A comprehensive training platform integrating Computing Science and AI", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2020/963800a455/1rxhvJElnBS", "parentPublication": { "id": "proceedings/mlbdbi/2020/9638/0", "title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378053", "title": "NeuroKube: An Automated and Autoscaling Neuroimaging Reconstruction Framework using Cloud Native Computing and A.I.", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378053/1s64Rc4v1AY", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m1jvREmZeU", "title": "2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "acronym": "percom-workshops", "groupId": "1000552", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m1jBbaFOes", "doi": "10.1109/PerComWorkshops48775.2020.9156201", "title": "Invited Talk: Software Engineering, AI and autonomous vehicles: Security assurance", "normalizedTitle": "Invited Talk: Software Engineering, AI and autonomous vehicles: Security assurance", "abstract": "In this talk, I will first walk through some real industrial requirements and research challenges in autonomous vehicles. I will then talk about research works which can potentially solve these issues, mainly covering training, testing and anomaly detection for autonomous systems and driver behaviour detection. The talk will be broad but covering some state of the art interesting research questions and directions in autonomous vehicles safety and security assurance, and human vehicle interaction which shall be suitable both for researchers and industry practitioners for in-depth enquiry and collaboration.", "abstracts": [ { "abstractType": "Regular", "content": "In this talk, I will first walk through some real industrial requirements and research challenges in autonomous vehicles. I will then talk about research works which can potentially solve these issues, mainly covering training, testing and anomaly detection for autonomous systems and driver behaviour detection. The talk will be broad but covering some state of the art interesting research questions and directions in autonomous vehicles safety and security assurance, and human vehicle interaction which shall be suitable both for researchers and industry practitioners for in-depth enquiry and collaboration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this talk, I will first walk through some real industrial requirements and research challenges in autonomous vehicles. I will then talk about research works which can potentially solve these issues, mainly covering training, testing and anomaly detection for autonomous systems and driver behaviour detection. The talk will be broad but covering some state of the art interesting research questions and directions in autonomous vehicles safety and security assurance, and human vehicle interaction which shall be suitable both for researchers and industry practitioners for in-depth enquiry and collaboration.", "fno": "09156201", "keywords": [ "Artificial Intelligence", "Human Factors", "Remotely Operated Vehicles", "Software Engineering", "Human Vehicle Interaction", "Autonomous Vehicle Safety", "Autonomous Systems", "Anomaly Detection", "Industrial Requirements", "Security Assurance", "AI", "Autonomous Vehicles", "Software Engineering", "Computer Security", "Industries", "Conferences", "Software Engineering", "AI", "Autonomous Vehicles" ], "authors": [ { "affiliation": "Macquarie University", "fullName": "James Xi Zheng", "givenName": "James Xi", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "percom-workshops", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2020", "issn": null, "isbn": "978-1-7281-4716-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09156241", "articleId": "1m1jD2P4V0c", "__typename": "AdjacentArticleType" }, "next": { "fno": "09156116", "articleId": "1m1jA45U1H2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2018/2290/0/08343130", "title": "Vehicle approaching model for T-junction during transition to autonomous vehicles", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343130/12OmNBghtvX", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/2017/5496/0/07964981", "title": "Deep Learning for Autonomous Vehicles", "doi": null, "abstractUrl": "/proceedings-article/ismvl/2017/07964981/12OmNs59JY9", "parentPublication": { "id": "proceedings/ismvl/2017/5496/0", "title": "2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2017/3486/0/08026631", "title": "[Keynote 1] Internet of vehicles: From intelligent grid to autonomous cars", "doi": null, "abstractUrl": "/proceedings-article/nas/2017/08026631/12OmNxxdZJc", "parentPublication": { "id": "proceedings/nas/2017/3486/0", "title": "2017 International Conference on Networking, Architecture, and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699194", "title": "Comfort Intelligence for Autonomous Vehicles", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699194/19F1NbD5DMs", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2019/9148/0/08767390", "title": "A Study on Behavior of Autonomous Vehicles Cooperating with Manually-Driven Vehicles", "doi": null, "abstractUrl": "/proceedings-article/percom/2019/08767390/1bQzjTKPocg", "parentPublication": { "id": "proceedings/percom/2019/9148/0", "title": "2019 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a507", "title": "The Cloud System of Futuristic Vehicles and Security Policies", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a507/1jdDtUM1HQ4", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2020/9346/0/934600a244", "title": "Mission Assurance for Autonomous Undersea Vehicles", "doi": null, "abstractUrl": "/proceedings-article/spw/2020/934600a244/1pF6UL09Heo", "parentPublication": { "id": "proceedings/spw/2020/9346/0", "title": "2020 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2020/9346/0/934600a240", "title": "Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous Vehicles", "doi": null, "abstractUrl": "/proceedings-article/spw/2020/934600a240/1pF6XaUlzcQ", "parentPublication": { "id": "proceedings/spw/2020/9346/0", "title": "2020 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2021/8924/0/892400a203", "title": "Discovering Research Areas from Patents: A Case Study in Autonomous Vehicles Industry", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2021/892400a203/1rRcgcBmyqc", "parentPublication": { "id": "proceedings/bigcomp/2021/8924/0", "title": "2021 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2021/12/09622307", "title": "Ethics, Safety, and Autonomous Vehicles", "doi": null, "abstractUrl": "/magazine/co/2021/12/09622307/1yEUoBCu3pm", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjQ8X4", "title": "International Workshop on Knowledge Discovery and Data Mining", "acronym": "wkdd", "groupId": "1001622", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNC8uRt7", "doi": "10.1109/WKDD.2008.111", "title": "A New Method Multi-Factor Trend Regression and its Application to Economy Forecast in Jiangxi", "normalizedTitle": "A New Method Multi-Factor Trend Regression and its Application to Economy Forecast in Jiangxi", "abstract": "The principle of a new method called trend regression is introduced and applied to the economy forecast of Jiangxi Province. The method improved previous time series forecasting method in which only self-extension is done and multiple factors (variables) are not taken into consideration. Also, it got over the weakness of forecasting by general regression analysis that relies on simultaneous independent variables. A time series is the function of multiple factors. The values (independent variables) in a period may affect the value (dependent variable) to be predicated in the next period. The nearer the sample time to the predicted time, the more important the sample to the predict value. By shifting the dependent variable to establish models, sequential regression and prediction can be realized. In this way the trend of information can be mined.", "abstracts": [ { "abstractType": "Regular", "content": "The principle of a new method called trend regression is introduced and applied to the economy forecast of Jiangxi Province. The method improved previous time series forecasting method in which only self-extension is done and multiple factors (variables) are not taken into consideration. Also, it got over the weakness of forecasting by general regression analysis that relies on simultaneous independent variables. A time series is the function of multiple factors. The values (independent variables) in a period may affect the value (dependent variable) to be predicated in the next period. The nearer the sample time to the predicted time, the more important the sample to the predict value. By shifting the dependent variable to establish models, sequential regression and prediction can be realized. In this way the trend of information can be mined.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The principle of a new method called trend regression is introduced and applied to the economy forecast of Jiangxi Province. The method improved previous time series forecasting method in which only self-extension is done and multiple factors (variables) are not taken into consideration. Also, it got over the weakness of forecasting by general regression analysis that relies on simultaneous independent variables. A time series is the function of multiple factors. The values (independent variables) in a period may affect the value (dependent variable) to be predicated in the next period. The nearer the sample time to the predicted time, the more important the sample to the predict value. By shifting the dependent variable to establish models, sequential regression and prediction can be realized. In this way the trend of information can be mined.", "fno": "30900063", "keywords": [ "Economics", "Forecasting Theory", "Regression Analysis", "Sequential Estimation", "Time Series", "Multifactor Trend Regression", "Economy Forecast", "Jiangxi Province", "Time Series Forecasting", "Regression Analysis", "Simultaneous Independent Variables", "Sequential Regression", "Economic Forecasting", "Regression Analysis", "Predictive Models", "Linear Regression", "Equations", "Multivariate Regression", "Data Mining", "Application Software", "Educational Institutions", "Data Engineering" ], "authors": [ { "affiliation": "Jimei Univ., Xiamen", "fullName": "Yuechao Ding", "givenName": "Yuechao", "surname": "Ding", "__typename": "ArticleAuthorType" } ], "idPrefix": "wkdd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-01-01T00:00:00", "pubType": "proceedings", "pages": "63-67", "year": "2008", "issn": null, "isbn": "0-7695-3090-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "30900003", "articleId": "12OmNxveNT1", "__typename": "AdjacentArticleType" }, "next": { "fno": "30900010", "articleId": "12OmNBBzody", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icm/2011/4522/1/4522a316", "title": "Short-Term Traffic Flow Combined Forecasting Based on Nonparametric Regression", "doi": null, "abstractUrl": "/proceedings-article/icm/2011/4522a316/12OmNBV9Ifx", "parentPublication": { "id": "icm/2011/4522/1", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270b232", "title": "Combined Forecast of Air Freight Volume Based on Approximate Optimal Non-negative Weight", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270b232/12OmNrkjVpv", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciids/2009/3580/0/3580a336", "title": "Short-Term Load Forecasting Using Support Vector Regression Based on Pattern-Base", "doi": null, "abstractUrl": "/proceedings-article/aciids/2009/3580a336/12OmNwudQMV", "parentPublication": { "id": "proceedings/aciids/2009/3580/0", "title": "Intelligent Information and Database Systems, Asian Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wkdd/2009/3543/0/3543a405", "title": "The Application of Multiple Regression Analysis Forecast in Economical Forecast: The Demand Forecast of Our Country Industry Lavation Machinery in the Year of 2008 and 2009", "doi": null, "abstractUrl": "/proceedings-article/wkdd/2009/3543a405/12OmNxETaaV", "parentPublication": { "id": "proceedings/wkdd/2009/3543/0", "title": "2009 Second International Workshop on Knowledge Discovery and Data Mining. WKDD 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a593", "title": "Sales Forecasting of IT Products Using a Hybrid MARS and SVR Model", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a593/12OmNxVlTLu", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2017/3684/0/3684a263", "title": "Forecast of Yearly Stock Returns Based on Adaboost Integration Algorithm", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2017/3684a263/12OmNy314i9", "parentPublication": { "id": "proceedings/smartcloud/2017/3684/0", "title": "2017 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icecs/2009/3937/0/3937a175", "title": "Wavelet Polynomial Autoregression for Monthly Bigeye Tuna Catches Forecasting", "doi": null, "abstractUrl": "/proceedings-article/icecs/2009/3937a175/12OmNyv7ml8", "parentPublication": { "id": "proceedings/icecs/2009/3937/0", "title": "Environmental and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2012/1365/0/06274793", "title": "Data Mining Algorithms and Statistical Analysis for Sales Data Forecast", "doi": null, "abstractUrl": "/proceedings-article/cso/2012/06274793/12OmNzCF4VS", "parentPublication": { "id": "proceedings/cso/2012/1365/0", "title": "2012 Fifth International Joint Conference on Computational Sciences and Optimization (CSO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/3/05358957", "title": "Combination Forecasting of Fuzzy Forecast", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/05358957/17D45XeKgog", "parentPublication": { "id": "proceedings/fskd/2009/3735/3", "title": "2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194534", "title": "The Short-Term Power Consumption Forecasting Based on the Portrait of Substation Areas", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194534/1n2nlP1U9d6", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirr", "title": "Computer Science and Software Engineering, International Conference on", "acronym": "csse", "groupId": "1002553", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgJe93", "doi": "10.1109/CSSE.2008.1013", "title": "A Case Study on the RCMD Method and Fuzzy C-Regression Models for Mining Regression Classes", "normalizedTitle": "A Case Study on the RCMD Method and Fuzzy C-Regression Models for Mining Regression Classes", "abstract": "It is well known that the classical regression analysis, especially parametric regression analysis, is one of the important methods of extracting information from data sets. A family of regression functions, called fuzzy c-regression models (FCRM), has been presented which can be used to characterize the linear relationship to certain types of mixed data. More generally, an effective and robust method, coined regression class mixture decomposition (RCMD), has also been proposed for the mining of regression classes in large data sets. In this paper, we focus on a special case of regression class mixture models, switching regression models, and adopt the RCMD method and the FCRM method in a real example and a simulation experiment. It is shown that the RCMD method has some special advantages over some traditional methods of data analysis and these two methods give almost consistent estimation results in switching regression models.", "abstracts": [ { "abstractType": "Regular", "content": "It is well known that the classical regression analysis, especially parametric regression analysis, is one of the important methods of extracting information from data sets. A family of regression functions, called fuzzy c-regression models (FCRM), has been presented which can be used to characterize the linear relationship to certain types of mixed data. More generally, an effective and robust method, coined regression class mixture decomposition (RCMD), has also been proposed for the mining of regression classes in large data sets. In this paper, we focus on a special case of regression class mixture models, switching regression models, and adopt the RCMD method and the FCRM method in a real example and a simulation experiment. It is shown that the RCMD method has some special advantages over some traditional methods of data analysis and these two methods give almost consistent estimation results in switching regression models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is well known that the classical regression analysis, especially parametric regression analysis, is one of the important methods of extracting information from data sets. A family of regression functions, called fuzzy c-regression models (FCRM), has been presented which can be used to characterize the linear relationship to certain types of mixed data. More generally, an effective and robust method, coined regression class mixture decomposition (RCMD), has also been proposed for the mining of regression classes in large data sets. In this paper, we focus on a special case of regression class mixture models, switching regression models, and adopt the RCMD method and the FCRM method in a real example and a simulation experiment. It is shown that the RCMD method has some special advantages over some traditional methods of data analysis and these two methods give almost consistent estimation results in switching regression models.", "fno": "3336a915", "keywords": [ "Regression Class", "Fuzzy C Regression Models", "Mixture", "Robustness" ], "authors": [ { "affiliation": null, "fullName": "Jiang-Hong Ma", "givenName": "Jiang-Hong", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guo-Jun Wang", "givenName": "Guo-Jun", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "csse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "915-918", "year": "2008", "issn": null, "isbn": "978-0-7695-3336-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3336a911", "articleId": "12OmNyr8YcL", "__typename": "AdjacentArticleType" }, "next": { "fno": "3336a919", "articleId": "12OmNrAv3Qt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cis/2007/3072/0/30720218", "title": "Fuzzy Factor in Switching Regression Models", "doi": null, "abstractUrl": "/proceedings-article/cis/2007/30720218/12OmNB06lah", "parentPublication": { "id": "proceedings/cis/2007/3072/0", "title": "2007 International Conference on Computational Intelligence and Security (CIS 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/3/3305c537", "title": "Estimates of Bridge Girder Conditions Based on Fuzzy Inspection Data", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305c537/12OmNqNXEoH", "parentPublication": { "id": "proceedings/fskd/2008/3305/3", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2017/4822/0/07926725", "title": "Switching Linear Inverse-Regression Model for Tracking Head Pose", "doi": null, "abstractUrl": "/proceedings-article/wacv/2017/07926725/12OmNvjyxRz", "parentPublication": { "id": "proceedings/wacv/2017/4822/0", "title": "2017 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuma/1990/2107/0/00151292", "title": "Fuzzy regression analysis for fatigue crack growth", "doi": null, "abstractUrl": "/proceedings-article/isuma/1990/00151292/12OmNwMobdJ", "parentPublication": { "id": "proceedings/isuma/1990/2107/0", "title": "Proceedings First International Symposium on Uncertainty Modeling and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/2/07502688", "title": "Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07502688/12OmNwe2Iyv", "parentPublication": { "id": "proceedings/icpr/2000/0750/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/2/3735b562", "title": "Mining Regression-Classes in Fuzzy Point Data Sets", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b562/12OmNxecRUS", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/1/3305a151", "title": "A Novel Method to Calculate Sample Weights for FCM Regression", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305a151/12OmNyoiYUE", "parentPublication": { "id": "proceedings/fskd/2008/3305/1", "title": "2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2011/4375/0/4375a515", "title": "Rank Prediction in Graphs with Locally Weighted Polynomial Regression and EM of Polynomial Mixture Models", "doi": null, "abstractUrl": "/proceedings-article/asonam/2011/4375a515/12OmNzWx01s", "parentPublication": { "id": "proceedings/asonam/2011/4375/0", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a558", "title": "Discriminative Bernoulli Mixture Models for Handwritten Digit Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a558/12OmNzh5z25", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2001/01/i0005", "title": "A New Method for Mining Regression Classes in Large Data Sets", "doi": null, "abstractUrl": "/journal/tp/2001/01/i0005/13rRUxCitKm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwHz03Q", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "acronym": "icassp", "groupId": "1000002", "volume": "2", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8OuwH", "doi": "10.1109/ICASSP.2004.1326308", "title": "Bias of the corrected KIC for underfitted regression models", "normalizedTitle": "Bias of the corrected KIC for underfitted regression models", "abstract": "The Kullback information criterion (KIC) (Cavanaugh, J.E., Statistics and Probability Letters, vol.42, p.333-43, 1999) and the bias corrected version, KICc, (Seghouane, A.-K. et al., Proc. ICASSP, p.145-8, 2003) are two methods for statistical model selection of regression variables and autoregressive models. Both criteria may be viewed as estimators of the Kullback symmetric divergence between the true model and the fitted approximating model. The bias of KIC and KICc is studied in the underfitting case, where none of the candidate models includes the true model. Here, only normal linear regression models are considered, where an exact expression of the bias is obtained for KIC and KICc. The bias of KICc is often smaller, in most cases drastically smaller, than KIC. A simulation study, in which the true model is of infinite order polynomial expansion, shows that, in small and moderate sample size, KICc provides a better model selection than KIC. Furthermore KICc outperforms the two well-known criteria, AIC and MDL.", "abstracts": [ { "abstractType": "Regular", "content": "The Kullback information criterion (KIC) (Cavanaugh, J.E., Statistics and Probability Letters, vol.42, p.333-43, 1999) and the bias corrected version, KICc, (Seghouane, A.-K. et al., Proc. ICASSP, p.145-8, 2003) are two methods for statistical model selection of regression variables and autoregressive models. Both criteria may be viewed as estimators of the Kullback symmetric divergence between the true model and the fitted approximating model. The bias of KIC and KICc is studied in the underfitting case, where none of the candidate models includes the true model. Here, only normal linear regression models are considered, where an exact expression of the bias is obtained for KIC and KICc. The bias of KICc is often smaller, in most cases drastically smaller, than KIC. A simulation study, in which the true model is of infinite order polynomial expansion, shows that, in small and moderate sample size, KICc provides a better model selection than KIC. Furthermore KICc outperforms the two well-known criteria, AIC and MDL.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Kullback information criterion (KIC) (Cavanaugh, J.E., Statistics and Probability Letters, vol.42, p.333-43, 1999) and the bias corrected version, KICc, (Seghouane, A.-K. et al., Proc. ICASSP, p.145-8, 2003) are two methods for statistical model selection of regression variables and autoregressive models. Both criteria may be viewed as estimators of the Kullback symmetric divergence between the true model and the fitted approximating model. The bias of KIC and KICc is studied in the underfitting case, where none of the candidate models includes the true model. Here, only normal linear regression models are considered, where an exact expression of the bias is obtained for KIC and KICc. The bias of KICc is often smaller, in most cases drastically smaller, than KIC. A simulation study, in which the true model is of infinite order polynomial expansion, shows that, in small and moderate sample size, KICc provides a better model selection than KIC. Furthermore KICc outperforms the two well-known criteria, AIC and MDL.", "fno": "01326308", "keywords": [ "Regression Analysis", "Autoregressive Processes", "Parameter Estimation", "Approximation Theory", "Polynomials", "Bias Corrected KIC", "Kullback Information Criterion", "Underfitted Regression Models", "Statistical Model Selection", "Regression Variables", "Autoregressive Models", "Kullback Symmetric Divergence Estimation", "Fitted Approximating Model", "Linear Regression Models", "Infinite Order Polynomial Expansion", "Linear Regression", "Technological Innovation", "Polynomials", "Logic", "Minimization" ], "authors": [ { "affiliation": "Service des Mesures, SUPELEC, Gif-sur-Yvette, France", "fullName": "M. Bekara", "givenName": "M.", "surname": "Bekara", "__typename": "ArticleAuthorType" }, { "affiliation": "Service des Mesures, SUPELEC, Gif-sur-Yvette, France", "fullName": "G. Fleury", "givenName": "G.", "surname": "Fleury", "__typename": "ArticleAuthorType" } ], "idPrefix": "icassp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "ii-517-20 vol.2", "year": "2004", "issn": "1520-6149", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01326307", "articleId": "12OmNxWcH07", "__typename": "AdjacentArticleType" }, "next": { "fno": "01326309", "articleId": "12OmNybfr0o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2015/8828/0/8828a127", "title": "On Bias Corrected Estimators of the Two Parameter Gamma Distribution", "doi": null, "abstractUrl": "/proceedings-article/itng/2015/8828a127/12OmNvAiSCp", "parentPublication": { "id": "proceedings/itng/2015/8828/0", "title": "2015 12th International Conference on Information Technology - New Generations (ITNG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1998/8295/0/82951006", "title": "Bias-Corrected Optical Flow Estimation for Road Vehicle Tracking", "doi": null, "abstractUrl": "/proceedings-article/iccv/1998/82951006/12OmNwIHoB5", "parentPublication": { "id": "proceedings/iccv/1998/8295/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icm/2011/4522/4/4522d038", "title": "A Quantile Regression Analysis on the Relations between Foreign Direct Investment and Technological Innovation in China", "doi": null, "abstractUrl": "/proceedings-article/icm/2011/4522d038/12OmNx9FhNa", "parentPublication": { "id": "proceedings/icm/2011/4522/4", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2009/3728/0/3728a266", "title": "Social Capital and Cognitive Bias: An Empirical Study of China", "doi": null, "abstractUrl": "/proceedings-article/case/2009/3728a266/12OmNzwZ6rs", "parentPublication": { "id": "proceedings/case/2009/3728/0", "title": "2009 IITA International Conference on Control, Automation and Systems Engineering, CASE 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200l1047", "title": "Removing the Bias of Integral Pose Regression", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200l1047/1BmFVpnwNSo", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021107", "title": "Fair Regression under Sample Selection Bias", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021107/1KfRTsivwLS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2022/1015/0/101500a110", "title": "The mental health benefits and feasibility of the smartphone-based interpretation bias modification training in working population", "doi": null, "abstractUrl": "/proceedings-article/itme/2022/101500a110/1M4rzU4R7RS", "parentPublication": { "id": "proceedings/itme/2022/1015/0", "title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10093110", "title": "Bias-Compensated Integral Regression for Human Pose Estimation", "doi": null, "abstractUrl": "/journal/tp/5555/01/10093110/1M61QMyYhNu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msieid/2020/1541/0/154100a085", "title": "The Effects of Executive Compensation Incentive on Implicit Corruption in China Based on Multiple Linear Regression Model", "doi": null, "abstractUrl": "/proceedings-article/msieid/2020/154100a085/1scHHdBWpag", "parentPublication": { "id": "proceedings/msieid/2020/1541/0", "title": "2020 Management Science Informatization and Economic Innovation Development Conference (MSIEID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwnczW", "title": "Parallel and Distributed Information Systems, International Conference", "acronym": "pdis", "groupId": "1000529", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNxRF78T", "doi": "10.1109/PDIS.1996.568684", "title": "Building Regression Cost Models for Multidatabase Systems", "normalizedTitle": "Building Regression Cost Models for Multidatabase Systems", "abstract": "Abstract: A major challenge for performing global query optimization in a multidatabase system (MDBS) is the lack of cost models for local database systems at the global level. The authors present a statistical procedure based on multiple regression analysis for building cost models for local database systems in an MDBS. Explanatory variables that can be included in a regression model are identified and a mixed forward and backward method for selecting significant explanatory variables is presented. Measures for developing useful regression cost models, such as removing outliers, eliminating multicollinearity, validating regression model assumptions, and checking significance of regression models, are discussed. Experimental results demonstrate that the presented statistical procedure can develop useful local cost models in an MDBS.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: A major challenge for performing global query optimization in a multidatabase system (MDBS) is the lack of cost models for local database systems at the global level. The authors present a statistical procedure based on multiple regression analysis for building cost models for local database systems in an MDBS. Explanatory variables that can be included in a regression model are identified and a mixed forward and backward method for selecting significant explanatory variables is presented. Measures for developing useful regression cost models, such as removing outliers, eliminating multicollinearity, validating regression model assumptions, and checking significance of regression models, are discussed. Experimental results demonstrate that the presented statistical procedure can develop useful local cost models in an MDBS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: A major challenge for performing global query optimization in a multidatabase system (MDBS) is the lack of cost models for local database systems at the global level. The authors present a statistical procedure based on multiple regression analysis for building cost models for local database systems in an MDBS. Explanatory variables that can be included in a regression model are identified and a mixed forward and backward method for selecting significant explanatory variables is presented. Measures for developing useful regression cost models, such as removing outliers, eliminating multicollinearity, validating regression model assumptions, and checking significance of regression models, are discussed. Experimental results demonstrate that the presented statistical procedure can develop useful local cost models in an MDBS.", "fno": "74750220", "keywords": [ "Distributed Databases Regression Cost Model Building Multidatabase Systems Global Query Optimization Local Database Systems Statistical Procedure Multiple Regression Analysis Mixed Forward Backward Method Explanatory Variables Outlier Removal Multicollinearity Elimination Regression Model Assumption Validation Regression Model Significance Checking" ], "authors": [ { "affiliation": "Dept. of Comput. & Inf. Sci., Michigan Univ., Dearborn, MI, USA", "fullName": "Qiang Zhu", "givenName": "Qiang", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. & Inf. Sci., Michigan Univ., Dearborn, MI, USA", "fullName": "P.-A. Larson", "givenName": "P.-A.", "surname": "Larson", "__typename": "ArticleAuthorType" } ], "idPrefix": "pdis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-12-01T00:00:00", "pubType": "proceedings", "pages": "0220", "year": "1996", "issn": null, "isbn": "0-8186-7475-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "74750208", "articleId": "12OmNAle6Us", "__typename": "AdjacentArticleType" }, "next": { "fno": "74750232", "articleId": "12OmNBO3Kge", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAH5djR", "title": "Fifth IEEE International Conference on Data Mining (ICDM'05)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNyFU72m", "doi": "10.1109/ICDM.2005.126", "title": "Ranking-Based Evaluation of Regression Models", "normalizedTitle": "Ranking-Based Evaluation of Regression Models", "abstract": "We suggest the use of ranking-based evaluation measures for regression models, as a complement to the commonly used residual-based evaluation. We argue that in some cases, such as the case study we present, ranking can be the main underlying goal in building a regression model, and ranking performance is the correct evaluation metric. However, even when ranking is not the contextually correct performance metric, the measures we explore still have significant advantages: They are robust against extreme outliers in the evaluation set; and they are interpretable. The two measures we consider correspond closely to non-parametric correlation coefficients commonly used in data analysis (Spearman?s ρ and Kendall?s τ); and they both have interesting graphical representations, which, similarly to ROC curves, offer useful \"partial\" model performance views, in addition to a one-number summary in the area under the curve. We illustrate our methods on a case study of evaluating IT Wallet size estimation models for IBM?s customers.", "abstracts": [ { "abstractType": "Regular", "content": "We suggest the use of ranking-based evaluation measures for regression models, as a complement to the commonly used residual-based evaluation. We argue that in some cases, such as the case study we present, ranking can be the main underlying goal in building a regression model, and ranking performance is the correct evaluation metric. However, even when ranking is not the contextually correct performance metric, the measures we explore still have significant advantages: They are robust against extreme outliers in the evaluation set; and they are interpretable. The two measures we consider correspond closely to non-parametric correlation coefficients commonly used in data analysis (Spearman?s ρ and Kendall?s τ); and they both have interesting graphical representations, which, similarly to ROC curves, offer useful \"partial\" model performance views, in addition to a one-number summary in the area under the curve. We illustrate our methods on a case study of evaluating IT Wallet size estimation models for IBM?s customers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We suggest the use of ranking-based evaluation measures for regression models, as a complement to the commonly used residual-based evaluation. We argue that in some cases, such as the case study we present, ranking can be the main underlying goal in building a regression model, and ranking performance is the correct evaluation metric. However, even when ranking is not the contextually correct performance metric, the measures we explore still have significant advantages: They are robust against extreme outliers in the evaluation set; and they are interpretable. The two measures we consider correspond closely to non-parametric correlation coefficients commonly used in data analysis (Spearman?s ρ and Kendall?s τ); and they both have interesting graphical representations, which, similarly to ROC curves, offer useful \"partial\" model performance views, in addition to a one-number summary in the area under the curve. We illustrate our methods on a case study of evaluating IT Wallet size estimation models for IBM?s customers.", "fno": "22780370", "keywords": [], "authors": [ { "affiliation": "IBM T. J. Watson Research Center", "fullName": "Saharon Rosset", "givenName": "Saharon", "surname": "Rosset", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM T. J. Watson Research Center", "fullName": "Claudia Perlich", "givenName": "Claudia", "surname": "Perlich", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM T. J. Watson Research Center", "fullName": "Bianca Zadrozny", "givenName": "Bianca", "surname": "Zadrozny", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-11-01T00:00:00", "pubType": "proceedings", "pages": "370-377", "year": "2005", "issn": "1550-4786", "isbn": "0-7695-2278-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "22780362", "articleId": "12OmNvrvjc2", "__typename": "AdjacentArticleType" }, "next": { "fno": "22780378", "articleId": "12OmNARAngJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2004/832/0/01336219", "title": "Geographic information retrieval (GIR) ranking methods for digital libraries", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336219/12OmNAGw12x", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217716", "title": "Stable feature ranking with logistic regression ensembles", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217716/12OmNAnMuFV", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdciem/2012/4639/0/4639a556", "title": "Research on Bidder's Competitiveness Evaluation Model Based on Score Ranking System", "doi": null, "abstractUrl": "/proceedings-article/cdciem/2012/4639a556/12OmNB06l6O", "parentPublication": { "id": "proceedings/cdciem/2012/4639/0", "title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2008/2242/0/04587692", "title": "Evaluation of constructable match cost measures for stereo correspondence using cluster ranking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2008/04587692/12OmNBQTJlG", "parentPublication": { "id": "proceedings/cvpr/2008/2242/0", "title": "2008 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c034", "title": "Automated Web Site Evaluation - An Approach Based on Ranking SVM", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c034/12OmNweBUDd", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2010/4191/1/4191a153", "title": "Ranking Approaches for Microblog Search", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2010/4191a153/12OmNxzuMLS", "parentPublication": { "id": "proceedings/wi-iat/2010/4191/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2009/3872/0/3872a283", "title": "Evaluation Measures for Ordinal Regression", "doi": null, "abstractUrl": "/proceedings-article/isda/2009/3872a283/12OmNybfrbj", "parentPublication": { "id": "proceedings/isda/2009/3872/0", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/05/06910252", "title": "Statistical Optimality in Multipartite Ranking and Ordinal Regression", "doi": null, "abstractUrl": "/journal/tp/2015/05/06910252/13rRUxjQywD", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2018/5488/0/08621142", "title": "Regression Models and Ranking Method for p53 Inhibitor Candidates Using Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2018/08621142/17D45WK5Asu", "parentPublication": { "id": "proceedings/bibm/2018/5488/0", "title": "2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a689", "title": "Combining Ranking and Point-wise Losses for Training Deep Survival Analysis Models", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a689/1Aqx9pihqTe", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqI04I8", "title": "Intelligent Systems Design and Applications, International Conference on", "acronym": "isda", "groupId": "1001454", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzC5SRx", "doi": "10.1109/ISDA.2009.214", "title": "Handling High-Dimensional Regression Problems by Means of an Efficient Multi-Objective Evolutionary Algorithm", "normalizedTitle": "Handling High-Dimensional Regression Problems by Means of an Efficient Multi-Objective Evolutionary Algorithm", "abstract": "Linguistic fuzzy modeling in high dimensional regression problems is a challenging topic since conventional linguistic fuzzy rule-based systems suffer from exponential rule explosion when the number of variables and/or data examples becomes high. A good way to face this problem is by searching for a good and simple global structure within the same process, in order to consider the relationships among the different components defining the final linguistic model. In this contribution, we propose an effective multi-objective evolutionary algorithm that based on the data base learning a priori (involved variables, granularities and slight uniform displacements of the fuzzy partitions) allows a fast derivation of simple and quite accurate linguistic models, making use of some effective mechanisms in order to ensure a fast convergence. The good results obtained in several large-scale regression problems demonstrate the effectiveness of the proposed approach.", "abstracts": [ { "abstractType": "Regular", "content": "Linguistic fuzzy modeling in high dimensional regression problems is a challenging topic since conventional linguistic fuzzy rule-based systems suffer from exponential rule explosion when the number of variables and/or data examples becomes high. A good way to face this problem is by searching for a good and simple global structure within the same process, in order to consider the relationships among the different components defining the final linguistic model. In this contribution, we propose an effective multi-objective evolutionary algorithm that based on the data base learning a priori (involved variables, granularities and slight uniform displacements of the fuzzy partitions) allows a fast derivation of simple and quite accurate linguistic models, making use of some effective mechanisms in order to ensure a fast convergence. The good results obtained in several large-scale regression problems demonstrate the effectiveness of the proposed approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Linguistic fuzzy modeling in high dimensional regression problems is a challenging topic since conventional linguistic fuzzy rule-based systems suffer from exponential rule explosion when the number of variables and/or data examples becomes high. A good way to face this problem is by searching for a good and simple global structure within the same process, in order to consider the relationships among the different components defining the final linguistic model. In this contribution, we propose an effective multi-objective evolutionary algorithm that based on the data base learning a priori (involved variables, granularities and slight uniform displacements of the fuzzy partitions) allows a fast derivation of simple and quite accurate linguistic models, making use of some effective mechanisms in order to ensure a fast convergence. The good results obtained in several large-scale regression problems demonstrate the effectiveness of the proposed approach.", "fno": "3872a109", "keywords": [ "High Dimensional Regression Problems", "Linguistic Fuzzy Modeling", "Complexity Reduction", "Multi Objective Genetic Fuzzy Systems" ], "authors": [ { "affiliation": null, "fullName": "María José Gacto", "givenName": "María José", "surname": "Gacto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rafael Alcalá", "givenName": "Rafael", "surname": "Alcalá", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Francisco Herrera", "givenName": "Francisco", "surname": "Herrera", "__typename": "ArticleAuthorType" } ], "idPrefix": "isda", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "109-114", "year": "2009", "issn": null, "isbn": "978-0-7695-3872-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3872a102", "articleId": "12OmNAYGlEI", "__typename": "AdjacentArticleType" }, "next": { "fno": "3872a115", "articleId": "12OmNzTppDp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/kam/2009/3888/2/3888b143", "title": "A Fuzzy Multi-objective Optimization Evolutionary Algorithm Incorporating Preference Information", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888b143/12OmNAg7jYz", "parentPublication": { "id": "proceedings/kam/2009/3888/2", "title": "Knowledge Acquisition and Modeling, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/4/3816d111", "title": "Multivariate Linear Regression Model Based on Fuzzy Variable in Econometrics", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816d111/12OmNAlNiyT", "parentPublication": { "id": "proceedings/aici/2009/3816/4", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/2/3735b094", "title": "FC4 Fuzzy Rules System Acquisition of Complex System Using Interactive Evolutionary Computation", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b094/12OmNBgz4Bg", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2012/4723/0/4723a005", "title": "Fuzzy Entropy on Restricted Fuzzy Linear Regression Model with Cross Validation and Applications", "doi": null, "abstractUrl": "/proceedings-article/icacc/2012/4723a005/12OmNCdk2UF", "parentPublication": { "id": "proceedings/icacc/2012/4723/0", "title": "2012 International Conference on Advances in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a915", "title": "A Case Study on the RCMD Method and Fuzzy C-Regression Models for Mining Regression Classes", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a915/12OmNCgJe93", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/2/3735b562", "title": "Mining Regression-Classes in Fuzzy Point Data Sets", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b562/12OmNxecRUS", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2008/3326/0/3326a278", "title": "A Multi-Objective Genetic Approach to Concurrently Learn Partition Granularity and Rule Bases of Mamdani Fuzzy Systems", "doi": null, "abstractUrl": "/proceedings-article/his/2008/3326a278/12OmNyQYtyo", "parentPublication": { "id": "proceedings/his/2008/3326/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2010/4279/4/4279d374", "title": "Selecting Outsourcing Service Providers: A Fuzzy Linguistic Method", "doi": null, "abstractUrl": "/proceedings-article/iciii/2010/4279d374/12OmNyS6RG4", "parentPublication": { "id": "proceedings/iciii/2010/4279/4", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ems/2011/4619/0/4619a263", "title": "Evolutionary Fuzzy Function with Support Vector Regression for the Prediction of Concrete Compressive Strength", "doi": null, "abstractUrl": "/proceedings-article/ems/2011/4619a263/12OmNyeWdAO", "parentPublication": { "id": "proceedings/ems/2011/4619/0", "title": "Computer Modeling and Simulation, UKSIM European Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1999/12/i1297", "title": "Globally Optimal Fuzzy Decision Trees for Classification and Regression", "doi": null, "abstractUrl": "/journal/tp/1999/12/i1297/13rRUxlgxUk", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyYm2vJ", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzWx01s", "doi": "10.1109/ASONAM.2011.44", "title": "Rank Prediction in Graphs with Locally Weighted Polynomial Regression and EM of Polynomial Mixture Models", "normalizedTitle": "Rank Prediction in Graphs with Locally Weighted Polynomial Regression and EM of Polynomial Mixture Models", "abstract": "In this paper we describe a learning framework enabling ranking predictions for graph nodes based solely on individual local historical data. The two learning algorithms capitalize on the multi feature vectors of nodes in graphs that evolve in time. In the first case we use weighted polynomial regression (LWPR) while in the second we consider the Expectation Maximization (EM) algorithm to fit a mixture of polynomial regression models. The first method uses separate weighted polynomial regression models for each web page, while the second algorithm capitalizes on group behavior, thus taking advantage of the possible interdependence between web pages. The prediction quality is quantified as the similarity between the predicted and the actual rankings and compared to alternative baseline predictor. We performed extensive experiments on a real world data set (the Wikipedia graph). The results are very encouraging.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we describe a learning framework enabling ranking predictions for graph nodes based solely on individual local historical data. The two learning algorithms capitalize on the multi feature vectors of nodes in graphs that evolve in time. In the first case we use weighted polynomial regression (LWPR) while in the second we consider the Expectation Maximization (EM) algorithm to fit a mixture of polynomial regression models. The first method uses separate weighted polynomial regression models for each web page, while the second algorithm capitalizes on group behavior, thus taking advantage of the possible interdependence between web pages. The prediction quality is quantified as the similarity between the predicted and the actual rankings and compared to alternative baseline predictor. We performed extensive experiments on a real world data set (the Wikipedia graph). The results are very encouraging.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we describe a learning framework enabling ranking predictions for graph nodes based solely on individual local historical data. The two learning algorithms capitalize on the multi feature vectors of nodes in graphs that evolve in time. In the first case we use weighted polynomial regression (LWPR) while in the second we consider the Expectation Maximization (EM) algorithm to fit a mixture of polynomial regression models. The first method uses separate weighted polynomial regression models for each web page, while the second algorithm capitalizes on group behavior, thus taking advantage of the possible interdependence between web pages. The prediction quality is quantified as the similarity between the predicted and the actual rankings and compared to alternative baseline predictor. We performed extensive experiments on a real world data set (the Wikipedia graph). The results are very encouraging.", "fno": "4375a515", "keywords": [ "Expectation Maximization", "Clustering", "Mixture Models", "Maximum Likelihood Estimation", "Locally Weighted Regression", "Polynomial Regression" ], "authors": [ { "affiliation": null, "fullName": "Michalis Rallis", "givenName": "Michalis", "surname": "Rallis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michalis Vazirgiannis", "givenName": "Michalis", "surname": "Vazirgiannis", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "515-519", "year": "2011", "issn": null, "isbn": "978-0-7695-4375-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4375a507", "articleId": "12OmNvjQ8Lr", "__typename": "AdjacentArticleType" }, "next": { "fno": "4375a520", "articleId": "12OmNyQGRYy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgiv/2008/3359/0/3359a339", "title": "Segmentation of CT Brain Images Using K-Means and EM Clustering", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2008/3359a339/12OmNBscCTM", "parentPublication": { "id": "proceedings/cgiv/2008/3359/0", "title": "2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ihmsc/2011/4444/2/4444b223", "title": "Vision-Based Realtime Animation Synthesis", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2011/4444b223/12OmNvwC5th", "parentPublication": { "id": "proceedings/ihmsc/2011/4444/2", "title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2009/3818/0/3818a134", "title": "A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2009/3818a134/12OmNwFid2j", "parentPublication": { "id": "proceedings/chinagrid/2009/3818/0", "title": "2009 Fourth ChinaGrid Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2009/3931/1/3931a381", "title": "A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum Fingerprint", "doi": null, "abstractUrl": "/proceedings-article/cis/2009/3931a381/12OmNwlHSST", "parentPublication": { "id": "proceedings/cis/2009/3931/1", "title": "2009 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2010/4253/0/4253a392", "title": "Adaptive Knowledge Transfer Based on Locally Weighted Learning", "doi": null, "abstractUrl": "/proceedings-article/taai/2010/4253a392/12OmNxGSm1v", "parentPublication": { "id": "proceedings/taai/2010/4253/0", "title": "2010 International Conference on Technologies and Applications of Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/5/3119e542", "title": "The Rao Detection of Weak Signal in Gaussian Mixture Noise", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119e542/12OmNylsZzR", "parentPublication": { "id": "proceedings/cisp/2008/3119/5", "title": "International Congress on Image and Signal Processing (CISP 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2008/3428/0/3428a191", "title": "Animating Characters Using Nonparametric Regression", "doi": null, "abstractUrl": "/proceedings-article/csa/2008/3428a191/12OmNzTH169", "parentPublication": { "id": "proceedings/csa/2008/3428/0", "title": "2008 International Symposium on Computer Science and its Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biotechno/2008/3191/0/3191a094", "title": "sBGMM: A Stratified Beta-Gaussian Mixture Model for Clustering Genes with Multiple Data Sources", "doi": null, "abstractUrl": "/proceedings-article/biotechno/2008/3191a094/12OmNzcPA7r", "parentPublication": { "id": "proceedings/biotechno/2008/3191/0", "title": "International Conference on Biocomputation, Bioinformatics, and Biomedical Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2005/06/k0750", "title": "Maximum Weighted Likelihood via Rival Penalized EM for Density Mixture Clustering with Automatic Model Selection", "doi": null, "abstractUrl": "/journal/tk/2005/06/k0750/13rRUwbaqLI", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/05/ttb2011051417", "title": "Probabilistic Mixture Regression Models for Alignment of LC-MS Data", "doi": null, "abstractUrl": "/journal/tb/2011/05/ttb2011051417/13rRUy0qnKb", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BogMj9AZB6", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "acronym": "csde", "groupId": "1837144", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BogXQNL5NS", "doi": "10.1109/CSDE53843.2021.9718403", "title": "Lighting energy consumption estimation models for a library building with different lighting scenarios", "normalizedTitle": "Lighting energy consumption estimation models for a library building with different lighting scenarios", "abstract": "Lighting is one of the major factors that accounts for the increase in global electricity consumption. One way to reduce electricity consumption is to implement energy efficient lighting usage. This paper presents a regression-based lighting energy consumption estimation models for a public library building in Sengkurong, Brunei Darussalam with artificial and mixed (artificial and natural) lightings. If this library adopts mixed lighting, about 14&#x0025; of the mean lighting energy consumption and the electricity cost due to lighting could be saved in 2020 rather than employing artificial lighting. The most influential explanatory variable of the lighting energy consumption estimation models for a library with artificial and mixed lightings was the interaction variable between floor area and illuminance. For both lighting scenarios in a library building, the multiple non-linear regression (MNLR) model (R<sup>2</sup> &#x003D; 0.97 and RMSE &#x003D; 562.2kWh for artificial lighting and R<sup>2</sup> &#x003D;0.94 and RMSE &#x003D;910.0kWh for mixed lighting) performed better with a more accurate lighting energy consumption estimation than the multiple linear regression (MLR) model (R<sup>2</sup> &#x003D;0.89 and RMSE &#x003D;1,043.9kWh for artificial lighting and R<sup>2</sup> &#x003D; 0.85 and RMSE &#x003D; 1,279.4kWh for mixed lighting).", "abstracts": [ { "abstractType": "Regular", "content": "Lighting is one of the major factors that accounts for the increase in global electricity consumption. One way to reduce electricity consumption is to implement energy efficient lighting usage. This paper presents a regression-based lighting energy consumption estimation models for a public library building in Sengkurong, Brunei Darussalam with artificial and mixed (artificial and natural) lightings. If this library adopts mixed lighting, about 14&#x0025; of the mean lighting energy consumption and the electricity cost due to lighting could be saved in 2020 rather than employing artificial lighting. The most influential explanatory variable of the lighting energy consumption estimation models for a library with artificial and mixed lightings was the interaction variable between floor area and illuminance. For both lighting scenarios in a library building, the multiple non-linear regression (MNLR) model (R<sup>2</sup> &#x003D; 0.97 and RMSE &#x003D; 562.2kWh for artificial lighting and R<sup>2</sup> &#x003D;0.94 and RMSE &#x003D;910.0kWh for mixed lighting) performed better with a more accurate lighting energy consumption estimation than the multiple linear regression (MLR) model (R<sup>2</sup> &#x003D;0.89 and RMSE &#x003D;1,043.9kWh for artificial lighting and R<sup>2</sup> &#x003D; 0.85 and RMSE &#x003D; 1,279.4kWh for mixed lighting).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Lighting is one of the major factors that accounts for the increase in global electricity consumption. One way to reduce electricity consumption is to implement energy efficient lighting usage. This paper presents a regression-based lighting energy consumption estimation models for a public library building in Sengkurong, Brunei Darussalam with artificial and mixed (artificial and natural) lightings. If this library adopts mixed lighting, about 14% of the mean lighting energy consumption and the electricity cost due to lighting could be saved in 2020 rather than employing artificial lighting. The most influential explanatory variable of the lighting energy consumption estimation models for a library with artificial and mixed lightings was the interaction variable between floor area and illuminance. For both lighting scenarios in a library building, the multiple non-linear regression (MNLR) model (R2 = 0.97 and RMSE = 562.2kWh for artificial lighting and R2 =0.94 and RMSE =910.0kWh for mixed lighting) performed better with a more accurate lighting energy consumption estimation than the multiple linear regression (MLR) model (R2 =0.89 and RMSE =1,043.9kWh for artificial lighting and R2 = 0.85 and RMSE = 1,279.4kWh for mixed lighting).", "fno": "09718403", "keywords": [ "Building Management Systems", "Costing", "Energy Conservation", "Lighting", "Nonlinear Estimation", "Power Consumption", "Regression Analysis", "Energy Efficient Lighting Usage", "Public Library Building", "Artificial Lighting", "Multiple Nonlinear Regression Model", "Regression Based Lighting Energy Consumption Estimation Model", "Sengkurong", "Brunei Darussalam", "Electricity Cost", "MNLR Model", "Energy Consumption", "Costs", "Computational Modeling", "Buildings", "Linear Regression", "Lighting", "Estimation", "Artificial Lighting", "Natural Lighting", "Energy Consumption", "Modelling", "Libraty Building" ], "authors": [ { "affiliation": "Universiti Brunei Darussalam,Faculty of Integrated Technologies,Gadong,Brunei Darussalam", "fullName": "Wan Yun Hong", "givenName": "Wan Yun", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "Universiti Brunei Darussalam,Faculty of Integrated Technologies,Gadong,Brunei Darussalam", "fullName": "Bibi Nurmuslihah Ni’Matullah Nura’Liyah Rahmat", "givenName": "Bibi Nurmuslihah Ni’Matullah", "surname": "Nura’Liyah Rahmat", "__typename": "ArticleAuthorType" } ], "idPrefix": "csde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2021", "issn": null, "isbn": "978-1-6654-9552-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09718371", "articleId": "1BogVTTM4Q8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09718462", "articleId": "1BogTDncinS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2018/2290/0/08343190", "title": "Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system", "doi": null, "abstractUrl": "/proceedings-article/icoin/2018/08343190/12OmNAg7jZ7", "parentPublication": { "id": "proceedings/icoin/2018/2290/0", "title": "2018 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sustainit/2012/46/0/06388011", "title": "Neural network-based forecasting of energy consumption due to electric lighting in office buildings", "doi": null, "abstractUrl": "/proceedings-article/sustainit/2012/06388011/12OmNAoUTuD", "parentPublication": { "id": "proceedings/sustainit/2012/46/0", "title": "2012 Second IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2015/8425/0/07134055", "title": "An intervention study on automated lighting control to save energy in open space offices", "doi": null, "abstractUrl": "/proceedings-article/percomw/2015/07134055/12OmNxy4MZI", "parentPublication": { "id": "proceedings/percomw/2015/8425/0", "title": "2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/289/1/05750690", "title": "Buildings Passageway Road Lighting Line Controller Based on Monolithic Computer", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750690/12OmNzVoBA1", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a085", "title": "Investigating Lighting Quality in Office Workstations: A Combined Approach Utilizing Virtual Reality and Physical Workstations", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a085/1CJe1WgruTe", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8541", "title": "PhotoScene: Photorealistic Material and Lighting Transfer for Indoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8541/1H1nmFHmaoE", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a062", "title": "Yield Loss Estimation of Verticillium Wilt Cotton Field Based on UAV Multi-spectral and Regression Model", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a062/1HcnbotV22Q", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlise/2022/9246/0/924600a462", "title": "Research of machine learning under different lighting conditions", "doi": null, "abstractUrl": "/proceedings-article/mlise/2022/924600a462/1Ik8V97VWGA", "parentPublication": { "id": "proceedings/mlise/2022/9246/0", "title": "2022 International Conference on Machine Learning and Intelligent Systems Engineering (MLISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2019/4689/0/468900a967", "title": "Application of Improved OPTICS Algorithm in Intelligent Lighting System", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2019/468900a967/1h0FlsWHGs8", "parentPublication": { "id": "proceedings/icmcce/2019/4689/0", "title": "2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103777", "title": "Lighting Style and Color Temperature to Emotion Response in Architecture Illumination of the Historic Buildings in Dalian", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103777/1kesDXKTmla", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1f8N5ZnxJUQ", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "acronym": "ichi", "groupId": "1803080", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1f8N8uQ32Fy", "doi": "10.1109/ICHI.2019.8904528", "title": "Non-linear regression models for imputing longitudinal missing data", "normalizedTitle": "Non-linear regression models for imputing longitudinal missing data", "abstract": "The state-of-the-art literature has largely accepted multivariate imputation techniques such as multiple imputation using chained equations (MICE) [1], [2]. The MICE model is primarily proposed to impute missing values in cross-sectional data. However, the time varying nature of longitudinal data has not been fully modeled in traditional imputation methods [3], [4]. We have speculated two issues with MICE model and proposed a new approach to address these issues. First, the chained equations used in MICE are linear regression models. The performance of non-linear regression models has not been well sought in the literature. Second, the regression models of MICE may yield estimates of missing values that are out of bounds or range of normalization. This phenomenon eventually affects the overall imputation performance. In this study, we propose three methods for imputing longitudinal data: 1) an unsupervised method using piece-wise interpolation, 2) supervised non-linear regression models, and 3) an integration of the proposed unsupervised and supervised methods in a hybrid imputation pipeline.", "abstracts": [ { "abstractType": "Regular", "content": "The state-of-the-art literature has largely accepted multivariate imputation techniques such as multiple imputation using chained equations (MICE) [1], [2]. The MICE model is primarily proposed to impute missing values in cross-sectional data. However, the time varying nature of longitudinal data has not been fully modeled in traditional imputation methods [3], [4]. We have speculated two issues with MICE model and proposed a new approach to address these issues. First, the chained equations used in MICE are linear regression models. The performance of non-linear regression models has not been well sought in the literature. Second, the regression models of MICE may yield estimates of missing values that are out of bounds or range of normalization. This phenomenon eventually affects the overall imputation performance. In this study, we propose three methods for imputing longitudinal data: 1) an unsupervised method using piece-wise interpolation, 2) supervised non-linear regression models, and 3) an integration of the proposed unsupervised and supervised methods in a hybrid imputation pipeline.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The state-of-the-art literature has largely accepted multivariate imputation techniques such as multiple imputation using chained equations (MICE) [1], [2]. The MICE model is primarily proposed to impute missing values in cross-sectional data. However, the time varying nature of longitudinal data has not been fully modeled in traditional imputation methods [3], [4]. We have speculated two issues with MICE model and proposed a new approach to address these issues. First, the chained equations used in MICE are linear regression models. The performance of non-linear regression models has not been well sought in the literature. Second, the regression models of MICE may yield estimates of missing values that are out of bounds or range of normalization. This phenomenon eventually affects the overall imputation performance. In this study, we propose three methods for imputing longitudinal data: 1) an unsupervised method using piece-wise interpolation, 2) supervised non-linear regression models, and 3) an integration of the proposed unsupervised and supervised methods in a hybrid imputation pipeline.", "fno": "08904528", "keywords": [ "Data Handling", "Interpolation", "Regression Analysis", "Nonlinear Regression Models", "Longitudinal Missing Data", "Multivariate Imputation Techniques", "Multiple Imputation", "Chained Equations", "MICE Model", "Cross Sectional Data", "Longitudinal Data", "Linear Regression Models", "Imputation Performance", "Hybrid Imputation Pipeline", "Data Models", "Mathematical Model", "Mice", "Computational Modeling", "Interpolation", "Boosting", "Regression Tree Analysis" ], "authors": [ { "affiliation": "Tennessee State University,Department of Computer Science,Nashville,TN,USA,37209", "fullName": "Manar D. Samad", "givenName": "Manar D.", "surname": "Samad", "__typename": "ArticleAuthorType" }, { "affiliation": "Tennessee State University,Department of Computer Science,Nashville,TN,USA,37209", "fullName": "Linlin Yin", "givenName": "Linlin", "surname": "Yin", "__typename": "ArticleAuthorType" } ], "idPrefix": "ichi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "1-3", "year": "2019", "issn": null, "isbn": "978-1-5386-9138-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08904824", "articleId": "1f8N8Wqgfmg", "__typename": "AdjacentArticleType" }, "next": { "fno": "08904638", "articleId": "1f8NdqIfGPS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851b459", "title": "Structured Regression Gradient Boosting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851b459/12OmNAYGlET", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saint/2010/4107/0/4107a189", "title": "Missing Data Imputation Using Regression Tree Model for Sparse Data Collected via Wide Area Ubiquitous Network", "doi": null, "abstractUrl": "/proceedings-article/saint/2010/4107a189/12OmNAoUT1q", "parentPublication": { "id": "proceedings/saint/2010/4107/0", "title": "2010 10th IEEE/IPSJ International Symposium on Applications and the Internet", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2016/0641/0/07477651", "title": "Half hypersphere confinement for piecewise linear regression", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477651/12OmNyXMQn3", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2011/4409/0/4409a957", "title": "Imputation of Missing Links and Attributes in Longitudinal Social Surveys", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a957/12OmNzcPA9T", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a417", "title": "Alternating Regression Forests for Object Detection and Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a417/12OmNzd7bjg", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/02/08770154", "title": "MTBR: Multi-Target Boosting for Regression", "doi": null, "abstractUrl": "/journal/tk/2021/02/08770154/1bTQVhE371u", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904824", "title": "Missing Data Imputation for MIMIC-III using Matrix Decomposition", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904824/1f8N8Wqgfmg", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904779", "title": "eXITs: An Ensemble Approach for Imputing Missing EHR Data", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904779/1f8N9B1t2Qo", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2019/9138/0/08904840", "title": "IEEE ICHI Data Analytics Challenge on Missing data Imputation by Amelia II", "doi": null, "abstractUrl": "/proceedings-article/ichi/2019/08904840/1f8NbeYRVza", "parentPublication": { "id": "proceedings/ichi/2019/9138/0", "title": "2019 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09115681", "title": "Missing Value Imputation via Clusterwise Linear Regression", "doi": null, "abstractUrl": "/journal/tk/2022/04/09115681/1kBgI6e87cs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvkYx8t", "title": "2011 44th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNAlvHqY", "doi": "10.1109/HICSS.2011.54", "title": "An Experimental Study of Financial Portfolio Selection with Visual Analytics for Decision Support", "normalizedTitle": "An Experimental Study of Financial Portfolio Selection with Visual Analytics for Decision Support", "abstract": "We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision support tool that helps the consumer quickly create, compare and choose among several portfolios consisting of different financial instruments. PortfolioCompare facilitates the analysis of risk and return aspects of each portfolio considered. We investigate behavior in this task using an economic experiment in which the user actively creates and compares portfolios from a set of funds. We elicit risk preferences using a separate task and find that subjects using PortfolioCompare make decisions that are closer to their risk tolerance as compared to subjects presented with similar information in textual form. This finding suggests that PortfolioCompare helps understand risk aspects of portfolios. Portfolio selections are improved during the course of the decision process, suggesting that this tool is valuable for decision support.", "abstracts": [ { "abstractType": "Regular", "content": "We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision support tool that helps the consumer quickly create, compare and choose among several portfolios consisting of different financial instruments. PortfolioCompare facilitates the analysis of risk and return aspects of each portfolio considered. We investigate behavior in this task using an economic experiment in which the user actively creates and compares portfolios from a set of funds. We elicit risk preferences using a separate task and find that subjects using PortfolioCompare make decisions that are closer to their risk tolerance as compared to subjects presented with similar information in textual form. This finding suggests that PortfolioCompare helps understand risk aspects of portfolios. Portfolio selections are improved during the course of the decision process, suggesting that this tool is valuable for decision support.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision support tool that helps the consumer quickly create, compare and choose among several portfolios consisting of different financial instruments. PortfolioCompare facilitates the analysis of risk and return aspects of each portfolio considered. We investigate behavior in this task using an economic experiment in which the user actively creates and compares portfolios from a set of funds. We elicit risk preferences using a separate task and find that subjects using PortfolioCompare make decisions that are closer to their risk tolerance as compared to subjects presented with similar information in textual form. This finding suggests that PortfolioCompare helps understand risk aspects of portfolios. Portfolio selections are improved during the course of the decision process, suggesting that this tool is valuable for decision support.", "fno": "05718571", "keywords": [ "Data Analysis", "Decision Support Systems", "Financial Data Processing", "Financial Portfolio Selection", "Visual Analytics", "Portfolio Compare Decision Support Tool", "Financial Instruments", "Risk Preference", "Portfolios", "Visual Analytics", "Investments", "Decision Making", "Economics", "Correlation" ], "authors": [ { "affiliation": null, "fullName": "Anya Savikhin", "givenName": "Anya", "surname": "Savikhin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hon Cheong Lam", "givenName": "Hon Cheong", "surname": "Lam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Fisher", "givenName": "Brian", "surname": "Fisher", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David S. Ebert", "givenName": "David S.", "surname": "Ebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2011-01-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2011", "issn": "1530-1605", "isbn": "978-1-4244-9618-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05718570", "articleId": "12OmNAFFdHt", "__typename": "AdjacentArticleType" }, "next": { "fno": "05718572", "articleId": "12OmNwCsdCB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wsc/2003/8131/1/01261433", "title": "Importance sampling for a mixed Poisson model of portfolio credit risk", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261433/12OmNB8kHVB", "parentPublication": { "id": "proceedings/wsc/2003/8131/1", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004414", "title": "High-frequency financial statistics with parallel R and Intel Xeon Phi coprocessor", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004414/12OmNBlofMx", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2003/8131/1/01261437", "title": "OptFolio - a simulation optimization system for project portfolio planning", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261437/12OmNrJiCKC", "parentPublication": { "id": "proceedings/wsc/2003/8131/1", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipc/2015/8488/0/8488a175", "title": "On Accelerating Concurrent PCA Computations for Financial Risk Applications", "doi": null, "abstractUrl": "/proceedings-article/hipc/2015/8488a175/12OmNx0RJ0N", "parentPublication": { "id": "proceedings/hipc/2015/8488/0", "title": "2015 IEEE 22nd International Conference on High Performance Computing (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/27550063a", "title": "Value-at-Risk in IT Services Contracts", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/27550063a/12OmNxeuta8", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/5/01259982", "title": "A class of fuzzy portfolio selection problems", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259982/12OmNyGtjrz", "parentPublication": { "id": "proceedings/icmlc/2003/7865/1", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04438981", "title": "CRM and Customer Portfolio Management for E-Tailers", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04438981/12OmNzVoBAe", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482084", "title": "Long-Term Portfolio Management Using Attribute Selection and Combinatorial Fusion", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482084/14dcDYaWuLr", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/04076421", "title": "Advice Availability and Gender Differences in Risky Decision Making: A Study of Online Retirement Planning", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/04076421/17D45XacGjM", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a894", "title": "Entropy Risk Measurement and Portfolio Model under Entropy Risk", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a894/1tV9hVZZFwk", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNrw", "title": "2013 46th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNqN6R1X", "doi": "10.1109/HICSS.2013.342", "title": "Introduction to Decision Support and Operational Management Analytics Minitrack", "normalizedTitle": "Introduction to Decision Support and Operational Management Analytics Minitrack", "abstract": "Taken in isolation, algorithmic \"data sciences\" approaches and human-centred \"visual analytics\" methods hold great promise for operationalizing archival datasets and streaming real-time data in support of strategic and operational decision-making across a broad range of human activities.", "abstracts": [ { "abstractType": "Regular", "content": "Taken in isolation, algorithmic \"data sciences\" approaches and human-centred \"visual analytics\" methods hold great promise for operationalizing archival datasets and streaming real-time data in support of strategic and operational decision-making across a broad range of human activities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Taken in isolation, algorithmic \"data sciences\" approaches and human-centred \"visual analytics\" methods hold great promise for operationalizing archival datasets and streaming real-time data in support of strategic and operational decision-making across a broad range of human activities.", "fno": "4892b484", "keywords": [ "Visual Analytics", "Educational Institutions", "Decision Making", "Data Visualization", "Real Time Systems", "Information Systems", "Visual Analytics", "Decision Support", "Data Sciences" ], "authors": [ { "affiliation": null, "fullName": "David Ebert", "givenName": "David", "surname": "Ebert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Fisher", "givenName": "Brian", "surname": "Fisher", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paul Kantor", "givenName": "Paul", "surname": "Kantor", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carolyn Watters", "givenName": "Carolyn", "surname": "Watters", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2013-01-01T00:00:00", "pubType": "proceedings", "pages": "1484", "year": "2013", "issn": "1530-1605", "isbn": "978-1-4673-5933-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4892b483", "articleId": "12OmNyQGRUr", "__typename": "AdjacentArticleType" }, "next": { "fno": "4892b485", "articleId": "12OmNCgrD1q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367b138", "title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b495", "title": "A Role for Reasoning in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b495/12OmNqJ8tq4", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670e484", "title": "Introduction to Analytics and Decision Support for Ecosystems Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e484/12OmNvxsSS6", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367a845", "title": "Introduction to Analytics, Information Systems, and Decision Technologies for Sustainability Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367a845/12OmNwIYZDW", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b353", "title": "Introduction to Visualization and Analytics for Decision Support, Operational Management, and Scientific Discovery Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b353/12OmNxEjYb7", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b426", "title": "Introduction to the Minitrack on Interactive Visual Decision Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b426/12OmNzWfoUn", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04438747", "title": "Minitrack Introduction", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04438747/12OmNzd7bMC", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121972", "title": "Decision Exploration Lab: A Visual Analytics Solution for Decision Management", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121972/13rRUxYINfa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585665", "title": "The Anchoring Effect in Decision-Making with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585665/17D45WZZ7CL", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyYm2wy", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEjYb7", "doi": "10.1109/HICSS.2014.174", "title": "Introduction to Visualization and Analytics for Decision Support, Operational Management, and Scientific Discovery Minitrack", "normalizedTitle": "Introduction to Visualization and Analytics for Decision Support, Operational Management, and Scientific Discovery Minitrack", "abstract": "The topic of this minitrack will have applications in a broad range of situations where human expertise must be brought to bear on problems characterized by massive datasets and data that are uncertain in fact, relevance, location in space and position in time. Examples include environmental science and technologies, natural resources and energy, health and related life sciences, safety and security (aircraft safety, law enforcement, antiterrorism, disaster relief) and business processes. This year we focused on extending the areas of use to include a broader range of analytic tasks such as science and technology, public health, business intelligence, financial analysis, and other domains where interactive visualization systems may be used to improve human decision making.", "abstracts": [ { "abstractType": "Regular", "content": "The topic of this minitrack will have applications in a broad range of situations where human expertise must be brought to bear on problems characterized by massive datasets and data that are uncertain in fact, relevance, location in space and position in time. Examples include environmental science and technologies, natural resources and energy, health and related life sciences, safety and security (aircraft safety, law enforcement, antiterrorism, disaster relief) and business processes. This year we focused on extending the areas of use to include a broader range of analytic tasks such as science and technology, public health, business intelligence, financial analysis, and other domains where interactive visualization systems may be used to improve human decision making.