data
dict
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45XdBRRt", "doi": "10.1109/BigData.2017.8258022", "title": "Application-specific graph sampling for frequent subgraph mining and community detection", "normalizedTitle": "Application-specific graph sampling for frequent subgraph mining and community detection", "abstract": "Graph mining is an important data analysis methodology, but struggles as the input graph size increases. The scalability and usability challenges posed by such large graphs make it imperative to sample the input graph and reduce its size. The critical challenge in sampling is to identify the appropriate algorithm to insure the resulting analysis does not suffer heavily from the data reduction. Predicting the expected performance degradation for a given graph and sampling algorithm is also useful. In this paper, we present different sampling approaches for graph mining applications such as Frequent Subgrpah Mining (FSM), and Community Detection (CD). We explore graph metrics such as PageRank, Triangles, and Diversity to sample a graph and conclude that for heterogeneous graphs Triangles and Diversity perform better than degree based metrics. We also present two new sampling variations for targeted graph mining applications. We present empirical results to show that knowledge of the target application, along with input graph properties can be used to select the best sampling algorithm. We also conclude that performance degradation is an abrupt, rather than gradual phenomena, as the sample size decreases. We present the empirical results to show that the performance degradation follows a logistic function. Original Datasets, implementation of sampling algorithms, and results are available online.1", "abstracts": [ { "abstractType": "Regular", "content": "Graph mining is an important data analysis methodology, but struggles as the input graph size increases. The scalability and usability challenges posed by such large graphs make it imperative to sample the input graph and reduce its size. The critical challenge in sampling is to identify the appropriate algorithm to insure the resulting analysis does not suffer heavily from the data reduction. Predicting the expected performance degradation for a given graph and sampling algorithm is also useful. In this paper, we present different sampling approaches for graph mining applications such as Frequent Subgrpah Mining (FSM), and Community Detection (CD). We explore graph metrics such as PageRank, Triangles, and Diversity to sample a graph and conclude that for heterogeneous graphs Triangles and Diversity perform better than degree based metrics. We also present two new sampling variations for targeted graph mining applications. We present empirical results to show that knowledge of the target application, along with input graph properties can be used to select the best sampling algorithm. We also conclude that performance degradation is an abrupt, rather than gradual phenomena, as the sample size decreases. We present the empirical results to show that the performance degradation follows a logistic function. Original Datasets, implementation of sampling algorithms, and results are available online.1", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph mining is an important data analysis methodology, but struggles as the input graph size increases. The scalability and usability challenges posed by such large graphs make it imperative to sample the input graph and reduce its size. The critical challenge in sampling is to identify the appropriate algorithm to insure the resulting analysis does not suffer heavily from the data reduction. Predicting the expected performance degradation for a given graph and sampling algorithm is also useful. In this paper, we present different sampling approaches for graph mining applications such as Frequent Subgrpah Mining (FSM), and Community Detection (CD). We explore graph metrics such as PageRank, Triangles, and Diversity to sample a graph and conclude that for heterogeneous graphs Triangles and Diversity perform better than degree based metrics. We also present two new sampling variations for targeted graph mining applications. We present empirical results to show that knowledge of the target application, along with input graph properties can be used to select the best sampling algorithm. We also conclude that performance degradation is an abrupt, rather than gradual phenomena, as the sample size decreases. We present the empirical results to show that the performance degradation follows a logistic function. Original Datasets, implementation of sampling algorithms, and results are available online.1", "fno": "08258022", "keywords": [ "Algorithm Design And Analysis", "Noise Measurement", "Degradation", "Data Mining", "Prediction Algorithms", "Sampling Methods", "Graph Mining", "Sampling", "Scalability" ], "authors": [ { "affiliation": "Pacific Northwest National Laboratory, Richland, WA, 99352, USA", "fullName": "Sumit Purohit", "givenName": "Sumit", "surname": "Purohit", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Laboratory, Richland, WA, 99352, USA", "fullName": "Sutanay Choudhury", "givenName": "Sutanay", "surname": "Choudhury", "__typename": "ArticleAuthorType" }, { "affiliation": "Washington State University, Pullman, WA, 99164, USA", "fullName": "Lawrence B. Holder", "givenName": "Lawrence B.", "surname": "Holder", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "1000-1005", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08258021", "articleId": "17D45Vu1TxM", "__typename": "AdjacentArticleType" }, "next": { "fno": "08258023", "articleId": "17D45WrVg09", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icycs/2008/3398/0/3398a082", "title": "A Fast Frequent Subgraph Mining Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icycs/2008/3398a082/12OmNA2cYAS", "parentPublication": { "id": "proceedings/icycs/2008/3398/0", "title": "2008 9th International Conference for Young Computer Scientists", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2008/3502/0/3502a283", "title": "Metropolis Algorithms for Representative Subgraph Sampling", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a283/12OmNBOUxjB", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004359", "title": "FS3: A sampling based method for top-k frequent subgraph mining", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004359/12OmNvoFjT0", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a455", "title": "Edge-Based Wedge Sampling to Estimate Triangle Counts in Very Large Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a455/12OmNzBwGBP", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2010/4256/0/4256a324", "title": "Stratified Sampling for Data Mining on the Deep Web", "doi": null, "abstractUrl": "/proceedings-article/icdm/2010/4256a324/12OmNzt0Iv5", "parentPublication": { "id": "proceedings/icdm/2010/4256/0", "title": "2010 IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a239", "title": "Efficient Discovery of Frequent Correlated Subgraph Pairs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a239/12OmNzxPTMV", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2007/04/k0468", "title": "Quality-Aware Sampling and Its Applications in Incremental Data Mining", "doi": null, "abstractUrl": "/journal/tk/2007/04/k0468/13rRUy3xY35", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/09/ttk2010091203", "title": "Mining Frequent Subgraph Patterns from Uncertain Graph Data", "doi": null, "abstractUrl": "/journal/tk/2010/09/ttk2010091203/13rRUyoPSPr", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068651", "title": "Network Sparsification via Degree- and Subgraph-based Edge Sampling", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068651/1LKx62X73nG", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b674", "title": "T-Sample: A Dual Reservoir-Based Sampling Method for Characterizing Large Graph Streams", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b674/1aDT0xtJxny", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18AuJaafq5W", "title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)", "acronym": "ispa-iucc-bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18AuRfhVatG", "doi": "10.1109/BDCloud.2018.00168", "title": "Comparing Graph Sampling Methods Based on the Number of Queries", "normalizedTitle": "Comparing Graph Sampling Methods Based on the Number of Queries", "abstract": "Random walk-based graph sampling methods can effectively estimate feature values in large-scale social networks wherein the node IDs are unknown. Real social networks are sampled by repeatedly querying their APIs to acquire the lists of adjacent nodes. These queries can then become a bottleneck in the sampling process because nearly all social network services restrict the rate at which queries can be issued. However, most existing graph sampling studies have not focused on the number of queries but have instead compared methods based on sample size. Therefore, such graph sampling methods cannot be recommended for estimating feature values in actual social networks. This study presents an approach to assess graph sampling methods that focus on the number of queries. This describes the time taken by algorithms for typical random walk-based graph sampling methods, such as a simple random walk with re-weighting (SRW-rw), a non-backtracking random walk with re-weighting (NBRW-rw), and a Metropolis-Hastings random walk (MHRW), which require queries. The graph sampling precision was then experimentally evaluated based on sample size and query number standards using actual social networks, and the types of changes that occur were observed.", "abstracts": [ { "abstractType": "Regular", "content": "Random walk-based graph sampling methods can effectively estimate feature values in large-scale social networks wherein the node IDs are unknown. Real social networks are sampled by repeatedly querying their APIs to acquire the lists of adjacent nodes. These queries can then become a bottleneck in the sampling process because nearly all social network services restrict the rate at which queries can be issued. However, most existing graph sampling studies have not focused on the number of queries but have instead compared methods based on sample size. Therefore, such graph sampling methods cannot be recommended for estimating feature values in actual social networks. This study presents an approach to assess graph sampling methods that focus on the number of queries. This describes the time taken by algorithms for typical random walk-based graph sampling methods, such as a simple random walk with re-weighting (SRW-rw), a non-backtracking random walk with re-weighting (NBRW-rw), and a Metropolis-Hastings random walk (MHRW), which require queries. The graph sampling precision was then experimentally evaluated based on sample size and query number standards using actual social networks, and the types of changes that occur were observed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Random walk-based graph sampling methods can effectively estimate feature values in large-scale social networks wherein the node IDs are unknown. Real social networks are sampled by repeatedly querying their APIs to acquire the lists of adjacent nodes. These queries can then become a bottleneck in the sampling process because nearly all social network services restrict the rate at which queries can be issued. However, most existing graph sampling studies have not focused on the number of queries but have instead compared methods based on sample size. Therefore, such graph sampling methods cannot be recommended for estimating feature values in actual social networks. This study presents an approach to assess graph sampling methods that focus on the number of queries. This describes the time taken by algorithms for typical random walk-based graph sampling methods, such as a simple random walk with re-weighting (SRW-rw), a non-backtracking random walk with re-weighting (NBRW-rw), and a Metropolis-Hastings random walk (MHRW), which require queries. The graph sampling precision was then experimentally evaluated based on sample size and query number standards using actual social networks, and the types of changes that occur were observed.", "fno": "114100b136", "keywords": [ "Graph Theory", "Network Theory Graphs", "Query Processing", "Random Processes", "Sampling Methods", "Social Networking Online", "Large Scale Social Networks", "Social Network Services", "Query Number Standards", "Random Walk Based Graph Sampling Methods", "Node ID", "Simple Random Walk With Re Weighting", "SRW Rw", "Nonbacktracking Random Walk With Re Weighting", "NBRW Rw", "Metropolis Hastings Random Walk", "MHRW", "Sampling Methods", "Markov Processes", "Complex Networks", "Estimation", "Facebook", "Distributed Processing", "Graph Sampling", "Social Graph", "Random Walk" ], "authors": [ { "affiliation": null, "fullName": "Kenta Iwasaki", "givenName": "Kenta", "surname": "Iwasaki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kazuyuki Shudo", "givenName": "Kazuyuki", "surname": "Shudo", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispa-iucc-bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "1136-1143", "year": "2018", "issn": null, "isbn": "978-1-7281-1141-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "114100b128", "articleId": "18AuOnp6ACY", "__typename": "AdjacentArticleType" }, "next": { "fno": "114100b144", "articleId": "18AuOMtLC2k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2015/7964/0/07113346", "title": "A tale of three graphs: Sampling design on hybrid social-affiliation networks", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113346/12OmNqI04Xc", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752223", "title": "Rank degree: An efficient algorithm for graph sampling", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752223/12OmNxw5B9H", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2011/4557/0/4557a357", "title": "Unbiased Sampling of Bipartite Graph", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2011/4557a357/12OmNy5zsnM", "parentPublication": { "id": "proceedings/cyberc/2011/4557/0", "title": "2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544874", "title": "Sampling node pairs over large graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544874/12OmNzTH0NL", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113345", "title": "On random walk based graph sampling", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113345/12OmNzdoMlP", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/05/09712235", "title": "Common Neighbors Matter: Fast Random Walk Sampling With Common Neighbor Awareness", "doi": null, "abstractUrl": "/journal/tk/2023/05/09712235/1AUkdBTC3FC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c914", "title": "Aggregate Queries on Knowledge Graphs: Fast Approximation with Semantic-aware Sampling", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c914/1FwFG43l2gg", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a962", "title": "Walking with Perception: Efficient Random Walk Sampling via Common Neighbor Awareness", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a962/1aDSQIoOnSw", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047340", "title": "Metropolis-Hastings Random Walk with a Reduced Number of Self-Loops", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047340/1iC6zzdKro4", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cibda/2020/9837/0/983700a450", "title": "Graph Signal Sampling with Deep Q-Learning", "doi": null, "abstractUrl": "/proceedings-article/cibda/2020/983700a450/1lO1KWUlhtu", "parentPublication": { "id": "proceedings/cibda/2020/9837/0", "title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lO1FwRy480", "title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)", "acronym": "cibda", "groupId": "1837204", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1lO1KWUlhtu", "doi": "10.1109/CIBDA50819.2020.00107", "title": "Graph Signal Sampling with Deep Q-Learning", "normalizedTitle": "Graph Signal Sampling with Deep Q-Learning", "abstract": "We formulate the graph signal sampling problem as a reinforcement learning process in discrete action space. A deep Q-network (DQN) is used for the agent to learn the sampling strategy. To adapt to the training environment, we redesigned the step and episode. In each episode, the agent learns how to select a node for the current state, and selects the best one at the final step of this episode. Besides, we redefined the action and reward. Based on the sampling sets, we use the same reconstruction method to test the performance. Through comparative experiments, the reconstruction accuracy of our method outperforms that of uniform random sampling and random walk sampling methods. Our method can quickly select the key nodes in the initial sampling stage. According to our investigation, it is the first time that deep Q-learning is successfully applied to the graph signal sampling field.", "abstracts": [ { "abstractType": "Regular", "content": "We formulate the graph signal sampling problem as a reinforcement learning process in discrete action space. A deep Q-network (DQN) is used for the agent to learn the sampling strategy. To adapt to the training environment, we redesigned the step and episode. In each episode, the agent learns how to select a node for the current state, and selects the best one at the final step of this episode. Besides, we redefined the action and reward. Based on the sampling sets, we use the same reconstruction method to test the performance. Through comparative experiments, the reconstruction accuracy of our method outperforms that of uniform random sampling and random walk sampling methods. Our method can quickly select the key nodes in the initial sampling stage. According to our investigation, it is the first time that deep Q-learning is successfully applied to the graph signal sampling field.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We formulate the graph signal sampling problem as a reinforcement learning process in discrete action space. A deep Q-network (DQN) is used for the agent to learn the sampling strategy. To adapt to the training environment, we redesigned the step and episode. In each episode, the agent learns how to select a node for the current state, and selects the best one at the final step of this episode. Besides, we redefined the action and reward. Based on the sampling sets, we use the same reconstruction method to test the performance. Through comparative experiments, the reconstruction accuracy of our method outperforms that of uniform random sampling and random walk sampling methods. Our method can quickly select the key nodes in the initial sampling stage. According to our investigation, it is the first time that deep Q-learning is successfully applied to the graph signal sampling field.", "fno": "983700a450", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Random Processes", "Sampling Methods", "Signal Sampling", "Deep Q Learning", "Graph Signal Sampling Problem", "Reinforcement Learning Process", "Discrete Action Space", "Deep Q Network", "Sampling Strategy", "Training Environment", "Reconstruction Method", "Reconstruction Accuracy", "Uniform Random Sampling", "Random Walk Sampling Methods", "Initial Sampling Stage", "Graph Signal Sampling Field", "DQN", "Sampling Sets", "Learning Artificial Intelligence", "Signal Sampling", "Training", "Sampling Methods", "Machine Learning", "Automation", "Neural Networks", "Component", "Deep Q Learning", "Graph Reconstruction", "Reinforcement Learning" ], "authors": [ { "affiliation": "Harbin Engineering University", "fullName": "Menghao Wu", "givenName": "Menghao", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Harbin Engineering University", "fullName": "Qiang Zhang", "givenName": "Qiang", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Harbin Engineering University", "fullName": "Yanbin Gao", "givenName": "Yanbin", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Harbin Engineering University", "fullName": "Ningbo Li", "givenName": "Ningbo", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "cibda", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "450-453", "year": "2020", "issn": null, "isbn": "978-1-7281-9837-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "983700a446", "articleId": "1lO1KQEjCFi", "__typename": "AdjacentArticleType" }, "next": { "fno": "983700a454", "articleId": "1lO1KalNDVe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsgea/2017/2813/0/2813a243", "title": "Fundamental Q-learning Algorithm in Finding Optimal Policy", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2017/2813a243/12OmNBOll35", "parentPublication": { "id": "proceedings/icsgea/2017/2813/0", "title": "2017 International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2017/3981/0/3981a045", "title": "Behavior Control Algorithm for Mobile Robot Based on Q-learning", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2017/3981a045/12OmNCdk2ZF", "parentPublication": { "id": "proceedings/iccnea/2017/3981/0", "title": "2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2006/2674/2/04021302", "title": "A strategy for improving performance of Q-learning with prediction information", "doi": null, "abstractUrl": "/proceedings-article/ichit/2006/04021302/12OmNCvumRC", "parentPublication": { "id": "proceedings/ichit/2006/2674/2", "title": "2006 International Conference on Hybrid Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ficloud/2018/7503/0/750300a085", "title": "Efficient Cloud Auto-Scaling with SLA Objective Using Q-Learning", "doi": null, "abstractUrl": "/proceedings-article/ficloud/2018/750300a085/13xI8ApYuKZ", "parentPublication": { "id": "proceedings/ficloud/2018/7503/0", "title": "2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a486", "title": "Faster Deep Q-Learning Using Neural Episodic Control", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a486/144U9bnXAFc", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454905", "title": "DQNViz: A Visual Analytics Approach to Understand Deep Q-Networks", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454905/17D45WnnFYf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/conf-spml/2021/1734/0/173400a080", "title": "A Local Path Planning Method Based on Q-Learning", "doi": null, "abstractUrl": "/proceedings-article/conf-spml/2021/173400a080/1B12d7NkrMA", "parentPublication": { "id": "proceedings/conf-spml/2021/1734/0", "title": "2021 International Conference on Signal Processing and Machine Learning (CONF-SPML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09151365", "title": "Social Attentive Deep Q-Networks for Recommender Systems", "doi": null, "abstractUrl": "/journal/tk/2022/05/09151365/1lPChtyz2Cs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150141", "title": "QTAccel: A Generic FPGA based Design for Q-Table based Reinforcement Learning Accelerators", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150141/1lPGyrt21xu", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/02/09536409", "title": "Deep Q-Learning: Theoretical Insights From an Asymptotic Analysis", "doi": null, "abstractUrl": "/journal/ai/2022/02/09536409/1wREit2GV5S", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkEU4h", "title": "2006 IEEE/NLM Life Science Systems and Applications Workshop", "acronym": "lssa", "groupId": "1001257", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNAtK4ju", "doi": "10.1109/LSSA.2006.250431", "title": "Examining Phenotype Differences in Mouse Placenta with Volume Rendering and Segmentation", "normalizedTitle": "Examining Phenotype Differences in Mouse Placenta with Volume Rendering and Segmentation", "abstract": "We present an application problem of examining phenotype differences in wildtype and retinoblastoma (Rb) knockout specimens of mouse placenta. The lack of the Rb gene causes uncontrolled tissue growth which forces infiltrations into critical sections of mouse placenta that lead to fetal death. We briefly describe our method for volume visualization of mouse placenta tissue level intermixing at a microscopic scale for both wildtype and Rb knockout types. Our technique combines non-trivial registration techniques, an TV-point correlation classifier, and a volume rendering step. Our final volume renderings show tissue intermixing differences between both wildtype and Rb knockout specimens that are not obvious from examining the two dimensional image stack alone", "abstracts": [ { "abstractType": "Regular", "content": "We present an application problem of examining phenotype differences in wildtype and retinoblastoma (Rb) knockout specimens of mouse placenta. The lack of the Rb gene causes uncontrolled tissue growth which forces infiltrations into critical sections of mouse placenta that lead to fetal death. We briefly describe our method for volume visualization of mouse placenta tissue level intermixing at a microscopic scale for both wildtype and Rb knockout types. Our technique combines non-trivial registration techniques, an TV-point correlation classifier, and a volume rendering step. Our final volume renderings show tissue intermixing differences between both wildtype and Rb knockout specimens that are not obvious from examining the two dimensional image stack alone", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an application problem of examining phenotype differences in wildtype and retinoblastoma (Rb) knockout specimens of mouse placenta. The lack of the Rb gene causes uncontrolled tissue growth which forces infiltrations into critical sections of mouse placenta that lead to fetal death. We briefly describe our method for volume visualization of mouse placenta tissue level intermixing at a microscopic scale for both wildtype and Rb knockout types. Our technique combines non-trivial registration techniques, an TV-point correlation classifier, and a volume rendering step. Our final volume renderings show tissue intermixing differences between both wildtype and Rb knockout specimens that are not obvious from examining the two dimensional image stack alone", "fno": "04015832", "keywords": [ "Biological Tissues", "Biomedical Optical Imaging", "Cellular Biophysics", "Genetics", "Image Classification", "Image Registration", "Medical Image Processing", "Phenotype Differences", "Mouse Placenta", "Volume Rendering", "Image Segmentation", "Retinoblastoma Knockout Specimens", "Rb Gene", "Volume Visualization", "Mouse Placenta Tissue Level Intermixing", "Nontrivial Registration Techniques", "TV Point Correlation Classifier", "Mice", "Image Segmentation", "Cancer", "Rendering Computer Graphics", "Microscopy", "Image Reconstruction", "Data Visualization", "Computed Tomography", "Density Measurement", "Informatics" ], "authors": [ { "affiliation": "Dept. of Comp. Sci. and Eng., The Ohio State University, 2015 Neil Ave., Columbus, OH. sharpr@cse.ohio-state.edu", "fullName": "Richard Sharp", "givenName": "Richard", "surname": "Sharp", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp. Sci. and Eng., The Ohio State University, 2015 Neil Ave., Columbus, OH", "fullName": "Randall Ridgway", "givenName": "Randall", "surname": "Ridgway", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp. Sci. and Eng., The Ohio State University, 2015 Neil Ave., Columbus, OH", "fullName": "Kishore Mosaliganti", "givenName": "Kishore", "surname": "Mosaliganti", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp. Sci. and Eng., The Ohio State University, 2015 Neil Ave., Columbus, OH", "fullName": "Okan Irfanoglu", "givenName": "Okan", "surname": "Irfanoglu", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Hum. Cancer Gen., The Ohio State University, 420 W. 12th Ave., Columbus, OH", "fullName": "Pamela Wenzel", "givenName": "Pamela", "surname": "Wenzel", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comp. Sci. and Eng., The Ohio State University, 2015 Neil Ave., Columbus, OH", "fullName": "Raghu Machiraju", "givenName": "Raghu", "surname": "Machiraju", "__typename": "ArticleAuthorType" }, { "affiliation": "2Dept. of Hum. Cancer Gen.The Ohio State University420 W. 12th Ave., Columbus, OH", "fullName": "Alain de Bruin", "givenName": "Alain", "surname": "de Bruin", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Hum. Cancer Gen., The Ohio State University, 420 W. 12th Ave., Columbus, OH", "fullName": "Gustavo Leone", "givenName": "Gustavo", "surname": "Leone", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics, The Ohio State University, 333 W. 10th Ave., Columbus, OH", "fullName": "Tony Pan", "givenName": "Tony", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics, The Ohio State University, 333 W. 10th Ave., Columbus, OH", "fullName": "Kun Huang", "givenName": "Kun", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics, The Ohio State University, 333 W. 10th Ave., Columbus, OH", "fullName": "Joel Saltz", "givenName": "Joel", "surname": "Saltz", "__typename": "ArticleAuthorType" } ], "idPrefix": "lssa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-07-01T00:00:00", "pubType": "proceedings", "pages": "1-2", "year": "2006", "issn": null, "isbn": "1-4244-0277-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04015816", "articleId": "12OmNxETabd", "__typename": "AdjacentArticleType" }, "next": { "fno": "04015818", "articleId": "12OmNAZfxK7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcs/2017/3250/0/08035158", "title": "Algorithmic Quantification of Skull Bone Density", "doi": null, "abstractUrl": "/proceedings-article/hpcs/2017/08035158/12OmNB1eJzj", "parentPublication": { "id": "proceedings/hpcs/2017/3250/0", "title": "2017 International Conference on High-Performance Computing & Simulation (HPCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2014/6081/0/06921514", "title": "The effects of menu design on users' emotions, search performance and mouse behaviour", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2014/06921514/12OmNqEjhWP", "parentPublication": { "id": "proceedings/iccicc/2014/6081/0", "title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2009/3725/0/3725a096", "title": "Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images", "doi": null, "abstractUrl": "/proceedings-article/icdar/2009/3725a096/12OmNrkjViz", "parentPublication": { "id": "proceedings/icdar/2009/3725/0", "title": "2009 10th International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2012/1204/0/06184195", "title": "Comparison of a two-handed interface to a wand interface and a mouse interface for fundamental 3D tasks", "doi": null, "abstractUrl": "/proceedings-article/3dui/2012/06184195/12OmNwIHow8", "parentPublication": { "id": "proceedings/3dui/2012/1204/0", "title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2015/8562/0/07439529", "title": "Action-dependent state prediction in mouse posterior parietal cortex", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439529/12OmNx76TP8", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2007/01/c1038", "title": "Volume Rendering Phenotype Differences in Mouse Placenta Microscopy Data", "doi": null, "abstractUrl": "/magazine/cs/2007/01/c1038/13rRUypp53Z", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a299", "title": "[Regular Paper] Three-Dimensional Segmentation of Mouse Embryonic Stem Cell Nuclei for Quantitative Analysis of Differentiation Activity Using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a299/17D45WODasw", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2022/6812/0/681200a349", "title": "Low-Dose Mouse Micro-CT Image Segmentation Based on Multi-Resolution Multi-Organ Shape Prior Knowledge Model", "doi": null, "abstractUrl": "/proceedings-article/cipae/2022/681200a349/1KExPRoKGnm", "parentPublication": { "id": "proceedings/cipae/2022/6812/0", "title": "2022 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005976", "title": "Using Deep Convolutional Neural Network for Mouse Brain Segmentation in DT-MRI", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005976/1hJrMXfYVJ6", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itca/2019/6494/0/09092445", "title": "Analysis of ciliary beat frequency in the mouse oviduct using optical coherence tomography", "doi": null, "abstractUrl": "/proceedings-article/itca/2019/09092445/1jPaY78eAdq", "parentPublication": { "id": "proceedings/itca/2019/6494/0", "title": "2019 International Conference on Information Technology and Computer Application (ITCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwkhTjh", "title": "The Twenty-Third Southeastern Symposium on System Theory", "acronym": "ssst", "groupId": "1000732", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNBt3qqb", "doi": "10.1109/SSST.1991.138564", "title": "A review of fetal ECG detection and enhancement methodologies", "normalizedTitle": "A review of fetal ECG detection and enhancement methodologies", "abstract": "This paper presents a review of fetal electrocardiogram (FECG) detection and enhancement methodologies developed since 1960. The methods discussed include the subtraction, correlation, orthogonal basis, adaptive filtering and linear combination techniques. Subtraction is the oldest and most straightforward approach. It involves the direct subtraction of a near-thoracic maternal ECG from an abdominally-measured composite of maternal and fetal heart signals. Correlation is used for detection rather than enhancement. Other methods exist which make this technique obsolete. The most current methods for FECG detection and enhancement are the orthogonal basis, adaptive filtering and linear combination methods. These techniques were developed with the idea of producing a scheme which would allow greater flexibility in electrode positioning. An overview is given of the adaptive filter technique and the orthogonal basis methods. Finally, a method using a linear combination of electrodes to enhance FECG signals is discussed.