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The topic of this minitrack will have applications in a broad range of situations where human expertise must be brought to bear on problems characterized by massive datasets and data that are uncertain in fact, relevance, location in space and position in time. Examples include environmental science and technologies, natural resources and energy, health and related life sciences, safety and security (aircraft safety, law enforcement, antiterrorism, disaster relief) and business processes. This year we focused on extending the areas of use to include a broader range of analytic tasks such as science and technology, public health, business intelligence, financial analysis, and other domains where interactive visualization systems may be used to improve human decision making.", "fno": "2504b353", "keywords": [ "Visual Analytics", "Educational Institutions", "Safety", "Data Visualization", "Decision Making" ], "authors": [ { "affiliation": "Purdue Univ., West Lafayette, IN, USA", "fullName": "David S. Ebert", "givenName": "David S.", "surname": "Ebert", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Stuttgart, Stuttgart, Germany", "fullName": "Thomas Ertl", "givenName": "Thomas", "surname": "Ertl", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Texas, Dallas, TX, USA", "fullName": "Kelly Gaither", "givenName": "Kelly", "surname": "Gaither", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2014-01-01T00:00:00", "pubType": "proceedings", "pages": "1353-1353", "year": "2014", "issn": null, "isbn": "978-1-4799-2504-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2504b344", "articleId": "12OmNA0vnYS", "__typename": "AdjacentArticleType" }, "next": { "fno": "2504b354", "articleId": "12OmNAIvcZO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892b484", "title": "Introduction to Decision Support and Operational Management Analytics Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b484/12OmNqN6R1X", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400529", "title": "VAST Challenge 2012: Visual analytics for big data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400529/12OmNwlqhST", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04439096", "title": "Minitrack Introduction", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439096/12OmNwuvrY4", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b426", "title": "Introduction to the Minitrack on Interactive Visual Decision Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b426/12OmNzWfoUn", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/05/mcg2014050052", "title": "A Visual-Analytics System for Railway Safety Management", "doi": null, "abstractUrl": "/magazine/cg/2014/05/mcg2014050052/13rRUxCRFQk", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121972", "title": "Decision Exploration Lab: A Visual Analytics Solution for Decision Management", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121972/13rRUxYINfa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000b565", "title": "MeDIAR: Multi-Drug Adverse Reactions Analytics", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000b565/14Fq0V7LOyF", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvisp/2021/0770/0/077000a296", "title": "Visual Analytics for the International Trade", "doi": null, "abstractUrl": "/proceedings-article/icvisp/2021/077000a296/1APq2QCw3n2", "parentPublication": { "id": "proceedings/icvisp/2021/0770/0", "title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805467", "title": "Designing for Mobile and Immersive Visual Analytics in the Field", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805467/1cG4z3ZA4k8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirC", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45WZZ7CL", "doi": "10.1109/VAST.2017.8585665", "title": "The Anchoring Effect in Decision-Making with Visual Analytics", "normalizedTitle": "The Anchoring Effect in Decision-Making with Visual Analytics", "abstract": "Anchoring effect is the tendency to focus too heavily on one piece of information when making decisions. In this paper, we present a novel, systematic study and resulting analyses that investigate the effects of anchoring effect on human decision-making using visual analytic systems. Visual analytics interfaces typically contain multiple views that present various aspects of information such as spatial, temporal, and categorical. These views are designed to present complex, heterogeneous data in accessible forms that aid decision-making. However, human decision-making is often hindered by the use of heuristics, or cognitive biases, such as anchoring effect. Anchoring effect can be triggered by the order in which information is presented or the magnitude of information presented. Through carefully designed laboratory experiments, we present evidence of anchoring effect in analysis with visual analytics interfaces when users are primed by representation of different pieces of information. We also describe detailed analyses of users&#x2019; interaction logs which reveal the impact of anchoring bias on the visual representation preferred and paths of analysis. We discuss implications for future research to possibly detect and alleviate anchoring bias.", "abstracts": [ { "abstractType": "Regular", "content": "Anchoring effect is the tendency to focus too heavily on one piece of information when making decisions. In this paper, we present a novel, systematic study and resulting analyses that investigate the effects of anchoring effect on human decision-making using visual analytic systems. Visual analytics interfaces typically contain multiple views that present various aspects of information such as spatial, temporal, and categorical. These views are designed to present complex, heterogeneous data in accessible forms that aid decision-making. However, human decision-making is often hindered by the use of heuristics, or cognitive biases, such as anchoring effect. Anchoring effect can be triggered by the order in which information is presented or the magnitude of information presented. Through carefully designed laboratory experiments, we present evidence of anchoring effect in analysis with visual analytics interfaces when users are primed by representation of different pieces of information. We also describe detailed analyses of users&#x2019; interaction logs which reveal the impact of anchoring bias on the visual representation preferred and paths of analysis. We discuss implications for future research to possibly detect and alleviate anchoring bias.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Anchoring effect is the tendency to focus too heavily on one piece of information when making decisions. In this paper, we present a novel, systematic study and resulting analyses that investigate the effects of anchoring effect on human decision-making using visual analytic systems. Visual analytics interfaces typically contain multiple views that present various aspects of information such as spatial, temporal, and categorical. These views are designed to present complex, heterogeneous data in accessible forms that aid decision-making. However, human decision-making is often hindered by the use of heuristics, or cognitive biases, such as anchoring effect. Anchoring effect can be triggered by the order in which information is presented or the magnitude of information presented. Through carefully designed laboratory experiments, we present evidence of anchoring effect in analysis with visual analytics interfaces when users are primed by representation of different pieces of information. We also describe detailed analyses of users’ interaction logs which reveal the impact of anchoring bias on the visual representation preferred and paths of analysis. We discuss implications for future research to possibly detect and alleviate anchoring bias.", "fno": "08585665", "keywords": [ "Cognition", "Data Analysis", "Data Visualisation", "Decision Making", "Anchoring Effect", "Visual Analytics Interfaces", "Anchoring Bias", "Human Decision Making", "Visual Analytic Systems", "Decision Making", "Heuristics", "Cognitive Biases", "Visual Representation", "Decision Making", "Visual Analytics", "Analytical Models", "Task Analysis", "Data Visualization", "Uncertainty", "Visual Analytics", "Anchoring Effect", "Sense Making", "Cognitive Bias", "Interaction Log Analysis", "K 6 1 Management Of Computing And Information Systems Project And People Management Life Cycle", "K 7 M The Computing Profession Miscellaneous Ethics" ], "authors": [ { "affiliation": "University of North Carolina at Charlotte", "fullName": "Isaac Cho", "givenName": "Isaac", "surname": "Cho", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina at Charlotte", "fullName": "Ryan Wesslen", "givenName": "Ryan", "surname": "Wesslen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina at Charlotte", "fullName": "Alireza Karduni", "givenName": "Alireza", "surname": "Karduni", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina at Charlotte", "fullName": "Sashank Santhanam", "givenName": "Sashank", "surname": "Santhanam", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina at Charlotte", "fullName": "Samira Shaikh", "givenName": "Samira", "surname": "Shaikh", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina at Charlotte", "fullName": "Wenwen Dou", "givenName": "Wenwen", "surname": "Dou", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "116-126", "year": "2017", "issn": null, "isbn": "978-1-5386-3163-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08585669", "articleId": "17D45X0yjSw", "__typename": "AdjacentArticleType" }, "next": { "fno": "08585505", "articleId": "17D45XzbnJr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367b138", "title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042525", "title": "Towards a tighter coupling of visualization and public policy making", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042525/12OmNBr4eyt", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b484", "title": "Introduction to Decision Support and Operational Management Analytics Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b484/12OmNqN6R1X", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a876", "title": "Kansei/Affective Decision Making", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a876/12OmNxH9XeS", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b426", "title": "Introduction to the Minitrack on Interactive Visual Decision Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b426/12OmNzWfoUn", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08022891", "title": "Priming and Anchoring Effects in Visualization", "doi": null, "abstractUrl": "/journal/tg/2018/01/08022891/13rRUwbaqLz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121972", "title": "Decision Exploration Lab: A Visual Analytics Solution for Decision Management", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121972/13rRUxYINfa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805420", "title": "FairSight: Visual Analytics for Fairness in Decision Making", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805420/1cG4psmkNQA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a014", "title": "Making and Trusting Decisions in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a014/1yQB6h3HL6o", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1APq29uUhdm", "title": "2021 5th International Conference on Vision, Image and Signal Processing (ICVISP)", "acronym": "icvisp", "groupId": "1823144", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1APq2QCw3n2", "doi": "10.1109/ICVISP54630.2021.00059", "title": "Visual Analytics for the International Trade", "normalizedTitle": "Visual Analytics for the International Trade", "abstract": "International trade brings more and more attention to the public. Understanding the trade behaviour is essential for the policy makers as well as business leaders for decision making. Since the trade events are numerous and complex, it is challenging for people to catch up with the trade transactions let alone decision making. This paper applies the visualization techniques to show the trade trends and behaviours. With the visualization interface, it is much clear to understand the international trade and catch the significant trends. In addition, we also analyse the behaviour via mathematical modelling and data mining techniques. Our work assists a lot for government and business leaders to discover the trade patterns and make decisions.", "abstracts": [ { "abstractType": "Regular", "content": "International trade brings more and more attention to the public. Understanding the trade behaviour is essential for the policy makers as well as business leaders for decision making. Since the trade events are numerous and complex, it is challenging for people to catch up with the trade transactions let alone decision making. This paper applies the visualization techniques to show the trade trends and behaviours. With the visualization interface, it is much clear to understand the international trade and catch the significant trends. In addition, we also analyse the behaviour via mathematical modelling and data mining techniques. Our work assists a lot for government and business leaders to discover the trade patterns and make decisions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "International trade brings more and more attention to the public. Understanding the trade behaviour is essential for the policy makers as well as business leaders for decision making. Since the trade events are numerous and complex, it is challenging for people to catch up with the trade transactions let alone decision making. This paper applies the visualization techniques to show the trade trends and behaviours. With the visualization interface, it is much clear to understand the international trade and catch the significant trends. In addition, we also analyse the behaviour via mathematical modelling and data mining techniques. Our work assists a lot for government and business leaders to discover the trade patterns and make decisions.", "fno": "077000a296", "keywords": [ "Data Mining", "Data Visualisation", "Decision Making", "International Trade", "Trade Events", "Trade Transactions", "Decision Making", "Visualization Techniques", "Trade Trends", "Visualization Interface", "International Trade", "Business Leaders", "Trade Patterns", "Visual Analytics", "Trade Behaviour", "International Trade", "Visual Analytics", "Decision Making", "Government", "Data Visualization", "Signal Processing", "Market Research", "International Trade", "Visual Analytics" ], "authors": [ { "affiliation": "Shenzhen College of International Education,Shenzhen,China", "fullName": "Haowen Jiang", "givenName": "Haowen", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Wlsa Shanghai Academy,Shanghai,China", "fullName": "Jiadong Shen", "givenName": "Jiadong", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": "Stockholm School of Economics,Stockholm,Sweden", "fullName": "Qiujie Chou", "givenName": "Qiujie", "surname": "Chou", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi’an Jiaotong-liverpool Unversity,Suzhou,China", "fullName": "Ziling Dong", "givenName": "Ziling", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "Westlake University,Hangzhou,China", "fullName": "Shenghui Cheng", "givenName": "Shenghui", "surname": "Cheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvisp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "296-301", "year": "2021", "issn": null, "isbn": "978-1-6654-0770-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "077000a292", "articleId": "1APq6jAP5Wo", "__typename": "AdjacentArticleType" }, "next": { "fno": "077000a302", "articleId": "1APq6FQ40XS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ssme/2009/3729/0/3729a325", "title": "A Novel Fuzzy Evolutionary Algorithm for Forecasting of International Trade in Dynamical Environment", "doi": null, "abstractUrl": "/proceedings-article/ssme/2009/3729a325/12OmNApLGGQ", "parentPublication": { "id": "proceedings/ssme/2009/3729/0", "title": "2009 IITA International Conference on Services Science, Management and Engineering (SSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issst/2011/394/0/05936853", "title": "Your scrap, my scrap! The flow of scrap materials through international trade", "doi": null, "abstractUrl": "/proceedings-article/issst/2011/05936853/12OmNs0TKWU", "parentPublication": { "id": "proceedings/issst/2011/394/0", "title": "2011 IEEE International Symposium on Sustainable Systems and Technology (ISSST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2009/3876/3/3876c038", "title": "Can Trade and Foreign Direct Investment Signals Reduce International Conflicts?", "doi": null, "abstractUrl": "/proceedings-article/iciii/2009/3876c038/12OmNvlPkEI", "parentPublication": { "id": "proceedings/iciii/2009/3876/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2008/3366/0/3366a189", "title": "On the Legal Status of Electronic Agent in International Trade", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2008/3366a189/12OmNxFaLeO", "parentPublication": { "id": "proceedings/icmecg/2008/3366/0", "title": "Management of e-Commerce and e-Government, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcgin/2012/4854/0/4854a414", "title": "Study on the Construction of the Virtual International Trade Center", "doi": null, "abstractUrl": "/proceedings-article/bcgin/2012/4854a414/12OmNxbEtGY", "parentPublication": { "id": "proceedings/bcgin/2012/4854/0", "title": "2012 Second International Conference on Business Computing and Global Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2015/0464/0/0464a282", "title": "Design and Implementation of the International Trade Settlement System", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2015/0464a282/12OmNxwENoj", "parentPublication": { "id": "proceedings/icitbs/2015/0464/0", "title": "2015 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2010/4279/3/4279c108", "title": "The New Structure of International Trade Transactions Under the E-commerce Environment", "doi": null, "abstractUrl": "/proceedings-article/iciii/2010/4279c108/12OmNznCl3p", "parentPublication": { "id": "proceedings/iciii/2010/4279/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/11/mco2013110010", "title": "Understanding US Trade Controls", "doi": null, "abstractUrl": "/magazine/co/2013/11/mco2013110010/13rRUx0xPPb", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdeim/2021/8288/0/828800a520", "title": "Research on the Transformation of Traditional Foreign Trade Enterprises to Cross-Border ECommerce", "doi": null, "abstractUrl": "/proceedings-article/bdeim/2021/828800a520/1B4mrszBIRO", "parentPublication": { "id": "proceedings/bdeim/2021/8288/0", "title": "2021 2nd International Conference on Big Data Economy and Information Management (BDEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a936", "title": "Political Polarization and International Trade: Empirical evidence from EU countries", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a936/1tV9gqY6Arm", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6heLU2nNS", "doi": "10.1109/VIS54862.2022.00031", "title": "Toward Systematic Considerations of Missingness in Visual Analytics", "normalizedTitle": "Toward Systematic Considerations of Missingness in Visual Analytics", "abstract": "Data-driven decision making has been a common task in today&#x0027;s big data era, from simple choices such as finding a fast way to drive home, to complex decisions on medical treatment. It is often supported by visual analytics. For various reasons (e.g., system failure, interrupted network, intentional information hiding, or bias), visual analytics for sensemaking of data involves missingness (e.g., data loss and incomplete analysis), which impacts human decisions. For example, missing data can cost a business millions of dollars, and failing to recognize key evidence can put an innocent person in jail. Being aware of missingness is critical to avoid such catastrophes. To fulfill this, as an initial step, we consider missingness in visual analytics from two aspects: data-centric and human-centric. The former emphasizes missingness in three data-related categories: data composition, data relationship, and data usage. The latter focuses on the human-perceived missingness at three levels: observed-level, inferred-level, and ignored-level. Based on them, we discuss possible roles of visualizations for handling missingness, and conclude our discussion with future research opportunities.", "abstracts": [ { "abstractType": "Regular", "content": "Data-driven decision making has been a common task in today&#x0027;s big data era, from simple choices such as finding a fast way to drive home, to complex decisions on medical treatment. It is often supported by visual analytics. For various reasons (e.g., system failure, interrupted network, intentional information hiding, or bias), visual analytics for sensemaking of data involves missingness (e.g., data loss and incomplete analysis), which impacts human decisions. For example, missing data can cost a business millions of dollars, and failing to recognize key evidence can put an innocent person in jail. Being aware of missingness is critical to avoid such catastrophes. To fulfill this, as an initial step, we consider missingness in visual analytics from two aspects: data-centric and human-centric. The former emphasizes missingness in three data-related categories: data composition, data relationship, and data usage. The latter focuses on the human-perceived missingness at three levels: observed-level, inferred-level, and ignored-level. Based on them, we discuss possible roles of visualizations for handling missingness, and conclude our discussion with future research opportunities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data-driven decision making has been a common task in today's big data era, from simple choices such as finding a fast way to drive home, to complex decisions on medical treatment. It is often supported by visual analytics. For various reasons (e.g., system failure, interrupted network, intentional information hiding, or bias), visual analytics for sensemaking of data involves missingness (e.g., data loss and incomplete analysis), which impacts human decisions. For example, missing data can cost a business millions of dollars, and failing to recognize key evidence can put an innocent person in jail. Being aware of missingness is critical to avoid such catastrophes. To fulfill this, as an initial step, we consider missingness in visual analytics from two aspects: data-centric and human-centric. The former emphasizes missingness in three data-related categories: data composition, data relationship, and data usage. The latter focuses on the human-perceived missingness at three levels: observed-level, inferred-level, and ignored-level. Based on them, we discuss possible roles of visualizations for handling missingness, and conclude our discussion with future research opportunities.", "fno": "881200a110", "keywords": [ "Big Data", "Data Analysis", "Data Visualisation", "Decision Making", "Inference Mechanisms", "Big Data Era", "Complex Decisions", "Data Composition", "Data Loss", "Data Relationship", "Data Usage", "Data Centric", "Data Driven Decision Making", "Data Related Categories", "Human Decisions", "Human Perceived Missingness", "Visual Analytics", "Systematics", "Costs", "Visual Analytics", "Decision Making", "Data Visualization", "Medical Treatment", "Big Data", "Missingness", "Missing Data Visualization", "Sensemaking", "Visual Analytics" ], "authors": [ { "affiliation": "Northern Illinois University", "fullName": "Maoyuan Sun", "givenName": "Maoyuan", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "Northern Illinois University", "fullName": "Yue Ma", "givenName": "Yue", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo", "fullName": "Yuanxin Wang", "givenName": "Yuanxin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Tianyi Li", "givenName": "Tianyi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Waterloo", "fullName": "Jian Zhao", "givenName": "Jian", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Northern Illinois University", "fullName": "Yujun Liu", "givenName": "Yujun", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois Chicago", "fullName": "Ping-Shou Zhong", "givenName": "Ping-Shou", "surname": "Zhong", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "110-114", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "881200a105", "articleId": "1J6hb8c5Zde", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a115", "articleId": "1J6h8Kn3Bq8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400514", "title": "Big data exploration through visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400514/12OmNC3XhwY", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc/2016/4297/0/07828556", "title": "Agile Visual Analytics in Data Science Systems", "doi": null, "abstractUrl": "/proceedings-article/hpcc/2016/07828556/12OmNyPQ4Qw", "parentPublication": { "id": "proceedings/hpcc/2016/4297/0", "title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870211", "title": "A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870211/12OmNz5apw2", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/08/mco2013080090", "title": "Bixplorer: Visual Analytics with Biclusters", "doi": null, "abstractUrl": "/magazine/co/2013/08/mco2013080090/13rRUwcAqvs", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/02/mcg2014020026", "title": "DIVE: A Graph-Based Visual-Analytics Framework for Big Data", "doi": null, "abstractUrl": "/magazine/cg/2014/02/mcg2014020026/13rRUwh80Jb", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070030", "title": "Visual Analytics Support for Intelligence Analysis", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070030/13rRUxD9h0P", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/02/mcg2009020084", "title": "Demystifying Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2009/02/mcg2009020084/13rRUy3gn3z", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a105", "title": "Toward Systematic Design Considerations of Organizing Multiple Views", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a105/1J6hb8c5Zde", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a307", "title": "Visual Analytics for Systematic Reviews According to PRISMA", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a307/1KaH2y7YJ44", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a063", "title": "Visual Analytics to Support Industrial Vehicle Fleet Planning", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a063/1y4oKeqVIrK", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yQB4Fmf7vq", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yQB6h3HL6o", "doi": "10.1109/TREX53765.2021.00008", "title": "Making and Trusting Decisions in Visual Analytics", "normalizedTitle": "Making and Trusting Decisions in Visual Analytics", "abstract": "Decision making and trust have both become rising topics in the research community of Visual Analytics (VA). Many efforts have been made to understand and facilitate making decisions with VA, as well as build and calibrate trust. However, previous research largely took VA as a tool to facilitate decision making, but did not explore the possibility to dissect each analytical step in VA as decision making and discuss how decision making theories can be utilized to improve the trustworthiness of decisions in VA. Therefore, this paper instead proposes such alternative take on the relation between decision making and VA, inspects the processes of visually analyzing data as decision making, and discusses how to leverage decision making theories to facilitate trustworthy decision making in VA.", "abstracts": [ { "abstractType": "Regular", "content": "Decision making and trust have both become rising topics in the research community of Visual Analytics (VA). Many efforts have been made to understand and facilitate making decisions with VA, as well as build and calibrate trust. However, previous research largely took VA as a tool to facilitate decision making, but did not explore the possibility to dissect each analytical step in VA as decision making and discuss how decision making theories can be utilized to improve the trustworthiness of decisions in VA. Therefore, this paper instead proposes such alternative take on the relation between decision making and VA, inspects the processes of visually analyzing data as decision making, and discusses how to leverage decision making theories to facilitate trustworthy decision making in VA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Decision making and trust have both become rising topics in the research community of Visual Analytics (VA). Many efforts have been made to understand and facilitate making decisions with VA, as well as build and calibrate trust. However, previous research largely took VA as a tool to facilitate decision making, but did not explore the possibility to dissect each analytical step in VA as decision making and discuss how decision making theories can be utilized to improve the trustworthiness of decisions in VA. Therefore, this paper instead proposes such alternative take on the relation between decision making and VA, inspects the processes of visually analyzing data as decision making, and discusses how to leverage decision making theories to facilitate trustworthy decision making in VA.", "fno": "181700a014", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Making", "VA", "Visual Analytics", "Decision Making Theories", "Leverage Decision", "Trustworthy Decision", "Human Computer Interaction", "Analytical Models", "Visual Analytics", "Design Methodology", "Conferences", "Computational Modeling", "Decision Making", "Human Centered Computing", "Visualization", "Visualization Theory", "Concepts And Paradigms", "HCI Theory", "Concepts And Models", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Aarhus University,Department of Computer Science", "fullName": "Wenkai Han", "givenName": "Wenkai", "surname": "Han", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "14-19", "year": "2021", "issn": null, "isbn": "978-1-6654-1817-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "181700a008", "articleId": "1yQB4TeSTT2", "__typename": "AdjacentArticleType" }, "next": { "fno": "181700a020", "articleId": "1yQB6xGERwI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/re/2013/5765/0/06636762", "title": "Visual analytics for software requirements engineering", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636762/12OmNrJ11yp", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/04/mcg2014040008", "title": "Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation", "doi": null, "abstractUrl": "/magazine/cg/2014/04/mcg2014040008/13rRUwwslv3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/02/mcg2015020016", "title": "Preparing Undergraduates for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/02/mcg2015020016/13rRUxjQyjN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/01/09693359", "title": "Visual Analytics for Human-Centered Machine Learning", "doi": null, "abstractUrl": "/magazine/cg/2022/01/09693359/1As7zEHCGn6", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09906559", "title": "In Defence of Visual Analytics Systems: Replies to Critics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09906559/1H5F2wJXT4Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805420", "title": "FairSight: Visual Analytics for Fairness in Decision Making", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805420/1cG4psmkNQA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a081", "title": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a081/1qROrjfqgSI", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19RSpV3wvxS", "title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "acronym": "sitis", "groupId": "1002425", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "19RSs6pULhm", "doi": "10.1109/SITIS.2018.00105", "title": "Path Opening for Hyperspectral Crack Detection of Cultural Heritage Paintings", "normalizedTitle": "Path Opening for Hyperspectral Crack Detection of Cultural Heritage Paintings", "abstract": "Crack formation in paintings is inevitable as they age, whether as a result of environment or mishandling. The ability to detect and quantify the degree to which cracks have formed would afford conservators a metric with which to assess the state of a painting and its rate of deterioration. Attempts to automate accurate crack detection in cultural heritage tend to struggle with the non-uniformity of the background, and simple morphological operators applied to grayscale images of paintings are seldom sufficient. This work investigates the extension of morphological operations (top-hat and path opening) into the hyperspectral domain to isolate long, thin structures and thereby extract a crack map from a hyperspectral image of painting. We assess the results with Intersection over Union (IoU) against a manually constructed ground truth of the crack map. We find that while IoU can give a reasonable indication of success, a visual inspection shows that workflow order has an effect on the number of false negative detections, and local contrast plays an important role in crack segmentation.", "abstracts": [ { "abstractType": "Regular", "content": "Crack formation in paintings is inevitable as they age, whether as a result of environment or mishandling. The ability to detect and quantify the degree to which cracks have formed would afford conservators a metric with which to assess the state of a painting and its rate of deterioration. Attempts to automate accurate crack detection in cultural heritage tend to struggle with the non-uniformity of the background, and simple morphological operators applied to grayscale images of paintings are seldom sufficient. This work investigates the extension of morphological operations (top-hat and path opening) into the hyperspectral domain to isolate long, thin structures and thereby extract a crack map from a hyperspectral image of painting. We assess the results with Intersection over Union (IoU) against a manually constructed ground truth of the crack map. We find that while IoU can give a reasonable indication of success, a visual inspection shows that workflow order has an effect on the number of false negative detections, and local contrast plays an important role in crack segmentation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Crack formation in paintings is inevitable as they age, whether as a result of environment or mishandling. The ability to detect and quantify the degree to which cracks have formed would afford conservators a metric with which to assess the state of a painting and its rate of deterioration. Attempts to automate accurate crack detection in cultural heritage tend to struggle with the non-uniformity of the background, and simple morphological operators applied to grayscale images of paintings are seldom sufficient. This work investigates the extension of morphological operations (top-hat and path opening) into the hyperspectral domain to isolate long, thin structures and thereby extract a crack map from a hyperspectral image of painting. We assess the results with Intersection over Union (IoU) against a manually constructed ground truth of the crack map. We find that while IoU can give a reasonable indication of success, a visual inspection shows that workflow order has an effect on the number of false negative detections, and local contrast plays an important role in crack segmentation.", "fno": "938500a651", "keywords": [ "Painting", "Hyperspectral Imaging", "Gray Scale", "Transforms", "Morphological Operations", "Detection Algorithms", "Cultural Differences", "Crack Detection", "Path Opening", "Mathematical Morphology", "Hyperspectral" ], "authors": [ { "affiliation": null, "fullName": "Tom Gillooly", "givenName": "Tom", "surname": "Gillooly", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hilda Deborah", "givenName": "Hilda", "surname": "Deborah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jon Yngve Hardeberg", "givenName": "Jon Yngve", "surname": "Hardeberg", "__typename": "ArticleAuthorType" } ], "idPrefix": "sitis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "651-657", "year": "2018", "issn": null, "isbn": "978-1-5386-9385-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "938500a645", "articleId": "19RSuWhyeLC", "__typename": "AdjacentArticleType" }, "next": { "fno": "938500a658", "articleId": "19RSvk88LjG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsip/2014/5100/0/5100a015", "title": "User Intervention Based Detection & Removal of Cracks from Digitized Paintings", "doi": null, "abstractUrl": "/proceedings-article/icsip/2014/5100a015/12OmNBNM8SX", "parentPublication": { "id": "proceedings/icsip/2014/5100/0", "title": "2014 Fifth International Conference on Signal and Image Processing (ICSIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icm/2011/4522/1/4522a375", "title": "Learning to Recognize the Art Style of Paintings Using Multi-cues", "doi": null, "abstractUrl": "/proceedings-article/icm/2011/4522a375/12OmNBU1jLy", "parentPublication": { "id": "icm/2011/4522/1", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2017/4283/0/4283a179", "title": "Classification and Aesthetic Evaluation of Paintings and Artworks", "doi": null, "abstractUrl": "/proceedings-article/sitis/2017/4283a179/12OmNrMHOnl", "parentPublication": { "id": "proceedings/sitis/2017/4283/0", "title": "2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmvit/2017/4993/0/07878716", "title": "Generation of Stereo Oil Paintings from RGBD Images", "doi": null, "abstractUrl": "/proceedings-article/cmvit/2017/07878716/12OmNxT56Bx", "parentPublication": { "id": "proceedings/cmvit/2017/4993/0", "title": "2017 International Conference on Machine Vision and Information Technology (CMVIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08113507", "title": "Animated Construction of Chinese Brush Paintings", "doi": null, "abstractUrl": "/journal/tg/2018/12/08113507/14H4WNjKxTa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snsp/2018/7413/0/741300a403", "title": "The Use of Spectroscopy for Non-destructive Determination of Authenticity of Chinese Calligraphy and Painting", "doi": null, "abstractUrl": "/proceedings-article/snsp/2018/741300a403/17D45X0yjRS", "parentPublication": { "id": "proceedings/snsp/2018/7413/0", "title": "2018 International Conference on Sensor Networks and Signal Processing (SNSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/5555/01/10079097", "title": "Generating Emotion Descriptions for Fine Art Paintings via Multiple Painting Representations", "doi": null, "abstractUrl": "/magazine/ex/5555/01/10079097/1LKsdalzz56", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2019/4284/0/428400a218", "title": "Research and Application of Chinese Paints Classification and Recognition for Identifying Hyperspectral Imaging Technology", "doi": null, "abstractUrl": "/proceedings-article/icicta/2019/428400a218/1hQqKsHJTk4", "parentPublication": { "id": "proceedings/icicta/2019/4284/0", "title": "2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2020/01/08678387", "title": "Evidence of Golden and Aesthetic Proportions in Colors of Paintings of the Prominent Artists", "doi": null, "abstractUrl": "/magazine/mu/2020/01/08678387/1iFLJoSyvPq", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i432", "title": "Painting Many Pasts: Synthesizing Time Lapse Videos of Paintings", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i432/1m3nu7jSK6Q", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1bXcRsIpmNi", "title": "2018 5th International Conference on Mathematics and Computers in Sciences and Industry (MCSI)", "acronym": "mcsi", "groupId": "1811864", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1bXcSdqh3Nu", "doi": "10.1109/MCSI.2018.00031", "title": "Making a Tactile Painting of the Painting &#x0022;Capturing Vasil Levski at the Kakrinsko Hanche&#x0022; for Blind Users", "normalizedTitle": "Making a Tactile Painting of the Painting \"Capturing Vasil Levski at the Kakrinsko Hanche\" for Blind Users", "abstract": "The work is focused on 3D modeling of objects of cultural and historical heritage, using 2D sources (paintings, icons, tapestries) and 3Dprinting of models with the addition of Braille symbols in the figures and Braille annotations for tactile (by touch) object. New technologies, such as 3D printing and 3D visualization, have become more and more popular lately, because these technologies could be used by blind people to \"see\" works they had no idea.", "abstracts": [ { "abstractType": "Regular", "content": "The work is focused on 3D modeling of objects of cultural and historical heritage, using 2D sources (paintings, icons, tapestries) and 3Dprinting of models with the addition of Braille symbols in the figures and Braille annotations for tactile (by touch) object. New technologies, such as 3D printing and 3D visualization, have become more and more popular lately, because these technologies could be used by blind people to \"see\" works they had no idea.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The work is focused on 3D modeling of objects of cultural and historical heritage, using 2D sources (paintings, icons, tapestries) and 3Dprinting of models with the addition of Braille symbols in the figures and Braille annotations for tactile (by touch) object. New technologies, such as 3D printing and 3D visualization, have become more and more popular lately, because these technologies could be used by blind people to \"see\" works they had no idea.", "fno": "750000a102", "keywords": [ "Data Visualisation", "History", "Three Dimensional Printing", "Touch Physiological", "Braille Symbols", "Blind People", "Tactile Painting", "Kakrinsko Hanche", "Cultural Heritage", "Historical Heritage", "Tapestries", "3 D Visualization", "3 D Printing", "2 D Sources", "Vasil Levski", "Three Dimensional Displays", "Blindness", "Printers", "Solid Modeling", "Painting", "Cultural Differences", "Three Dimensional Printing", "3 D Modeling", "3 D Scanning", "3 D Visualization", "Braille", "Tactile Plates" ], "authors": [ { "affiliation": "Institute of Information and Communication Technologies", "fullName": "Stanislav Gyoshev", "givenName": "Stanislav", "surname": "Gyoshev", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information and Communication Technologies", "fullName": "Dimitar Karastoyanov", "givenName": "Dimitar", "surname": "Karastoyanov", "__typename": "ArticleAuthorType" } ], "idPrefix": "mcsi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "102-104", "year": "2018", "issn": null, "isbn": "978-1-5386-7500-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "750000a095", "articleId": "1bXcSgJdrI4", "__typename": "AdjacentArticleType" }, "next": { "fno": "750000a105", "articleId": "1bXcS6oQogw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2011/0063/0/06130291", "title": "Automatic alignment of paintings and photographs depicting a 3D scene", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130291/12OmNBSBk5T", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a432", "title": "Making Linear Equations Accessible for Visually Impaired Students Using 3D Printing", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a432/12OmNqHItBg", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2014/3624/0/06798878", "title": "Poster: Applying tactile languages for 3D navigation", "doi": null, "abstractUrl": "/proceedings-article/3dui/2014/06798878/12OmNx0A7Mz", "parentPublication": { "id": "proceedings/3dui/2014/3624/0", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2017/4283/0/4283a465", "title": "Workflows and Challenges Involved in Creation of Realistic Immersive Virtual Museum, Heritage, and Tourism Experiences: A Comprehensive Reference for 3D Asset Capturing", "doi": null, "abstractUrl": "/proceedings-article/sitis/2017/4283a465/12OmNz2TCKo", "parentPublication": { "id": "proceedings/sitis/2017/4283/0", "title": "2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2013/5047/0/5047a139", "title": "Painting Based Cubic VR Also for CAVE and Spherical Screen Film", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2013/5047a139/12OmNzsrwgQ", "parentPublication": { "id": "proceedings/culture-computing/2013/5047/0", "title": "2013 International Conference on Culture and Computing (Culture Computing)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/09/08419282", "title": "High Relief from Brush Painting", "doi": null, "abstractUrl": "/journal/tg/2019/09/08419282/13rRUxcKzVn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121982", "title": "Vis4Heritage: Visual Analytics Approach on Grotto Wall Painting Degradations", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121982/13rRUy2YLT1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2017/4530/0/08487292", "title": "Development of Quality Management Strategies for 3D Printing Testing Methods – a Review", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2017/08487292/17D45VTRoAf", "parentPublication": { "id": "proceedings/apwc-on-cse/2017/4530/0", "title": "2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2018/7616/0/761600a205", "title": "A Method for Ink-Wash Painting Rendering for 3D Scenes", "doi": null, "abstractUrl": "/proceedings-article/icime/2018/761600a205/17D45WGGoLy", "parentPublication": { "id": "proceedings/icime/2018/7616/0", "title": "2018 International Joint Conference on Information, Media and Engineering (ICIME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscc/2022/8186/0/818600a286", "title": "3D Tactile Tiles Optimization for Blind and Visually Impaired People", "doi": null, "abstractUrl": "/proceedings-article/cscc/2022/818600a286/1KaFBg4DkJ2", "parentPublication": { "id": "proceedings/cscc/2022/8186/0", "title": "2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gyshXRzHpK", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gysk60HxPW", "doi": "10.1109/ISMAR-Adjunct.2019.00-67", "title": "Enhancing Rock Painting Tour Experience with Outdoor Augmented Reality", "normalizedTitle": "Enhancing Rock Painting Tour Experience with Outdoor Augmented Reality", "abstract": "The use of augmented reality technology is becoming a necessity of many cultural heritage sites to stay competitive and attractive to tourists. In this paper, we present an outdoor augmented reality guidance system for ancient rock painting aiming to enhance tourist experience and introduce the culture and historical background. We propose a two-stage approach that combines GPS and feature-based recognition methods. In the first stage, we build a navigation map in advance, which consists of the distribution information of major scenic spots, then visit these spots guided by GPS data on the standard smartphone. In the second stage, we adopt a feature-based recognition and tracking method to identify rock painting accurately and augment them with interactive contextual annotations like 3D textual labels, images, and videos. The reliability of this system is verified through on-site demonstrations - RockArt of the Helan Mountain, which is one of National Key Historical and Cultural Sites in China.", "abstracts": [ { "abstractType": "Regular", "content": "The use of augmented reality technology is becoming a necessity of many cultural heritage sites to stay competitive and attractive to tourists. In this paper, we present an outdoor augmented reality guidance system for ancient rock painting aiming to enhance tourist experience and introduce the culture and historical background. We propose a two-stage approach that combines GPS and feature-based recognition methods. In the first stage, we build a navigation map in advance, which consists of the distribution information of major scenic spots, then visit these spots guided by GPS data on the standard smartphone. In the second stage, we adopt a feature-based recognition and tracking method to identify rock painting accurately and augment them with interactive contextual annotations like 3D textual labels, images, and videos. The reliability of this system is verified through on-site demonstrations - RockArt of the Helan Mountain, which is one of National Key Historical and Cultural Sites in China.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of augmented reality technology is becoming a necessity of many cultural heritage sites to stay competitive and attractive to tourists. In this paper, we present an outdoor augmented reality guidance system for ancient rock painting aiming to enhance tourist experience and introduce the culture and historical background. We propose a two-stage approach that combines GPS and feature-based recognition methods. In the first stage, we build a navigation map in advance, which consists of the distribution information of major scenic spots, then visit these spots guided by GPS data on the standard smartphone. In the second stage, we adopt a feature-based recognition and tracking method to identify rock painting accurately and augment them with interactive contextual annotations like 3D textual labels, images, and videos. The reliability of this system is verified through on-site demonstrations - RockArt of the Helan Mountain, which is one of National Key Historical and Cultural Sites in China.", "fno": "476500a118", "keywords": [ "Augmented Reality", "Global Positioning System", "History", "Human Computer Interaction", "Image Annotation", "Image Recognition", "Interactive Systems", "Object Tracking", "Travel Industry", "Augmented Reality Technology", "Cultural Heritage Sites", "Outdoor Augmented Reality Guidance System", "Ancient Rock Painting", "Historical Background", "Two Stage Approach", "Feature Based Recognition Methods", "Navigation Map", "Distribution Information", "Scenic Spots", "GPS Data", "Tracking Method", "Cultural Sites", "On Site Demonstrations", "Rock Painting Tour Experience Enhancement", "Standard Smartphone", "Interactive Contextual Annotations", "3 D Textual Labels", "Rock Art", "Helan Mountain", "Painting", "Rocks", "Feature Extraction", "Cultural Differences", "Navigation", "Augmented Reality", "Ugmented Reality", "Historic Sites", "Outdoor Tour Guiding" ], "authors": [ { "affiliation": "Institute of Automation, Chinese Academy of Sciences, University of Chinese Academy of Sciences", "fullName": "Qi Zhang", "givenName": "Qi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Automation, Chinese Academy of Sciences", "fullName": "Xiaoyang Zhu", "givenName": "Xiaoyang", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Automation, Chinese Academy of Sciences", "fullName": "Haitao Yu", "givenName": "Haitao", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Automation, Chinese Academy of Sciences", "fullName": "Yongshi Jiang", "givenName": "Yongshi", "surname": "Jiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "118-121", "year": "2019", "issn": null, "isbn": "978-1-7281-4765-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "476500a114", "articleId": "1gyslcTPM2I", "__typename": "AdjacentArticleType" }, "next": { "fno": "476500a122", "articleId": "1gyslGAU3Ha", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dicta/2005/2467/0/24670073", "title": "Image Indexing and Retrieval for a Vietnamese Folk Paintings Gallery", "doi": null, "abstractUrl": "/proceedings-article/dicta/2005/24670073/12OmNBqv29i", "parentPublication": { "id": "proceedings/dicta/2005/2467/0", "title": "Digital Image Computing: Techniques and Applications (DICTA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004084", "title": "Digital Photo Painting as an Artistic and Cultural Phenomenon", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004084/12OmNvqEvQA", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2015/9393/0/9393a817", "title": "The Application of Ink Element in the Creation of Digital Image", "doi": null, "abstractUrl": "/proceedings-article/isdea/2015/9393a817/12OmNxHryik", "parentPublication": { "id": "proceedings/isdea/2015/9393/0", "title": "2015 Sixth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2012/4836/0/4836a013", "title": "An Automatic Rendering Method of Line Strokes for Chinese Landscape Painting", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2012/4836a013/12OmNy3RRF5", "parentPublication": { "id": "proceedings/icvrv/2012/4836/0", "title": "2012 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504776", "title": "A tour guiding system of historical relics based on augmented reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504776/12OmNy9Prks", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121982", "title": "Vis4Heritage: Visual Analytics Approach on Grotto Wall Painting Degradations", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121982/13rRUy2YLT1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fones-aiot/2021/1091/0/109100a280", "title": "The Inheritance Strategy of Intangible Cultural Heritage Based on Internet and Information Technolog -- Taking Wuhu Iron Painting as an Example", "doi": null, "abstractUrl": "/proceedings-article/fones-aiot/2021/109100a280/1CKQVH8Awdq", "parentPublication": { "id": "proceedings/fones-aiot/2021/1091/0", "title": "2021 International Conference on Forthcoming Networks and Sustainability in AIoT Era (FoNeS-AIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2018/7500/0/750000a102", "title": "Making a Tactile Painting of the Painting &#x0022;Capturing Vasil Levski at the Kakrinsko Hanche&#x0022; for Blind Users", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2018/750000a102/1bXcSdqh3Nu", "parentPublication": { "id": "proceedings/mcsi/2018/7500/0", "title": "2018 5th International Conference on Mathematics and Computers in Sciences and Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a381", "title": "Dream Back To HongMeng", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a381/1vg832O2NQk", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2021/2616/0/261600a122", "title": "Rock painting restoration method based on saliency detection and TV model", "doi": null, "abstractUrl": "/proceedings-article/iccea/2021/261600a122/1y4oDGPQr28", "parentPublication": { "id": "proceedings/iccea/2021/2616/0", "title": "2021 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1i5mkDyiIUg", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1i5mLfLkASI", "doi": "10.1109/ICCVW.2019.00182", "title": "End-to-End Partial Convolutions Neural Networks for Dunhuang Grottoes Wall-Painting Restoration", "normalizedTitle": "End-to-End Partial Convolutions Neural Networks for Dunhuang Grottoes Wall-Painting Restoration", "abstract": "In this paper, we focus on training a deep neural network to in-paint and restore the historical painting of Dunhuang Grottoes. Dunhuang Grottoes is more than 1000 years old and the wall-painting on the grottoes has suffered from various deterioration. The ground truth does not exist either. Furthermore, learning the style of the artists is not straight forward because the wall-paintings are created by thousands of artists over more 400-500 years. As the very first attempt to solve this problem, we propose an end-to-end image restoration model for Dunhuang wall-painting. The end-to-end image restoration model employ U-net with partially convoluational layers to construct, which is capable in restoring non-rigid deteriorated content given a loss content mask and a wall-painting image. To learn the various artists style from real data, the training set and validation set are collected by using a zooming-in-like and random cropping approach on the digital RGB images photographed on the healthy Grotto-painting. We also synthesize the deteriorated paintings from real data. To ensure the synthetic content in the masked region is consistent to the ground truths in term of texture, colors, artistic style and free of unnecessary noises, the loss function is in a hybrid form that comprises transition variation loss, content loss and style loss. Our contributions are of three folds: 1) proposed using partial convolutional U-net in restoring wall-paintings; 2) the method is tested in restoring highly non-rigid and irregular deteriorated regions; 3) two types of masks are designed for simulating deteriorations and experimental results are satisfactory.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we focus on training a deep neural network to in-paint and restore the historical painting of Dunhuang Grottoes. Dunhuang Grottoes is more than 1000 years old and the wall-painting on the grottoes has suffered from various deterioration. The ground truth does not exist either. Furthermore, learning the style of the artists is not straight forward because the wall-paintings are created by thousands of artists over more 400-500 years. As the very first attempt to solve this problem, we propose an end-to-end image restoration model for Dunhuang wall-painting. The end-to-end image restoration model employ U-net with partially convoluational layers to construct, which is capable in restoring non-rigid deteriorated content given a loss content mask and a wall-painting image. To learn the various artists style from real data, the training set and validation set are collected by using a zooming-in-like and random cropping approach on the digital RGB images photographed on the healthy Grotto-painting. We also synthesize the deteriorated paintings from real data. To ensure the synthetic content in the masked region is consistent to the ground truths in term of texture, colors, artistic style and free of unnecessary noises, the loss function is in a hybrid form that comprises transition variation loss, content loss and style loss. Our contributions are of three folds: 1) proposed using partial convolutional U-net in restoring wall-paintings; 2) the method is tested in restoring highly non-rigid and irregular deteriorated regions; 3) two types of masks are designed for simulating deteriorations and experimental results are satisfactory.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we focus on training a deep neural network to in-paint and restore the historical painting of Dunhuang Grottoes. Dunhuang Grottoes is more than 1000 years old and the wall-painting on the grottoes has suffered from various deterioration. The ground truth does not exist either. Furthermore, learning the style of the artists is not straight forward because the wall-paintings are created by thousands of artists over more 400-500 years. As the very first attempt to solve this problem, we propose an end-to-end image restoration model for Dunhuang wall-painting. The end-to-end image restoration model employ U-net with partially convoluational layers to construct, which is capable in restoring non-rigid deteriorated content given a loss content mask and a wall-painting image. To learn the various artists style from real data, the training set and validation set are collected by using a zooming-in-like and random cropping approach on the digital RGB images photographed on the healthy Grotto-painting. We also synthesize the deteriorated paintings from real data. To ensure the synthetic content in the masked region is consistent to the ground truths in term of texture, colors, artistic style and free of unnecessary noises, the loss function is in a hybrid form that comprises transition variation loss, content loss and style loss. Our contributions are of three folds: 1) proposed using partial convolutional U-net in restoring wall-paintings; 2) the method is tested in restoring highly non-rigid and irregular deteriorated regions; 3) two types of masks are designed for simulating deteriorations and experimental results are satisfactory.", "fno": "502300b447", "keywords": [ "Art", "Convolutional Neural Nets", "Feature Extraction", "Image Colour Analysis", "Image Restoration", "Learning Artificial Intelligence", "End To End Image Restoration Model", "Loss Content Mask", "Dunhuang Wall Painting", "Historical Painting", "Deep Neural Network", "Dunhuang Grottoes Wall Painting Restoration", "End To End Partial Convolutions Neural Networks", "Partial Convolutional U Net", "Artistic Style", "Ground Truth", "Artists Style", "Wall Painting Image", "Time 1000 0 Year", "Time 400 0 Year To 500 0 Year", "Image Restoration", "Neural Networks", "Painting", "Training", "Decoding", "Image Color Analysis", "Shape", "Partial Convolutions", "End To End Neural Networks", "Wall Painting Restoration", "Hybrid Loss" ], "authors": [ { "affiliation": "Dunhuang Academy, Gansu, China", "fullName": "Tianxiu Yu", "givenName": "Tianxiu", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Jinan University, Guangdong, China", "fullName": "Cong Lin", "givenName": "Cong", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "Tianjin Medical University, Tianjin, China", "fullName": "Shijie Zhang", "givenName": "Shijie", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "corresponding author, CSIRO, Canberra, Australia", "fullName": "Shaodi You", "givenName": "Shaodi", "surname": "You", "__typename": "ArticleAuthorType" }, { "affiliation": "Dunhuang Academy, Gansu, China", "fullName": "Xiaohong Ding", "givenName": "Xiaohong", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": "Dunhuang Academy, Gansu, China", "fullName": "Jian Wu", "givenName": "Jian", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Tianjin University, Tianjin, China", "fullName": "Jiawan Zhang", "givenName": "Jiawan", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "1447-1455", "year": "2019", "issn": null, "isbn": "978-1-7281-5023-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "502300b437", "articleId": "1i5mLLmLBM4", "__typename": "AdjacentArticleType" }, "next": { "fno": "502300b456", "articleId": "1i5moX9dcxa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004071", "title": "Practice of Using Virtual Reconstruction in the Restoration of Monumental Painting of the Church of the Transfiguration of Our Saviour on Nereditsa Hill", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004071/12OmNvSbBtT", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004084", "title": "Digital Photo Painting as an Artistic and Cultural Phenomenon", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004084/12OmNvqEvQA", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2012/4836/0/4836a013", "title": "An Automatic Rendering Method of Line Strokes for Chinese Landscape Painting", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2012/4836a013/12OmNy3RRF5", "parentPublication": { "id": "proceedings/icvrv/2012/4836/0", "title": "2012 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a194", "title": "Adaptive Weighted Matching of Deep Convolutional Features for Painting Retrieval", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a194/12OmNzAoi0z", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460929", "title": "Towards automated classification of fine-art painting style: A comparative study", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460929/12OmNzkuKIM", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2006/09/i1361", "title": "Determination of the Method of Construction of 1650 B.C. Wall Paintings", "doi": null, "abstractUrl": "/journal/tp/2006/09/i1361/13rRUwbs2bY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/09/08419282", "title": "High Relief from Brush Painting", "doi": null, "abstractUrl": "/journal/tg/2019/09/08419282/13rRUxcKzVn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121982", "title": "Vis4Heritage: Visual Analytics Approach on Grotto Wall Painting Degradations", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121982/13rRUy2YLT1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icid/2020/1481/0/440500a287", "title": "Research on computer aided design of Furniture products based on Dunhuang Culture", "doi": null, "abstractUrl": "/proceedings-article/icid/2020/440500a287/1taFtmBooFy", "parentPublication": { "id": "proceedings/icid/2020/1481/0", "title": "2020 International Conference on Intelligent Design (ICID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413063", "title": "Attentional Wavelet Network for Traditional Chinese Painting Transfer", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413063/1tmjgT9yL4I", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuZUzq", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAWH9xf", "doi": "10.1109/ICDM.2016.0059", "title": "L-EnsNMF: Boosted Local Topic Discovery via Ensemble of Nonnegative Matrix Factorization", "normalizedTitle": "L-EnsNMF: Boosted Local Topic Discovery via Ensemble of Nonnegative Matrix Factorization", "abstract": "Nonnegative matrix factorization (NMF) has been widely applied in many domains. In document analysis, it has been increasingly used in topic modeling applications, where a set of underlying topics are revealed by a low-rank factor matrix from NMF. However, it is often the case that the resulting topics give only general topic information in the data, which tends not to convey much information. To tackle this problem, we propose a novel ensemble model of nonnegative matrix factorization for discovering high-quality local topics. Our method leverages the idea of an ensemble model, which has been successful in supervised learning, into an unsupervised topic modeling context. That is, our model successively performs NMF given a residual matrix obtained from previous stages and generates a sequence of topic sets. Our algorithm for updating the input matrix has novelty in two aspects. The first lies in utilizing the residual matrix inspired by a state-of-the-art gradient boosting model, and the second stems from applying a sophisticated local weighting scheme on the given matrix to enhance the locality of topics, which in turn delivers high-quality, focused topics of interest to users. We evaluate our proposed method by comparing it against other topic modeling methods, such as a few variants of NMF and latent Dirichlet allocation, in terms of various evaluation measures representing topic coherence, diversity, coverage, computing time, and so on. We also present qualitative evaluation on the topics discovered by our method using several real-world data sets.", "abstracts": [ { "abstractType": "Regular", "content": "Nonnegative matrix factorization (NMF) has been widely applied in many domains. In document analysis, it has been increasingly used in topic modeling applications, where a set of underlying topics are revealed by a low-rank factor matrix from NMF. However, it is often the case that the resulting topics give only general topic information in the data, which tends not to convey much information. To tackle this problem, we propose a novel ensemble model of nonnegative matrix factorization for discovering high-quality local topics. Our method leverages the idea of an ensemble model, which has been successful in supervised learning, into an unsupervised topic modeling context. That is, our model successively performs NMF given a residual matrix obtained from previous stages and generates a sequence of topic sets. Our algorithm for updating the input matrix has novelty in two aspects. The first lies in utilizing the residual matrix inspired by a state-of-the-art gradient boosting model, and the second stems from applying a sophisticated local weighting scheme on the given matrix to enhance the locality of topics, which in turn delivers high-quality, focused topics of interest to users. We evaluate our proposed method by comparing it against other topic modeling methods, such as a few variants of NMF and latent Dirichlet allocation, in terms of various evaluation measures representing topic coherence, diversity, coverage, computing time, and so on. We also present qualitative evaluation on the topics discovered by our method using several real-world data sets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nonnegative matrix factorization (NMF) has been widely applied in many domains. In document analysis, it has been increasingly used in topic modeling applications, where a set of underlying topics are revealed by a low-rank factor matrix from NMF. However, it is often the case that the resulting topics give only general topic information in the data, which tends not to convey much information. To tackle this problem, we propose a novel ensemble model of nonnegative matrix factorization for discovering high-quality local topics. Our method leverages the idea of an ensemble model, which has been successful in supervised learning, into an unsupervised topic modeling context. That is, our model successively performs NMF given a residual matrix obtained from previous stages and generates a sequence of topic sets. Our algorithm for updating the input matrix has novelty in two aspects. The first lies in utilizing the residual matrix inspired by a state-of-the-art gradient boosting model, and the second stems from applying a sophisticated local weighting scheme on the given matrix to enhance the locality of topics, which in turn delivers high-quality, focused topics of interest to users. We evaluate our proposed method by comparing it against other topic modeling methods, such as a few variants of NMF and latent Dirichlet allocation, in terms of various evaluation measures representing topic coherence, diversity, coverage, computing time, and so on. We also present qualitative evaluation on the topics discovered by our method using several real-world data sets.", "fno": "07837872", "keywords": [ "Gradient Methods", "Matrix Decomposition", "Text Analysis", "Unsupervised Learning", "L Ens NMF", "Boosted Local Topic Discovery Via Ensemble Of Nonnegative Matrix Factorization", "Document Analysis", "Low Rank Factor Matrix", "High Quality Local Topic Discovery", "Supervised Learning", "Unsupervised Topic Modeling", "Residual Matrix", "Gradient Boosting Model", "Local Weighting Scheme", "Latent Dirichlet Allocation", "Topic Coherence", "Topic Diversity", "Topic Coverage", "Topic Computing Time", "Qualitative Evaluation", "Standards", "Data Mining", "Boosting", "Data Models", "Context Modeling", "Context", "Matrix Decomposition", "Topic Modeling", "Ensemble Learning", "Matrix Factorization", "Gradient Boosting", "Local Weighting" ], "authors": [ { "affiliation": null, "fullName": "Sangho Suh", "givenName": "Sangho", "surname": "Suh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jaegul Choo", "givenName": "Jaegul", "surname": "Choo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Joonseok Lee", "givenName": "Joonseok", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chandan K. Reddy", "givenName": "Chandan K.", "surname": "Reddy", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "479-488", "year": "2016", "issn": "2374-8486", "isbn": "978-1-5090-5473-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07837871", "articleId": "12OmNB6UIdc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07837873", "articleId": "12OmNBJeyId", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2009/4442/0/05457714", "title": "Nonnegative Matrix Factorization with Gibbs Random Field modeling", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457714/12OmNBRbkpm", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206834", "title": "Nonnegative Matrix Factorization with Earth Mover's Distance metric", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206834/12OmNBTJIEV", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2009/2353/0/04959890", "title": "Weighted nonnegative matrix factorization", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04959890/12OmNqJq4wA", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2012/2310/0/06468564", "title": "Dual Locality Preserving Nonnegative Matrix Factorization for image analysis", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468564/12OmNx5GTWb", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/06/ttk2013061336", "title": "Nonnegative Matrix Factorization: A Comprehensive Review", "doi": null, "abstractUrl": "/journal/tk/2013/06/ttk2013061336/13rRUxcsYMp", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258332", "title": "Discovering dynamic patterns of urban space via semi-nonnegative matrix factorization", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258332/17D45VsBTXv", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2018/0169/0/016900a120", "title": "Class-Cone Based Nonnegative Matrix Factorization for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/cis/2018/016900a120/17D45VtKiyg", "parentPublication": { "id": "proceedings/cis/2018/0169/0", "title": "2018 14th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a045", "title": "A Novel Projective Nonnegative Matrix Factorization Based on Fisher Discriminant Analysis", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a045/1AUpLBggsyQ", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10102531", "title": "Constrained Nonnegative Matrix Factorization Based on Label Propagation for Data Representation", "doi": null, "abstractUrl": "/journal/ai/5555/01/10102531/1MkXXKNCANO", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/05/08913485", "title": "Generalized Separable Nonnegative Matrix Factorization", "doi": null, "abstractUrl": "/journal/tp/2021/05/08913485/1fh36IQ411u", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cpqjBXCukg", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF8cnyXfi", "doi": "10.1109/PacificVis.2019.00025", "title": "An Interactive Visual Analytics System for Incremental Classification Based on Semi-supervised Topic Modeling", "normalizedTitle": "An Interactive Visual Analytics System for Incremental Classification Based on Semi-supervised Topic Modeling", "abstract": "Text labeling for classification is a time-consuming and unintuitive process. Given an unannotated text collection, it is difficult for users to determine what label to create and how to label the initial training set for classification. Thus, we present an interactive visual analytics system for incremental text classification based on a semi-supervised topic modeling method, modified Gibbs sampling maximum entropy discrimination latent Dirichlet allocation (Gibbs MedLDA). Given a text collection, Gibbs MedLDA generates topics as a summary of the text collection. We design a scatter plot to display documents and topics simultaneously to show the topic information, and this helps users explore the text collection structurally and find labels for creating. After labeling documents, Gibbs MedLDA is applied to the text collection with labels again, and it generates both the topic and classification information. We also provide a scatter plot with the classifier boundary and a matrix view to present weights of classifiers. Users can iteratively label documents to refine each classifier. We evaluate our system via a user study with a benchmark corpus for text classification and case studies with two unannotated text collections.", "abstracts": [ { "abstractType": "Regular", "content": "Text labeling for classification is a time-consuming and unintuitive process. Given an unannotated text collection, it is difficult for users to determine what label to create and how to label the initial training set for classification. Thus, we present an interactive visual analytics system for incremental text classification based on a semi-supervised topic modeling method, modified Gibbs sampling maximum entropy discrimination latent Dirichlet allocation (Gibbs MedLDA). Given a text collection, Gibbs MedLDA generates topics as a summary of the text collection. We design a scatter plot to display documents and topics simultaneously to show the topic information, and this helps users explore the text collection structurally and find labels for creating. After labeling documents, Gibbs MedLDA is applied to the text collection with labels again, and it generates both the topic and classification information. We also provide a scatter plot with the classifier boundary and a matrix view to present weights of classifiers. Users can iteratively label documents to refine each classifier. We evaluate our system via a user study with a benchmark corpus for text classification and case studies with two unannotated text collections.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Text labeling for classification is a time-consuming and unintuitive process. Given an unannotated text collection, it is difficult for users to determine what label to create and how to label the initial training set for classification. Thus, we present an interactive visual analytics system for incremental text classification based on a semi-supervised topic modeling method, modified Gibbs sampling maximum entropy discrimination latent Dirichlet allocation (Gibbs MedLDA). Given a text collection, Gibbs MedLDA generates topics as a summary of the text collection. We design a scatter plot to display documents and topics simultaneously to show the topic information, and this helps users explore the text collection structurally and find labels for creating. After labeling documents, Gibbs MedLDA is applied to the text collection with labels again, and it generates both the topic and classification information. We also provide a scatter plot with the classifier boundary and a matrix view to present weights of classifiers. Users can iteratively label documents to refine each classifier. We evaluate our system via a user study with a benchmark corpus for text classification and case studies with two unannotated text collections.", "fno": "922600a148", "keywords": [ "Data Visualisation", "Entropy", "Pattern Classification", "Text Analysis", "Unsupervised Learning", "Gibbs Sampling Maximum Entropy Discrimination Latent Dirichlet Allocation", "Semisupervised Topic Modeling Method", "Incremental Text Classification", "Text Labeling", "Interactive Visual Analytics System", "Unannotated Text Collection", "Gibbs Med LDA", "Scatter Plot", "Labeling", "Task Analysis", "Adaptation Models", "Visual Analytics", "Analytical Models", "Machine Learning", "Topic Modeling", "Visual Analytics", "Text Classification" ], "authors": [ { "affiliation": "hejiang University", "fullName": "Yuyu Yan", "givenName": "Yuyu", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Yubo Tao", "givenName": "Yubo", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Sichen Jin", "givenName": "Sichen", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Jin Xu", "givenName": "Jin", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University", "fullName": "Hai Lin", "givenName": "Hai", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "148-157", "year": "2019", "issn": null, "isbn": "978-1-5386-9226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922600a127", "articleId": "1cMF7APYcEg", "__typename": "AdjacentArticleType" }, "next": { "fno": "922600a189", "articleId": "1cJ77TSgsOQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2017/3876/0/387601a453", "title": "Unsupervised Sentiment Classification: A Hybrid Sentiment-Topic Model Approach", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a453/12OmNvUaNqp", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a428", "title": "Semi-Supervised Sequence Labeling with Self-Learned Features", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a428/12OmNy49sPM", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2017/6029/0/07920977", "title": "Cluster-than-Label: Semi-Supervised Approach for Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/aina/2017/07920977/12OmNz6iOm5", "parentPublication": { "id": "proceedings/aina/2017/6029/0", "title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a101", "title": "SolarMap: Multifaceted Visual Analytics for Topic Exploration", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a101/12OmNzw8j1t", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019825", "title": "Progressive Learning of Topic Modeling Parameters: A Visual Analytics Framework", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019825/13rRUwghd9c", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070047", "title": "Real-Time Visual Analytics for Text Streams", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070047/13rRUxAStVJ", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093511", "title": "Unsupervised and Semi-Supervised Domain Adaptation for Action Recognition from Drones", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093511/1jPbihhDOak", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a477", "title": "Semi-supervised Emotion Recognition using Inconsistently Annotated Data", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a477/1kecIB0Q6Sk", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a012", "title": "Diagnosing Concept Drift with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a012/1q7jvQC41gs", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09516959", "title": "Explaining Semi-Supervised Text Alignment Through Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09516959/1watWWGYm8U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hrMyj7tm00", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hrMz9LdbzO", "doi": "10.1109/VAST47406.2019.8986922", "title": "TopicSifter: Interactive Search Space Reduction through Targeted Topic Modeling", "normalizedTitle": "TopicSifter: Interactive Search Space Reduction through Targeted Topic Modeling", "abstract": "Topic modeling is commonly used to analyze and understand large document collections. However, in practice, users want to focus on specific aspects or &#x201C;targets&#x201D; rather than the entire corpus. For example, given a large collection of documents, users may want only a smaller subset which more closely aligns with their interests, tasks, and domains. In particular, our paper focuses on large-scale document retrieval with high recall where any missed relevant documents can be critical. A simple keyword matching search is generally not effective nor efficient as 1) it is difficult to find a list of keyword queries that can cover the documents of interest before exploring the dataset, 2) some documents may not contain the exact keywords of interest but may still be highly relevant, and 3) some words have multiple meanings, which would result in irrelevant documents included in the retrieved subset. In this paper, we present TopicSifter, a visual analytics system for interactive search space reduction. Our system utilizes targeted topic modeling based on nonnegative matrix factorization and allows users to give relevance feedback in order to refine their target and guide the topic modeling to the most relevant results.", "abstracts": [ { "abstractType": "Regular", "content": "Topic modeling is commonly used to analyze and understand large document collections. However, in practice, users want to focus on specific aspects or &#x201C;targets&#x201D; rather than the entire corpus. For example, given a large collection of documents, users may want only a smaller subset which more closely aligns with their interests, tasks, and domains. In particular, our paper focuses on large-scale document retrieval with high recall where any missed relevant documents can be critical. A simple keyword matching search is generally not effective nor efficient as 1) it is difficult to find a list of keyword queries that can cover the documents of interest before exploring the dataset, 2) some documents may not contain the exact keywords of interest but may still be highly relevant, and 3) some words have multiple meanings, which would result in irrelevant documents included in the retrieved subset. In this paper, we present TopicSifter, a visual analytics system for interactive search space reduction. Our system utilizes targeted topic modeling based on nonnegative matrix factorization and allows users to give relevance feedback in order to refine their target and guide the topic modeling to the most relevant results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topic modeling is commonly used to analyze and understand large document collections. However, in practice, users want to focus on specific aspects or “targets” rather than the entire corpus. For example, given a large collection of documents, users may want only a smaller subset which more closely aligns with their interests, tasks, and domains. In particular, our paper focuses on large-scale document retrieval with high recall where any missed relevant documents can be critical. A simple keyword matching search is generally not effective nor efficient as 1) it is difficult to find a list of keyword queries that can cover the documents of interest before exploring the dataset, 2) some documents may not contain the exact keywords of interest but may still be highly relevant, and 3) some words have multiple meanings, which would result in irrelevant documents included in the retrieved subset. In this paper, we present TopicSifter, a visual analytics system for interactive search space reduction. Our system utilizes targeted topic modeling based on nonnegative matrix factorization and allows users to give relevance feedback in order to refine their target and guide the topic modeling to the most relevant results.", "fno": "08986922", "keywords": [ "Data Analysis", "Data Visualisation", "Document Handling", "Matrix Decomposition", "Query Processing", "Relevance Feedback", "Keyword Queries", "Irrelevant Documents", "Retrieved Subset", "Topic Sifter", "Interactive Search Space Reduction", "Targeted Topic Modeling", "Document Collections", "Large Scale Document Retrieval", "Missed Relevant Documents", "Simple Keyword Matching Search", "Computational Modeling", "Buildings", "Visual Analytics", "Search Problems", "Negative Feedback", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Visual Analytics", "Information Systems", "Information Retrieval", "Users And Interactive Retrieval", "Search Interfaces" ], "authors": [ { "affiliation": "Georgia Institute of Technology", "fullName": "Hannah Kim", "givenName": "Hannah", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Dongjin Choi", "givenName": "Dongjin", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Tech Research Institute", "fullName": "Barry Drake", "givenName": "Barry", "surname": "Drake", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Alex Endert", "givenName": "Alex", "surname": "Endert", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Haesun Park", "givenName": "Haesun", "surname": "Park", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "35-45", "year": "2019", "issn": null, "isbn": "978-1-7281-2284-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08986923", "articleId": "1hrMymbWchi", "__typename": "AdjacentArticleType" }, "next": { "fno": "08986948", "articleId": "1hrMzLOB0K4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042511", "title": "VisIRR: Visual analytics for information retrieval and recommendation with large-scale document data", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042511/12OmNASraHn", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113131", "title": "Measuring Opinion Relevance in Latent Topic Space", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113131/12OmNqJHFtg", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcc/2004/2108/1/210810314", "title": "Extracting New Topic Contents from Hidden Web Sites", "doi": null, "abstractUrl": "/proceedings-article/itcc/2004/210810314/12OmNvwC5wz", "parentPublication": { "id": "proceedings/itcc/2004/2108/2", "title": "Information Technology: Coding and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2012/4880/3/4880c195", "title": "Ranking Documents with Query-Topic Sensitivity", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2012/4880c195/12OmNwseEY5", "parentPublication": { "id": "proceedings/wi-iat/2012/4880/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a101", "title": "SolarMap: Multifaceted Visual Analytics for Topic Exploration", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a101/12OmNzw8j1t", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013121992", "title": "UTOPIAN: User-Driven Topic Modeling Based on Interactive Nonnegative Matrix Factorization", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013121992/13rRUIIVlcI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671416", "title": "Keyword-based Topic Modeling and Keyword Selection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671416/1A8hiUNoNkk", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802424", "title": "The Effect of Semantic Interaction on Foraging in Text Analysis", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802424/1cJ6XAJz7gc", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a148", "title": "An Interactive Visual Analytics System for Incremental Classification Based on Semi-supervised Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a148/1cMF8cnyXfi", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09039699", "title": "ArchiText: Interactive Hierarchical Topic Modeling", "doi": null, "abstractUrl": "/journal/tg/2021/09/09039699/1igS4Rezjr2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC1a", "title": "String Processing and Information Retrieval, International Symposium on", "acronym": "spire", "groupId": "1000726", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNAndin8", "doi": "10.1109/SPIRE.2000.878180", "title": "Experiment Analysis in Newspaper Topic Detection", "normalizedTitle": "Experiment Analysis in Newspaper Topic Detection", "abstract": "We present several methods for topic detection on newspaper articles, using either a general vocabulary or topic-specific vocabularies. Specific vocabularies are determined manually or statistically. In both cases, we aim at finding the most representative words of a topic. Several methods have been experimented, the first one is based on perplexity, this method achieves a 100% topic identification rate, on large test corpora, when the two first propositions are taken into account. Other methods are based on statistical counts and achieve 94% of identification on smaller test corpora. The major challenge of this work is to identify topics with only few words in order to be able, during speech recognition, to determine the best adequate language model.", "abstracts": [ { "abstractType": "Regular", "content": "We present several methods for topic detection on newspaper articles, using either a general vocabulary or topic-specific vocabularies. Specific vocabularies are determined manually or statistically. In both cases, we aim at finding the most representative words of a topic. Several methods have been experimented, the first one is based on perplexity, this method achieves a 100% topic identification rate, on large test corpora, when the two first propositions are taken into account. Other methods are based on statistical counts and achieve 94% of identification on smaller test corpora. The major challenge of this work is to identify topics with only few words in order to be able, during speech recognition, to determine the best adequate language model.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present several methods for topic detection on newspaper articles, using either a general vocabulary or topic-specific vocabularies. Specific vocabularies are determined manually or statistically. In both cases, we aim at finding the most representative words of a topic. Several methods have been experimented, the first one is based on perplexity, this method achieves a 100% topic identification rate, on large test corpora, when the two first propositions are taken into account. Other methods are based on statistical counts and achieve 94% of identification on smaller test corpora. The major challenge of this work is to identify topics with only few words in order to be able, during speech recognition, to determine the best adequate language model.", "fno": "07460055", "keywords": [ "Vocabulary Experiment Analysis Newspaper Topic Detection Vocabulary Perplexity Representative Words Statistical Counts Speech Recognition Language Model Large Test Corpora" ], "authors": [ { "affiliation": "LORIA INRIA-Lorraine, Vandoeuvre-les-Nancy, France", "fullName": "A. Brun", "givenName": "A.", "surname": "Brun", "__typename": "ArticleAuthorType" }, { "affiliation": "LORIA INRIA-Lorraine, Vandoeuvre-les-Nancy, France", "fullName": "K. Smaili", "givenName": "K.", "surname": "Smaili", "__typename": "ArticleAuthorType" }, { "affiliation": "LORIA INRIA-Lorraine, Vandoeuvre-les-Nancy, France", "fullName": "J.-P. Haton", "givenName": "J.-P.", "surname": "Haton", "__typename": "ArticleAuthorType" } ], "idPrefix": "spire", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-09-01T00:00:00", "pubType": "proceedings", "pages": "55", "year": "2000", "issn": null, "isbn": "0-7695-0746-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07460049", "articleId": "12OmNzayNdN", "__typename": "AdjacentArticleType" }, "next": { "fno": "07460065", "articleId": "12OmNx3Zjbr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXD8", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNArKSif", "doi": "10.1109/ICTAI.2011.162", "title": "TopicView: Visually Comparing Topic Models of Text Collections", "normalizedTitle": "TopicView: Visually Comparing Topic Models of Text Collections", "abstract": "We present Topic View, an application for visually comparing and exploring multiple models of text corpora. Topic View uses multiple linked views to visually analyze both the conceptual content and the document relationships in models generated using different algorithms. To illustrate Topic View, we apply it to models created using two standard approaches: Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA). Conceptual content is compared through the combination of (i) a bipartite graph matching LSA concepts with LDA topics based on the cosine similarities of model factors and (ii) a table containing the terms for each LSA concept and LDA topic listed in decreasing order of importance. Document relationships are examined through the combination of (i) side-by-side document similarity graphs, (ii) a table listing the weights for each document's contribution to each concept/topic, and (iii) a full text reader for documents selected in either of the graphs or the table. We demonstrate the utility of Topic View's visual approach to model assessment by comparing LSA and LDA models of two example corpora.", "abstracts": [ { "abstractType": "Regular", "content": "We present Topic View, an application for visually comparing and exploring multiple models of text corpora. Topic View uses multiple linked views to visually analyze both the conceptual content and the document relationships in models generated using different algorithms. To illustrate Topic View, we apply it to models created using two standard approaches: Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA). Conceptual content is compared through the combination of (i) a bipartite graph matching LSA concepts with LDA topics based on the cosine similarities of model factors and (ii) a table containing the terms for each LSA concept and LDA topic listed in decreasing order of importance. Document relationships are examined through the combination of (i) side-by-side document similarity graphs, (ii) a table listing the weights for each document's contribution to each concept/topic, and (iii) a full text reader for documents selected in either of the graphs or the table. We demonstrate the utility of Topic View's visual approach to model assessment by comparing LSA and LDA models of two example corpora.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present Topic View, an application for visually comparing and exploring multiple models of text corpora. Topic View uses multiple linked views to visually analyze both the conceptual content and the document relationships in models generated using different algorithms. To illustrate Topic View, we apply it to models created using two standard approaches: Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA). Conceptual content is compared through the combination of (i) a bipartite graph matching LSA concepts with LDA topics based on the cosine similarities of model factors and (ii) a table containing the terms for each LSA concept and LDA topic listed in decreasing order of importance. Document relationships are examined through the combination of (i) side-by-side document similarity graphs, (ii) a table listing the weights for each document's contribution to each concept/topic, and (iii) a full text reader for documents selected in either of the graphs or the table. We demonstrate the utility of Topic View's visual approach to model assessment by comparing LSA and LDA models of two example corpora.", "fno": "4596a936", "keywords": [ "Text Analysis", "Visual Model Analysis", "Latent Semantic Analysis", "Latent Dirichlet Allocation" ], "authors": [ { "affiliation": null, "fullName": "Patricia J. Crossno", "givenName": "Patricia J.", "surname": "Crossno", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew T. Wilson", "givenName": "Andrew T.", "surname": "Wilson", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Timothy M. Shead", "givenName": "Timothy M.", "surname": "Shead", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Daniel M. Dunlavy", "givenName": "Daniel M.", "surname": "Dunlavy", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "936-943", "year": "2011", "issn": "1082-3409", "isbn": "978-0-7695-4596-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4596a934", "articleId": "12OmNzTppCF", "__typename": "AdjacentArticleType" }, "next": { "fno": "4596a944", "articleId": "12OmNzSh17n", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/la-web/2008/3397/0/3397a023", "title": "A Comparative Analysis of Latent Variable Models for Web Page Classification", "doi": null, "abstractUrl": "/proceedings-article/la-web/2008/3397a023/12OmNAjO6Ez", "parentPublication": { "id": "proceedings/la-web/2008/3397/0", "title": "Web Congress, Latin American", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109a995", "title": "2LDA: Segmentation for Recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a995/12OmNBfZSku", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2010/8719/1/87190095", "title": "Software traceability with topic modeling", "doi": null, "abstractUrl": "/proceedings-article/icse/2010/87190095/12OmNrMZplW", "parentPublication": { "id": "proceedings/icse/2010/8719/1", "title": "Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2010/4178/0/4178a055", "title": "Validating the Use of Topic Models for Software Evolution", "doi": null, "abstractUrl": "/proceedings-article/scam/2010/4178a055/12OmNwIHoAd", "parentPublication": { "id": "proceedings/scam/2010/4178/0", "title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520b210", "title": "Searching OCR'ed Text: An LDA Based Approach", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520b210/12OmNxRF71X", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2012/4880/3/4880c306", "title": "Semi-Supervised Latent Dirichlet Allocation and Its Application for Document Classification", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2012/4880c306/12OmNy3149i", "parentPublication": { "id": "proceedings/wi-iat/2012/4880/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a711", "title": "Dirichlet Mixture Allocation for Multiclass Document Collections Modeling", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a711/12OmNyQYtum", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a148", "title": "Sequential Latent Dirichlet Allocation: Discover Underlying Topic Structures within a Document", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a148/12OmNzdGnxE", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/06/ttk2012061134", "title": "Weakly Supervised Joint Sentiment-Topic Detection from Text", "doi": null, "abstractUrl": "/journal/tk/2012/06/ttk2012061134/13rRUxDqS8I", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/05/ttp2013051121", "title": "Learning Topic Models by Belief Propagation", "doi": null, "abstractUrl": "/journal/tp/2013/05/ttp2013051121/13rRUygT7gz", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAI", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdoMCc", "doi": "10.1109/ICBK.2017.33", "title": "Incorporating Entity Correlation Knowledge into Topic Modeling", "normalizedTitle": "Incorporating Entity Correlation Knowledge into Topic Modeling", "abstract": "Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for exploring hidden topics in text corpora. Standard LDA model suffers the problem that the topic assignment of each word is independent and lacks the mechanism to utilize the rich prior background knowledge to learn semantically coherent topics. To address this problem, in this paper, we propose a model called Entity Correlation Latent Dirichlet Allocation (EC-LDA) by incorporating constraints derived from entity correlations as the prior knowledge into LDA topic model. Different from other knowledge-based topic models which extract the knowledge information directly from the train dataset itself or even from the human judgements, for our work, we take advantage of the prior knowledge from the external knowledge base (Freebase 1, in our experiment). Hence, our approach is more suitable to widely kinds of text corpora in different scenarios. We fit our proposed model using Gibbs sampling. Experiment results demonstrate the effectiveness of our model compared with standard LDA.", "abstracts": [ { "abstractType": "Regular", "content": "Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for exploring hidden topics in text corpora. Standard LDA model suffers the problem that the topic assignment of each word is independent and lacks the mechanism to utilize the rich prior background knowledge to learn semantically coherent topics. To address this problem, in this paper, we propose a model called Entity Correlation Latent Dirichlet Allocation (EC-LDA) by incorporating constraints derived from entity correlations as the prior knowledge into LDA topic model. Different from other knowledge-based topic models which extract the knowledge information directly from the train dataset itself or even from the human judgements, for our work, we take advantage of the prior knowledge from the external knowledge base (Freebase 1, in our experiment). Hence, our approach is more suitable to widely kinds of text corpora in different scenarios. We fit our proposed model using Gibbs sampling. Experiment results demonstrate the effectiveness of our model compared with standard LDA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for exploring hidden topics in text corpora. Standard LDA model suffers the problem that the topic assignment of each word is independent and lacks the mechanism to utilize the rich prior background knowledge to learn semantically coherent topics. To address this problem, in this paper, we propose a model called Entity Correlation Latent Dirichlet Allocation (EC-LDA) by incorporating constraints derived from entity correlations as the prior knowledge into LDA topic model. Different from other knowledge-based topic models which extract the knowledge information directly from the train dataset itself or even from the human judgements, for our work, we take advantage of the prior knowledge from the external knowledge base (Freebase 1, in our experiment). Hence, our approach is more suitable to widely kinds of text corpora in different scenarios. We fit our proposed model using Gibbs sampling. Experiment results demonstrate the effectiveness of our model compared with standard LDA.", "fno": "3120a254", "keywords": [ "Correlation", "Knowledge Based Systems", "Standards", "Computational Modeling", "Resource Management", "Mathematical Model", "Vocabulary", "Topic Model", "Entity Correlation", "Prior Knowledge", "Gibbs Sampling", "Knowledge Base" ], "authors": [ { "affiliation": null, "fullName": "Qilin Wang", "givenName": "Qilin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dandan Song", "givenName": "Dandan", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiuquan Li", "givenName": "Xiuquan", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "254-258", "year": "2017", "issn": null, "isbn": "978-1-5386-3120-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3120a248", "articleId": "12OmNxEjXSS", "__typename": "AdjacentArticleType" }, "next": { "fno": "3120a259", "articleId": "12OmNCfjeEj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2011/4596/0/4596a936", "title": "TopicView: Visually Comparing Topic Models of Text Collections", "doi": null, "abstractUrl": "/proceedings-article/ictai/2011/4596a936/12OmNArKSif", "parentPublication": { "id": "proceedings/ictai/2011/4596/0", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a420", "title": "Contextual-LDA: A Context Coherent Latent Topic Model for Mining Large Corpora", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a420/12OmNBqdr85", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2018/4408/0/440801a194", "title": "Selecting Priors for Latent Dirichlet Allocation", "doi": null, "abstractUrl": "/proceedings-article/icsc/2018/440801a194/12OmNBuL155", "parentPublication": { "id": "proceedings/icsc/2018/4408/0", "title": "2018 IEEE 12th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2008/3502/0/3502b031", "title": "A Non-parametric Approach to Pair-Wise Dynamic Topic Correlation Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502b031/12OmNwE9OLt", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2013/0015/0/06607531", "title": "Latent topic model for image annotation by modeling topic correlation", "doi": null, "abstractUrl": "/proceedings-article/icme/2013/06607531/12OmNwp74Kc", "parentPublication": { "id": "proceedings/icme/2013/0015/0", "title": "2013 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paap/2014/3845/0/3845a069", "title": "Topic-Sensitive Multi-document Summarization Algorithm", "doi": null, "abstractUrl": "/proceedings-article/paap/2014/3845a069/12OmNzYwcb2", "parentPublication": { "id": "proceedings/paap/2014/3845/0", "title": "2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/02/06780626", "title": "Latent IBP Compound Dirichlet Allocation", "doi": null, "abstractUrl": "/journal/tp/2015/02/06780626/13rRUwfZBWt", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2018/7232/0/723201a017", "title": "Incorporating Word Embedding into Cross-Lingual Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2018/723201a017/17D45XERmlm", "parentPublication": { "id": "proceedings/bigdata-congress/2018/7232/0", "title": "2018 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2021/3858/0/385800a315", "title": "Topic-Guided Knowledge Graph Construction for Argument Mining", "doi": null, "abstractUrl": "/proceedings-article/icbk/2021/385800a315/1A9X2Axq6K4", "parentPublication": { "id": "proceedings/icbk/2021/3858/0", "title": "2021 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194489", "title": "Knowledge Base Enhanced Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194489/1n2nknMtJzq", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9VchbY4Mw", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9VGSMpNYY", "doi": "10.1109/BIBM52615.2021.9669550", "title": "Text Fingerprinting and Topic Mining in the Prescription Opioid Use Literature", "normalizedTitle": "Text Fingerprinting and Topic Mining in the Prescription Opioid Use Literature", "abstract": "Prescription opioids are powerful pain-reducing medications. Thousands of articles that focus on prescription opioid use (POU) and its associated medical disorders have been published. However, it is time-consuming and labor-intensive to extract and understand the information of all POU-related published articles. In this study, we applied the well-adapted topic modeling method, Latent Dirichlet Allocation (LDA), to perform text mining on POU-related literature. We have collected six large academic abstract datasets by searching PubMed using the Medical Subject Headings (MeSH): prescription opioid, codeine, morphine, hydrocodone, oxycodone, and methadone. We then applied topic modeling to identify topics and analyze topic similarities/differences in these six datasets. Word clouds and histograms were used to depict the distribution of vocabularies over each topic in which the most prevalent words conveyed a topic&#x2019;s meaning. TreeMap and trend analysis were performed to fingerprint abstracts and explore the prevalent topic dynamics in the POU-related literature. Results showed the ability of topic modeling as a computational tool to segregate a vast quantity of articles into different themes that provide a systematic literature overview. The LDA topics recaptured the search keywords in PubMed and revealed further relevant themes by comparison analysis between different datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Prescription opioids are powerful pain-reducing medications. Thousands of articles that focus on prescription opioid use (POU) and its associated medical disorders have been published. However, it is time-consuming and labor-intensive to extract and understand the information of all POU-related published articles. In this study, we applied the well-adapted topic modeling method, Latent Dirichlet Allocation (LDA), to perform text mining on POU-related literature. We have collected six large academic abstract datasets by searching PubMed using the Medical Subject Headings (MeSH): prescription opioid, codeine, morphine, hydrocodone, oxycodone, and methadone. We then applied topic modeling to identify topics and analyze topic similarities/differences in these six datasets. Word clouds and histograms were used to depict the distribution of vocabularies over each topic in which the most prevalent words conveyed a topic&#x2019;s meaning. TreeMap and trend analysis were performed to fingerprint abstracts and explore the prevalent topic dynamics in the POU-related literature. Results showed the ability of topic modeling as a computational tool to segregate a vast quantity of articles into different themes that provide a systematic literature overview. The LDA topics recaptured the search keywords in PubMed and revealed further relevant themes by comparison analysis between different datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Prescription opioids are powerful pain-reducing medications. Thousands of articles that focus on prescription opioid use (POU) and its associated medical disorders have been published. However, it is time-consuming and labor-intensive to extract and understand the information of all POU-related published articles. In this study, we applied the well-adapted topic modeling method, Latent Dirichlet Allocation (LDA), to perform text mining on POU-related literature. We have collected six large academic abstract datasets by searching PubMed using the Medical Subject Headings (MeSH): prescription opioid, codeine, morphine, hydrocodone, oxycodone, and methadone. We then applied topic modeling to identify topics and analyze topic similarities/differences in these six datasets. Word clouds and histograms were used to depict the distribution of vocabularies over each topic in which the most prevalent words conveyed a topic’s meaning. TreeMap and trend analysis were performed to fingerprint abstracts and explore the prevalent topic dynamics in the POU-related literature. Results showed the ability of topic modeling as a computational tool to segregate a vast quantity of articles into different themes that provide a systematic literature overview. The LDA topics recaptured the search keywords in PubMed and revealed further relevant themes by comparison analysis between different datasets.", "fno": "09669550", "keywords": [ "Data Mining", "Data Visualisation", "Drugs", "Information Retrieval", "Medical Information Systems", "Natural Language Processing", "Text Analysis", "Prescription Opioid Use", "Associated Medical Disorders", "POU Related Published Articles", "Well Adapted Topic Modeling Method", "Latent Dirichlet Allocation", "POU Related Literature", "Medical Subject Headings", "Prevalent Topic Dynamics", "Systematic Literature Overview", "LDA Topics", "Text Fingerprinting", "Topic Mining", "Powerful Pain Reducing Medications", "Text Mining", "Visualization", "Analytical Models", "Vocabulary", "Systematics", "Computational Modeling", "Fingerprint Recognition", "Text Mining", "Topic Modeling", "Latent Dirichlet Allocation", "Prescription Opioid", "Codeine", "Morphine", "Hydrocodone", "Oxycodone", "Methadone" ], "authors": [ { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Huyen Le", "givenName": "Huyen", "surname": "Le", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Junxiu Zhou", "givenName": "Junxiu", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Weizhong Zhao", "givenName": "Weizhong", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Roger Perkins", "givenName": "Roger", "surname": "Perkins", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Weigong Ge", "givenName": "Weigong", "surname": "Ge", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Beverly Lyn-Cook", "givenName": "Beverly", "surname": "Lyn-Cook", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,Center for Drug Evaluation and Research,Silver Spring,MD,USA", "fullName": "Henry Francis", "givenName": "Henry", "surname": "Francis", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Huixiao Hong", "givenName": "Huixiao", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Weida Tong", "givenName": "Weida", "surname": "Tong", "__typename": "ArticleAuthorType" }, { "affiliation": "U.S. Food and Drug Administration,National Center for Toxicological Research,Jefferson,AR,USA", "fullName": "Wen Zou", "givenName": "Wen", "surname": "Zou", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "2741-2748", "year": "2021", "issn": null, "isbn": "978-1-6654-0126-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09669350", "articleId": "1A9VY2LeuEo", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669902", "articleId": "1A9VfSrtSww", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/spire/2000/0746/0/07460055", "title": "Experiment Analysis in Newspaper Topic Detection", "doi": null, "abstractUrl": "/proceedings-article/spire/2000/07460055/12OmNAndin8", "parentPublication": { "id": "proceedings/spire/2000/0746/0", "title": "String Processing and Information Retrieval, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a178", "title": "Hierarchical Prescription Pattern Analysis with Symptom Labels", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a178/12OmNqGRG78", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csb/2005/2344/0/23440366", "title": "Investigation into Biomedical Literature Classification Using Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/csb/2005/23440366/12OmNyxFKcL", "parentPublication": { "id": "proceedings/csb/2005/2344/0", "title": "Proceedings. 2005 IEEE Computational Systems Bioinformatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a260", "title": "Generating Breakpoint-based Timeline Overview for News Topic Retrospection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a260/12OmNznkJTX", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/04/08125189", "title": "Topic Models for Unsupervised Cluster Matching", "doi": null, "abstractUrl": "/journal/tk/2018/04/08125189/13rRUB6Sq0W", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122002", "title": "HierarchicalTopics: Visually Exploring Large Text Collections Using Topic Hierarchies", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122002/13rRUxNW1Zo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/06/08242679", "title": "A Topic Modeling Approach for Traditional Chinese Medicine Prescriptions", "doi": null, "abstractUrl": "/journal/tk/2018/06/08242679/13rRUxcbnD0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020259", "title": "A Data-driven Latent Semantic Analysis for Automatic Text Summarization using LDA Topic Modelling", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020259/1KfRTUeiflu", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sadfe/2020/9459/0/09133703", "title": "Time and Location Topic Model for analyzing Lihkg forum data", "doi": null, "abstractUrl": "/proceedings-article/sadfe/2020/09133703/1lgPKPH7fUs", "parentPublication": { "id": "proceedings/sadfe/2020/9459/0", "title": "2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2021/1370/0/137000a012", "title": "Uncertainty-aware Topic Modeling Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2021/137000a012/1yNiG9yU9JS", "parentPublication": { "id": "proceedings/vis4dh/2021/1370/0", "title": "2021 IEEE 6th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yNiFDCbe5G", "title": "2021 IEEE 6th Workshop on Visualization for the Digital Humanities (VIS4DH)", "acronym": "vis4dh", "groupId": "1839705", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yNiG9yU9JS", "doi": "10.1109/VIS4DH53644.2021.00007", "title": "Uncertainty-aware Topic Modeling Visualization", "normalizedTitle": "Uncertainty-aware Topic Modeling Visualization", "abstract": "Topic modeling is a state-of-the-art technique for analyzing text corpora. It uses a statistical model, most commonly Latent Dirichlet Allocation (LDA), to discover abstract topics that occur in the document collection. However, the LDA-based topic modeling procedure is based on a randomly selected initial configuration as well as a number of parameter values than need to be chosen. This induces uncertainties on the topic modeling results, and visualization methods should convey these uncertainties during the analysis process. We propose a visual uncertainty-aware topic modeling analysis. We capture the uncertainty by computing topic modeling ensembles and propose measures for estimating topic modeling uncertainty from the ensemble. Then, we propose to enhance state-of-the-art topic modeling visualization methods to convey the uncertainty in the topic modeling process. We visualize the entire ensemble of topic modeling results at different levels for topic and document analysis. We apply our visualization methods to a text corpus to document the impact of uncertainty on the analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Topic modeling is a state-of-the-art technique for analyzing text corpora. It uses a statistical model, most commonly Latent Dirichlet Allocation (LDA), to discover abstract topics that occur in the document collection. However, the LDA-based topic modeling procedure is based on a randomly selected initial configuration as well as a number of parameter values than need to be chosen. This induces uncertainties on the topic modeling results, and visualization methods should convey these uncertainties during the analysis process. We propose a visual uncertainty-aware topic modeling analysis. We capture the uncertainty by computing topic modeling ensembles and propose measures for estimating topic modeling uncertainty from the ensemble. Then, we propose to enhance state-of-the-art topic modeling visualization methods to convey the uncertainty in the topic modeling process. We visualize the entire ensemble of topic modeling results at different levels for topic and document analysis. We apply our visualization methods to a text corpus to document the impact of uncertainty on the analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topic modeling is a state-of-the-art technique for analyzing text corpora. It uses a statistical model, most commonly Latent Dirichlet Allocation (LDA), to discover abstract topics that occur in the document collection. However, the LDA-based topic modeling procedure is based on a randomly selected initial configuration as well as a number of parameter values than need to be chosen. This induces uncertainties on the topic modeling results, and visualization methods should convey these uncertainties during the analysis process. We propose a visual uncertainty-aware topic modeling analysis. We capture the uncertainty by computing topic modeling ensembles and propose measures for estimating topic modeling uncertainty from the ensemble. Then, we propose to enhance state-of-the-art topic modeling visualization methods to convey the uncertainty in the topic modeling process. We visualize the entire ensemble of topic modeling results at different levels for topic and document analysis. We apply our visualization methods to a text corpus to document the impact of uncertainty on the analysis.", "fno": "137000a012", "keywords": [ "Data Visualisation", "Statistical Analysis", "Text Analysis", "Abstract Topics", "Document Analysis", "Latent Dirichlet Allocation", "LDA Based Topic Modeling Procedure", "Randomly Selected Initial Configuration", "Statistical Model", "Uncertainty Aware Topic Modeling Visualization", "Visualization", "Analytical Models", "Uncertainty", "Text Analysis", "Computational Modeling", "Conferences", "Merging", "Topic Modeling", "Ensemble Visualization", "Uncertainty Visualization" ], "authors": [ { "affiliation": "Westfälische Wilhelms-Universität Münster,Germany", "fullName": "Valerie Müller", "givenName": "Valerie", "surname": "Müller", "__typename": "ArticleAuthorType" }, { "affiliation": "Westfälische Wilhelms-Universität Münster,Germany", "fullName": "Christian Sieg", "givenName": "Christian", "surname": "Sieg", "__typename": "ArticleAuthorType" }, { "affiliation": "Westfälische Wilhelms-Universität Münster,Germany", "fullName": "Lars Linsen", "givenName": "Lars", "surname": "Linsen", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis4dh", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "12-18", "year": "2021", "issn": null, "isbn": "978-1-6654-1370-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "137000a007", "articleId": "1yNiGG7nJGE", "__typename": "AdjacentArticleType" }, "next": { "fno": "137000a019", "articleId": "1yNiGgGRBgk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-infovis/2002/1751/0/17510037", "title": "Visualizing Data with Bounded Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2002/17510037/12OmNrFkeWk", "parentPublication": { "id": "proceedings/ieee-infovis/2002/1751/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1998/9176/0/91760189", "title": "TOPIC ISLANDS™ — A Wavelet-Based Text Visualization System", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760189/12OmNvqEvKm", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom-cbdcom-iop-smartworld/2016/2771/0/07816979", "title": "Topic Modeling and Visualization for Big Data in Social Sciences", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom-cbdcom-iop-smartworld/2016/07816979/12OmNwLfMAX", "parentPublication": { "id": "proceedings/uic-atc-scalcom-cbdcom-iop-smartworld/2016/2771/0", "title": "2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b062", "title": "Topic Models over Spoken Language", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b062/12OmNybfqV3", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/10/06702464", "title": "LIMTopic: A Framework of Incorporating Link Based Importance into Topic Modeling", "doi": null, "abstractUrl": "/journal/tk/2014/10/06702464/13rRUxlgxTR", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017601", "title": "Uncertainty Visualization Using Copula-Based Analysis in Mixed Distribution Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017601/13rRUyogGAg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/09/07055260", "title": "Uncertainty-Aware Multidimensional Ensemble Data Visualization and Exploration", "doi": null, "abstractUrl": "/journal/tg/2015/09/07055260/13rRUyuegp9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2022/7668/0/766800a025", "title": "Characterizing Uncertainty in the Visual Text Analysis Pipeline", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2022/766800a025/1J2XI1dX2Q8", "parentPublication": { "id": "proceedings/vis4dh/2022/7668/0", "title": "2022 IEEE 7th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086239", "title": "Interactive Assigning of Conference Sessions with Visualization and Topic Modeling", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086239/1kuHnl2PvKU", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a189", "title": "Assessment of Medical Reports Uncertainty through Topic Modeling and Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a189/1mLMkWxH4mA", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAI", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2rS0U", "doi": "10.1109/ICBK.2017.39", "title": "Modeling Topic Evolution in Social Media Short Texts", "normalizedTitle": "Modeling Topic Evolution in Social Media Short Texts", "abstract": "Social media short texts like tweets and instant messages provide a lot of valuable information about the hot topics and public opinion. Detecting and tracking topics from these online contents can help people grasp the essential information and its evolution and facilitate many applications. Topic evolution models built based on LDA need to set the topic number manually, which could not change during different time periods and could not be adjusted based on the contents. The nonparametric topic evolution models do not perform very well on short texts due to the data sparsity problem. So in this paper, we propose a nonparametric topic evolution model for short texts. The model uses the recurrent Chinese restaurant process as the prior distribution of topic proportions. Combining it with word co-occurrence modeling, we construct a topic evolution model which is suitable for social media short texts. We carry out experimental studies on twitter dataset. The results show that our method outperforms the baseline methods and could monitor the topic evolution in social media short texts effectively.", "abstracts": [ { "abstractType": "Regular", "content": "Social media short texts like tweets and instant messages provide a lot of valuable information about the hot topics and public opinion. Detecting and tracking topics from these online contents can help people grasp the essential information and its evolution and facilitate many applications. Topic evolution models built based on LDA need to set the topic number manually, which could not change during different time periods and could not be adjusted based on the contents. The nonparametric topic evolution models do not perform very well on short texts due to the data sparsity problem. So in this paper, we propose a nonparametric topic evolution model for short texts. The model uses the recurrent Chinese restaurant process as the prior distribution of topic proportions. Combining it with word co-occurrence modeling, we construct a topic evolution model which is suitable for social media short texts. We carry out experimental studies on twitter dataset. The results show that our method outperforms the baseline methods and could monitor the topic evolution in social media short texts effectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social media short texts like tweets and instant messages provide a lot of valuable information about the hot topics and public opinion. Detecting and tracking topics from these online contents can help people grasp the essential information and its evolution and facilitate many applications. Topic evolution models built based on LDA need to set the topic number manually, which could not change during different time periods and could not be adjusted based on the contents. The nonparametric topic evolution models do not perform very well on short texts due to the data sparsity problem. So in this paper, we propose a nonparametric topic evolution model for short texts. The model uses the recurrent Chinese restaurant process as the prior distribution of topic proportions. Combining it with word co-occurrence modeling, we construct a topic evolution model which is suitable for social media short texts. We carry out experimental studies on twitter dataset. The results show that our method outperforms the baseline methods and could monitor the topic evolution in social media short texts effectively.", "fno": "3120a315", "keywords": [ "Social Network Services", "Coherence", "Data Models", "Analytical Models", "Semantics", "History", "Inference Algorithms", "Topic Modeling", "Text Mining", "Social Media Analytics" ], "authors": [ { "affiliation": null, "fullName": "Yuhao Zhang", "givenName": "Yuhao", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wenji Mao", "givenName": "Wenji", "surname": "Mao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Junjie Lin", "givenName": "Junjie", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "315-319", "year": "2017", "issn": null, "isbn": "978-1-5386-3120-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3120a309", "articleId": "12OmNxZkhvI", "__typename": "AdjacentArticleType" }, "next": { "fno": "3120a320", "articleId": "12OmNAolGLW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2016/5473/0/07837989", "title": "Topic Discovery for Short Texts Using Word Embeddings", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837989/12OmNAWpywe", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2018/4652/0/465201a377", "title": "Exploring Topic Models on Short Texts: A Case Study with Crisis Data", "doi": null, "abstractUrl": "/proceedings-article/irc/2018/465201a377/12OmNrMZpuN", "parentPublication": { "id": "proceedings/irc/2018/4652/0", "title": "2018 Second IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363164", "title": "An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363164/12OmNzWOB9n", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2016/4459/0/4459a852", "title": "Robust Word-Network Topic Model for Short Texts", "doi": null, "abstractUrl": "/proceedings-article/ictai/2016/4459a852/12OmNzd7bXT", "parentPublication": { "id": "proceedings/ictai/2016/4459/0", "title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/03/07476863", "title": "Understand Short Texts by Harvesting and Analyzing Semantic Knowledge", "doi": null, "abstractUrl": "/journal/tk/2017/03/07476863/13rRUwI5TRD", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/12/06778764", "title": "BTM: Topic Modeling over Short Texts", "doi": null, "abstractUrl": "/journal/tk/2014/12/06778764/13rRUy2YLYY", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594882", "title": "ASTM: An Attentional Segmentation Based Topic Model for Short Texts", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594882/17D45WwsQ6M", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2022/7480/0/748000a160", "title": "Topic Modeling for Short Texts Via Dual View Collaborate optimization", "doi": null, "abstractUrl": "/proceedings-article/dsc/2022/748000a160/1H44nThBZGo", "parentPublication": { "id": "proceedings/dsc/2022/7480/0", "title": "2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a593", "title": "AOBTM: Adaptive Online Biterm Topic Modeling for Version Sensitive Short-texts Analysis", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a593/1oqKK1jxNYI", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09404875", "title": "Topic Modeling of Short Texts: A Pseudo-Document View With Word Embedding Enhancement", "doi": null, "abstractUrl": "/journal/tk/2023/01/09404875/1sNm3Kthmi4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBscCYx", "title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)", "acronym": "aina", "groupId": "1000008", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUPpq4", "doi": "10.1109/AINA.2017.147", "title": "Mining Opinion Leaders in Big Social Network", "normalizedTitle": "Mining Opinion Leaders in Big Social Network", "abstract": "Recently, due to the popularity of Web 2.0, considerable attention has been paid to the opinion leader discovery in social network. By identifying the opinion leaders, companies or governments can manipulate the selling or guiding public opinion, respectively. Additionally, detecting the influential comments is able to understand the source and trend of public opinion formation. However, mining opinion leaders in a huge social network is a challenge task because of the complexity of graph processing and leadership analysis. In this study, a novel algorithm, OLMiner, is proposed to efficiently find the opinion leaders from a huge social network. We propose a clustering method to solve the influence overlapping issue and significantly reduce the computation time by shrinking the size of candidate generation. The experimental results show that the proposed OLMiner can effectively discover the influential opinion leaders in different real social networks with efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, due to the popularity of Web 2.0, considerable attention has been paid to the opinion leader discovery in social network. By identifying the opinion leaders, companies or governments can manipulate the selling or guiding public opinion, respectively. Additionally, detecting the influential comments is able to understand the source and trend of public opinion formation. However, mining opinion leaders in a huge social network is a challenge task because of the complexity of graph processing and leadership analysis. In this study, a novel algorithm, OLMiner, is proposed to efficiently find the opinion leaders from a huge social network. We propose a clustering method to solve the influence overlapping issue and significantly reduce the computation time by shrinking the size of candidate generation. The experimental results show that the proposed OLMiner can effectively discover the influential opinion leaders in different real social networks with efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, due to the popularity of Web 2.0, considerable attention has been paid to the opinion leader discovery in social network. By identifying the opinion leaders, companies or governments can manipulate the selling or guiding public opinion, respectively. Additionally, detecting the influential comments is able to understand the source and trend of public opinion formation. However, mining opinion leaders in a huge social network is a challenge task because of the complexity of graph processing and leadership analysis. In this study, a novel algorithm, OLMiner, is proposed to efficiently find the opinion leaders from a huge social network. We propose a clustering method to solve the influence overlapping issue and significantly reduce the computation time by shrinking the size of candidate generation. The experimental results show that the proposed OLMiner can effectively discover the influential opinion leaders in different real social networks with efficiency.", "fno": "6029b012", "keywords": [ "Social Network Services", "Algorithm Design And Analysis", "Clustering Algorithms", "Computers", "Mathematical Model", "Companies", "Heuristic Algorithms", "Clustering", "Opinion Leader", "Semantic Analysis", "Social Network" ], "authors": [ { "affiliation": null, "fullName": "Yi-Cheng Chen", "givenName": "Yi-Cheng", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi-Hsiang Chen", "givenName": "Yi-Hsiang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chia-Hao Hsu", "givenName": "Chia-Hao", "surname": "Hsu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hao-Jun You", "givenName": "Hao-Jun", "surname": "You", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianquan Liu", "givenName": "Jianquan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xin Huang", "givenName": "Xin", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "aina", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-03-01T00:00:00", "pubType": "proceedings", "pages": "1012-1018", "year": "2017", "issn": "1550-445X", "isbn": "978-1-5090-6029-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6029b004", "articleId": "12OmNyUnEL8", "__typename": "AdjacentArticleType" }, "next": { "fno": "6029b019", "articleId": "12OmNzT7Oyz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dcabes/2015/6593/0/6593a292", "title": "Opinion Leaders Discovering in Social Networks Based on Complex Network and DBSCAN Cluster", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2015/6593a292/12OmNA0vo15", "parentPublication": { "id": "proceedings/dcabes/2015/6593/0", "title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/3/3496c398", "title": "Identifying Opinion Leaders in BBS", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496c398/12OmNqGRG90", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a133", "title": "A Sliding Window-Based Algorithm for Detecting Leaders from Social Network Action Streams", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a133/12OmNyugz1j", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796959", "title": "Connecting Opinions to Opinion-Leaders: A Case Study on Brazilian Political Protests", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796959/12OmNz61cUd", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/1/4143a377", "title": "Identification of Opinion Leaders Based on User Clustering and Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143a377/12OmNzllxZk", "parentPublication": { "id": "wi-iat/2014/4143/1", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2010/8387/0/p1062yu", "title": "Understanding opinion leaders in bulletin board systems: Structures and algorithms", "doi": null, "abstractUrl": "/proceedings-article/lcn/2010/p1062yu/12OmNzxgHzv", "parentPublication": { "id": "proceedings/lcn/2010/8387/0", "title": "IEEE Local Computer Network Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2021/2889/0/288900a049", "title": "A study of the influence of different opinion leaders on the evolution of followers&#x0027; views in social e-commerce networks", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2021/288900a049/1AqwwwErikU", "parentPublication": { "id": "proceedings/dcabes/2021/2889/0", "title": "2021 20th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09912909", "title": "Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09912909/1HBK983sYak", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2019/6297/0/09151827", "title": "Identifying Opinion Leaders in Twitter during Social Events: Social Impact Theory from Influencer&#x2019;s Perspective", "doi": null, "abstractUrl": "/proceedings-article/iccis/2019/09151827/1lRlMogeH9m", "parentPublication": { "id": "proceedings/iccis/2019/6297/0", "title": "2019 4th International Conference on Communication and Information Systems (ICCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09423621", "title": "Dynamic Opinion Maximization in Social Networks", "doi": null, "abstractUrl": "/journal/tk/2023/01/09423621/1tkya0nZZVS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC13", "title": "2010 IEEE Fourth International Conference on Semantic Computing", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzayNlc", "doi": "10.1109/ICSC.2010.29", "title": "Sentiment Mining within Social Media for Topic Identification", "normalizedTitle": "Sentiment Mining within Social Media for Topic Identification", "abstract": "Social media has demonstrated itself to be a proven source of information towards the marketing of products. This unique source of data provides a rapid means of customer feedback that is used to support a number of business areas. Towards this purpose, we describe a methodology for the identification of topics associated with customer sentiment. This process first employs a Fisher Classification based approach towards sentiment analysis. By considering specific mutual information and word frequency distribution, topics are then identified within sentiment categories. The goal is to provide overall trends in sentiment along with associated subject matter (ie. why) as it supports a company's business. We demonstrate this methodology against data collected among a particular product line as obtained from Twitter advanced search.", "abstracts": [ { "abstractType": "Regular", "content": "Social media has demonstrated itself to be a proven source of information towards the marketing of products. This unique source of data provides a rapid means of customer feedback that is used to support a number of business areas. Towards this purpose, we describe a methodology for the identification of topics associated with customer sentiment. This process first employs a Fisher Classification based approach towards sentiment analysis. By considering specific mutual information and word frequency distribution, topics are then identified within sentiment categories. The goal is to provide overall trends in sentiment along with associated subject matter (ie. why) as it supports a company's business. We demonstrate this methodology against data collected among a particular product line as obtained from Twitter advanced search.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social media has demonstrated itself to be a proven source of information towards the marketing of products. This unique source of data provides a rapid means of customer feedback that is used to support a number of business areas. Towards this purpose, we describe a methodology for the identification of topics associated with customer sentiment. This process first employs a Fisher Classification based approach towards sentiment analysis. By considering specific mutual information and word frequency distribution, topics are then identified within sentiment categories. The goal is to provide overall trends in sentiment along with associated subject matter (ie. why) as it supports a company's business. We demonstrate this methodology against data collected among a particular product line as obtained from Twitter advanced search.", "fno": "4154a394", "keywords": [ "Social Media Analytics", "Machine Learning", "Web Mining" ], "authors": [ { "affiliation": null, "fullName": "David Alfred Ostrowski", "givenName": "David Alfred", "surname": "Ostrowski", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-09-01T00:00:00", "pubType": "proceedings", "pages": "394-401", "year": "2010", "issn": null, "isbn": "978-0-7695-4154-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4154a386", "articleId": "12OmNzlD9Dr", "__typename": "AdjacentArticleType" }, "next": { "fno": "4154a402", "articleId": "12OmNqGRGhX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2011/4409/0/4409a129", "title": "SES: Sentiment Elicitation System for Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a129/12OmNwK7o71", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2015/6959/0/07069507", "title": "Online negative public sentiment does not matter? — Empirical evidence from social media and movie industry", "doi": null, "abstractUrl": "/proceedings-article/icnc/2015/07069507/12OmNwswg2k", "parentPublication": { "id": "proceedings/icnc/2015/6959/0", "title": "2015 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a919", "title": "Sentiment Analysis on Social Media", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a919/12OmNxw5Byc", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloudcom/2014/4093/0/4093a917", "title": "Anomaly Detection through Enhanced Sentiment Analysis on Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2014/4093a917/12OmNz5s0NJ", "parentPublication": { "id": "proceedings/cloudcom/2014/4093/0", "title": "2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a349", "title": "Unsupervised Artificial Neural Nets for Modeling Movie Sentiment", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a349/12OmNzCWG1v", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875992", "title": "EvoRiver: Visual Analysis of Topic Coopetition on Social Media", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875992/13rRUxBa563", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccs/2021/9445/0/944500a239", "title": "Semantic Analysis on Social Media", "doi": null, "abstractUrl": "/proceedings-article/iccs/2021/944500a239/1DSyDPGQmWY", "parentPublication": { "id": "proceedings/iccs/2021/9445/0", "title": "2021 International Conference on Computing Sciences (ICCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2022/6603/0/660300a270", "title": "Public Outlook on E-sports in China: A Content and Sentiment Analysis of Social Media", "doi": null, "abstractUrl": "/proceedings-article/iri/2022/660300a270/1GvdQ3f0Lhm", "parentPublication": { "id": "proceedings/iri/2022/6603/0", "title": "2022 IEEE 23rd International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2019/4604/0/460400b174", "title": "SENTI2POP: Sentiment-Aware Topic Popularity Prediction on Social Media", "doi": null, "abstractUrl": "/proceedings-article/icdm/2019/460400b174/1h5XK42Tune", "parentPublication": { "id": "proceedings/icdm/2019/4604/0", "title": "2019 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a283", "title": "Extracting Principal Smartness Dimensions of Smart Speakers Using Topic Modeling and Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a283/1jdDvRoHbRS", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1t2n7SlHRvO", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "acronym": "icmtma", "groupId": "1002837", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1t2nr0qAS5O", "doi": "10.1109/ICMTMA52658.2021.00090", "title": "Research on The Key Technology of Counselors Using Social Network to Lead The Topic", "normalizedTitle": "Research on The Key Technology of Counselors Using Social Network to Lead The Topic", "abstract": "Based on the topic leading mechanism of counselors in social networks, this paper studies the mining of opinion leaders and the impact of opinion leaders on community evolution. Firstly, the topic community is obtained by topic recognition of microblog real text data, and a graph model is constructed according to the interaction between users. Then, potential opinion leaders are mined by using graph theory algorithm to find the central node, and the topic evolution model is used to judge the evolution centrality of potential opinion leaders. Finally, it analyzes the influence distribution and dissemination rules of users in the theme community, and excavates more accurate and effective opinion leaders. The experimental results show that the algorithm can effectively mine the potential opinion leader nodes, and obtain high support rate, which is helpful for the counselors to fulfill their education management responsibilities with the help of network platform.", "abstracts": [ { "abstractType": "Regular", "content": "Based on the topic leading mechanism of counselors in social networks, this paper studies the mining of opinion leaders and the impact of opinion leaders on community evolution. Firstly, the topic community is obtained by topic recognition of microblog real text data, and a graph model is constructed according to the interaction between users. Then, potential opinion leaders are mined by using graph theory algorithm to find the central node, and the topic evolution model is used to judge the evolution centrality of potential opinion leaders. Finally, it analyzes the influence distribution and dissemination rules of users in the theme community, and excavates more accurate and effective opinion leaders. The experimental results show that the algorithm can effectively mine the potential opinion leader nodes, and obtain high support rate, which is helpful for the counselors to fulfill their education management responsibilities with the help of network platform.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Based on the topic leading mechanism of counselors in social networks, this paper studies the mining of opinion leaders and the impact of opinion leaders on community evolution. Firstly, the topic community is obtained by topic recognition of microblog real text data, and a graph model is constructed according to the interaction between users. Then, potential opinion leaders are mined by using graph theory algorithm to find the central node, and the topic evolution model is used to judge the evolution centrality of potential opinion leaders. Finally, it analyzes the influence distribution and dissemination rules of users in the theme community, and excavates more accurate and effective opinion leaders. The experimental results show that the algorithm can effectively mine the potential opinion leader nodes, and obtain high support rate, which is helpful for the counselors to fulfill their education management responsibilities with the help of network platform.", "fno": "389200a389", "keywords": [ "Data Mining", "Educational Administrative Data Processing", "Graph Theory", "Social Networking Online", "Text Analysis", "Counselors", "Social Network", "Topic Leading Mechanism", "Community Evolution", "Topic Community", "Topic Recognition", "Microblog Real Text Data", "Graph Model", "Potential Opinion Leaders", "Graph Theory Algorithm", "Topic Evolution Model", "Evolution Centrality", "Theme Community", "Potential Opinion Leader Nodes", "Network Platform", "Mechatronics", "Automation", "Social Networking Online", "Text Recognition", "Education", "Blogs", "Graph Theory", "Social Network", "Topic", "Microblog", "Data Mining", "Opinion Leader" ], "authors": [ { "affiliation": "LIAONING JIANZHU VOCATIONAL COLLEGE,LiaoYang,China,111000", "fullName": "Shang Mingyue", "givenName": "Shang", "surname": "Mingyue", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmtma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "389-392", "year": "2021", "issn": null, "isbn": "978-1-6654-3892-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "389200a384", "articleId": "1t2nfuRRRcs", "__typename": "AdjacentArticleType" }, "next": { "fno": "389200a393", "articleId": "1t2nmf1Qrx6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dcabes/2015/6593/0/6593a292", "title": "Opinion Leaders Discovering in Social Networks Based on Complex Network and DBSCAN Cluster", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2015/6593a292/12OmNA0vo15", "parentPublication": { "id": "proceedings/dcabes/2015/6593/0", "title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113131", "title": "Measuring Opinion Relevance in Latent Topic Space", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113131/12OmNqJHFtg", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a315", "title": "Modeling Topic Evolution in Social Media Short Texts", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a315/12OmNy2rS0U", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122012", "title": "Visual Analysis of Topic Competition on Social Media", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122012/13rRUyogGAa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622325", "title": "Research on the Evolution of the Influence of Opinion Leaders in Social Networking Sites Taking Zhihu.com as an Example", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622325/17D45WKWnJU", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2021/2889/0/288900a049", "title": "A study of the influence of different opinion leaders on the evolution of followers&#x0027; views in social e-commerce networks", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2021/288900a049/1AqwwwErikU", "parentPublication": { "id": "proceedings/dcabes/2021/2889/0", "title": "2021 20th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09912909", "title": "Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09912909/1HBK983sYak", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068693", "title": "Data Driven Modeling Social Media Influence using Differential Equations", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068693/1LKx2bNdaDu", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2021/05/09294076", "title": "Stance Analysis of Twitter Users: The Case of the Vaccination Topic in Italy", "doi": null, "abstractUrl": "/magazine/ex/2021/05/09294076/1pAaE13Y8YE", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2020/1969/0/196900a179", "title": "Micro-blog Communication Mode Analysis of Ideological and Political Education under The Big Data Background", "doi": null, "abstractUrl": "/proceedings-article/icris/2020/196900a179/1wG5Zv3pMFa", "parentPublication": { "id": "proceedings/icris/2020/1969/0", "title": "2020 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjQ8XS", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "acronym": "cgc", "groupId": "1802057", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBkxstl", "doi": "10.1109/CGC.2012.76", "title": "Training Opinion Leaders in Microblog: A Game Theory Approach", "normalizedTitle": "Training Opinion Leaders in Microblog: A Game Theory Approach", "abstract": "There is no doubt that microblog is becoming one of the most forceful powers over the Internet, with billions of users all over the world. Making use of the well-connected microblog network, a highly influential user (or opinion leader) can be of great importance, with commercial, social, or even political values. In this paper, we discuss the conditions and methods to become an opinion leader based on game theory. First, the standards of a leader are to be discussed. We then present a set of parameters to describe the intrinsic features of a user, and build a game theory model to simulate the evolution of microblog network and the spread or shrinkage of the user influence. The simulation results shows that players with high quality messages are the fountainhead of the majority of opinion leaders. Among the leaders, an one-person microblog account better follows someone with a rate applying uniform distribution, while a robot or multi-person account becomes a team leader by following someone with a rate applying poisson distribution.", "abstracts": [ { "abstractType": "Regular", "content": "There is no doubt that microblog is becoming one of the most forceful powers over the Internet, with billions of users all over the world. Making use of the well-connected microblog network, a highly influential user (or opinion leader) can be of great importance, with commercial, social, or even political values. In this paper, we discuss the conditions and methods to become an opinion leader based on game theory. First, the standards of a leader are to be discussed. We then present a set of parameters to describe the intrinsic features of a user, and build a game theory model to simulate the evolution of microblog network and the spread or shrinkage of the user influence. The simulation results shows that players with high quality messages are the fountainhead of the majority of opinion leaders. Among the leaders, an one-person microblog account better follows someone with a rate applying uniform distribution, while a robot or multi-person account becomes a team leader by following someone with a rate applying poisson distribution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There is no doubt that microblog is becoming one of the most forceful powers over the Internet, with billions of users all over the world. Making use of the well-connected microblog network, a highly influential user (or opinion leader) can be of great importance, with commercial, social, or even political values. In this paper, we discuss the conditions and methods to become an opinion leader based on game theory. First, the standards of a leader are to be discussed. We then present a set of parameters to describe the intrinsic features of a user, and build a game theory model to simulate the evolution of microblog network and the spread or shrinkage of the user influence. The simulation results shows that players with high quality messages are the fountainhead of the majority of opinion leaders. Among the leaders, an one-person microblog account better follows someone with a rate applying uniform distribution, while a robot or multi-person account becomes a team leader by following someone with a rate applying poisson distribution.", "fno": "06382901", "keywords": [ "Behavioural Sciences", "Game Theory", "Internet", "Poisson Distribution", "Social Networking Online", "Training", "Opinion Leader Training", "Game Theory Approach", "Internet", "Microblog Network", "Commercial Value", "Social Value", "Political Value", "One Person Microblog", "Robot", "Multiperson Account", "Poisson Distribution", "Games", "Game Theory", "Twitter", "Density Functional Theory", "Training", "Robots", "Microblog", "Game Theory", "Opinion Leader" ], "authors": [ { "affiliation": null, "fullName": "Jingyuan Li", "givenName": "Jingyuan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Guoliang Xing", "givenName": "Guoliang", "surname": "Xing", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuanzhuo Wang", "givenName": "Yuanzhuo", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yan Ren", "givenName": "Yan", "surname": "Ren", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "754-759", "year": "2012", "issn": null, "isbn": "978-1-4673-3027-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06382900", "articleId": "12OmNzmLxSc", "__typename": "AdjacentArticleType" }, "next": { "fno": "06382902", "articleId": "12OmNqGiu6b", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dcabes/2015/6593/0/6593a292", "title": "Opinion Leaders Discovering in Social Networks Based on Complex Network and DBSCAN Cluster", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2015/6593a292/12OmNA0vo15", "parentPublication": { "id": "proceedings/dcabes/2015/6593/0", "title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/3/3496c398", "title": "Identifying Opinion Leaders in BBS", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496c398/12OmNqGRG90", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013a514", "title": "Opinion Target Extraction in Chinese Microblog Posts Based on Candidate Classification", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013a514/12OmNyQ7FDw", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2014/5726/0/07058000", "title": "Identification of Microblog Opinion Leader Based on User Feature and Interaction Network", "doi": null, "abstractUrl": "/proceedings-article/wisa/2014/07058000/12OmNyQGShz", "parentPublication": { "id": "proceedings/wisa/2014/5726/0", "title": "2014 11th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796959", "title": "Connecting Opinions to Opinion-Leaders: A Case Study on Brazilian Political Protests", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796959/12OmNz61cUd", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2017/6029/0/6029b012", "title": "Mining Opinion Leaders in Big Social Network", "doi": null, "abstractUrl": "/proceedings-article/aina/2017/6029b012/12OmNzUPpq4", "parentPublication": { "id": "proceedings/aina/2017/6029/0", "title": "2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2014/4143/1/4143a377", "title": "Identification of Opinion Leaders Based on User Clustering and Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143a377/12OmNzllxZk", "parentPublication": { "id": "wi-iat/2014/4143/1", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2010/8387/0/p1062yu", "title": "Understanding opinion leaders in bulletin board systems: Structures and algorithms", "doi": null, "abstractUrl": "/proceedings-article/lcn/2010/p1062yu/12OmNzxgHzv", "parentPublication": { "id": "proceedings/lcn/2010/8387/0", "title": "IEEE Local Computer Network Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2019/6297/0/09151827", "title": "Identifying Opinion Leaders in Twitter during Social Events: Social Impact Theory from Influencer&#x2019;s Perspective", "doi": null, "abstractUrl": "/proceedings-article/iccis/2019/09151827/1lRlMogeH9m", "parentPublication": { "id": "proceedings/iccis/2019/6297/0", "title": "2019 4th International Conference on Communication and Information Systems (ICCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a389", "title": "Research on The Key Technology of Counselors Using Social Network to Lead The Topic", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a389/1t2nr0qAS5O", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwcl7K5", "title": "2012 9th IEEE Working Conference on Mining Software Repositories (MSR)", "acronym": "msr", "groupId": "1001959", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwDACtB", "doi": "10.1109/MSR.2012.6224287", "title": "What does software engineering community microblog about?", "normalizedTitle": "What does software engineering community microblog about?", "abstract": "Microblogging is a new trend to communicate and to disseminate information. One microblog post could potentially reach millions of users. Millions of microblogs are generated on a daily basis on popular sites such as Twitter. The popularity of microblogging among programmers, software engineers, and software users has also led to their use of microblogs to communicate software engineering issues apart from using emails and other traditional communication channels. Understanding how millions of users use microblogs in software engineering related activities would shed light on ways we could leverage the fast evolving microblogging content to aid software development efforts. In this work, we perform a preliminary study on what the software engineering community microblogs about. We analyze the content of microblogs from Twitter and categorize the types of microblogs that are posted. We investigate the relative popularity of each category of microblogs. We also investigate what kinds of microblogs are diffused more widely in the Twitter network via the “retweet” feature. Our experiments show that microblogs commonly contain job openings, news, questions and answers, or links to download new tools and code. We find that microblogs concerning real-world events are more widely diffused in the Twitter network.", "abstracts": [ { "abstractType": "Regular", "content": "Microblogging is a new trend to communicate and to disseminate information. One microblog post could potentially reach millions of users. Millions of microblogs are generated on a daily basis on popular sites such as Twitter. The popularity of microblogging among programmers, software engineers, and software users has also led to their use of microblogs to communicate software engineering issues apart from using emails and other traditional communication channels. Understanding how millions of users use microblogs in software engineering related activities would shed light on ways we could leverage the fast evolving microblogging content to aid software development efforts. In this work, we perform a preliminary study on what the software engineering community microblogs about. We analyze the content of microblogs from Twitter and categorize the types of microblogs that are posted. We investigate the relative popularity of each category of microblogs. We also investigate what kinds of microblogs are diffused more widely in the Twitter network via the “retweet” feature. Our experiments show that microblogs commonly contain job openings, news, questions and answers, or links to download new tools and code. We find that microblogs concerning real-world events are more widely diffused in the Twitter network.