<>", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a review of fetal electrocardiogram (FECG) detection and enhancement methodologies developed since 1960. The methods discussed include the subtraction, correlation, orthogonal basis, adaptive filtering and linear combination techniques. Subtraction is the oldest and most straightforward approach. It involves the direct subtraction of a near-thoracic maternal ECG from an abdominally-measured composite of maternal and fetal heart signals. Correlation is used for detection rather than enhancement. Other methods exist which make this technique obsolete. The most current methods for FECG detection and enhancement are the orthogonal basis, adaptive filtering and linear combination methods. These techniques were developed with the idea of producing a scheme which would allow greater flexibility in electrode positioning. An overview is given of the adaptive filter technique and the orthogonal basis methods. Finally, a method using a linear combination of electrodes to enhance FECG signals is discussed.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a review of fetal electrocardiogram (FECG) detection and enhancement methodologies developed since 1960. The methods discussed include the subtraction, correlation, orthogonal basis, adaptive filtering and linear combination techniques. Subtraction is the oldest and most straightforward approach. It involves the direct subtraction of a near-thoracic maternal ECG from an abdominally-measured composite of maternal and fetal heart signals. Correlation is used for detection rather than enhancement. Other methods exist which make this technique obsolete. The most current methods for FECG detection and enhancement are the orthogonal basis, adaptive filtering and linear combination methods. These techniques were developed with the idea of producing a scheme which would allow greater flexibility in electrode positioning. An overview is given of the adaptive filter technique and the orthogonal basis methods. Finally, a method using a linear combination of electrodes to enhance FECG signals is discussed.", "fno": "00138564", "keywords": [ "Electrocardiography", "Reviews", "Signal Processing", "ECG Enhancement", "Signal Subtraction", "Fetal ECG Detection", "Fetal Electrocardiogram", "Correlation", "Orthogonal Basis", "Adaptive Filtering", "Linear Combination Techniques", "Electrocardiography", "Abdomen", "Fetal Heart", "Fetus", "Muscles", "Electrodes", "Adaptive Filters", "Ultrasonic Imaging", "Fetal Heart Rate", "Electrophysiology" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Tennessee Univ., Knoxville, TN, USA", "fullName": "S. Horner", "givenName": "S.", "surname": "Horner", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Tennessee Univ., Knoxville, TN, USA", "fullName": "P.B. Crilly", "givenName": "P.B.", "surname": "Crilly", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "278,279,280,281,282", "year": "1991", "issn": "0094-2898", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00138563", "articleId": "12OmNCfAPDD", "__typename": "AdjacentArticleType" }, "next": { "fno": "00138565", "articleId": "12OmNqBKTWr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cic/1989/2114/0/00130542", "title": "Fetal heart rate detection by a special transform method", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130542/12OmNAndicE", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042224", "title": "Adaptive Neuro-Fuzzy Inference Systems for Extracting Fetal Electrocardiogram", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042224/12OmNqBtj6B", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/6/3736f097", "title": "A New Algorithm for Extracting Fetal Electrocardiogram", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f097/12OmNvBIRPN", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130538", "title": "Real time fetal ECG monitoring based on a personal computer using correlation technique", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130538/12OmNwNeYvu", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458112", "title": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458112/12OmNyRxFAX", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1992/2742/0/00245033", "title": "Adaptive filter application in fetal electrocardiography", "doi": null, "abstractUrl": "/proceedings-article/cbms/1992/00245033/12OmNzTH0IT", "parentPublication": { "id": "proceedings/cbms/1992/2742/0", "title": "Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130541", "title": "Arrangement of time-sequenced-adaptive-filters for a complete fetal ECG morphology recording", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130541/12OmNzmLxKn", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2021/2125/0/212500a402", "title": "A Wireless and Wearable System for Fetal Heart Rate Monitoring", "doi": null, "abstractUrl": "/proceedings-article/icaml/2021/212500a402/1B615DxqKWs", "parentPublication": { "id": "proceedings/icaml/2021/2125/0", "title": "2021 3rd International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccps/2020/5501/0/09095988", "title": "Contextually-aware Fetal Sensing in Transabdominal Fetal Pulse Oximetry", "doi": null, "abstractUrl": "/proceedings-article/iccps/2020/09095988/1jXvvoRabeM", "parentPublication": { "id": "proceedings/iccps/2020/5501/0", "title": "2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a104", "title": "Periodic Change Detection in Fetal Heart Rate Using Cardiotocograph", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a104/1mLMkaCTh1m", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwFzNYX", "title": "2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)", "acronym": "compsac", "groupId": "1000143", "volume": "2", "displayVolume": "2", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBKTXh", "doi": "10.1109/COMPSAC.2016.116", "title": "Fetal Heart Rate Monitoring System (FHRMS)", "normalizedTitle": "Fetal Heart Rate Monitoring System (FHRMS)", "abstract": "This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.", "abstracts": [ { "abstractType": "Regular", "content": "This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This article discusses a new approach to Fetal Heart Rate Monitoring System (FHRMS) via a mobile integrated Doppler device (mDoppler) for monitoring Fetal Heart Rate (FHR) remotely (i.e. home). The aim of the system is to provide ease of FHR monitoring and computing current fetus risk conditions especially for high-risk pregnancy cases via a mobile integrated Doppler device. FHRMS has its own inferring mechanism that provides to analyze current fetus conditions by considering FHR values through connecting a hand held mDoppler device to labour's abdomen during observing period at home. The instantly-gathered FHR values as output signal of the mDoppler during observation period are displayed on the labour's mobile device monitor and also input data set to the FHRMS. The inferred current fetus conditions are coded as Green, Yellow, and Red status by the FHRMS signifying the Normal, Atypical/Warning, and Abnormal/Alarm conditions of the fetus respectively. Thus FHRMS informs the responsible parents, physician and the ambulance service if alarm status is observed. In this research, FHRMS considers 10 sets of FHR instance values for the last 10 gestation weeks (started at 30th up to 40th weeks) from a subjects labour's that are traced as a case study to track the inferencing algorithms of the FHRMS. The FHRMS tracing mechanism is developed from visual analysis algorithms of (Electro Fetal Monitoring) EFM task in literature.", "fno": "8845b065", "keywords": [ "Fetal Heart Rate", "Monitoring", "Fetus", "Doppler Effect", "Acceleration", "Mobile Communication", "Medical Services", "Inferencing", "Smart Mobile Systems", "Fetal Heart Rate Monitoring System", "Mobile Integrated Doppler Devices", "E Health Systems" ], "authors": [ { "affiliation": null, "fullName": "Duygu Çelik Ertugrul", "givenName": "Duygu Çelik", "surname": "Ertugrul", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hakan Kanmaz", "givenName": "Hakan", "surname": "Kanmaz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mehmet Ugur Yüksel", "givenName": "Mehmet Ugur", "surname": "Yüksel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Atilla Elçi", "givenName": "Atilla", "surname": "Elçi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mehmet Ertugrul", "givenName": "Mehmet", "surname": "Ertugrul", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "65-70", "year": "2016", "issn": "0730-3157", "isbn": "978-1-4673-8845-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8845b064", "articleId": "12OmNAMtAPC", "__typename": "AdjacentArticleType" }, "next": { "fno": "8845b071", "articleId": "12OmNy4r3LJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csie/2009/3507/7/3507g030", "title": "Multimedia System Design Illustrating the Operation of Doppler Ultrasound Fetal Monitor in Extracting Cardiac Information", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507g030/12OmNC4eSlo", "parentPublication": { "id": "proceedings/csie/2009/3507/7", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2006/2526/0/25260090", "title": "A Real-time Mobile System for Fetal Heart Rate Monitoring and Fetal Distress Detection", "doi": null, "abstractUrl": "/proceedings-article/mdm/2006/25260090/12OmNyTwRec", "parentPublication": { "id": "proceedings/mdm/2006/2526/0", "title": "7th International Conference on Mobile Data Management (MDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bsn/2011/4431/0/4431a113", "title": "Wireless Fetal Monitoring Device with Provisions for Multiple Births", "doi": null, "abstractUrl": "/proceedings-article/bsn/2011/4431a113/12OmNylKAO7", "parentPublication": { "id": "proceedings/bsn/2011/4431/0", "title": "Wearable and Implantable Body Sensor Networks, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2005/9313/0/01577097", "title": "Empirical mode decomposition (EMD) for multi-gate, multi-transducer ultrasound Doppler fetal heart monitoring", "doi": null, "abstractUrl": "/proceedings-article/isspit/2005/01577097/12OmNznkJVJ", "parentPublication": { "id": "proceedings/isspit/2005/9313/0", "title": "2005 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2018/5488/0/08621262", "title": "A tree-search method for single-channel fetal QRS complexes detection in fetal heart rate monitoring", "doi": null, "abstractUrl": "/proceedings-article/bibm/2018/08621262/17D45VTRoAI", "parentPublication": { "id": "proceedings/bibm/2018/5488/0", "title": "2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258397", "title": "High dimensional data processing for fetal activity evaluation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258397/17D45X2fUEg", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2021/2125/0/212500a402", "title": "A Wireless and Wearable System for Fetal Heart Rate Monitoring", "doi": null, "abstractUrl": "/proceedings-article/icaml/2021/212500a402/1B615DxqKWs", "parentPublication": { "id": "proceedings/icaml/2021/2125/0", "title": "2021 3rd International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995462", "title": "Association rule analysis for fetal heart rate pattern of late FGR", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995462/1JC3ru0znlC", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itca/2019/6494/0/09092449", "title": "Fetal Heart Baseline Extraction And Classification based on Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/itca/2019/09092449/1jPaXdB6gqQ", "parentPublication": { "id": "proceedings/itca/2019/6494/0", "title": "2019 International Conference on Information Technology and Computer Application (ITCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a104", "title": "Periodic Change Detection in Fetal Heart Rate Using Cardiotocograph", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a104/1mLMkaCTh1m", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQ7FQU", "title": "Proceedings Visualization '93", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNx76TIn", "doi": "10.1109/VISUAL.1993.398903", "title": "3D simulation of delivery", "normalizedTitle": "3D simulation of delivery", "abstract": "We show how to create 3D models of maternal pelvis and fetal head from magnetic resonance images (MRI). The models are used to simulate the progress of delivery in order to give a prognosis of successful labor.<>", "abstracts": [ { "abstractType": "Regular", "content": "We show how to create 3D models of maternal pelvis and fetal head from magnetic resonance images (MRI). The models are used to simulate the progress of delivery in order to give a prognosis of successful labor.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We show how to create 3D models of maternal pelvis and fetal head from magnetic resonance images (MRI). The models are used to simulate the progress of delivery in order to give a prognosis of successful labor.", "fno": "00398903", "keywords": [ "Digital Simulation", "Physiological Models", "Medical Image Processing", "Bone", "3 D Simulation", "3 D Models", "Maternal Pelvis", "Fetal Head", "Magnetic Resonance Images", "Delivery", "Prognosis", "Successful Labor", "Magnetic Heads", "Pelvis", "Solid Modeling", "Magnetic Resonance Imaging", "Shape", "Time Measurement", "Joining Processes", "Interpolation", "Magnetic Resonance", "Fetus" ], "authors": [ { "affiliation": "I.N.R.I.A., Sophia-Antipolis, France", "fullName": "J.-D. Boissonnat", "givenName": "J.-D.", "surname": "Boissonnat", "__typename": "ArticleAuthorType" }, { "affiliation": "I.N.R.I.A., Sophia-Antipolis, France", "fullName": "B. Geiger", "givenName": "B.", "surname": "Geiger", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "416,417,418,419", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00398902", "articleId": "12OmNzX6cqi", "__typename": "AdjacentArticleType" }, "next": { "fno": "00398904", "articleId": "12OmNyqzM07", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ssst/1991/2190/0/00138564", "title": "A review of fetal ECG detection and enhancement methodologies", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138564/12OmNBt3qqb", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437a600", "title": "Multi-Atlas Based Pseudo-CT Synthesis Using Multimodal Image Registration and Local Atlas Fusion Strategies", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437a600/12OmNrK9q5k", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2015/0481/0/07394359", "title": "3D reconstruction from multiple imaging planes: A pilot study of bone tumor MR images", "doi": null, "abstractUrl": "/proceedings-article/isspit/2015/07394359/12OmNyKJiCg", "parentPublication": { "id": "proceedings/isspit/2015/0481/0", "title": "2015 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458112", "title": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458112/12OmNyRxFAX", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206527", "title": "Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206527/12OmNylKASE", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130541", "title": "Arrangement of time-sequenced-adaptive-filters for a complete fetal ECG morphology recording", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130541/12OmNzmLxKn", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07864470", "title": "Placenta Maps: In Utero Placental Health Assessment of the Human Fetus", "doi": null, "abstractUrl": "/journal/tg/2017/06/07864470/13rRUxlgxTq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a659", "title": "Landmark-based mixed-reality perceptual alignment of medical imaging data and accuracy validation in living subjects", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a659/1pysuKaUadi", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313205", "title": "Detection of Fetal Single Gene Mutations through Targeted Sequencing of Maternal cell-free DNA", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313205/1qmg1ZwIExy", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600a512", "title": "Detection and Analysis of Fetal Movements Using an Acoustic Sensor-based Wearable Monitor", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600a512/1x3kRIr21Yk", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAK", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "acronym": "isspit", "groupId": "1001026", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNyRxFAX", "doi": "10.1109/ISSPIT.2007.4458112", "title": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "normalizedTitle": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "abstract": "The abdominal ECG is a composite signal because it contains both the mother's and the fetus' ECG signals, but the chest ECG is supposed to have only maternal (MECG) component. In this paper, we use three different adaptive algorithms to remove FECG signal from the abdominal ECG. All procedures are applied to real multichannel ECG recordings obtained from a pregnant woman. We explain and compare the use of multichannel APA, RLS, and QR-RLS in time-domain for fetal electrocardiogram (FECG) extraction from four ECG signals recorded at the abdominal and chest areas of mother's skin. The results show that the multichannel QR-RLS is more effective than multichannel APA and RLS in this important biomedical application.", "abstracts": [ { "abstractType": "Regular", "content": "The abdominal ECG is a composite signal because it contains both the mother's and the fetus' ECG signals, but the chest ECG is supposed to have only maternal (MECG) component. In this paper, we use three different adaptive algorithms to remove FECG signal from the abdominal ECG. All procedures are applied to real multichannel ECG recordings obtained from a pregnant woman. We explain and compare the use of multichannel APA, RLS, and QR-RLS in time-domain for fetal electrocardiogram (FECG) extraction from four ECG signals recorded at the abdominal and chest areas of mother's skin. The results show that the multichannel QR-RLS is more effective than multichannel APA and RLS in this important biomedical application.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The abdominal ECG is a composite signal because it contains both the mother's and the fetus' ECG signals, but the chest ECG is supposed to have only maternal (MECG) component. In this paper, we use three different adaptive algorithms to remove FECG signal from the abdominal ECG. All procedures are applied to real multichannel ECG recordings obtained from a pregnant woman. We explain and compare the use of multichannel APA, RLS, and QR-RLS in time-domain for fetal electrocardiogram (FECG) extraction from four ECG signals recorded at the abdominal and chest areas of mother's skin. The results show that the multichannel QR-RLS is more effective than multichannel APA and RLS in this important biomedical application.", "fno": "04458112", "keywords": [ "Electrocardiography", "Recursion Method", "Maternal Skin Electrodes", "Affine Projection Algorithm", "Recursive Least Square", "QR RLS Algorithms", "Abdominal ECG", "ECG Signals", "Maternal Component", "FECG Signal", "Real Multichannel ECG", "Pregnant Woman", "Multichannel APA", "Fetal Electrocardiogram Extraction", "Multichannel QR RLS", "Skin", "Electrodes", "Projection Algorithms", "Least Squares Methods", "Resonance Light Scattering", "Electrocardiography", "Abdomen", "Fetus", "Adaptive Algorithm", "Pregnancy", "Fetal ECG FECG", "Maternal ECG MECG", "APA", "RLS", "QR RLS" ], "authors": [ { "affiliation": "Department of Electrical and Computer Engineering, the University of Western Ontario, London, Ontario, Canada, N6A 5B9", "fullName": "Aryan Salmanpour", "givenName": "Aryan", "surname": "Salmanpour", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, the University of Western Ontario, London, Ontario, Canada, N6A 5B9", "fullName": "Nikjoo S. Mohammad", "givenName": "Nikjoo S.", "surname": "Mohammad", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Information Technology, Munich University of Technology, Munchen, Bavaria, Germany, 80333", "fullName": "Arash Saber Tehrani", "givenName": "Arash Saber", "surname": "Tehrani", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer Engineering, University of Texas at San Antonio, Texas, USA, 78249-0665", "fullName": "Seyed Mohammad Amin Moghadas", "givenName": "Seyed Mohammad Amin", "surname": "Moghadas", "__typename": "ArticleAuthorType" } ], "idPrefix": "isspit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2007", "issn": "2162-7843", "isbn": "978-1-4244-1834-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04458111", "articleId": "12OmNzYNN6J", "__typename": "AdjacentArticleType" }, "next": { "fno": "04458113", "articleId": "12OmNxGAKW1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cic/1989/2114/0/00130542", "title": "Fetal heart rate detection by a special transform method", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130542/12OmNAndicE", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/2/3118b492", "title": "Signal Processing Based for Fetal Electrocardiogram Extraction", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118b492/12OmNBOUxpZ", "parentPublication": { "id": "proceedings/bmei/2008/3118/2", "title": "BioMedical Engineering and Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cimca/2006/2731/0/04052801", "title": "Fetal ECG Extraction Using Wavelet Transform", "doi": null, "abstractUrl": "/proceedings-article/cimca/2006/04052801/12OmNBhZ4oq", "parentPublication": { "id": "proceedings/cimca/2006/2731/0", "title": "2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1991/2190/0/00138564", "title": "A review of fetal ECG detection and enhancement methodologies", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138564/12OmNBt3qqb", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042224", "title": "Adaptive Neuro-Fuzzy Inference Systems for Extracting Fetal Electrocardiogram", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042224/12OmNqBtj6B", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130538", "title": "Real time fetal ECG monitoring based on a personal computer using correlation technique", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130538/12OmNwNeYvu", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042324", "title": "What ICA Provides for ECG Processing: Application to Noninvasive Fetal ECG Extraction", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042324/12OmNyz5JXu", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paciia/2008/3490/1/3490a804", "title": "Fetal Electrocardiogram Extraction by Local Projections in Embedding Spaces", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a804/12OmNz5apJu", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1992/2742/0/00245033", "title": "Adaptive filter application in fetal electrocardiography", "doi": null, "abstractUrl": "/proceedings-article/cbms/1992/00245033/12OmNzTH0IT", "parentPublication": { "id": "proceedings/cbms/1992/2742/0", "title": "Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130541", "title": "Arrangement of time-sequenced-adaptive-filters for a complete fetal ECG morphology recording", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130541/12OmNzmLxKn", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4r3R2", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNylKASE", "doi": "10.1109/CVPR.2009.5206527", "title": "Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information", "normalizedTitle": "Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information", "abstract": "3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is cumbersome and time-consuming even for expert physicians and sonographers. In this paper we propose a learning-based approach which combines both 3D and 2D information for automatic and fast fetal face detection from 3D ultrasound volumes. Our approach applies a new technique - constrained marginal space learning - for 3D face mesh detection, and combines a boosting-based 2D profile detection to refine 3D face pose. To enhance the rendering of the fetal face, an automatic carving algorithm is proposed to remove all obstructions in front of the face based on the detected face mesh. Experiments are performed on a challenging 3D ultrasound data set containing 1010 fetal volumes. The results show that our system not only achieves excellent detection accuracy but also runs very fast - it can detect the fetal face from the 3D data in 1 second on a dual-core 2.0 GHz computer.", "abstracts": [ { "abstractType": "Regular", "content": "3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is cumbersome and time-consuming even for expert physicians and sonographers. In this paper we propose a learning-based approach which combines both 3D and 2D information for automatic and fast fetal face detection from 3D ultrasound volumes. Our approach applies a new technique - constrained marginal space learning - for 3D face mesh detection, and combines a boosting-based 2D profile detection to refine 3D face pose. To enhance the rendering of the fetal face, an automatic carving algorithm is proposed to remove all obstructions in front of the face based on the detected face mesh. Experiments are performed on a challenging 3D ultrasound data set containing 1010 fetal volumes. The results show that our system not only achieves excellent detection accuracy but also runs very fast - it can detect the fetal face from the 3D data in 1 second on a dual-core 2.0 GHz computer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is cumbersome and time-consuming even for expert physicians and sonographers. In this paper we propose a learning-based approach which combines both 3D and 2D information for automatic and fast fetal face detection from 3D ultrasound volumes. Our approach applies a new technique - constrained marginal space learning - for 3D face mesh detection, and combines a boosting-based 2D profile detection to refine 3D face pose. To enhance the rendering of the fetal face, an automatic carving algorithm is proposed to remove all obstructions in front of the face based on the detected face mesh. Experiments are performed on a challenging 3D ultrasound data set containing 1010 fetal volumes. The results show that our system not only achieves excellent detection accuracy but also runs very fast - it can detect the fetal face from the 3D data in 1 second on a dual-core 2.0 GHz computer.", "fno": "05206527", "keywords": [ "Biomedical Ultrasonics", "Feature Extraction", "Learning Artificial Intelligence", "Medical Image Processing", "Automatic Fetal Face Detection", "3 D Information", "2 D Information", "3 D Ultrasound Imaging", "Fetal Examination", "Learning Based Approach", "3 D Ultrasound Volumes", "Constrained Marginal Space Learning", "3 D Face Mesh Detection", "2 D Profile Detection", "3 D Face Pose", "Automatic Carving", "Face Detection", "Ultrasonic Imaging", "Fetus", "Magnetic Resonance Imaging", "Biomedical Imaging", "Computed Tomography", "Navigation", "Computer Vision", "Eyes", "Nose" ], "authors": [ { "affiliation": "Integrated Data Systems Department, Siemens Corporate Research, Princeton, NJ 08540, USA", "fullName": "Shaolei Feng", "givenName": null, "surname": "Shaolei Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Integrated Data Systems Department, Siemens Corporate Research, Princeton, NJ 08540, USA", "fullName": "S. Kevin Zhou", "givenName": "S. Kevin", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Siemens Medical Solutions, Innovations Division, CA 94043, USA", "fullName": "Sara Good", "givenName": "Sara", "surname": "Good", "__typename": "ArticleAuthorType" }, { "affiliation": "Integrated Data Systems Department, Siemens Corporate Research, Princeton, NJ 08540, USA", "fullName": "Dorin Comaniciu", "givenName": "Dorin", "surname": "Comaniciu", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "2488-2495", "year": "2009", "issn": "1063-6919", "isbn": "978-1-4244-3992-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05206526", "articleId": "12OmNvSKNVE", "__typename": "AdjacentArticleType" }, "next": { "fno": "05206528", "articleId": "12OmNwJgAHg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/compsac/2012/4736/0/4736a354", "title": "Image Analysis Using Machine Learning: Anatomical Landmarks Detection in Fetal Ultrasound Images", "doi": null, "abstractUrl": "/proceedings-article/compsac/2012/4736a354/12OmNvrMUiM", "parentPublication": { "id": "proceedings/compsac/2012/4736/0", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vbc/1990/2039/0/00109361", "title": "3D ultrasound display using optical tracking", "doi": null, "abstractUrl": "/proceedings-article/vbc/1990/00109361/12OmNwErpIq", "parentPublication": { "id": "proceedings/vbc/1990/2039/0", "title": "[1990] Proceedings of the First Conference on Visualization in Biomedical Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2013/5545/0/06553722", "title": "Automatic fetal face detection by locating fetal facial features from 3D ultrasound images for navigating fetoscopic tracheal occlusion surgeries", "doi": null, "abstractUrl": "/proceedings-article/fg/2013/06553722/12OmNzcPAFe", "parentPublication": { "id": "proceedings/fg/2013/5545/0", "title": "2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2008/2242/0/04587358", "title": "Semantic-based indexing of fetal anatomies from 3-D ultrasound data using global/semi-local context and sequential sampling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2008/04587358/12OmNzd7c14", "parentPublication": { "id": "proceedings/cvpr/2008/2242/0", "title": "2008 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130541", "title": "Arrangement of time-sequenced-adaptive-filters for a complete fetal ECG morphology recording", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130541/12OmNzmLxKn", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2017/1235/0/08457976", "title": "Categorizating 3D Fetal Ultrasound Image Database in First Trimester Pregnancy based on Mid-Sagittal Plane Assessments", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457976/13xI8AOXccU", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258397", "title": "High dimensional data processing for fetal activity evaluation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258397/17D45X2fUEg", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/01/08168366", "title": "Directional 3D Wavelet Transform Based on Gaussian Mixtures for the Analysis of 3D Ultrasound Ovarian Volumes", "doi": null, "abstractUrl": "/journal/tp/2019/01/08168366/17D45XvMcdc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09971775", "title": "The End-to-end Fetal Head Circumference Detection and Estimation in Ultrasound Images", "doi": null, "abstractUrl": "/journal/tb/5555/01/09971775/1ISVBvq9k1W", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09950712", "title": "A YOLOX-based Deep Instance Segmentation Neural Network for Cardiac Anatomical Structures in Fetal Ultrasound Images", "doi": null, "abstractUrl": "/journal/tb/5555/01/09950712/1Ik4BqzqcyQ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYoKlP", "title": "Emerging Trends in Engineering & Technology, International Conference on", "acronym": "icetet", "groupId": "1002112", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNz5s0OD", "doi": "10.1109/ICETET.2009.231", "title": "Wavelet Based Features for Ultrasound Placenta Images Classification", "normalizedTitle": "Wavelet Based Features for Ultrasound Placenta Images Classification", "abstract": "Medical Diagnosis is the utmost need of an hour. Gestational Diabetics in women represents the second leading cause of yielding children born with birth defects. The ultrasound images are usually low in resolution making diagnosis difficult. Specialized tools are required to assist the medical experts to categorize and diagnose diseases to accuracy. If the anomalies in the ultrasound images are detected in the preliminary screening of placenta, fetal loss could be minimized. This pilot study was carried out to find the feasibility for detecting anomalies in placental growth due to the implications of gestational diabetics by considering the stereo image mapping based on wavelet analysis for 2D reconstruction. The research uses wavelet based methods to extract features from the ultrasonic images of placenta. The shape of the placenta is generated using the Back Propagation Network. Euclidean Distance Classifier is used for classifying the ultrasonic images of placenta.", "abstracts": [ { "abstractType": "Regular", "content": "Medical Diagnosis is the utmost need of an hour. Gestational Diabetics in women represents the second leading cause of yielding children born with birth defects. The ultrasound images are usually low in resolution making diagnosis difficult. Specialized tools are required to assist the medical experts to categorize and diagnose diseases to accuracy. If the anomalies in the ultrasound images are detected in the preliminary screening of placenta, fetal loss could be minimized. This pilot study was carried out to find the feasibility for detecting anomalies in placental growth due to the implications of gestational diabetics by considering the stereo image mapping based on wavelet analysis for 2D reconstruction. The research uses wavelet based methods to extract features from the ultrasonic images of placenta. The shape of the placenta is generated using the Back Propagation Network. Euclidean Distance Classifier is used for classifying the ultrasonic images of placenta.