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microblogging is a new trend to communicate and to disseminate information. One microblog post could potentially reach millions of users. Millions of microblogs are generated on a daily basis on popular sites such as Twitter. The popularity of microblogging among programmers, software engineers, and software users has also led to their use of microblogs to communicate software engineering issues apart from using emails and other traditional communication channels. Understanding how millions of users use microblogs in software engineering related activities would shed light on ways we could leverage the fast evolving microblogging content to aid software development efforts. In this work, we perform a preliminary study on what the software engineering community microblogs about. We analyze the content of microblogs from Twitter and categorize the types of microblogs that are posted. We investigate the relative popularity of each category of microblogs. We also investigate what kinds of microblogs are diffused more widely in the Twitter network via the “retweet” feature. Our experiments show that microblogs commonly contain job openings, news, questions and answers, or links to download new tools and code. We find that microblogs concerning real-world events are more widely diffused in the Twitter network.", "fno": "06224287", "keywords": [ "Information Dissemination", "Social Networking Online", "Software Engineering", "Software Engineering Community Microblog", "Information Dissemination", "Software Engineers", "Software Users", "Emails", "Communication Channels", "Software Engineering Related Activities", "Software Development", "Microblogging Content", "Twitter Network", "Software Engineering", "Twitter", "Software", "Communities", "Programming", "Blogs" ], "authors": [ { "affiliation": "Singapore Management University, Singapore", "fullName": "Yuan Tian", "givenName": "Yuan", "surname": "Tian", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University, Singapore", "fullName": "Palakorn Achananuparp", "givenName": "Palakorn", "surname": "Achananuparp", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University, Singapore", "fullName": "Ibrahim Nelman Lubis", "givenName": "Ibrahim Nelman", "surname": "Lubis", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University, Singapore", "fullName": "David Lo", "givenName": "David", "surname": "Lo", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University, Singapore", "fullName": "Ee-Peng Lim", "givenName": "Ee-Peng", "surname": "Lim", "__typename": "ArticleAuthorType" } ], "idPrefix": "msr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "247-250", "year": "2012", "issn": "2160-1852", "isbn": "978-1-4673-1760-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06224286", "articleId": "12OmNxEjY8Q", "__typename": "AdjacentArticleType" }, "next": { "fno": "06224288", "articleId": "12OmNAlNiUh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsm/2012/2313/0/06405330", "title": "Automatic classification of software related microblogs", "doi": null, "abstractUrl": "/proceedings-article/icsm/2012/06405330/12OmNA1mbe1", "parentPublication": { "id": "proceedings/icsm/2012/2313/0", "title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2012/5026/0/06481033", "title": "Clustering to Improve Microblog Stream Summarization", "doi": null, "abstractUrl": "/proceedings-article/synasc/2012/06481033/12OmNs0TKVw", "parentPublication": { "id": "proceedings/synasc/2012/5026/0", "title": "2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2013/2552/0/06688914", "title": "Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systems", "doi": null, "abstractUrl": "/proceedings-article/issrew/2013/06688914/12OmNvSKNWC", "parentPublication": { "id": "proceedings/issrew/2013/2552/0", "title": "2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mud/2014/6793/0/6793a001", "title": "An Exploratory Study on Software Microblogger Behaviors", "doi": null, "abstractUrl": "/proceedings-article/mud/2014/6793a001/12OmNwAbquM", "parentPublication": { "id": "proceedings/mud/2014/6793/0", "title": "2014 IEEE 4th Workshop on Mining Unstructured Data (MUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/srdsw/2014/7361/0/7361a070", "title": "Location-Based Microblog Viewing System Synchronized with Web Pages", "doi": null, "abstractUrl": "/proceedings-article/srdsw/2014/7361a070/12OmNxE2mLx", "parentPublication": { "id": "proceedings/srdsw/2014/7361/0", "title": "2014 IEEE 33rd International Symposium on Reliable Distributed Systems Workshops (SRDSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2012/1204/0/2351740", "title": "Observatory of trends in software related microblogs", "doi": null, "abstractUrl": "/proceedings-article/ase/2012/2351740/12OmNxE2mOR", "parentPublication": { "id": "proceedings/ase/2012/1204/0", "title": "2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipcw/2016/5773/0/07837044", "title": "Application of an Asset Bubble Model to Microblog Data Analytics", "doi": null, "abstractUrl": "/proceedings-article/hipcw/2016/07837044/12OmNxcdFXH", "parentPublication": { "id": "proceedings/hipcw/2016/5773/0", "title": "2016 IEEE 23rd International Conference on High-Performance Computing: Workshops (HiPCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363136", "title": "Usage and Consequences of Privacy Settings in Microblogs", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363136/12OmNyQ7FFr", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a195", "title": "Collecting Microblog Posts Implicitly Related to Announcement Post", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a195/12OmNyQGS1F", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2016/4121/0/4121a096", "title": "A Needle in a Haystack: What Do Twitter Users Say about Software?", "doi": null, "abstractUrl": "/proceedings-article/re/2016/4121a096/12OmNyoAAc6", "parentPublication": { "id": "proceedings/re/2016/4121/0", "title": "2016 IEEE 24th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2YF", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwcCIXd", "doi": "10.1109/ICALT.2013.139", "title": "YouFlow Microblog: Following Discussions on an Educational Microblog", "normalizedTitle": "YouFlow Microblog: Following Discussions on an Educational Microblog", "abstract": "Microblogs have been used in the educational context. However, differently from following friends' status messages, in the educational scenario it is important to follow the discussions, to understand the flow of messages. You Flow microblog was developed for that purpose. It is a microblog that provides the main structures of discourse that are available on communication systems as well as messages' categorization according to a lesson plan. An exploratory case study allowed analyzing the use of the structures of discourse on the microblog in an educational context. Then, an explanatory case study showed an increase in the participation on discussions of topics according to a lesson plan.", "abstracts": [ { "abstractType": "Regular", "content": "Microblogs have been used in the educational context. However, differently from following friends' status messages, in the educational scenario it is important to follow the discussions, to understand the flow of messages. You Flow microblog was developed for that purpose. It is a microblog that provides the main structures of discourse that are available on communication systems as well as messages' categorization according to a lesson plan. An exploratory case study allowed analyzing the use of the structures of discourse on the microblog in an educational context. Then, an explanatory case study showed an increase in the participation on discussions of topics according to a lesson plan.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microblogs have been used in the educational context. However, differently from following friends' status messages, in the educational scenario it is important to follow the discussions, to understand the flow of messages. You Flow microblog was developed for that purpose. It is a microblog that provides the main structures of discourse that are available on communication systems as well as messages' categorization according to a lesson plan. An exploratory case study allowed analyzing the use of the structures of discourse on the microblog in an educational context. Then, an explanatory case study showed an increase in the participation on discussions of topics according to a lesson plan.", "fno": "5009a453", "keywords": [ "Context", "Twitter", "Educational Institutions", "Visualization", "Computers", "Communication Systems", "Structure Of Discourse", "Microblogs", "Discussions", "Collaborative Learning", "Lesson Plan" ], "authors": [ { "affiliation": null, "fullName": "Rafael Krejci", "givenName": "Rafael", "surname": "Krejci", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sean Siqueira", "givenName": "Sean", "surname": "Siqueira", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "453-454", "year": "2013", "issn": null, "isbn": "978-0-7695-5009-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5009a451", "articleId": "12OmNqBKU3r", "__typename": "AdjacentArticleType" }, "next": { "fno": "5009a455", "articleId": "12OmNvo67Ei", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a732", "title": "Designing an Educational Scenario Using the Principles of Universal Design for Learning", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a732/12OmNBJw9QW", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2012/3027/0/06382901", "title": "Training Opinion Leaders in Microblog: A Game Theory Approach", "doi": null, "abstractUrl": "/proceedings-article/cgc/2012/06382901/12OmNBkxstl", "parentPublication": { "id": "proceedings/cgc/2012/3027/0", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1991/2164/0/00128971", "title": "Dynamic instructional planning for an intelligent physiology tutoring system", "doi": null, "abstractUrl": "/proceedings-article/cbms/1991/00128971/12OmNqBtiGU", "parentPublication": { "id": "proceedings/cbms/1991/2164/0", "title": "Computer-Based Medical Systems - Proceedings of the Fourth Annual IEEE Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004416", "title": "Topic-specific post identification in microblog streams", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004416/12OmNqG0T2i", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2013/2240/0/06785707", "title": "Information propagation in microblog networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785707/12OmNxE2mHy", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a706", "title": "Personal User or Organizational User? Behavior on Microblog can Tell", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a706/12OmNxVV5UD", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a516", "title": "The Application of Informal Learning Community Based on Microblog", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a516/12OmNyyeWs6", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2012/3027/0/06382853", "title": "Using Social Intelligence for New Event Detection in Microblog Stream", "doi": null, "abstractUrl": "/proceedings-article/cgc/2012/06382853/12OmNzAoi2c", "parentPublication": { "id": "proceedings/cgc/2012/3027/0", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684935", "title": "AREA: A social curation platform for open educational resources and lesson plans", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684935/12OmNzICEDt", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122022", "title": "ScatterBlogs2: Real-Time Monitoring of Microblog Messages through User-Guided Filtering", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122022/13rRUwhHcJh", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqGA5ii", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxE2mHy", "doi": "10.1109/ASONAM.2013.6785707", "title": "Information propagation in microblog networks", "normalizedTitle": "Information propagation in microblog networks", "abstract": "Information propagation in a microblog network aims to identify a set of seed users for propagating a target message to as many interested users as possible. This problem differs from the traditional influence maximization in two major ways: it has a content-rich target message for propagation and it treats each link in the network as communication on certain topics and emphasizes the topic relevance of such communication in propagating the target message. In realistic situations, however, the topics associated with a link are not explicitly expressed but are hidden in the microblogs previously exchanged through the link. In this paper, we present a topic-aware solution to information propagation in a microblog network. We first model the latent topic structure of the network using observed microblog messages published in the network. We then present two methods for estimating the propagation probability based on the topic relevance between a link and the target message. Once the propagation probability is estimated, we adopt the standard greedy algorithm for influence maximization to find seed users. This approach is topic-aware in that the target message finds its way of propagation according to its topic relevance to the latent topic structure in the network. Experiments conducted on real Twitter datasets suggest that the proposed methods are able to select right seed users.", "abstracts": [ { "abstractType": "Regular", "content": "Information propagation in a microblog network aims to identify a set of seed users for propagating a target message to as many interested users as possible. This problem differs from the traditional influence maximization in two major ways: it has a content-rich target message for propagation and it treats each link in the network as communication on certain topics and emphasizes the topic relevance of such communication in propagating the target message. In realistic situations, however, the topics associated with a link are not explicitly expressed but are hidden in the microblogs previously exchanged through the link. In this paper, we present a topic-aware solution to information propagation in a microblog network. We first model the latent topic structure of the network using observed microblog messages published in the network. We then present two methods for estimating the propagation probability based on the topic relevance between a link and the target message. Once the propagation probability is estimated, we adopt the standard greedy algorithm for influence maximization to find seed users. This approach is topic-aware in that the target message finds its way of propagation according to its topic relevance to the latent topic structure in the network. Experiments conducted on real Twitter datasets suggest that the proposed methods are able to select right seed users.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Information propagation in a microblog network aims to identify a set of seed users for propagating a target message to as many interested users as possible. This problem differs from the traditional influence maximization in two major ways: it has a content-rich target message for propagation and it treats each link in the network as communication on certain topics and emphasizes the topic relevance of such communication in propagating the target message. In realistic situations, however, the topics associated with a link are not explicitly expressed but are hidden in the microblogs previously exchanged through the link. In this paper, we present a topic-aware solution to information propagation in a microblog network. We first model the latent topic structure of the network using observed microblog messages published in the network. We then present two methods for estimating the propagation probability based on the topic relevance between a link and the target message. Once the propagation probability is estimated, we adopt the standard greedy algorithm for influence maximization to find seed users. This approach is topic-aware in that the target message finds its way of propagation according to its topic relevance to the latent topic structure in the network. Experiments conducted on real Twitter datasets suggest that the proposed methods are able to select right seed users.", "fno": "06785707", "keywords": [ "Greedy Algorithms", "Mathematical Model", "Conferences", "Twitter", "Filtering Algorithms", "Equations" ], "authors": [ { "affiliation": "College of Computer Science, Zhejiang University, China", "fullName": "Chenyi Zhang", "givenName": "Chenyi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science, Zhejiang University, China", "fullName": "Jianling Sun", "givenName": "Jianling", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing Science, Simon Fraser University, Canada", "fullName": "Ke Wang", "givenName": "Ke", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "190-196", "year": "2013", "issn": null, "isbn": "978-1-4503-2240-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06785706", "articleId": "12OmNzE54HN", "__typename": "AdjacentArticleType" }, "next": { "fno": "06785708", "articleId": "12OmNxFJXD0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbd/2015/8537/0/8537a007", "title": "Discovering Topic Evolution Topology in a Microblog Corpus", "doi": null, "abstractUrl": "/proceedings-article/cbd/2015/8537a007/12OmNA1mbdR", "parentPublication": { "id": "proceedings/cbd/2015/8537/0", "title": "2015 Third International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2014/7064/0/7064a088", "title": "Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis", "doi": null, "abstractUrl": "/proceedings-article/apscc/2014/7064a088/12OmNC2xhAt", "parentPublication": { "id": "proceedings/apscc/2014/7064/0", "title": "2014 Asia-Pacific Services Computing Conference (APSCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004416", "title": "Topic-specific post identification in microblog streams", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004416/12OmNqG0T2i", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a268", "title": "On Improving a Microblog Ranking", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a268/12OmNrGb2j9", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406393", "title": "Measuring Pair-Wise Social Influence in Microblog", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406393/12OmNxzMnYf", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscloud/2015/9300/0/9300a231", "title": "Feature Analysis of Important Nodes in Microblog", "doi": null, "abstractUrl": "/proceedings-article/cscloud/2015/9300a231/12OmNyQGS7W", "parentPublication": { "id": "proceedings/cscloud/2015/9300/0", "title": "2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122022", "title": "ScatterBlogs2: Real-Time Monitoring of Microblog Messages through User-Guided Filtering", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122022/13rRUwhHcJh", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/07/07430292", "title": "Microblog Dimensionality Reduction—A Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tk/2016/07/07430292/13rRUxjQyvV", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005785", "title": "A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese Microblog", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005785/17D45W2Wyyg", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0/666700a323", "title": "A CPN-based information propagation model in Online Social Networks", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2021/666700a323/1BrAJu87W5q", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0", "title": "2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylborC", "title": "2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)", "acronym": "icrtccm", "groupId": "1819064", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxvO085", "doi": "10.1109/ICRTCCM.2017.38", "title": "Age Forecasting Analysis - Over Microblogs", "normalizedTitle": "Age Forecasting Analysis - Over Microblogs", "abstract": "Age predictive analysis is to predict the age of the users who posted the message in any microblog. By using some keywords, we extract the messages as dataset and processed for predicting the age of the user. Here, the design and techniques to foreseen the age of the user by microblog dataset are presented. In recent years, microblogging services like Twitter and SinaWeibo become an essential part in everyone's life. Due to enormous growth in microblogging services, various challenges arise in research fields like detection, sentiment analysis, user classification, etc. due to the data produced by the huge number of microbloggers. In this paper, we used dataset from Twitter and showed promising results for predicting age ranges.", "abstracts": [ { "abstractType": "Regular", "content": "Age predictive analysis is to predict the age of the users who posted the message in any microblog. By using some keywords, we extract the messages as dataset and processed for predicting the age of the user. Here, the design and techniques to foreseen the age of the user by microblog dataset are presented. In recent years, microblogging services like Twitter and SinaWeibo become an essential part in everyone's life. Due to enormous growth in microblogging services, various challenges arise in research fields like detection, sentiment analysis, user classification, etc. due to the data produced by the huge number of microbloggers. In this paper, we used dataset from Twitter and showed promising results for predicting age ranges.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Age predictive analysis is to predict the age of the users who posted the message in any microblog. By using some keywords, we extract the messages as dataset and processed for predicting the age of the user. Here, the design and techniques to foreseen the age of the user by microblog dataset are presented. In recent years, microblogging services like Twitter and SinaWeibo become an essential part in everyone's life. Due to enormous growth in microblogging services, various challenges arise in research fields like detection, sentiment analysis, user classification, etc. due to the data produced by the huge number of microbloggers. In this paper, we used dataset from Twitter and showed promising results for predicting age ranges.", "fno": "4799a083", "keywords": [ "Twitter", "Blogs", "Business", "Probabilistic Logic", "Pragmatics", "Support Vector Machines", "Age Prediction", "Microblog", "User Classification" ], "authors": [ { "affiliation": null, "fullName": "Prasad Koti", "givenName": "Prasad", "surname": "Koti", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sujatha Pothula", "givenName": "Sujatha", "surname": "Pothula", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "P. Dhavachelvan", "givenName": "P.", "surname": "Dhavachelvan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icrtccm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-02-01T00:00:00", "pubType": "proceedings", "pages": "83-86", "year": "2017", "issn": null, "isbn": "978-1-5090-4799-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4799a077", "articleId": "12OmNvAAtw1", "__typename": "AdjacentArticleType" }, "next": { "fno": "4799a087", "articleId": "12OmNwOnn0t", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718694", "title": "Deriving Marketing Intelligence over Microblogs", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718694/12OmNqJq4v2", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mud/2014/6793/0/6793a001", "title": "An Exploratory Study on Software Microblogger Behaviors", "doi": null, "abstractUrl": "/proceedings-article/mud/2014/6793a001/12OmNwAbquM", "parentPublication": { "id": "proceedings/mud/2014/6793/0", "title": "2014 IEEE 4th Workshop on Mining Unstructured Data (MUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2012/1760/0/06224287", "title": "What does software engineering community microblog about?", "doi": null, "abstractUrl": "/proceedings-article/msr/2012/06224287/12OmNwDACtB", "parentPublication": { "id": "proceedings/msr/2012/1760/0", "title": "2012 9th IEEE Working Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363812", "title": "Modelling cascades over time in microblogs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363812/12OmNwEJ0Ap", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2012/1204/0/2351740", "title": "Observatory of trends in software related microblogs", "doi": null, "abstractUrl": "/proceedings-article/ase/2012/2351740/12OmNxE2mOR", "parentPublication": { "id": "proceedings/ase/2012/1204/0", "title": "2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a728", "title": "Feature Analysis of Spammers in Social Networks with Active Honeypots: A Case Study of Chinese Microblogging Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a728/12OmNxQOjFT", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363136", "title": "Usage and Consequences of Privacy Settings in Microblogs", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363136/12OmNyQ7FFr", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113311", "title": "Comparing Social Tags to Microblogs", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113311/12OmNzVXNKf", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2013/5006/0/06597130", "title": "Duplicate Detection for Identifying Social Spam in Microblogs", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2013/06597130/12OmNzaQoLq", "parentPublication": { "id": "proceedings/bigdata-congress/2013/5006/0", "title": "2013 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2015/7303/0/07072831", "title": "Semi-supervised microblog sentiment analysis using social relation and text similarity", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2015/07072831/12OmNzllxZv", "parentPublication": { "id": "proceedings/bigcomp/2015/7303/0", "title": "2015 International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwp74rg", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNy4r3Ow", "doi": "10.1109/EISIC.2015.27", "title": "Detecting Jihadist Messages on Twitter", "normalizedTitle": "Detecting Jihadist Messages on Twitter", "abstract": "Jihadist groups such as ISIS are spreading online propaganda using various forms of social media such as Twitter and YouTube. One of the most common approaches to stop these groups is to suspend accounts that spread propaganda when they are discovered. This approach requires that human analysts manually read and analyze an enormous amount of information on social media. In this work we make a first attempt to automatically detect messages released by jihadist groups on Twitter. We use a machine learning approach that classifies a tweet as containing material that is supporting jihadists groups or not. Even tough our results are preliminary and more tests needs to be carried out we believe that results indicate that an automated approach to aid analysts in their work with detecting radical content on social media is a promising way forward. It should be noted that an automatic approach to detect radical content should only be used as a support tool for human analysts in their work.", "abstracts": [ { "abstractType": "Regular", "content": "Jihadist groups such as ISIS are spreading online propaganda using various forms of social media such as Twitter and YouTube. One of the most common approaches to stop these groups is to suspend accounts that spread propaganda when they are discovered. This approach requires that human analysts manually read and analyze an enormous amount of information on social media. In this work we make a first attempt to automatically detect messages released by jihadist groups on Twitter. We use a machine learning approach that classifies a tweet as containing material that is supporting jihadists groups or not. Even tough our results are preliminary and more tests needs to be carried out we believe that results indicate that an automated approach to aid analysts in their work with detecting radical content on social media is a promising way forward. It should be noted that an automatic approach to detect radical content should only be used as a support tool for human analysts in their work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Jihadist groups such as ISIS are spreading online propaganda using various forms of social media such as Twitter and YouTube. One of the most common approaches to stop these groups is to suspend accounts that spread propaganda when they are discovered. This approach requires that human analysts manually read and analyze an enormous amount of information on social media. In this work we make a first attempt to automatically detect messages released by jihadist groups on Twitter. We use a machine learning approach that classifies a tweet as containing material that is supporting jihadists groups or not. Even tough our results are preliminary and more tests needs to be carried out we believe that results indicate that an automated approach to aid analysts in their work with detecting radical content on social media is a promising way forward. It should be noted that an automatic approach to detect radical content should only be used as a support tool for human analysts in their work.", "fno": "8657a161", "keywords": [ "Twitter", "Media", "Tagging", "Videos", "Support Vector Machines", "You Tube", "Organizations", "Twitter", "Machine Learning", "Jihadist Groups" ], "authors": [ { "affiliation": null, "fullName": "Michael Ashcroft", "givenName": "Michael", "surname": "Ashcroft", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ali Fisher", "givenName": "Ali", "surname": "Fisher", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lisa Kaati", "givenName": "Lisa", "surname": "Kaati", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Enghin Omer", "givenName": "Enghin", "surname": "Omer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nico Prucha", "givenName": "Nico", "surname": "Prucha", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "161-164", "year": "2015", "issn": null, "isbn": "978-1-4799-8657-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8657a157", "articleId": "12OmNC943NT", "__typename": "AdjacentArticleType" }, "next": { "fno": "8657a165", "articleId": "12OmNwlZu2h", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cts/2016/2300/0/07871051", "title": "Social Media Analytics to Identify and Counter Islamist Extremism: Systematic Detection, Evaluation, and Challenging of Extremist Narratives Online", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07871051/12OmNvSKNXe", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2017/2565/0/256501a299", "title": "Quantifying Content Polarization on Twitter", "doi": null, "abstractUrl": "/proceedings-article/cic/2017/256501a299/12OmNvoFjPz", "parentPublication": { "id": "proceedings/cic/2017/2565/0", "title": "2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840895", "title": "Automated classification of extremist Twitter accounts using content-based and network-based features", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840895/12OmNwBT1lP", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiaiaai/2014/4174/0/06913288", "title": "Preliminary Survey on the Information-Providing Method in the Music Industry According to the Levels of SNS Media", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2014/06913288/12OmNwJgAHo", "parentPublication": { "id": "proceedings/iiaiaai/2014/4174/0", "title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/1/9618a017", "title": "Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618a017/12OmNzBwGB4", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/1", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a954", "title": "Detecting Multipliers of Jihadism on Twitter", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a954/12OmNzQR1rz", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/06/mco2016060038", "title": "The DARPA Twitter Bot Challenge", "doi": null, "abstractUrl": "/magazine/co/2016/06/mco2016060038/13rRUILc8aF", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258566", "title": "Understanding the impact of sampling and noise on detecting events using twitter", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258566/17D45WLdYQ6", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2019/1704/0/08734426", "title": "Presidential Elections in Ecuador: Bot Presence in Twitter", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2019/08734426/1aPuUUpy5La", "parentPublication": { "id": "proceedings/icedeg/2019/1704/0", "title": "2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cogmi/2019/6737/0/673700a061", "title": "#selfharm on Instagram: Quantitative Analysis and Classification of Non-Suicidal Self-Injury", "doi": null, "abstractUrl": "/proceedings-article/cogmi/2019/673700a061/1htC7I2z3b2", "parentPublication": { "id": "proceedings/cogmi/2019/6737/0", "title": "2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBwGnh", "title": "2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud)", "acronym": "cscloud", "groupId": "1811044", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQGS7W", "doi": "10.1109/CSCloud.2015.65", "title": "Feature Analysis of Important Nodes in Microblog", "normalizedTitle": "Feature Analysis of Important Nodes in Microblog", "abstract": "Microblog plays an important role in the dissemination of information now, especially on some sensitive topics. We established the propagation model of the microblog was constructed in this paper. The weak ties are used in the microblog network to obtain independent communities. We analyzed degree centrality, betweenness centrality and closeness centrality of microblog network. Various messages disseminate from different nodes with various feature which can be preset. The characteristics of some nodes in the information dissemination process become clearer according to the comparison among results after message dissemination. We analyzed the impacts of some nodes with information entropy during the information dissemination, which is so important to guide public opinion and maintain social stability.", "abstracts": [ { "abstractType": "Regular", "content": "Microblog plays an important role in the dissemination of information now, especially on some sensitive topics. We established the propagation model of the microblog was constructed in this paper. The weak ties are used in the microblog network to obtain independent communities. We analyzed degree centrality, betweenness centrality and closeness centrality of microblog network. Various messages disseminate from different nodes with various feature which can be preset. The characteristics of some nodes in the information dissemination process become clearer according to the comparison among results after message dissemination. We analyzed the impacts of some nodes with information entropy during the information dissemination, which is so important to guide public opinion and maintain social stability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microblog plays an important role in the dissemination of information now, especially on some sensitive topics. We established the propagation model of the microblog was constructed in this paper. The weak ties are used in the microblog network to obtain independent communities. We analyzed degree centrality, betweenness centrality and closeness centrality of microblog network. Various messages disseminate from different nodes with various feature which can be preset. The characteristics of some nodes in the information dissemination process become clearer according to the comparison among results after message dissemination. We analyzed the impacts of some nodes with information entropy during the information dissemination, which is so important to guide public opinion and maintain social stability.", "fno": "9300a231", "keywords": [ "Blogs", "Partitioning Algorithms", "Information Entropy", "Complex Networks", "Social Network Services", "Stability Analysis", "Information Entropy", "Weak Tie", "Microblog Network", "Degree Centrality", "Betweenness Centrality", "Closeness Centrality" ], "authors": [ { "affiliation": null, "fullName": "Yang Yang", "givenName": "Yang", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hui Xu", "givenName": "Hui", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanan Liu", "givenName": "Yanan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhongwei Li", "givenName": "Zhongwei", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Weishan Zhang", "givenName": "Weishan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xin Liu", "givenName": "Xin", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cscloud", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "231-236", "year": "2015", "issn": null, "isbn": "978-1-4673-9300-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9300a224", "articleId": "12OmNzTYC3Z", "__typename": "AdjacentArticleType" }, "next": { "fno": "9300a237", "articleId": "12OmNzZEAp5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsc/2016/1192/0/1192a673", "title": "Open Relation Extraction from Chinese Microblog Text", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a673/12OmNBkP3Ej", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550943", "title": "A simulated login-based SINA microblog data collection method and its data analysis", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550943/12OmNwDj1eO", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2014/5464/0/06982861", "title": "Application of knowledge gain on multi-type feature space in microblog user classification", "doi": null, "abstractUrl": "/proceedings-article/grc/2014/06982861/12OmNwGqBpD", "parentPublication": { "id": "proceedings/grc/2014/5464/0", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a516", "title": "The Application of Informal Learning Community Based on Microblog", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a516/12OmNyyeWs6", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0/666700a316", "title": "Identifying influential nodes for blocking information cascades based on improved structural holes in social networks", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2021/666700a316/1BrAM0xFNTy", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0", "title": "2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900a032", "title": "Intermedia agenda setting between Microblog and WeChat - A Case Study of \"Fake Jindong\" Event", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900a032/1C8Gb45ldAI", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a095", "title": "Analysis of key nodes in airline network based on complex networks", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a095/1FUUvn6DA1G", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2020/8448/0/844800a183", "title": "A Hierarchical Participant Classification Model of Hot Events in Chinese Microblog", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2020/844800a183/1qJudRvOsY8", "parentPublication": { "id": "proceedings/cyberc/2020/8448/0", "title": "2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdeim/2020/0331/0/033100a180", "title": "Efficiency Assessing of Earthquake Agency Microblog Platform Based on DEA Approach", "doi": null, "abstractUrl": "/proceedings-article/bdeim/2020/033100a180/1sZ3cGZLFfy", "parentPublication": { "id": "proceedings/bdeim/2020/0331/0", "title": "2020 International Conference on Big Data Economy and Information Management (BDEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2020/1969/0/196900a179", "title": "Micro-blog Communication Mode Analysis of Ideological and Political Education under The Big Data Background", "doi": null, "abstractUrl": "/proceedings-article/icris/2020/196900a179/1wG5Zv3pMFa", "parentPublication": { "id": "proceedings/icris/2020/1969/0", "title": "2020 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa7U", "title": "2012 Fourth International Symposium on Information Science and Engineering (ISISE 2012)", "acronym": "isise", "groupId": "1002561", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRPgUd", "doi": "10.1109/ISISE.2012.30", "title": "A Topic Detection Method for Chinese Microblog", "normalizedTitle": "A Topic Detection Method for Chinese Microblog", "abstract": "A model for topic detection in Chinese microblog is proposed. Based on the traditional vector space model, a feature selection and weight computation method are introduced to express messages in microblog due to their special characteristics. We also introduce a scoring method for the tweets which can filter out most topic-unrelated tweets at first, in order to minimize the impact of noise. Then a topic detection algorithm is proposed, using a new vector distance computation method. The results show that our method can filter out almost all the topic-unrelated tweets and identify topics in microblog accurately and efficiently. The study of topic detection method in microblog can help users and governments to find out hot topics dynamically.", "abstracts": [ { "abstractType": "Regular", "content": "A model for topic detection in Chinese microblog is proposed. Based on the traditional vector space model, a feature selection and weight computation method are introduced to express messages in microblog due to their special characteristics. We also introduce a scoring method for the tweets which can filter out most topic-unrelated tweets at first, in order to minimize the impact of noise. Then a topic detection algorithm is proposed, using a new vector distance computation method. The results show that our method can filter out almost all the topic-unrelated tweets and identify topics in microblog accurately and efficiently. The study of topic detection method in microblog can help users and governments to find out hot topics dynamically.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A model for topic detection in Chinese microblog is proposed. Based on the traditional vector space model, a feature selection and weight computation method are introduced to express messages in microblog due to their special characteristics. We also introduce a scoring method for the tweets which can filter out most topic-unrelated tweets at first, in order to minimize the impact of noise. Then a topic detection algorithm is proposed, using a new vector distance computation method. The results show that our method can filter out almost all the topic-unrelated tweets and identify topics in microblog accurately and efficiently. The study of topic detection method in microblog can help users and governments to find out hot topics dynamically.", "fno": "06495306", "keywords": [ "Pattern Clustering", "Social Networking Online", "Topic Detection Method", "Chinese Microblog", "Vector Space Model", "Feature Selection Method", "Weight Computation Method", "Scoring Method", "Vector Distance Computation Method", "Topic Unrelated Tweet", "Microblog", "Topic Detection", "Tweet", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Jing Xie", "givenName": "Jing", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gongshen Liu", "givenName": "Gongshen", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Ning", "givenName": "Wei", "surname": "Ning", "__typename": "ArticleAuthorType" } ], "idPrefix": "isise", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "100-103", "year": "2012", "issn": "2160-1283", "isbn": "978-1-4673-5680-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06495305", "articleId": "12OmNrYCXIV", "__typename": "AdjacentArticleType" }, "next": { "fno": "06495307", "articleId": "12OmNzVoBRW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbd/2015/8537/0/8537a007", "title": "Discovering Topic Evolution Topology in a Microblog Corpus", "doi": null, "abstractUrl": "/proceedings-article/cbd/2015/8537a007/12OmNA1mbdR", "parentPublication": { "id": "proceedings/cbd/2015/8537/0", "title": "2015 Third International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a673", "title": "Open Relation Extraction from Chinese Microblog Text", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a673/12OmNBkP3Ej", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2018/5114/0/511401a317", "title": "An Improved Single-Pass Topic Detection Method", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2018/511401a317/12OmNBr4ewX", "parentPublication": { "id": "proceedings/icmtma/2018/5114/0", "title": "2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2014/7064/0/7064a088", "title": "Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis", "doi": null, "abstractUrl": "/proceedings-article/apscc/2014/7064a088/12OmNC2xhAt", "parentPublication": { "id": "proceedings/apscc/2014/7064/0", "title": "2014 Asia-Pacific Services Computing Conference (APSCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004416", "title": "Topic-specific post identification in microblog streams", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004416/12OmNqG0T2i", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890213", "title": "Psychological stress detection from cross-media microblog data using Deep Sparse Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890213/12OmNqyUUIy", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2015/9200/0/9200a209", "title": "A Topic Detection Method Based on Microblog Weight", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2015/9200a209/12OmNvRU0rc", "parentPublication": { "id": "proceedings/cyberc/2015/9200/0", "title": "2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdata-congress/2016/2622/0/07584945", "title": "An Improved Single-Pass Algorithm for Chinese Microblog Topic Detection and Tracking", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2016/07584945/12OmNvSbBy3", "parentPublication": { "id": "proceedings/bigdata-congress/2016/2622/0", "title": "2016 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2016/5910/0/07836780", "title": "Microblog Sentiment Topic Model", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2016/07836780/12OmNviHKcS", "parentPublication": { "id": "proceedings/icdmw/2016/5910/0", "title": "2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/04/08861105", "title": "Query Expansion With Local Conceptual Word Embeddings in Microblog Retrieval", "doi": null, "abstractUrl": "/journal/tk/2021/04/08861105/1dVZAqHh16w", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyR5", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2kqrI", "doi": "10.1109/ACII.2015.7344668", "title": "Improving emotion classification on Chinese microblog texts with auxiliary cross-domain data", "normalizedTitle": "Improving emotion classification on Chinese microblog texts with auxiliary cross-domain data", "abstract": "Emotion classification for microblog texts has wide applications such as in social security and business marketing areas. The amount of annotated microblog texts is very limited. In this paper, we therefore study how to utilize annotated data from other domains (source domain) to improve emotion classification on microblog texts (target domain). Transfer learning has been a successful approach for cross domain learning. However, to the best of our knowledge, little attention has been paid for automatically selecting the appropriate samples from the source domain before applying transfer learning. In this paper, we propose an effective framework to sampling available data in the source domain before transfer learning, which we name as Two-Stage Sampling. The improvement of emotion classification on Chinese microblog texts demonstrates the effectiveness of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Emotion classification for microblog texts has wide applications such as in social security and business marketing areas. The amount of annotated microblog texts is very limited. In this paper, we therefore study how to utilize annotated data from other domains (source domain) to improve emotion classification on microblog texts (target domain). Transfer learning has been a successful approach for cross domain learning. However, to the best of our knowledge, little attention has been paid for automatically selecting the appropriate samples from the source domain before applying transfer learning. In this paper, we propose an effective framework to sampling available data in the source domain before transfer learning, which we name as Two-Stage Sampling. The improvement of emotion classification on Chinese microblog texts demonstrates the effectiveness of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Emotion classification for microblog texts has wide applications such as in social security and business marketing areas. The amount of annotated microblog texts is very limited. In this paper, we therefore study how to utilize annotated data from other domains (source domain) to improve emotion classification on microblog texts (target domain). Transfer learning has been a successful approach for cross domain learning. However, to the best of our knowledge, little attention has been paid for automatically selecting the appropriate samples from the source domain before applying transfer learning. In this paper, we propose an effective framework to sampling available data in the source domain before transfer learning, which we name as Two-Stage Sampling. The improvement of emotion classification on Chinese microblog texts demonstrates the effectiveness of our approach.", "fno": "07344668", "keywords": [ "Blogs", "Training", "Sentiment Analysis", "Joining Processes", "Twitter", "Learning Systems", "Feature Extraction", "Sampling", "Emotion Classification", "Transfer Learning" ], "authors": [ { "affiliation": "Multimedia Computing Lab, School of Information, Renmin University of China", "fullName": "Huimin Wu", "givenName": "Huimin", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Multimedia Computing Lab, School of Information, Renmin University of China", "fullName": "Qin Jin", "givenName": "Qin", "surname": "Jin", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "821-826", "year": "2015", "issn": "2156-8111", "isbn": "978-1-4799-9953-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07344667", "articleId": "12OmNs59JNm", "__typename": "AdjacentArticleType" }, "next": { "fno": "07344669", "articleId": "12OmNqBbHA3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsc/2016/1192/0/1192a673", "title": "Open Relation Extraction from Chinese Microblog Text", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a673/12OmNBkP3Ej", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/06962997", "title": "Chinese microblogging emotion classification based on support vector machine", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/06962997/12OmNBqMDwN", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344603", "title": "Chinese microblog sentiment classification based on convolution neural network with content extension method", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344603/12OmNvvLi5v", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682430", "title": "Sentiment Classification for Topical Chinese Microblog Based on Sentences' Relations", "doi": null, "abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682430/12OmNxb5hxY", "parentPublication": { "id": "proceedings/greencom-ithingscpscom/2013/5046/0", "title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004491", "title": "A challenge of authorship identification for ten-thousand-scale microblog users", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004491/12OmNyr8YbA", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a651", "title": "Microblog Platform Oriented User Mental Health Warning Mechanism Research", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a651/12OmNzdoMYi", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/07/07430292", "title": "Microblog Dimensionality Reduction—A Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tk/2016/07/07430292/13rRUxjQyvV", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005785", "title": "A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese Microblog", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005785/17D45W2Wyyg", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a965", "title": "Detecting Depression on Sina Microblog Using Depressing Domain Lexicon", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a965/1BLnG9l1Ltm", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnlp/2022/9544/0/954400a505", "title": "Dynamic Topic Model for Short Texts about Hot Issues on Microblog Based on TFIDF", "doi": null, "abstractUrl": "/proceedings-article/icnlp/2022/954400a505/1GNtqfEj2gg", "parentPublication": { "id": "proceedings/icnlp/2022/9544/0", "title": "2022 4th International Conference on Natural Language Processing (ICNLP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDACj6", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "acronym": "cts", "groupId": "1001747", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAnMuEx", "doi": "10.1109/CTS.2016.0058", "title": "Be the Data: Social Meetings with Visual Analytics", "normalizedTitle": "Be the Data: Social Meetings with Visual Analytics", "abstract": "Social meetings provide important venues for people to get connected. However, it is challenging to explore reasons of social gathering, identify its key impact factors, and further use it to support people's social activities. In this paper, we present an embodied visual analytics system, which highlights analyzing and displaying social-cluster related information in real time. In the system, each user represents a data point in a high-dimensional dataset, and their positions reflect a 2D projection of the dataset, by using weighted multidimensional scaling. As users move and socialize with others, the 2D projection is dynamically updated, and relevant information of user clusters is visually analyzed and presented through dimension reduction techniques. We conducted informal social meetings with participants who were a mix of strangers and friends. We found that there are 3 stages of social gathering, corresponding to different interactions in the system. Our results also suggest that the system assists social gathering with dimension reduction visualizations.", "abstracts": [ { "abstractType": "Regular", "content": "Social meetings provide important venues for people to get connected. However, it is challenging to explore reasons of social gathering, identify its key impact factors, and further use it to support people's social activities. In this paper, we present an embodied visual analytics system, which highlights analyzing and displaying social-cluster related information in real time. In the system, each user represents a data point in a high-dimensional dataset, and their positions reflect a 2D projection of the dataset, by using weighted multidimensional scaling. As users move and socialize with others, the 2D projection is dynamically updated, and relevant information of user clusters is visually analyzed and presented through dimension reduction techniques. We conducted informal social meetings with participants who were a mix of strangers and friends. We found that there are 3 stages of social gathering, corresponding to different interactions in the system. Our results also suggest that the system assists social gathering with dimension reduction visualizations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social meetings provide important venues for people to get connected. However, it is challenging to explore reasons of social gathering, identify its key impact factors, and further use it to support people's social activities. In this paper, we present an embodied visual analytics system, which highlights analyzing and displaying social-cluster related information in real time. In the system, each user represents a data point in a high-dimensional dataset, and their positions reflect a 2D projection of the dataset, by using weighted multidimensional scaling. As users move and socialize with others, the 2D projection is dynamically updated, and relevant information of user clusters is visually analyzed and presented through dimension reduction techniques. We conducted informal social meetings with participants who were a mix of strangers and friends. We found that there are 3 stages of social gathering, corresponding to different interactions in the system. Our results also suggest that the system assists social gathering with dimension reduction visualizations.", "fno": "07870996", "keywords": [ "Data Analysis", "Data Visualisation", "Pattern Clustering", "Social Aspects Of Automation", "Social Meetings", "Visual Analytics", "Social Gathering", "Weighted Multidimensional Scaling", "2 D Projection", "User Clusters", "Collaboration", "Social Interaction", "Dimension Reduction", "Data Visualization", "Real Time Systems", "Facebook", "Human Computer Interaction", "Social Computing", "Visual Analytics", "Two Dimensional Displays", "Visualization", "Collaboration", "Social Interaction", "Dimension Reduction" ], "authors": [ { "affiliation": null, "fullName": "Xin Chen", "givenName": "Xin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jessica Zeitz Self", "givenName": "Jessica Zeitz", "surname": "Self", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Maoyuan Sun", "givenName": "Maoyuan", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Leanna House", "givenName": "Leanna", "surname": "House", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chris North", "givenName": "Chris", "surname": "North", "__typename": "ArticleAuthorType" } ], "idPrefix": "cts", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "267-274", "year": "2016", "issn": null, "isbn": "978-1-5090-2300-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07870995", "articleId": "12OmNxHJ9wV", "__typename": "AdjacentArticleType" }, "next": { "fno": "07870997", "articleId": "12OmNBOCWfQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edocw/2016/9933/0/07584388", "title": "Social Set Visualizer (SoSeVi) II: Interactive Computational Set Analysis of Big Social Data", "doi": null, "abstractUrl": "/proceedings-article/edocw/2016/07584388/12OmNAqkSGE", "parentPublication": { "id": "proceedings/edocw/2016/9933/0", "title": "2016 IEEE 20th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b364", "title": "Studying Animation for Real-Time Visual Analytics: A Design Study of Social Media Analytics in Emergency Management", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b364/12OmNBrlPzK", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718616", "title": "Pair Analytics: Capturing Reasoning Processes in Collaborative Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718616/12OmNvAiShB", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06908006", "title": "Personal Visualization and Personal Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122032", "title": "Visual Analytics for Multimodal Social Network Analysis: A Design Study with Social Scientists", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122032/13rRUyuegp5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08534023", "title": "SocialOcean: Visual Analysis and Characterization of Social Media Bubbles", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08534023/17D45WIXbOL", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585638", "title": "E-Map: A Visual Analytics Approach for Exploring Significant Event Evolutions in Social Media", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585638/17D45WrVg7l", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805463", "title": "VASSL: A Visual Analytics Toolkit for Social Spambot Labeling", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805463/1cG4JtVNK2A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a216", "title": "Compositional Microservices for Immersive Social Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a216/1cMFalENINq", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy6qfNW", "title": "European Intelligence and Security Informatics Conference", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOllh1", "doi": "10.1109/EISIC.2011.63", "title": "Extraction Distractions: A Comparison of Social Network Model Construction Methods", "normalizedTitle": "Extraction Distractions: A Comparison of Social Network Model Construction Methods", "abstract": "This study investigates the suitability of automated extraction to generate datasets for social network analysis (SNA) by constructing social networks through Pre Conflict. org's Dyna Link tool and the traditional manual snowball approach. Comparisons between the two techniques are accomplished via analytic results derived from commonly applied SNA centrality measures. Results indicate that automated extraction can incorporate a substantial amount of extraneous actors and relationships into the social network model necessitating an analyst review of the acquired data.", "abstracts": [ { "abstractType": "Regular", "content": "This study investigates the suitability of automated extraction to generate datasets for social network analysis (SNA) by constructing social networks through Pre Conflict. org's Dyna Link tool and the traditional manual snowball approach. Comparisons between the two techniques are accomplished via analytic results derived from commonly applied SNA centrality measures. Results indicate that automated extraction can incorporate a substantial amount of extraneous actors and relationships into the social network model necessitating an analyst review of the acquired data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study investigates the suitability of automated extraction to generate datasets for social network analysis (SNA) by constructing social networks through Pre Conflict. org's Dyna Link tool and the traditional manual snowball approach. Comparisons between the two techniques are accomplished via analytic results derived from commonly applied SNA centrality measures. Results indicate that automated extraction can incorporate a substantial amount of extraneous actors and relationships into the social network model necessitating an analyst review of the acquired data.", "fno": "4406a273", "keywords": [ "Social Network Analysis", "Snowball", "Automated Data Collection", "Muslim Brotherhood", "Centrality Measures Correlation" ], "authors": [ { "affiliation": null, "fullName": "James F. Morris", "givenName": "James F.", "surname": "Morris", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Keith Anthony", "givenName": "Keith", "surname": "Anthony", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kevin T. Kennedy", "givenName": "Kevin T.", "surname": "Kennedy", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Richard F. Deckro", "givenName": "Richard F.", "surname": "Deckro", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "273-276", "year": "2011", "issn": null, "isbn": "978-0-7695-4406-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4406a269", "articleId": "12OmNBcAGNW", "__typename": "AdjacentArticleType" }, "next": { "fno": "4406a277", "articleId": "12OmNxRF6Vd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2009/5121/0/05332108", "title": "Towards automatic extraction of social networks of organizations in PubMed abstracts", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332108/12OmNAoUTtQ", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icetc/2009/3609/0/3609a025", "title": "Students' Interactions in Online Asynchronous Discussion Forum: A Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/icetc/2009/3609a025/12OmNBoNrq9", "parentPublication": { "id": "proceedings/icetc/2009/3609/0", "title": "2009 International Conference on Education Technology and Computer, ICETC 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ficloud/2015/8103/0/8103a714", "title": "Visualizing Social Network Data: A Comparative Study of Asian-American Student Conferences", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2015/8103a714/12OmNrIJqzb", "parentPublication": { "id": "proceedings/ficloud/2015/8103/0", "title": "2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2010/4198/1/4198a128", "title": "A New Method for Measuring Individual Importance in Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscid/2010/4198a128/12OmNwdL7l1", "parentPublication": { "id": "proceedings/iscid/2010/4198/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialcom/2010/4211/0/4211a601", "title": "A Cluster-based Approach for Automatic Social Network Construction", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2010/4211a601/12OmNwsNRgp", "parentPublication": { "id": "proceedings/socialcom/2010/4211/0", "title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612a816", "title": "Applications of Social Network Construction and Analysis in the Medical Referral Process", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612a816/12OmNx8OuF5", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2009/3929/0/3929a632", "title": "Research on the Application of Expert Knowledge Map Based on Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/dasc/2009/3929a632/12OmNxXUhMu", "parentPublication": { "id": "proceedings/dasc/2009/3929/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2011/4523/3/4523c410", "title": "The Study of Microblog Marketing Based on Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/iciii/2011/4523c410/12OmNyRPgDH", "parentPublication": { "id": "proceedings/iciii/2011/4523/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a372", "title": "Trust Centrality in Online Social Networks", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a372/12OmNzTYC2g", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2018/0441/0/08703875", "title": "Toward Semantic Social Network Analysis for Business Big Data", "doi": null, "abstractUrl": "/proceedings-article/skg/2018/08703875/19JEdcve9zy", "parentPublication": { "id": "proceedings/skg/2018/0441/0", "title": "2018 14th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyYm2wy", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBrlPzK", "doi": "10.1109/HICSS.2014.176", "title": "Studying Animation for Real-Time Visual Analytics: A Design Study of Social Media Analytics in Emergency Management", "normalizedTitle": "Studying Animation for Real-Time Visual Analytics: A Design Study of Social Media Analytics in Emergency Management", "abstract": "Domains such as emergency management have a need for real-time change monitoring and pattern analysis, but interface design principles for real-time visual analysis situations are still under development. In this paper, we present early results from a design study in social media visual analytics for emergency management. Our motivation is a main information visualization challenge: the lack of clear design principles informed by research in human cognition for the use of animation in real-time streams. We discuss three domain-specific challenges: (1) Coping with the high volume of social media data that is generated during disaster response, (2) analysts' need to quickly extract relevant features for real-time sense-making; and (3) the effective analysis of social media streams even when some critical attributes are absent. This paper presents preliminary results on a research-based design principle for the use of animation in real-time visual analytics, targeted to support the real-time analysis of social media data in emergency management.", "abstracts": [ { "abstractType": "Regular", "content": "Domains such as emergency management have a need for real-time change monitoring and pattern analysis, but interface design principles for real-time visual analysis situations are still under development. In this paper, we present early results from a design study in social media visual analytics for emergency management. Our motivation is a main information visualization challenge: the lack of clear design principles informed by research in human cognition for the use of animation in real-time streams. We discuss three domain-specific challenges: (1) Coping with the high volume of social media data that is generated during disaster response, (2) analysts' need to quickly extract relevant features for real-time sense-making; and (3) the effective analysis of social media streams even when some critical attributes are absent. This paper presents preliminary results on a research-based design principle for the use of animation in real-time visual analytics, targeted to support the real-time analysis of social media data in emergency management.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Domains such as emergency management have a need for real-time change monitoring and pattern analysis, but interface design principles for real-time visual analysis situations are still under development. In this paper, we present early results from a design study in social media visual analytics for emergency management. Our motivation is a main information visualization challenge: the lack of clear design principles informed by research in human cognition for the use of animation in real-time streams. We discuss three domain-specific challenges: (1) Coping with the high volume of social media data that is generated during disaster response, (2) analysts' need to quickly extract relevant features for real-time sense-making; and (3) the effective analysis of social media streams even when some critical attributes are absent. This paper presents preliminary results on a research-based design principle for the use of animation in real-time visual analytics, targeted to support the real-time analysis of social media data in emergency management.", "fno": "2504b364", "keywords": [ "Media", "Animation", "Real Time Systems", "Visual Analytics", "Data Visualization", "Monitoring", "Visual Cognition", "Real Time Visual Analytics", "Social Media For Emergency Management" ], "authors": [ { "affiliation": "Simon Fraser Univ., Burnaby, BC, Canada", "fullName": "Nadya A. Calderon", "givenName": "Nadya A.", "surname": "Calderon", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser Univ., Burnaby, BC, Canada", "fullName": "Richard Arias-Hernandez", "givenName": "Richard", "surname": "Arias-Hernandez", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser Univ., Burnaby, BC, Canada", "fullName": "Brian Fisher", "givenName": "Brian", "surname": "Fisher", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2014-01-01T00:00:00", "pubType": "proceedings", "pages": "1364-1373", "year": "2014", "issn": null, "isbn": "978-1-4799-2504-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2504b354", "articleId": "12OmNAIvcZO", "__typename": "AdjacentArticleType" }, "next": { "fno": "2504b374", "articleId": "12OmNxX3uxl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ares/2016/0990/0/0990a786", "title": "The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management", "doi": null, "abstractUrl": "/proceedings-article/ares/2016/0990a786/12OmNCeaPTN", "parentPublication": { "id": "proceedings/ares/2016/0990/0", "title": "2016 11th International Conference on Availability, Reliability and Security (ARES )", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2014/6513/0/6513a605", "title": "Crowd Sensing of Urban Emergency Events Based on Social Media Big Data", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2014/6513a605/12OmNCwCLto", "parentPublication": { "id": "proceedings/trustcom/2014/6513/0", "title": "2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b968", "title": "Social Media and Emergency Management: Exploring State and Local Tweets", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b968/12OmNvzJG2f", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363826", "title": "Matisse: A visual analytics system for exploring emotion trends in social media text streams", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363826/12OmNyFCvXJ", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc/2014/7881/0/7881a687", "title": "The Emergent Project: Emergency Management in Social Media Generation Dealing with Big Data from Social Media Data Streams", "doi": null, "abstractUrl": "/proceedings-article/ucc/2014/7881a687/12OmNyvY9wV", "parentPublication": { "id": "proceedings/ucc/2014/7881/0", "title": "2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670a162", "title": "Leveraging Bystander Reports in Emergency Response Work: Framing Emergency Managers Social Media Use", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670a162/12OmNz6iOCO", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2020/02/07381652", "title": "Crowdsourcing Based Description of Urban Emergency Events Using Social Media Big Data", "doi": null, "abstractUrl": "/journal/cc/2020/02/07381652/13rRUxE04mX", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/07/07364284", "title": "Can Twitter Save Lives? A Broad-Scale Study on Visual Social Media Analytics for Public Safety", "doi": null, "abstractUrl": "/journal/tg/2016/07/07364284/13rRUyY294E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2010/06/mex2010060013", "title": "Social Media Analytics and Intelligence", "doi": null, "abstractUrl": "/magazine/ex/2010/06/mex2010060013/13rRUytF45s", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585638", "title": "E-Map: A Visual Analytics Approach for Exploring Significant Event Evolutions in Social Media", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585638/17D45WrVg7l", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBbr", "title": "2009 International Conference on Computational Science and Engineering", "acronym": "cse", "groupId": "1002115", "volume": "4", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwoPtjX", "doi": "10.1109/CSE.2009.120", "title": "First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL", "normalizedTitle": "First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL", "abstract": "Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often involve extensive pre-processing or intensive programming skills that can challenge practitioners and students alike. NodeXL, an open-source template for Microsoft Excel, integrates a library of common network metrics and graph layout algorithms within the familiar spreadsheet format, offering a potentially low-barrier-to-entry framework for teaching and learning SNA. We present the preliminary findings of 2 user studies of 21 graduate students who engaged in SNA using NodeXL. The majority of students, while information professionals, had little technical background or experience with SNA techniques. Six of the participants had more technical backgrounds and were chosen specifically for their experience with graph drawing and information visualization. Our primary objectives were (1) to evaluate NodeXL as an SNA tool for a broad base of users and (2) to explore methods for teaching SNA. Our complementary dual case-study format demonstrates the usability of NodeXL for a diverse set of users, and significantly, the power of a tightly integrated metrics/visualization tool to spark insight and facilitate sense-making for students of SNA.", "abstracts": [ { "abstractType": "Regular", "content": "Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often involve extensive pre-processing or intensive programming skills that can challenge practitioners and students alike. NodeXL, an open-source template for Microsoft Excel, integrates a library of common network metrics and graph layout algorithms within the familiar spreadsheet format, offering a potentially low-barrier-to-entry framework for teaching and learning SNA. We present the preliminary findings of 2 user studies of 21 graduate students who engaged in SNA using NodeXL. The majority of students, while information professionals, had little technical background or experience with SNA techniques. Six of the participants had more technical backgrounds and were chosen specifically for their experience with graph drawing and information visualization. Our primary objectives were (1) to evaluate NodeXL as an SNA tool for a broad base of users and (2) to explore methods for teaching SNA. Our complementary dual case-study format demonstrates the usability of NodeXL for a diverse set of users, and significantly, the power of a tightly integrated metrics/visualization tool to spark insight and facilitate sense-making for students of SNA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often involve extensive pre-processing or intensive programming skills that can challenge practitioners and students alike. NodeXL, an open-source template for Microsoft Excel, integrates a library of common network metrics and graph layout algorithms within the familiar spreadsheet format, offering a potentially low-barrier-to-entry framework for teaching and learning SNA. We present the preliminary findings of 2 user studies of 21 graduate students who engaged in SNA using NodeXL. The majority of students, while information professionals, had little technical background or experience with SNA techniques. Six of the participants had more technical backgrounds and were chosen specifically for their experience with graph drawing and information visualization. Our primary objectives were (1) to evaluate NodeXL as an SNA tool for a broad base of users and (2) to explore methods for teaching SNA. Our complementary dual case-study format demonstrates the usability of NodeXL for a diverse set of users, and significantly, the power of a tightly integrated metrics/visualization tool to spark insight and facilitate sense-making for students of SNA.", "fno": "3823e332", "keywords": [ "Node XL", "Social Network Analysis", "SNA", "Teaching", "Information Visualization", "Visual Analytics", "Graph Drawing", "Multi Dimensional In Depth Long Term Case Studies", "MILC", "Netviz Nirvana" ], "authors": [ { "affiliation": null, "fullName": "Elizabeth M. Bonsignore", "givenName": "Elizabeth M.", "surname": "Bonsignore", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cody Dunne", "givenName": "Cody", "surname": "Dunne", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dana Rotman", "givenName": "Dana", "surname": "Rotman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marc Smith", "givenName": "Marc", "surname": "Smith", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tony Capone", "givenName": "Tony", "surname": "Capone", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Derek L. Hansen", "givenName": "Derek L.", "surname": "Hansen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ben Shneiderman", "givenName": "Ben", "surname": "Shneiderman", "__typename": "ArticleAuthorType" } ], "idPrefix": "cse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "332-339", "year": "2009", "issn": null, "isbn": "978-0-7695-3823-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3823e326", "articleId": "12OmNzWx034", "__typename": "AdjacentArticleType" }, "next": { "fno": "3823e340", "articleId": "12OmNyr8YgQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2012/4654/0/4654a854", "title": "Evaluating Students Online Discussion Performance by Using Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/itng/2012/4654a854/12OmNAq3hHE", "parentPublication": { "id": "proceedings/itng/2012/4654/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2010/4198/1/4198a128", "title": "A New Method for Measuring Individual Importance in Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscid/2010/4198a128/12OmNwdL7l1", "parentPublication": { "id": "proceedings/iscid/2010/4198/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190485", "title": "Applying Social Network Analysis in a course supported by a LMS: Report of a case study", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190485/12OmNxX3uFu", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2013/5114/0/5114a327", "title": "Benefits and Limitations of the Social Network Analysis When Explaining Instances of Ineffective Communication in Two Chemical, Biological, Radiological, Nuclear, and Explosives Simulations", "doi": null, "abstractUrl": "/proceedings-article/cgc/2013/5114a327/12OmNyjtNHQ", "parentPublication": { "id": "proceedings/cgc/2013/5114/0", "title": "2013 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2012/1353/0/06462245", "title": "The adjustment experience of first-year international undergraduate students in engineering", "doi": null, "abstractUrl": "/proceedings-article/fie/2012/06462245/12OmNyqzLZ4", "parentPublication": { "id": "proceedings/fie/2012/1353/0", "title": "2012 Frontiers in Education Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgse/2007/2920/0/29200297", "title": "Seeing inside: Using social network analysis to understand patterns of collaboration and coordination in global software teams", "doi": null, "abstractUrl": "/proceedings-article/icgse/2007/29200297/12OmNywfKHT", "parentPublication": { "id": "proceedings/icgse/2007/2920/0", "title": "International Conference on Global Software Engineering (ICGSE 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840792", "title": "A survey on semantic Web and big data technologies for social network analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840792/12OmNyyO8Ov", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2016/02/07152949", "title": "An Approach Based on Social Network Analysis Applied to a Collaborative Learning Experience", "doi": null, "abstractUrl": "/journal/lt/2016/02/07152949/13rRUwbs2d5", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icceai/2022/6803/0/680300a266", "title": "On The Online Social Interactions in Knowledge Building Community", "doi": null, "abstractUrl": "/proceedings-article/icceai/2022/680300a266/1FUVOLF0LeM", "parentPublication": { "id": "proceedings/icceai/2022/6803/0", "title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073401", "title": "Examining MOOC superposter behavior using social network analysis", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073401/1jjAeuIEAda", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1grOETjaFP2", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "acronym": "ldav", "groupId": "1800568", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1grOFlKsRPO", "doi": "10.1109/LDAV48142.2019.8944264", "title": "VAMD: Visual Analytics for Multimodal Data", "normalizedTitle": "VAMD: Visual Analytics for Multimodal Data", "abstract": "From social media to smart traffic signals, digital records of the state of the world are being produced at unprecedented rates. These data may contain critical information regarding patterns of life or unfolding events, but the necessary pieces may be dispersed across multiple disparate sources. To make matters worse, the data produced is by nature massive, heterogeneous, and imperfect. To deal with this, current solutions typically analyze each data source within its own class. This reduces the problem's complexity but forfeits the potential benefits of discovering nuanced connections and details encompassing an entire situation. In order to exploit these potentially rich (but frequently one-sided) data sources, it is imperative that there exists an environment and supporting tooling that allows for the analysis of heterogeneous data sources within a combined view. This paper presents VAMD, a visual analytics system focused on dealing with large heterogeneous datasets. The design is supported with a use case focused around a disaster response scenario using a curated social media dataset featuring both text and accompanying images.", "abstracts": [ { "abstractType": "Regular", "content": "From social media to smart traffic signals, digital records of the state of the world are being produced at unprecedented rates. These data may contain critical information regarding patterns of life or unfolding events, but the necessary pieces may be dispersed across multiple disparate sources. To make matters worse, the data produced is by nature massive, heterogeneous, and imperfect. To deal with this, current solutions typically analyze each data source within its own class. This reduces the problem's complexity but forfeits the potential benefits of discovering nuanced connections and details encompassing an entire situation. In order to exploit these potentially rich (but frequently one-sided) data sources, it is imperative that there exists an environment and supporting tooling that allows for the analysis of heterogeneous data sources within a combined view. This paper presents VAMD, a visual analytics system focused on dealing with large heterogeneous datasets. The design is supported with a use case focused around a disaster response scenario using a curated social media dataset featuring both text and accompanying images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "From social media to smart traffic signals, digital records of the state of the world are being produced at unprecedented rates. These data may contain critical information regarding patterns of life or unfolding events, but the necessary pieces may be dispersed across multiple disparate sources. To make matters worse, the data produced is by nature massive, heterogeneous, and imperfect. To deal with this, current solutions typically analyze each data source within its own class. This reduces the problem's complexity but forfeits the potential benefits of discovering nuanced connections and details encompassing an entire situation. In order to exploit these potentially rich (but frequently one-sided) data sources, it is imperative that there exists an environment and supporting tooling that allows for the analysis of heterogeneous data sources within a combined view. This paper presents VAMD, a visual analytics system focused on dealing with large heterogeneous datasets. The design is supported with a use case focused around a disaster response scenario using a curated social media dataset featuring both text and accompanying images.", "fno": "08944264", "keywords": [ "Data Analysis", "Data Visualisation", "Disasters", "Road Traffic", "Social Networking Online", "Traffic Engineering Computing", "Curated Social Media Dataset", "VAMD", "Multimodal Data", "Smart Traffic Signals", "Digital Records", "Unprecedented Rates", "Critical Information", "Unfolding Events", "Multiple Disparate Sources", "Data Source", "Nuanced Connections", "Heterogeneous Data Sources", "Visual Analytics System", "Heterogeneous Datasets", "Disaster Response", "Data Visualization", "Classification Algorithms", "Social Networking Online", "Machine Learning Algorithms", "Visual Analytics", "Data Mining", "Image Recognition", "Visual Analytics", "Visualization Toolkit", "Document Analysis", "Data Mining", "Disaster Response", "Human Centered Computing X 2014 Visualization X 2014 Visual Analytics", "Information Systems Applications X 2014 Data Mining" ], "authors": [ { "affiliation": "University of Massachusetts Amherst", "fullName": "John Fallon", "givenName": "John", "surname": "Fallon", "__typename": "ArticleAuthorType" }, { "affiliation": "Smith College", "fullName": "R. Jordan Crouse", "givenName": "R. Jordan", "surname": "Crouse", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "93-94", "year": "2019", "issn": null, "isbn": "978-1-7281-2605-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08944381", "articleId": "1grOFDTENry", "__typename": "AdjacentArticleType" }, "next": { "fno": "08944368", "articleId": "1grOFawK21G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400514", "title": "Big data exploration through visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400514/12OmNC3XhwY", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2013/5765/0/06636762", "title": "Visual analytics for software requirements engineering", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636762/12OmNrJ11yp", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042548", "title": "Integrated visual analytics tool for heterogeneous text data", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042548/12OmNxFJXsT", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08054703", "title": "VAUD: A Visual Analysis Approach for Exploring Spatio-Temporal Urban Data", "doi": null, "abstractUrl": "/journal/tg/2018/09/08054703/13rRUxlgxOq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585638", "title": "E-Map: A Visual Analytics Approach for Exploring Significant Event Evolutions in Social Media", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585638/17D45WrVg7l", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2023/7578/0/757800a293", "title": "NFTeller: Dual Centric Visual Analytics of NFT Transactions", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2023/757800a293/1LFLG16yI0w", "parentPublication": { "id": "proceedings/bigcomp/2023/7578/0", "title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a133", "title": "Visual Analytics to Make Sense of Large-Scale Administrative and Normative Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a133/1cMFavfKXqE", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a196", "title": "A Visual Analytics Approach for the Diagnosis of Heterogeneous and Multidimensional Machine Maintenance Data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a196/1tTtsrCBB8A", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a229", "title": "A Visual Data Science Solution for Visualization and Visual Analytics of Big Sequential Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a229/1y4oGJJ2HzW", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAWpyld", "title": "2013 IEEE 14th International Conference on Mobile Data Management", "acronym": "mdm", "groupId": "1000468", "volume": "2", "displayVolume": "2", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNApcuqo", "doi": "10.1109/MDM.2013.69", "title": "Location Sharing with Trusted Peers -- Measuring Sensitivity of Location Observations", "normalizedTitle": "Location Sharing with Trusted Peers -- Measuring Sensitivity of Location Observations", "abstract": "In the field of computational location privacy there are two active privacy enhancing methods typically available: anonymity and obfuscation (location cloaking). In a communication context with known and (semi-)trusted peers, anonymity is usually not a viable option, hence, leaving location cloaking as a user-centric option to improve an individual's location privacy. In this paper, we discuss the effectiveness and limitations of location cloaking in a location sharing context with partially trusted peers by introducing a location sensitivity metric. We argue that location sensitivity reflects the user's potential privacy-loss by estimating the potential information gain of an observer for a single observation or an observation context. As a result, location cloaking is not always a suitable option and may overestimate the user's location privacy in a communication with a diverse partially trusted observer set.", "abstracts": [ { "abstractType": "Regular", "content": "In the field of computational location privacy there are two active privacy enhancing methods typically available: anonymity and obfuscation (location cloaking). In a communication context with known and (semi-)trusted peers, anonymity is usually not a viable option, hence, leaving location cloaking as a user-centric option to improve an individual's location privacy. In this paper, we discuss the effectiveness and limitations of location cloaking in a location sharing context with partially trusted peers by introducing a location sensitivity metric. We argue that location sensitivity reflects the user's potential privacy-loss by estimating the potential information gain of an observer for a single observation or an observation context. As a result, location cloaking is not always a suitable option and may overestimate the user's location privacy in a communication with a diverse partially trusted observer set.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the field of computational location privacy there are two active privacy enhancing methods typically available: anonymity and obfuscation (location cloaking). In a communication context with known and (semi-)trusted peers, anonymity is usually not a viable option, hence, leaving location cloaking as a user-centric option to improve an individual's location privacy. In this paper, we discuss the effectiveness and limitations of location cloaking in a location sharing context with partially trusted peers by introducing a location sensitivity metric. We argue that location sensitivity reflects the user's potential privacy-loss by estimating the potential information gain of an observer for a single observation or an observation context. As a result, location cloaking is not always a suitable option and may overestimate the user's location privacy in a communication with a diverse partially trusted observer set.", "fno": "4973b073", "keywords": [ "Privacy", "Sensitivity", "Observers", "Context", "Cities And Towns", "Uncertainty" ], "authors": [ { "affiliation": null, "fullName": "Klaus Rechert", "givenName": "Klaus", "surname": "Rechert", "__typename": "ArticleAuthorType" } ], "idPrefix": "mdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-06-01T00:00:00", "pubType": "proceedings", "pages": "73-78", "year": "2013", "issn": null, "isbn": "978-1-4673-6068-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4973b067", "articleId": "12OmNvT2pjU", "__typename": "AdjacentArticleType" }, "next": { "fno": "4973b079", "articleId": "12OmNzBOhDN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sutc/2008/3158/0/3158a090", "title": "A Cloaking Algorithm Based on Spatial Networks for Location Privacy", "doi": null, "abstractUrl": "/proceedings-article/sutc/2008/3158a090/12OmNC3Xhle", "parentPublication": { "id": "proceedings/sutc/2008/3158/0", "title": "2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2010/4193/0/4193a065", "title": "Protecting Location Privacy Using Cloaking Subgraphs on Road Network", "doi": null, "abstractUrl": "/proceedings-article/wisa/2010/4193a065/12OmNqI04Gl", "parentPublication": { "id": "proceedings/wisa/2010/4193/0", "title": "Web Information Systems and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2005/2331/0/23310620", "title": "Location Privacy in Mobile Systems: A Personalized Anonymization Model", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2005/23310620/12OmNwF0BWx", "parentPublication": { "id": "proceedings/icdcs/2005/2331/0", "title": "25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2009/3650/0/3650a355", "title": "Interactive Location Cloaking with the PROBE Obfuscator", "doi": null, "abstractUrl": "/proceedings-article/mdm/2009/3650a355/12OmNwkhThZ", "parentPublication": { "id": "proceedings/mdm/2009/3650/0", "title": "2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2010/4085/0/4085a082", "title": "An Approach for Ensuring Robust Safeguard against Location Privacy Violation", "doi": null, "abstractUrl": "/proceedings-article/compsac/2010/4085a082/12OmNy50g3C", "parentPublication": { "id": "proceedings/compsac/2010/4085/0", "title": "2010 IEEE 34th Annual Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2012/4713/0/4713a336", "title": "SAWLnet: Sensitivity Aware Location Cloaking on Road-NETworks", "doi": null, "abstractUrl": "/proceedings-article/mdm/2012/4713a336/12OmNz2TCFF", "parentPublication": { "id": "proceedings/mdm/2012/4713/0", "title": "2012 IEEE 13th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b120", "title": "Non-Exposure Location Anonymity", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b120/12OmNzZWbRY", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2012/4809/0/4809a017", "title": "k*NNCA: A Location Privacy Preserving Method for Semi-honest Mobile Users", "doi": null, "abstractUrl": "/proceedings-article/icebe/2012/4809a017/12OmNzkuKHN", "parentPublication": { "id": "proceedings/icebe/2012/4809/0", "title": "2012 IEEE Ninth International Conference on e-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2012/08/ttk2012081506", "title": "Protecting Location Privacy against Location-Dependent Attacks in Mobile Services", "doi": null, "abstractUrl": "/journal/tk/2012/08/ttk2012081506/13rRUx0geAh", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2011/938/0/05766939", "title": "On preserving location privacy in mobile environments", "doi": null, "abstractUrl": "/proceedings-article/percomw/2011/05766939/17D45We0UE5", "parentPublication": { "id": "proceedings/percomw/2011/938/0", "title": "2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aU", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "acronym": "bibmw", "groupId": "1001585", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNBigFmH", "doi": "10.1109/BIBMW.2011.6112400", "title": "Protein conformational search with geometric projections", "normalizedTitle": "Protein conformational search with geometric projections", "abstract": "Protein structure prediction remains a central challenge in computational structural biology. Even at the coarse-grained level of detail, the protein conformational space is vast, and available energy functions contain many false local minima. In order to effectively characterize this space, a conformational search must sample a geometrically-diverse set of low-energy conformations. Our recently published FeLTr framework achieves this goal by employing a low-dimensional geometric projection layer to bias conformational sampling towards unexplored regions of the search space. In this work we present a new geometric projection layer based on the effective connectivity measure, which encapsulates interatomic distances within a conformation. Extensive analysis indicates that effective connectivity allows equipping the high-dimensional conformational search with an effective projection layer. On several target proteins, this layer improves significantly over our previous work, resulting in sampling of conformations with significantly lower lRMSDs to the known native structure.", "abstracts": [ { "abstractType": "Regular", "content": "Protein structure prediction remains a central challenge in computational structural biology. Even at the coarse-grained level of detail, the protein conformational space is vast, and available energy functions contain many false local minima. In order to effectively characterize this space, a conformational search must sample a geometrically-diverse set of low-energy conformations. Our recently published FeLTr framework achieves this goal by employing a low-dimensional geometric projection layer to bias conformational sampling towards unexplored regions of the search space. In this work we present a new geometric projection layer based on the effective connectivity measure, which encapsulates interatomic distances within a conformation. Extensive analysis indicates that effective connectivity allows equipping the high-dimensional conformational search with an effective projection layer. On several target proteins, this layer improves significantly over our previous work, resulting in sampling of conformations with significantly lower lRMSDs to the known native structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Protein structure prediction remains a central challenge in computational structural biology. Even at the coarse-grained level of detail, the protein conformational space is vast, and available energy functions contain many false local minima. In order to effectively characterize this space, a conformational search must sample a geometrically-diverse set of low-energy conformations. Our recently published FeLTr framework achieves this goal by employing a low-dimensional geometric projection layer to bias conformational sampling towards unexplored regions of the search space. In this work we present a new geometric projection layer based on the effective connectivity measure, which encapsulates interatomic distances within a conformation. Extensive analysis indicates that effective connectivity allows equipping the high-dimensional conformational search with an effective projection layer. On several target proteins, this layer improves significantly over our previous work, resulting in sampling of conformations with significantly lower lRMSDs to the known native structure.", "fno": "06112400", "keywords": [], "authors": [ { "affiliation": "Department of Computer Science, George Mason University, Fairfax, VA, 22030, USA", "fullName": "Brian Olson", "givenName": "Brian", "surname": "Olson", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, George Mason University, Fairfax, VA, 22030, USA", "fullName": "S. Farid Hendi", "givenName": "S. Farid", "surname": "Hendi", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, George Mason University, Fairfax, VA, 22030, USA", "fullName": "Amarda Shehu", "givenName": "Amarda", "surname": "Shehu", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "366-373", "year": "2011", "issn": null, "isbn": "978-1-4577-1612-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06112399", "articleId": "12OmNrkjVre", "__typename": "AdjacentArticleType" }, "next": { "fno": "06112401", "articleId": "12OmNxFsmFe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2012/2746/0/06470287", "title": "Mapping conformational pathways between known functional protein states", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470287/12OmNqBtiP4", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cinc/2009/3645/1/3645a495", "title": "Study of the Mini-protein Conformational Entropies at Different Temperature", "doi": null, "abstractUrl": "/proceedings-article/cinc/2009/3645a495/12OmNx7XH3N", "parentPublication": { "id": "proceedings/cinc/2009/3645/1", "title": "Computational Intelligence and Natural Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2008/3136/0/3136a911", "title": "Protein Conformational Search Using Bees Algorithm", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a911/12OmNxAlA1V", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359858", "title": "Predicting protein-ligand binding specificity based on ensemble clustering", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359858/12OmNxX3uJe", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470359", "title": "Coarse-grained elastic networks, normal mode analysis and robotics-inspired methods for modeling protein conformational transitions", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470359/12OmNy50g6A", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1998/8707/0/87070040", "title": "The Large Scale Parallelization of a Conformational 3D Protein Structure Prediction Application", "doi": null, "abstractUrl": "/proceedings-article/sc/1998/87070040/12OmNyRg4dN", "parentPublication": { "id": "proceedings/sc/1998/8707/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120418", "title": "Populating Local Minima in the Protein Conformational Space", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120418/12OmNywfKDA", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470380", "title": "A robotics-inspired method to sample conformational paths connecting known functionally-relevant structures in protein systems", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470380/12OmNz61ddP", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/03/07762847", "title": "Conformational Sampling of a Biomolecular Rugged Energy Landscape", "doi": null, "abstractUrl": "/journal/tb/2018/03/07762847/13rRUEgarzX", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2016/05/07315034", "title": "A Novel Method Using Abstract Convex Underestimation in Ab-Initio Protein Structure Prediction for Guiding Search in Conformational Feature Space", "doi": null, "abstractUrl": "/journal/tb/2016/05/07315034/13rRUzpzezm", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC8uRrA", "title": "Technology of Object-Oriented Languages, International Conference on", "acronym": "tools", "groupId": "1000744", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNvqEvPI", "doi": "10.1109/TOOLS.1997.654700", "title": "The translator pattern-external functionality with homomorphic mappings", "normalizedTitle": "The translator pattern-external functionality with homomorphic mappings", "abstract": "The author describes how one can express homomorphic translations with an object-oriented design. This includes a uniform approach to the addition of external functionality to data structures. He presents the tradeoffs of distributing intrinsic and extrinsic properties to data structures and external functions respectively. A mini-architecture (design pattern) for the emulation of multi-dispatching functions is presented in order to allow the definition of local translation functions. Actually, he presents a variant of the Visitor pattern, but adds the idea of maintaining a homomorphism between source and target and introduces a target structure between source structure and target semantics. Combined, these concepts pave the way to incremental evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "The author describes how one can express homomorphic translations with an object-oriented design. This includes a uniform approach to the addition of external functionality to data structures. He presents the tradeoffs of distributing intrinsic and extrinsic properties to data structures and external functions respectively. A mini-architecture (design pattern) for the emulation of multi-dispatching functions is presented in order to allow the definition of local translation functions. Actually, he presents a variant of the Visitor pattern, but adds the idea of maintaining a homomorphism between source and target and introduces a target structure between source structure and target semantics. Combined, these concepts pave the way to incremental evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The author describes how one can express homomorphic translations with an object-oriented design. This includes a uniform approach to the addition of external functionality to data structures. He presents the tradeoffs of distributing intrinsic and extrinsic properties to data structures and external functions respectively. A mini-architecture (design pattern) for the emulation of multi-dispatching functions is presented in order to allow the definition of local translation functions. Actually, he presents a variant of the Visitor pattern, but adds the idea of maintaining a homomorphism between source and target and introduces a target structure between source structure and target semantics. Combined, these concepts pave the way to incremental evaluation.", "fno": "83830048", "keywords": [ "Data Structures", "Translator Pattern", "External Functionality", "Homomorphic Mappings", "Object Oriented Design", "Data Structures", "Extrinsic Properties", "Intrinsic Properties", "Mini Architecture", "Multi Dispatching Function Emulation", "Local Translation Functions", "Visitor Pattern", "Source Structure", "Target Semantics", "Incremental Evaluation", "Data Structures", "Equations", "Computer Science", "Emulation", "Plugs", "Programming Environments", "Testing", "Assembly", "Vegetation Mapping" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Darmstadt Univ. of Technol., Germany", "fullName": "T. Kuhne", "givenName": "T.", "surname": "Kuhne", "__typename": "ArticleAuthorType" } ], "idPrefix": "tools", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-01-01T00:00:00", "pubType": "proceedings", "pages": "48-62", "year": "1997", "issn": null, "isbn": "0-8186-8383-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00713578", "articleId": "12OmNApLGwN", "__typename": "AdjacentArticleType" }, "next": { "fno": "8383x", "articleId": "12OmNB9bvbN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/saint/2010/4107/0/4107a293", "title": "Implementation Approach for Network Coding using External Devices in IP Multicast", "doi": null, "abstractUrl": "/proceedings-article/saint/2010/4107a293/12OmNAKM02W", "parentPublication": { "id": "proceedings/saint/2010/4107/0", "title": "2010 10th IEEE/IPSJ International Symposium on Applications and the Internet", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2012/3051/0/364fattah", "title": "CoNA: Dynamic application mapping for congestion reduction in many-core systems", "doi": null, "abstractUrl": "/proceedings-article/iccd/2012/364fattah/12OmNBr4eEv", "parentPublication": { "id": "proceedings/iccd/2012/3051/0", "title": "2012 IEEE 30th International Conference on Computer Design (ICCD 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/1995/7109/0/71090034", "title": "Data Alignments for Modular Time-Space Mappings of BLAS-like Algorithms", "doi": null, "abstractUrl": "/proceedings-article/asap/1995/71090034/12OmNC943Ah", "parentPublication": { "id": "proceedings/asap/1995/7109/0", "title": "Proceedings The International Conference on Application Specific Array Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csma/2015/9166/0/9166a036", "title": "A MPI-Friendly Efficient Static Binary Translator Based on QEMU", "doi": null, "abstractUrl": "/proceedings-article/csma/2015/9166a036/12OmNvDqsFO", "parentPublication": { "id": "proceedings/csma/2015/9166/0", "title": "2015 International Conference on Computer Science and Mechanical Automation (CSMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2011/4607/2/4607b206", "title": "A Kernel Method for Real-Time Respiratory Tumor Motion Estimation Using External Surrogates", "doi": null, "abstractUrl": "/proceedings-article/icmla/2011/4607b206/12OmNyOq55p", "parentPublication": { "id": "proceedings/icmla/2011/4607/2", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/date/2012/2145/0/06176666", "title": "Enhancing non-linear kernels by an optimized memory hierarchy in a High Level Synthesis flow", "doi": null, "abstractUrl": "/proceedings-article/date/2012/06176666/12OmNywfKIq", "parentPublication": { "id": "proceedings/date/2012/2145/0", "title": "Design, Automation &amp; Test in Europe Conference &amp; Exhibition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/1988/0872/0/00025702", "title": "Mapping properties of multi-level logic synthesis operations", "doi": null, "abstractUrl": "/proceedings-article/iccd/1988/00025702/12OmNzUPpzX", "parentPublication": { "id": "proceedings/iccd/1988/0872/0", "title": "Proceedings 1988 IEEE International Conference on Computer Design: VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBgQFM2", "title": "9th Symposium on Computer Arithmetic", "acronym": "arith", "groupId": "1000125", "volume": "0", "displayVolume": "0", "year": "1989", "__typename": "ProceedingType" }, "article": { "id": "12OmNwudQMD", "doi": "10.1109/ARITH.1989.72825", "title": "Cascade: hardware for high/variable precision arithmetic", "normalizedTitle": "Cascade: hardware for high/variable precision arithmetic", "abstract": "The Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root, and computation of the greatest divisor. It is object-oriented and implements an abstract class of objects, variable precision integers. It provides a complete suite of memory management functions implemented in hardware, including a garbage collector. The Cascade hardware permits free tradeoffs of space versus time.<>", "abstracts": [ { "abstractType": "Regular", "content": "The Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root, and computation of the greatest divisor. It is object-oriented and implements an abstract class of objects, variable precision integers. It provides a complete suite of memory management functions implemented in hardware, including a garbage collector. The Cascade hardware permits free tradeoffs of space versus time.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Cascade hardware architecture for high/variable precision arithmetic is described. It uses a radix-16 redundant signed-digit number representation and directly supports single or multiple precision addition, subtraction, multiplication, division, extraction of the square root, and computation of the greatest divisor. It is object-oriented and implements an abstract class of objects, variable precision integers. It provides a complete suite of memory management functions implemented in hardware, including a garbage collector. The Cascade hardware permits free tradeoffs of space versus time.", "fno": "00072825", "keywords": [ "Digital Arithmetic", "Cascade Hardware Architecture", "High Variable Precision Arithmetic", "Radix 16 Redundant Signed Digit Number Representation", "Addition", "Subtraction", "Multiplication", "Division", "Extraction", "Square Root", "Object Oriented", "Variable Precision Integers", "Memory Management Functions", "Garbage Collector", "Hardware", "Memory Management", "Digital Arithmetic", "Computer Architecture", "Cryptography", "Equations", "Acceleration", "Computer Science", "Cities And Towns", "Application Software" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Utah Univ., Salt Lake City, UT, USA", "fullName": "T.M. Carter", "givenName": "T.M.", "surname": "Carter", "__typename": "ArticleAuthorType" } ], "idPrefix": "arith", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1989-01-01T00:00:00", "pubType": "proceedings", "pages": "184,185,186,187,188,189,190,191", "year": "1989", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00072824", "articleId": "12OmNyRPgO3", "__typename": "AdjacentArticleType" }, "next": { "fno": "00072826", "articleId": "12OmNwDACtQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asap/2000/0716/0/07160215", "title": "A Hardware Algorithm for Variable-Precision Logarithm", "doi": null, "abstractUrl": "/proceedings-article/asap/2000/07160215/12OmNBO3JWi", "parentPublication": { "id": "proceedings/asap/2000/0716/0", "title": "Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/1995/7089/0/70890222", "title": "Hardware Design and Arithmetic Algorithms for a Variable-Precision, Interval Arithmetic Coprocessor", "doi": null, "abstractUrl": "/proceedings-article/arith/1995/70890222/12OmNCu4nf9", "parentPublication": { "id": "proceedings/arith/1995/7089/0", "title": "Computer Arithmetic, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fpl/2011/4529/0/4529a252", "title": "VPFPAP: A Special-Purpose VLIW Processor for Variable-Precision Floating-Point Arithmetic", "doi": null, "abstractUrl": "/proceedings-article/fpl/2011/4529a252/12OmNrkBwGy", "parentPublication": { "id": "proceedings/fpl/2011/4529/0", "title": "International Conference on Field Programmable Logic and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acssc/1997/8316/2/00679089", "title": "A high-radix multiplier design for variable long-precision computations", "doi": null, "abstractUrl": "/proceedings-article/acssc/1997/00679089/12OmNweBUJh", "parentPublication": { "id": "proceedings/acssc/1997/8316/2", "title": "Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36163)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/1994/6517/0/00331799", "title": "A variable-precision interval arithmetic processor", "doi": null, "abstractUrl": "/proceedings-article/asap/1994/00331799/12OmNy4IF2m", "parentPublication": { "id": "proceedings/asap/1994/6517/0", "title": "Proceedings of IEEE International Conference on Application Specific Array Processors (ASSAP'94)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arith/1991/9151/0/00145548", "title": "Specifications for a variable-precision arithmetic coprocessor", "doi": null, "abstractUrl": "/proceedings-article/arith/1991/00145548/12OmNyGbI8Q", "parentPublication": { "id": "proceedings/arith/1991/9151/0", "title": "Proceedings 10th IEEE Symposium on Computer Arithmetic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fpgm/2001/2667/0/01420903", "title": "A Reconfigurable Co-Processor for Variable Long Precision Arithmetic Using Indian Algorithms", "doi": null, "abstractUrl": "/proceedings-article/fpgm/2001/01420903/12OmNzvQHRe", "parentPublication": { "id": "proceedings/fpgm/2001/2667/0", "title": "The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2000/05/t0387", "title": "A Family of Variable-Precision Interval Arithmetic Processors", "doi": null, "abstractUrl": "/journal/tc/2000/05/t0387/13rRUILLkuE", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2004/09/01327635", "title": "Variable precision arithmetic circuits for FPGA-based multimedia processors", "doi": null, "abstractUrl": "/journal/si/2004/09/01327635/13rRUxOdD5w", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2020/7147/0/09153231", "title": "Reconfigurable Stream-based Tensor Unit with Variable-Precision Posit Arithmetic", "doi": null, "abstractUrl": "/proceedings-article/asap/2020/09153231/1lUFmwgDFiU", "parentPublication": { "id": "proceedings/asap/2020/7147/0", "title": "2020 IEEE 31st International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAo45Cb", "title": "Proceedings. The 2005 IEEE/WIC/ACM International Conference on Web Intelligence", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwENuO", "doi": "10.1109/WI.2005.43", "title": "Biological Ontology Enhancement with Fuzzy Relations: A Text-Mining Framework", "normalizedTitle": "Biological Ontology Enhancement with Fuzzy Relations: A Text-Mining Framework", "abstract": "Domain ontology can help in information retrieval from documents. But ontology is a pre-defined structure with crisp concept descriptions and inter-concept relations. However, due to the dynamic nature of the document repository, ontology should be upgradeable with information extracted through text mining of documents in the domain. This also necessitates that concepts, their descriptions and inter-concept relations should be associated with a degree of fuzziness that will indicate the support for the extracted knowledge according to the currently available resources. Supports may be revised with more knowledge coming in future. This approach preserves the basic structured knowledge format for storing domain knowledge, but at the same time allows for update of information. In this paper, we have proposed a mechanism which initiates text mining with a set of ontological concepts, and thereafter extracts fuzzy relations through text mining. Membership values of relations are functions of frequency of co-occurrence of concepts and relations. We have worked on the GENIA corpus and shown how fuzzy relations can be further used for guided information extraction from MEDLINE documents.", "abstracts": [ { "abstractType": "Regular", "content": "Domain ontology can help in information retrieval from documents. But ontology is a pre-defined structure with crisp concept descriptions and inter-concept relations. However, due to the dynamic nature of the document repository, ontology should be upgradeable with information extracted through text mining of documents in the domain. This also necessitates that concepts, their descriptions and inter-concept relations should be associated with a degree of fuzziness that will indicate the support for the extracted knowledge according to the currently available resources. Supports may be revised with more knowledge coming in future. This approach preserves the basic structured knowledge format for storing domain knowledge, but at the same time allows for update of information. In this paper, we have proposed a mechanism which initiates text mining with a set of ontological concepts, and thereafter extracts fuzzy relations through text mining. Membership values of relations are functions of frequency of co-occurrence of concepts and relations. We have worked on the GENIA corpus and shown how fuzzy relations can be further used for guided information extraction from MEDLINE documents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Domain ontology can help in information retrieval from documents. But ontology is a pre-defined structure with crisp concept descriptions and inter-concept relations. However, due to the dynamic nature of the document repository, ontology should be upgradeable with information extracted through text mining of documents in the domain. This also necessitates that concepts, their descriptions and inter-concept relations should be associated with a degree of fuzziness that will indicate the support for the extracted knowledge according to the currently available resources. Supports may be revised with more knowledge coming in future. This approach preserves the basic structured knowledge format for storing domain knowledge, but at the same time allows for update of information. In this paper, we have proposed a mechanism which initiates text mining with a set of ontological concepts, and thereafter extracts fuzzy relations through text mining. Membership values of relations are functions of frequency of co-occurrence of concepts and relations. We have worked on the GENIA corpus and shown how fuzzy relations can be further used for guided information extraction from MEDLINE documents.", "fno": "24150379", "keywords": [ "Biological Information Extraction", "Text Mining", "Fuzzy Ontology", "Fuzzy Relation" ], "authors": [ { "affiliation": "Jamia Millia Islamia (A Central University)", "fullName": "Muhammad Abulaish", "givenName": "Muhammad", "surname": "Abulaish", "__typename": "ArticleAuthorType" }, { "affiliation": "Indian Institute of Technology", "fullName": "Lipika Dey", "givenName": "Lipika", "surname": "Dey", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-09-01T00:00:00", "pubType": "proceedings", "pages": "379-385", "year": "2005", "issn": null, "isbn": "0-7695-2415-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24150372", "articleId": "12OmNwEJ0Wx", "__typename": "AdjacentArticleType" }, "next": { "fno": "24150386", "articleId": "12OmNwHz08L", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icee/2010/3997/0/3997b456", "title": "Text Mining Based on Domain Ontology", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997b456/12OmNB1eJxz", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2008/3263/0/3263a073", "title": "Study on Ontology Partition Based on Ant Colony Algorithm", "doi": null, "abstractUrl": "/proceedings-article/snpd/2008/3263a073/12OmNvAiSyK", "parentPublication": { "id": "proceedings/snpd/2008/3263/0", "title": "2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2009/3904/0/3904a211", "title": "Automatic Domain-Ontology Relation Extraction from Semi-structured Texts", "doi": null, "abstractUrl": "/proceedings-article/ialp/2009/3904a211/12OmNvTk01W", "parentPublication": { "id": "proceedings/ialp/2009/3904/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2013/4932/0/4932a317", "title": "Automatic Evaluation of Domain-Specific Ontology Based on Ontology Co-relation Network", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a317/12OmNwHyZUr", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2004/2140/0/21400182", "title": "Adaptive Documents Classification System Based on Ontology Constructed by Fuzzy Function and Fuzzy Relations", "doi": null, "abstractUrl": "/proceedings-article/cw/2004/21400182/12OmNxdVgUx", "parentPublication": { "id": "proceedings/cw/2004/2140/0", "title": "2004 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2011/4367/0/4367a585", "title": "Relation Characterization Using Ontological Concepts", "doi": null, "abstractUrl": "/proceedings-article/itng/2011/4367a585/12OmNxiKrZK", "parentPublication": { "id": "proceedings/itng/2011/4367/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a202", "title": "Axiom-Based Feedback Cycle for Relation Extraction in Ontology Learning from Text", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a202/12OmNy4IEYc", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2007/3026/0/30260156", "title": "Mining Fuzzy Domain Ontology from Textual Databases", "doi": null, "abstractUrl": "/proceedings-article/wi/2007/30260156/12OmNyKrH5B", "parentPublication": { "id": "proceedings/wi/2007/3026/0", "title": "2007 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eknow/2009/3531/0/3531a123", "title": "Ontology-Based Focused Crawling", "doi": null, "abstractUrl": "/proceedings-article/eknow/2009/3531a123/12OmNzFv4dm", "parentPublication": { "id": "proceedings/eknow/2009/3531/0", "title": "Information, Process, and Knowledge Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icds/2010/3953/0/3953a164", "title": "Towards Learning Domain Ontology from Legacy Documents", "doi": null, "abstractUrl": "/proceedings-article/icds/2010/3953a164/12OmNzwZ6wO", "parentPublication": { "id": "proceedings/icds/2010/3953/0", "title": "International Conference on the Digital Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxzMnTW", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "acronym": "dexa", "groupId": "1000180", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyFCvQ2", "doi": "10.1109/DEXA.2015.60", "title": "Distance Based Queries in Open Street Map", "normalizedTitle": "Distance Based Queries in Open Street Map", "abstract": "Volunteered geographic information (VGI) makes available a very large resource of geographic data. The exploitation of data coming from such resources requires an additional effort in the form of tools and effective processing techniques. One of the most stablished VGI is Open Street Map (OSM) offering data of urban and rural maps from the earth. Recently, we have presented a library for querying OSM data with the XML query language XQuery. This library is based on the well-known spatial operators defined by Clementini and Egenhofer, providing a repertoire of XQuery functions which encapsulate the search on the XML document representing a layer of OSM, and make the definition and composition of queries on top of OSM layers easier. In this paper, we will show how to extend the library in order to express distance based queries. Distances will be used either to get layers of objects in a certain distance from a given object, or to express queries involving closeness concepts.", "abstracts": [ { "abstractType": "Regular", "content": "Volunteered geographic information (VGI) makes available a very large resource of geographic data. The exploitation of data coming from such resources requires an additional effort in the form of tools and effective processing techniques. One of the most stablished VGI is Open Street Map (OSM) offering data of urban and rural maps from the earth. Recently, we have presented a library for querying OSM data with the XML query language XQuery. This library is based on the well-known spatial operators defined by Clementini and Egenhofer, providing a repertoire of XQuery functions which encapsulate the search on the XML document representing a layer of OSM, and make the definition and composition of queries on top of OSM layers easier. In this paper, we will show how to extend the library in order to express distance based queries. Distances will be used either to get layers of objects in a certain distance from a given object, or to express queries involving closeness concepts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Volunteered geographic information (VGI) makes available a very large resource of geographic data. The exploitation of data coming from such resources requires an additional effort in the form of tools and effective processing techniques. One of the most stablished VGI is Open Street Map (OSM) offering data of urban and rural maps from the earth. Recently, we have presented a library for querying OSM data with the XML query language XQuery. This library is based on the well-known spatial operators defined by Clementini and Egenhofer, providing a repertoire of XQuery functions which encapsulate the search on the XML document representing a layer of OSM, and make the definition and composition of queries on top of OSM layers easier. In this paper, we will show how to extend the library in order to express distance based queries. Distances will be used either to get layers of objects in a certain distance from a given object, or to express queries involving closeness concepts.", "fno": "07406299", "keywords": [ "Libraries", "XML", "Cities And Towns", "Database Languages", "Indexing", "Java", "Earth", "Xquery", "Open Street Map", "XML" ], "authors": [ { "affiliation": null, "fullName": "Jesús M. Almendros-Jiménez", "givenName": "Jesús M.", "surname": "Almendros-Jiménez", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio Becerra-Terón", "givenName": "Antonio", "surname": "Becerra-Terón", "__typename": "ArticleAuthorType" } ], "idPrefix": "dexa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "235-239", "year": "2015", "issn": "1529-4188", "isbn": "978-1-4673-7581-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07406298", "articleId": "12OmNqzcvLf", "__typename": "AdjacentArticleType" }, "next": { "fno": "07406300", "articleId": "12OmNzvz6MD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2003/1939/0/01204908", "title": "On querying geospatial and georeferenced metadata resources in G-Portal", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2003/01204908/12OmNBIWXBL", "parentPublication": { "id": "proceedings/jcdl/2003/1939/0", "title": "Digital Libraries, Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isccs/2011/4443/0/4443a279", "title": "Discussion on the Improvement of XML Grouping Queries Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isccs/2011/4443a279/12OmNBOCWwp", "parentPublication": { "id": "proceedings/isccs/2011/4443/0", "title": "Computer Science and Society, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221768", "title": "XMLTable Index - An Efficient Way of Indexing and Querying XML Property Data", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221768/12OmNBQTJlA", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cec/2012/4857/0/4857a126", "title": "Analyzing the Effect of Open Street Map During Crises: The Great East Japan Earthquake", "doi": null, "abstractUrl": "/proceedings-article/cec/2012/4857a126/12OmNrGb2f1", "parentPublication": { "id": "proceedings/cec/2012/4857/0", "title": "2012 IEEE 14th International Conference on Commerce and Enterprise Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcse/2009/3570/1/3570a382", "title": "Implementing Web Searching with XQuery Language", "doi": null, "abstractUrl": "/proceedings-article/wcse/2009/3570a382/12OmNx6PitI", "parentPublication": { "id": "proceedings/wcse/2009/3570/1", "title": "2009 WRI World Congress on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2015/7905/0/7905a134", "title": "Efficient Processing of Queries over Recursive XML Data", "doi": null, "abstractUrl": "/proceedings-article/aina/2015/7905a134/12OmNxIzWPw", "parentPublication": { "id": "proceedings/aina/2015/7905/0", "title": "2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2010/4235/0/4235a009", "title": "Local Query Generation for Distributed XQuery Queries", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2010/4235a009/12OmNzBOhOD", "parentPublication": { "id": "proceedings/cyberc/2010/4235/0", "title": "2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07364013", "title": "Scalable preference queries for high-dimensional data using map-reduce", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364013/12OmNzVoBBt", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/07/ttk2013071559", "title": "Lineage Encoding: An Efficient Wireless XML Streaming Supporting Twig Pattern Queries", "doi": null, "abstractUrl": "/journal/tk/2013/07/ttk2013071559/13rRUwInvlq", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2011/938/0/05766944", "title": "Crowdsourcing location-based queries", "doi": null, "abstractUrl": "/proceedings-article/percomw/2011/05766944/17D45WB0qai", "parentPublication": { "id": "proceedings/percomw/2011/938/0", "title": "2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2011). PerCom-Workshops 2011: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxX3uMV", "title": "2011 Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyFU77S", "doi": "10.1109/FIE.2011.6143050", "title": "First experiences with eBlocks as an assistive technology for individuals with autistic spectrum condition", "normalizedTitle": "First experiences with eBlocks as an assistive technology for individuals with autistic spectrum condition", "abstract": "The integration of technology into autistic classrooms has shown promising results, including an increase in attention span, creativity, and social skills. We have introduced a low-cost learning technology composed by electronic modules called eBlocks to an autistic middle-school classroom. The participants of this study had the opportunity to learn concepts in the design and implementation of electronic systems by using the eBlocks. Our initial findings show that the integration of hands-on real world based projects, centered on the design of systems for a Smart House estimulated peer-to-peer interaction and teamwork, while promoting spontaneous creative thinking. We present our experiences with six students, including summaries of our overall experiences, teacher's pre-and post-surveys, and the examination of students' work.", "abstracts": [ { "abstractType": "Regular", "content": "The integration of technology into autistic classrooms has shown promising results, including an increase in attention span, creativity, and social skills. We have introduced a low-cost learning technology composed by electronic modules called eBlocks to an autistic middle-school classroom. The participants of this study had the opportunity to learn concepts in the design and implementation of electronic systems by using the eBlocks. Our initial findings show that the integration of hands-on real world based projects, centered on the design of systems for a Smart House estimulated peer-to-peer interaction and teamwork, while promoting spontaneous creative thinking. We present our experiences with six students, including summaries of our overall experiences, teacher's pre-and post-surveys, and the examination of students' work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The integration of technology into autistic classrooms has shown promising results, including an increase in attention span, creativity, and social skills. We have introduced a low-cost learning technology composed by electronic modules called eBlocks to an autistic middle-school classroom. The participants of this study had the opportunity to learn concepts in the design and implementation of electronic systems by using the eBlocks. Our initial findings show that the integration of hands-on real world based projects, centered on the design of systems for a Smart House estimulated peer-to-peer interaction and teamwork, while promoting spontaneous creative thinking. We present our experiences with six students, including summaries of our overall experiences, teacher's pre-and post-surveys, and the examination of students' work.", "fno": "06143050", "keywords": [ "Computer Aided Instruction", "Handicapped Aids", "E Blocks", "Assistive Technology", "Autistic Spectrum Condition", "Attention Span", "Social Skills", "Low Cost Learning Technology", "Electronic Modules", "Autistic Middle School Classroom", "Smart House", "Peer To Peer Interaction", "Teamwork", "Creative Thinking", "Education", "Conferences", "Cities And Towns", "Teamwork", "Lighting", "Visualization", "Alarm Systems", "Learning Technologies", "Autism", "Disabilities Studies", "Human Computer Interaction In Education" ], "authors": [ { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona", "fullName": "Jennifer Drain", "givenName": "Jennifer", "surname": "Drain", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona", "fullName": "Mario Riojas", "givenName": "Mario", "surname": "Riojas", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona", "fullName": "Susan Lysecky", "givenName": "Susan", "surname": "Lysecky", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Arizona", "fullName": "Jerzy Rozenblit", "givenName": "Jerzy", "surname": "Rozenblit", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "T3D-1-T3D-7", "year": "2011", "issn": "0190-5848", "isbn": "978-1-61284-468-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06143049", "articleId": "12OmNscOUeT", "__typename": "AdjacentArticleType" }, "next": { "fno": "06143051", "articleId": "12OmNBpEeYg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2011/468/0/06142895", "title": "A social-based meta-multidisciplinary framework to motivate the creation of a new generation of electronics 2.0 systems", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142895/12OmNAhOULd", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2014/5041/0/06962174", "title": "Mobile cultural experiences and their long-term preservation", "doi": null, "abstractUrl": "/proceedings-article/wimob/2014/06962174/12OmNC3FG8E", "parentPublication": { "id": "proceedings/wimob/2014/5041/0", "title": "2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142963", "title": "Experiences with CS2 and data structures in the 100 problems format", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142963/12OmNrAdswq", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06143034", "title": "Design-based research: A framework for designing novel teaching and learning experiences in middle school engineering education", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06143034/12OmNwBjP7j", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gdn/1993/4270/0/00336591", "title": "Introducing Internet to Egypt: experiences and challenges", "doi": null, "abstractUrl": "/proceedings-article/gdn/1993/00336591/12OmNxisQW8", "parentPublication": { "id": "proceedings/gdn/1993/4270/0", "title": "First IEEE Symposium on Global Data Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142997", "title": "Understanding a studio environment: A complex system approach to a community of practice", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142997/12OmNy6qfJr", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06143055", "title": "Interactions among undergraduate engineers: How care and respect are demonstrated among peers", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06143055/12OmNyuy9YG", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2013/0820/0/06632618", "title": "Asymmetric game design and player location: An empirical study on mobile play experiences", "doi": null, "abstractUrl": "/proceedings-article/cgames/2013/06632618/12OmNzZEAsM", "parentPublication": { "id": "proceedings/cgames/2013/0820/0", "title": "2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAo45Ci", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRg4tQ", "doi": "10.1109/ICDAR.1993.395775", "title": "A block segmentation method for document images with complicated column structures", "normalizedTitle": "A block segmentation method for document images with complicated column structures", "abstract": "Presents a novel block segmentation method for document images which can be applied to various document formats. Some documents have complicated column structures, in which some figure areas have no surrounding rectangles and others cut across text areas. In the approach presented, in order to segment documents into text and figure areas, the text areas are analyzed first, and the figure areas are then detected by analyzing information on the text areas. The overall process is as follows. First, character strings are merged into text groups by analyzing regularity in the text areas. Next, border lines of columns are detected by linking the edges of the text groups. After that, the whole page is segmented into small blocks according to the border lines. The blocks are then unified by using the column information, and some unified blocks are detected. Finally, a projection profile method is applied to the unified blocks in order to detect text areas and figure areas. This method was applied to 61 pages of Japanese technical papers and magazines, and 93.3% of the text areas and 93.2% of the figure areas were detected correctly.<>", "abstracts": [ { "abstractType": "Regular", "content": "Presents a novel block segmentation method for document images which can be applied to various document formats. Some documents have complicated column structures, in which some figure areas have no surrounding rectangles and others cut across text areas. In the approach presented, in order to segment documents into text and figure areas, the text areas are analyzed first, and the figure areas are then detected by analyzing information on the text areas. The overall process is as follows. First, character strings are merged into text groups by analyzing regularity in the text areas. Next, border lines of columns are detected by linking the edges of the text groups. After that, the whole page is segmented into small blocks according to the border lines. The blocks are then unified by using the column information, and some unified blocks are detected. Finally, a projection profile method is applied to the unified blocks in order to detect text areas and figure areas. This method was applied to 61 pages of Japanese technical papers and magazines, and 93.3% of the text areas and 93.2% of the figure areas were detected correctly.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents a novel block segmentation method for document images which can be applied to various document formats. Some documents have complicated column structures, in which some figure areas have no surrounding rectangles and others cut across text areas. In the approach presented, in order to segment documents into text and figure areas, the text areas are analyzed first, and the figure areas are then detected by analyzing information on the text areas. The overall process is as follows. First, character strings are merged into text groups by analyzing regularity in the text areas. Next, border lines of columns are detected by linking the edges of the text groups. After that, the whole page is segmented into small blocks according to the border lines. The blocks are then unified by using the column information, and some unified blocks are detected. Finally, a projection profile method is applied to the unified blocks in order to detect text areas and figure areas. This method was applied to 61 pages of Japanese technical papers and magazines, and 93.3% of the text areas and 93.2% of the figure areas were detected correctly.", "fno": "00395775", "keywords": [ "Document Image Processing", "Image Segmentation", "Merging", "Page Segmentation", "Block Unification", "Japanese Magazines", "Block Segmentation Method", "Document Images", "Complicated Column Structures", "Document Formats", "Figure Areas", "Text Areas", "Character Strings", "Text Groups", "Regularity", "Border Lines", "Projection Profile Method", "Japanese Technical Papers", "Image Segmentation", "Information Analysis", "Databases", "Laboratories", "Cities And Towns", "Image Edge Detection", "Joining Processes", "Publishing", "Text Recognition", "Image Analysis" ], "authors": [ { "affiliation": "IBM Japan Ltd., Yamato city, Kanagawa, Japan", "fullName": "Y. Hirayama", "givenName": "Y.", "surname": "Hirayama", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "91,92,93,94", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00395774", "articleId": "12OmNyrIarM", "__typename": "AdjacentArticleType" }, "next": { "fno": "00395776", "articleId": "12OmNyQGS6a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icfhr/2012/2262/0/06424377", "title": "Handwritten and Machine Printed Text Separation in Document Images Using the Bag of Visual Words Paradigm", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2012/06424377/12OmNA0dMQe", "parentPublication": { "id": "proceedings/icfhr/2012/2262/0", "title": "2012 International Conference on Frontiers in Handwriting Recognition (ICFHR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576285", "title": "A robust and multiscale document image segmentation for block line/text line structures extraction", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576285/12OmNAmE5Xz", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1993/4960/0/00395784", "title": "Document skew detection based on local region complexity", "doi": null, "abstractUrl": "/proceedings-article/icdar/1993/00395784/12OmNBQC8aK", "parentPublication": { "id": "proceedings/icdar/1993/4960/0", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1993/4960/0/00395631", "title": "Block segmentation and text area extraction of vertically/horizontally written document", "doi": null, "abstractUrl": "/proceedings-article/icdar/1993/00395631/12OmNrnJ6Zd", "parentPublication": { "id": "proceedings/icdar/1993/4960/0", "title": "Proceedings of 2nd International Conference on Document Analysis and Recognition (ICDAR '93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a973", "title": "Text and Non-text Segmentation and Classification from Document Images", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a973/12OmNwqx48o", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323855", "title": "Document image understanding: geometric and logical layout", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323855/12OmNxZkhrV", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/1/71280128", "title": "Block selection: a method for segmenting a page image of various editing styles", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71280128/12OmNxwncj9", "parentPublication": { "id": "proceedings/icdar/1995/7128/1", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/1995/7128/2/71280583", "title": "A method for table structure analysis using DP matching", "doi": null, "abstractUrl": "/proceedings-article/icdar/1995/71280583/12OmNyo1nMQ", "parentPublication": { "id": "proceedings/icdar/1995/7128/2", "title": "Proceedings of 3rd International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dial/2004/2088/0/20880233", "title": "Gabor Filter Based Block Energy Analysis for Text Extraction from Digital Document Images", "doi": null, "abstractUrl": "/proceedings-article/dial/2004/20880233/12OmNz2TCAX", "parentPublication": { "id": "proceedings/dial/2004/2088/0", "title": "Proceedings. First Workshop on Document Image Analysis for Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2007/2822/1/28220307", "title": "Locating Charts from Scanned Document Pages", "doi": null, "abstractUrl": "/proceedings-article/icdar/2007/28220307/12OmNz2TCFL", "parentPublication": { "id": "proceedings/icdar/2007/2822/1", "title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzFMFpm", "title": "2015 Second International Conference on eDemocracy & eGovernment (ICEDEG)", "acronym": "icedeg", "groupId": "1803698", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyS6RBq", "doi": "10.1109/ICEDEG.2015.7114459", "title": "Use of geographic information systems with open source solutions, an approach to access edemocracy & egovernment", "normalizedTitle": "Use of geographic information systems with open source solutions, an approach to access edemocracy & egovernment", "abstract": "Nowadays the advance of technology enables innovation for democracy, government and governance [2]. E-Governance takes advantage of it and uses the Information and Communication Technologies (ICTs) [11,8,6], that allow a centric governance (Meier, 2012; Saxena, 2005). The emergence of E-Governance allows E-Government, E-Democracy and E-Business, among other digital services [7]. The use of ICTs in EGovernment boost citizens to act and promote the enhancement of civil rights and the access of information and knowledge society [5] allowing a better governance and improving the public services [13]. E-Government simplifies the user's access to the information, providing full service by using government applications that reduce operational costs [9]. A basic example of E-Government is shown in [8], where payment of parking tickets is done online using electronic means rather than physical ones. Local governments have been one of the major users of Geographic Information System (GIS) [4]. One of the uses of digital spatial information is the treatment of urban services and the finding of related solutions [12]. The transition between digital cities into smart cities needs 3D geospatial framework, including the integration of GIS, Global Position System (GPS) and Remote Sensing [4]. All of this information is provided to the citizens in services like websites or portals that offer mapping geospatial services [10]. Today humanity has a wide range of issues; to solve them we use information and different levels of knowledge. No matter what the issue is in real life, to solve a problem some kind of spatial information is used. Based on what was said before, people such us: directors, technicians, customers or just citizens need to know and manage this spatial information. But, why spatial data is special? Spatial is special because whit the advantage of technology all feature or phenomena could be represented by spatial location. Spatial data brings us measures of the feature you are looking for and gives this spatial reference of it. The term feature could be taken as service, location, place of interest, hot spot in different fields, markets influence, etc. In other words, we can represent the real world and the human activity with spatial information and show it on maps, charts or tables. All this knowledge of spatial data makes sense when decision makers or just citizens are able to use spatial information to get new knowledge and take better decisions; one example could something as simple as choosing the best route to get home, or something complex like the construction of a new route for public transportation in the down town. In order to better understand the facilities that GIS could offer it is necessary to know basic concepts of components and functions of GIS and the type and structure of spatial information. An important issue of spatial information is the existence of two types of formats that are widely spread: vectorial and raster data formats [1]. The first format is represented by vectors (points, lines and polygons); the second one is represented by pixels present in aerial photos and satellite images. Nowadays in general, the information depicted in maps is represented by a mixture of both formats. In this talk, we use open source software that allows to access and use spatial information; the software used for the practices are QGIS and GvSIG. This software could be downloaded for free from the Web because they have open source licenses. Finally, to understand concepts and management of spatial data some practices will be done by using one of the above applications mentioned.