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Medical Diagnosis is the utmost need of an hour. Gestational Diabetics in women represents the second leading cause of yielding children born with birth defects. The ultrasound images are usually low in resolution making diagnosis difficult. Specialized tools are required to assist the medical experts to categorize and diagnose diseases to accuracy. If the anomalies in the ultrasound images are detected in the preliminary screening of placenta, fetal loss could be minimized. This pilot study was carried out to find the feasibility for detecting anomalies in placental growth due to the implications of gestational diabetics by considering the stereo image mapping based on wavelet analysis for 2D reconstruction. The research uses wavelet based methods to extract features from the ultrasonic images of placenta. The shape of the placenta is generated using the Back Propagation Network. Euclidean Distance Classifier is used for classifying the ultrasonic images of placenta.", "fno": "pid982614", "keywords": [], "authors": [ { "affiliation": null, "fullName": "G. Malathi", "givenName": "G.", "surname": "Malathi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "V. Shanthi", "givenName": "V.", "surname": "Shanthi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icetet", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "341-345", "year": "2009", "issn": null, "isbn": "978-0-7695-3884-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "pid982356", "articleId": "12OmNBlofNR", "__typename": "AdjacentArticleType" }, "next": { "fno": "pid977574", "articleId": "12OmNyQ7G19", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aiccsa/2005/8735/0/01387120", "title": "Watershed segmentation for carotid artery ultrasound images", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2005/01387120/12OmNqBKTTd", "parentPublication": { "id": "proceedings/aiccsa/2005/8735/0", "title": "The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2007/0909/0/04228346", "title": "On the Security of Ultrasound as Out-of-band Channel", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2007/04228346/12OmNqGitQz", "parentPublication": { "id": "proceedings/ipdps/2007/0909/0", "title": "2007 IEEE International Parallel and Distributed Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/3/01326596", "title": "A novel segmentation technique for carotid ultrasound images", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326596/12OmNvIfDPb", "parentPublication": { "id": "proceedings/icassp/2004/8484/3", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccta/2007/2770/0/27700382", "title": "Analysis of Ultrasound Kidney Images Using Content Descriptive Multiple Features for Disorder Identification and ANN Based Classification", "doi": null, "abstractUrl": "/proceedings-article/iccta/2007/27700382/12OmNwwMeWU", "parentPublication": { "id": "proceedings/iccta/2007/2770/0", "title": "International Conference on Computing: Theory and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/at-equal/2009/3753/0/3753a100", "title": "Development of Pseudo 3D Visualization System by Superimposing Ultrasound Images", "doi": null, "abstractUrl": "/proceedings-article/at-equal/2009/3753a100/12OmNxcdFWy", "parentPublication": { "id": "proceedings/at-equal/2009/3753/0", "title": "Advanced Technologies for Enhanced Quality of Life", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143a448", "title": "Enhancement and Denoising Method of Medical Ultrasound Image Based on Wavelet Analysis and Fuzzy Theory", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143a448/12OmNxwWoAA", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2009/4027/0/4027a122", "title": "Speckle Noise Suppression Techniques for Ultrasound Images", "doi": null, "abstractUrl": "/proceedings-article/icicse/2009/4027a122/12OmNz5apEs", "parentPublication": { "id": "proceedings/icicse/2009/4027/0", "title": "2009 Fourth International Conference on Internet Computing for Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2021/05/08994094", "title": "Revitalizing Ultrasonic Positioning Systems for Ultrasound-Incapable Smart Devices", "doi": null, "abstractUrl": "/journal/tm/2021/05/08994094/1hkQJxyvZrW", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a416", "title": "UPI-Net: Semantic Contour Detection in Placental Ultrasound", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a416/1i5mkNH2e1a", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412758", "title": "Edge-guided CNN for Denoising Images from Portable Ultrasound Devices", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412758/1tmhpqOp14I", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BogMj9AZB6", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "acronym": "csde", "groupId": "1837144", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BogMz4gFJm", "doi": "10.1109/CSDE53843.2021.9718415", "title": "Cardiotocogram Biomedical Signal Classification and Interpretation for Fetal Health Evaluation", "normalizedTitle": "Cardiotocogram Biomedical Signal Classification and Interpretation for Fetal Health Evaluation", "abstract": "Maternal and Neonatal health has been greatly constrained by the in-access to essential maternal health care services due to the preventive measures implemented against the spread of covid-19 hence making maternal and fetal monitoring so hard for physicians. Besides maternal toxic stress caused by fear of catching covid-19, affordable mobility of pregnant mothers to skilled health practitioners in limited resource settings is another contributor to maternal and neonatal mortality and morbidity. In this work, we leveraged existing health data to build interpretable Machine Learning (ML) models that allow physicians to offer precision maternal and fetal medicine based on biomedical signal classification results of fetal cardiotocograms (CTGs).We obtained 99&#x0025;, 100&#x0025; and 97&#x0025; accuracy, precision and recall respectively for the LightGBM classification model without any GPU Learning resources. Then we explainably evaluated all built models with ELI5 and comprehensive feature extraction.", "abstracts": [ { "abstractType": "Regular", "content": "Maternal and Neonatal health has been greatly constrained by the in-access to essential maternal health care services due to the preventive measures implemented against the spread of covid-19 hence making maternal and fetal monitoring so hard for physicians. Besides maternal toxic stress caused by fear of catching covid-19, affordable mobility of pregnant mothers to skilled health practitioners in limited resource settings is another contributor to maternal and neonatal mortality and morbidity. In this work, we leveraged existing health data to build interpretable Machine Learning (ML) models that allow physicians to offer precision maternal and fetal medicine based on biomedical signal classification results of fetal cardiotocograms (CTGs).We obtained 99&#x0025;, 100&#x0025; and 97&#x0025; accuracy, precision and recall respectively for the LightGBM classification model without any GPU Learning resources. Then we explainably evaluated all built models with ELI5 and comprehensive feature extraction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Maternal and Neonatal health has been greatly constrained by the in-access to essential maternal health care services due to the preventive measures implemented against the spread of covid-19 hence making maternal and fetal monitoring so hard for physicians. Besides maternal toxic stress caused by fear of catching covid-19, affordable mobility of pregnant mothers to skilled health practitioners in limited resource settings is another contributor to maternal and neonatal mortality and morbidity. In this work, we leveraged existing health data to build interpretable Machine Learning (ML) models that allow physicians to offer precision maternal and fetal medicine based on biomedical signal classification results of fetal cardiotocograms (CTGs).We obtained 99%, 100% and 97% accuracy, precision and recall respectively for the LightGBM classification model without any GPU Learning resources. Then we explainably evaluated all built models with ELI5 and comprehensive feature extraction.", "fno": "09718415", "keywords": [ "Biomedical Ultrasonics", "Feature Extraction", "Health Care", "Learning Artificial Intelligence", "Medical Signal Processing", "Obstetrics", "Patient Monitoring", "Signal Classification", "Neonatal Mortality", "Fetal Cardiotocograms", "Light GBM Classification Model", "Cardiotocogram Biomedical Signal Classification", "Fetal Health Evaluation", "Fetal Monitoring", "Maternal Toxic Stress", "Pregnant Mothers", "GPU Learning Resources", "Feature Extraction", "Pregnancy", "COVID 19", "Pediatrics", "Biological System Modeling", "Computational Modeling", "Surveillance", "Pattern Classification", "Explainable Artificial Intelligence XAI", "Maternal And Child Health", "Biomedical Signal Processing", "Fetal Health", "Predictive And Preventive Medicine" ], "authors": [ { "affiliation": "Brac University,Department of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Ggaliwango Marvin", "givenName": "Ggaliwango", "surname": "Marvin", "__typename": "ArticleAuthorType" }, { "affiliation": "Brac University,Department of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Md. Golam Rabiul Alam", "givenName": "Md. Golam Rabiul", "surname": "Alam", "__typename": "ArticleAuthorType" } ], "idPrefix": "csde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-9552-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09718469", "articleId": "1BogOGLRqxi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09718464", "articleId": "1Boh0MjXaVO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/snpd/2015/8676/0/07176205", "title": "Data mining techniques to analyze the reason for home birth in Bangladesh", "doi": null, "abstractUrl": "/proceedings-article/snpd/2015/07176205/12OmNBNM90I", "parentPublication": { "id": "proceedings/snpd/2015/8676/0", "title": "2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327140", "title": "Prediction of pregnancy-induced hypertension using coherence analysis", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327140/12OmNBtCCEO", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2015/8828/0/8828a646", "title": "Low Birth Weight Prediction Based on Maternal and Fetal Characteristics", "doi": null, "abstractUrl": "/proceedings-article/itng/2015/8828a646/12OmNqJHFLA", "parentPublication": { "id": "proceedings/itng/2015/8828/0", "title": "2015 12th International Conference on Information Technology - New Generations (ITNG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsacw/2014/3578/0/3578a678", "title": "Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2014/3578a678/12OmNrIrPuB", "parentPublication": { "id": "proceedings/compsacw/2014/3578/0", "title": "2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1992/2742/0/00245033", "title": "Adaptive filter application in fetal electrocardiography", "doi": null, "abstractUrl": "/proceedings-article/cbms/1992/00245033/12OmNzTH0IT", "parentPublication": { "id": "proceedings/cbms/1992/2742/0", "title": "Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669694", "title": "Effective techniques for intelligent cardiotocography interpretation using XGB-RF feature selection and stacking fusion", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669694/1A9Wyijo0Cs", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a483", "title": "Predict Pregnancy Outcomes in the COVID-19 Pandemic Using Electronic Health Records and Machine Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a483/1GvdBX9gTvO", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a659", "title": "Improving Prediction and Risk Factor Analysis of Low Birthweight Baby Outcomes in a U.S. Hospital System", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a659/1GvdGcO4lhe", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a847", "title": "Fetal Heart Beat detection based on Empirical Mode Decomposition, Signal Quality Indices and Correlation Analysis", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a847/1pBMqCRe5u8", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600a512", "title": "Detection and Analysis of Fetal Movements Using an Acoustic Sensor-based Wearable Monitor", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600a512/1x3kRIr21Yk", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pBMmiabSDK", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pBMqCRe5u8", "doi": "10.1109/BIBE50027.2020.00144", "title": "Fetal Heart Beat detection based on Empirical Mode Decomposition, Signal Quality Indices and Correlation Analysis", "normalizedTitle": "Fetal Heart Beat detection based on Empirical Mode Decomposition, Signal Quality Indices and Correlation Analysis", "abstract": "The purpose of fetal monitoring during childbirth is the early recognition of any pathological conditions to guide a clinician in early intervention to avoid any complication in the health of the fetus. Non-Invasive Fetal Electrocardiography (NIFECG) represents an alternative fetal monitoring technique. The fetal ECG (fECG) derived from maternal thoracic and abdominal ECG recordings, provides an alternative to typical embryo monitoring means. In addition, it allows for long-term and ambulatory registrations that broaden the diagnostic capabilities for assessing the fetal health. However, in real situations, clear fECG is difficult to extract because it is usually overwhelmed by the dominant maternal ECG and other contaminated noise such as baseline wander and high-frequency interference. In this paper, a novel integrated adaptive methodology based on the combination of blind source separation, empirical mode decomposition, wavelet shrinkage denoising and correlation analysis, for the non-invasive extraction and processing of the FECG, is proposed. The methodology has been evaluated using both real and simulated recordings, and the obtained results indicate it efficiently.", "abstracts": [ { "abstractType": "Regular", "content": "The purpose of fetal monitoring during childbirth is the early recognition of any pathological conditions to guide a clinician in early intervention to avoid any complication in the health of the fetus. Non-Invasive Fetal Electrocardiography (NIFECG) represents an alternative fetal monitoring technique. The fetal ECG (fECG) derived from maternal thoracic and abdominal ECG recordings, provides an alternative to typical embryo monitoring means. In addition, it allows for long-term and ambulatory registrations that broaden the diagnostic capabilities for assessing the fetal health. However, in real situations, clear fECG is difficult to extract because it is usually overwhelmed by the dominant maternal ECG and other contaminated noise such as baseline wander and high-frequency interference. In this paper, a novel integrated adaptive methodology based on the combination of blind source separation, empirical mode decomposition, wavelet shrinkage denoising and correlation analysis, for the non-invasive extraction and processing of the FECG, is proposed. The methodology has been evaluated using both real and simulated recordings, and the obtained results indicate it efficiently.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The purpose of fetal monitoring during childbirth is the early recognition of any pathological conditions to guide a clinician in early intervention to avoid any complication in the health of the fetus. Non-Invasive Fetal Electrocardiography (NIFECG) represents an alternative fetal monitoring technique. The fetal ECG (fECG) derived from maternal thoracic and abdominal ECG recordings, provides an alternative to typical embryo monitoring means. In addition, it allows for long-term and ambulatory registrations that broaden the diagnostic capabilities for assessing the fetal health. However, in real situations, clear fECG is difficult to extract because it is usually overwhelmed by the dominant maternal ECG and other contaminated noise such as baseline wander and high-frequency interference. In this paper, a novel integrated adaptive methodology based on the combination of blind source separation, empirical mode decomposition, wavelet shrinkage denoising and correlation analysis, for the non-invasive extraction and processing of the FECG, is proposed. The methodology has been evaluated using both real and simulated recordings, and the obtained results indicate it efficiently.", "fno": "957400a847", "keywords": [ "Blind Source Separation", "Electrocardiography", "Hilbert Transforms", "Medical Signal Processing", "Obstetrics", "Patient Monitoring", "Signal Denoising", "Noninvasive Fetal Electrocardiography", "Fetal Monitoring", "Fetal ECG", "Maternal Thoracic ECG Recordings", "Fetal Health", "High Frequency Interference", "Empirical Mode Decomposition", "Correlation Analysis", "Signal Quality Indices", "Childbirth", "Fetal Heart Beat Detection", "Embryo Monitoring", "Blind Source Separation", "Wavelet Shrinkage Denoising", "Maternal Abdominal ECG Recordings", "Pediatrics", "Pathology", "Empirical Mode Decomposition", "Correlation", "Electrocardiography", "Wavelet Analysis", "Monitoring", "Blind Source Separation", "Empirical Mode Decomposition", "Wavelet Denoising", "Correlation Analysis", "Signal Quality Indices" ], "authors": [ { "affiliation": "University of Ioannina,Department of Informatics and Telecommunication,Arta,Greece", "fullName": "Theodoros Lampros", "givenName": "Theodoros", "surname": "Lampros", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Ioannina,Department of Informatics and Telecommunication,Arta,Greece", "fullName": "Konstantinos Kalafatakis", "givenName": "Konstantinos", "surname": "Kalafatakis", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Institute “Progress in Practice”,Athens,Greece", "fullName": "Ioannis G. Violaris", "givenName": "Ioannis G.", "surname": "Violaris", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Ioannina,Department of Informatics and Telecommunication,Arta,Greece", "fullName": "Nikolaos Giannakeas", "givenName": "Nikolaos", "surname": "Giannakeas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Ioannina,Department of Informatics and Telecommunication,Arta,Greece", "fullName": "Alexandros T. Tzallas", "givenName": "Alexandros T.", "surname": "Tzallas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Western Macedonia,Dept. of Electrical and Computer Engineering,Kozani,Greece", "fullName": "Markos G. Tsipouras", "givenName": "Markos G.", "surname": "Tsipouras", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "847-852", "year": "2020", "issn": null, "isbn": "978-1-7281-9574-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "957400a839", "articleId": "1pBMvsDUeEE", "__typename": "AdjacentArticleType" }, "next": { "fno": "957400a853", "articleId": "1pBMnIAO5ZS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2006/2517/0/25170347", "title": "A Method for Fetal Heart Rate Extraction Based on Time-Frequency Analysis", "doi": null, "abstractUrl": "/proceedings-article/cbms/2006/25170347/12OmNASILOP", "parentPublication": { "id": "proceedings/cbms/2006/2517/0", "title": "19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1991/2190/0/00138564", "title": "A review of fetal ECG detection and enhancement methodologies", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138564/12OmNBt3qqb", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042224", "title": "Adaptive Neuro-Fuzzy Inference Systems for Extracting Fetal Electrocardiogram", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042224/12OmNqBtj6B", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2009/3736/6/3736f097", "title": "A New Algorithm for Extracting Fetal Electrocardiogram", "doi": null, "abstractUrl": "/proceedings-article/icnc/2009/3736f097/12OmNvBIRPN", "parentPublication": { "id": "proceedings/icnc/2009/3736/6", "title": "2009 Fifth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130538", "title": "Real time fetal ECG monitoring based on a personal computer using correlation technique", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130538/12OmNwNeYvu", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458112", "title": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458112/12OmNyRxFAX", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1992/2742/0/00245033", "title": "Adaptive filter application in fetal electrocardiography", "doi": null, "abstractUrl": "/proceedings-article/cbms/1992/00245033/12OmNzTH0IT", "parentPublication": { "id": "proceedings/cbms/1992/2742/0", "title": "Proceedings Fifth Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/1989/2114/0/00130541", "title": "Arrangement of time-sequenced-adaptive-filters for a complete fetal ECG morphology recording", "doi": null, "abstractUrl": "/proceedings-article/cic/1989/00130541/12OmNzmLxKn", "parentPublication": { "id": "proceedings/cic/1989/2114/0", "title": "Proceedings Computers in Cardiology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2018/7568/0/08642696", "title": "Extraction of Fetal Electrocardiogram signals using Blind Source Extraction Based Parallel Linear Predictor Filter", "doi": null, "abstractUrl": "/proceedings-article/isspit/2018/08642696/17QjJceYHSb", "parentPublication": { "id": "proceedings/isspit/2018/7568/0", "title": "2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2018/7568/0/08642620", "title": "Extraction of Fetal Electrocardiogram signals using Blind Source Extraction Based Parallel Linear Predictor Filter", "doi": null, "abstractUrl": "/proceedings-article/isspit/2018/08642620/17QjJeZi1UM", "parentPublication": { "id": "proceedings/isspit/2018/7568/0", "title": "2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qmfHK8AjMQ", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qmg1ZwIExy", "doi": "10.1109/BIBM49941.2020.9313205", "title": "Detection of Fetal Single Gene Mutations through Targeted Sequencing of Maternal cell-free DNA", "normalizedTitle": "Detection of Fetal Single Gene Mutations through Targeted Sequencing of Maternal cell-free DNA", "abstract": "Non-invasive prenatal tests are available for chromosomal aneuploidy but not for monogenic diseases yet. This study aimed to develop analysis method for detecting fetal mutation status by using only maternal blood sample. We introduce two different approaches to detect a fetal mutation of the Duchene Muscular Dystrophy (DMD) gene. The algorithms are consisted of two steps: detection of mutation types and regions and determination of fetal mutation status. For the second step, one approach uses allele frequencies of heterozygous sites and the other approach uses relative read depth that is the read depths of cfDNA divided by gDNA of the mother.", "abstracts": [ { "abstractType": "Regular", "content": "Non-invasive prenatal tests are available for chromosomal aneuploidy but not for monogenic diseases yet. This study aimed to develop analysis method for detecting fetal mutation status by using only maternal blood sample. We introduce two different approaches to detect a fetal mutation of the Duchene Muscular Dystrophy (DMD) gene. The algorithms are consisted of two steps: detection of mutation types and regions and determination of fetal mutation status. For the second step, one approach uses allele frequencies of heterozygous sites and the other approach uses relative read depth that is the read depths of cfDNA divided by gDNA of the mother.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Non-invasive prenatal tests are available for chromosomal aneuploidy but not for monogenic diseases yet. This study aimed to develop analysis method for detecting fetal mutation status by using only maternal blood sample. We introduce two different approaches to detect a fetal mutation of the Duchene Muscular Dystrophy (DMD) gene. The algorithms are consisted of two steps: detection of mutation types and regions and determination of fetal mutation status. For the second step, one approach uses allele frequencies of heterozygous sites and the other approach uses relative read depth that is the read depths of cfDNA divided by gDNA of the mother.", "fno": "09313205", "keywords": [ "Biochemistry", "Biomedical Equipment", "Blood", "Cellular Biophysics", "Diseases", "DNA", "Genetics", "Molecular Biophysics", "Obstetrics", "Fetal Single Gene Mutations", "Targeted Sequencing", "Maternal Cell Free DNA", "Noninvasive Prenatal Tests", "Chromosomal Aneuploidy", "Monogenic Diseases", "Fetal Mutation Status", "Maternal Blood Sample", "Duchene Muscular Dystrophy Gene", "Mutation Types", "Sequential Analysis", "Fetus", "Diseases", "DNA", "Bioinformatics", "Genomics", "Plasmas", "NIPT", "Cff DNA", "Monogenic Disease" ], "authors": [ { "affiliation": "AI/DT center SK telecom,Seoul,Korea", "fullName": "Junghyun Namkung", "givenName": "Junghyun", "surname": "Namkung", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "1391-1394", "year": "2020", "issn": null, "isbn": "978-1-7281-6215-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09313331", "articleId": "1qmg2YfK5Pi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09313206", "articleId": "1qmg8io5afu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2014/5666/0/07004306", "title": "Using geometric structures to improve the error correction algorithm of high-throughput sequencing data on MapReduce framework", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004306/12OmNrkjVm4", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a119", "title": "Predictive Genome Analysis Using Partial DNA Sequencing Data", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a119/12OmNs5rkTh", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822634", "title": "SeqMaker: A next generation sequencing simulator with variations, sequencing errors and amplification bias integrated", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822634/12OmNyL0Tj7", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2007/1834/0/04458112", "title": "Extraction of Fetal Electrocardiogram from Maternal Skin Electrodes using Affine Projection Algorithm (APA), Recursive Least Square (RLS), and QR-RLS Algorithms", "doi": null, "abstractUrl": "/proceedings-article/isspit/2007/04458112/12OmNyRxFAX", "parentPublication": { "id": "proceedings/isspit/2007/1834/0", "title": "2007 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999148", "title": "TAMeBS: A sensitive bisulfite-sequencing read mapping tool for DNA methylation analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999148/12OmNyoiYTs", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07501834", "title": "A Survey of Software and Hardware Approaches to Performing Read Alignment in Next Generation Sequencing", "doi": null, "abstractUrl": "/journal/tb/2017/06/07501834/13rRUIM2VAj", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/05/07968314", "title": "A Study of Cell-Free DNA Fragmentation Pattern and Its Application in DNA Sample Type Classification", "doi": null, "abstractUrl": "/journal/tb/2018/05/07968314/14dcDXLXNjN", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/04/08861116", "title": "EPGA-SC : A Framework for <italic>de novo</italic> Assembly of Single-Cell Sequencing Reads", "doi": null, "abstractUrl": "/journal/tb/2021/04/08861116/1dVZyDiQRiM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/05/09094002", "title": "GenoDedup: Similarity-Based Deduplication and Delta-Encoding for Genome Sequencing Data", "doi": null, "abstractUrl": "/journal/tc/2021/05/09094002/1jP8DUQbqow", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/01/09264702", "title": "SACall: A Neural Network Basecaller for Oxford Nanopore Sequencing Data Based on Self-Attention Mechanism", "doi": null, "abstractUrl": "/journal/tb/2022/01/09264702/1oSTCahmJd6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJiwN", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBbJTne", "doi": "10.1109/ICCVW.2013.62", "title": "A Spatio-temporal Feature Based on Triangulation of Dense SURF", "normalizedTitle": "A Spatio-temporal Feature Based on Triangulation of Dense SURF", "abstract": "In this paper, we propose a spatio-temporal feature which is based on the appearance and movement of interest SURF key points. Given a video, we extract its spatiotemporal features according to every small set of frames. For each frame set, we first extract dense SURF key points from its first frame and estimate their optical flows at each frame. We then detect camera motion and compensate flow vectors in case camera motion exists. Next, we select interest points based on their movement based relationship through the frame set. We then apply Delaunay triangulation to form triangles of selected points. From each triangle we extract its shape feature along with trajectory based visual features of its points. We show that concatenating these features with SURF feature can form a spatio-temporal feature which is comparable to the state of the art. Our proposed spatio-temporal feature is supposed to be robust and informative since it is not based on characteristics of individual points but groups of related interest points. We apply Fisher Vector encoding to represent videos using the proposed feature. We conduct various experiments on UCF-101, the largest action dataset of realistic videos up to date, and show the effectiveness of our proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a spatio-temporal feature which is based on the appearance and movement of interest SURF key points. Given a video, we extract its spatiotemporal features according to every small set of frames. For each frame set, we first extract dense SURF key points from its first frame and estimate their optical flows at each frame. We then detect camera motion and compensate flow vectors in case camera motion exists. Next, we select interest points based on their movement based relationship through the frame set. We then apply Delaunay triangulation to form triangles of selected points. From each triangle we extract its shape feature along with trajectory based visual features of its points. We show that concatenating these features with SURF feature can form a spatio-temporal feature which is comparable to the state of the art. Our proposed spatio-temporal feature is supposed to be robust and informative since it is not based on