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays the advance of technology enables innovation for democracy, government and governance [2]. E-Governance takes advantage of it and uses the Information and Communication Technologies (ICTs) [11,8,6], that allow a centric governance (Meier, 2012; Saxena, 2005). The emergence of E-Governance allows E-Government, E-Democracy and E-Business, among other digital services [7]. The use of ICTs in EGovernment boost citizens to act and promote the enhancement of civil rights and the access of information and knowledge society [5] allowing a better governance and improving the public services [13]. E-Government simplifies the user's access to the information, providing full service by using government applications that reduce operational costs [9]. A basic example of E-Government is shown in [8], where payment of parking tickets is done online using electronic means rather than physical ones. Local governments have been one of the major users of Geographic Information System (GIS) [4]. One of the uses of digital spatial information is the treatment of urban services and the finding of related solutions [12]. The transition between digital cities into smart cities needs 3D geospatial framework, including the integration of GIS, Global Position System (GPS) and Remote Sensing [4]. All of this information is provided to the citizens in services like websites or portals that offer mapping geospatial services [10]. Today humanity has a wide range of issues; to solve them we use information and different levels of knowledge. No matter what the issue is in real life, to solve a problem some kind of spatial information is used. Based on what was said before, people such us: directors, technicians, customers or just citizens need to know and manage this spatial information. But, why spatial data is special? Spatial is special because whit the advantage of technology all feature or phenomena could be represented by spatial location. Spatial data brings us measures of the feature you are looking for and gives this spatial reference of it. The term feature could be taken as service, location, place of interest, hot spot in different fields, markets influence, etc. In other words, we can represent the real world and the human activity with spatial information and show it on maps, charts or tables. All this knowledge of spatial data makes sense when decision makers or just citizens are able to use spatial information to get new knowledge and take better decisions; one example could something as simple as choosing the best route to get home, or something complex like the construction of a new route for public transportation in the down town. In order to better understand the facilities that GIS could offer it is necessary to know basic concepts of components and functions of GIS and the type and structure of spatial information. An important issue of spatial information is the existence of two types of formats that are widely spread: vectorial and raster data formats [1]. The first format is represented by vectors (points, lines and polygons); the second one is represented by pixels present in aerial photos and satellite images. Nowadays in general, the information depicted in maps is represented by a mixture of both formats. In this talk, we use open source software that allows to access and use spatial information; the software used for the practices are QGIS and GvSIG. This software could be downloaded for free from the Web because they have open source licenses. Finally, to understand concepts and management of spatial data some practices will be done by using one of the above applications mentioned.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays the advance of technology enables innovation for democracy, government and governance [2]. E-Governance takes advantage of it and uses the Information and Communication Technologies (ICTs) [11,8,6], that allow a centric governance (Meier, 2012; Saxena, 2005). The emergence of E-Governance allows E-Government, E-Democracy and E-Business, among other digital services [7]. The use of ICTs in EGovernment boost citizens to act and promote the enhancement of civil rights and the access of information and knowledge society [5] allowing a better governance and improving the public services [13]. E-Government simplifies the user's access to the information, providing full service by using government applications that reduce operational costs [9]. A basic example of E-Government is shown in [8], where payment of parking tickets is done online using electronic means rather than physical ones. Local governments have been one of the major users of Geographic Information System (GIS) [4]. One of the uses of digital spatial information is the treatment of urban services and the finding of related solutions [12]. The transition between digital cities into smart cities needs 3D geospatial framework, including the integration of GIS, Global Position System (GPS) and Remote Sensing [4]. All of this information is provided to the citizens in services like websites or portals that offer mapping geospatial services [10]. Today humanity has a wide range of issues; to solve them we use information and different levels of knowledge. No matter what the issue is in real life, to solve a problem some kind of spatial information is used. Based on what was said before, people such us: directors, technicians, customers or just citizens need to know and manage this spatial information. But, why spatial data is special? Spatial is special because whit the advantage of technology all feature or phenomena could be represented by spatial location. Spatial data brings us measures of the feature you are looking for and gives this spatial reference of it. The term feature could be taken as service, location, place of interest, hot spot in different fields, markets influence, etc. In other words, we can represent the real world and the human activity with spatial information and show it on maps, charts or tables. All this knowledge of spatial data makes sense when decision makers or just citizens are able to use spatial information to get new knowledge and take better decisions; one example could something as simple as choosing the best route to get home, or something complex like the construction of a new route for public transportation in the down town. In order to better understand the facilities that GIS could offer it is necessary to know basic concepts of components and functions of GIS and the type and structure of spatial information. An important issue of spatial information is the existence of two types of formats that are widely spread: vectorial and raster data formats [1]. The first format is represented by vectors (points, lines and polygons); the second one is represented by pixels present in aerial photos and satellite images. Nowadays in general, the information depicted in maps is represented by a mixture of both formats. In this talk, we use open source software that allows to access and use spatial information; the software used for the practices are QGIS and GvSIG. This software could be downloaded for free from the Web because they have open source licenses. Finally, to understand concepts and management of spatial data some practices will be done by using one of the above applications mentioned.", "fno": "07114459", "keywords": [ "Electronic Government", "Cities And Towns", "Spatial Databases", "Information Science", "Geospatial Analysis" ], "authors": [ { "affiliation": "Universidad Técnica Particular de Loja, Ecuador", "fullName": "Víctor H. Gonzalez-Jaramillo", "givenName": "Víctor H.", "surname": "Gonzalez-Jaramillo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icedeg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "7-8", "year": "2015", "issn": null, "isbn": "978-3-9075-8910-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07114472", "articleId": "12OmNCw3z8k", "__typename": "AdjacentArticleType" }, "next": { "fno": "07114477", "articleId": "12OmNAnMuDe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmecg/2010/8507/0/05628662", "title": "E-government Construction, Informationized Governance and Governing Means Innovation: Based on the Case of Shanghai", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2010/05628662/12OmNAL3B8T", "parentPublication": { "id": "proceedings/icmecg/2010/8507/0", "title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc/2014/7881/0/7881a836", "title": "Smart City as a Service (SCaaS): A Future Roadmap for E-Government Smart City Cloud Computing Initiatives", "doi": null, "abstractUrl": "/proceedings-article/ucc/2014/7881a836/12OmNAle6Zf", "parentPublication": { "id": "proceedings/ucc/2014/7881/0", "title": "2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2015/8910/0/07114483", "title": "Big data, smart data, dark data and open data: eGovernment of the future", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2015/07114483/12OmNC8MsKp", "parentPublication": { "id": "proceedings/icedeg/2015/8910/0", "title": "2015 Second International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997a646", "title": "SPATIAL DATA INFRASTRUCTURE FOR E-GOVERNMENT BASED ON THE GEOSPATIAL SERVICES", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997a646/12OmNwK7o8g", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedeg/2015/8910/0/07114473", "title": "Smart cities, open innovation and open government: towards \"public-private-people partnership\" (PPPP) models?", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2015/07114473/12OmNxwENma", "parentPublication": { "id": "proceedings/icedeg/2015/8910/0", "title": "2015 Second International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2008/3508/1/3508a484", "title": "Application of Data Warehouse Technology in Data Center Design", "doi": null, "abstractUrl": "/proceedings-article/cis/2008/3508a484/12OmNxxvAGT", "parentPublication": { "id": "proceedings/cis/2008/3508/1", "title": "2008 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b859", "title": "Introduction to Open Government and Participation Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b859/12OmNyYm2Db", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cec/2012/4857/0/4857a094", "title": "Identifying Information Assets for Open Data: The Role of Business Architecture and Information Quality", "doi": null, "abstractUrl": "/proceedings-article/cec/2012/4857a094/12OmNzuZUwE", "parentPublication": { "id": "proceedings/cec/2012/4857/0", "title": "2012 IEEE 14th International Conference on Commerce and Enterprise Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2021/1790/0/179000a750", "title": "E-government construction and government governance performance level: Empirical research based on 31 provinces in China data", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a750/1BQiH1UzJSM", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccict/2021/2392/0/239200a135", "title": "Estonia&#x2019;s e-governance and digital public service delivery solutions", "doi": null, "abstractUrl": "/proceedings-article/ccict/2021/239200a135/1wkvKWSONfa", "parentPublication": { "id": "proceedings/ccict/2021/2392/0", "title": "2021 Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiso", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WaTkgw", "doi": "10.1109/SIBGRAPI.2018.00057", "title": "Semi-Supervised Learning with Interactive Label Propagation Guided by Feature Space Projections", "normalizedTitle": "Semi-Supervised Learning with Interactive Label Propagation Guided by Feature Space Projections", "abstract": "While the number of unsupervised samples for data annotation is usually high, the absence of large supervised training sets for effective feature learning and design of high-quality classifiers is a known problem whenever specialists are required for data supervision. By exploring the feature space of supervised and unsupervised samples, semi-supervised learning approaches can usually improve the classification system. However, these approaches do not usually exploit the pattern-finding power of the user's visual system during machine learning. In this paper, we incorporate the user in the semi-supervised learning process by letting the feature space projection of unsupervised and supervised samples guide the label propagation actions of the user to the unsupervised samples. We show that this procedure can significantly reduce user effort while improving the quality of the classifier on unseen test sets. Due to the limited number of supervised samples, we also propose the use of auto-encoder neural networks for feature learning. For validation, we compare the classifiers that result from the proposed approach with the ones trained from the supervised samples only and semi-supervised trained using automatic label propagation.", "abstracts": [ { "abstractType": "Regular", "content": "While the number of unsupervised samples for data annotation is usually high, the absence of large supervised training sets for effective feature learning and design of high-quality classifiers is a known problem whenever specialists are required for data supervision. By exploring the feature space of supervised and unsupervised samples, semi-supervised learning approaches can usually improve the classification system. However, these approaches do not usually exploit the pattern-finding power of the user's visual system during machine learning. In this paper, we incorporate the user in the semi-supervised learning process by letting the feature space projection of unsupervised and supervised samples guide the label propagation actions of the user to the unsupervised samples. We show that this procedure can significantly reduce user effort while improving the quality of the classifier on unseen test sets. Due to the limited number of supervised samples, we also propose the use of auto-encoder neural networks for feature learning. For validation, we compare the classifiers that result from the proposed approach with the ones trained from the supervised samples only and semi-supervised trained using automatic label propagation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While the number of unsupervised samples for data annotation is usually high, the absence of large supervised training sets for effective feature learning and design of high-quality classifiers is a known problem whenever specialists are required for data supervision. By exploring the feature space of supervised and unsupervised samples, semi-supervised learning approaches can usually improve the classification system. However, these approaches do not usually exploit the pattern-finding power of the user's visual system during machine learning. In this paper, we incorporate the user in the semi-supervised learning process by letting the feature space projection of unsupervised and supervised samples guide the label propagation actions of the user to the unsupervised samples. We show that this procedure can significantly reduce user effort while improving the quality of the classifier on unseen test sets. Due to the limited number of supervised samples, we also propose the use of auto-encoder neural networks for feature learning. For validation, we compare the classifiers that result from the proposed approach with the ones trained from the supervised samples only and semi-supervised trained using automatic label propagation.", "fno": "926400a392", "keywords": [ "Neural Nets", "Pattern Classification", "Unsupervised Learning", "Automatic Label Propagation", "Classifier", "Supervised Samples", "Semisupervised Learning Process", "Machine Learning", "Data Supervision", "High Quality Classifiers", "Effective Feature Learning", "Supervised Training Sets", "Data Annotation", "Unsupervised Samples", "Feature Space Projection", "Interactive Label Propagation", "Training", "Support Vector Machines", "Semisupervised Learning", "Neural Networks", "Two Dimensional Displays", "Feature Extraction", "Convolutional Codes", "Semi Supervised Learning", "Interactive Label Propagation", "Auto Encoder Neural Network", "Visual Analytics" ], "authors": [ { "affiliation": null, "fullName": "Bárbara Caroline Benato", "givenName": "Bárbara Caroline", "surname": "Benato", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexandru Cristian Telea", "givenName": "Alexandru Cristian", "surname": "Telea", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexandre Xavier Falcão", "givenName": "Alexandre Xavier", "surname": "Falcão", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "392-399", "year": "2018", "issn": null, "isbn": "978-1-5386-9264-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "926400a384", "articleId": "17D45X0yjU7", "__typename": "AdjacentArticleType" }, "next": { "fno": "926400a400", "articleId": "17D45W1Oa4w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cit/2012/4858/0/4858a421", "title": "Semi-supervised Ensemble Learning Using Label Propagation", "doi": null, "abstractUrl": "/proceedings-article/cit/2012/4858a421/12OmNqG0T1L", "parentPublication": { "id": "proceedings/cit/2012/4858/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2014/4258/0/4258a111", "title": "Semi-supervised Pattern Classification Using Optimum-Path Forest", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2014/4258a111/12OmNwtEEKW", "parentPublication": { "id": "proceedings/sibgrapi/2014/4258/0", "title": "2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b195", "title": "Using Semi-Supervised Learning for the Creation of Medical Systematic Review: An Exploratory Analysis", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b195/12OmNznkK1d", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c776", "title": "Context-Guided Diffusion for Label Propagation on Graphs", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c776/12OmNzuIjtH", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08257908", "title": "Robust multi-label semi-supervised classification", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08257908/17D45Wuc32u", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546169", "title": "Semi-supervised convolutional neural networks with label propagation for image classification", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546169/17D45Xtvp9K", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500c061", "title": "HierMatch: Leveraging Label Hierarchies for Improving Semi-Supervised Learning", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500c061/1B13aSvRocM", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859611", "title": "Semi-Supervised 3D Medical Image Segmentation Using Shape-Guided Dual Consistency Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859611/1G9ERIbVbOg", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/6.946E161", "title": "Towards Semi-Supervised Deep Facial Expression Recognition with An Adaptive Confidence Margin", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/6.946E161/1H1jUbtebCw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991474", "title": "Dual-layer Semantic Propagation for Semi-supervised Projection", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991474/1JwQ3Kpyld6", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs5rkLM", "title": "2016 Conference for E-Democracy and Open Government (CeDEM)", "acronym": "cedem", "groupId": "1816744", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNALlcht", "doi": "10.1109/CeDEM.2016.23", "title": "Supporting Cognition in the Face of Political Data and Discourse: A Mental Models Perspective on Designing Information Visualization Systems", "normalizedTitle": "Supporting Cognition in the Face of Political Data and Discourse: A Mental Models Perspective on Designing Information Visualization Systems", "abstract": "Research into the use of information visualizations (InfoVis) covers various areas, i.e. how users perceive, interact with, or make sense of abstract data through the use of visual interfaces. With regard to more complex topics in the context of political communication, the question shifts to: How do users organize their internal representations gained from multiple perspectives on a global level? And which design recommendations could be derived for external representations - especially for InfoVis interfaces with multiple views? In this paper we discuss the theory of mental models and its consequences for the design of InfoVis interfaces. Especially for multidimensional data, it is a challenge to design accessible and conceptually consistent InfoVis interfaces to support the local and global coherence of the recipients' mental models. In this paper we exemplarily show how different design features can accomplish this in the field of political communication and its complex data.", "abstracts": [ { "abstractType": "Regular", "content": "Research into the use of information visualizations (InfoVis) covers various areas, i.e. how users perceive, interact with, or make sense of abstract data through the use of visual interfaces. With regard to more complex topics in the context of political communication, the question shifts to: How do users organize their internal representations gained from multiple perspectives on a global level? And which design recommendations could be derived for external representations - especially for InfoVis interfaces with multiple views? In this paper we discuss the theory of mental models and its consequences for the design of InfoVis interfaces. Especially for multidimensional data, it is a challenge to design accessible and conceptually consistent InfoVis interfaces to support the local and global coherence of the recipients' mental models. In this paper we exemplarily show how different design features can accomplish this in the field of political communication and its complex data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research into the use of information visualizations (InfoVis) covers various areas, i.e. how users perceive, interact with, or make sense of abstract data through the use of visual interfaces. With regard to more complex topics in the context of political communication, the question shifts to: How do users organize their internal representations gained from multiple perspectives on a global level? And which design recommendations could be derived for external representations - especially for InfoVis interfaces with multiple views? In this paper we discuss the theory of mental models and its consequences for the design of InfoVis interfaces. Especially for multidimensional data, it is a challenge to design accessible and conceptually consistent InfoVis interfaces to support the local and global coherence of the recipients' mental models. In this paper we exemplarily show how different design features can accomplish this in the field of political communication and its complex data.", "fno": "07781926", "keywords": [ "Cognitive Science", "Data Visualization", "Coherence", "Visualization", "Cognition", "Glass", "Government", "Sense Making", "Information Visualization", "Political Communication", "Multidimensional Data", "Mental Models", "Cognition Support" ], "authors": [ { "affiliation": null, "fullName": "Günther Schreder", "givenName": "Günther", "surname": "Schreder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Florian Windhager", "givenName": "Florian", "surname": "Windhager", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael Smuc", "givenName": "Michael", "surname": "Smuc", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eva Mayr", "givenName": "Eva", "surname": "Mayr", "__typename": "ArticleAuthorType" } ], "idPrefix": "cedem", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "213-218", "year": "2016", "issn": null, "isbn": "978-1-5090-1042-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07781925", "articleId": "12OmNCgJe70", "__typename": "AdjacentArticleType" }, "next": { "fno": "07781927", "articleId": "12OmNzd7bWe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718448", "title": "Team Creative Processes: The Importance of Complementary and Shared Mental Models", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718448/12OmNAsk4Ae", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142848", "title": "Understanding physical models in design cognition: A triangulation of qualitative and laboratory studies", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142848/12OmNvk7JME", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccie/2010/4026/2/4026b311", "title": "Mental Fixation in Product Design", "doi": null, "abstractUrl": "/proceedings-article/ccie/2010/4026b311/12OmNxFaLnr", "parentPublication": { "id": "proceedings/ccie/2010/4026/2", "title": "Computing, Control and Industrial Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061173", "title": "Distributed Cognition as a Theoretical Framework for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061173/13rRUwI5TQQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060999", "title": "Mental Models, Visual Reasoning and Interaction in Information Visualization: A Top-down Perspective", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060999/13rRUyYBlgx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700b353", "title": "A Study of Evidence Cognition in the Simpson Case towards Smart Justice", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700b353/1DNDCpvOFO0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2022/9084/0/10101549", "title": "Reproduction of mental states in driving using a visual filter", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2022/10101549/1MwECrPOVqg", "parentPublication": { "id": "proceedings/icci*cc/2022/9084/0", "title": "2022 IEEE 21st International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a038", "title": "Micro-entries: Encouraging Deeper Evaluation of Mental Models Over Time for Interactive Data Systems", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a038/1q0FNKyBkE8", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a146", "title": "There and then: interacting with spatio-temporal visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a146/1rSRdlZZM0U", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2020/1969/0/196900a129", "title": "The feature extraction method of students&#x0027; ideological and political thinking online learning behavior based on visual cognition", "doi": null, "abstractUrl": "/proceedings-article/icris/2020/196900a129/1wG5ZZ3vc1W", "parentPublication": { "id": "proceedings/icris/2020/1969/0", "title": "2020 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwKoZd0", "title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications", "acronym": "trustcom", "groupId": "1800729", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwNOaMD", "doi": "10.1109/TrustCom.2011.31", "title": "Semantics-Enhanced Privacy Recommendation for Social Networking Sites", "normalizedTitle": "Semantics-Enhanced Privacy Recommendation for Social Networking Sites", "abstract": "Privacy protection is a vital issue for safe social interactions within social networking sites (SNS). Although SNSs such as MySpace and Facebook allow users to configure their privacy settings, it is not a simple task for normal users with hundreds of online friends. In this paper, we propose an intelligent semantics-based privacy configuration system, named SPAC, to automatically recommend privacy settings for SNS users. SPAC learns users' privacy configuration patterns and make predictions by utilizing machine learning techniques on users' profiles and privacy setting history. To increase the accuracy of the predicted privacy settings, especially in the context of heterogeneous user profiles, we enhance privacy configuration predictor by integrating it with structured semantic knowledge in the SNS. This, in turn, allows SPAC to make inferences based on additional source of knowledge, resulting in improved accuracy of privacy recommendation. Our experimental results have proven the effectiveness of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Privacy protection is a vital issue for safe social interactions within social networking sites (SNS). Although SNSs such as MySpace and Facebook allow users to configure their privacy settings, it is not a simple task for normal users with hundreds of online friends. In this paper, we propose an intelligent semantics-based privacy configuration system, named SPAC, to automatically recommend privacy settings for SNS users. SPAC learns users' privacy configuration patterns and make predictions by utilizing machine learning techniques on users' profiles and privacy setting history. To increase the accuracy of the predicted privacy settings, especially in the context of heterogeneous user profiles, we enhance privacy configuration predictor by integrating it with structured semantic knowledge in the SNS. This, in turn, allows SPAC to make inferences based on additional source of knowledge, resulting in improved accuracy of privacy recommendation. Our experimental results have proven the effectiveness of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Privacy protection is a vital issue for safe social interactions within social networking sites (SNS). Although SNSs such as MySpace and Facebook allow users to configure their privacy settings, it is not a simple task for normal users with hundreds of online friends. In this paper, we propose an intelligent semantics-based privacy configuration system, named SPAC, to automatically recommend privacy settings for SNS users. SPAC learns users' privacy configuration patterns and make predictions by utilizing machine learning techniques on users' profiles and privacy setting history. To increase the accuracy of the predicted privacy settings, especially in the context of heterogeneous user profiles, we enhance privacy configuration predictor by integrating it with structured semantic knowledge in the SNS. This, in turn, allows SPAC to make inferences based on additional source of knowledge, resulting in improved accuracy of privacy recommendation. Our experimental results have proven the effectiveness of our approach.", "fno": "06120823", "keywords": [ "Data Privacy", "Internet", "Learning Artificial Intelligence", "Recommender Systems", "Social Networking Online", "Semantics Enhanced Privacy Recommendation", "Social Networking Sites", "Privacy Protection", "SNS", "My Space", "Facebook", "Privacy Settings", "SPAC", "Privacy Configuration", "Machine Learning Techniques", "Privacy Setting History", "Semantic Knowledge", "Privacy", "Communities", "Social Network Services", "Ontologies", "Semantics", "Feature Extraction", "Data Privacy", "Social Network", "Semantics", "Privacy", "Ontology", "Recommendation" ], "authors": [ { "affiliation": null, "fullName": "Qingrui Li", "givenName": "Qingrui", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Juan Li", "givenName": "Juan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hui Wang", "givenName": "Hui", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ashok Ginjala", "givenName": "Ashok", "surname": "Ginjala", "__typename": "ArticleAuthorType" } ], "idPrefix": "trustcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "226-233", "year": "2011", "issn": "2324-898X", "isbn": "978-1-4577-2135-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06120822", "articleId": "12OmNASILQP", "__typename": "AdjacentArticleType" }, "next": { "fno": "06120824", "articleId": "12OmNAS9zwQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ares/2010/3965/0/3965a172", "title": "Towards a Privacy-Enhanced Social Networking Site", "doi": null, "abstractUrl": "/proceedings-article/ares/2010/3965a172/12OmNA14A3f", "parentPublication": { "id": "proceedings/ares/2010/3965/0", "title": "2010 International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a181", "title": "An Empirical Study of the Factors Influencing Information Disclosure Behaviour in Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a181/12OmNCbU36O", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b774", "title": "The Impact of Perceived Privacy Breach on Sustainability of Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b774/12OmNCf1Dov", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciw/2009/3613/0/3613a267", "title": "UPP: User Privacy Policy for Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/iciw/2009/3613a267/12OmNqJq4rE", "parentPublication": { "id": "proceedings/iciw/2009/3613/0", "title": "Internet and Web Applications and Services, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/4525a800", "title": "Provider-Independent Online Social Identity Management--Enhancing Privacy Consistently Across Multiple Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/4525a800/12OmNs59JMf", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2009/3807/0/05069336", "title": "Privacy protection issues in social networking sites", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2009/05069336/12OmNwDSdC5", "parentPublication": { "id": "proceedings/aiccsa/2009/3807/0", "title": "2009 IEEE/ACS International Conference on Computer Systems and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b750", "title": "Pros and Cons of Privacy by Default: Investigating the Impact on Users and Providers of Social Network Sites", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b750/12OmNyGKUkB", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2012/4775/0/4775a103", "title": "An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites", "doi": null, "abstractUrl": "/proceedings-article/ares/2012/4775a103/12OmNzR8CyR", "parentPublication": { "id": "proceedings/ares/2012/4775/0", "title": "2012 Seventh International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406337", "title": "Maintaining a Consistent Representation of Self across Multiple Social Networking Sites -- A Data-centric Perspective", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406337/12OmNzkuKFW", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367d453", "title": "Comparing the Configuration of Privacy Settings on Social Network Sites Based on Different Default Options", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367d453/12OmNzvhvLe", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aO", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNx0RIMg", "doi": "10.1109/ICDAR.2013.150", "title": "Bringing Semantics in Word Image Retrieval", "normalizedTitle": "Bringing Semantics in Word Image Retrieval", "abstract": "Performance of the recognition free approaches for document retrieval, heavily depends on the exact or approximate matching of images (in some feature space) to retrieve documents containing the same word. However, the harder problem in information retrieval is to effectively bring semantics into the retrieval pipeline. This is further challenging when the matching is based on visual features. In this work, we investigate this problem, and suggest a solution by directly transferring the semantics from the textual domain. Our retrieval framework uses (i) the language resources like Word Net and (ii) an annotated corpus of document images, to retrieve semantically relevant words from a large word image database. We demonstrate the method on two languages - English and Hindi, and quantitatively evaluate the performance on annotated word image databases of more than a Million images.", "abstracts": [ { "abstractType": "Regular", "content": "Performance of the recognition free approaches for document retrieval, heavily depends on the exact or approximate matching of images (in some feature space) to retrieve documents containing the same word. However, the harder problem in information retrieval is to effectively bring semantics into the retrieval pipeline. This is further challenging when the matching is based on visual features. In this work, we investigate this problem, and suggest a solution by directly transferring the semantics from the textual domain. Our retrieval framework uses (i) the language resources like Word Net and (ii) an annotated corpus of document images, to retrieve semantically relevant words from a large word image database. We demonstrate the method on two languages - English and Hindi, and quantitatively evaluate the performance on annotated word image databases of more than a Million images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Performance of the recognition free approaches for document retrieval, heavily depends on the exact or approximate matching of images (in some feature space) to retrieve documents containing the same word. However, the harder problem in information retrieval is to effectively bring semantics into the retrieval pipeline. This is further challenging when the matching is based on visual features. In this work, we investigate this problem, and suggest a solution by directly transferring the semantics from the textual domain. Our retrieval framework uses (i) the language resources like Word Net and (ii) an annotated corpus of document images, to retrieve semantically relevant words from a large word image database. We demonstrate the method on two languages - English and Hindi, and quantitatively evaluate the performance on annotated word image databases of more than a Million images.", "fno": "06628715", "keywords": [ "Semantics", "Visualization", "Indexing", "Vocabulary", "Equations", "Mathematical Model", "Bag Of Words", "Word Image Retrieval", "Semantic Indexing" ], "authors": [ { "affiliation": null, "fullName": "Praveen Krishnan", "givenName": "Praveen", "surname": "Krishnan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "C.V. Jawahar", "givenName": "C.V.", "surname": "Jawahar", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-08-01T00:00:00", "pubType": "proceedings", "pages": "733-737", "year": "2013", "issn": "1520-5363", "isbn": "978-0-7695-4999-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06628714", "articleId": "12OmNzUPpnc", "__typename": "AdjacentArticleType" }, "next": { "fno": "06628716", "articleId": "12OmNyKa659", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigmm/2016/2179/0/2179a145", "title": "Click-through-Based Word Embedding for Large Scale Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a145/12OmNBTJIxs", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840b673", "title": "Semantic-Aware Co-indexing for Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840b673/12OmNqFJhIf", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2010/8817/1/05670038", "title": "A Semantic Similarity Language Model to Improve Automatic Image Annotation", "doi": null, "abstractUrl": "/proceedings-article/ictai/2010/05670038/12OmNwlHSSm", "parentPublication": { "id": "proceedings/ictai/2010/8817/1", "title": "2010 22nd IEEE International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socpar/2009/3879/0/3879a283", "title": "Image Semantic Extraction Using Latent Semantic Indexing on Image Retrieval Automatic-Annotation", "doi": null, "abstractUrl": "/proceedings-article/socpar/2009/3879a283/12OmNy2agXa", "parentPublication": { "id": "proceedings/socpar/2009/3879/0", "title": "Soft Computing and Pattern Recognition, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a297", "title": "Word Image Retrieval Using Bag of Visual Words", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a297/12OmNyL0Twh", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2014/6715/0/6715a177", "title": "Improving Automatic Image Annotation with Google Semantic Link", "doi": null, "abstractUrl": "/proceedings-article/skg/2014/6715a177/12OmNyqiaOf", "parentPublication": { "id": "proceedings/skg/2014/6715/0", "title": "2014 Tenth International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890176", "title": "Graph-Density-based visual word vocabulary for image retrieval", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890176/12OmNyugyRv", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457f272", "title": "Beyond Instance-Level Image Retrieval: Leveraging Captions to Learn a Global Visual Representation for Semantic Retrieval", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f272/12OmNz2TCD5", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2008/11/ttp2008111913", "title": "Document Image Retrieval through Word Shape Coding", "doi": null, "abstractUrl": "/journal/tp/2008/11/ttp2008111913/13rRUxcKzWl", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2019/3412/0/341200a001", "title": "SCOR: Source Code Retrieval with Semantics and Order", "doi": null, "abstractUrl": "/proceedings-article/msr/2019/341200a001/1dx9AGzUXuw", "parentPublication": { "id": "proceedings/msr/2019/3412/0", "title": "2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18jXDdLQc3C", "doi": "10.1109/ICDMW.2018.00214", "title": "Development of Mental Model in Understanding Users' Thought Processes for the Evaluation and Functional Enhancement of Clinical Decision Support Systems", "normalizedTitle": "Development of Mental Model in Understanding Users' Thought Processes for the Evaluation and Functional Enhancement of Clinical Decision Support Systems", "abstract": "Clinical Decision Support Systems (CDSSs) are developed to help experts in making decisions; however, these systems tend to go out of date quickly due to changing needs of the users or simply because these systems are not user centred. The users' mental model which reflects their view of the system is considered to be a major starting point for system evaluation and upgrade. The users' thought processes of how users' interact with the system is a major point in understanding the processes or the navigational paths users' undergo in achieving the goal of using the system. This is considered to be a major starting point for system evaluation and upgrade. This research examines the elicitation of users' mental models using Galatea Risk and Safety Tool (GRiST); a web based mental health decision support system. This is to gain a better understanding of how the system is used in the workplace and to identify usability issues resulting from any mismatch or gap between the conceptual model of the system and the mental model of the users which may infer decision making of the system. A novel framework that aims to mine users' perspectives of the system is proposed. The framework further explores the data gotten to help in the system evaluation and re-design. The methodology used involve the process of monitoring users' interactions, mining the data, con-structing mental models using repertory grid technique and concept mapping to understand users' understanding of the system and to analyse the findings in investigating and resolving usability and system's functionalities issues.", "abstracts": [ { "abstractType": "Regular", "content": "Clinical Decision Support Systems (CDSSs) are developed to help experts in making decisions; however, these systems tend to go out of date quickly due to changing needs of the users or simply because these systems are not user centred. The users' mental model which reflects their view of the system is considered to be a major starting point for system evaluation and upgrade. The users' thought processes of how users' interact with the system is a major point in understanding the processes or the navigational paths users' undergo in achieving the goal of using the system. This is considered to be a major starting point for system evaluation and upgrade. This research examines the elicitation of users' mental models using Galatea Risk and Safety Tool (GRiST); a web based mental health decision support system. This is to gain a better understanding of how the system is used in the workplace and to identify usability issues resulting from any mismatch or gap between the conceptual model of the system and the mental model of the users which may infer decision making of the system. A novel framework that aims to mine users' perspectives of the system is proposed. The framework further explores the data gotten to help in the system evaluation and re-design. The methodology used involve the process of monitoring users' interactions, mining the data, con-structing mental models using repertory grid technique and concept mapping to understand users' understanding of the system and to analyse the findings in investigating and resolving usability and system's functionalities issues.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clinical Decision Support Systems (CDSSs) are developed to help experts in making decisions; however, these systems tend to go out of date quickly due to changing needs of the users or simply because these systems are not user centred. The users' mental model which reflects their view of the system is considered to be a major starting point for system evaluation and upgrade. The users' thought processes of how users' interact with the system is a major point in understanding the processes or the navigational paths users' undergo in achieving the goal of using the system. This is considered to be a major starting point for system evaluation and upgrade. This research examines the elicitation of users' mental models using Galatea Risk and Safety Tool (GRiST); a web based mental health decision support system. This is to gain a better understanding of how the system is used in the workplace and to identify usability issues resulting from any mismatch or gap between the conceptual model of the system and the mental model of the users which may infer decision making of the system. A novel framework that aims to mine users' perspectives of the system is proposed. The framework further explores the data gotten to help in the system evaluation and re-design. The methodology used involve the process of monitoring users' interactions, mining the data, con-structing mental models using repertory grid technique and concept mapping to understand users' understanding of the system and to analyse the findings in investigating and resolving usability and system's functionalities issues.", "fno": "928800b493", "keywords": [ "Data Mining", "Decision Making", "Decision Support Systems", "Human Computer Interaction", "Medical Information Systems", "Mental Health Decision Support System", "Mental Model", "Clinical Decision Support Systems", "CDSS", "Galatea Risk And Safety Tool", "G Ri ST", "Repertory Grid Technique", "Concept Mapping", "Usability Issues", "Users Interaction", "Data Mining", "Cognitive Science", "Usability", "Data Mining", "Decision Support Systems", "Computational Modeling", "Data Models", "Tools", "User Monitoring Data Mining And Analysis Usability System Evaluation Mental Models User Experience Pattern Recognition" ], "authors": [ { "affiliation": null, "fullName": "Ifeoluwa Agboola", "givenName": "Ifeoluwa", "surname": "Agboola", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1493-1494", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800b487", "articleId": "18jXIPSS2ha", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800b495", "articleId": "18jXBEM8ukM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/enc/2013/5087/0/5087a007", "title": "Mental Models, Performance and Usability of a Complex Interactive System: The Case of Twitter", "doi": null, "abstractUrl": "/proceedings-article/enc/2013/5087a007/12OmNrH1PAK", "parentPublication": { "id": "proceedings/enc/2013/5087/0", "title": "2013 Mexican International Conference on Computer Science (ENC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2012/4740/0/06227689", "title": "Implementing Mental Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2012/06227689/12OmNwM6A07", "parentPublication": { "id": "proceedings/spw/2012/4740/0", "title": "2012 IEEE Symposium on Security and Privacy Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883040", "title": "Visualizing the problem domain for spreadsheet users: A mental model perspective", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883040/12OmNx1Iw8e", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892a263", "title": "The Effect of Shared Mental Models on Consensus", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892a263/12OmNxFaLn0", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccm/2008/3290/1/3290a490", "title": "Study on Cognitive Decision Support Based on Learning and Improvement of Mental Models", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a490/12OmNyY4rnR", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645235", "title": "Too much, too little, or just right? Ways explanations impact end users' mental models", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645235/12OmNzUPpCT", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/b&b/2017/2480/0/08120429", "title": "TAPping into mental models with blocks", "doi": null, "abstractUrl": "/proceedings-article/b&b/2017/08120429/12OmNzvQHKt", "parentPublication": { "id": "proceedings/b&b/2017/2480/0", "title": "2017 IEEE Blocks and Beyond Workshop (B&B)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2011/02/mex2011020077", "title": "Improving Users' Mental Models of Intelligent Software Tools", "doi": null, "abstractUrl": "/magazine/ex/2011/02/mex2011020077/13rRUxN5eAd", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2006/2754/0/04089233", "title": "The Usability of Multimedia Interface Based on User's Mental Models", "doi": null, "abstractUrl": "/proceedings-article/icat/2006/04089233/17D45VTRooF", "parentPublication": { "id": "proceedings/icat/2006/2754/0", "title": "16th International Conference on Artificial Reality and Telexistence--Workshops (ICAT'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2020/9642/0/964200a038", "title": "Micro-entries: Encouraging Deeper Evaluation of Mental Models Over Time for Interactive Data Systems", "doi": null, "abstractUrl": "/proceedings-article/beliv/2020/964200a038/1q0FNKyBkE8", "parentPublication": { "id": "proceedings/beliv/2020/9642/0", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1nkDclx75Kg", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "acronym": "compsac", "groupId": "1000143", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1nkDlG8I9tS", "doi": "10.1109/COMPSAC48688.2020.0-153", "title": "Smart Contracts Vulnerability Auditing with Multi-semantics", "normalizedTitle": "Smart Contracts Vulnerability Auditing with Multi-semantics", "abstract": "Smart contracts vulnerability auditing is vitally critical to ensure transaction execution in normal on blockchain. The current data-driven approaches normally tokenize smart contracts into a series of sequences according to only one tokenization standard for vulnerability detection purpose, resulting some of the semantic contexts could not be reflected within restricted sequence length. To address this limitation, we generate sequences from smart contracts in three tokenization standards for which we utilize n-gram language model to capture semantic contexts respectively, and finally exploiting our effective combination strategy of Intersection or Union to integrate the audited results from multiple semantic contexts. In order to evaluate the proposed approach, we applied it on over 7200 Ethereum smart contract samples. Experimental result shows our proposed method is capable of detecting vulnerabilities and competitive with the baseline in test sets, with improved precision of over 44% when Intersection is applied in their results, as well as improved Recall measure up by over 300% and F-measure up by 220% when Union is applied. Our proposed method for smart contract vulnerability detection, an important tool for developing quality decentralized software applications, is able to analyze multiple semantic contexts and successfully detects more true vulnerabilities with high precision, outperforming that of the baseline approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Smart contracts vulnerability auditing is vitally critical to ensure transaction execution in normal on blockchain. The current data-driven approaches normally tokenize smart contracts into a series of sequences according to only one tokenization standard for vulnerability detection purpose, resulting some of the semantic contexts could not be reflected within restricted sequence length. To address this limitation, we generate sequences from smart contracts in three tokenization standards for which we utilize n-gram language model to capture semantic contexts respectively, and finally exploiting our effective combination strategy of Intersection or Union to integrate the audited results from multiple semantic contexts. In order to evaluate the proposed approach, we applied it on over 7200 Ethereum smart contract samples. Experimental result shows our proposed method is capable of detecting vulnerabilities and competitive with the baseline in test sets, with improved precision of over 44% when Intersection is applied in their results, as well as improved Recall measure up by over 300% and F-measure up by 220% when Union is applied. Our proposed method for smart contract vulnerability detection, an important tool for developing quality decentralized software applications, is able to analyze multiple semantic contexts and successfully detects more true vulnerabilities with high precision, outperforming that of the baseline approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Smart contracts vulnerability auditing is vitally critical to ensure transaction execution in normal on blockchain. The current data-driven approaches normally tokenize smart contracts into a series of sequences according to only one tokenization standard for vulnerability detection purpose, resulting some of the semantic contexts could not be reflected within restricted sequence length. To address this limitation, we generate sequences from smart contracts in three tokenization standards for which we utilize n-gram language model to capture semantic contexts respectively, and finally exploiting our effective combination strategy of Intersection or Union to integrate the audited results from multiple semantic contexts. In order to evaluate the proposed approach, we applied it on over 7200 Ethereum smart contract samples. Experimental result shows our proposed method is capable of detecting vulnerabilities and competitive with the baseline in test sets, with improved precision of over 44% when Intersection is applied in their results, as well as improved Recall measure up by over 300% and F-measure up by 220% when Union is applied. Our proposed method for smart contract vulnerability detection, an important tool for developing quality decentralized software applications, is able to analyze multiple semantic contexts and successfully detects more true vulnerabilities with high precision, outperforming that of the baseline approaches.", "fno": "730300a892", "keywords": [ "Computational Linguistics", "Contracts", "Cryptocurrencies", "Distributed Databases", "Risk Management", "Smart Contracts Vulnerability Auditing", "Multisemantics", "Tokenization Standard", "Vulnerability Detection", "Restricted Sequence Length", "Ethereum Smart Contract Samples", "Smart Contract Vulnerability Detection", "Contracts", "Semantics", "Standards", "Security", "Computer Science", "Urban Areas", "Mathematical Model", "Software Engineering", "Smart Contract", "Ethereum", "N Gram Language Model", "Vulnerability Auditing" ], "authors": [ { "affiliation": "City University of Hong Kong, China", "fullName": "Zhen Yang", "givenName": "Zhen", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong, China", "fullName": "Jacky Keung", "givenName": "Jacky", "surname": "Keung", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong, China", "fullName": "Miao Zhang", "givenName": "Miao", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore, Singapore", "fullName": "Yan Xiao", "givenName": "Yan", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong, China", "fullName": "Yangyang Huang", "givenName": "Yangyang", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong, China", "fullName": "Tik Hui", "givenName": "Tik", "surname": "Hui", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "892-901", "year": "2020", "issn": "0730-3157", "isbn": "978-1-7281-7303-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "730300a882", "articleId": "1nkDl7eTWW4", "__typename": "AdjacentArticleType" }, "next": { "fno": "730300a902", "articleId": "1nkDjGqJ1MA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/blockchain/2021/1760/0/176000a095", "title": "Full-Stack Hierarchical Fusion of Static Features for Smart Contracts Vulnerability Detection", "doi": null, "abstractUrl": "/proceedings-article/blockchain/2021/176000a095/1AqxzgYemNW", "parentPublication": { "id": "proceedings/blockchain/2021/1760/0", "title": "2021 IEEE International Conference on Blockchain (Blockchain)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2021/0668/0/066800a412", "title": "ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy", "doi": null, "abstractUrl": "/proceedings-article/msn/2021/066800a412/1CxzJRrUbIs", "parentPublication": { "id": "proceedings/msn/2021/0668/0", "title": "2021 17th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a746", "title": "EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a746/1FJ5D39V9lu", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/blockchain/2022/6104/0/610400a037", "title": "SmartMixModel: Machine Learning-based Vulnerability Detection of Solidity Smart Contracts", "doi": null, "abstractUrl": "/proceedings-article/blockchain/2022/610400a037/1GNt9yJnZio", "parentPublication": { "id": "proceedings/blockchain/2022/6104/0", "title": "2022 IEEE International Conference on Blockchain (Blockchain)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020730", "title": "An Improved Vulnerability Detection System of Smart Contracts Based on Symbolic Execution", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020730/1KfSm7bsAJq", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2018/5937/0/09000089", "title": "ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection", "doi": null, "abstractUrl": "/proceedings-article/ase/2018/09000089/1htBMO3dUWc", "parentPublication": { "id": "proceedings/ase/2018/5937/0", "title": "2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwbose/2020/6278/0/09050260", "title": "Reentrancy Vulnerability Identification in Ethereum Smart Contracts", "doi": null, "abstractUrl": "/proceedings-article/iwbose/2020/09050260/1iES4PuwIs8", "parentPublication": { "id": "proceedings/iwbose/2020/6278/0", "title": "2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2020/3497/0/349700b265", "title": "Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity", "doi": null, "abstractUrl": "/proceedings-article/sp/2020/349700b265/1j2LggQlkvm", "parentPublication": { "id": "proceedings/sp/2020/3497/0/", "title": "2020 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2020/8558/0/855800a125", "title": "DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2020/855800a125/1s6589pjD0c", "parentPublication": { "id": "proceedings/iceccs/2020/8558/0", "title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wetseb/2021/4567/0/456700a017", "title": "SmartScan: An approach to detect Denial of Service Vulnerability in Ethereum Smart Contracts", "doi": null, "abstractUrl": "/proceedings-article/wetseb/2021/456700a017/1v56dvY2cYU", "parentPublication": { "id": "proceedings/wetseb/2021/4567/0", "title": "2021 IEEE/ACM 4th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1q0FNEe25KU", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1q0FNKyBkE8", "doi": "10.1109/BELIV51497.2020.00012", "title": "Micro-entries: Encouraging Deeper Evaluation of Mental Models Over Time for Interactive Data Systems", "normalizedTitle": "Micro-entries: Encouraging Deeper Evaluation of Mental Models Over Time for Interactive Data Systems", "abstract": "Many interactive data systems combine visual representations of data with embedded algorithmic support for automation and data exploration. To effectively support transparent and explainable data systems, it is important for researchers and designers to know how users understand the system. We discuss the evaluation of users&#x2019; mental models of system logic. Mental models are challenging to capture and analyze. While common evaluation methods aim to approximate the user&#x2019;s final mental model after a period of system usage, user understanding continuously evolves as users interact with a system over time. In this paper, we review many common mental model measurement techniques, discuss tradeoffs, and recommend methods for deeper, more meaningful evaluation of mental models when using interactive data analysis and visualization systems. We present guidelines for evaluating mental models over time to help track the evolution of specific model updates and how they may map to the particular use of interface features and data queries. By asking users to describe what they know and how they know it, researchers can collect structured, time-ordered insight into a user&#x2019;s conceptualization process while also helping guide users to their own discoveries.", "abstracts": [ { "abstractType": "Regular", "content": "Many interactive data systems combine visual representations of data with embedded algorithmic support for automation and data exploration. To effectively support transparent and explainable data systems, it is important for researchers and designers to know how users understand the system. We discuss the evaluation of users&#x2019; mental models of system logic. Mental models are challenging to capture and analyze. While common evaluation methods aim to approximate the user&#x2019;s final mental model after a period of system usage, user understanding continuously evolves as users interact with a system over time. In this paper, we review many common mental model measurement techniques, discuss tradeoffs, and recommend methods for deeper, more meaningful evaluation of mental models when using interactive data analysis and visualization systems. We present guidelines for evaluating mental models over time to help track the evolution of specific model updates and how they may map to the particular use of interface features and data queries. By asking users to describe what they know and how they know it, researchers can collect structured, time-ordered insight into a user&#x2019;s conceptualization process while also helping guide users to their own discoveries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many interactive data systems combine visual representations of data with embedded algorithmic support for automation and data exploration. To effectively support transparent and explainable data systems, it is important for researchers and designers to know how users understand the system. We discuss the evaluation of users’ mental models of system logic. Mental models are challenging to capture and analyze. While common evaluation methods aim to approximate the user’s final mental model after a period of system usage, user understanding continuously evolves as users interact with a system over time. In this paper, we review many common mental model measurement techniques, discuss tradeoffs, and recommend methods for deeper, more meaningful evaluation of mental models when using interactive data analysis and visualization systems. We present guidelines for evaluating mental models over time to help track the evolution of specific model updates and how they may map to the particular use of interface features and data queries. By asking users to describe what they know and how they know it, researchers can collect structured, time-ordered insight into a user’s conceptualization process while also helping guide users to their own discoveries.", "fno": "964200a038", "keywords": [ "Data Analysis", "Data Visualisation", "Human Computer Interaction", "Interactive Systems", "Psychology", "Query Processing", "User Interfaces", "Explainable Data Systems", "System Logic", "User Understanding", "Users Interaction", "Interactive Data Analysis", "Visualization Systems", "User Interface Features", "Data Queries", "Data Exploration", "Transparent Data Systems", "Microentries", "Interactive Data Systems", "Visual Data Representation", "Mental Model Measurement", "Discuss Tradeoffs", "Recommend Methods", "Embedded Algorithmic", "Cognitive Science", "Data Systems", "Task Analysis", "Data Visualization", "Machine Learning Algorithms", "Data Models", "Cognition", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "University of Florida,Department of Computer & Information Science & Engineering", "fullName": "Jeremy E. Block", "givenName": "Jeremy E.", "surname": "Block", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Florida,Department of Computer & Information Science & Engineering", "fullName": "Eric D. Ragan", "givenName": "Eric D.", "surname": "Ragan", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "38-47", "year": "2020", "issn": null, "isbn": "978-1-7281-9642-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "964200a029", "articleId": "1q0FO3J5Ogg", "__typename": "AdjacentArticleType" }, "next": { "fno": "964200a048", "articleId": "1q0FON3NQf6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cedem/2016/1042/0/07781926", "title": "Supporting Cognition in the Face of Political Data and Discourse: A Mental Models Perspective on Designing Information Visualization Systems", "doi": null, "abstractUrl": "/proceedings-article/cedem/2016/07781926/12OmNALlcht", "parentPublication": { "id": "proceedings/cedem/2016/1042/0", "title": "2016 Conference for E-Democracy and Open Government (CeDEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718448", "title": "Team Creative Processes: The Importance of Complementary and Shared Mental Models", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718448/12OmNAsk4Ae", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2012/4740/0/06227689", "title": "Implementing Mental Models", "doi": null, "abstractUrl": "/proceedings-article/spw/2012/06227689/12OmNwM6A07", "parentPublication": { "id": "proceedings/spw/2012/4740/0", "title": "2012 IEEE Symposium on Security and Privacy Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645235", "title": "Too much, too little, or just right? Ways explanations impact end users' mental models", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645235/12OmNzUPpCT", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/b&b/2017/2480/0/08120429", "title": "TAPping into mental models with blocks", "doi": null, "abstractUrl": "/proceedings-article/b&b/2017/08120429/12OmNzvQHKt", "parentPublication": { "id": "proceedings/b&b/2017/2480/0", "title": "2017 IEEE Blocks and Beyond Workshop (B&B)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b493", "title": "Development of Mental Model in Understanding Users' Thought Processes for the Evaluation and Functional Enhancement of Clinical Decision Support Systems", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b493/18jXDdLQc3C", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hbdss/2021/2188/0/218800a114", "title": "Research on evaluation model of College Students&#x2019; mental health", "doi": null, "abstractUrl": "/proceedings-article/hbdss/2021/218800a114/1AqwPS6b0Ji", "parentPublication": { "id": "proceedings/hbdss/2021/2188/0", "title": "2021 International Conference on Health Big Data and Smart Sports (HBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pst/2022/7398/0/09851975", "title": "Mobile Mental Health Apps: Alternative Intervention or Intrusion?", "doi": null, "abstractUrl": "/proceedings-article/pst/2022/09851975/1FWmmvH0QEM", "parentPublication": { "id": "proceedings/pst/2022/7398/0", "title": "2022 19th Annual International Conference on Privacy, Security & Trust (PST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2019/6660/0/666000a246", "title": "&#x0022;If HTTPS Were Secure, I Wouldn't Need 2FA&#x0022; - End User and Administrator Mental Models of HTTPS", "doi": null, "abstractUrl": "/proceedings-article/sp/2019/666000a246/1dlwmbTOKWY", "parentPublication": { "id": "proceedings/sp/2019/6660/0", "title": "2019 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2020/04/09261234", "title": "When Mental Models Grow (C)old: A Cognitive Perspective on Home Heating Automation", "doi": null, "abstractUrl": "/magazine/pc/2020/04/09261234/1oNUUhBzEOI", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1q7jvqMQMww", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1q7jw7xKEh2", "doi": "10.1109/VAST50239.2020.00011", "title": "Visual Abstraction of Geographical Point Data with Spatial Autocorrelations", "normalizedTitle": "Visual Abstraction of Geographical Point Data with Spatial Autocorrelations", "abstract": "Scatterplots are always employed to visualize geographical point datasets, which often suffer from an overdraw problem due to the increase of data sizes. A variety of sampling strategies have been proposed to reduce overdraw and visual clutter with the spatial densities of points taken into account. However, informative attributes associated with the points also play significant roles in the exploration of geographical datasets. In this paper, we propose an attribute-based abstraction method to simplify the cluttered visualization of large-scale geographical points. Spatial autocorrelations are utilized to measure the attribute relationships of points in local areas, and a novel attribute-based sampling model is designed to generate a subset of points to preserve both density and attribute characteristics of original geographical points. A set of visual designs and user-friendly interactions are implemented, enabling users to capture the spatial distribution of geographical points and get deeper insights into the attribute features across local areas. Case studies and quantitative comparisons based on the real-world datasets further demonstrate the effectiveness of our method in the abstraction and exploration of large-scale geographical point datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Scatterplots are always employed to visualize geographical point datasets, which often suffer from an overdraw problem due to the increase of data sizes. A variety of sampling strategies have been proposed to reduce overdraw and visual clutter with the spatial densities of points taken into account. However, informative attributes associated with the points also play significant roles in the exploration of geographical datasets. In this paper, we propose an attribute-based abstraction method to simplify the cluttered visualization of large-scale geographical points. Spatial autocorrelations are utilized to measure the attribute relationships of points in local areas, and a novel attribute-based sampling model is designed to generate a subset of points to preserve both density and attribute characteristics of original geographical points. A set of visual designs and user-friendly interactions are implemented, enabling users to capture the spatial distribution of geographical points and get deeper insights into the attribute features across local areas. Case studies and quantitative comparisons based on the real-world datasets further demonstrate the effectiveness of our method in the abstraction and exploration of large-scale geographical point datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scatterplots are always employed to visualize geographical point datasets, which often suffer from an overdraw problem due to the increase of data sizes. A variety of sampling strategies have been proposed to reduce overdraw and visual clutter with the spatial densities of points taken into account. However, informative attributes associated with the points also play significant roles in the exploration of geographical datasets. In this paper, we propose an attribute-based abstraction method to simplify the cluttered visualization of large-scale geographical points. Spatial autocorrelations are utilized to measure the attribute relationships of points in local areas, and a novel attribute-based sampling model is designed to generate a subset of points to preserve both density and attribute characteristics of original geographical points. A set of visual designs and user-friendly interactions are implemented, enabling users to capture the spatial distribution of geographical points and get deeper insights into the attribute features across local areas. Case studies and quantitative comparisons based on the real-world datasets further demonstrate the effectiveness of our method in the abstraction and exploration of large-scale geographical point datasets.", "fno": "800900a060", "keywords": [ "Data Visualisation", "Geographic Information Systems", "Rendering Computer Graphics", "Visual Abstraction", "Geographical Point Data", "Spatial Autocorrelations", "Overdraw Problem", "Data Sizes", "Sampling Strategies", "Overdraw Clutter", "Visual Clutter", "Spatial Densities", "Informative Attributes", "Geographical Datasets", "Attribute Based Abstraction Method", "Cluttered Visualization", "Large Scale Geographical Points", "Attribute Relationships", "Novel Attribute Based Sampling Model", "Attribute Characteristics", "Original Geographical Points", "Visual Designs", "User Friendly Interactions", "Spatial Distribution", "Attribute Features", "Large Scale Geographical Point Datasets", "Correlation", "Visualization", "Data Visualization", "Geospatial Analysis", "Sampling Methods", "Clutter", "Graphical Models", "Visual Abstraction", "Spatial Autocorrelation", "Sampling", "Geospatial Analysis" ], "authors": [ { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Zhiguang Zhou", "givenName": "Zhiguang", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Xinlong Zhang", "givenName": "Xinlong", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Zhendong Yang", "givenName": "Zhendong", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Yuanyuan Chen", "givenName": "Yuanyuan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Yuhua Liu", "givenName": "Yuhua", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Jin Wen", "givenName": "Jin", "surname": "Wen", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University of Finance and Economics,School of Information", "fullName": "Binjie Chen", "givenName": "Binjie", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Sciences and Engineering", "fullName": "Ying Zhao", "givenName": "Ying", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University,State Key Lab of CAD & CG", "fullName": "Wei Chen", "givenName": "Wei", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "60-71", "year": "2020", "issn": null, "isbn": "978-1-7281-8009-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "800900a048", "articleId": "1q7jwzRnFM4", "__typename": "AdjacentArticleType" }, "next": { "fno": "800900a072", "articleId": "1q7jwDf9eTK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2010/7846/0/05571244", "title": "3D Edge Bundling for Geographical Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571244/12OmNqzu6LL", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a196", "title": "Directional Aggregate Visualization of Large Scale Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a196/12OmNx8Ouzu", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2016/2239/0/07515942", "title": "Visual abstraction improvement of interactive dot map", "doi": null, "abstractUrl": "/proceedings-article/snpd/2016/07515942/12OmNxEBz1D", "parentPublication": { "id": "proceedings/snpd/2016/2239/0", "title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019448", "title": "Visual relationship detection with object spatial distribution", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019448/12OmNzAFSZd", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdc/2014/1897/0/1897a035", "title": "GeoLens: Enabling Interactive Visual Analytics over Large-Scale, Multidimensional Geospatial Datasets", "doi": null, "abstractUrl": "/proceedings-article/bdc/2014/1897a035/12OmNzwHvid", "parentPublication": { "id": "proceedings/bdc/2014/1897/0", "title": "2014 IEEE/ACM International Symposium on Big Data Computing (BDC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/09/ttg2013091526", "title": "Splatterplots: Overcoming Overdraw in Scatter Plots", "doi": null, "abstractUrl": "/journal/tg/2013/09/ttg2013091526/13rRUxC0SEh", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875982", "title": "Visual Abstraction and Exploration of Multi-class Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875982/13rRUygT7ye", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440039", "title": "Visual Abstraction of Large Scale Geospatial Origin-Destination Movement Data", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440039/17D45WaTknI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09947308", "title": "Disentangling Geographical Effect for Point-of-Interest Recommendation", "doi": null, "abstractUrl": "/journal/tk/5555/01/09947308/1IiLcwhrbO0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09207856", "title": "AID*: A Spatial Index for Visual Exploration of Geo-Spatial Data", "doi": null, "abstractUrl": "/journal/tk/2022/08/09207856/1nuwiqMku7S", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBfZSj8", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEjY8U", "doi": "10.1109/VAST.2012.6400527", "title": "SemanticPrism: A multi-aspect view of large high-dimensional data", "normalizedTitle": "SemanticPrism: A multi-aspect view of large high-dimensional data", "abstract": "VAST 2012 Mini Challenge 1 Award: Outstanding integrated analysis and visualization. We present a visual analytics system SemanticPrism, which aims to analyze large-scale high-dimensional datasets containing logs of a million computers. SemanticPrism visualizes the data from three different perspectives: geo-temporal, time series curve, and pixel visualization. With each perspective, we use semantic zooming to present more detailed information.", "abstracts": [ { "abstractType": "Regular", "content": "VAST 2012 Mini Challenge 1 Award: Outstanding integrated analysis and visualization. We present a visual analytics system SemanticPrism, which aims to analyze large-scale high-dimensional datasets containing logs of a million computers. SemanticPrism visualizes the data from three different perspectives: geo-temporal, time series curve, and pixel visualization. With each perspective, we use semantic zooming to present more detailed information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "VAST 2012 Mini Challenge 1 Award: Outstanding integrated analysis and visualization. We present a visual analytics system SemanticPrism, which aims to analyze large-scale high-dimensional datasets containing logs of a million computers. SemanticPrism visualizes the data from three different perspectives: geo-temporal, time series curve, and pixel visualization. With each perspective, we use semantic zooming to present more detailed information.", "fno": "06400527", "keywords": [ "Data Visualization", "Time Series Analysis", "IP Networks", "Semantics", "Bars", "Image Color Analysis", "Visual Analytics", "H 5 2 Information Systems Information Interfaces And Presentation X 2014 User Interfaces", "H 1 2 User Machine Systems Visual Analytics" ], "authors": [ { "affiliation": "Computer Graphics Technology", "fullName": "Victor Yingjie Chen", "givenName": "Victor Yingjie", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Electrical and Computer Engineering", "fullName": "Ahmad M Razip", "givenName": "Ahmad M", "surname": "Razip", "__typename": "ArticleAuthorType" }, { "affiliation": "Electrical and Computer Engineering", "fullName": "Sungahn Ko", "givenName": "Sungahn", "surname": "Ko", "__typename": "ArticleAuthorType" }, { "affiliation": "Interaction Design, Purdue University", "fullName": "Cheryl Zhenyu Qian", "givenName": "Cheryl Zhenyu", "surname": "Qian", "__typename": "ArticleAuthorType" }, { "affiliation": "Electrical and Computer Engineering", "fullName": "David S. Ebert", "givenName": "David S.", "surname": "Ebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "259-260", "year": "2012", "issn": null, "isbn": "978-1-4673-4752-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06400506", "articleId": "12OmNC3o50f", "__typename": "AdjacentArticleType" }, "next": { "fno": "06400507", "articleId": "12OmNyPQ4EL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042510", "title": "PIVE: Per-Iteration visualization environment for supporting real-time interactions with computational methods", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042510/12OmNBgz4CP", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/01/mcg2008010018", "title": "An Information-Theoretic View of Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2008/01/mcg2008010018/13rRUB6SpRW", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585639", "title": "SIZE: Satellite Image Zooming and Exploration", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585639/17D45WaTkld", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a016", "title": "Streamlining Visualization Authoring in D3 Through User-Driven Templates", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a016/1J6heEO48bS", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802447", "title": "Visual Bird Watcher: Interactive Visual Analysis on Bird Distribution and