characteristics of individual points but groups of related interest points. We apply Fisher Vector encoding to represent videos using the proposed feature. We conduct various experiments on UCF-101, the largest action dataset of realistic videos up to date, and show the effectiveness of our proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a spatio-temporal feature which is based on the appearance and movement of interest SURF key points. Given a video, we extract its spatiotemporal features according to every small set of frames. For each frame set, we first extract dense SURF key points from its first frame and estimate their optical flows at each frame. We then detect camera motion and compensate flow vectors in case camera motion exists. Next, we select interest points based on their movement based relationship through the frame set. We then apply Delaunay triangulation to form triangles of selected points. From each triangle we extract its shape feature along with trajectory based visual features of its points. We show that concatenating these features with SURF feature can form a spatio-temporal feature which is comparable to the state of the art. Our proposed spatio-temporal feature is supposed to be robust and informative since it is not based on characteristics of individual points but groups of related interest points. We apply Fisher Vector encoding to represent videos using the proposed feature. We conduct various experiments on UCF-101, the largest action dataset of realistic videos up to date, and show the effectiveness of our proposed method.", "fno": "3022a420", "keywords": [ "Feature Extraction", "Cameras", "Vectors", "Trajectory", "Histograms", "Visualization", "Optical Imaging", "UCF 101", "Action Recognition", "Spatio Temporal Feature" ], "authors": [ { "affiliation": null, "fullName": "Do Hang Nga", "givenName": "Do Hang", "surname": "Nga", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Keiji Yanai", "givenName": "Keiji", "surname": "Yanai", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "420-427", "year": "2013", "issn": null, "isbn": "978-1-4799-3022-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3022a412", "articleId": "12OmNvFYQKl", "__typename": "AdjacentArticleType" }, "next": { "fno": "3022a428", "articleId": "12OmNvAiSAe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciicii/2016/3575/0/3575a069", "title": "A Method of Human Action Recognition Based on Spatio-Temporal Interest Points and PLSA", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2016/3575a069/12OmNAolGMp", "parentPublication": { "id": "proceedings/iciicii/2016/3575/0", "title": "2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391d164", "title": "Learning to Track for Spatio-Temporal Action Localization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391d164/12OmNrFTraU", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2015/8312/0/8312a307", "title": "Violence Detection Algorithm Based on Local Spatio-temporal Features and Optical Flow", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2015/8312a307/12OmNxWcHor", "parentPublication": { "id": "proceedings/iciicii/2015/8312/0", "title": "2015 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2013/3022/0/3022a779", "title": "Spatio-temporal Context Modeling for BoW-Based Video Classification", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2013/3022a779/12OmNyRxFAy", "parentPublication": { "id": "proceedings/iccvw/2013/3022/0", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2013/3022/0/3022a246", "title": "Spatio-temporal Good Features to Track", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2013/3022a246/12OmNySG3PQ", "parentPublication": { "id": "proceedings/iccvw/2013/3022/0", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2013/4893/0/06455862", "title": "Face Recognition Based on Improved SURF", "doi": null, "abstractUrl": "/proceedings-article/isdea/2013/06455862/12OmNzBOhYm", "parentPublication": { "id": "proceedings/isdea/2013/4893/0", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2013/2540/0/06749315", "title": "Dense 3D point-cloud model using optical flow for a monocular reconstruction system", "doi": null, "abstractUrl": "/proceedings-article/aipr/2013/06749315/12OmNzBOi2b", "parentPublication": { "id": "proceedings/aipr/2013/2540/0", "title": "2013 IEEE Applied Imagery Pattern Recognition Workshop: Sensing for Control and Augmentation (AIPR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2016/06/07265087", "title": "Contour Tracking with a Spatio-Temporal Intensity Moment", "doi": null, "abstractUrl": "/journal/tp/2016/06/07265087/13rRUx0xPog", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/03/ttp2013030624", "title": "Pose and Expression Independent Facial Landmark Localization Using Dense-SURF and the Hausdorff Distance", "doi": null, "abstractUrl": "/journal/tp/2013/03/ttp2013030624/13rRUxjyX5e", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300c482", "title": "Spatio-Temporal Filter Adaptive Network for Video Deblurring", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300c482/1hVlD1ivMgo", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOhWk", "title": "2010 IEEE International Conference on Data Mining", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgrDcQ", "doi": "10.1109/ICDM.2010.166", "title": "Spatial and Spatio-temporal Data Mining", "normalizedTitle": "Spatial and Spatio-temporal Data Mining", "abstract": "The recent advances and price reduction of technologies for collecting spatial and spatio-temporal data like Satellite Images, Cellular Phones, Sensor Networks, and GPS devices has facilitated the collection of data referenced in space and time. These huge collections of data often hide interesting information which conventional systems and classical data mining techniques are unable to discover. Spatial and spatio-temporal data are embedded in continuous space, whereas classical datasets (e.g. transactions) are often discrete. Spatial and spatio-temporal data require complex data preprocessing, transformation, data mining, and post-processing techniques to extract novel, useful, and understandable patterns. The importance of spatial and spatio-temporal data mining is growing with the increasing incidence and importance of large geo-spatial datasets such as maps, repositories of remote-sensing images, trajectories of moving objects generated by mobile devices, etc. Applications include Mobile-commerce industry (location-based services), climatologically effects of El Nino, land-use classification and global change using satellite imagery, finding crime hot spots, local instability in traffic, migration of birds, fishing control, pedestrian behavior analysis, and so on. Thus, new methods are needed to analyze spatial and spatio-temporal data to extract interesting, useful, and non-trivial patterns. The main goal of this tutorial is to disseminate this research field, giving an overview of the current state of the art and the main methodologies and algorithms for spatial and spatio-temporal data mining. This tutorial is directed to researches and practitioners, experts in data mining, analysts of spatial and spatio-temporal data, as well as knowledge engineers and domain experts from different application areas.", "abstracts": [ { "abstractType": "Regular", "content": "The recent advances and price reduction of technologies for collecting spatial and spatio-temporal data like Satellite Images, Cellular Phones, Sensor Networks, and GPS devices has facilitated the collection of data referenced in space and time. These huge collections of data often hide interesting information which conventional systems and classical data mining techniques are unable to discover. Spatial and spatio-temporal data are embedded in continuous space, whereas classical datasets (e.g. transactions) are often discrete. Spatial and spatio-temporal data require complex data preprocessing, transformation, data mining, and post-processing techniques to extract novel, useful, and understandable patterns. The importance of spatial and spatio-temporal data mining is growing with the increasing incidence and importance of large geo-spatial datasets such as maps, repositories of remote-sensing images, trajectories of moving objects generated by mobile devices, etc. Applications include Mobile-commerce industry (location-based services), climatologically effects of El Nino, land-use classification and global change using satellite imagery, finding crime hot spots, local instability in traffic, migration of birds, fishing control, pedestrian behavior analysis, and so on. Thus, new methods are needed to analyze spatial and spatio-temporal data to extract interesting, useful, and non-trivial patterns. The main goal of this tutorial is to disseminate this research field, giving an overview of the current state of the art and the main methodologies and algorithms for spatial and spatio-temporal data mining. This tutorial is directed to researches and practitioners, experts in data mining, analysts of spatial and spatio-temporal data, as well as knowledge engineers and domain experts from different application areas.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The recent advances and price reduction of technologies for collecting spatial and spatio-temporal data like Satellite Images, Cellular Phones, Sensor Networks, and GPS devices has facilitated the collection of data referenced in space and time. These huge collections of data often hide interesting information which conventional systems and classical data mining techniques are unable to discover. Spatial and spatio-temporal data are embedded in continuous space, whereas classical datasets (e.g. transactions) are often discrete. Spatial and spatio-temporal data require complex data preprocessing, transformation, data mining, and post-processing techniques to extract novel, useful, and understandable patterns. The importance of spatial and spatio-temporal data mining is growing with the increasing incidence and importance of large geo-spatial datasets such as maps, repositories of remote-sensing images, trajectories of moving objects generated by mobile devices, etc. Applications include Mobile-commerce industry (location-based services), climatologically effects of El Nino, land-use classification and global change using satellite imagery, finding crime hot spots, local instability in traffic, migration of birds, fishing control, pedestrian behavior analysis, and so on. Thus, new methods are needed to analyze spatial and spatio-temporal data to extract interesting, useful, and non-trivial patterns. The main goal of this tutorial is to disseminate this research field, giving an overview of the current state of the art and the main methodologies and algorithms for spatial and spatio-temporal data mining. This tutorial is directed to researches and practitioners, experts in data mining, analysts of spatial and spatio-temporal data, as well as knowledge engineers and domain experts from different application areas.", "fno": "4256b217", "keywords": [ "Spatial Data Mining", "Trajectory Data Mining", "Semantic Trajectory Data Mining", "Semantic Trajectory Pattern Mining" ], "authors": [ { "affiliation": null, "fullName": "Vania Bogorny", "givenName": "Vania", "surname": "Bogorny", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shashi Shekhar", "givenName": "Shashi", "surname": "Shekhar", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "1217", "year": "2010", "issn": "1550-4786", "isbn": "978-0-7695-4256-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4256b211", "articleId": "12OmNvq5jGr", "__typename": "AdjacentArticleType" }, "next": { "fno": "4256b218", "articleId": "12OmNqHqSyv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ettandgrs/2008/3563/2/3563b541", "title": "Spatial Data Mining Features between General Data Mining", "doi": null, "abstractUrl": "/proceedings-article/ettandgrs/2008/3563b541/12OmNA0MZ78", "parentPublication": { "id": "ettandgrs/2008/3563/2", "title": "Education Technology and Training &amp; Geoscience and Remote Sensing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816766", "title": "Managing uncertainty in spatial and spatio-temporal data", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816766/12OmNAQanxr", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2012/4925/0/4925a765", "title": "Mining Spatio-temporal Patterns in the Presence of Concept Hierarchies", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a765/12OmNBOll4U", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2012/4925/0/4925a805", "title": "Spatio-temporal Co-occurrence Pattern Mining in Data Sets with Evolving Regions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a805/12OmNBU1jMW", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2014/4274/0/4274a001", "title": "Spatio-Temporal Trajectory Region-of-Interest Mining Using Delaunay Triangulation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2014/4274a001/12OmNCesraa", "parentPublication": { "id": "proceedings/icdmw/2014/4274/0", "title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2006/2571/0/2571x146", "title": "Mining Spatial and Spatio-Temporal Patterns in Scientific Data", "doi": null, "abstractUrl": "/proceedings-article/icdew/2006/2571x146/12OmNyNQSKk", "parentPublication": { "id": "proceedings/icdew/2006/2571/0", "title": "22nd International Conference on Data Engineering Workshops (ICDEW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2012/4925/0/4925a813", "title": "Comparative Study of Association Rule Mining and MiSTIC in Extracting Spatio-temporal Disease Occurrences Patterns", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a813/12OmNzBOi7k", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2008/04/ttk2008040433", "title": "A Framework for Mining Sequential Patterns from Spatio-Temporal Event Data Sets", "doi": null, "abstractUrl": "/journal/tk/2008/04/ttk2008040433/13rRUwI5U8g", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/07/08936400", "title": "Mining Spatio-Temporal Reachable Regions With Multiple Sources over Massive Trajectory Data", "doi": null, "abstractUrl": "/journal/tk/2021/07/08936400/1fRz0BjkJZm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/08/09204396", "title": "Deep Learning for Spatio-Temporal Data Mining: A Survey", "doi": null, "abstractUrl": "/journal/tk/2022/08/09204396/1nkyTK35x1S", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa7L", "title": "Parallel and Distributed Computing Applications and Technologies, International Conference on", "acronym": "pdcat", "groupId": "1001048", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxTEiTg", "doi": "10.1109/PDCAT.2011.72", "title": "Reference metadata extraction from scientific papers", "normalizedTitle": "Reference metadata extraction from scientific papers", "abstract": "Bibliographical information of scientific papers is of great value since the Science Citation Index is introduced to measure research impact. Most scientific documents available on the web are unstructured or semi-structured, and the automatic reference metadata extraction process becomes an important task. This paper describes a framework for automatic reference metadata extraction from scientific papers. Our system can extract title, author, journal, volume, year, and page from scientific papers in PDF. We utilize a document metadata knowledge base to guide the reference metadata extraction process. The experiment results show that our system achieves a high accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Bibliographical information of scientific papers is of great value since the Science Citation Index is introduced to measure research impact. Most scientific documents available on the web are unstructured or semi-structured, and the automatic reference metadata extraction process becomes an important task. This paper describes a framework for automatic reference metadata extraction from scientific papers. Our system can extract title, author, journal, volume, year, and page from scientific papers in PDF. We utilize a document metadata knowledge base to guide the reference metadata extraction process. The experiment results show that our system achieves a high accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Bibliographical information of scientific papers is of great value since the Science Citation Index is introduced to measure research impact. Most scientific documents available on the web are unstructured or semi-structured, and the automatic reference metadata extraction process becomes an important task. This paper describes a framework for automatic reference metadata extraction from scientific papers. Our system can extract title, author, journal, volume, year, and page from scientific papers in PDF. We utilize a document metadata knowledge base to guide the reference metadata extraction process. The experiment results show that our system achieves a high accuracy.", "fno": "06118965", "keywords": [ "Data Mining", "Portable Document Format", "Knowledge Based Systems", "Accuracy", "Libraries", "Semantics", "Hidden Markov Models", "Reference", "Metadata Extraction", "Rule Based Approach" ], "authors": [ { "affiliation": "Cluster & Grid Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China", "fullName": "Hai Jin", "givenName": null, "surname": "Hai Jin", "__typename": "ArticleAuthorType" }, { "affiliation": "Cluster & Grid Comput. Lab., Huazhong Univ. of Sci. & Technol., Wuhan, China", "fullName": "Zhixin Guo", "givenName": null, "surname": "Zhixin Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "pdcat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "45-49", "year": "2011", "issn": null, "isbn": "978-0-7695-4564-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": null, "next": { "fno": "4564z001", "articleId": "12OmNx0RITF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628599", "title": "Figure Metadata Extraction from Digital Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628599/12OmNAKM00Y", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2014/3244/0/3244a217", "title": "CERMINE -- Automatic Extraction of Metadata and References from Scientific Literature", "doi": null, "abstractUrl": "/proceedings-article/das/2014/3244a217/12OmNAhxjCd", "parentPublication": { "id": "proceedings/das/2014/3244/0", "title": "2014 11th IAPR International Workshop on Document Analysis Systems (DAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2011/4415/0/4415a400", "title": "A Rule-Based Framework of Metadata Extraction from Scientific Papers", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2011/4415a400/12OmNAq3hFc", "parentPublication": { "id": "proceedings/dcabes/2011/4415/0", "title": "2011 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2012/4687/0/4687a775", "title": "Extracting Information from Scientific Papers in the Cloud", "doi": null, "abstractUrl": "/proceedings-article/cisis/2012/4687a775/12OmNrYlmA1", "parentPublication": { "id": "proceedings/cisis/2012/4687/0", "title": "2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2014/7505/0/7505a245", "title": "An Extension to Jab Ref for Extraction and Processing of Scholarly Articles", "doi": null, "abstractUrl": "/proceedings-article/fit/2014/7505a245/12OmNxwENzX", "parentPublication": { "id": "proceedings/fit/2014/7505/0", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2007/2874/1/28740497", "title": "Metadata Extraction from Chinese Research Papers Based on Conditional Random Fields", "doi": null, "abstractUrl": "/proceedings-article/fskd/2007/28740497/12OmNy87QAJ", "parentPublication": { "id": "proceedings/fskd/2007/2874/1", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2004/2056/6/205660138b", "title": "Context Thesaurus for the Extraction of Metadata from Medical Research Papers", "doi": null, "abstractUrl": "/proceedings-article/hicss/2004/205660138b/12OmNyL0TuZ", "parentPublication": { "id": "proceedings/hicss/2004/2056/6", "title": "37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2014/3010/2/3010b319", "title": "Automatic Classification of Scientific Papers in PDF for Populating Ontologies", "doi": null, "abstractUrl": "/proceedings-article/csci/2014/3010b319/12OmNzBwGwl", "parentPublication": { "id": "proceedings/csci/2014/3010/1", "title": "2014 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2022/9345/0/09852932", "title": "Vision and Natural Language for Metadata Extraction from Scientific PDF Documents: A Multimodal Approach", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2022/09852932/1FT2kmXTIFG", "parentPublication": { "id": "proceedings/jcdl/2022/9345/0", "title": "2022 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2018/0625/0/062500a230", "title": "A CiteSeerX-Based Dataset for Record Linkage and Metadata Extraction", "doi": null, "abstractUrl": "/proceedings-article/synasc/2018/062500a230/1bhJwx7vVdu", "parentPublication": { "id": "proceedings/synasc/2018/0625/0", "title": "2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKB", "title": "2015 IEEE/ACM 12th Working Conference on Mining Software Repositories (MSR)", "acronym": "msr", "groupId": "1001959", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNz61div", "doi": "10.1109/MSR.2015.26", "title": "Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling", "normalizedTitle": "Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling", "abstract": "Software projects are not developed in isolation. Recent research has shifted to studying software ecosystems, communities of projects that depend on each other and are developed together. However, identifying technical dependencies at the ecosystem level can be challenging. In this paper, we propose a new method, known as reference coupling, for detecting technical dependencies between projects. The method establishes dependencies through user-specified cross-references between projects. We use our method to identify ecosystems in GitHub-hosted projects, and we identify several characteristics of the identified ecosystems. We find that most ecosystems are centered around one project and are interconnected with other ecosystems. The predominant type of ecosystems are those that develop tools to support software development. We also found that the project owners' social behaviour aligns well with the technical dependencies within the ecosystem, but project contributors' social behaviour does not align with these dependencies. We conclude with a discussion on future research that is enabled by our reference coupling method.", "abstracts": [ { "abstractType": "Regular", "content": "Software projects are not developed in isolation. Recent research has shifted to studying software ecosystems, communities of projects that depend on each other and are developed together. However, identifying technical dependencies at the ecosystem level can be challenging. In this paper, we propose a new method, known as reference coupling, for detecting technical dependencies between projects. The method establishes dependencies through user-specified cross-references between projects. We use our method to identify ecosystems in GitHub-hosted projects, and we identify several characteristics of the identified ecosystems. We find that most ecosystems are centered around one project and are interconnected with other ecosystems. The predominant type of ecosystems are those that develop tools to support software development. We also found that the project owners' social behaviour aligns well with the technical dependencies within the ecosystem, but project contributors' social behaviour does not align with these dependencies. We conclude with a discussion on future research that is enabled by our reference coupling method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Software projects are not developed in isolation. Recent research has shifted to studying software ecosystems, communities of projects that depend on each other and are developed together. However, identifying technical dependencies at the ecosystem level can be challenging. In this paper, we propose a new method, known as reference coupling, for detecting technical dependencies between projects. The method establishes dependencies through user-specified cross-references between projects. We use our method to identify ecosystems in GitHub-hosted projects, and we identify several characteristics of the identified ecosystems. We find that most ecosystems are centered around one project and are interconnected with other ecosystems. The predominant type of ecosystems are those that develop tools to support software development. We also found that the project owners' social behaviour aligns well with the technical dependencies within the ecosystem, but project contributors' social behaviour does not align with these dependencies. We conclude with a discussion on future research that is enabled by our reference coupling method.", "fno": "5594a202", "keywords": [ "Ecosystems", "Communities", "Software", "Couplings", "Visualization", "Databases", "Encoding", "Cross Reference", "Reference Coupling", "Ecosystems", "Technical Dependencies", "Git Hub" ], "authors": [ { "affiliation": "Software Eng. Global InterAction Lab., Univ. of Victoria, Victoria, BC, Canada", "fullName": "Kelly Blincoe", "givenName": "Kelly", "surname": "Blincoe", "__typename": "ArticleAuthorType" }, { "affiliation": "Software Eng. Global InterAction Lab., Univ. of Victoria, Victoria, BC, Canada", "fullName": "Francis Harrison", "givenName": "Francis", "surname": "Harrison", "__typename": "ArticleAuthorType" }, { "affiliation": "Software Eng. Global InterAction Lab., Univ. of Victoria, Victoria, BC, Canada", "fullName": "Daniela Damian", "givenName": "Daniela", "surname": "Damian", "__typename": "ArticleAuthorType" } ], "idPrefix": "msr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-05-01T00:00:00", "pubType": "proceedings", "pages": "202-211", "year": "2015", "issn": null, "isbn": "978-0-7695-5594-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5594a191", "articleId": "12OmNrAMF2Z", "__typename": "AdjacentArticleType" }, "next": { "fno": "5594a212", "articleId": "12OmNrYCXWu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aswec/2014/3149/0/3149a058", "title": "Architectural Design Decisions in Open Software Development: A Transition to Software Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/aswec/2014/3149a058/12OmNB0X8uS", "parentPublication": { "id": "proceedings/aswec/2014/3149/0", "title": "2014 23rd Australian Software Engineering Conference (ASWEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2012/4786/0/4786a084", "title": "An Architecture Framework for Facilitating Sustainability in Open Service Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/edocw/2012/4786a084/12OmNBgz4Aa", "parentPublication": { "id": "proceedings/edocw/2012/4786/0", "title": "2012 IEEE 16th International Enterprise Distributed Object Computing Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2017/5501/0/07884604", "title": "An empirical comparison of dependency issues in OSS packaging ecosystems", "doi": null, "abstractUrl": "/proceedings-article/saner/2017/07884604/12OmNxFsmFY", "parentPublication": { "id": "proceedings/saner/2017/5501/0", "title": "2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2017/5501/0/07884607", "title": "Socio-technical evolution of the Ruby ecosystem in GitHub", "doi": null, "abstractUrl": "/proceedings-article/saner/2017/07884607/12OmNykTNkZ", "parentPublication": { "id": "proceedings/saner/2017/5501/0", "title": "2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2017/3868/0/3868a381", "title": "How Do Developers Fix Cross-Project Correlated Bugs? A Case Study on the GitHub Scientific Python Ecosystem", "doi": null, "abstractUrl": "/proceedings-article/icse/2017/3868a381/12OmNzcPAiF", "parentPublication": { "id": "proceedings/icse/2017/3868/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr-wcre/2014/3752/0/06747205", "title": "ECOS: Ecological studies of open source software ecosystems", "doi": null, "abstractUrl": "/proceedings-article/csmr-wcre/2014/06747205/12OmNzkMlU1", "parentPublication": { "id": "proceedings/csmr-wcre/2014/3752/0", "title": "2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soheal/2018/5730/0/573001a010", "title": "The Effect of Generic Strategies on Software Ecosystem Health: The Case of Cryptocurrency Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/soheal/2018/573001a010/13bd1rsER1D", "parentPublication": { "id": "proceedings/soheal/2018/5730/0", "title": "2018 IEEE/ACM 1st International Workshop on Software Health (SoHeal)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a135", "title": "Release Synchronization in Software Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a135/1cJ7ongY2Gc", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sesos-wdes/2019/3439/0/343900a050", "title": "Revisiting the Mobile Software Ecosystems Literature", "doi": null, "abstractUrl": "/proceedings-article/sesos-wdes/2019/343900a050/1eteag4Bf8Y", "parentPublication": { "id": "proceedings/sesos-wdes/2019/3439/0", "title": "2019 IEEE/ACM 7th International Workshop on Software Engineering for Systems-of-Systems (SESoS) and 13th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (WDES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100a100", "title": "Impact Analysis of Cross-Project Bugs on Software Ecosystems", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100a100/1pK5kb2MlAQ", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18jXF1iMjLi", "doi": "10.1109/ICDMW.2018.00089", "title": "A Comparative Study of Urban Mobility Patterns Using Large-Scale Spatio-Temporal Data", "normalizedTitle": "A Comparative Study of Urban Mobility Patterns Using Large-Scale Spatio-Temporal Data", "abstract": "The large scale spatio-temporal data brought about by the ubiquitous wireless networks, mobile phones, and GPS devices present a fertile ground for studying human mobility. These data sources come with high coverage and resolution that enable studies of mobility patterns for human populations at large that other conventional methods such as surveys are not capable of. In this paper, we study anonymized spatio-temporal data from telco networks to understand the variability in human mobility behavior across different geographical regions. We present methodologies for extracting trips and other mobility features from large-scale spatio-temporal data. We also look into daily activity patterns of the populations in two specific cities, Singapore and Sydney. Our results include measures of distance and frequency of people's travel, as well as their purpose of travel, mode of transport, and route choice. We extract mobility patterns known as motifs. We also define a mobility index to assess the mobility level of individuals and compare it among different regions and demographic groups. This work contributes to a more comprehensive understanding of urban dynamics, supporting smart city development and sustainable urbanization.", "abstracts": [ { "abstractType": "Regular", "content": "The large scale spatio-temporal data brought about by the ubiquitous wireless networks, mobile phones, and GPS devices present a fertile ground for studying human mobility. These data sources come with high coverage and resolution that enable studies of mobility patterns for human populations at large that other conventional methods such as surveys are not capable of. In this paper, we study anonymized spatio-temporal data from telco networks to understand the variability in human mobility behavior across different geographical regions. We present methodologies for extracting trips and other mobility features from large-scale spatio-temporal data. We also look into daily activity patterns of the populations in two specific cities, Singapore and Sydney. Our results include measures of distance and frequency of people's travel, as well as their purpose of travel, mode of transport, and route choice. We extract mobility patterns known as motifs. We also define a mobility index to assess the mobility level of individuals and compare it among different regions and demographic groups. This work contributes to a more comprehensive understanding of urban dynamics, supporting smart city development and sustainable urbanization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The large scale spatio-temporal data brought about by the ubiquitous wireless networks, mobile phones, and GPS devices present a fertile ground for studying human mobility. These data sources come with high coverage and resolution that enable studies of mobility patterns for human populations at large that other conventional methods such as surveys are not capable of. In this paper, we study anonymized spatio-temporal data from telco networks to understand the variability in human mobility behavior across different geographical regions. We present methodologies for extracting trips and other mobility features from large-scale spatio-temporal data. We also look into daily activity patterns of the populations in two specific cities, Singapore and Sydney. Our results include measures of distance and frequency of people's travel, as well as their purpose of travel, mode of transport, and route choice. We extract mobility patterns known as motifs. We also define a mobility index to assess the mobility level of individuals and compare it among different regions and demographic groups. This work contributes to a more comprehensive understanding of urban dynamics, supporting smart city development and sustainable urbanization.", "fno": "928800a572", "keywords": [ "Data Analysis", "Feature Extraction", "Geographic Information Systems", "Global Positioning System", "Mobile Computing", "Mobile Radio", "Smart Cities", "Town And Country Planning", "Urban Mobility Patterns", "Large Scale Spatio Temporal Data", "Ubiquitous Wireless Networks", "Mobile Phones", "Human Mobility Behavior", "Mobility Features", "Mobility Index", "Spatio Temporal Data Anonymization", "GPS", "Trip Extraction", "Telco Networks", "Singapore", "Sydney", "Smart City Development", "Sustainable Urbanization", "Data Mining", "Urban Areas", "Trajectory", "Feature Extraction", "Sociology", "Statistics", "Indexes", "Mobility Urban Dynamics Telecommunications" ], "authors": [ { "affiliation": null, "fullName": "The Anh Dang", "givenName": "The Anh", "surname": "Dang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jodi Chiam", "givenName": "Jodi", "surname": "Chiam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying Li", "givenName": "Ying", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "572-579", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800a564", "articleId": "18jXFca4Qik", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800a580", "articleId": "18jXyTRlosg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waina/2016/2461/0/2461a737", "title": "Ads Network Monitoring Integrating Realistic Urban Mobility Patterns", "doi": null, "abstractUrl": "/proceedings-article/waina/2016/2461a737/12OmNCbCrSe", "parentPublication": { "id": "proceedings/waina/2016/2461/0", "title": "2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518223", "title": "Characterising and Predicting Urban Mobility Dynamics by Mining Bike Sharing System Data", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518223/12OmNwtn3t7", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2018/5119/0/511901a129", "title": "Macroscopic Patterns in Sparse Location Data: Identifying Mobility Prototypes", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2018/511901a129/12OmNzvQHPh", "parentPublication": { "id": "proceedings/bigdataservice/2018/5119/0", "title": "2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2016/0883/1/0883a318", "title": "Understanding Urban Mobility via Taxi Trip Clustering", "doi": null, "abstractUrl": "/proceedings-article/mdm/2016/0883a318/12OmNzvQI7o", "parentPublication": { "id": "proceedings/mdm/2016/0883/1", "title": "2016 17th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2017/02/07755745", "title": "Activity-Based Human Mobility Patterns Inferred from Mobile Phone Data: A Case Study of Singapore", "doi": null, "abstractUrl": "/journal/bd/2017/02/07755745/13rRUwbs22G", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/11/08708929", "title": "Understanding Urban Dynamics via Context-Aware Tensor Factorization with Neighboring Regularization", "doi": null, "abstractUrl": "/journal/tk/2020/11/08708929/19Q3gu5xNC0", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a001", "title": "STORM-GAN: Spatio-Temporal Meta-GAN for Cross-City Estimation of Human Mobility Responses to COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a001/1KpCiFkLVF6", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10107812", "title": "Spatio-Temporal Dynamic Graph Relation Learning for Urban Metro Flow Prediction", "doi": null, "abstractUrl": "/journal/tk/5555/01/10107812/1MDGjfriXp6", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006517", "title": "Validating the Use of Wi-Fi Signals to Estimate Hyperlocal Urban Populations", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006517/1hJrKcCvmMw", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006289", "title": "Understanding Spatio-Temporal Urban Processes", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006289/1hJrXYjoEWA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBBhN8U", "title": "2012 45th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNA14A63", "doi": "10.1109/HICSS.2012.57", "title": "A Focus + Context Technique for Visualizing a Document Collection", "normalizedTitle": "A Focus + Context Technique for Visualizing a Document Collection", "abstract": "Investigative analysts need overviews of large amounts of data, which is a challenge when working with non-numerical data such as document collections. We present Semantic Zoom View (SZV), an interactive document collection visualization implemented as part of the CZSaw visual analytics system. SZV uses a focus + context technique to provide an overview with details on demand through interactive semantic zooming. SZV lets an analyst easily and quickly see the main topics of a document collection while keeping surrounding documents visible for context. Working within a single integrated visualization, an analyst can also quickly find related documents and break a large document collection into smaller meaningful groups. SZV's focus + context technique was compared to an overview + detail version for finding answers within a document collection and results indicated its strength for maintaining visibility of a full overview when document contents are accessed.", "abstracts": [ { "abstractType": "Regular", "content": "Investigative analysts need overviews of large amounts of data, which is a challenge when working with non-numerical data such as document collections. We present Semantic Zoom View (SZV), an interactive document collection visualization implemented as part of the CZSaw visual analytics system. SZV uses a focus + context technique to provide an overview with details on demand through interactive semantic zooming. SZV lets an analyst easily and quickly see the main topics of a document collection while keeping surrounding documents visible for context. Working within a single integrated visualization, an analyst can also quickly find related documents and break a large document collection into smaller meaningful groups. SZV's focus + context technique was compared to an overview + detail version for finding answers within a document collection and results indicated its strength for maintaining visibility of a full overview when document contents are accessed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Investigative analysts need overviews of large amounts of data, which is a challenge when working with non-numerical data such as document collections. We present Semantic Zoom View (SZV), an interactive document collection visualization implemented as part of the CZSaw visual analytics system. SZV uses a focus + context technique to provide an overview with details on demand through interactive semantic zooming. SZV lets an analyst easily and quickly see the main topics of a document collection while keeping surrounding documents visible for context. Working within a single integrated visualization, an analyst can also quickly find related documents and break a large document collection into smaller meaningful groups. SZV's focus + context technique was compared to an overview + detail version for finding answers within a document collection and results indicated its strength for maintaining visibility of a full overview when document contents are accessed.", "fno": "4525b835", "keywords": [ "Semantic Zoom", "Focus Context", "Document Collection", "Visual Analytics" ], "authors": [ { "affiliation": null, "fullName": "Dustin Dunsmuir", "givenName": "Dustin", "surname": "Dunsmuir", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eric Lee", "givenName": "Eric", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chris D. Shaw", "givenName": "Chris D.", "surname": "Shaw", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Maureen Stone", "givenName": "Maureen", "surname": "Stone", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Robert Woodbury", "givenName": "Robert", "surname": "Woodbury", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "John Dill", "givenName": "John", "surname": "Dill", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2012-01-01T00:00:00", "pubType": "proceedings", "pages": "1835-1844", "year": "2012", "issn": null, "isbn": "978-0-7695-4525-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4525b834", "articleId": "12OmNweTvQ4", "__typename": "AdjacentArticleType" }, "next": { "fno": "4525b855", "articleId": "12OmNviZllM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2005/2296/0/22960573", "title": "Visualizing Hierarchical Information Using a New Focus+Context Method", "doi": null, "abstractUrl": "/proceedings-article/icis/2005/22960573/12OmNAJVcDe", "parentPublication": { "id": "proceedings/icis/2005/2296/0", "title": "Proceedings. Fourth Annual ACIS International Conference on Computer and Information Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dial/2004/2088/0/20880064", "title": "Managing Document Images in a Digital Library: An Ontology Guided Approach", "doi": null, "abstractUrl": "/proceedings-article/dial/2004/20880064/12OmNC1Gugw", "parentPublication": { "id": "proceedings/dial/2004/2088/0", "title": "Proceedings. First Workshop on Document Image Analysis for Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/adc/2000/0528/0/05280028", "title": "A Comparison of Techniques for Selecting Text Collections", "doi": null, "abstractUrl": "/proceedings-article/adc/2000/05280028/12OmNqBKTMa", "parentPublication": { "id": "proceedings/adc/2000/0528/0", "title": "Proceedings 11th Australasian Database Conference. ADC 2000 (Cat. No.PR00528)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2008/3102/0/3102a624", "title": "A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/ares/2008/3102a624/12OmNwGIcBg", "parentPublication": { "id": "proceedings/ares/2008/3102/0", "title": "2008 Third International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a377", "title": "Agile Browsing of a Document Collection with Dynamic Taxonomies", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a377/12OmNyKa698", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/coopis/1996/7505/0/75050135", "title": "May Document Analysis Tools Bridge the Gap between Paper and Workflows ? A Critical Survey", "doi": null, "abstractUrl": "/proceedings-article/coopis/1996/75050135/12OmNyr8YyW", "parentPublication": { "id": "proceedings/coopis/1996/7505/0", "title": "Cooperative Information Systems, IFCIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2007/3015/1/30150313", "title": "Finding Hotspots in Document Collection", "doi": null, "abstractUrl": "/proceedings-article/ictai/2007/30150313/12OmNzYwc3K", "parentPublication": { "id": "proceedings/ictai/2007/3015/2", "title": "19th IEEE International Conference on Tools with Artificial Intelligence(ICTAI 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875900", "title": "Overview: The Design, Adoption, and Analysis of a Visual Document Mining Tool for Investigative Journalists", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875900/13rRUNvgz4g", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061145", "title": "Document Cards: A Top Trumps Visualization for Documents", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061145/13rRUwbs1Sq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNB8Cj8d", "title": "2012 International Conference on Cyberworlds", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgrD3R", "doi": "10.1109/CW.2012.28", "title": "Responsive Biped Character Stepping: When Push Comes to Shove", "normalizedTitle": "Responsive Biped Character Stepping: When Push Comes to Shove", "abstract": "In this paper, we propose a real-time approximation method for generating intelligent foot placement information for interactive biped characters. Our model uses an uncomplicated and efficient physics-based mechanism for generating fundamental pose information that can be used to construct the motions of a fully articulated dynamic character. The focus of this paper is a foot placement approximation method capable of producing balancing characters with dynamic characteristics. Furthermore, our model is straightforward to implement, computationally efficient, practical and robust, and ideal for time critical applications such as games.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a real-time approximation method for generating intelligent foot placement information for interactive biped characters. Our model uses an uncomplicated and efficient physics-based mechanism for generating fundamental pose information that can be used to construct the motions of a fully articulated dynamic character. The focus of this paper is a foot placement approximation method capable of producing balancing characters with dynamic characteristics. Furthermore, our model is straightforward to implement, computationally efficient, practical and robust, and ideal for time critical applications such as games.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a real-time approximation method for generating intelligent foot placement information for interactive biped characters. Our model uses an uncomplicated and efficient physics-based mechanism for generating fundamental pose information that can be used to construct the motions of a fully articulated dynamic character. The focus of this paper is a foot placement approximation method capable of producing balancing characters with dynamic characteristics. Furthermore, our model is straightforward to implement, computationally efficient, practical and robust, and ideal for time critical applications such as games.", "fno": "4814a151", "keywords": [ "Foot", "Legged Locomotion", "Approximation Methods", "Computational Modeling", "Pelvis", "Joints", "Dynamics", "Real Time", "Character Animation", "Balancing", "Inverse Kinematics", "Inverted Pendulum", "Foot Placement", "Responsive" ], "authors": [ { "affiliation": null, "fullName": "Ben Kenwright", "givenName": "Ben", "surname": "Kenwright", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "151-156", "year": "2012", "issn": null, "isbn": "978-1-4673-2736-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4814a144", "articleId": "12OmNBpVPUJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "4814a157", "articleId": "12OmNqJ8tk6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2013/2246/0/2246a326", "title": "Controlled 3D Biped Stepping Animations Using the Inverted Pendulum and Impulse Constraints", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a326/12OmNvAAtyb", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CJcAaH6aYg", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1CJdlUeTTlC", "doi": "10.1109/VRW55335.2022.00187", "title": "Proximity in VR: The Importance of Character Attractiveness and Participant Gender", "normalizedTitle": "Proximity in VR: The Importance of Character Attractiveness and Participant Gender", "abstract": "In this study, we expand upon recent evidence that the motion of virtual characters affects the proximity of users who are immersed with them in virtual reality (VR). Attractive motions decrease proximity, but no effect of character gender on proximity was found. We designed a similar experiment where users observed walking motions in VR which were displayed on male and female virtual characters. Our results show similar patterns found in previous studies, while some differences related to the model of the character emerged.", "abstracts": [ { "abstractType": "Regular", "content": "In this study, we expand upon recent evidence that the motion of virtual characters affects the proximity of users who are immersed with them in virtual reality (VR). Attractive motions decrease proximity, but no effect of character gender on proximity was found. We designed a similar experiment where users observed walking motions in VR which were displayed on male and female virtual characters. Our results show similar patterns found in previous studies, while some differences related to the model of the character emerged.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this study, we expand upon recent evidence that the motion of virtual characters affects the proximity of users who are immersed with them in virtual reality (VR). Attractive motions decrease proximity, but no effect of character gender on proximity was found. We designed a similar experiment where users observed walking motions in VR which were displayed on male and female virtual characters. Our results show similar patterns found in previous studies, while some differences related to the model of the character emerged.", "fno": "840200a672", "keywords": [ "Avatars", "Gender Issues", "VR", "Character Gender", "Male Characters", "Female Virtual Characters", "Virtual Reality", "Legged Locomotion", "Solid Modeling", "Three Dimensional Displays", "Conferences", "Computational Modeling", "Virtual Reality", "User Interfaces", "Computing Methodologies", "Computer Graphics", "Graphics Systems And Interfaces", "Perception", "Computing Methodologies", "Computer Graphics", "Graphics Systems And Interfaces", "Virtual Reality" ], "authors": [ { "affiliation": "Inria, Univ Rennes, CNRS, IRISA,France", "fullName": "Katja Zibrek", "givenName": "Katja", "surname": "Zibrek", "__typename": "ArticleAuthorType" }, { "affiliation": "Inria, Univ Rennes, CNRS, IRISA,France", "fullName": "Benjamin Niay", "givenName": "Benjamin", "surname": "Niay", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ Rennes, Inria, CNRS, IRISA,France", "fullName": "Anne-Hélène Olivier", "givenName": "Anne-Hélène", "surname": "Olivier", "__typename": "ArticleAuthorType" }, { "affiliation": "Inria, Univ Rennes, CNRS, IRISA,France", "fullName": "Julien Pettré", "givenName": "Julien", "surname": "Pettré", "__typename": "ArticleAuthorType" }, { "affiliation": "Inria, Univ Rennes, CNRS, IRISA,France", "fullName": "Ludovic Hoyet", "givenName": "Ludovic", "surname": "Hoyet", "__typename": "ArticleAuthorType" }, { "affiliation": "Trinity College Dublin,Ireland", "fullName": "Rachel McDonnell", "givenName": "Rachel", "surname": "McDonnell", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "672-673", "year": "2022", "issn": null, "isbn": "978-1-6654-8402-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1CJdlMR2Uxy", "name": "pvrw202284020-09757405s1-mm_840200a672.zip", "size": "4.67 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvrw202284020-09757405s1-mm_840200a672.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "840200a670", "articleId": "1CJemCvWpMs", "__typename": "AdjacentArticleType" }, "next": { "fno": "840200a674", "articleId": "1CJdE39vY9G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2015/6886/0/07131718", "title": "Design and evaluation of a visual acclimation aid for a semi-natural locomotion device", "doi": null, "abstractUrl": "/proceedings-article/3dui/2015/07131718/12OmNBNM8RA", "parentPublication": { "id": "proceedings/3dui/2015/6886/0", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446244", "title": "Climb, Fly, Stack: Design of Tangible and Gesture-Based Interfaces for Natural and Efficient Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446244/13bd1AIBM1R", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a732", "title": "Stay Safe&#x0021; Safety Precautions for Walking on a Conventional Treadmill in VR", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a732/1CJcCMpD8xa", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798204", "title": "Studying Gaze Behaviour during Collision Avoidance with a Virtual Walker: Influence of the Virtual Reality Setup", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798204/1cJ11rHzFi8", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798158", "title": "PhantomLegs: Reducing Virtual Reality Sickness Using Head-Worn Haptic Devices", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798158/1cJ16zT3GdW", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089480", "title": "Detection of Scaled Hand Interactions in Virtual Reality: The Effects of Motion Direction and Task Complexity", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089480/1jIx9NUNYPu", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090610", "title": "Attractiveness and Confidence in Walking Style of Male and Female Virtual Characters", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090610/1jIxtGeBB96", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090486", "title": "Walk this way: Evaluating the effect of perceived gender and attractiveness of motion on proximity in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090486/1jIxwwL7jmE", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a733", "title": "Gait Differences in the Real World and Virtual Reality: The Effect of Prior Virtual Reality Experience", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a733/1tnXLofRauc", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a448", "title": "Walking Outside the Box: Estimation of Detection Thresholds for Non-Forward Steps", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a448/1tuAlT6IUfu", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuIjee", "title": "Digital Media and Digital Content Management, Workshop on", "acronym": "dmdcm", "groupId": "1800440", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNCeaPV9", "doi": "10.1109/DMDCM.2011.61", "title": "Direct Spherical Parameterization Based on Surface Curvature", "normalizedTitle": "Direct Spherical Parameterization Based on Surface Curvature", "abstract": "In this paper we propose a novel spherical parameterization for closed, genus-0, two-manifold, 3Dtriangular meshes. The key point of our method concerns the Gaussian curvature criterion involved, which makes it possible to detect iteratively salient mesh vertices and to locally flatten them, until a sphere-like surface, adapted to a direct spherical parameterization is obtained. The experimental evaluation, carried out on a set of 3D models of various shapes and complexities, shows that the proposed method makes it possible to reduce both angle and area distortions with more than 78% and 40% respectively.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we propose a novel spherical parameterization for closed, genus-0, two-manifold, 3Dtriangular meshes. The key point of our method concerns the Gaussian curvature criterion involved, which makes it possible to detect iteratively salient mesh vertices and to locally flatten them, until a sphere-like surface, adapted to a direct spherical parameterization is obtained. The experimental evaluation, carried out on a set of 3D models of various shapes and complexities, shows that the proposed method makes it possible to reduce both angle and area distortions with more than 78% and 40% respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we propose a novel spherical parameterization for closed, genus-0, two-manifold, 3Dtriangular meshes. The key point of our method concerns the Gaussian curvature criterion involved, which makes it possible to detect iteratively salient mesh vertices and to locally flatten them, until a sphere-like surface, adapted to a direct spherical parameterization is obtained. The experimental evaluation, carried out on a set of 3D models of various shapes and complexities, shows that the proposed method makes it possible to reduce both angle and area distortions with more than 78% and 40% respectively.", "fno": "4413a266", "keywords": [ "Spherical Parameterization", "Genus Zero 3 D Mesh", "Gaussian Curvature", "Barycentric Coordinates" ], "authors": [ { "affiliation": null, "fullName": "Bogdan Mocanu", "givenName": "Bogdan", "surname": "Mocanu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Titus Zaharia", "givenName": "Titus", "surname": "Zaharia", "__typename": "ArticleAuthorType" } ], "idPrefix": "dmdcm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-05-01T00:00:00", "pubType": "proceedings", "pages": "266-269", "year": "2011", "issn": null, "isbn": "978-0-7695-4413-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4413a261", "articleId": "12OmNzYwc20", "__typename": "AdjacentArticleType" }, "next": { "fno": "4413a270", "articleId": "12OmNCdk2DZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/3/3962e702", "title": "Survey on Planar Parameterization of Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e702/12OmNA1mbfa", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2009/3843/1/3843a309", "title": "Morphing 3D Mesh Models Based on Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/mines/2009/3843a309/12OmNBOUxiR", "parentPublication": { "id": "proceedings/mines/2009/3843/1", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a119", "title": "The Spherical Images of Triangular Mesh Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c830", "title": "An Efficient Low Stretch Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c830/12OmNqHItM9", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-cg/2005/2473/0/24730301", "title": "A New Approach of Progressive Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/cad-cg/2005/24730301/12OmNwp74GO", "parentPublication": { "id": "proceedings/cad-cg/2005/2473/0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcc/2004/2108/1/210810643", "title": "Spherical Parameterization for 3D Surface Analysis in Volumetric Images", "doi": null, "abstractUrl": "/proceedings-article/itcc/2004/210810643/12OmNxTVTXY", "parentPublication": { "id": "proceedings/itcc/2004/2108/2", "title": "Information Technology: Coding and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smi/2006/2591/0/25910011", "title": "Curvilinear Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/smi/2006/25910011/12OmNyUWR7l", "parentPublication": { "id": "proceedings/smi/2006/2591/0", "title": "IEEE International Conference on Shape Modeling and Applications 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmai/2008/3270/0/3270a053", "title": "Chapter 9: Shape Analysis of Left Ventricle Using Invariant 3-D Spherical Harmonics Shape Descriptors", "doi": null, "abstractUrl": "/proceedings-article/gmai/2008/3270a053/12OmNyen1x6", "parentPublication": { "id": "proceedings/gmai/2008/3270/0", "title": "Geometric Modeling and Imaging--New Trends", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07434077", "title": "Spherical Parameterization Balancing Angle and Area Distortions", "doi": null, "abstractUrl": "/journal/tg/2017/06/07434077/13rRUxAASTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/07/ttp2011071356", "title": "Modeling Bidirectional Texture Functions with Multivariate Spherical Radial Basis Functions", "doi": null, "abstractUrl": "/journal/tp/2011/07/ttp2011071356/13rRUxYrbVN", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyaXPP0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "acronym": "cad-cg", "groupId": "1001488", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNwp74GO", "doi": "10.1109/CAD-CG.2005.9", "title": "A New Approach of Progressive Spherical Parameterization", "normalizedTitle": "A New Approach of Progressive Spherical Parameterization", "abstract": "Parameterization of 3D mesh plays an important role in computer graphics application society, such as geometry compression, texture mapping, morphing and so on. As far as closed two-manifold genus-0 meshes are concerned, natural choice of parameterization domain is sphere, and the basic challenges are no-foldover and low-distortion respectively. To solve the spherical parameterization problem, we present spherical-domain hybrid stretch metric (SHSM). The concept of global area is introduced into SHSM to further reduce the area distortion of parameterized triangles. We demonstrate the ability of our method to both parameterize fast and avoid high distortion, realizing parameterization from the spatial genus-0 meshes onto the unit sphere.", "abstracts": [ { "abstractType": "Regular", "content": "Parameterization of 3D mesh plays an important role in computer graphics application society, such as geometry compression, texture mapping, morphing and so on. As far as closed two-manifold genus-0 meshes are concerned, natural choice of parameterization domain is sphere, and the basic challenges are no-foldover and low-distortion respectively. To solve the spherical parameterization problem, we present spherical-domain hybrid stretch metric (SHSM). The concept of global area is introduced into SHSM to further reduce the area distortion of parameterized triangles. We demonstrate the ability of our method to both parameterize fast and avoid high distortion, realizing parameterization from the spatial genus-0 meshes onto the unit sphere.