Migration", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802447/1cJ6YMmczXG", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802486", "title": "SMARTexplore: Simplifying High-Dimensional Data Analysis through a Table-Based Visual Analytics Approach", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802486/1cJ6YwLGq40", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05652689", "title": "Designing visual analytics systems for disease spread and evolution", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05652689/1eof2SkO4gw", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05652644", "title": "VASTvis &#x2014; Visual analytics with multiple coordinated views", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05652644/1eof30OMMi4", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05651204", "title": "VisWorks text and network visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05651204/1eof34V7mPS", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2019/2284/0/08986929", "title": "Visualization of Spatial-Temporal Distribution of Damage Reports", "doi": null, "abstractUrl": "/proceedings-article/vast/2019/08986929/1hrMyxzAZDG", "parentPublication": { "id": "proceedings/vast/2019/2284/0", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwBjP17", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "acronym": "itme", "groupId": "1002567", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNy87Qyq", "doi": "10.1109/ITME.2016.0013", "title": "A Fast GPU Based High-Quality Three-Dimensional Visualization Method", "normalizedTitle": "A Fast GPU Based High-Quality Three-Dimensional Visualization Method", "abstract": "Three-dimensional visualization is one of the most important researches in the field of medical images processing. Volume rendering is a powerful technique for visualizing meaningful information extracted from volumetric data in three-dimensional visualization. Although it does not need to generate intermediate geometric primitives and its rendering result is high quality, computational complexity of volume rendering is too high to achieve real-time interaction. Therefore, a fast GPU based high-quality three-dimensional visualization volume rendering method is proposed. A GPU based method is proposed to improve the run-time efficiency of volume rendering using volumetric texture. Because of limitation of video memory storage, large-scale volumetric data cannot be reconstructed or an expensive GPU is required. Therefore a slice texture based volume rendering method is proposed, which merely cost 4MB video memory by making use of a real-time dynamic switch mechanism. On the other hand, in order to eliminate annular distortion of volume rendering, a GPU based pre-integration classification method is presented. Although our methods are all implemented at general PCs, they can not only guarantee image quality but also improve rendering speed.", "abstracts": [ { "abstractType": "Regular", "content": "Three-dimensional visualization is one of the most important researches in the field of medical images processing. Volume rendering is a powerful technique for visualizing meaningful information extracted from volumetric data in three-dimensional visualization. Although it does not need to generate intermediate geometric primitives and its rendering result is high quality, computational complexity of volume rendering is too high to achieve real-time interaction. Therefore, a fast GPU based high-quality three-dimensional visualization volume rendering method is proposed. A GPU based method is proposed to improve the run-time efficiency of volume rendering using volumetric texture. Because of limitation of video memory storage, large-scale volumetric data cannot be reconstructed or an expensive GPU is required. Therefore a slice texture based volume rendering method is proposed, which merely cost 4MB video memory by making use of a real-time dynamic switch mechanism. On the other hand, in order to eliminate annular distortion of volume rendering, a GPU based pre-integration classification method is presented. Although our methods are all implemented at general PCs, they can not only guarantee image quality but also improve rendering speed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Three-dimensional visualization is one of the most important researches in the field of medical images processing. Volume rendering is a powerful technique for visualizing meaningful information extracted from volumetric data in three-dimensional visualization. Although it does not need to generate intermediate geometric primitives and its rendering result is high quality, computational complexity of volume rendering is too high to achieve real-time interaction. Therefore, a fast GPU based high-quality three-dimensional visualization volume rendering method is proposed. A GPU based method is proposed to improve the run-time efficiency of volume rendering using volumetric texture. Because of limitation of video memory storage, large-scale volumetric data cannot be reconstructed or an expensive GPU is required. Therefore a slice texture based volume rendering method is proposed, which merely cost 4MB video memory by making use of a real-time dynamic switch mechanism. On the other hand, in order to eliminate annular distortion of volume rendering, a GPU based pre-integration classification method is presented. Although our methods are all implemented at general PCs, they can not only guarantee image quality but also improve rendering speed.", "fno": "3906a011", "keywords": [ "Rendering Computer Graphics", "Image Color Analysis", "Graphics Processing Units", "Geometry", "Transfer Functions", "Data Visualization", "Biomedical Imaging", "GPU", "Pre Integrationt", "Annular Distortion", "Volume Rendering" ], "authors": [ { "affiliation": null, "fullName": "Jinzhu Yang", "givenName": "Jinzhu", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chaolu Feng", "givenName": "Chaolu", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wenjun Tan", "givenName": "Wenjun", "surname": "Tan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dazhe Zhao", "givenName": "Dazhe", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nan Chen", "givenName": "Nan", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "itme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "11-15", "year": "2016", "issn": "2474-3828", "isbn": "978-1-5090-3906-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3906a007", "articleId": "12OmNxRWI38", "__typename": "AdjacentArticleType" }, "next": { "fno": "3906a016", "articleId": "12OmNx4yvz9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vbc/1990/2039/0/00109362", "title": "Three dimensional imaging of computed tomography: Techniques and applications", "doi": null, "abstractUrl": "/proceedings-article/vbc/1990/00109362/12OmNAZx8Ll", "parentPublication": { "id": "proceedings/vbc/1990/2039/0", "title": "[1990] Proceedings of the First Conference on Visualization in Biomedical Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1996/864/0/00568133", "title": "Three dimensional visualization of proteins in cellular interactions", "doi": null, "abstractUrl": "/proceedings-article/visual/1996/00568133/12OmNBSSVcj", "parentPublication": { "id": "proceedings/visual/1996/864/0", "title": "Proceedings of Seventh Annual IEEE Visualization '96", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1994/6627/0/00346340", "title": "VolVis: a diversified volume visualization system", "doi": null, "abstractUrl": "/proceedings-article/visual/1994/00346340/12OmNroijkk", "parentPublication": { "id": "proceedings/visual/1994/6627/0", "title": "Proceedings Visualization '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2012/2049/0/06266300", "title": "A flexible Java GPU-enhanced visualization framework and its applications", "doi": null, "abstractUrl": "/proceedings-article/cbms/2012/06266300/12OmNwHQBby", "parentPublication": { "id": "proceedings/cbms/2012/2049/0", "title": "2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2011/0155/0/06092330", "title": "CERA-TVR: A framework for interactive high-quality teravoxel volume visualization on standard PCs", "doi": null, "abstractUrl": "/proceedings-article/ldav/2011/06092330/12OmNxFsmwU", "parentPublication": { "id": "proceedings/ldav/2011/0155/0", "title": "IEEE Symposium on Large Data Analysis and Visualization (LDAV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2008/1966/0/04475454", "title": "Dynamic Shader Generation for Flexible Multi-Volume Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2008/04475454/12OmNyfdOUy", "parentPublication": { "id": "proceedings/pacificvis/2008/1966/0", "title": "IEEE Pacific Visualization Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/01/v0122", "title": "Interactive Level-of-Detail Selection Using Image-Based Quality Metric for Large Volume Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/01/v0122/13rRUILtJqL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/05/mcg2008050066", "title": "Dynamic Shader Generation for GPU-Based Multi-Volume Ray Casting", "doi": null, "abstractUrl": "/magazine/cg/2008/05/mcg2008050066/13rRUxN5evD", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a282", "title": "DNN-VolVis: Interactive Volume Visualization Supported by Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a282/1cMF6YRpyH6", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09079657", "title": "Distributed Interactive Visualization Using GPU-Optimized Spark", "doi": null, "abstractUrl": "/journal/tg/2021/09/09079657/1jmVbp8XqZa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC17hWl", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "acronym": "infvis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNzxPTPJ", "doi": "10.1109/INFVIS.2005.1532144", "title": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "normalizedTitle": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "abstract": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "abstracts": [ { "abstractType": "Regular", "content": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "fno": "01532144", "keywords": [ "Data Visualization", "Displays", "Focusing", "Large Scale Systems", "Image Recognition", "Painting", "Meteorology", "Computer Graphics", "Image Color Analysis", "Switches" ], "authors": [ { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "T. Saito", "givenName": "T.", "surname": "Saito", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "H.N. Miyamura", "givenName": "H.N.", "surname": "Miyamura", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "M. Yamamoto", "givenName": "M.", "surname": "Yamamoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "H. Saito", "givenName": "H.", "surname": "Saito", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "Y. Hoshiya", "givenName": "Y.", "surname": "Hoshiya", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "T. Kaseda", "givenName": "T.", "surname": "Kaseda", "__typename": "ArticleAuthorType" } ], "idPrefix": "infvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "173-180", "year": "2005", "issn": "1522-404X", "isbn": "0-7803-9464-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01532143", "articleId": "12OmNAS9zDt", "__typename": "AdjacentArticleType" }, "next": { "fno": "01532145", "articleId": "12OmNwMob7V", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2015/6959/0/07069325", "title": "Performance comparison of parallel graph coloring algorithms on BSP model using hadoop", "doi": null, "abstractUrl": "/proceedings-article/icnc/2015/07069325/12OmNASravD", "parentPublication": { "id": "proceedings/icnc/2015/6959/0", "title": "2015 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900023", "title": "Two-Tone Pseudo Coloring: Compact Visualization for One-Dimensional Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900023/12OmNwnYG1z", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2013/5016/0/5016a054", "title": "A New Pseudo-Coloring Coding Method for DPX Image", "doi": null, "abstractUrl": "/proceedings-article/icdma/2013/5016a054/12OmNy3AgqJ", "parentPublication": { "id": "proceedings/icdma/2013/5016/0", "title": "2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402554", "title": "Interactive 4D overview and detail visualization in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402554/12OmNy3iFjC", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2012/0863/0/06183571", "title": "Embedding, clustering and coloring for dynamic maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2012/06183571/12OmNzcxZoj", "parentPublication": { "id": "proceedings/pacificvis/2012/0863/0", "title": "Visualization Symposium, IEEE Pacific", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/05/mcg2012050090", "title": "Domain Coloring of Complex Functions: An Implementation-Oriented Introduction", "doi": null, "abstractUrl": "/magazine/cg/2012/05/mcg2012050090/13rRUwI5Uag", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2018/07/08281531", "title": "A Parallel Complex Coloring Algorithm for Scheduling of Input-Queued Switches", "doi": null, "abstractUrl": "/journal/td/2018/07/08281531/13rRUx0xPhU", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/05/ttg2010050763", "title": "Sample-Based Surface Coloring", "doi": null, "abstractUrl": "/journal/tg/2010/05/ttg2010050763/13rRUxC0SW5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a094", "title": "Visual Analysis of Formula One Races", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a094/1cMF8KoSaOI", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532144", "title": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532144/1h0FwMMLAmk", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I6RKhOHxAs", "title": "2022 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1I6RMxpWlLG", "doi": "10.1109/CW55638.2022.00027", "title": "An Extended Scatterplot Selection Technique for Representing Three Numeric Variables", "normalizedTitle": "An Extended Scatterplot Selection Technique for Representing Three Numeric Variables", "abstract": "There have been automatic techniques that selects scatterplots from the ones generated from a multi- dimensional dataset as a powerful multi-dimensional data visualization method. One of the criteria used in this method supposes that plots are color-coded by a specific categorical variable in the multi-dimensional dataset. We extended this method and show the visualization results by color-coding the plots according to a specific numeric variable in the multidimensional dataset. This extended method represents a specific numeric variable by color, and generates a set of scatterplots in which all pairs of other two numeric variables are assigned to the two axes. Then, the method automatically selects interesting scatterplots that represent three numeric variables.", "abstracts": [ { "abstractType": "Regular", "content": "There have been automatic techniques that selects scatterplots from the ones generated from a multi- dimensional dataset as a powerful multi-dimensional data visualization method. One of the criteria used in this method supposes that plots are color-coded by a specific categorical variable in the multi-dimensional dataset. We extended this method and show the visualization results by color-coding the plots according to a specific numeric variable in the multidimensional dataset. This extended method represents a specific numeric variable by color, and generates a set of scatterplots in which all pairs of other two numeric variables are assigned to the two axes. Then, the method automatically selects interesting scatterplots that represent three numeric variables.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There have been automatic techniques that selects scatterplots from the ones generated from a multi- dimensional dataset as a powerful multi-dimensional data visualization method. One of the criteria used in this method supposes that plots are color-coded by a specific categorical variable in the multi-dimensional dataset. We extended this method and show the visualization results by color-coding the plots according to a specific numeric variable in the multidimensional dataset. This extended method represents a specific numeric variable by color, and generates a set of scatterplots in which all pairs of other two numeric variables are assigned to the two axes. Then, the method automatically selects interesting scatterplots that represent three numeric variables.", "fno": "681400a122", "keywords": [ "Data Visualisation", "Image Colour Analysis", "Numeric Variables", "Extended Scatterplot Selection Technique", "Automatic Techniques", "Multidimensional Data Visualization Method", "Multidimensional Dataset", "Color Coding", "Extended Method", "Image Color Analysis", "Shape", "Data Visualization", "Aircraft", "Optimization", "Multidimensional Data Visualization", "Scatterplot Selection", "Graph Coloring", "Three Numeric Variable" ], "authors": [ { "affiliation": "Ochanomizu University,Tokyo,Japan", "fullName": "Mizuki Ishida", "givenName": "Mizuki", "surname": "Ishida", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University,Tokyo,Japan", "fullName": "Takayuki Itoh", "givenName": "Takayuki", "surname": "Itoh", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-09-01T00:00:00", "pubType": "proceedings", "pages": "122-125", "year": "2022", "issn": null, "isbn": "978-1-6654-6814-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "681400a118", "articleId": "1I6RQ8VlGNi", "__typename": "AdjacentArticleType" }, "next": { "fno": "681400a126", "articleId": "1I6RRXv0m9G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2014/4103/0/4103a084", "title": "A Heatmap-Based Time-Varying Multi-variate Data Visualization Unifying Numeric and Categorical Variables", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a084/12OmNqESuhq", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2017/0852/0/0852a099", "title": "Stem & Leaf Plots Extended for Text Visualizations", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2017/0852a099/12OmNy5zspa", "parentPublication": { "id": "proceedings/cgiv/2017/0852/0", "title": "2017 14th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/10/ttg2013101768", "title": "The Generalized Sensitivity Scatterplot", "doi": null, "abstractUrl": "/journal/tg/2013/10/ttg2013101768/13rRUwbs2gs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/06/mcg2010060003", "title": "Improved Scatterplot Design", "doi": null, "abstractUrl": "/magazine/cg/2010/06/mcg2010060003/13rRUwjoNCc", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/10/07089294", "title": "Representing Uncertainty in Graph Edges: An Evaluation of Paired Visual Variables", "doi": null, "abstractUrl": "/journal/tg/2015/10/07089294/13rRUxjyX42", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/09/07332976", "title": "The Connected Scatterplot for Presenting Paired Time Series", "doi": null, "abstractUrl": "/journal/tg/2016/09/07332976/13rRUyY294F", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09826389", "title": "Automatic Scatterplot Design Optimization for Clustering Identification", "doi": null, "abstractUrl": "/journal/tg/5555/01/09826389/1EVdDTX0i2I", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a669", "title": "Comparing Scatterplot Variants for Temporal Trends Visualization in Immersive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a669/1MNgtBAIjG8", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a062", "title": "A Technique for Selection and Drawing of Scatterplots for Multi-Dimensional Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a062/1cMF8TTAeAw", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222351", "title": "Palettailor: Discriminable Colorization for Categorical Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222351/1nTq353vBNS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMF8oE0kI8", "title": "2019 23rd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF9J2MPLi", "doi": "10.1109/IV.2019.00027", "title": "Viewpoint Selection for Shape Comparison of Mode Water Regions in a VR Space", "normalizedTitle": "Viewpoint Selection for Shape Comparison of Mode Water Regions in a VR Space", "abstract": "Virtual Reality (VR) provides immersive environments where users watch objects and scenes as if they were in front of users. This is a significant advantage while applying to 3D visualization systems. However, it is often difficult for novice users to make the best use of VR to reproduce the objects and scenes precisely and the comprehensively depending on the skills of users and the complexity of objects and scenes. One of the problems is that the allowed operations in VR are too flexible. Here, we propose a viewpoint selection method that allows every user to watch the objects and scenes easily and carefully in a VR space. The viewpoint is not fixed but can be shifted to the most favorable position according to the demand of users. Regarding the selected viewpoint as the initial position, users can easily go towards the target part with fewer movements. This system helps users to understand the complex objects in the VR space precisely with less time. We demonstrate our system on the observation of mode water pairs and discuss the comparative visualization results.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual Reality (VR) provides immersive environments where users watch objects and scenes as if they were in front of users. This is a significant advantage while applying to 3D visualization systems. However, it is often difficult for novice users to make the best use of VR to reproduce the objects and scenes precisely and the comprehensively depending on the skills of users and the complexity of objects and scenes. One of the problems is that the allowed operations in VR are too flexible. Here, we propose a viewpoint selection method that allows every user to watch the objects and scenes easily and carefully in a VR space. The viewpoint is not fixed but can be shifted to the most favorable position according to the demand of users. Regarding the selected viewpoint as the initial position, users can easily go towards the target part with fewer movements. This system helps users to understand the complex objects in the VR space precisely with less time. We demonstrate our system on the observation of mode water pairs and discuss the comparative visualization results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual Reality (VR) provides immersive environments where users watch objects and scenes as if they were in front of users. This is a significant advantage while applying to 3D visualization systems. However, it is often difficult for novice users to make the best use of VR to reproduce the objects and scenes precisely and the comprehensively depending on the skills of users and the complexity of objects and scenes. One of the problems is that the allowed operations in VR are too flexible. Here, we propose a viewpoint selection method that allows every user to watch the objects and scenes easily and carefully in a VR space. The viewpoint is not fixed but can be shifted to the most favorable position according to the demand of users. Regarding the selected viewpoint as the initial position, users can easily go towards the target part with fewer movements. This system helps users to understand the complex objects in the VR space precisely with less time. We demonstrate our system on the observation of mode water pairs and discuss the comparative visualization results.", "fno": "283800a106", "keywords": [ "Data Visualisation", "Virtual Reality", "Mode Water Regions", "VR Space", "3 D Visualization Systems", "Viewpoint Selection Method", "Complex Objects", "Virtual Reality", "Shape", "Isosurfaces", "Three Dimensional Displays", "Image Color Analysis", "Visualization", "Oceans", "Virtual Reality", "Scientific Visualization", "Viewpoint Selection", "Shape Comparison", "Ocean Data" ], "authors": [ { "affiliation": "Ochanomizu University", "fullName": "Midori Yano", "givenName": "Midori", "surname": "Yano", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University", "fullName": "Takayuki Itoh", "givenName": "Takayuki", "surname": "Itoh", "__typename": "ArticleAuthorType" }, { "affiliation": "Japan Agency for Marine-Earth Science and Technology", "fullName": "Yuusuke Tanaka", "givenName": "Yuusuke", "surname": "Tanaka", "__typename": "ArticleAuthorType" }, { "affiliation": "Japan Agency for Marine-Earth Science and Technology", "fullName": "Daisuke Matsuoka", "givenName": "Daisuke", "surname": "Matsuoka", "__typename": "ArticleAuthorType" }, { "affiliation": "Japan Agency for Marine-Earth Science and Technology", "fullName": "Fumiaki Araki", "givenName": "Fumiaki", "surname": "Araki", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University", "fullName": "Tobias Czauderna", "givenName": "Tobias", "surname": "Czauderna", "__typename": "ArticleAuthorType" }, { "affiliation": "Monash University", "fullName": "Kingsley Stephens", "givenName": "Kingsley", "surname": "Stephens", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "106-111", "year": "2019", "issn": null, "isbn": "978-1-7281-2838-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "283800a139", "articleId": "1cMFbkvukAU", "__typename": "AdjacentArticleType" }, "next": { "fno": "283800a112", "articleId": "1cMFcwTfcT6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2004/2158/1/215810488", "title": "Video Data Mining Using Configurations of Viewpoint Invariant Regions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/215810488/12OmNqBKTVi", "parentPublication": { "id": "proceedings/cvpr/2004/2158/1", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/1/01315071", "title": "Video data mining using configurations of viewpoint invariant regions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315071/12OmNxZkhvE", "parentPublication": { "id": "proceedings/cvpr/2004/2158/1", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2018/1424/0/142401a230", "title": "A Comparative 3D Visualization Tool for Observation of Mode Water", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a230/12OmNyv7m59", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446561", "title": "Augmented VR", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446561/13bd1eSlysy", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwecai/2022/7997/0/799700a047", "title": "Viewpoint estimation of image object based on parameters sharing network", "doi": null, "abstractUrl": "/proceedings-article/iwecai/2022/799700a047/1CuguZI4sJG", "parentPublication": { "id": "proceedings/iwecai/2022/7997/0", "title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090407", "title": "Transporting Real World Rigid and Articulated Objects into Egocentric VR Experiences", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090407/1jIxlw3Qiic", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a238", "title": "Real-time Immersive VR Visualization of Ocean Climate Data", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a238/1tnWNkaUAZa", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a030", "title": "Immersive Multimodal and Procedurally-Assisted Creation of VR Environments", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a030/1tnXheKhk1q", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700d802", "title": "Viewpoint-agnostic Image Rendering", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700d802/1uqGjFoevbG", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fTgF9x78sw", "title": "2019 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fTgGSW14Q0", "doi": "10.1109/VISUAL.2019.8933709", "title": "Hi-D Maps: An Interactive Visualization Technique for Multi-Dimensional Categorical Data", "normalizedTitle": "Hi-D Maps: An Interactive Visualization Technique for Multi-Dimensional Categorical Data", "abstract": "In this paper, we present Hi-D maps, a novel method for the visualization of multi-dimensional categorical data. Our work addresses the scarcity of techniques for visualizing a large number of data-dimensions in an effective and space-efficient manner. We have mapped the full data-space onto a 2D regular polygonal region. The polygon is cut hierarchically with lines parallel to a user-controlled, ordered sequence of sides, each representing a dimension. We have used multiple visual cues such as orientation, thickness, color, countable glyphs, and text to depict cross-dimensional information. We have added interactivity and hierarchical browsing to facilitate flexible exploration of the display: small areas can be scrutinized for details. Thus, our method is also easily extendable to visualize hierarchical information. Our glyph animations add an engaging aesthetic during interaction. Like many visualizations, Hi-D maps become less effective when a large number of dimensions stresses perceptual limits, but Hi-D maps may add clarity before those limits are reached.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present Hi-D maps, a novel method for the visualization of multi-dimensional categorical data. Our work addresses the scarcity of techniques for visualizing a large number of data-dimensions in an effective and space-efficient manner. We have mapped the full data-space onto a 2D regular polygonal region. The polygon is cut hierarchically with lines parallel to a user-controlled, ordered sequence of sides, each representing a dimension. We have used multiple visual cues such as orientation, thickness, color, countable glyphs, and text to depict cross-dimensional information. We have added interactivity and hierarchical browsing to facilitate flexible exploration of the display: small areas can be scrutinized for details. Thus, our method is also easily extendable to visualize hierarchical information. Our glyph animations add an engaging aesthetic during interaction. Like many visualizations, Hi-D maps become less effective when a large number of dimensions stresses perceptual limits, but Hi-D maps may add clarity before those limits are reached.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present Hi-D maps, a novel method for the visualization of multi-dimensional categorical data. Our work addresses the scarcity of techniques for visualizing a large number of data-dimensions in an effective and space-efficient manner. We have mapped the full data-space onto a 2D regular polygonal region. The polygon is cut hierarchically with lines parallel to a user-controlled, ordered sequence of sides, each representing a dimension. We have used multiple visual cues such as orientation, thickness, color, countable glyphs, and text to depict cross-dimensional information. We have added interactivity and hierarchical browsing to facilitate flexible exploration of the display: small areas can be scrutinized for details. Thus, our method is also easily extendable to visualize hierarchical information. Our glyph animations add an engaging aesthetic during interaction. Like many visualizations, Hi-D maps become less effective when a large number of dimensions stresses perceptual limits, but Hi-D maps may add clarity before those limits are reached.", "fno": "08933709", "keywords": [ "Data Visualisation", "Interactive Systems", "Multidimensional Categorical Data", "Hi D Maps", "Data Dimensions", "Space Efficient Manner", "2 D Regular Polygonal Region", "Multiple Visual Cues", "Cross Dimensional Information", "Interactive Visualization Technique", "Hierarchical Browsing", "Glyph Animations", "Data Visualization", "Visualization", "Image Color Analysis", "Mice", "Two Dimensional Displays", "Animation", "Tools", "Human Centered Computing", "Visualization", "Visualization Techniques", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "North Carolina State University", "fullName": "Radi Muhammad Reza", "givenName": "Radi Muhammad", "surname": "Reza", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University", "fullName": "Benjamin A. Watson", "givenName": "Benjamin A.", "surname": "Watson", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "216-220", "year": "2019", "issn": null, "isbn": "978-1-7281-4941-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08933568", "articleId": "1fTgHgjW7fy", "__typename": "AdjacentArticleType" }, "next": { "fno": "08933632", "articleId": "1fTgJgZx0go", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/2/3735b557", "title": "Logit Model for the Choice of R&#x00026;D Cooperation Mode for Hi-tech SME", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b557/12OmNCcbE6S", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dim/1997/7943/0/79430242", "title": "Building 3-D City Models from Multiple Unregistered Profile Maps", "doi": null, "abstractUrl": "/proceedings-article/3dim/1997/79430242/12OmNrHB1Tt", "parentPublication": { "id": "proceedings/3dim/1997/7943/0", "title": "3D Digital Imaging and Modeling, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568z026", "title": "D-Art Gallery 2015", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568z026/12OmNz6iOK6", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539320", "title": "Decal-Maps: Real-Time Layering of Decals on Surfaces for Multivariate Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539320/13rRUx0gezV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539285", "title": "Molecular Surface Maps", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539285/13rRUxASuvj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200z026", "title": "D-Art Gallery 2018", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200z026/17D45Wuc3b4", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hdis/2022/9144/0/09991394", "title": "Pseudo Depth Maps for RGB-D SLAM", "doi": null, "abstractUrl": "/proceedings-article/hdis/2022/09991394/1JwQ1uhFF4s", "parentPublication": { "id": "proceedings/hdis/2022/9144/0", "title": "2022 International Conference on High Performance Big Data and Intelligent Systems (HDIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933654", "title": "Time Varying Predominance Tag Maps", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933654/1fTgI2WaxuE", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/04/09187994", "title": "Uncertainty Visualization of 2D Morse Complex Ensembles Using Statistical Summary Maps", "doi": null, "abstractUrl": "/journal/tg/2022/04/09187994/1mXkiNpxvvq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/08/09318559", "title": "Affective Congruence in Visualization Design: Influences on Reading Categorical Maps", "doi": null, "abstractUrl": "/journal/tg/2022/08/09318559/1qdT8m4QLIY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxH9X7w", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "1h0FwMMLAmk", "doi": "10.1109/INFVIS.2005.1532144", "title": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "normalizedTitle": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "abstract": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "abstracts": [ { "abstractType": "Regular", "content": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new pseudo coloring technique for large scale one-dimensional datasets is proposed. For visualization of a large scale dataset, user interaction is indispensable for selecting focus areas in the dataset. However, excessive switching of the visualized image makes it difficult for the user to recognize overview/ detail and detail/ detail relationships. The goal of this research is to develop techniques for visualizing details as precisely as possible in overview display. In this paper, visualization of a one-dimensional but very large dataset is considered. The proposed method is based on pseudo coloring, however, each scalar value corresponds to two discrete colors. By painting with two colors at each value, users can read out the value precisely. This method has many advantages: it requires little image space for visualization; both the overview and details of the dataset are visible in one image without distortion; and implementation is very simple. Several application examples, such as meteorological observation data and train convenience evaluation data, show the effectiveness of the method.", "fno": "01532144", "keywords": [ "Data Visualisation", "Graphical User Interfaces", "Two Tone Pseudo Coloring", "Compact Visualization", "One Dimensional Dataset Visualization", "Dataset Detail Visualization", "User Interaction", "Visualized Image", "Overview Display", "Discrete Colors", "Data Visualization", "Displays", "Focusing", "Large Scale Systems", "Image Recognition", "Painting", "Meteorology", "Computer Graphics", "Image Color Analysis", "Switches" ], "authors": [ { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "T. Saito", "givenName": "T.", "surname": "Saito", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "H.N. Miyamura", "givenName": "H.N.", "surname": "Miyamura", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "M. Yamamoto", "givenName": "M.", "surname": "Yamamoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "H. Saito", "givenName": "H.", "surname": "Saito", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "Y. Hoshiya", "givenName": "Y.", "surname": "Hoshiya", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Univ. of Agric. & Technol., Japan", "fullName": "T. Kaseda", "givenName": "T.", "surname": "Kaseda", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "173-180", "year": "2005", "issn": "1522-404X", "isbn": "0-7803-9464-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27900007", "articleId": "12OmNzSyCdf", "__typename": "AdjacentArticleType" }, "next": { "fno": "27900008", "articleId": "12OmNAOKnSi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2015/6959/0/07069325", "title": "Performance comparison of parallel graph coloring algorithms on BSP model using hadoop", "doi": null, "abstractUrl": "/proceedings-article/icnc/2015/07069325/12OmNASravD", "parentPublication": { "id": "proceedings/icnc/2015/6959/0", "title": "2015 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900023", "title": "Two-Tone Pseudo Coloring: Compact Visualization for One-Dimensional Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900023/12OmNwnYG1z", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2013/5016/0/5016a054", "title": "A New Pseudo-Coloring Coding Method for DPX Image", "doi": null, "abstractUrl": "/proceedings-article/icdma/2013/5016a054/12OmNy3AgqJ", "parentPublication": { "id": "proceedings/icdma/2013/5016/0", "title": "2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402554", "title": "Interactive 4D overview and detail visualization in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402554/12OmNy3iFjC", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2012/0863/0/06183571", "title": "Embedding, clustering and coloring for dynamic maps", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2012/06183571/12OmNzcxZoj", "parentPublication": { "id": "proceedings/pacificvis/2012/0863/0", "title": "Visualization Symposium, IEEE Pacific", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532144", "title": "Two-tone pseudo coloring: compact visualization for one-dimensional data", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532144/12OmNzxPTPJ", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/05/mcg2012050090", "title": "Domain Coloring of Complex Functions: An Implementation-Oriented Introduction", "doi": null, "abstractUrl": "/magazine/cg/2012/05/mcg2012050090/13rRUwI5Uag", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2018/07/08281531", "title": "A Parallel Complex Coloring Algorithm for Scheduling of Input-Queued Switches", "doi": null, "abstractUrl": "/journal/td/2018/07/08281531/13rRUx0xPhU", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/05/ttg2010050763", "title": "Sample-Based Surface Coloring", "doi": null, "abstractUrl": "/journal/tg/2010/05/ttg2010050763/13rRUxC0SW5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a094", "title": "Visual Analysis of Formula One Races", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a094/1cMF8KoSaOI", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kmoNreKiTm", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kuHmMXxUmA", "doi": "10.1109/PacificVis48177.2020.9915", "title": "Representing Multivariate Data by Optimal Colors to Uncover Events of Interest in Time Series Data", "normalizedTitle": "Representing Multivariate Data by Optimal Colors to Uncover Events of Interest in Time Series Data", "abstract": "In this paper, we present a visualization system for users to study multivariate time series data. They first identify trends or anomalies from a global view and then examine details in a local view. Specifically, we train a neural network to project high-dimensional data to a two dimensional (2D) planar space while retaining global data distances. By aligning the 2D points with a predefined color map, high-dimensional data can be represented by colors. Because perceptual color differentiation may fail to reflect data distance, we optimize perceptual color differentiation on each map region by deformation. The region with large perceptual color differentiation will expand, whereas the region with small differentiation will shrink. Since colors do not occupy any space in visualization, we convey the overview of multivariate time series data by a calendar view. Cells in the view are color-coded to represent multivariate data at different time spans. Users can observe color changes over time to identify events of interest. Afterward, they study details of an event by examining parallel coordinate plots. Cells in the calendar view and the parallel coordinate plots are dynamically linked for users to obtain insights that are barely noticeable in large datasets. The experiment results, comparisons, conducted case studies, and the user study indicate that our visualization system is feasible and effective.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a visualization system for users to study multivariate time series data. They first identify trends or anomalies from a global view and then examine details in a local view. Specifically, we train a neural network to project high-dimensional data to a two dimensional (2D) planar space while retaining global data distances. By aligning the 2D points with a predefined color map, high-dimensional data can be represented by colors. Because perceptual color differentiation may fail to reflect data distance, we optimize perceptual color differentiation on each map region by deformation. The region with large perceptual color differentiation will expand, whereas the region with small differentiation will shrink. Since colors do not occupy any space in visualization, we convey the overview of multivariate time series data by a calendar view. Cells in the view are color-coded to represent multivariate data at different time spans. Users can observe color changes over time to identify events of interest. Afterward, they study details of an event by examining parallel coordinate plots. Cells in the calendar view and the parallel coordinate plots are dynamically linked for users to obtain insights that are barely noticeable in large datasets. The experiment results, comparisons, conducted case studies, and the user study indicate that our visualization system is feasible and effective.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a visualization system for users to study multivariate time series data. They first identify trends or anomalies from a global view and then examine details in a local view. Specifically, we train a neural network to project high-dimensional data to a two dimensional (2D) planar space while retaining global data distances. By aligning the 2D points with a predefined color map, high-dimensional data can be represented by colors. Because perceptual color differentiation may fail to reflect data distance, we optimize perceptual color differentiation on each map region by deformation. The region with large perceptual color differentiation will expand, whereas the region with small differentiation will shrink. Since colors do not occupy any space in visualization, we convey the overview of multivariate time series data by a calendar view. Cells in the view are color-coded to represent multivariate data at different time spans. Users can observe color changes over time to identify events of interest. Afterward, they study details of an event by examining parallel coordinate plots. Cells in the calendar view and the parallel coordinate plots are dynamically linked for users to obtain insights that are barely noticeable in large datasets. The experiment results, comparisons, conducted case studies, and the user study indicate that our visualization system is feasible and effective.", "fno": "09086210", "keywords": [ "Data Analysis", "Data Visualisation", "Time Series", "Color Map", "High Dimensional Data", "Perceptual Color Differentiation", "Multivariate Time Series Data", "Calendar View", "Visualization System", "Two Dimensional Planar Space", "Data Distances", "Visualization", "Image Color Analysis", "Time Series Analysis", "Two Dimensional Displays", "Data Visualization", "Prototypes", "Sensor Systems" ], "authors": [ { "affiliation": "National Chiao Tung University", "fullName": "Ding-Bang Chen", "givenName": "Ding-Bang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Chien-Hsun Lai", "givenName": "Chien-Hsun", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Yun-Hsuan Lien", "givenName": "Yun-Hsuan", "surname": "Lien", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Yu-Hsuan Lin", "givenName": "Yu-Hsuan", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Yu-Shuen Wang", "givenName": "Yu-Shuen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Davis", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "156-165", "year": "2020", "issn": null, "isbn": "978-1-7281-5697-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09086245", "articleId": "1kuHm7YdcOY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09086206", "articleId": "1kuHnwov7cQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/nicoint/2016/2305/0/2305a015", "title": "TimeTubes: Design of a Visualization Tool for Time-Dependent, Multivariate Blazar Datasets", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a015/12OmNvUsonr", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dagstuhl/1997/0503/0/05030314", "title": "Perceptual Benchmarking for Multivariate Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/dagstuhl/1997/05030314/12OmNwJPMVt", "parentPublication": { "id": "proceedings/dagstuhl/1997/0503/0", "title": "Dagstuhl '97 - Scientific Visualization Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08047300", "title": "Cluster-Based Visual Abstraction for Multivariate Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2018/09/08047300/13rRUILLkvy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539320", "title": "Decal-Maps: Real-Time Layering of Decals on Surfaces for Multivariate Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539320/13rRUx0gezV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1999/02/v0145", "title": "Large Datasets at a Glance: Combining Textures and Colors in Scientific Visualization", "doi": null, "abstractUrl": "/journal/tg/1999/02/v0145/13rRUygBwhC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/02/08302605", "title": "ColorMapND: A Data-Driven Approach and Tool for Mapping Multivariate Data to Color", "doi": null, "abstractUrl": "/journal/tg/2019/02/08302605/17D45X0yjSp", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09856934", "title": "Multiview Unsupervised Shapelet Learning for Multivariate Time Series Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/04/09856934/1FSY5sQC3tu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dagstuhl/1997/0503/0/01423127", "title": "Perceptual Benchmarking for Multivariate Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/dagstuhl/1997/01423127/1h0N47AzeVO", "parentPublication": { "id": "proceedings/dagstuhl/1997/0503/0", "title": "Dagstuhl '97 - Scientific Visualization Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2008/2935/0/04677368", "title": "Multivariate visual explanation for high dimensional datasets", "doi": null, "abstractUrl": "/proceedings-article/vast/2008/04677368/1oFGMltTtFC", "parentPublication": { "id": "proceedings/vast/2008/2935/0", "title": "2008 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXGc", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW)", "acronym": "wiw", "groupId": "1001412", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNC1Gug8", "doi": "10.1109/WIW.2016.041", "title": "Double-Hypergraph Based Sentence Ranking for Query-Focused Multi-document Summarizaton", "normalizedTitle": "Double-Hypergraph Based Sentence Ranking for Query-Focused Multi-document Summarizaton", "abstract": "Traditional graph based sentence ranking approaches modeled the documents as a text graph where vertices represent sentences and edges represent pairwise similarity relationships between two sentences. Such modeling cannot capture complex group relationships shared among multiple sentences which can be useful for sentence ranking. In this paper, we propose two different group relationships (sentence-topic relationship and document-topic relationship) shared among sentences, and construct a double-hypergraph integrating these relationships into a unified framework. Then, a double-hypergraph based sentence ranking algorithm is developed for query-focused multi-document summarization, in which Markov random walk is defined on each hypergraph and the mixture Markov chains are formed so as to perform transductive learning in the double-hypergraph. When evaluated on DUC datasets, performance of the proposed approach is remarkable.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional graph based sentence ranking approaches modeled the documents as a text graph where vertices represent sentences and edges represent pairwise similarity relationships between two sentences. Such modeling cannot capture complex group relationships shared among multiple sentences which can be useful for sentence ranking. In this paper, we propose two different group relationships (sentence-topic relationship and document-topic relationship) shared among sentences, and construct a double-hypergraph integrating these relationships into a unified framework. Then, a double-hypergraph based sentence ranking algorithm is developed for query-focused multi-document summarization, in which Markov random walk is defined on each hypergraph and the mixture Markov chains are formed so as to perform transductive learning in the double-hypergraph. When evaluated on DUC datasets, performance of the proposed approach is remarkable.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional graph based sentence ranking approaches modeled the documents as a text graph where vertices represent sentences and edges represent pairwise similarity relationships between two sentences. Such modeling cannot capture complex group relationships shared among multiple sentences which can be useful for sentence ranking. In this paper, we propose two different group relationships (sentence-topic relationship and document-topic relationship) shared among sentences, and construct a double-hypergraph integrating these relationships into a unified framework. Then, a double-hypergraph based sentence ranking algorithm is developed for query-focused multi-document summarization, in which Markov random walk is defined on each hypergraph and the mixture Markov chains are formed so as to perform transductive learning in the double-hypergraph. When evaluated on DUC datasets, performance of the proposed approach is remarkable.", "fno": "6039a112", "keywords": [ "Markov Processes", "Optimization", "Data Mining", "Clustering Algorithms", "Conferences", "Automation", "Internet", "Hypergraph Sentence Ranking Query Focused Multi Document Summarization" ], "authors": [ { "affiliation": null, "fullName": "Xiaoyan Cai", "givenName": "Xiaoyan", "surname": "Cai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Junwei Han", "givenName": "Junwei", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lei Guo", "givenName": "Lei", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Libin Yang", "givenName": "Libin", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "wiw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "112-118", "year": "2016", "issn": null, "isbn": "978-1-5090-4771-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6039a104", "articleId": "12OmNBlXs30", "__typename": "AdjacentArticleType" }, "next": { "fno": "6039a119", "articleId": "12OmNz2TCyO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2011/4408/0/4408a626", "title": "Learning to Rank for Query-Focused Multi-document Summarization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a626/12OmNAS9zsk", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/274701012", "title": "Using Cross-Document Random Walks for Topic-Focused Multi-Document", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/274701012/12OmNBAqZIZ", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a275", "title": "Ranking Sentences in Scientific Literatures", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a275/12OmNqHItu3", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a927", "title": "A Novel Relational Learning-to-Rank Approach for Topic-Focused Multi-document Summarization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a927/12OmNrAdsDo", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a119", "title": "A Spreading Activation Based Sentence Ordering Model Collaborated with Cognitive Logical Structure", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a119/12OmNrJAebk", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a073", "title": "Sentence Ranking with the Semantic Link Network in Scientific Paper", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a073/12OmNx5pj0O", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/05/ttk2013051162", "title": "Update Summarization via Graph-Based Sentence Ranking", "doi": null, "abstractUrl": "/journal/tk/2013/05/ttk2013051162/13rRUNvgz4N", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2019/7789/0/08679478", "title": "Query-Focused Summarization Enhanced with Sentence Attention Mechanism", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2019/08679478/18Xkg2XQ84o", "parentPublication": { "id": "proceedings/bigcomp/2019/7789/0", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2022/04/09743632", "title": "SR3: Sentence Ranking, Reasoning, and Replication for Scenario-Based Essay Question Answering", "doi": null, "abstractUrl": "/magazine/ic/2022/04/09743632/1C6WTKoChTq", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08982999", "title": "Disease Gene Prediction Based on Heterogeneous Probabilistic Hypergraph Ranking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08982999/1hgu8ynnXeU", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBBhN8T", "title": "Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)", "acronym": "focs", "groupId": "1000292", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAiSFU", "doi": "10.1109/SFCS.1998.743521", "title": "The Complexity of Acyclic Conjunctive Queries", "normalizedTitle": "The Complexity of Acyclic Conjunctive Queries", "abstract": "We show that the problem of evaluating acyclic Boolean database-queries is LOGCFL-complete and thus highly parallelizable. We present a parallel database algorithm solving this problem with a logarithmic number of parallel join operations. We also show that the acyclic versions of the following important database and AI problems are LOGCFL-complete: The Query Output Tuple problem for conjunctive queries, Conjunctive Query Containment, Clause Subsumption, and Constraint Satisfaction.", "abstracts": [ { "abstractType": "Regular", "content": "We show that the problem of evaluating acyclic Boolean database-queries is LOGCFL-complete and thus highly parallelizable. We present a parallel database algorithm solving this problem with a logarithmic number of parallel join operations. We also show that the acyclic versions of the following important database and AI problems are LOGCFL-complete: The Query Output Tuple problem for conjunctive queries, Conjunctive Query Containment, Clause Subsumption, and Constraint Satisfaction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We show that the problem of evaluating acyclic Boolean database-queries is LOGCFL-complete and thus highly parallelizable. We present a parallel database algorithm solving this problem with a logarithmic number of parallel join operations. We also show that the acyclic versions of the following important database and AI problems are LOGCFL-complete: The Query Output Tuple problem for conjunctive queries, Conjunctive Query Containment, Clause Subsumption, and Constraint Satisfaction.", "fno": "91720706", "keywords": [ "Database Theory", "Conjunctive Query", "Acyclic Hypergraph", "Join Tree", "Tree Query", "Computational Complexity", "LOGCFL", "Constraint Satisfaction Problem", "Query Containment", "Subsumption", "Parallel Algorithms" ], "authors": [ { "affiliation": "Technische Universit?t Wien", "fullName": "Georg Gottlob", "givenName": "Georg", "surname": "Gottlob", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universit?t Wien", "fullName": "Nicola Leone", "givenName": "Nicola", "surname": "Leone", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit? della Calabria", "fullName": "Francesco Scarcello", "givenName": "Francesco", "surname": "Scarcello", "__typename": "ArticleAuthorType" } ], "idPrefix": "focs", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-11-01T00:00:00", "pubType": "proceedings", "pages": "706", "year": "1998", "issn": "0272-5428", "isbn": "0-8186-9172-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "91720694", "articleId": "12OmNwekjxR", "__typename": "AdjacentArticleType" }, "next": { "fno": "91720716", "articleId": "12OmNwD1pOS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyuPL0n", "title": "2018 IEEE International Conference on Big Data and Smart Computing (BigComp)", "acronym": "bigcomp", "groupId": "1803439", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNwGZNNR", "doi": "10.1109/BigComp.2018.00140", "title": "Efficient Searching of Subhypergraph Isomorphism in Hypergraph Databases", "normalizedTitle": "Efficient Searching of Subhypergraph Isomorphism in Hypergraph Databases", "abstract": "A hypergraph consisting of nodes and hyperedges that connects multiple nodes can model complex relationships among entities effectively. In this work, we study a subhypergraph isomorphism search method that finds all isomorphic subhypergraphs to the query. Existing works of subgraph isomorphism in an ordinary graph try to reduce search space for a query graph to decrease computational costs, since a subgraph isomorphism problem is known to be NP-hard. However, previous methods of finding isomorphic subhypergraphs for hypergraphs do not make much effort for decreasing costs. In this paper, we propose a method that finds subhypergraph isomorphism efficiently. We first select nodes and edges that are likely to match to a query hypergraph, with consideration for characteristics of hyperedges. Then, we verify isomorphism between remaining subgraphs of data hypergraph and a query hypergraph. Experimental results show that our proposed method outperforms existing methods.", "abstracts": [ { "abstractType": "Regular", "content": "A hypergraph consisting of nodes and hyperedges that connects multiple nodes can model complex relationships among entities effectively. In this work, we study a subhypergraph isomorphism search method that finds all isomorphic subhypergraphs to the query. Existing works of subgraph isomorphism in an ordinary graph try to reduce search space for a query graph to decrease computational costs, since a subgraph isomorphism problem is known to be NP-hard. However, previous methods of finding isomorphic subhypergraphs for hypergraphs do not make much effort for decreasing costs. In this paper, we propose a method that finds subhypergraph isomorphism efficiently. We first select nodes and edges that are likely to match to a query hypergraph, with consideration for characteristics of hyperedges. Then, we verify isomorphism between remaining subgraphs of data hypergraph and a query hypergraph. Experimental results show that our proposed method outperforms existing methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A hypergraph consisting of nodes and hyperedges that connects multiple nodes can model complex relationships among entities effectively. In this work, we study a subhypergraph isomorphism search method that finds all isomorphic subhypergraphs to the query. Existing works of subgraph isomorphism in an ordinary graph try to reduce search space for a query graph to decrease computational costs, since a subgraph isomorphism problem is known to be NP-hard. However, previous methods of finding isomorphic subhypergraphs for hypergraphs do not make much effort for decreasing costs. In this paper, we propose a method that finds subhypergraph isomorphism efficiently. We first select nodes and edges that are likely to match to a query hypergraph, with consideration for characteristics of hyperedges. Then, we verify isomorphism between remaining subgraphs of data hypergraph and a query hypergraph. Experimental results show that our proposed method outperforms existing methods.", "fno": "364901a739", "keywords": [ "Computational Complexity", "Graph Theory", "Optimisation", "Query Hypergraph", "Data Hypergraph", "Subhypergraph Isomorphism", "Hypergraph Databases", "Complex Relationships", "Search Method", "Isomorphic Subhypergraphs", "Ordinary Graph", "Search Space", "Query Graph", "Subgraph Isomorphism Problem", "NP Hard Problem", "Databases", "Search Problems", "Smart Grids", "Time Factors", "Data Models", "Computational Efficiency", "Measurement", "Hypergraph", "Subhypergraph Isomorphism", "Graph", "Subgraph Isomorphism" ], "authors": [ { "affiliation": null, "fullName": "Tae Wook Ha", "givenName": "Tae Wook", "surname": "Ha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jung Hyuk Seo", "givenName": "Jung Hyuk", "surname": "Seo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Myoung Ho Kim", "givenName": "Myoung Ho", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigcomp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-01-01T00:00:00", "pubType": "proceedings", "pages": "739-742", "year": "2018", "issn": "2375-9356", "isbn": "978-1-5386-3649-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "364901a736", "articleId": "12OmNyQYt5A", "__typename": "AdjacentArticleType" }, "next": { "fno": "364901a743", "articleId": "12OmNxy4N4U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209d880", "title": "A Hypergraph Kernel from Isomorphism Tests", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d880/12OmNAoUTku", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498237", "title": "Scalable supergraph search in large graph databases", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498237/12OmNy6Zs0Y", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcity/2015/1893/0/1893a709", "title": "Graph Code Based Isomorphism Query on Graph Data", "doi": null, "abstractUrl": "/proceedings-article/smartcity/2015/1893a709/12OmNzYwc8B", "parentPublication": { "id": "proceedings/smartcity/2015/1893/0", "title": "2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594961", "title": "Leveraging Hypergraph Random Walk Tag Expansion and User Social Relation for Microblog Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594961/17D45XvMcam", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09739081", "title": "Efficient Subhypergraph Matching Based on Hyperedge Features", "doi": null, "abstractUrl": "/journal/tk/2023/06/09739081/1BVBKFEH4sw", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09779084", "title": "Stable Subgraph Isomorphism Search in Temporal Networks", "doi": null, "abstractUrl": "/journal/tk/2023/06/09779084/1DvfKAsa8gg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2023/02/09809922", "title": "Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding", "doi": null, "abstractUrl": "/journal/sc/2023/02/09809922/1EzDLQEY4r6", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300a872", "title": "Efficient Graph Isomorphism Query Processing using Degree Sequences and Color-Label Distributions", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300a872/1FwFwLEQelO", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09875064", "title": "HyperISO: Efficiently Searching Subgraph Containment in Hypergraphs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09875064/1GlbTSkl9Is", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101348", "title": "GSI: GPU-friendly Subgraph Isomorphism", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101348/1kaMJQxH0eA", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqI04J3", "title": "2014 IEEE/ACM International Symposium on Big Data Computing (BDC)", "acronym": "bdc", "groupId": "1805846", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzwHvid", "doi": "10.1109/BDC.2014.12", "title": "GeoLens: Enabling Interactive Visual Analytics over Large-Scale, Multidimensional Geospatial Datasets", "normalizedTitle": "GeoLens: Enabling Interactive Visual Analytics over Large-Scale, Multidimensional Geospatial Datasets", "abstract": "With the rapid increase of scientific data volumes, interactive tools that enable effective visual representation for scientists are needed. This is critical when scientists are manipulating voluminous datasets and especially when they need to explore datasets interactively to develop their hypotheses. In this paper, we present an interactive visual analytics framework, GeoLens. GeoLens provides fast and expressive interactions with voluminous geo-spatial datasets. We provide an expressive visual query evaluation scheme to support advanced interactive visual analytics technique, such as brushing and linking. To achieve this, we designed and developed the Geohash based image tile generation algorithm that automatically adjusts the range of data to access based on the minimum acceptable size of the image tile. In addition, we have also designed an autonomous histogram generation algorithm that generates histograms of user-defined data subsets that do not have pre-computed data properties. Using our approach, applications can generate histograms of datasets containing millions of data points with sub-second latency. The work builds on our visual query coordinating scheme that evaluates geo-spatial query and orchestrates data aggregation in a distributed storage environment while preserving data locality and minimizing data movements. This paper includes empirical benchmarks of our framework encompassing a billion-file dataset published by the National Climactic Data Center.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid increase of scientific data volumes, interactive tools that enable effective visual representation for scientists are needed. This is critical when scientists are manipulating voluminous datasets and especially when they need to explore datasets interactively to develop their hypotheses. In this paper, we present an interactive visual analytics framework, GeoLens. GeoLens provides fast and expressive interactions with voluminous geo-spatial datasets. We provide an expressive visual query evaluation scheme to support advanced interactive visual analytics technique, such as brushing and linking. To achieve this, we designed and developed the Geohash based image tile generation algorithm that automatically adjusts the range of data to access based on the minimum acceptable size of the image tile. In addition, we have also designed an autonomous histogram generation algorithm that generates histograms of user-defined data subsets that do not have pre-computed data properties. Using our approach, applications can generate histograms of datasets containing millions of data points with sub-second latency. The work builds on our visual query coordinating scheme that evaluates geo-spatial query and orchestrates data aggregation in a distributed storage environment while preserving data locality and minimizing data movements. This paper includes empirical benchmarks of our framework encompassing a billion-file dataset published by the National Climactic Data Center.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid increase of scientific data volumes, interactive tools that enable effective visual representation for scientists are needed. This is critical when scientists are manipulating voluminous datasets and especially when they need to explore datasets interactively to develop their hypotheses. In this paper, we present an interactive visual analytics framework, GeoLens. GeoLens provides fast and expressive interactions with voluminous geo-spatial datasets. We provide an expressive visual query evaluation scheme to support advanced interactive visual analytics technique, such as brushing and linking. To achieve this, we designed and developed the Geohash based image tile generation algorithm that automatically adjusts the range of data to access based on the minimum acceptable size of the image tile. In addition, we have also designed an autonomous histogram generation algorithm that generates histograms of user-defined data subsets that do not have pre-computed data properties. Using our approach, applications can generate histograms of datasets containing millions of data points with sub-second latency. The work builds on our visual query coordinating scheme that evaluates geo-spatial query and orchestrates data aggregation in a distributed storage environment while preserving data locality and minimizing data movements. This paper includes empirical benchmarks of our framework encompassing a billion-file dataset published by the National Climactic Data Center.", "fno": "1897a035", "keywords": [ "Geology", "Histograms", "Visual Analytics", "Data Visualization", "Geospatial Analysis", "Image Resolution", "Interactive Analysis", "Visual Analytics", "Distributed Hash Tables", "Geospatial Datasets" ], "authors": [ { "affiliation": null, "fullName": "Jared Koontz", "givenName": "Jared", "surname": "Koontz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthew Malensek", "givenName": "Matthew", "surname": "Malensek", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sangmi Pallickara", "givenName": "Sangmi", "surname": "Pallickara", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "35-44", "year": "2014", "issn": null, "isbn": "978-1-4799-1897-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1897a026", "articleId": "12OmNvonINa", "__typename": "AdjacentArticleType" }, "next": { "fno": "1897a045", "articleId": "12OmNvDI3Vg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400514", "title": "Big data exploration through visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400514/12OmNC3XhwY", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a668", "title": "Multi-sensor Visual Analytics Supported by Machine-Learning Models", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a668/12OmNC8dgdw", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccac/2014/5841/0/5841a073", "title": "A Framework for Managing Continuous Query Evaluations over Voluminous, Multidimensional Datasets", "doi": null, "abstractUrl": "/proceedings-article/iccac/2014/5841a073/12OmNqzcvHI", "parentPublication": { "id": "proceedings/iccac/2014/5841/0", "title": "2014 International Conference on Cloud and Autonomic Computing (ICCAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2011/0155/0/06092339", "title": "Enabling access to timeseries, geospatial data for on-demand visualization", "doi": null, "abstractUrl": "/proceedings-article/ldav/2011/06092339/12OmNwNOaNn", "parentPublication": { "id": "proceedings/ldav/2011/0155/0", "title": "IEEE Symposium on Large Data Analysis and Visualization (LDAV 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400544", "title": "Optimizing an SPT-tree for visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400544/12OmNwx3Q97", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042500", "title": "A multidimensional brush for scatterplot data analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042500/12OmNxR5UJf", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400538", "title": "Using visual analytics to detect problems in datasets collected from photo-sharing services", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400538/12OmNxecS2o", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2017/01/07027809", "title": "Fast, Ad Hoc Query Evaluations over Multidimensional Geospatial Datasets", "doi": null, "abstractUrl": "/journal/cc/2017/01/07027809/13rRUNvPLbK", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/08/mco2013080090", "title": "Bixplorer: Visual Analytics with Biclusters", "doi": null, "abstractUrl": "/magazine/co/2013/08/mco2013080090/13rRUwcAqvs", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a376", "title": "Supporting Iterative Virtual Reality Analytics Design and Evaluation by Systematic Generation of Surrogate Clustered Datasets", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a376/1yeCUnrXwiI", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9VchbY4Mw", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9WfD2dvkk", "doi": "10.1109/BIBM52615.2021.9669280", "title": "A Simplex Hypergraph Clustering Method for Detecting Higher-order Modules in Microbial Network", "normalizedTitle": "A Simplex Hypergraph Clustering Method for Detecting Higher-order Modules in Microbial Network", "abstract": "Microbial interactions are of great importance for maintaining ecological balance and regulating human health. Most of the previous studies focus on the paired relationships and pay less attention to the higher-order interaction relationships in the microbial communities. The hypergraph was applied to establish higher-order interaction networks among microbes in microbial communities and the result of hypergraph clustering depends on hyperedge weights. So, we adopt simplex and take advantage of its volume for reconstructing each hyperedge weight to improve hypergraph clustering. We proposed a novel hypergraph clustering algorithm based on simplex (HCBS) here to detect the higher-order interaction modules in the network in a manner of clustering. The HCBS algorithm achieves the hyperedge weight from a unique higher-order relationship by calculating the joint contribution of all nodes in each hyperedge. The maximum modularity was utilized to optimize the clustering number of the hypergraph in the paper. The experimental results illustrate that the HCBS algorithm emphasis the differences of hyperedge weights and it is very effective in detecting microbial higher-order modules.", "abstracts": [ { "abstractType": "Regular", "content": "Microbial interactions are of great importance for maintaining ecological balance and regulating human health. Most of the previous studies focus on the paired relationships and pay less attention to the higher-order interaction relationships in the microbial communities. The hypergraph was applied to establish higher-order interaction networks among microbes in microbial communities and the result of hypergraph clustering depends on hyperedge weights. So, we adopt simplex and take advantage of its volume for reconstructing each hyperedge weight to improve hypergraph clustering. We proposed a novel hypergraph clustering algorithm based on simplex (HCBS) here to detect the higher-order interaction modules in the network in a manner of clustering. The HCBS algorithm achieves the hyperedge weight from a unique higher-order relationship by calculating the joint contribution of all nodes in each hyperedge. The maximum modularity was utilized to optimize the clustering number of the hypergraph in the paper. The experimental results illustrate that the HCBS algorithm emphasis the differences of hyperedge weights and it is very effective in detecting microbial higher-order modules.