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Parameterization of 3D mesh plays an important role in computer graphics application society, such as geometry compression, texture mapping, morphing and so on. As far as closed two-manifold genus-0 meshes are concerned, natural choice of parameterization domain is sphere, and the basic challenges are no-foldover and low-distortion respectively. To solve the spherical parameterization problem, we present spherical-domain hybrid stretch metric (SHSM). The concept of global area is introduced into SHSM to further reduce the area distortion of parameterized triangles. We demonstrate the ability of our method to both parameterize fast and avoid high distortion, realizing parameterization from the spatial genus-0 meshes onto the unit sphere.", "fno": "24730301", "keywords": [], "authors": [ { "affiliation": "University, Shanghai, China", "fullName": "Haishan Tian", "givenName": "Haishan", "surname": "Tian", "__typename": "ArticleAuthorType" } ], "idPrefix": "cad-cg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-12-01T00:00:00", "pubType": "proceedings", "pages": "301-305", "year": "2005", "issn": null, "isbn": "0-7695-2473-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24730295", "articleId": "12OmNCmGO16", "__typename": "AdjacentArticleType" }, "next": { "fno": "24730306", "articleId": "12OmNzd7bcl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dmdcm/2011/4413/0/4413a266", "title": "Direct Spherical Parameterization Based on Surface Curvature", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a266/12OmNCeaPV9", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a119", "title": "The Spherical Images of Triangular Mesh Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c830", "title": "An Efficient Low Stretch Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c830/12OmNqHItM9", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smi/2002/1546/0/15460237", "title": "Simple Manifolds for Surface Modeling and Parameterization", "doi": null, "abstractUrl": "/proceedings-article/smi/2002/15460237/12OmNwJgAF0", "parentPublication": { "id": "proceedings/smi/2002/1546/0", "title": "Proceedings SMI. Shape Modeling International 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcc/2004/2108/1/210810643", "title": "Spherical Parameterization for 3D Surface Analysis in Volumetric Images", "doi": null, "abstractUrl": "/proceedings-article/itcc/2004/210810643/12OmNxTVTXY", "parentPublication": { "id": "proceedings/itcc/2004/2108/2", "title": "Information Technology: Coding and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmai/2008/3270/0/3270a053", "title": "Chapter 9: Shape Analysis of Left Ventricle Using Invariant 3-D Spherical Harmonics Shape Descriptors", "doi": null, "abstractUrl": "/proceedings-article/gmai/2008/3270a053/12OmNyen1x6", "parentPublication": { "id": "proceedings/gmai/2008/3270/0", "title": "Geometric Modeling and Imaging--New Trends", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498sorkine", "title": "Bounded-distortion Piecewise Mesh Parameterization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498sorkine/12OmNzwHvcJ", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07434077", "title": "Spherical Parameterization Balancing Angle and Area Distortions", "doi": null, "abstractUrl": "/journal/tg/2017/06/07434077/13rRUxAASTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/07927729", "title": "Advanced Hierarchical Spherical Parameterizations", "doi": null, "abstractUrl": "/journal/tg/2018/06/07927729/13rRUy3xY2W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995036", "title": "Using Optimal Transport to Improve Spherical Harmonic Quantification of Complex Biological Shapes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995036/1JC2vQBMSNW", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvO07F", "title": "IEEE International Conference on Shape Modeling and Applications 2006", "acronym": "smi", "groupId": "1000664", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNyUWR7l", "doi": "10.1109/SMI.2006.9", "title": "Curvilinear Spherical Parameterization", "normalizedTitle": "Curvilinear Spherical Parameterization", "abstract": "We present an efficient approach for solving the spherical parameterization problem. The essence of the approach is to look for a solution in the curvilinear coordinate system without requiring the additional spherical constraints usually needed in cartesian formulations. This setup allows us to take full advantage of some existing techniques originally developed for planar parameterization. Our results substantiate the efficiency of the method and confirm its robustness. Meshes of non-trivial geometry with tens of thousands of triangles are processed in a few seconds, always yielding bijective maps. This computational achievement bridges a so far wide gap in performance between spherical and planar parameterization.", "abstracts": [ { "abstractType": "Regular", "content": "We present an efficient approach for solving the spherical parameterization problem. The essence of the approach is to look for a solution in the curvilinear coordinate system without requiring the additional spherical constraints usually needed in cartesian formulations. This setup allows us to take full advantage of some existing techniques originally developed for planar parameterization. Our results substantiate the efficiency of the method and confirm its robustness. Meshes of non-trivial geometry with tens of thousands of triangles are processed in a few seconds, always yielding bijective maps. This computational achievement bridges a so far wide gap in performance between spherical and planar parameterization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an efficient approach for solving the spherical parameterization problem. The essence of the approach is to look for a solution in the curvilinear coordinate system without requiring the additional spherical constraints usually needed in cartesian formulations. This setup allows us to take full advantage of some existing techniques originally developed for planar parameterization. Our results substantiate the efficiency of the method and confirm its robustness. Meshes of non-trivial geometry with tens of thousands of triangles are processed in a few seconds, always yielding bijective maps. This computational achievement bridges a so far wide gap in performance between spherical and planar parameterization.", "fno": "25910011", "keywords": [], "authors": [ { "affiliation": "MPI Informatik, Germany", "fullName": "Rhaleb Zayer", "givenName": "Rhaleb", "surname": "Zayer", "__typename": "ArticleAuthorType" }, { "affiliation": "INRIA Sophia-Antipolis, France", "fullName": "Christian Rossl", "givenName": "Christian", "surname": "Rossl", "__typename": "ArticleAuthorType" }, { "affiliation": "MPI Informatik, Germany", "fullName": "Hans-Peter Seidel", "givenName": "Hans-Peter", "surname": "Seidel", "__typename": "ArticleAuthorType" } ], "idPrefix": "smi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-06-01T00:00:00", "pubType": "proceedings", "pages": "11", "year": "2006", "issn": null, "isbn": "0-7695-2591-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "25910010", "articleId": "12OmNB06l8R", "__typename": "AdjacentArticleType" }, "next": { "fno": "25910013", "articleId": "12OmNzd7br9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/3/3962e702", "title": "Survey on Planar Parameterization of Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e702/12OmNA1mbfa", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2009/3843/1/3843a309", "title": "Morphing 3D Mesh Models Based on Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/mines/2009/3843a309/12OmNBOUxiR", "parentPublication": { "id": "proceedings/mines/2009/3843/1", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dmdcm/2011/4413/0/4413a266", "title": "Direct Spherical Parameterization Based on Surface Curvature", "doi": null, "abstractUrl": "/proceedings-article/dmdcm/2011/4413a266/12OmNCeaPV9", "parentPublication": { "id": "proceedings/dmdcm/2011/4413/0", "title": "Digital Media and Digital Content Management, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c830", "title": "An Efficient Low Stretch Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c830/12OmNqHItM9", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-cg/2005/2473/0/24730301", "title": "A New Approach of Progressive Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/cad-cg/2005/24730301/12OmNwp74GO", "parentPublication": { "id": "proceedings/cad-cg/2005/2473/0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcc/2004/2108/1/210810643", "title": "Spherical Parameterization for 3D Surface Analysis in Volumetric Images", "doi": null, "abstractUrl": "/proceedings-article/itcc/2004/210810643/12OmNxTVTXY", "parentPublication": { "id": "proceedings/itcc/2004/2108/2", "title": "Information Technology: Coding and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07434077", "title": "Spherical Parameterization Balancing Angle and Area Distortions", "doi": null, "abstractUrl": "/journal/tg/2017/06/07434077/13rRUxAASTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101678", "title": "Efficient Optimization of Common Base Domains for Cross Parameterization", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101678/13rRUxBJhFt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/07927729", "title": "Advanced Hierarchical Spherical Parameterizations", "doi": null, "abstractUrl": "/journal/tg/2018/06/07927729/13rRUy3xY2W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a055", "title": "Conformal Parameterization by Minimizing Distortion Energy", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a055/1ap5wSJcZVe", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JC1F8KcINO", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "9994793", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JC2vQBMSNW", "doi": "10.1109/BIBM55620.2022.9995036", "title": "Using Optimal Transport to Improve Spherical Harmonic Quantification of Complex Biological Shapes", "normalizedTitle": "Using Optimal Transport to Improve Spherical Harmonic Quantification of Complex Biological Shapes", "abstract": "The knowledge of the anatomical shape of both gross and microscopic structures is the key to understanding the effects of disease processes on cellular structure. Geometric morphometric methods, such as Procrustes superimposition, and Spherical Harmonics (SPHARM), have been used to capture the biological shape variation and group differences in morphology. Previous SPHARM-MAT techniques use the CALD algorithm to parameterize the mesh surface. It starts from initial mapping and performs local and global smoothing methods alternately to control the area and length distortions simultaneously. However, this parameterization may not be sufficient in complex morphological cases. To bridge this gap, we propose SPHARM-OT, an enhanced SPHARM surface modeling method using optimal transport (OT) for spherical parameterization. First, the genus 0 3D objects are conformally mapped onto a sphere. Then the optimal transport theory via spherical power diagram is introduced to minimize the area distortion. This new algorithm can effectively reduce the area distortion and lead to a better reconstruction result. We demonstrate the effectiveness of the method by applying it to the human sphenoidal paranasal sinuses.", "abstracts": [ { "abstractType": "Regular", "content": "The knowledge of the anatomical shape of both gross and microscopic structures is the key to understanding the effects of disease processes on cellular structure. Geometric morphometric methods, such as Procrustes superimposition, and Spherical Harmonics (SPHARM), have been used to capture the biological shape variation and group differences in morphology. Previous SPHARM-MAT techniques use the CALD algorithm to parameterize the mesh surface. It starts from initial mapping and performs local and global smoothing methods alternately to control the area and length distortions simultaneously. However, this parameterization may not be sufficient in complex morphological cases. To bridge this gap, we propose SPHARM-OT, an enhanced SPHARM surface modeling method using optimal transport (OT) for spherical parameterization. First, the genus 0 3D objects are conformally mapped onto a sphere. Then the optimal transport theory via spherical power diagram is introduced to minimize the area distortion. This new algorithm can effectively reduce the area distortion and lead to a better reconstruction result. We demonstrate the effectiveness of the method by applying it to the human sphenoidal paranasal sinuses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The knowledge of the anatomical shape of both gross and microscopic structures is the key to understanding the effects of disease processes on cellular structure. Geometric morphometric methods, such as Procrustes superimposition, and Spherical Harmonics (SPHARM), have been used to capture the biological shape variation and group differences in morphology. Previous SPHARM-MAT techniques use the CALD algorithm to parameterize the mesh surface. It starts from initial mapping and performs local and global smoothing methods alternately to control the area and length distortions simultaneously. However, this parameterization may not be sufficient in complex morphological cases. To bridge this gap, we propose SPHARM-OT, an enhanced SPHARM surface modeling method using optimal transport (OT) for spherical parameterization. First, the genus 0 3D objects are conformally mapped onto a sphere. Then the optimal transport theory via spherical power diagram is introduced to minimize the area distortion. This new algorithm can effectively reduce the area distortion and lead to a better reconstruction result. We demonstrate the effectiveness of the method by applying it to the human sphenoidal paranasal sinuses.", "fno": "09995036", "keywords": [ "Biomedical Imaging", "Computational Geometry", "Diseases", "Medical Image Processing", "Mesh Generation", "Smoothing Methods", "Solid Modelling", "Surface Fitting", "Anatomical Shape", "Area Distortion", "Biological Shape Variation", "CALD Algorithm", "Cellular Structure", "Complex Biological Shapes", "Complex Morphological Cases", "Disease Processes", "Enhanced SPHARM Surface Modeling Method", "Genus 0 3 D Objects", "Geometric Morphometric Methods", "Global Smoothing Methods", "Gross Structures", "Group Differences", "Improve Spherical Harmonic Quantification", "Initial Mapping", "Length Distortions", "Mesh Surface", "Microscopic Structures", "Optimal Transport Theory", "Procrustes Superimposition", "SPHARM MAT Techniques", "SPHARM OT", "Spherical Harmonics", "Spherical Parameterization", "Spherical Power Diagram", "Surface Reconstruction", "Three Dimensional Displays", "Shape", "Surface Morphology", "Morphology", "Harmonic Analysis", "Distortion", "Spherical Harmonics", "Shape Analysis", "Spherical Optimal Transport", "Paranasal Sinus", "Principal Component Analysis" ], "authors": [ { "affiliation": "University of Pennsylvania,Applied Mathematics and Computational Science,Philadelphia,USA", "fullName": "Zexuan Wang", "givenName": "Zexuan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Applied Mathematics and Computational Science,Philadelphia,USA", "fullName": "Wenxi Yang", "givenName": "Wenxi", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Sacred Heart University,Fairfield Connecticut,Department of Biology,USA", "fullName": "Katharine Ryan", "givenName": "Katharine", "surname": "Ryan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Department of Biostatistics, Epidemiology & Informatics,Philadelphia,USA", "fullName": "Sumita Garai", "givenName": "Sumita", "surname": "Garai", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tennessee,Department of Anthropology,Knoxville,Tennessee,USA", "fullName": "Benjamin M Auerbach", "givenName": "Benjamin M", "surname": "Auerbach", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Department of Biostatistics, Epidemiology & Informatics,Philadelphia,USA", "fullName": "Li Shen", "givenName": "Li", "surname": "Shen", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1255-1261", "year": "2022", "issn": null, "isbn": "978-1-6654-6819-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09995078", "articleId": "1JC2UazvNpS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09995093", "articleId": "1JC25YRimOc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2007/1509/0/04375567", "title": "Morphometric Analysis of Hippocampal Shape in Mild Cognitive Impairment: An Imaging Genetics Study", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375567/12OmNAZOJVQ", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cadgraphics/2011/4497/0/4497a119", "title": "The Spherical Images of Triangular Mesh Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n", "parentPublication": { "id": "proceedings/cadgraphics/2011/4497/0", "title": "Computer-Aided Design and Computer Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssp/2007/1197/0/04301236", "title": "Encoding Neuroanatomical Information using Weighted Spherical Harmonic Representation", "doi": null, "abstractUrl": "/proceedings-article/ssp/2007/04301236/12OmNwdbVaC", "parentPublication": { "id": "proceedings/ssp/2007/1197/0", "title": "Statistical Signal Processing, IEEE/SP Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-cg/2005/2473/0/24730301", "title": "A New Approach of Progressive Spherical Parameterization", "doi": null, "abstractUrl": "/proceedings-article/cad-cg/2005/24730301/12OmNwp74GO", "parentPublication": { "id": "proceedings/cad-cg/2005/2473/0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2016/2312/0/2312a249", "title": "Effect of Anisotropic Interface Kinetics on the Interface Morphology of Spherical Crystal", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2016/2312a249/12OmNxvO078", "parentPublication": { "id": "proceedings/icmtma/2016/2312/0", "title": "2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457e886", "title": "BRISKS: Binary Features for Spherical Images on a Geodesic Grid", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457e886/12OmNyaGeH8", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmai/2008/3270/0/3270a053", "title": "Chapter 9: Shape Analysis of Left Ventricle Using Invariant 3-D Spherical Harmonics Shape Descriptors", "doi": null, "abstractUrl": "/proceedings-article/gmai/2008/3270a053/12OmNyen1x6", "parentPublication": { "id": "proceedings/gmai/2008/3270/0", "title": "Geometric Modeling and Imaging--New Trends", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07434077", "title": "Spherical Parameterization Balancing Angle and Area Distortions", "doi": null, "abstractUrl": "/journal/tg/2017/06/07434077/13rRUxAASTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/07927729", "title": "Advanced Hierarchical Spherical Parameterizations", "doi": null, "abstractUrl": "/journal/tg/2018/06/07927729/13rRUy3xY2W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150932", "title": "WISH: efficient 3D biological shape classification through Willmore flow and Spherical Harmonics decomposition", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150932/1lPGZdGhqIU", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ap5wvyUHKM", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "acronym": "icvrv", "groupId": "1800579", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "1ap5wSJcZVe", "doi": "10.1109/ICVRV.2017.00020", "title": "Conformal Parameterization by Minimizing Distortion Energy", "normalizedTitle": "Conformal Parameterization by Minimizing Distortion Energy", "abstract": "Planar parameterization of triangulated surface meshes is used to find an isomorphic mapping between a discrete 3D surface and a planar patch, a crucial problem in computer graphics, computer aided design and digital geometric processing. This paper introduces an algorithm for parameterizing 3D meshes by minimizing the angle and area distortion energy. The parameterization algorithm traverses the mesh in a region growing way and is able to yield results with less global distortion. Various applications are tested to illustrate the effectiveness of the techniques proposed in this paper.", "abstracts": [ { "abstractType": "Regular", "content": "Planar parameterization of triangulated surface meshes is used to find an isomorphic mapping between a discrete 3D surface and a planar patch, a crucial problem in computer graphics, computer aided design and digital geometric processing. This paper introduces an algorithm for parameterizing 3D meshes by minimizing the angle and area distortion energy. The parameterization algorithm traverses the mesh in a region growing way and is able to yield results with less global distortion. Various applications are tested to illustrate the effectiveness of the techniques proposed in this paper.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Planar parameterization of triangulated surface meshes is used to find an isomorphic mapping between a discrete 3D surface and a planar patch, a crucial problem in computer graphics, computer aided design and digital geometric processing. This paper introduces an algorithm for parameterizing 3D meshes by minimizing the angle and area distortion energy. The parameterization algorithm traverses the mesh in a region growing way and is able to yield results with less global distortion. Various applications are tested to illustrate the effectiveness of the techniques proposed in this paper.", "fno": "263600a055", "keywords": [ "Computational Geometry", "Mesh Generation", "Solid Modelling", "Conformal Parameterization", "Planar Parameterization", "Triangulated Surface Meshes", "Isomorphic Mapping", "Discrete 3 D Surface", "Computer Graphics", "Digital Geometric Processing", "Area Distortion Energy", "Global Distortion", "Distortion Energy Minimization", "Three Dimensional Displays", "Mesh Generation", "Surface Treatment", "Geometry", "Two Dimensional Displays", "Nonlinear Distortion", "Triangular Mesh", "Parameterization", "Conformal Mapping" ], "authors": [ { "affiliation": null, "fullName": "Junxiao Xue", "givenName": "Junxiao", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zekun Wang", "givenName": "Zekun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chengming Liu", "givenName": "Chengming", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mingliang Xu", "givenName": "Mingliang", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvrv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "55-60", "year": "2017", "issn": "2375-141X", "isbn": "978-1-5386-2636-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "263600a049", "articleId": "1ap5AeYxipO", "__typename": "AdjacentArticleType" }, "next": { "fno": "263600a061", "articleId": "1ap5xjYpSZa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/3/3962e702", "title": "Survey on Planar Parameterization of Triangular Meshes", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e702/12OmNA1mbfa", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284900", "title": "An Energy-Minimizing Mesh Parameterization", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284900/12OmNBt3qkv", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840b161", "title": "Multiview Photometric Stereo Using Planar Mesh Parameterization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840b161/12OmNrAv3Cy", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498sorkine", "title": "Bounded-distortion Piecewise Mesh Parameterization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498sorkine/12OmNzwHvcJ", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/01/v0083", "title": "Mesh Parameterization by Minimizing the Synthesized Distortion Metric with the Coefficient-Optimizing Algorithm", "doi": null, "abstractUrl": "/journal/tg/2006/01/v0083/13rRUEgarsC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07434077", "title": "Spherical Parameterization Balancing Angle and Area Distortions", "doi": null, "abstractUrl": "/journal/tg/2017/06/07434077/13rRUxAASTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/08/07565643", "title": "Robust Multiview Photometric Stereo Using Planar Mesh Parameterization", "doi": null, "abstractUrl": "/journal/tp/2017/08/07565643/13rRUxAAT2w", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08869859", "title": "Voting for Distortion Points in Geometric Processing", "doi": null, "abstractUrl": "/journal/tg/2021/04/08869859/1e9h9qbSr8A", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/09022090", "title": "Learning to Reconstruct Symmetric Shapes using Planar Parameterization of 3D Surface", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/09022090/1i5mERbIGQg", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/03/09166751", "title": "Global Conformal Parameterization via an Implementation of Holomorphic Quadratic Differentials", "doi": null, "abstractUrl": "/journal/tg/2022/03/09166751/1mgaVw1u2eQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz2TCuM", "title": "SC Conference", "acronym": "sc", "groupId": "1000729", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNBl6EIZ", "doi": "10.1145/1413370.1413419", "title": "Massively parallel volume rendering using 2-3 swap image compositing", "normalizedTitle": "Massively parallel volume rendering using 2-3 swap image compositing", "abstract": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "abstracts": [ { "abstractType": "Regular", "content": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "fno": "28350048", "keywords": [], "authors": [ { "affiliation": "University of California at Davis", "fullName": "Hongfeng Yu", "givenName": "Hongfeng", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California at Davis", "fullName": "Chaoli Wang", "givenName": "Chaoli", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California at Davis", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "1-11", "year": "2008", "issn": null, "isbn": "978-1-4244-2835-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28350047", "articleId": "12OmNqGRG9g", "__typename": "AdjacentArticleType" }, "next": { "fno": "28350049", "articleId": "12OmNyOq4Ub", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2003/1926/0/19260014a", "title": "A Divided-Screenwise Hierarchical Compositing for Sort-Last Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2003/19260014a/12OmNC3XhyN", "parentPublication": { "id": "proceedings/ipdps/2003/1926/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910006", "title": "SLIC: Scheduled Linear Image Compositing for Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910006/12OmNCdBDUq", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvgs/2003/8122/0/01249040", "title": "SLIC: scheduled linear image compositing for parallel volume rendering", "doi": null, "abstractUrl": "/proceedings-article/pvgs/2003/01249040/12OmNrIrPk2", "parentPublication": { "id": "proceedings/pvgs/2003/8122/0", "title": "IEEE Symposium on Parallel and Large-Data Visualization and Graphics 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prs/1997/8265/0/82650087", "title": "Parallel processing of the shear-warp factorization with the binary-swap method on a distributed-memory multiprocessor system", "doi": null, "abstractUrl": "/proceedings-article/prs/1997/82650087/12OmNwdbVdo", "parentPublication": { "id": "proceedings/prs/1997/8265/0", "title": "Parallel Rendering Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2009/744/0/06375565", "title": "A configurable algorithm for parallel image-compositing applications", "doi": null, "abstractUrl": "/proceedings-article/sc/2009/06375565/12OmNxTmHIX", "parentPublication": { "id": "proceedings/sc/2009/744/0", "title": "2009 SC Conference on High Performance Computing Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2008/2835/0/05219060", "title": "Massively parallel volume rendering using 2–3 swap image compositing", "doi": null, "abstractUrl": "/proceedings-article/sc/2008/05219060/12OmNzn38PY", "parentPublication": { "id": "proceedings/sc/2008/2835/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/1999/0350/0/03500200", "title": "Efficient Compositing Methods for the Sort-Last-Sparse Parallel Volume Rendering System on Distributed Memory Multicomputers", "doi": null, "abstractUrl": "/proceedings-article/icpp/1999/03500200/12OmNzzP5Ik", "parentPublication": { "id": "proceedings/icpp/1999/0350/0", "title": "Proceedings of the 1999 International Conference on Parallel Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07433468", "title": "TOD-Tree: Task-Overlapped Direct Send Tree Image Compositing for Hybrid MPI Parallelism and GPUs", "doi": null, "abstractUrl": "/journal/tg/2017/06/07433468/13rRUwghd54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1994/04/mcg1994040059", "title": "Parallel Volume Rendering Using Binary-Swap Compositing", "doi": null, "abstractUrl": "/magazine/cg/1994/04/mcg1994040059/13rRUxE04ng", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2018/6873/0/08739210", "title": "Comparing Binary-Swap Algorithms for Odd Factors of Processes", "doi": null, "abstractUrl": "/proceedings-article/ldav/2018/08739210/1b1xc2AWYdW", "parentPublication": { "id": "proceedings/ldav/2018/6873/0", "title": "2018 IEEE 8th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wl", "title": "IEEE Symposium on Parallel and Large-Data Visualization and Graphics 2003", "acronym": "pvgs", "groupId": "1002140", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNrIrPk2", "doi": "10.1109/PVGS.2003.1249040", "title": "SLIC: scheduled linear image compositing for parallel volume rendering", "normalizedTitle": "SLIC: scheduled linear image compositing for parallel volume rendering", "abstract": "Parallel volume rendering offers a feasible solution to the large data visualization problem by distributing both the data and rendering calculations among multiple computers connected by a network. In sort-last parallel volume rendering, each processor generates an image of its assigned subvolume, which is blended together with other images to derive the final image. Improving the efficiency of this compositing step, which requires interprocesssor communication, is the key to scalable, interactive rendering. The recent trend of using hardware-accelerated volume rendering demands further acceleration of the image compositing step. We present a new optimized parallel image compositing algorithm and its performance on a PC cluster. Our test results show that this new algorithm offers significant savings over previous algorithms in both communication and compositing costs. On a 64-node PC cluster with a 100BaseT network interconnect, we can achieve interactive rendering rates for images at resolutions up to 1024x1024 pixels at several frames per second.", "abstracts": [ { "abstractType": "Regular", "content": "Parallel volume rendering offers a feasible solution to the large data visualization problem by distributing both the data and rendering calculations among multiple computers connected by a network. In sort-last parallel volume rendering, each processor generates an image of its assigned subvolume, which is blended together with other images to derive the final image. Improving the efficiency of this compositing step, which requires interprocesssor communication, is the key to scalable, interactive rendering. The recent trend of using hardware-accelerated volume rendering demands further acceleration of the image compositing step. We present a new optimized parallel image compositing algorithm and its performance on a PC cluster. Our test results show that this new algorithm offers significant savings over previous algorithms in both communication and compositing costs. On a 64-node PC cluster with a 100BaseT network interconnect, we can achieve interactive rendering rates for images at resolutions up to 1024x1024 pixels at several frames per second.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Parallel volume rendering offers a feasible solution to the large data visualization problem by distributing both the data and rendering calculations among multiple computers connected by a network. In sort-last parallel volume rendering, each processor generates an image of its assigned subvolume, which is blended together with other images to derive the final image. Improving the efficiency of this compositing step, which requires interprocesssor communication, is the key to scalable, interactive rendering. The recent trend of using hardware-accelerated volume rendering demands further acceleration of the image compositing step. We present a new optimized parallel image compositing algorithm and its performance on a PC cluster. Our test results show that this new algorithm offers significant savings over previous algorithms in both communication and compositing costs. On a 64-node PC cluster with a 100BaseT network interconnect, we can achieve interactive rendering rates for images at resolutions up to 1024x1024 pixels at several frames per second.", "fno": "01249040", "keywords": [ "Rendering Computer Graphics", "Data Visualisation", "Workstation Clusters", "Computational Complexity", "Image Resolution", "Parallel Processing", "SLIC", "Scheduled Linear Image Compositing", "Parallel Volume Rendering", "Data Visualization", "Sort Last Parallel Volume Rendering", "Interprocesssor Communication", "Scalable Interactive Rendering", "PC Cluster", "Communication Cost", "100 Base T Network Interconnect", "Image Resolution", "Rendering Computer Graphics", "Clustering Algorithms", "Pixel", "Concurrent Computing", "Computer Graphics", "Software Algorithms", "High Performance Computing", "Algorithm Design And Analysis", "Partitioning Algorithms", "Hardware" ], "authors": [ { "affiliation": "California Univ., Davis, CA, USA", "fullName": "A. Stompel", "givenName": "A.", "surname": "Stompel", "__typename": "ArticleAuthorType" }, { "affiliation": "California Univ., Davis, CA, USA", "fullName": "K.-L. Ma", "givenName": "K.-L.", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "California Univ., Davis, CA, USA", "fullName": "E.B. Lum", "givenName": "E.B.", "surname": "Lum", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Ahrens", "givenName": "J.", "surname": "Ahrens", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "J. Patchett", "givenName": "J.", "surname": "Patchett", "__typename": "ArticleAuthorType" } ], "idPrefix": "pvgs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "33-40", "year": "2003", "issn": null, "isbn": "0-7803-8122-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01249035", "articleId": "12OmNAHEpD8", "__typename": "AdjacentArticleType" }, "next": { "fno": "01249046", "articleId": "12OmNz2TCDv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sc/2008/2835/0/28350048", "title": "Massively parallel volume rendering using 2-3 swap image compositing", "doi": null, "abstractUrl": "/proceedings-article/sc/2008/28350048/12OmNBl6EIZ", "parentPublication": { "id": "proceedings/sc/2008/2835/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2003/1926/0/19260014a", "title": "A Divided-Screenwise Hierarchical Compositing for Sort-Last Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2003/19260014a/12OmNC3XhyN", "parentPublication": { "id": "proceedings/ipdps/2003/1926/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910006", "title": "SLIC: Scheduled Linear Image Compositing for Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910006/12OmNCdBDUq", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prs/1993/4920/0/00586080", "title": "A data distributed, parallel algorithm for ray-traced volume rendering", "doi": null, "abstractUrl": "/proceedings-article/prs/1993/00586080/12OmNwl8GIq", "parentPublication": { "id": "proceedings/prs/1993/4920/0", "title": "Proceedings of 1993 IEEE Parallel Rendering Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ultravis/2008/2861/0/05154059", "title": "Assessing improvements to the parallel volume rendering pipeline at large scale", "doi": null, "abstractUrl": "/proceedings-article/ultravis/2008/05154059/12OmNx9FhLW", "parentPublication": { "id": "proceedings/ultravis/2008/2861/0", "title": "2008 Ultrascale Visualization Workshop (UltraVis 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532785", "title": "COTS cluster-based sort-last rendering: performance evaluation and pipelined implementation", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532785/12OmNzXnNnW", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2008/2835/0/05219060", "title": "Massively parallel volume rendering using 2–3 swap image compositing", "doi": null, "abstractUrl": "/proceedings-article/sc/2008/05219060/12OmNzn38PY", "parentPublication": { "id": "proceedings/sc/2008/2835/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1994/04/mcg1994040059", "title": "Parallel Volume Rendering Using Binary-Swap Compositing", "doi": null, "abstractUrl": "/magazine/cg/1994/04/mcg1994040059/13rRUxE04ng", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2007/01/04020508", "title": "Hypergraph-Partitioning-Based Remapping Models for Image-Space-Parallel Direct Volume Rendering of Unstructured Grids", "doi": null, "abstractUrl": "/journal/td/2007/01/04020508/13rRUygT7eL", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222562", "title": "Homomorphic-Encrypted Volume Rendering", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222562/1nTqvh6tnr2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqIhFPl", "title": "2013 Data-Flow Execution Models for Extreme Scale Computing (DFM)", "acronym": "dfm", "groupId": "1801065", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNsbGvHO", "doi": "10.1109/DFM.2013.12", "title": "Transitioning Data Flow-Based Visualization Software to Multi-core Hybrid Parallelism", "normalizedTitle": "Transitioning Data Flow-Based Visualization Software to Multi-core Hybrid Parallelism", "abstract": "Many of today's programs for supercomputers are designed for distributed-memory parallelism, but not for shared-memory parallelism. As architectural trends for supercomputers suggest an ever-increasing number of cores per node, these projects must evaluate whether they can benefit from hybrid parallelism - parallelism that blends distributed- and shared-memory approaches - and whether the costs for migrating to new architectures are prohibitive. With this research effort, we explore whether a data flow-based visualization tool could be easily migrated to a hybrid parallel setting, what the challenges are, and what benefits hybrid parallelism achieves. For results, we find that only a relatively small investment was required to transition the tool and it significantly improves performance and also reduces memory usage and communication costs.", "abstracts": [ { "abstractType": "Regular", "content": "Many of today's programs for supercomputers are designed for distributed-memory parallelism, but not for shared-memory parallelism. As architectural trends for supercomputers suggest an ever-increasing number of cores per node, these projects must evaluate whether they can benefit from hybrid parallelism - parallelism that blends distributed- and shared-memory approaches - and whether the costs for migrating to new architectures are prohibitive. With this research effort, we explore whether a data flow-based visualization tool could be easily migrated to a hybrid parallel setting, what the challenges are, and what benefits hybrid parallelism achieves. For results, we find that only a relatively small investment was required to transition the tool and it significantly improves performance and also reduces memory usage and communication costs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many of today's programs for supercomputers are designed for distributed-memory parallelism, but not for shared-memory parallelism. As architectural trends for supercomputers suggest an ever-increasing number of cores per node, these projects must evaluate whether they can benefit from hybrid parallelism - parallelism that blends distributed- and shared-memory approaches - and whether the costs for migrating to new architectures are prohibitive. With this research effort, we explore whether a data flow-based visualization tool could be easily migrated to a hybrid parallel setting, what the challenges are, and what benefits hybrid parallelism achieves. For results, we find that only a relatively small investment was required to transition the tool and it significantly improves performance and also reduces memory usage and communication costs.", "fno": "5247a059", "keywords": [ "Parallel Processing", "Data Visualization", "Multicore Processing", "Rendering Computer Graphics", "Supercomputers", "Algorithm Design And Analysis" ], "authors": [ { "affiliation": null, "fullName": "David Camp", "givenName": "David", "surname": "Camp", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "E. Wes Bethel", "givenName": "E. Wes", "surname": "Bethel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hank Childs", "givenName": "Hank", "surname": "Childs", "__typename": "ArticleAuthorType" } ], "idPrefix": "dfm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "59-62", "year": "2013", "issn": null, "isbn": "978-1-4799-5247-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5247a051", "articleId": "12OmNyuya8B", "__typename": "AdjacentArticleType" }, "next": { "fno": "5247a063", "articleId": "12OmNzT7OqD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ultravis/2008/2861/0/05154060", "title": "Petascale visualization: Approaches and initial results", "doi": null, "abstractUrl": "/proceedings-article/ultravis/2008/05154060/12OmNBV9IjF", "parentPublication": { "id": "proceedings/ultravis/2008/2861/0", "title": "2008 Ultrascale Visualization Workshop (UltraVis 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2014/4116/0/4116a632", "title": "Parallelism Extraction Algorithm from Stream-Based Processing Flow Applying Spanning Tree", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2014/4116a632/12OmNx7G5TU", "parentPublication": { "id": "proceedings/ipdpsw/2014/4116/0", "title": "2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc/2016/4297/0/07828415", "title": "Exploring Application Performance on Emerging Hybrid-Memory Supercomputers", "doi": null, "abstractUrl": "/proceedings-article/hpcc/2016/07828415/12OmNyfvpTe", "parentPublication": { "id": "proceedings/hpcc/2016/4297/0", "title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2014/5215/0/07013209", "title": "Out-of-core visualization of time-varying hybrid-grid volume data", "doi": null, "abstractUrl": "/proceedings-article/ldav/2014/07013209/12OmNyoiZc2", "parentPublication": { "id": "proceedings/ldav/2014/5215/0", "title": "2014 IEEE 4th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07433468", "title": "TOD-Tree: Task-Overlapped Direct Send Tree Image Compositing for Hybrid MPI Parallelism and GPUs", "doi": null, "abstractUrl": "/journal/tg/2017/06/07433468/13rRUwghd54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/01/ttg2012010017", "title": "Hybrid Parallelism for Volume Rendering on Large-, Multi-, and Many-Core Systems", "doi": null, "abstractUrl": "/journal/tg/2012/01/ttg2012010017/13rRUwhHcJf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2018/8384/0/838400a160", "title": "Large-Scale Hierarchical k-means for Heterogeneous Many-Core Supercomputers", "doi": null, "abstractUrl": "/proceedings-article/sc/2018/838400a160/17D45XH89q8", "parentPublication": { "id": "proceedings/sc/2018/8384/0", "title": "2018 SC18: The International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2022/9856/0/985600a313", "title": "HPH: Hybrid Parallelism on Heterogeneous Clusters for Accelerating Large-scale DNNs Training", "doi": null, "abstractUrl": "/proceedings-article/cluster/2022/985600a313/1HzBwzL91Sw", "parentPublication": { "id": "proceedings/cluster/2022/9856/0", "title": "2022 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2018/6873/0/08739224", "title": "SpRay: Speculative Ray Scheduling for Large Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/ldav/2018/08739224/1b1xbA4goJW", "parentPublication": { "id": "proceedings/ldav/2018/6873/0", "title": "2018 IEEE 8th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2020/7383/0/738300a596", "title": "Pipette: Improving Core Utilization on Irregular Applications through Intra-Core Pipeline Parallelism", "doi": null, "abstractUrl": "/proceedings-article/micro/2020/738300a596/1oFGEPl8IaQ", "parentPublication": { "id": "proceedings/micro/2020/7383/0", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqH9hns", "title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)", "acronym": "cluster", "groupId": "1000095", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNx5Yv8x", "doi": "10.1109/CLUSTER.2017.97", "title": "A Stencil Framework to Realize Large-Scale Computations Beyond Device Memory Capacity on GPU Supercomputers", "normalizedTitle": "A Stencil Framework to Realize Large-Scale Computations Beyond Device Memory Capacity on GPU Supercomputers", "abstract": "Stencil-based applications such as CFD have succeeded in obtaining high performance on GPU supercomputers. The problem sizes of these applications are limited by the GPU device memory capacity, which is typically smaller than the host memory. On GPU supercomputers, a locality improvement technique using temporal blocking method with memory swapping between host and device enables large computation beyond the device memory capacity. However, because the loop management of temporal blocking with data movement across these memories increase programming difficulty, the applying this methodology to the real stencil applications demands substantially higher programming cost. Our high-productivity stencil framework automatically applies temporal blocking to boundary exchange required for stencil computation and supports automatic memory swapping provided by a MPI/CUDA wrapper library. The framework-based application for the airflow in an urban city maintains 80% performance even with the twice larger than the GPU memory capacity and have demonstrated good weak scalability on the TSUBAME 2.5 supercomputer.", "abstracts": [ { "abstractType": "Regular", "content": "Stencil-based applications such as CFD have succeeded in obtaining high performance on GPU supercomputers. The problem sizes of these applications are limited by the GPU device memory capacity, which is typically smaller than the host memory. On GPU supercomputers, a locality improvement technique using temporal blocking method with memory swapping between host and device enables large computation beyond the device memory capacity. However, because the loop management of temporal blocking with data movement across these memories increase programming difficulty, the applying this methodology to the real stencil applications demands substantially higher programming cost. Our high-productivity stencil framework automatically applies temporal blocking to boundary exchange required for stencil computation and supports automatic memory swapping provided by a MPI/CUDA wrapper library. The framework-based application for the airflow in an urban city maintains 80% performance even with the twice larger than the GPU memory capacity and have demonstrated good weak scalability on the TSUBAME 2.5 supercomputer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Stencil-based applications such as CFD have succeeded in obtaining high performance on GPU supercomputers. The problem sizes of these applications are limited by the GPU device memory capacity, which is typically smaller than the host memory. On GPU supercomputers, a locality improvement technique using temporal blocking method with memory swapping between host and device enables large computation beyond the device memory capacity. However, because the loop management of temporal blocking with data movement across these memories increase programming difficulty, the applying this methodology to the real stencil applications demands substantially higher programming cost. Our high-productivity stencil framework automatically applies temporal blocking to boundary exchange required for stencil computation and supports automatic memory swapping provided by a MPI/CUDA wrapper library. The framework-based application for the airflow in an urban city maintains 80% performance even with the twice larger than the GPU memory capacity and have demonstrated good weak scalability on the TSUBAME 2.5 supercomputer.", "fno": "2326a525", "keywords": [ "Graphics Processing Units", "Atmospheric Modeling", "Performance Evaluation", "Libraries", "Supercomputers", "Programming", "Urban Areas" ], "authors": [ { "affiliation": null, "fullName": "Takashi Shimokawabe", "givenName": "Takashi", "surname": "Shimokawabe", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Toshio Endo", "givenName": "Toshio", "surname": "Endo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Naoyuki Onodera", "givenName": "Naoyuki", "surname": "Onodera", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Takayuki Aoki", "givenName": "Takayuki", "surname": "Aoki", "__typename": "ArticleAuthorType" } ], "idPrefix": "cluster", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-09-01T00:00:00", "pubType": "proceedings", "pages": "525-529", "year": "2017", "issn": "2168-9253", "isbn": "978-1-5386-2326-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2326a520", "articleId": "12OmNx19jUC", "__typename": "AdjacentArticleType" }, "next": { "fno": "2326a530", "articleId": "12OmNxxNbU1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sbac-padw/2017/4819/0/6291a043", "title": "Automatic Partitioning of Stencil Computations on Heterogeneous Systems", "doi": null, "abstractUrl": "/proceedings-article/sbac-padw/2017/6291a043/12OmNApu5x0", "parentPublication": { "id": "proceedings/sbac-padw/2017/4819/0", "title": "2017 International Symposium on Computer Architecture and High Performance Computing Workshops (SBAC-PADW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2016/3653/0/3653a021", "title": "Realizing Out-of-Core Stencil Computations Using Multi-tier Memory Hierarchy on GPGPU Clusters", "doi": null, "abstractUrl": "/proceedings-article/cluster/2016/3653a021/12OmNBSSVcb", "parentPublication": { "id": "proceedings/cluster/2016/3653/0", "title": "2016 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2014/5548/0/06968747", "title": "Software technologies coping with memory hierarchy of GPGPU clusters for stencil computations", "doi": null, "abstractUrl": "/proceedings-article/cluster/2014/06968747/12OmNrJROTi", "parentPublication": { "id": "proceedings/cluster/2014/5548/0", "title": "2014 IEEE International Conference On Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2013/2081/0/2081a078", "title": "On the GPU-CPU Performance Portability of OpenCL for 3D Stencil Computations", "doi": null, "abstractUrl": "/proceedings-article/icpads/2013/2081a078/12OmNrJRPav", "parentPublication": { "id": "proceedings/icpads/2013/2081/0", "title": "2013 International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2015/5785/0/5785a625", "title": "Realizing Extremely Large-Scale Stencil Applications on GPU Supercomputers", "doi": null, "abstractUrl": "/proceedings-article/icpads/2015/5785a625/12OmNrkBwnF", "parentPublication": { "id": "proceedings/icpads/2015/5785/0", "title": "2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waccpd/2016/6152/0/07836579", "title": "An Extension of OpenACC Directives for Out-of-Core Stencil Computation with Temporal Blocking", "doi": null, "abstractUrl": "/proceedings-article/waccpd/2016/07836579/12OmNvAAtiC", "parentPublication": { "id": "proceedings/waccpd/2016/6152/0", "title": "2016 Third Workshop on Accelerator Programming using Directives (WACCPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2014/8447/0/07034720", "title": "Register Caching for Stencil Computations on GPUs", "doi": null, "abstractUrl": "/proceedings-article/synasc/2014/07034720/12OmNyL0Tz7", "parentPublication": { "id": "proceedings/synasc/2014/8447/0", "title": "2014 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2017/3914/0/07967144", "title": "26 PFLOPS Stencil Computations for Atmospheric Modeling on Sunway TaihuLight", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2017/07967144/12OmNzhna6L", "parentPublication": { "id": "proceedings/ipdps/2017/3914/0", "title": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/p3hpc/2018/0220/0/022000a059", "title": "Delivering Performance-Portable Stencil Computations on CPUs and GPUs Using Bricks", "doi": null, "abstractUrl": "/proceedings-article/p3hpc/2018/022000a059/17PYEiNBqoz", "parentPublication": { "id": "proceedings/p3hpc/2018/0220/0", "title": "2018 IEEE/ACM International Workshop on Performance, Portability and Productivity in HPC (P3HPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2022/8106/0/810600a875", "title": "StencilMART: Predicting Optimization Selection for Stencil Computations across GPUs", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2022/810600a875/1F1VXQXNJ1C", "parentPublication": { "id": "proceedings/ipdps/2022/8106/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlD94W", "title": "2013 Fourth World Congress on Software Engineering (WCSE)", "acronym": "wcse", "groupId": "1002945", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNynJMSt", "doi": "10.1109/WCSE.2013.40", "title": "Large Image Fast Compositing Based on Uniform Sample", "normalizedTitle": "Large Image Fast Compositing Based on Uniform Sample", "abstract": "We present a novel approach called Uniform Sample Compositing (USC) to improve the efficiency of gradient-domain compositing of large image, which could be implemented in significantly reduced time and memory. Firstly, our algorithm divides an original source image into many quadrilateral patches, and discards inner pixels and reserves the border pixels of patches) to constitute two low resolution images (Uniform-Sample-images) on which the image compositing operator is implemented. Finally according to the solution of Uniform-Sample-images the result image is evaluated by concurrently computing inner pixels of every quadrilateral patch on GPU. The evaluation of these patches is independent to each other so that our algorithm has better parallelism. The reduction of time and memory is achieved by solving Poisson equation on low resolution and inner interpolation on quadrilateral patches. The major merits of our approach are demonstrated by performing large image composite (whose size is about multi-Gigabyte) in significantly reduced time and memory while achieving visually identical results.", "abstracts": [ { "abstractType": "Regular", "content": "We present a novel approach called Uniform Sample Compositing (USC) to improve the efficiency of gradient-domain compositing of large image, which could be implemented in significantly reduced time and memory. Firstly, our algorithm divides an original source image into many quadrilateral patches, and discards inner pixels and reserves the border pixels of patches) to constitute two low resolution images (Uniform-Sample-images) on which the image compositing operator is implemented. Finally according to the solution of Uniform-Sample-images the result image is evaluated by concurrently computing inner pixels of every quadrilateral patch on GPU. The evaluation of these patches is independent to each other so that our algorithm has better parallelism. The reduction of time and memory is achieved by solving Poisson equation on low resolution and inner interpolation on quadrilateral patches. The major merits of our approach are demonstrated by performing large image composite (whose size is about multi-Gigabyte) in significantly reduced time and memory while achieving visually identical results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a novel approach called Uniform Sample Compositing (USC) to improve the efficiency of gradient-domain compositing of large image, which could be implemented in significantly reduced time and memory. Firstly, our algorithm divides an original source image into many quadrilateral patches, and discards inner pixels and reserves the border pixels of patches) to constitute two low resolution images (Uniform-Sample-images) on which the image compositing operator is implemented. Finally according to the solution of Uniform-Sample-images the result image is evaluated by concurrently computing inner pixels of every quadrilateral patch on GPU. The evaluation of these patches is independent to each other so that our algorithm has better parallelism. The reduction of time and memory is achieved by solving Poisson equation on low resolution and inner interpolation on quadrilateral patches. The major merits of our approach are demonstrated by performing large image composite (whose size is about multi-Gigabyte) in significantly reduced time and memory while achieving visually identical results.", "fno": "06754290", "keywords": [ "Image Resolution", "Graphics", "Graphics Processing Units", "Streaming Media", "Linear Systems", "Poisson Equations", "Interpolation", "GPU", "Image Compositing", "Gradient Domain", "Uniform Sample", "Large Image" ], "authors": [ { "affiliation": null, "fullName": "Jian Wu", "givenName": "Jian", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tianxiu Yu", "givenName": "Tianxiu", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lei Zhao", "givenName": "Lei", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "wcse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "221-224", "year": "2013", "issn": null, "isbn": "978-1-4799-2882-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06754289", "articleId": "12OmNzVGcEy", "__typename": "AdjacentArticleType" }, "next": { "fno": "06754291", "articleId": "12OmNrIJqDT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pvgs/2003/8122/0/01249040", "title": "SLIC: scheduled linear image compositing for parallel volume rendering", "doi": null, "abstractUrl": "/proceedings-article/pvgs/2003/01249040/12OmNrIrPk2", "parentPublication": { "id": "proceedings/pvgs/2003/8122/0", "title": "IEEE Symposium on Parallel and Large-Data Visualization and Graphics 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2015/7673/0/7673a197", "title": "Fast, Realistic and Controllable Smoke Simulation", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2015/7673a197/12OmNwe2Io8", "parentPublication": { "id": "proceedings/icvrv/2015/7673/0", "title": "2015 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2013/2549/0/06746391", "title": "Pedestrian Counting for a Large Scene Using a GigaPan Panorama and Exemplar-SVMs", "doi": null, "abstractUrl": "/proceedings-article/cis/2013/06746391/12OmNx5GU8o", "parentPublication": { "id": "proceedings/cis/2013/2549/0", "title": "2013 Ninth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2011/4576/0/4576b048", "title": "Fast Band Selection for Hyperspectral Imagery", "doi": null, "abstractUrl": "/proceedings-article/icpads/2011/4576b048/12OmNxEjXXq", "parentPublication": { "id": "proceedings/icpads/2011/4576/0", "title": "Parallel and Distributed Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2016/8815/0/8815a842", "title": "Distributed-Memory Large Deformation Diffeomorphic 3D Image Registration", "doi": null, "abstractUrl": "/proceedings-article/sc/2016/8815a842/12OmNy1SFPW", "parentPublication": { "id": "proceedings/sc/2016/8815/0", "title": "SC16: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07433468", "title": "TOD-Tree: Task-Overlapped Direct Send Tree Image Compositing for Hybrid MPI Parallelism and GPUs", "doi": null, "abstractUrl": "/journal/tg/2017/06/07433468/13rRUwghd54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600m2602", "title": "Fast Light-Weight Near-Field Photometric Stereo", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600m2602/1H0NbGekyGc", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d441", "title": "HighEr-Resolution Network for Image Demosaicing and Enhancing", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d441/1i5mHCqWU5q", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09266764", "title": "Patch Textures: Hardware Support for Mesh Colors", "doi": null, "abstractUrl": "/journal/tg/2022/07/09266764/1oZxEim72LK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2021/3283/0/328300a043", "title": "GPU-based Image Compression for Efficient Compositing in Distributed Rendering Applications", "doi": null, "abstractUrl": "/proceedings-article/ldav/2021/328300a043/1zdPDTXc4hy", "parentPublication": { "id": "proceedings/ldav/2021/3283/0", "title": "2021 IEEE 11th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz2TCuM", "title": "SC Conference", "acronym": "sc", "groupId": "1000729", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzn38PY", "doi": "10.1109/SC.2008.5219060", "title": "Massively parallel volume rendering using 2–3 swap image compositing", "normalizedTitle": "Massively parallel volume rendering using 2–3 swap image compositing", "abstract": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "abstracts": [ { "abstractType": "Regular", "content": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ever-increasing amounts of simulation data produced by scientists demand high-end parallel visualization capability. However, image compositing, which requires interprocessor communication, is often the bottleneck stage for parallel rendering of large volume data sets. Existing image compositing solutions either incur a large number of messages exchanged among processors (such as the direct send method), or limit the number of processors that can be effectively utilized (such as the binary swap method). We introduce a new image compositing algorithm, called 2-3 swap, which combines the flexibility of the direct send method and the optimality of the binary swap method. The 2-3 swap algorithm allows an arbitrary number of processors to be used for compositing, and fully utilizes all participating processors throughout the course of the compositing. We experiment with this image compositing solution on a supercomputer with thousands of processors, and demonstrate its great flexibility as well as scalability.", "fno": "05219060", "keywords": [ "Data Visualisation", "Image Resolution", "Multiprocessing Systems", "Natural Sciences Computing", "Parallel Algorithms", "Rendering Computer Graphics", "Massively Parallel Volume Rendering", "2 3 Swap Image Compositing Algorithm", "High Resolution Parallel Visualization Capability", "Interprocessor Communication", "Large Scale Scientific Volume Data Set", "Message Exchange", "Processor Utilization", "Binary Swap Method", "Direct Send Method", "Multiprocessor System Throughout", "Supercomputer System", "Scientific Simulation Data", "Rendering Computer Graphics", "Data Visualization", "Supercomputers", "Computer Science", "Computational Modeling", "Chaotic Communication", "Computer Simulation", "Scalability", "Testing", "Personal Communication Networks" ], "authors": [ { "affiliation": "Department of Computer Science, University of California at Davis, USA", "fullName": "Hongfeng Yu", "givenName": "Hongfeng", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of California at Davis, USA", "fullName": "Chaoli Wang", "givenName": null, "surname": "Chaoli Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of California at Davis, USA", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-11-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "2167-4329", "isbn": "978-1-4244-2835-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28350036", "articleId": "12OmNwFiddd", "__typename": "AdjacentArticleType" }, "next": { "fno": "28350037", "articleId": "12OmNz4Bdjc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sc/2008/2835/0/28350048", "title": "Massively parallel volume rendering using 2-3 swap image compositing", "doi": null, "abstractUrl": "/proceedings-article/sc/2008/28350048/12OmNBl6EIZ", "parentPublication": { "id": "proceedings/sc/2008/2835/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2003/1926/0/19260014a", "title": "A Divided-Screenwise Hierarchical Compositing for Sort-Last Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2003/19260014a/12OmNC3XhyN", "parentPublication": { "id": "proceedings/ipdps/2003/1926/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910006", "title": "SLIC: Scheduled Linear Image Compositing for Parallel Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910006/12OmNCdBDUq", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvgs/2003/8122/0/01249040", "title": "SLIC: scheduled linear image compositing for parallel volume rendering", "doi": null, "abstractUrl": "/proceedings-article/pvgs/2003/01249040/12OmNrIrPk2", "parentPublication": { "id": "proceedings/pvgs/2003/8122/0", "title": "IEEE Symposium on Parallel and Large-Data Visualization and Graphics 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prs/1997/8265/0/82650087", "title": "Parallel processing of the shear-warp factorization with the binary-swap method on a distributed-memory multiprocessor system", "doi": null, "abstractUrl": "/proceedings-article/prs/1997/82650087/12OmNwdbVdo", "parentPublication": { "id": "proceedings/prs/1997/8265/0", "title": "Parallel Rendering Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2009/744/0/06375565", "title": "A configurable algorithm for parallel image-compositing applications", "doi": null, "abstractUrl": "/proceedings-article/sc/2009/06375565/12OmNxTmHIX", "parentPublication": { "id": "proceedings/sc/2009/744/0", "title": "2009 SC Conference on High Performance Computing Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/1999/0350/0/03500200", "title": "Efficient Compositing Methods for the Sort-Last-Sparse Parallel Volume Rendering System on Distributed Memory Multicomputers", "doi": null, "abstractUrl": "/proceedings-article/icpp/1999/03500200/12OmNzzP5Ik", "parentPublication": { "id": "proceedings/icpp/1999/0350/0", "title": "Proceedings of the 1999 International Conference on Parallel Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07433468", "title": "TOD-Tree: Task-Overlapped Direct Send Tree Image Compositing for Hybrid MPI Parallelism and GPUs", "doi": null, "abstractUrl": "/journal/tg/2017/06/07433468/13rRUwghd54", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1994/04/mcg1994040059", "title": "Parallel Volume Rendering Using Binary-Swap Compositing", "doi": null, "abstractUrl": "/magazine/cg/1994/04/mcg1994040059/13rRUxE04ng", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2018/6873/0/08739210", "title": "Comparing Binary-Swap Algorithms for Odd Factors of Processes", "doi": null, "abstractUrl": "/proceedings-article/ldav/2018/08739210/1b1xc2AWYdW", "parentPublication": { "id": "proceedings/ldav/2018/6873/0", "title": "2018 IEEE 8th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Fu96jCrxug", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "acronym": "ipdpsw", "groupId": "1800044", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Fu9rhQlD2M", "doi": "10.1109/IPDPSW55747.2022.00072", "title": "Performance Analysis of Parallel FFT on Large Multi-GPU Systems", "normalizedTitle": "Performance Analysis of Parallel FFT on Large Multi-GPU Systems", "abstract": "In this paper we present a performance study of multidimensional Fast Fourier Transforms (FFT) with GPU accelerators on modern hybrid architectures, as those expected for upcoming exascale systems. We assess and leverage features from traditional implementations of parallel FFTs and provide an algorithm that encompasses a wide range of their parameters, and adds novel developments such as FFT grid shrinking and batched transforms. Next, we create a bandwidth model to quantify the computational costs and analyze the well-known communication bottleneck for All-to-All and Point-to-Point MPI exchanges. Then, using a tuning methodology, we are able to accelerate the FFT computation and reduce the communication cost, achieving linear scalability on a large-scale system with GPU accelerators. Finally, our performance analysis is extended to show that carefully tuning the algorithm can further accelerate applications heavily relying on FFTs, such is the case of molecular dynamics software. Our experiments were performed on Summit and Spock supercomputers with IBM Power9 cores, over 3000 NVIDIA V-100 GPUs, and AMD MI-100 GPUs.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we present a performance study of multidimensional Fast Fourier Transforms (FFT) with GPU accelerators on modern hybrid architectures, as those expected for upcoming exascale systems. We assess and leverage features from traditional implementations of parallel FFTs and provide an algorithm that encompasses a wide range of their parameters, and adds novel developments such as FFT grid shrinking and batched transforms. Next, we create a bandwidth model to quantify the computational costs and analyze the well-known communication bottleneck for All-to-All and Point-to-Point MPI exchanges. Then, using a tuning methodology, we are able to accelerate the FFT computation and reduce the communication cost, achieving linear scalability on a large-scale system with GPU accelerators. Finally, our performance analysis is extended to show that carefully tuning the algorithm can further accelerate applications heavily relying on FFTs, such is the case of molecular dynamics software. Our experiments were performed on Summit and Spock supercomputers with IBM Power9 cores, over 3000 NVIDIA V-100 GPUs, and AMD MI-100 GPUs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we present a performance study of multidimensional Fast Fourier Transforms (FFT) with GPU accelerators on modern hybrid architectures, as those expected for upcoming exascale systems. We assess and leverage features from traditional implementations of parallel FFTs and provide an algorithm that encompasses a wide range of their parameters, and adds novel developments such as FFT grid shrinking and batched transforms. Next, we create a bandwidth model to quantify the computational costs and analyze the well-known communication bottleneck for All-to-All and Point-to-Point MPI exchanges. Then, using a tuning methodology, we are able to accelerate the FFT computation and reduce the communication cost, achieving linear scalability on a large-scale system with GPU accelerators. Finally, our performance analysis is extended to show that carefully tuning the algorithm can further accelerate applications heavily relying on FFTs, such is the case of molecular dynamics software. Our experiments were performed on Summit and Spock supercomputers with IBM Power9 cores, over 3000 NVIDIA V-100 GPUs, and AMD MI-100 GPUs.", "fno": "974700a372", "keywords": [ "Application Program Interfaces", "Coprocessors", "Fast Fourier Transforms", "Graphics Processing Units", "Message Passing", "Multiprocessing Systems", "Parallel Machines", "Performance Evaluation", "Performance Analysis", "Parallel FFT", "Multi GPU Systems", "Multidimensional Fast Fourier Transforms", "GPU Accelerators", "Modern Hybrid Architectures", "Exascale Systems", "Batched Transforms", "Bandwidth Model", "Computational Costs", "Communication Bottleneck", "Tuning Methodology", "FFT Computation", "Communication Cost", "Large Scale System", "Point To Point MPI Exchanges", "Scalability", "Heuristic Algorithms", "Software Algorithms", "Graphics Processing Units", "Bandwidth", "Transforms", "Supercomputers", "FFT", "Multi GPU", "MPI Tuning", "Scalability" ], "authors": [ { "affiliation": "University of Tennessee,Knoxville,TN,USA", "fullName": "Alan Ayala", "givenName": "Alan", "surname": "Ayala", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee,Knoxville,TN,USA", "fullName": "Stan Tomov", "givenName": "Stan", "surname": "Tomov", "__typename": "ArticleAuthorType" }, { "affiliation": "Oak Ridge National Laboratory,Oak Ridge,TN,USA", "fullName": "Miroslav Stoyanov", "givenName": "Miroslav", "surname": "Stoyanov", "__typename": "ArticleAuthorType" }, { "affiliation": "Nvidia Corporation,Santa Clara,CA,USA", "fullName": "Azzam Haidar", "givenName": "Azzam", "surname": "Haidar", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee,Knoxville,TN,USA", "fullName": "Jack Dongarra", "givenName": "Jack", "surname": "Dongarra", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdpsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "372-381", "year": "2022", "issn": null, "isbn": "978-1-6654-9747-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "974700a371", "articleId": "1Fu9jaZF6CI", "__typename": "AdjacentArticleType" }, "next": { "fno": "974700a382", "articleId": "1Fu97cWeI9O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpads/2011/4576/0/4576a228", "title": "Automatic FFT Performance Tuning on OpenCL GPUs", "doi": null, "abstractUrl": "/proceedings-article/icpads/2011/4576a228/12OmNwp74vH", "parentPublication": { "id": "proceedings/icpads/2011/4576/0", "title": "Parallel and Distributed Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2013/0494/0/06567572", "title": "Transforming a linear algebra core to an FFT accelerator", "doi": null, "abstractUrl": "/proceedings-article/asap/2013/06567572/12OmNxV4izP", "parentPublication": { "id": "proceedings/asap/2013/0494/0", "title": "2013 IEEE 24th International Conference on Application-Specific Systems, Architectures and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2013/5096/0/5096a174", "title": "Implementation of Parallel 1-D FFT on GPU Clusters", "doi": null, "abstractUrl": "/proceedings-article/cse/2013/5096a174/12OmNy1SFCq", "parentPublication": { "id": "proceedings/cse/2013/5096/0", "title": "2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispass/2013/5776/0/06557174", "title": "Quantifying the energy efficiency of FFT on heterogeneous platforms", "doi": null, "abstractUrl": "/proceedings-article/ispass/2013/06557174/12OmNzBOhUw", "parentPublication": { "id": "proceedings/ispass/2013/5776/0", "title": "IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2013/3214/0/06742796", "title": "A hybrid GPU/CPU FFT library for large FFT problems", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2013/06742796/12OmNzUxOc3", "parentPublication": { "id": "proceedings/ipccc/2013/3214/0", "title": "2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2008/2835/0/05213922", "title": "High performance discrete Fourier transforms on graphics processors", "doi": null, "abstractUrl": "/proceedings-article/sc/2008/05213922/12OmNzzP5P2", "parentPublication": { "id": "proceedings/sc/2008/2835/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/exampi/2019/6009/0/600900a012", "title": "Impacts of Multi-GPU MPI Collective Communications on Large FFT Computation", "doi": null, "abstractUrl": "/proceedings-article/exampi/2019/600900a012/1gAvTAtz6a4", "parentPublication": { "id": "proceedings/exampi/2019/6009/0", "title": "2019 IEEE/ACM Workshop on Exascale MPI (ExaMPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2021/2701/0/270100a001", "title": "To Buffer, or Not to Buffer? A Case Study on FFT Accelerators for Ultra-Low-Power Multicore Clusters", "doi": null, "abstractUrl": "/proceedings-article/asap/2021/270100a001/1wiR2lJkUeI", "parentPublication": { "id": "proceedings/asap/2021/2701/0", "title": "2021 IEEE 32nd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2021/9666/0/966600a001", "title": "tcFFT: A Fast Half-Precision FFT Library for NVIDIA Tensor Cores", "doi": null, "abstractUrl": "/proceedings-article/cluster/2021/966600a001/1xFv2nDdsmk", "parentPublication": { "id": "proceedings/cluster/2021/9666/0", "title": "2021 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/exampi/2021/1108/0/110800a046", "title": "Accelerating Multi - Process Communication for Parallel 3-D FFT", "doi": null, "abstractUrl": "/proceedings-article/exampi/2021/110800a046/1zHId7tSVQ4", "parentPublication": { "id": "proceedings/exampi/2021/1108/0", "title": "2021 Workshop on Exascale MPI (ExaMPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCmpcNk", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNBO3Kih", "doi": "10.1109/VISUAL.2005.1532812", "title": "High dynamic range volume visualization", "normalizedTitle": "High dynamic range volume visualization", "abstract": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.", "abstracts": [ { "abstractType": "Regular", "content": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.", "fno": "01532812", "keywords": [ "Data Visualisation", "Rendering Computer Graphics", "Image Resolution", "Transfer Functions", "Graphical User Interfaces", "Dynamic Range Volume Visualization", "Image Resolution", "Precision Intermediate Image", "Precision Volume Rendering", "Dynamic Tone Mapping", "Regular Display Device", "Image Display Algorithm", "Transfer Function Design Interface", "Nonlinear Magnification", "Logarithmic Scaling", "Graphics Hardware", "Dynamic Range", "Data Visualization", "Computer Displays", "Rendering Computer Graphics", "Pixel", "Spatial Resolution", "Heuristic Algorithms", "Transfer Functions", "Graphics", "Hardware" ], "authors": [ { "affiliation": "Dept. of Comput. Sci. & Eng;, Minnesota Univ., MN, USA", "fullName": "X. Yuan", "givenName": "X.", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Eng;, Minnesota Univ., MN, USA", "fullName": "M.Z. Nguyen", "givenName": "M.Z.", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Eng;, Minnesota Univ., MN, USA", "fullName": "B. Chen", "givenName": "B.", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci. & Eng;, Minnesota Univ., MN, USA", "fullName": "D.H. Porter", "givenName": "D.H.", "surname": "Porter", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "327,328,329,330,331,332,333,334", "year": "2005", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27660026", "articleId": "12OmNrIaear", "__typename": "AdjacentArticleType" }, "next": { "fno": "27660027", "articleId": "12OmNxVV60y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vg/2005/26/0/01500529", "title": "Volume rendering for high dynamic range displays", "doi": null, "abstractUrl": "/proceedings-article/vg/2005/01500529/12OmNAkEU5K", "parentPublication": { "id": "proceedings/vg/2005/26/0", "title": "Volume Graphics 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761893", "title": "Adaptive local contrast enhancement for the visualization of high dynamic range images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761893/12OmNC1Y5iC", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/6/3507f583", "title": "Color Vision Based High Dynamic Range Images Rendering", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507f583/12OmNCctfaE", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etvis/2016/4731/0/07851159", "title": "Gaze-contingent interactive visualization of high-dynamic-range imagery", "doi": null, "abstractUrl": "/proceedings-article/etvis/2016/07851159/12OmNqBbHOw", "parentPublication": { "id": "proceedings/etvis/2016/4731/0", "title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032e529", "title": "Learning High Dynamic Range from Outdoor Panoramas", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032e529/12OmNwHz09M", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770269", "title": "Two-Channel Technique for High Dynamic Range Image Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770269/12OmNyo1nMX", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/27660042", "title": "High Dynamic Range Volume Visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/27660042/12OmNzUxO6V", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/01/ttg2014010070", "title": "GPU-Based Volume Visualization from High-Order Finite Element Fields", "doi": null, "abstractUrl": "/journal/tg/2014/01/ttg2014010070/13rRUEgs2M1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/04/v0433", "title": "HDR VolVis: High Dynamic Range Volume Visualization", "doi": null, "abstractUrl": "/journal/tg/2006/04/v0433/13rRUxjQyv7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/06/09035636", "title": "Photographic High-Dynamic-Range Scalar Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/06/09035636/1iaeBQ4H756", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvAiSpZ", "title": "2015 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNqNoscN", "doi": "10.1109/VR.2015.7223347", "title": "Validation of SplitVector encoding and stereoscopy for quantitative visualization of quantum physics data in virtual environments", "normalizedTitle": "Validation of SplitVector encoding and stereoscopy for quantitative visualization of quantum physics data in virtual environments", "abstract": "We designed and evaluated SplitVector, a new vector field display approach to help scientists perform new discrimination tasks on scientific data shown in virtual environments (VEs). Our empirical study compared the SplitVector approach with three other approaches of direct linear representation, log, and text display common in information-rich VEs or IRVEs. Our results suggest the following: (1) SplitVectors improve the accuracy by about 10 times compared to the linear mapping and by 4 times to log in discrimination tasks; (2) SplitVectors lead to no significant differences from the IRVE text display approach, yet reduce the clutter; and (3) SplitVector improved task performance in both mono and stereoscopy conditions.", "abstracts": [ { "abstractType": "Regular", "content": "We designed and evaluated SplitVector, a new vector field display approach to help scientists perform new discrimination tasks on scientific data shown in virtual environments (VEs). Our empirical study compared the SplitVector approach with three other approaches of direct linear representation, log, and text display common in information-rich VEs or IRVEs. Our results suggest the following: (1) SplitVectors improve the accuracy by about 10 times compared to the linear mapping and by 4 times to log in discrimination tasks; (2) SplitVectors lead to no significant differences from the IRVE text display approach, yet reduce the clutter; and (3) SplitVector improved task performance in both mono and stereoscopy conditions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We designed and evaluated SplitVector, a new vector field display approach to help scientists perform new discrimination tasks on scientific data shown in virtual environments (VEs). Our empirical study compared the SplitVector approach with three other approaches of direct linear representation, log, and text display common in information-rich VEs or IRVEs. Our results suggest the following: (1) SplitVectors improve the accuracy by about 10 times compared to the linear mapping and by 4 times to log in discrimination tasks; (2) SplitVectors lead to no significant differences from the IRVE text display approach, yet reduce the clutter; and (3) SplitVector improved task performance in both mono and stereoscopy conditions.", "fno": "07223347", "keywords": [ "Encoding", "Data Visualization", "Standards", "Virtual Environments", "Accuracy", "Physics", "Clutter" ], "authors": [ { "affiliation": "University of Maryland, Baltimore County", "fullName": "Jian Chen", "givenName": "Jian", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Wesley Griffin", "givenName": "Wesley", "surname": "Griffin", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland, Baltimore County", "fullName": "Henan Zhao", "givenName": "Henan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Judith E. Terrill", "givenName": "Judith E.", "surname": "Terrill", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Garnett W. Bryant", "givenName": "Garnett W.", "surname": "Bryant", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "165-166", "year": "2015", "issn": null, "isbn": "978-1-4799-1727-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07223346", "articleId": "12OmNvjyxwr", "__typename": "AdjacentArticleType" }, "next": { "fno": "07223348", "articleId": "12OmNBQkx3d", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2017/06/07429760", "title": "Validation of SplitVectors Encoding for Quantitative Visualization of Large-Magnitude-Range Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2017/06/07429760/13rRUwj7cpf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs4S8wo", "title": "Computer Modeling and Simulation, International Conference on", "acronym": "uksim", "groupId": "1001885", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNviZlAk", "doi": "10.1109/UKSIM.2008.33", "title": "Flexible Offline-Visualization for Mobile Wireless Networks", "normalizedTitle": "Flexible Offline-Visualization for Mobile Wireless Networks", "abstract": "For the evaluation of wireless network protocols, simulation has established itself as a good compromise between cost and complexity, on the one hand, and accuracy of results, on the other hand. In order to assess and debug the simulated protocols, visualization both in the form of textual console messages and graphical representations can be of great help. In this paper, we present a network visualizer which was written for the wireless network simulator ShoX. Aside from nodes, links, movements and data packets, our visualizer allows to graphically display arbitrary node and link states in an intuitive and flexible way. As opposed to other visualization tools, it provides the possibility to change the way in which such inner states are displayed without running the simulation again. This can significantly improve the designer's productivity especially in complex network scenarios. Further, our visualizer allows to display textual debug messages together with the graphical animation in a synchronized form, thus combining the strengths of textual and graphical informations.", "abstracts": [ { "abstractType": "Regular", "content": "For the evaluation of wireless network protocols, simulation has established itself as a good compromise between cost and complexity, on the one hand, and accuracy of results, on the other hand. In order to assess and debug the simulated protocols, visualization both in the form of textual console messages and graphical representations can be of great help. In this paper, we present a network visualizer which was written for the wireless network simulator ShoX. Aside from nodes, links, movements and data packets, our visualizer allows to graphically display arbitrary node and link states in an intuitive and flexible way. As opposed to other visualization tools, it provides the possibility to change the way in which such inner states are displayed without running the simulation again. This can significantly improve the designer's productivity especially in complex network scenarios. Further, our visualizer allows to display textual debug messages together with the graphical animation in a synchronized form, thus combining the strengths of textual and graphical informations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For the evaluation of wireless network protocols, simulation has established itself as a good compromise between cost and complexity, on the one hand, and accuracy of results, on the other hand. In order to assess and debug the simulated protocols, visualization both in the form of textual console messages and graphical representations can be of great help. In this paper, we present a network visualizer which was written for the wireless network simulator ShoX. Aside from nodes, links, movements and data packets, our visualizer allows to graphically display arbitrary node and link states in an intuitive and flexible way. As opposed to other visualization tools, it provides the possibility to change the way in which such inner states are displayed without running the simulation again. This can significantly improve the designer's productivity especially in complex network scenarios. Further, our visualizer allows to display textual debug messages together with the graphical animation in a synchronized form, thus combining the strengths of textual and graphical informations.", "fno": "3114a404", "keywords": [ "Network Visualization", "Wireless Network Simulation", "Offline Visualization Mapping" ], "authors": [ { "affiliation": null, "fullName": "Johannes Lessmann", "givenName": "Johannes", "surname": "Lessmann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tales Heimfarth", "givenName": "Tales", "surname": "Heimfarth", "__typename": "ArticleAuthorType" } ], "idPrefix": "uksim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-04-01T00:00:00", "pubType": "proceedings", "pages": "404-409", "year": "2008", "issn": null, "isbn": "978-0-7695-3114-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3114a398", "articleId": "12OmNCgJe4H", "__typename": "AdjacentArticleType" }, "next": { "fno": "3114a410", "articleId": "12OmNCvLXYO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2008/3502/0/3502a875", "title": "WiFIsViz: Effective Visualization of Frequent Itemsets", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a875/12OmNBDyA9y", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2012/4654/0/4654a048", "title": "Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network Simulator", "doi": null, "abstractUrl": "/proceedings-article/itng/2012/4654a048/12OmNBhpSce", "parentPublication": { "id": "proceedings/itng/2012/4654/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2008/3114/0/3114a410", "title": "ShoX: An Easy to Use Simulation Platform for Wireless Networks", "doi": null, "abstractUrl": "/proceedings-article/uksim/2008/3114a410/12OmNCvLXYO", "parentPublication": { "id": "proceedings/uksim/2008/3114/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2005/9477/0/01532067", "title": "Visualization of automated trust negotiation", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2005/01532067/12OmNqC2uVm", "parentPublication": { "id": "proceedings/vizsec/2005/9477/0", "title": "IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363153", "title": "OpenGUFI: An Extensible Graphical User Flow Interface for an SDN-Enabled Wireless Testbed", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363153/12OmNrkT7ur", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2011/4409/0/4409a804", "title": "FpMapViz: A Space-Filling Visualization for Frequent Patterns", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2011/4409a804/12OmNscfHY6", "parentPublication": { "id": "proceedings/icdmw/2011/4409/0", "title": "2011 IEEE 11th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2010/3973/0/3973a181", "title": "Multi-view Communication Visualization for Wireless Network Simulations", "doi": null, "abstractUrl": "/proceedings-article/isms/2010/3973a181/12OmNxWcHae", "parentPublication": { "id": "proceedings/isms/2010/3973/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1993/3230/2/00284089", "title": "A visualization and control environment for parallel program debugging", "doi": null, "abstractUrl": "/proceedings-article/hicss/1993/00284089/12OmNzZ5oja", "parentPublication": { "id": "proceedings/hicss/1993/3230/2", "title": "1993 The Twenty-sixth Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07429760", "title": "Validation of SplitVectors Encoding for Quantitative Visualization of Large-Magnitude-Range Vector Fields", "doi": null, "abstractUrl": "/journal/tg/2017/06/07429760/13rRUwj7cpf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222091", "title": "StructGraphics: Flexible Visualization Design through Data-Agnostic and Reusable Graphical Structures", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222091/1nTroDgoFeo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzVXNJh", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "acronym": "3dui", "groupId": "1001623", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyVes5e", "doi": "10.1109/3DUI.2015.7131733", "title": "Comparing indirect and direct touch in a stereoscopic interaction task", "normalizedTitle": "Comparing indirect and direct touch in a stereoscopic interaction task", "abstract": "In this paper we studied the impact that the directedness of touch interaction has on a path following task performed on a stereoscopic display. The richness of direct touch interaction comes with the potential risk of occluding parts of the display area, in order to express one's interaction intent. In scenarios where attention to detail is of critical importance, such as browsing a 3D dataset or navigating a 3D environment, important details might be missed. We designed a user study in which participants were asked to move an object within a 3D environment while avoiding a set of static distractor objects. Participants used an indirect touch interaction technique on a tablet and a direct touch technique on the screen. Results of the study show that in the indirect touch condition, participants made 30% less collisions with the distractor objects.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we studied the impact that the directedness of touch interaction has on a path following task performed on a stereoscopic display. The richness of direct touch interaction comes with the potential risk of occluding parts of the display area, in order to express one's interaction intent. In scenarios where attention to detail is of critical importance, such as browsing a 3D dataset or navigating a 3D environment, important details might be missed. We designed a user study in which participants were asked to move an object within a 3D environment while avoiding a set of static distractor objects. Participants used an indirect touch interaction technique on a tablet and a direct touch technique on the screen. Results of the study show that in the indirect touch condition, participants made 30% less collisions with the distractor objects.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we studied the impact that the directedness of touch interaction has on a path following task performed on a stereoscopic display. The richness of direct touch interaction comes with the potential risk of occluding parts of the display area, in order to express one's interaction intent. In scenarios where attention to detail is of critical importance, such as browsing a 3D dataset or navigating a 3D environment, important details might be missed. We designed a user study in which participants were asked to move an object within a 3D environment while avoiding a set of static distractor objects. Participants used an indirect touch interaction technique on a tablet and a direct touch technique on the screen. Results of the study show that in the indirect touch condition, participants made 30% less collisions with the distractor objects.", "fno": "07131733", "keywords": [ "Three Dimensional Displays", "Stereo Image Processing", "Visualization", "Performance Evaluation", "User Interfaces", "Cameras", "Solid Modeling" ], "authors": [ { "affiliation": "University of Portsmouth, Lancaster University, England", "fullName": "Adalberto L. Simeone", "givenName": "Adalberto L.", "surname": "Simeone", "__typename": "ArticleAuthorType" }, { "affiliation": "Lancaster University, England", "fullName": "Hans Gellerseny", "givenName": "Hans", "surname": "Gellerseny", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dui", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "105-108", "year": "2015", "issn": null, "isbn": "978-1-4673-6886-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07131732", "articleId": "12OmNBr4exE", "__typename": "AdjacentArticleType" }, "next": { "fno": "07131734", "articleId": "12OmNzV70Ie", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2014/6184/0/06948403", "title": "Thermal touch: Thermography-enabled everywhere touch interfaces for mobile augmented reality applications", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948403/12OmNAYXWzp", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2014/6854/0/6854a186", "title": "Effects on Performance of Analytical Tools for Visually Demanding Tasks through Direct and Indirect Touch Interaction in an Immersive Visualization", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2014/6854a186/12OmNBzRNtg", "parentPublication": { "id": "proceedings/icvrv/2014/6854/0", "title": "2014 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2014/3624/0/06798833", "title": "Mid-air interactions above stereoscopic interactive tables", "doi": null, "abstractUrl": "/proceedings-article/3dui/2014/06798833/12OmNCzKlMB", "parentPublication": { "id": "proceedings/3dui/2014/3624/0", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2009/3943/0/04811045", "title": "iPhone/iPod Touch as Input Devices for Navigation in Immersive Virtual Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811045/12OmNqGitWe", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2017/6716/0/07893345", "title": "Indirect touch interaction with stereoscopic displays using a two-sided handheld touch device", "doi": null, "abstractUrl": "/proceedings-article/3dui/2017/07893345/12OmNvCRgkJ", "parentPublication": { "id": "proceedings/3dui/2017/6716/0", "title": "2017 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549380", "title": "Touch & move: A portable stereoscopic multi-touch table", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549380/12OmNxXCGEs", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460025", "title": "Indirect touch manipulation for interaction with stereoscopic displays", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460025/12OmNxwENpw", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08448289", "title": "Performance Envelopes of in-Air Direct and Smartwatch Indirect Control for Head-Mounted Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08448289/13bd1fZBGcE", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a782", "title": "Virtual Touch Modulates Perception of Pleasant Touch", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a782/1CJd7sjt0go", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797993", "title": "VirtualTablet: Extending Movable Surfaces with Touch Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797993/1cJ1hgQ4Li8", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir9", "title": "2018 22nd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WaTklm", "doi": "10.1109/iV.2018.00082", "title": "Encoding the Convergent Path of Cross-Disciplinary Team", "normalizedTitle": "Encoding the Convergent Path of Cross-Disciplinary Team", "abstract": "At the stage of creative thinking, many designers often produce many design strategies, but as the number increases, many implied information may be lost in the process of convergence. We think through creative thinking that design thinking can be coded, as well as the nodes that define the convergence path, we can find the hidden and unfocused hidden points. Through the display of paths, designers can repeatedly review the design strategies of each stage. This preliminary exploration shows the development and positioning of future auxiliary tools.", "abstracts": [ { "abstractType": "Regular", "content": "At the stage of creative thinking, many designers often produce many design strategies, but as the number increases, many implied information may be lost in the process of convergence. We think through creative thinking that design thinking can be coded, as well as the nodes that define the convergence path, we can find the hidden and unfocused hidden points. Through the display of paths, designers can repeatedly review the design strategies of each stage. This preliminary exploration shows the development and positioning of future auxiliary tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "At the stage of creative thinking, many designers often produce many design strategies, but as the number increases, many implied information may be lost in the process of convergence. We think through creative thinking that design thinking can be coded, as well as the nodes that define the convergence path, we can find the hidden and unfocused hidden points. Through the display of paths, designers can repeatedly review the design strategies of each stage. This preliminary exploration shows the development and positioning of future auxiliary tools.", "fno": "720200a438", "keywords": [ "Data Visualisation", "Innovation Management", "Systems Analysis", "Information Visualization", "Cross Disciplinary Team", "Design Strategies", "Convergence Path", "Design Thinking", "Creative Thinking", "Convergence", "Visualization", "Green Products", "Encoding", "Data Visualization", "Tools", "Complexity Theory", "Information Visualization", "Convergence Path", "Thinking Creative", "Associative Thinking" ], "authors": [ { "affiliation": null, "fullName": "Yi-Sin Wu", "givenName": "Yi-Sin", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Teng-Wen Chang", "givenName": "Teng-Wen", "surname": "Chang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "438-441", "year": "2018", "issn": null, "isbn": "978-1-5386-7202-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720200a434", "articleId": "17D45WHONs1", "__typename": "AdjacentArticleType" }, "next": { "fno": "720200a442", "articleId": "17