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microbial interactions are of great importance for maintaining ecological balance and regulating human health. Most of the previous studies focus on the paired relationships and pay less attention to the higher-order interaction relationships in the microbial communities. The hypergraph was applied to establish higher-order interaction networks among microbes in microbial communities and the result of hypergraph clustering depends on hyperedge weights. So, we adopt simplex and take advantage of its volume for reconstructing each hyperedge weight to improve hypergraph clustering. We proposed a novel hypergraph clustering algorithm based on simplex (HCBS) here to detect the higher-order interaction modules in the network in a manner of clustering. The HCBS algorithm achieves the hyperedge weight from a unique higher-order relationship by calculating the joint contribution of all nodes in each hyperedge. The maximum modularity was utilized to optimize the clustering number of the hypergraph in the paper. The experimental results illustrate that the HCBS algorithm emphasis the differences of hyperedge weights and it is very effective in detecting microbial higher-order modules.", "fno": "09669280", "keywords": [ "Ecology", "Graph Theory", "Microorganisms", "Network Theory Graphs", "Optimisation", "Pattern Clustering", "Higher Order Interaction Modules", "Higher Order Relationship", "Microbial Higher Order Modules", "Simplex Hypergraph Clustering Method", "Microbial Network", "Microbial Interactions", "Ecological Balance", "Microbial Communities", "Higher Order Interaction Networks", "Human Health Regulation", "HCBS Algorithm", "Microbes", "Hyperedge Weight Reconstruction", "Clustering Number Optimization", "Correlation", "Conferences", "Clustering Methods", "Clustering Algorithms", "Biology", "Bioinformatics", "Simplex", "Higher Order Interactions Among Microbes", "Hyperedge Weights", "Microbial Higher Order Modules" ], "authors": [ { "affiliation": "Central China Normal University,Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning,Wuhan,PR China,430079", "fullName": "Ruilong Xiang", "givenName": "Ruilong", "surname": "Xiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Central China Normal University,Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning,Wuhan,PR China,430079", "fullName": "Lingling Fu", "givenName": "Lingling", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Central China Normal University,Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning,Wuhan,PR China,430079", "fullName": "Yue Wang", "givenName": "Yue", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Central China Normal University,Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning,Wuhan,PR China,430079", "fullName": "Han Sun", "givenName": "Han", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "Central China Normal University,Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning,Wuhan,PR China,430079", "fullName": "Xianjun Shen", "givenName": "Xianjun", "surname": "Shen", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "761-764", "year": "2021", "issn": null, "isbn": "978-1-6654-0126-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09669382", "articleId": "1A9VrBYOfwQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669365", "articleId": "1A9Wsmkr3SU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2013/1309/0/06732622", "title": "Detecting seasonal marine microbial communities with symmetrical non-negative matrix factorization", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732622/12OmNBRsVxi", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wism/2009/3817/0/3817a064", "title": "Hypergraph Partitioning for Community Discovery in Complex Network", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a064/12OmNCd2rs4", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2010/6984/0/05540012", "title": "Image retrieval via probabilistic hypergraph ranking", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2010/05540012/12OmNxEjXUo", "parentPublication": { "id": "proceedings/cvpr/2010/6984/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999205", "title": "Personalized microbial network inference via co-regularized spectral clustering", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999205/12OmNxiKs6g", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/09/07582510", "title": "Clustering with Hypergraphs: The Case for Large Hyperedges", "doi": null, "abstractUrl": "/journal/tp/2017/09/07582510/13rRUwghdau", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/06/ttp2011061266", "title": "Unsupervised Image Categorization by Hypergraph Partition", "doi": null, "abstractUrl": "/journal/tp/2011/06/ttp2011061266/13rRUygT7ak", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09795251", "title": "HGNN<sup>+</sup>: General Hypergraph Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2023/03/09795251/1Eb15xX3fHy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020643", "title": "SHCN: Self-supervised General Hypergraph Clustering Network", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020643/1KfRc1vo65y", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983390", "title": "Hypergraph Clustering Based on Intra-class Scatter Matrix for Mining Higher-order Microbial Module", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983390/1hguj9Y0KZy", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09502567", "title": "Identification of Functional Microbial Modules Through Network-Based Analysis of Meta-Microbial Features Using Matrix Factorization", "doi": null, "abstractUrl": "/journal/tb/2022/05/09502567/1vEWLXH6qMo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxYUQ", "title": "2007 IEEE 23rd International Conference on Data Engineering", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNBpEeUf", "doi": "10.1109/ICDE.2007.367922", "title": "Updating Recursive XML Views of Relations", "normalizedTitle": "Updating Recursive XML Views of Relations", "abstract": "This paper investigates the view update problem for XML views published from relational data. We consider (possibly) recursively defined XML views, compressed into DAGs and stored in relations. We provide new techniques to efficiently support XML view updates specified in terms of XFath expressions with recursion and complex filters. The interaction between XFath recursion and DAG compression of XML views makes the analysis of XML view updates intriguing. Furthermore, many issues are still open even for relational view updates, and need to be explored. In response to these, we revise the update semantics to accommodate XML side effects based on the semantics of XML views, and present efficient algorithms to translate XML updates to relational view updates. Moreover, we propose a mild condition on SPJ views, and show that under this condition the analysis of deletions on relational views becomes PTIME while the insertion analysis is NF-complete. Finally, we present an experimental study to verify the effectiveness of our techniques.", "abstracts": [ { "abstractType": "Regular", "content": "This paper investigates the view update problem for XML views published from relational data. We consider (possibly) recursively defined XML views, compressed into DAGs and stored in relations. We provide new techniques to efficiently support XML view updates specified in terms of XFath expressions with recursion and complex filters. The interaction between XFath recursion and DAG compression of XML views makes the analysis of XML view updates intriguing. Furthermore, many issues are still open even for relational view updates, and need to be explored. In response to these, we revise the update semantics to accommodate XML side effects based on the semantics of XML views, and present efficient algorithms to translate XML updates to relational view updates. Moreover, we propose a mild condition on SPJ views, and show that under this condition the analysis of deletions on relational views becomes PTIME while the insertion analysis is NF-complete. Finally, we present an experimental study to verify the effectiveness of our techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper investigates the view update problem for XML views published from relational data. We consider (possibly) recursively defined XML views, compressed into DAGs and stored in relations. We provide new techniques to efficiently support XML view updates specified in terms of XFath expressions with recursion and complex filters. The interaction between XFath recursion and DAG compression of XML views makes the analysis of XML view updates intriguing. Furthermore, many issues are still open even for relational view updates, and need to be explored. In response to these, we revise the update semantics to accommodate XML side effects based on the semantics of XML views, and present efficient algorithms to translate XML updates to relational view updates. Moreover, we propose a mild condition on SPJ views, and show that under this condition the analysis of deletions on relational views becomes PTIME while the insertion analysis is NF-complete. Finally, we present an experimental study to verify the effectiveness of our techniques.", "fno": "04221725", "keywords": [ "Computational Linguistics", "Relational Databases", "XML", "Recursive XML Relation Views", "X Fath Expressions", "Recursion Filters", "Complex Filters", "XML View Semantics", "XML", "Relational Databases", "Filters", "Asia", "Logic", "Proposals" ], "authors": [ { "affiliation": "Nanyang Technological University, kkchoi@ntu.edu.sg", "fullName": "Byron Choi", "givenName": "Byron", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "Univeristy of Edinburgh & Microsoft Research Asia, gao.cong@ed.ac.uk", "fullName": "Gao Cong", "givenName": "Gao", "surname": "Cong", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Edinburgh & Bell Laboratories, wenfei@inf.ed.ac.uk", "fullName": "Wenfei Fan", "givenName": "Wenfei", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Edinburgh, sviglas@inf.ed.ac.uk", "fullName": "Stratis D. Viglas", "givenName": "Stratis D.", "surname": "Viglas", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-04-01T00:00:00", "pubType": "proceedings", "pages": "766-775", "year": "2007", "issn": "1063-6382", "isbn": "1-4244-0802-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04221724", "articleId": "12OmNCbCrWO", "__typename": "AdjacentArticleType" }, "next": { "fno": "04221726", "articleId": "12OmNARRYrG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmlc/2003/7865/3/01259804", "title": "Self-maintainability of deletions of materialized views over XML data", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01259804/12OmNALlchi", "parentPublication": { "id": "proceedings/icmlc/2003/7865/3", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmpsac/1979/9999/0/00762530", "title": "The updatability of relational views based on functional dependencies", "doi": null, "abstractUrl": "/proceedings-article/cmpsac/1979/00762530/12OmNAtK4eK", "parentPublication": { "id": "proceedings/cmpsac/1979/9999/0", "title": "COMPSAC 79 - Proceedings. Computer Software and The IEEE Computer Society's Third International Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fgcn/2008/3431/2/04734238", "title": "A Vision: RDB-Based XML Security Models Considering Data Levels", "doi": null, "abstractUrl": "/proceedings-article/fgcn/2008/04734238/12OmNC4eSED", "parentPublication": { "id": "proceedings/fgcn/2008/3431/1", "title": "Future Generation Communication and Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwe/2008/3261/0/3261a332", "title": "JOXM: Java Object ? XML Mapping", "doi": null, "abstractUrl": "/proceedings-article/icwe/2008/3261a332/12OmNC8dgnF", "parentPublication": { "id": "proceedings/icwe/2008/3261/0", "title": "Web Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsacw/2012/4758/0/4758a433", "title": "Robust XML Watermarking Using Fuzzy Queries", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2012/4758a433/12OmNrAdsH2", "parentPublication": { "id": "proceedings/compsacw/2012/4758/0", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545b339", "title": "Query Rewrites with Views for XML in DB2", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545b339/12OmNrIJqu0", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2007/2909/3/290931095", "title": "Efficient XML query using Relational Data Model", "doi": null, "abstractUrl": "/proceedings-article/snpd/2007/290931095/12OmNyO8tW1", "parentPublication": { "id": "proceedings/snpd/2007/2909/3", "title": "Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nsw/2011/1049/0/06004657", "title": "A nested set approach for building recursive XML tree structures from relational databases", "doi": null, "abstractUrl": "/proceedings-article/nsw/2011/06004657/12OmNyUFfVU", "parentPublication": { "id": "proceedings/nsw/2011/1049/0", "title": "IEEE Network Science Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221715", "title": "Rewriting Regular XPath Queries on XML Views", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221715/12OmNzRHOSk", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2010/5445/0/05447896", "title": "Propagating updates through XML views using lineage tracing", "doi": null, "abstractUrl": "/proceedings-article/icde/2010/05447896/12OmNzUPpyl", "parentPublication": { "id": "proceedings/icde/2010/5445/0", "title": "2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAo45Cb", "title": "Proceedings. The 2005 IEEE/WIC/ACM International Conference on Web Intelligence", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNzhELfJ", "doi": "10.1109/WI.2005.103", "title": "Multi-Faceted Information Retrieval System for Large Scale Email Archives", "normalizedTitle": "Multi-Faceted Information Retrieval System for Large Scale Email Archives", "abstract": "We profile a system for search and analysis of large-scale email archives. The system builds around four facets: Content-based search engine, statistical topic model, automatically inferred social networks and time-series analysis. The facets correspond to the types of information available in email data. The presented system allows chaining or combining the facets flexibly. Results of one facet may be used as input to another, yielding remarkable combinatorial power. In information retrieval point of view, the system provides support for exploration, approximate textual searches and data visualization. We present some experimental results based on a large real-world email corpus.", "abstracts": [ { "abstractType": "Regular", "content": "We profile a system for search and analysis of large-scale email archives. The system builds around four facets: Content-based search engine, statistical topic model, automatically inferred social networks and time-series analysis. The facets correspond to the types of information available in email data. The presented system allows chaining or combining the facets flexibly. Results of one facet may be used as input to another, yielding remarkable combinatorial power. In information retrieval point of view, the system provides support for exploration, approximate textual searches and data visualization. We present some experimental results based on a large real-world email corpus.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We profile a system for search and analysis of large-scale email archives. The system builds around four facets: Content-based search engine, statistical topic model, automatically inferred social networks and time-series analysis. The facets correspond to the types of information available in email data. The presented system allows chaining or combining the facets flexibly. Results of one facet may be used as input to another, yielding remarkable combinatorial power. In information retrieval point of view, the system provides support for exploration, approximate textual searches and data visualization. We present some experimental results based on a large real-world email corpus.", "fno": "24150557", "keywords": [], "authors": [ { "affiliation": "Helsinki Institute for Information Technology", "fullName": "Jukka Perkiö", "givenName": "Jukka", "surname": "Perkiö", "__typename": "ArticleAuthorType" }, { "affiliation": "Helsinki Institute for Information Technology", "fullName": "Ville Tuulos", "givenName": "Ville", "surname": "Tuulos", "__typename": "ArticleAuthorType" }, { "affiliation": "Helsinki Institute for Information Technology", "fullName": "Wray Buntine", "givenName": "Wray", "surname": "Buntine", "__typename": "ArticleAuthorType" }, { "affiliation": "Nokia Research Center", "fullName": "Henry Tirri", "givenName": "Henry", "surname": "Tirri", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-09-01T00:00:00", "pubType": "proceedings", "pages": "557-564", "year": "2005", "issn": null, "isbn": "0-7695-2415-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24150550", "articleId": "12OmNwF0C3Z", "__typename": "AdjacentArticleType" }, "next": { "fno": "24150565", "articleId": "12OmNznkJT7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/1999/0001/2/00012036", "title": "Interactive Document Retrieval using Faceted Terminological Feedback", "doi": null, "abstractUrl": "/proceedings-article/hicss/1999/00012036/12OmNASraD6", "parentPublication": { "id": "proceedings/hicss/1999/0001/2", "title": "Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2012/4794/0/4794a221", "title": "Faceted Navigation on Text", "doi": null, "abstractUrl": "/proceedings-article/skg/2012/4794a221/12OmNCeK2da", "parentPublication": { "id": "proceedings/skg/2012/4794/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363859", "title": "Scalable community discovery from multi-faceted graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363859/12OmNrAdsvW", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscloud/2017/6644/0/6644a070", "title": "Research on Faceted Search Method for Water Data Catalogue Service", "doi": null, "abstractUrl": "/proceedings-article/cscloud/2017/6644a070/12OmNweBUIF", "parentPublication": { "id": "proceedings/cscloud/2017/6644/0", "title": "2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2005/2378/0/23780531", "title": "Secure email-based peer to peer information retrieval", "doi": null, "abstractUrl": "/proceedings-article/cw/2005/23780531/12OmNwoPtvG", "parentPublication": { "id": "proceedings/cw/2005/2378/0", "title": "2005 International Conference on Cyberworlds (CW'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbmi/2009/3662/0/3662a249", "title": "Picadomo: Faceted Image Browsing for Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/cbmi/2009/3662a249/12OmNxA3Z6b", "parentPublication": { "id": "proceedings/cbmi/2009/3662/0", "title": "Content-Based Multimedia Indexing, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682162", "title": "Faceted Search in Business Intelligence on the Cloud", "doi": null, "abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682162/12OmNyvY9CW", "parentPublication": { "id": "proceedings/greencom-ithingscpscom/2013/5046/0", "title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/2005/2461/0/24610547", "title": "Securing Email Archives through User Modeling", "doi": null, "abstractUrl": "/proceedings-article/acsac/2005/24610547/12OmNzBOhM9", "parentPublication": { "id": "proceedings/acsac/2005/2461/0", "title": "Computer Security Applications Conference, Annual", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/05/07815437", "title": "Dynamic Facet Ordering for Faceted Product Search Engines", "doi": null, "abstractUrl": "/journal/tk/2017/05/07815437/13rRUxd2aZt", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4025", "title": "Boosting Video Representation Learning with Multi-Faceted Integration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4025/1yeLApNqukg", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kaMxDONP0Y", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kaMBtV8mIg", "doi": "10.1109/ICDE48307.2020.00171", "title": "Visualization Systems for Linked Datasets", "normalizedTitle": "Visualization Systems for Linked Datasets", "abstract": "The wide adoption of the RDF data model, as well as the Linked Open Data initiative, have made available large linked datasets that have the potential to offer invaluable knowledge. Accessing, evaluating and understanding these datasets as published, though, requires extensive training and experience in the field of the Semantic Web, making these valuable sources of information inaccessible to a wider audience. In the recent years, there have been many efforts to create systems that allow the visualization and exploration of this information. Some of there systems rely on techniques that allow them to limit the volume of the displayed information, by providing aggregated, filtered or summarized access to the datasets while others initialize the exploration of the dataset based on actions performed by the users, such as keyword searches and queries. The underlying technique is key for the sustainability of the system, the definition of the requirements that the input must comply with, the datasets that can be visualized as well as the visualization types provided. We present here a survey on these techniques, their strengths and weaknesses as well as the datasets that they can support. The survey will provide the reader with a deep understanding of the challenges regarding the visualization of large linked datasets, a categorization of the developed techniques to resolve them as well as an overview of the available systems and their functionalities.", "abstracts": [ { "abstractType": "Regular", "content": "The wide adoption of the RDF data model, as well as the Linked Open Data initiative, have made available large linked datasets that have the potential to offer invaluable knowledge. Accessing, evaluating and understanding these datasets as published, though, requires extensive training and experience in the field of the Semantic Web, making these valuable sources of information inaccessible to a wider audience. In the recent years, there have been many efforts to create systems that allow the visualization and exploration of this information. Some of there systems rely on techniques that allow them to limit the volume of the displayed information, by providing aggregated, filtered or summarized access to the datasets while others initialize the exploration of the dataset based on actions performed by the users, such as keyword searches and queries. The underlying technique is key for the sustainability of the system, the definition of the requirements that the input must comply with, the datasets that can be visualized as well as the visualization types provided. We present here a survey on these techniques, their strengths and weaknesses as well as the datasets that they can support. The survey will provide the reader with a deep understanding of the challenges regarding the visualization of large linked datasets, a categorization of the developed techniques to resolve them as well as an overview of the available systems and their functionalities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The wide adoption of the RDF data model, as well as the Linked Open Data initiative, have made available large linked datasets that have the potential to offer invaluable knowledge. Accessing, evaluating and understanding these datasets as published, though, requires extensive training and experience in the field of the Semantic Web, making these valuable sources of information inaccessible to a wider audience. In the recent years, there have been many efforts to create systems that allow the visualization and exploration of this information. Some of there systems rely on techniques that allow them to limit the volume of the displayed information, by providing aggregated, filtered or summarized access to the datasets while others initialize the exploration of the dataset based on actions performed by the users, such as keyword searches and queries. The underlying technique is key for the sustainability of the system, the definition of the requirements that the input must comply with, the datasets that can be visualized as well as the visualization types provided. We present here a survey on these techniques, their strengths and weaknesses as well as the datasets that they can support. The survey will provide the reader with a deep understanding of the challenges regarding the visualization of large linked datasets, a categorization of the developed techniques to resolve them as well as an overview of the available systems and their functionalities.", "fno": "09101621", "keywords": [ "Data Models", "Data Visualisation", "Linked Data", "Semantic Web", "Visualization Systems", "RDF Data Model", "Linked Open Data", "Data Visualization", "Semantics", "Navigation", "Resource Description Framework", "Tools", "Linked Data", "Browsers" ], "authors": [ { "affiliation": "National Technological University of Athens,School of ECE,Athens,Greece", "fullName": "Maria Krommyda", "givenName": "Maria", "surname": "Krommyda", "__typename": "ArticleAuthorType" }, { "affiliation": "National Technological University of Athens,School of ECE,Athens,Greece", "fullName": "Verena Kantere", "givenName": "Verena", "surname": "Kantere", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "1790-1793", "year": "2020", "issn": null, "isbn": "978-1-7281-2903-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09101537", "articleId": "1kaMPzFAjIY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09101181", "articleId": "1kaMIt5A3qo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2012/4752/0/4752a376", "title": "Linked Context: A Linked Data Approach to Personalised Service Provisioning", "doi": null, "abstractUrl": "/proceedings-article/icws/2012/4752a376/12OmNASILZF", "parentPublication": { "id": "proceedings/icws/2012/4752/0", "title": "2012 IEEE 19th International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/inciscos/2017/2644/0/2644a241", "title": "Methodological Guidelines for Publishing Library Data as Linked Data", "doi": null, "abstractUrl": "/proceedings-article/inciscos/2017/2644a241/12OmNBgz4BS", "parentPublication": { "id": "proceedings/inciscos/2017/2644/0", "title": "2017 International Conference on Information Systems and Computer Science (INCISCOS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2013/3218/0/06778639", "title": "Visualizing Linked Data with JavaScript", "doi": null, "abstractUrl": "/proceedings-article/wisa/2013/06778639/12OmNCzsKI9", "parentPublication": { "id": "proceedings/wisa/2013/3218/0", "title": "2013 10th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2018/4408/0/440801a320", "title": "Building Linked Data Agents for Mobility Applications", "doi": null, "abstractUrl": "/proceedings-article/icsc/2018/440801a320/12OmNxEBzg2", "parentPublication": { "id": "proceedings/icsc/2018/4408/0", "title": "2018 IEEE 12th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2013/04/mic2013040072", "title": "Linked Data in Government", "doi": null, "abstractUrl": "/magazine/ic/2013/04/mic2013040072/13rRUxASury", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2012/01/mic2012010024", "title": "Querying Heterogeneous Datasets on the Linked Data Web: Challenges, Approaches, and Trends", "doi": null, "abstractUrl": "/magazine/ic/2012/01/mic2012010024/13rRUxjyX0n", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/1991/03/s3044", "title": "Linked-List Visualization for Debugging", "doi": null, "abstractUrl": "/magazine/so/1991/03/s3044/13rRUy3xY5W", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2018/9120/0/08612842", "title": "Trends in Linked Data-Based Educational Studies: A Review of Contributions in SSCI Journals", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2018/08612842/17D45WK5Asp", "parentPublication": { "id": "proceedings/aiccsa/2018/9120/0", "title": "2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2018/7449/0/744900a189", "title": "A Linked Data Browser with Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ictai/2018/744900a189/17D45XdBRQz", "parentPublication": { "id": "proceedings/ictai/2018/7449/0", "title": "2018 IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005491", "title": "Automated interpretability of linked data ontologies: : an evaluation within the cultural heritage domain", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005491/1hJs92WdvCo", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yLPftojvJm", "title": "2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "acronym": "icnisc", "groupId": "1807445", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yLPr021RjW", "doi": "10.1109/ICNISC54316.2021.00102", "title": "A Numerical Real Time Web Tracking and Scrapping Strategy Applied to Analysing COVID-19 Datasets", "normalizedTitle": "A Numerical Real Time Web Tracking and Scrapping Strategy Applied to Analysing COVID-19 Datasets", "abstract": "With the huge amount of data collected from the web, it is hard to manually analyze and extract useful incites from tables, matrices, or rows of data. Therefore, we need a way to represent these data (maps or graphs) to analyze/interpret them. Data visualization makes it easier to identify trends, patterns, and outliers with large datasets. Data Analytics is used to analyze raw data to make conclusions about the information. In this paper, we tackled web scrapping strategies to get COVID-19 data from the web, and then we went through some data analysis and exploration using EDA.", "abstracts": [ { "abstractType": "Regular", "content": "With the huge amount of data collected from the web, it is hard to manually analyze and extract useful incites from tables, matrices, or rows of data. Therefore, we need a way to represent these data (maps or graphs) to analyze/interpret them. Data visualization makes it easier to identify trends, patterns, and outliers with large datasets. Data Analytics is used to analyze raw data to make conclusions about the information. In this paper, we tackled web scrapping strategies to get COVID-19 data from the web, and then we went through some data analysis and exploration using EDA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the huge amount of data collected from the web, it is hard to manually analyze and extract useful incites from tables, matrices, or rows of data. Therefore, we need a way to represent these data (maps or graphs) to analyze/interpret them. Data visualization makes it easier to identify trends, patterns, and outliers with large datasets. Data Analytics is used to analyze raw data to make conclusions about the information. In this paper, we tackled web scrapping strategies to get COVID-19 data from the web, and then we went through some data analysis and exploration using EDA.", "fno": "023200a536", "keywords": [ "Data Analysis", "Data Mining", "Data Visualisation", "Numerical Real Time Web Tracking", "Scrapping Strategy Applied", "Analysing COVID 19 Datasets", "Useful Incites", "Maps", "Data Visualization", "Data Analytics", "Raw Data", "COVID 19 Data", "Data Analysis", "COVID 19", "Knowledge Engineering", "Data Analysis", "Correlation", "Decision Making", "Data Visualization", "Market Research", "Object Tracking", "Data Visualization", "Patterns", "Web Scraping", "EDA" ], "authors": [ { "affiliation": "Mohammed V University in Rabat,Faculty of Sciences,Computer Sciences Department,Morocco", "fullName": "Abderrahmane Ez-Zahout", "givenName": "Abderrahmane", "surname": "Ez-Zahout", "__typename": "ArticleAuthorType" }, { "affiliation": "Mohammed V University in Rabat,Faculty of Letters and Human Sciences,Communication Department,Morocco", "fullName": "Said Chakouk", "givenName": "Said", "surname": "Chakouk", "__typename": "ArticleAuthorType" }, { "affiliation": "Al Akhawayn University in Ifrane,School of Science and Engineering,Morocco", "fullName": "Salwa Mitouilli", "givenName": "Salwa", "surname": "Mitouilli", "__typename": "ArticleAuthorType" }, { "affiliation": "Al Akhawayn University in Ifrane,School of Science and Engineering,Morocco", "fullName": "Mohamed Amine El Bouni", "givenName": "Mohamed Amine", "surname": "El Bouni", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnisc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "536-542", "year": "2021", "issn": null, "isbn": "978-1-6654-0232-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "023200a532", "articleId": "1yLPALVXoyc", "__typename": "AdjacentArticleType" }, "next": { "fno": "023200a543", "articleId": "1yLPsC15CYU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671457", "title": "Compliance with Stay-at-Home Orders During COVID-19", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671457/1A8gLAuH1Oo", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a878", "title": "Analysis of User Behavior in a C2C Platform during COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a878/1AjSHYgBD1e", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a985", "title": "Analyzing COVID-19 Epidemiological Data", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a985/1BLnLffIJTa", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2022/6603/0/660300a178", "title": "COVID-19 Vaccine Infodemiology using Unsupervised Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/iri/2022/660300a178/1GvdP9yNhkI", "parentPublication": { "id": "proceedings/iri/2022/6603/0", "title": "2022 IEEE 23rd International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0/764700a062", "title": "Visual Analysis and Exploration of COVID-19 Based on Multi-source Heterogeneous Data", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2020/764700a062/1pVHgLX46YM", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2020/7647/0", "title": "2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a593", "title": "Interactive Data Driven Visualization for COVID-19 with Trends, Analytics and Forecasting", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a593/1rSR8XpoVtC", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a415", "title": "Big Data Visualization and Visual Analytics of COVID-19 Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a415/1rSRdimCgJG", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seh/2021/4458/0/445800a005", "title": "Software Development During COVID-19 Pandemic: an Analysis of Stack Overflow and GitHub", "doi": null, "abstractUrl": "/proceedings-article/seh/2021/445800a005/1v2QfuH0WyI", "parentPublication": { "id": "proceedings/seh/2021/4458/0", "title": "2021 IEEE/ACM 3rd International Workshop on Software Engineering for Healthcare (SEH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ser&ip/2021/4476/0/447600a018", "title": "Globally Distributed Development during COVID-19", "doi": null, "abstractUrl": "/proceedings-article/ser&ip/2021/447600a018/1v2QhX0edP2", "parentPublication": { "id": "proceedings/ser&ip/2021/4476/0", "title": "2021 IEEE/ACM 8th International Workshop on Software Engineering Research and Industrial Practice (SER&IP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ser&ip/2021/4476/0/447600a002", "title": "Leveraging Data Scientists and Business Expectations During the COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/ser&ip/2021/447600a002/1v2QiM8iqty", "parentPublication": { "id": "proceedings/ser&ip/2021/4476/0", "title": "2021 IEEE/ACM 8th International Workshop on Software Engineering Research and Industrial Practice (SER&IP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrF2DI6", "title": "2011 IEEE Symposium on Biological Data Visualization (BioVis).", "acronym": "biovis", "groupId": "1800574", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNqN6R57", "doi": "10.1109/BioVis.2011.6094050", "title": "A visual analysis system for metabolomics data", "normalizedTitle": "A visual analysis system for metabolomics data", "abstract": "When analyzing metabolomics data, cancer care researchers are searching for differences between known healthy samples and unhealthy samples. By analyzing and understanding these differences, researchers hope to identify cancer biomarkers. In this work we present a novel system that enables interactive comparative visualization and analysis of metabolomics data obtained by two-dimensional gas chromatography-mass spectrometry (GCxGC-MS). Our system allows the user to produce, and interactively explore, visualizations of multiple GCxGC-MS data sets, thereby allowing a user to discover differences and features in real time. Our system provides statistical support in the form of mean and standard deviation calculations to aid users in identifying meaningful differences between sample groups. We combine these with multiform, linked visualizations in order to provide researchers with a powerful new tool for GCxGC-MS exploration and bio-marker discovery.", "abstracts": [ { "abstractType": "Regular", "content": "When analyzing metabolomics data, cancer care researchers are searching for differences between known healthy samples and unhealthy samples. By analyzing and understanding these differences, researchers hope to identify cancer biomarkers. In this work we present a novel system that enables interactive comparative visualization and analysis of metabolomics data obtained by two-dimensional gas chromatography-mass spectrometry (GCxGC-MS). Our system allows the user to produce, and interactively explore, visualizations of multiple GCxGC-MS data sets, thereby allowing a user to discover differences and features in real time. Our system provides statistical support in the form of mean and standard deviation calculations to aid users in identifying meaningful differences between sample groups. We combine these with multiform, linked visualizations in order to provide researchers with a powerful new tool for GCxGC-MS exploration and bio-marker discovery.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "When analyzing metabolomics data, cancer care researchers are searching for differences between known healthy samples and unhealthy samples. By analyzing and understanding these differences, researchers hope to identify cancer biomarkers. In this work we present a novel system that enables interactive comparative visualization and analysis of metabolomics data obtained by two-dimensional gas chromatography-mass spectrometry (GCxGC-MS). Our system allows the user to produce, and interactively explore, visualizations of multiple GCxGC-MS data sets, thereby allowing a user to discover differences and features in real time. Our system provides statistical support in the form of mean and standard deviation calculations to aid users in identifying meaningful differences between sample groups. We combine these with multiform, linked visualizations in order to provide researchers with a powerful new tool for GCxGC-MS exploration and bio-marker discovery.", "fno": "071078livengoo", "keywords": [ "Mass Spectra", "Biology Computing", "Cancer", "Chromatography", "Data Analysis", "Data Visualisation", "Biomarker Discovery", "Visual Analysis System", "Metabolomics Data Analysis", "Cancer Care Researchers", "Unhealthy Samples", "Cancer Biomarkers", "Interactive Comparative Visualization", "Two Dimensional Gas Chromatography", "Mass Spectrometry", "Statistical Support", "Standard Deviation Calculations", "G Cx GC MS Exploration", "Image Color Analysis", "Data Visualization", "Lenses", "Cancer", "Visualization", "Rendering Computer Graphics", "Biomarkers", "GCXGC MS", "Metabolomics", "Visual Analysis", "TIC" ], "authors": [ { "affiliation": null, "fullName": "P. Livengood", "givenName": "P.", "surname": "Livengood", "__typename": "ArticleAuthorType" }, { "affiliation": "Arizona State Univ., Tempe, AZ, USA", "fullName": "R. Maciejewski", "givenName": "R.", "surname": "Maciejewski", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Lab. of CAD&CG, Zhejiang Univ., Hangzhou, China", "fullName": "Wei Chen", "givenName": null, "surname": "Wei Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D. S. Ebert", "givenName": "D. S.", "surname": "Ebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "biovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "71-78", "year": "2011", "issn": null, "isbn": "978-1-4673-0003-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "063069vehlow2", "articleId": "12OmNzZWbBO", "__typename": "AdjacentArticleType" }, "next": { "fno": "079086mayerich", "articleId": "12OmNAhOUMH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cnsi/2011/4417/0/4417a281", "title": "Exhaled Breath Analysis of Lung Cancer Patients Using Metal Oxide Sensor", "doi": null, "abstractUrl": "/proceedings-article/cnsi/2011/4417a281/12OmNAnMuEw", "parentPublication": { "id": "proceedings/cnsi/2011/4417/0", "title": "Computers, Networks, Systems and Industrial Engineering, ACIS/JNU International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470250", "title": "A data aggregation framework for cancer subtype discovery", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470250/12OmNqEAT6i", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fbie/2008/3561/0/3561a030", "title": "Ovarian Cancer Mass Spectrometry Data Analysis Based on ICA Algorithm", "doi": null, "abstractUrl": "/proceedings-article/fbie/2008/3561a030/12OmNrGsDrB", "parentPublication": { "id": "proceedings/fbie/2008/3561/0", "title": "2008 International Seminar on Future Biomedical Information Engineering (FBIE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2017/4662/0/08388679", "title": "An ensemble feature selection method for biomarker discovery", "doi": null, "abstractUrl": "/proceedings-article/isspit/2017/08388679/12OmNyOq52k", "parentPublication": { "id": "proceedings/isspit/2017/4662/0", "title": "2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822519", "title": "Metabolomic data deconvolution using probabilistic purification models", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822519/12OmNzdGnsL", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07505642", "title": "Strategies for Comparing Metabolic Profiles: Implications for the Inference of Biochemical Mechanisms from Metabolomics Data", "doi": null, "abstractUrl": "/journal/tb/2017/06/07505642/13rRUwbaqKg", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/02/08462788", "title": "Bounded Fuzzy Possibilistic Method Reveals Information about Lung Cancer through Analysis of Metabolomics", "doi": null, "abstractUrl": "/journal/tb/2020/02/08462788/13w3lpFNFE4", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669418", "title": "An Innovative Perspective on Metabolomics Data Analysis in Biomedical Research Using Concept Drift Detection", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669418/1A9WyTk3i80", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2021/0679/0/067900a439", "title": "Exploration of the mechanism of action of stabbing and releasing blood combined with auricular acupressure in the treatment of chronic urticaria", "doi": null, "abstractUrl": "/proceedings-article/itme/2021/067900a439/1CATzac5O6I", "parentPublication": { "id": "proceedings/itme/2021/0679/0", "title": "2021 11th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400b647", "title": "Image Classification of High-Performance Liquid Chromatography Chromatograms with Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400b647/1uGYXUcpeta", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBkfy", "title": "1991 Proceeding Visualization", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEjY9n", "doi": "10.1109/VISUAL.1991.175797", "title": "The visual comparison of three sequences", "normalizedTitle": "The visual comparison of three sequences", "abstract": "A method of visual comparison is described, that provides the scientist with a unique tool to study the qualitative relationships between three sequences of numbers or symbols. The program displays a 3D shape containing the sequence similarities and differences, which manifest themselves as simple geometric shapes and colors that a human observer can easily detect and classify. The method presents all possible correlations to the user, giving it a considerable advantage over existing sequence comparison tools that only search for a programmed subset of all possible correlations. Thus, using this technique, researchers may detect sequence similarities that other analytic methods might completely overlook. The program can also filter out undesirable or insignificant correlations. The technique is easily adapted to a wide range of applications.<>", "abstracts": [ { "abstractType": "Regular", "content": "A method of visual comparison is described, that provides the scientist with a unique tool to study the qualitative relationships between three sequences of numbers or symbols. The program displays a 3D shape containing the sequence similarities and differences, which manifest themselves as simple geometric shapes and colors that a human observer can easily detect and classify. The method presents all possible correlations to the user, giving it a considerable advantage over existing sequence comparison tools that only search for a programmed subset of all possible correlations. Thus, using this technique, researchers may detect sequence similarities that other analytic methods might completely overlook. The program can also filter out undesirable or insignificant correlations. The technique is easily adapted to a wide range of applications.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A method of visual comparison is described, that provides the scientist with a unique tool to study the qualitative relationships between three sequences of numbers or symbols. The program displays a 3D shape containing the sequence similarities and differences, which manifest themselves as simple geometric shapes and colors that a human observer can easily detect and classify. The method presents all possible correlations to the user, giving it a considerable advantage over existing sequence comparison tools that only search for a programmed subset of all possible correlations. Thus, using this technique, researchers may detect sequence similarities that other analytic methods might completely overlook. The program can also filter out undesirable or insignificant correlations. The technique is easily adapted to a wide range of applications.", "fno": "00175797", "keywords": [ "Computer Graphics", "Series Mathematics", "Visual Sequence Comparison", "Sequence Differences", "Qualitative Relationships", "Numbers", "Symbols", "3 D Shape", "Geometric Shapes", "Colors", "Correlations", "Sequence Similarities", "Speech Analysis", "Image Analysis", "Image Sequence Analysis", "Signal Analysis", "Performance Analysis", "Computer Science", "Shape", "Humans", "DNA", "Biomedical Signal Processing" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Worchester Polytech. Inst., MA, USA", "fullName": "K.P. Hinckley", "givenName": "K.P.", "surname": "Hinckley", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Worchester Polytech. Inst., MA, USA", "fullName": "M.O. Ward", "givenName": "M.O.", "surname": "Ward", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "179,180,181,182,183,184,185,186", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00175796", "articleId": "12OmNC2OSNs", "__typename": "AdjacentArticleType" }, "next": { "fno": "00175799", "articleId": "12OmNxbW4TC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sc/1988/8923/0/00074127", "title": "Study of protein sequence comparison metrics on the Connection Machine CM-2", "doi": null, "abstractUrl": "/proceedings-article/sc/1988/00074127/12OmNCxbXFt", "parentPublication": { "id": "proceedings/sc/1988/8923/0", "title": "Proceedings of the 1988 ACM/IEEE conference on Supercomputing vol. 2", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/superc/1988/8923/0/00074127", "title": "Study of protein sequence comparison metrics on the Connection Machine CM-2", "doi": null, "abstractUrl": "/proceedings-article/superc/1988/00074127/12OmNqG0SOw", "parentPublication": { "id": "proceedings/superc/1988/8923/0", "title": "Proceedings Supercomputing Vol.II: Science and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1988/0878/0/00028453", "title": "The theorem analysis on optical flow estimation from three frames of image sequences", "doi": null, "abstractUrl": "/proceedings-article/icpr/1988/00028453/12OmNsbY6Ml", "parentPublication": { "id": "proceedings/icpr/1988/0878/0", "title": "9th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323935", "title": "Integration of transitory image sequences", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323935/12OmNwKGAqw", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmcs/1994/5530/0/00292430", "title": "IDIC: assembling video sequences from story plans and content annotations", "doi": null, "abstractUrl": "/proceedings-article/mmcs/1994/00292430/12OmNxeM47w", "parentPublication": { "id": "proceedings/mmcs/1994/5530/0", "title": "Proceedings of IEEE International Conference on Multimedia Computing and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/1995/7109/0/71090137", "title": "Parallel Sequence Comparison and Alignment", "doi": null, "abstractUrl": "/proceedings-article/asap/1995/71090137/12OmNxwENtc", "parentPublication": { "id": "proceedings/asap/1995/7109/0", "title": "Proceedings The International Conference on Application Specific Array Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2010/4258/0/4258a884", "title": "Image Encryption Algorithm Based on DNA Sequences for the Big Image", "doi": null, "abstractUrl": "/proceedings-article/mines/2010/4258a884/12OmNzJbR3S", "parentPublication": { "id": "proceedings/mines/2010/4258/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740190", "title": "Sequence comparison on a cluster of workstations using the PVM system", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740190/12OmNzaQoge", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122090", "title": "VAICo: Visual Analysis for Image Comparison", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122090/13rRUyoPSP5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805450", "title": "STBins: Visual Tracking and Comparison of Multiple Data Sequences Using Temporal Binning", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805450/1cG4KTNvioM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fTgF9x78sw", "title": "2019 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fTgG02CBgs", "doi": "10.1109/VISUAL.2019.8933778", "title": "Visual Analysis of the Time Management of Learning Multiple Courses in Online Learning Environment", "normalizedTitle": "Visual Analysis of the Time Management of Learning Multiple Courses in Online Learning Environment", "abstract": "Self-paced online learning not only provides the opportunities of learning anytime but also chanllenges students' time management, especially in the context of learning multiple courses at same time. The inappropriate scheduling of multiple courses may affect student engagement and learning performance, thus how to arrange the study time of multiple courses is a concern of both instructors and students. Existing studies related to student engagement and time management in online learning mainly focus on providing self-regulated learning strategies and evaluating learning performance. However, these methods have limited abilities to gain intuitive understanding of the time management of multi-course learning. To address this issue, we present LearnerVis to help users analyze how students schedule their multi-course learning. LearnerVis visualize the temporal features of learning process, and it enables users to customize student groups to compare the differences in student engagement and time management. A case study is conducted to demonstrate the usefulness of the system with real-word dataset.", "abstracts": [ { "abstractType": "Regular", "content": "Self-paced online learning not only provides the opportunities of learning anytime but also chanllenges students' time management, especially in the context of learning multiple courses at same time. The inappropriate scheduling of multiple courses may affect student engagement and learning performance, thus how to arrange the study time of multiple courses is a concern of both instructors and students. Existing studies related to student engagement and time management in online learning mainly focus on providing self-regulated learning strategies and evaluating learning performance. However, these methods have limited abilities to gain intuitive understanding of the time management of multi-course learning. To address this issue, we present LearnerVis to help users analyze how students schedule their multi-course learning. LearnerVis visualize the temporal features of learning process, and it enables users to customize student groups to compare the differences in student engagement and time management. A case study is conducted to demonstrate the usefulness of the system with real-word dataset.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Self-paced online learning not only provides the opportunities of learning anytime but also chanllenges students' time management, especially in the context of learning multiple courses at same time. The inappropriate scheduling of multiple courses may affect student engagement and learning performance, thus how to arrange the study time of multiple courses is a concern of both instructors and students. Existing studies related to student engagement and time management in online learning mainly focus on providing self-regulated learning strategies and evaluating learning performance. However, these methods have limited abilities to gain intuitive understanding of the time management of multi-course learning. To address this issue, we present LearnerVis to help users analyze how students schedule their multi-course learning. LearnerVis visualize the temporal features of learning process, and it enables users to customize student groups to compare the differences in student engagement and time management. A case study is conducted to demonstrate the usefulness of the system with real-word dataset.", "fno": "08933778", "keywords": [ "Data Visualisation", "Educational Courses", "Internet", "Learning Management Systems", "Time Management", "Student Engagement", "Study Time", "Self Regulated Learning Strategies", "Multicourse Learning", "Learning Performance Evaluation", "Visual Analysis", "Self Paced Online Learning", "Learner Vis", "Task Analysis", "Color", "Schedules", "Time Measurement", "Visual Analytics", "Tools", "Human Centered Computing", "Visualization", "Visual Analytics Applied Computing", "E Learning" ], "authors": [ { "affiliation": "Xi’an Jiaotong University,Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D", "fullName": "Huan He", "givenName": "Huan", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi’an Jiaotong University,School of Continuing Education", "fullName": "Bo Dong", "givenName": "Bo", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi’an Jiaotong University,Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D", "fullName": "Qinghua Zheng", "givenName": "Qinghua", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi’an Jiaotong University,School of Management", "fullName": "Dehai Di", "givenName": "Dehai", "surname": "Di", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi’an Jiaotong University,Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D", "fullName": "Yating Lin", "givenName": "Yating", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "56-60", "year": "2019", "issn": null, "isbn": "978-1-7281-4941-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08933598", "articleId": "1fTgGsmOP1C", "__typename": "AdjacentArticleType" }, "next": { "fno": "08933537", "articleId": "1fTgJqwvR4I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccee/2009/3925/1/3925a586", "title": "University Student Perceptions of Effective E-learning Strategies Instructor Used in Blended Courses", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a586/12OmNrJROZz", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367a091", "title": "Supporting Metacognition in Online, Professional Graduate Courses", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367a091/12OmNwpXRX2", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156373", "title": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156373/12OmNxEBzlW", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2014/3922/0/07044041", "title": "On using the cloud to support online courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2014/07044041/12OmNzlD9fi", "parentPublication": { "id": "proceedings/fie/2014/3922/0", "title": "2014 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/10/07346501", "title": "PeakVizor: Visual Analytics of Peaks in Video Clickstreams from Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2016/10/07346501/13rRUILtJme", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08477163", "title": "ViSeq: Visual Analytics of Learning Sequence in Massive Open Online Courses", "doi": null, "abstractUrl": "/journal/tg/2020/03/08477163/14gwrq0I1sk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658790", "title": "Visual Analytic Workflow to Understand Students&#x2019; Performance in Computer Science Courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658790/18j9pOuyFt6", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802383", "title": "VUSphere: Visual Analysis of Video Utilization in Online Distance Education", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802383/1cJ6Yd3Hh6g", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028644", "title": "Student Engagement in Active Learning Software Engineering Courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028644/1iffckbjdfi", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2021/06/09547834", "title": "Visualization Design Sprints for Online and On-Campus Courses", "doi": null, "abstractUrl": "/magazine/cg/2021/06/09547834/1x9TPHRuq9G", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tzywdsEsQo", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "acronym": "icmcce", "groupId": "1824464", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1tzyxOBcrrq", "doi": "10.1109/ICMCCE51767.2020.00382", "title": "An Improved Image Entropy Algorithm Suitable for Digital Painting Style", "normalizedTitle": "An Improved Image Entropy Algorithm Suitable for Digital Painting Style", "abstract": "Traditional painting style classification method based on image entropy cannot be directly applied to the classification of digital painting style. After analyzing the similarities and differences between the two types of works in the existing literature, this paper sets additional saturation weighting to improve the previous color entropy calculation method and eliminates the contour entropy calculation to describe the digital painting image style better. The experimental results show that this method can classify the styles of digital paintings more accurately.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional painting style classification method based on image entropy cannot be directly applied to the classification of digital painting style. After analyzing the similarities and differences between the two types of works in the existing literature, this paper sets additional saturation weighting to improve the previous color entropy calculation method and eliminates the contour entropy calculation to describe the digital painting image style better. The experimental results show that this method can classify the styles of digital paintings more accurately.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional painting style classification method based on image entropy cannot be directly applied to the classification of digital painting style. After analyzing the similarities and differences between the two types of works in the existing literature, this paper sets additional saturation weighting to improve the previous color entropy calculation method and eliminates the contour entropy calculation to describe the digital painting image style better. The experimental results show that this method can classify the styles of digital paintings more accurately.", "fno": "231400b742", "keywords": [ "Art", "Entropy", "Image Classification", "Image Colour Analysis", "Painting", "Digital Painting Style", "Contour Entropy Calculation", "Color Entropy Calculation", "Digital Painting Style Classification", "Image Entropy Algorithm", "Computers", "Training", "Support Vector Machines", "Knowledge Engineering", "Art", "Image Color Analysis", "Entropy", "Image Entropy", "Digital Painting", "Classification Of Painting Styles" ], "authors": [ { "affiliation": "School of Information Science and Technology, Yunnan Normal University,Kunming,China", "fullName": "Gan Chen", "givenName": "Gan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Science and Technology, Yunnan Normal University,Kunming,China", "fullName": "Bin Wen", "givenName": "Bin", "surname": "Wen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmcce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "1742-1746", "year": "2020", "issn": null, "isbn": "978-1-6654-2314-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "231400b736", "articleId": "1tzyFjWQBr2", "__typename": "AdjacentArticleType" }, "next": { "fno": "231400b747", "articleId": "1tzzgGNXQrK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004084", "title": "Digital Photo Painting as an Artistic and Cultural Phenomenon", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004084/12OmNvqEvQA", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2016/3578/0/07733858", "title": "Research on the Aesthetic Mode of Digital Painting Based on Digital Technology", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2016/07733858/12OmNwpXRSZ", "parentPublication": { "id": "proceedings/icsgea/2016/3578/0", "title": "2016 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2015/6683/0/6683a588", "title": "Genre and Style Based Painting Classification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a588/12OmNwtn3sp", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2008/2153/0/04813367", "title": "Emotionally aware automated portrait painting demonstration", "doi": null, "abstractUrl": "/proceedings-article/fg/2008/04813367/12OmNxFJXLv", "parentPublication": { "id": "proceedings/fg/2008/2153/0", "title": "2008 8th IEEE International Conference on Automatic Face & Gesture Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2016/0641/0/07477619", "title": "Color multi-fusion fisher vector feature for fine art painting categorization and influence analysis", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477619/12OmNzb7Zre", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460929", "title": "Towards automated classification of fine-art painting style: A comparative study", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460929/12OmNzkuKIM", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a193", "title": "Two-Stage Color ink Painting Style Transfer via Convolution Neural Network", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a193/17D45XvMcbn", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiotcs/2022/3410/0/341000a509", "title": "Research on The Construction of Folk Painting Color Network Model Based on Deep Neural Network", "doi": null, "abstractUrl": "/proceedings-article/aiotcs/2022/341000a509/1MuZH2jTwRO", "parentPublication": { "id": "proceedings/aiotcs/2022/3410/0", "title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2020/4272/0/427200a400", "title": "Multi-attribute Guided Painting Generation", "doi": null, "abstractUrl": "/proceedings-article/mipr/2020/427200a400/1mA9Z4FFJ7i", "parentPublication": { "id": "proceedings/mipr/2020/4272/0", "title": "2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a057", "title": "Exploration of Painting Creation Media and Concept Based on Visual Communication Design", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a057/1rSRj01oltm", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwHz03N", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3Xhju", "doi": "10.1109/ICDM.2017.120", "title": "Fast Compressive Spectral Clustering", "normalizedTitle": "Fast Compressive Spectral Clustering", "abstract": "Compressive spectral clustering (CSC) efficiently leverages graph filter and random sampling techniques to speed up clustering process. However, we find that CSC algorithm suffers from two main problems: i) The direct use of the dichotomy and eigencount techniques for estimating laplacian matrix's k-th eigenvalue is expensive. ii) The computation of polynomial approximation repeats in each iteration for every cluster in the interpolation process, which occupies most of the computation time of CSC. To address these problems, we propose a new approach called FCSC for fast compressive spectral clustering. FCSC addresses the first problem by assuming that the eigenvalues approximately satisfy local uniform distribution, and addresses the second problem by recalculating the pairwise similarity between nodes with low-dimensional representation to reconstruct denoised laplacian matrix. The time complexity of reconstruction is linear with the number of non-zeros in laplacian matrix. As experimentally demonstrated on artificial and real-world datasets, our approach significantly reduces the computation time while preserving high clustering accuracy comparable to previous designs, verifying the effectiveness of FCSC.", "abstracts": [ { "abstractType": "Regular", "content": "Compressive spectral clustering (CSC) efficiently leverages graph filter and random sampling techniques to speed up clustering process. However, we find that CSC algorithm suffers from two main problems: i) The direct use of the dichotomy and eigencount techniques for estimating laplacian matrix's k-th eigenvalue is expensive. ii) The computation of polynomial approximation repeats in each iteration for every cluster in the interpolation process, which occupies most of the computation time of CSC. To address these problems, we propose a new approach called FCSC for fast compressive spectral clustering. FCSC addresses the first problem by assuming that the eigenvalues approximately satisfy local uniform distribution, and addresses the second problem by recalculating the pairwise similarity between nodes with low-dimensional representation to reconstruct denoised laplacian matrix. The time complexity of reconstruction is linear with the number of non-zeros in laplacian matrix. As experimentally demonstrated on artificial and real-world datasets, our approach significantly reduces the computation time while preserving high clustering accuracy comparable to previous designs, verifying the effectiveness of FCSC.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Compressive spectral clustering (CSC) efficiently leverages graph filter and random sampling techniques to speed up clustering process. However, we find that CSC algorithm suffers from two main problems: i) The direct use of the dichotomy and eigencount techniques for estimating laplacian matrix's k-th eigenvalue is expensive. ii) The computation of polynomial approximation repeats in each iteration for every cluster in the interpolation process, which occupies most of the computation time of CSC. To address these problems, we propose a new approach called FCSC for fast compressive spectral clustering. FCSC addresses the first problem by assuming that the eigenvalues approximately satisfy local uniform distribution, and addresses the second problem by recalculating the pairwise similarity between nodes with low-dimensional representation to reconstruct denoised laplacian matrix. The time complexity of reconstruction is linear with the number of non-zeros in laplacian matrix. As experimentally demonstrated on artificial and real-world datasets, our approach significantly reduces the computation time while preserving high clustering accuracy comparable to previous designs, verifying the effectiveness of FCSC.", "fno": "3835a949", "keywords": [ "Approximation Theory", "Computational Complexity", "Eigenvalues And Eigenfunctions", "Graph Theory", "Interpolation", "Matrix Algebra", "Pattern Clustering", "Polynomial Approximation", "Graph Filter", "Random Sampling Techniques", "CSC Algorithm Suffers", "Polynomial Approximation Repeats", "Interpolation Process", "Computation Time", "FCSC", "Fast Compressive Spectral Clustering", "Eigenvalues", "Local Uniform Distribution", "Denoised Laplacian Matrix", "High Clustering Accuracy", "Laplacian Matrix K Th Eigenvalue Estimation", "Eigenvalues And Eigenfunctions", "Matrix Decomposition", "Laplace Equations", "Interpolation", "Time Complexity", "Acceleration", "Estimation" ], "authors": [ { "affiliation": null, "fullName": "Ting Li", "givenName": "Ting", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yiming Zhang", "givenName": "Yiming", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dongsheng Li", "givenName": "Dongsheng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xinwang Liu", "givenName": "Xinwang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuxing Peng", "givenName": "Yuxing", "surname": "Peng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "949-954", "year": "2017", "issn": "2374-8486", "isbn": "978-1-5386-3835-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3835a943", "articleId": "12OmNzmcm01", "__typename": "AdjacentArticleType" }, "next": { "fno": "3835a955", "articleId": "12OmNrYCXIR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipccc/2014/7575/0/07017060", "title": "JLMC: A clustering method based on Jordan-Form of Laplacian-Matrix", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2014/07017060/12OmNARRYxS", "parentPublication": { "id": "proceedings/ipccc/2014/7575/0", "title": "2014 IEEE International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835b201", "title": "Scalable Constrained Spectral Clustering via the Randomized Projected Power Method", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835b201/12OmNAY79mE", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2015/02/06895121", "title": "Scalable Constrained Spectral Clustering", "doi": null, "abstractUrl": "/journal/tk/2015/02/06895121/13rRUEgarta", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122100", "title": "Open-Box Spectral Clustering: Applications to Medical Image Analysis", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122100/13rRUxjQyvi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545661", "title": "Multi-Source Clustering based on spectral recovery", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545661/17D45Xq6dBJ", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/01/08778699", "title": "Fast Compressive Spectral Clustering for Large-Scale Sparse Graph", "doi": null, "abstractUrl": "/journal/bd/2022/01/08778699/1A8c2XDewyA", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09200798", "title": "Multi-View Spectral Clustering With High-Order Optimal Neighborhood Laplacian Matrix", "doi": null, "abstractUrl": "/journal/tk/2022/07/09200798/1ndVfr81jP2", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/06/09263338", "title": "Regularized Spectral Clustering With Entropy Perturbation", "doi": null, "abstractUrl": "/journal/bd/2021/06/09263338/1oReEPfsM6s", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdia/2020/2232/0/223200a257", "title": "DBSCAN Is Semi-Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdia/2020/223200a257/1stvyZFcIYU", "parentPublication": { "id": "proceedings/bigdia/2020/2232/0", "title": "2020 6th International Conference on Big Data and Information Analytics (BigDIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09495158", "title": "Fast Optimization of Spectral Embedding and Improved Spectral Rotation", "doi": null, "abstractUrl": "/journal/tk/2023/02/09495158/1vyjgdBlrRS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqre", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "acronym": "ic3", "groupId": "1803947", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyxFKdB", "doi": "10.1109/IC3.2015.7346659", "title": "Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs", "normalizedTitle": "Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs", "abstract": "FANNY is a fuzzy or soft clustering algorithm, where each node in the graph is associated with a membership coefficient, indicating degree of belongingness of each node to different clusters. In this paper, we proposed a method for multiple dimension reduction of feature space of graphs or networks by using Spectral methods for FANNY clustering algorithm. Simulations of our method on two real networks show that, the proposed algorithm produced better result than traditional FANNY in-terms of runtime as well as modularity.", "abstracts": [ { "abstractType": "Regular", "content": "FANNY is a fuzzy or soft clustering algorithm, where each node in the graph is associated with a membership coefficient, indicating degree of belongingness of each node to different clusters. In this paper, we proposed a method for multiple dimension reduction of feature space of graphs or networks by using Spectral methods for FANNY clustering algorithm. Simulations of our method on two real networks show that, the proposed algorithm produced better result than traditional FANNY in-terms of runtime as well as modularity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "FANNY is a fuzzy or soft clustering algorithm, where each node in the graph is associated with a membership coefficient, indicating degree of belongingness of each node to different clusters. In this paper, we proposed a method for multiple dimension reduction of feature space of graphs or networks by using Spectral methods for FANNY clustering algorithm. Simulations of our method on two real networks show that, the proposed algorithm produced better result than traditional FANNY in-terms of runtime as well as modularity.", "fno": "07346659", "keywords": [ "Clustering Algorithms", "Algorithm Design And Analysis", "Runtime", "Laplace Equations", "Eigenvalues And Eigenfunctions", "Dolphins", "Computer Science", "Graph Clustering", "Spectral Clustering", "FANNY Clustering", "Dimension Reduction Technique", "Soft Clustering" ], "authors": [ { "affiliation": "Department of Computer Science & Engineering, Indian Institute of Technology (BHU) Varanasi, U.P, India", "fullName": "Abhishek Jatram", "givenName": "Abhishek", "surname": "Jatram", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science & Engineering, Indian Institute of Technology (BHU) Varanasi, U.P, India", "fullName": "Bhaskar Biswas", "givenName": "Bhaskar", "surname": "Biswas", "__typename": "ArticleAuthorType" } ], "idPrefix": "ic3", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "93-96", "year": "2015", "issn": null, "isbn": "978-1-4673-7947-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07346658", "articleId": "12OmNqBbHFD", "__typename": "AdjacentArticleType" }, "next": { "fno": "07346660", "articleId": "12OmNzJbQZd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipccc/2014/7575/0/07017060", "title": "JLMC: A clustering method based on Jordan-Form of Laplacian-Matrix", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2014/07017060/12OmNARRYxS", "parentPublication": { "id": "proceedings/ipccc/2014/7575/0", "title": "2014 IEEE International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/unesst/2014/7766/0/07024682", "title": "Spectral Radius as a Measure of Variation in Node Degree for Complex Network Graphs", "doi": null, "abstractUrl": "/proceedings-article/unesst/2014/07024682/12OmNBO3K2k", "parentPublication": { "id": "proceedings/unesst/2014/7766/0", "title": "2014 7th International Conference on u- and e- Service, Science and Technology (UNESST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a949", "title": "Fast Compressive Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a949/12OmNC3Xhju", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2015/7194/0/07405624", "title": "Spectral partitioning for node criticality", "doi": null, "abstractUrl": "/proceedings-article/iscc/2015/07405624/12OmNC8dgcu", "parentPublication": { "id": "proceedings/iscc/2015/7194/0", "title": "2015 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209b313", "title": "A Heuristic for the Automatic Parametrization of the Spectral Clustering Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209b313/12OmNxGSlYI", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302b049", "title": "On Spectral Analysis of Signed and Dispute Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302b049/12OmNyKa5TL", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/07/07882721", "title": "On Spectral Analysis of Signed and Dispute Graphs: Application to Community Structure", "doi": null, "abstractUrl": "/journal/tk/2017/07/07882721/13rRUxBa5so", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2016/7735/0/773500a069", "title": "A Study on Pattern-Based Spectral Clustering Methods in DWN", "doi": null, "abstractUrl": "/proceedings-article/micai/2016/773500a069/17D45VTRorA", "parentPublication": { "id": "proceedings/micai/2016/7735/0", "title": "2016 Fifteenth Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/06/09263338", "title": "Regularized Spectral Clustering With Entropy Perturbation", "doi": null, "abstractUrl": "/journal/bd/2021/06/09263338/1oReEPfsM6s", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09495158", "title": "Fast Optimization of Spectral Embedding and Improved Spectral Rotation", "doi": null, "abstractUrl": "/journal/tk/2023/02/09495158/1vyjgdBlrRS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirQ", "title": "2016 Fifteenth Mexican International Conference on Artificial Intelligence (MICAI)", "acronym": "micai", "groupId": "1001744", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "17D45VTRorA", "doi": "10.1109/MICAI-2016.2016.00019", "title": "A Study on Pattern-Based Spectral Clustering Methods in DWN", "normalizedTitle": "A Study on Pattern-Based Spectral Clustering Methods in DWN", "abstract": "Pattern based spectral clustering methods in directed weighted network (DWN) have significant applications in many domains, including computer engineering, E-commerce and economics. In this paper, we compile several of the state of the art algorithms from the point of view of clustering quality over some existing benchmark datasets. Experimental results show that, it is necessary to propose a more common pattern based spectral clustering method in DWN.", "abstracts": [ { "abstractType": "Regular", "content": "Pattern based spectral clustering methods in directed weighted network (DWN) have significant applications in many domains, including computer engineering, E-commerce and economics. In this paper, we compile several of the state of the art algorithms from the point of view of clustering quality over some existing benchmark datasets. Experimental results show that, it is necessary to propose a more common pattern based spectral clustering method in DWN.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Pattern based spectral clustering methods in directed weighted network (DWN) have significant applications in many domains, including computer engineering, E-commerce and economics. In this paper, we compile several of the state of the art algorithms from the point of view of clustering quality over some existing benchmark datasets. Experimental results show that, it is necessary to propose a more common pattern based spectral clustering method in DWN.", "fno": "773500a069", "keywords": [ "Network Theory Graphs", "Pattern Clustering", "E Commerce", "Economics", "Computer Engineering", "Directed Weighted Network", "DWN", "Pattern Based Spectral Clustering Methods", "Clustering Algorithms", "Clustering Methods", "Benchmark Testing", "Laplace Equations", "Eigenvalues And Eigenfunctions", "Bibliometrics", "Partitioning Algorithms", "Pattern Based Clustering Spectral Clustering Directed Weighted Network" ], "authors": [ { "affiliation": null, "fullName": "Mehdi Sadeghi-Moghadam", "givenName": "Mehdi", "surname": "Sadeghi-Moghadam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hamideh Haghparast", "givenName": "Hamideh", "surname": "Haghparast", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Seyed Abdolhamed Hoseinpour", "givenName": "Seyed Abdolhamed", "surname": "Hoseinpour", "__typename": "ArticleAuthorType" } ], "idPrefix": "micai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "69-74", "year": "2016", "issn": null, "isbn": "978-1-5386-7735-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "773500a063", "articleId": "17D45XvMcaY", "__typename": "AdjacentArticleType" }, "next": { "fno": "773500a075", "articleId": "17D45Xh13sY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457d145", "title": "Grassmannian Manifold Optimization Assisted Sparse Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d145/12OmNClQ0AC", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498277", "title": "Streaming spectral clustering", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498277/12OmNqFJhWE", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2015/7947/0/07346659", "title": "Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs", "doi": null, "abstractUrl": "/proceedings-article/ic3/2015/07346659/12OmNyxFKdB", "parentPublication": { "id": "proceedings/ic3/2015/7947/0", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/07/07882721", "title": "On Spectral Analysis of Signed and Dispute Graphs: Application to Community Structure", "doi": null, "abstractUrl": "/journal/tk/2017/07/07882721/13rRUxBa5so", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/08/06701205", "title": "Segmentation of 3D Meshes Usingp-Spectral Clustering", "doi": null, "abstractUrl": "/journal/tp/2014/08/06701205/13rRUzphDz6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2020/8041/0/09204117", "title": "k-eNSC: k-estimation for Normalized Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/iscv/2020/09204117/1nmi8yrOjMQ", "parentPublication": { "id": "proceedings/iscv/2020/8041/0", "title": "2020 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/06/09263338", "title": "Regularized Spectral Clustering With Entropy Perturbation", "doi": null, "abstractUrl": "/journal/bd/2021/06/09263338/1oReEPfsM6s", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600b094", "title": "Ensemble Learning for Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600b094/1r54GbKzRdu", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdia/2020/2232/0/223200a257", "title": "DBSCAN Is Semi-Spectral Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdia/2020/223200a257/1stvyZFcIYU", "parentPublication": { "id": "proceedings/bigdia/2020/2232/0", "title": "2020 6th International Conference on Big Data and Information Analytics (BigDIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09495158", "title": "Fast Optimization of Spectral Embedding and Improved Spectral Rotation", "doi": null, "abstractUrl": "/journal/tk/2023/02/09495158/1vyjgdBlrRS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }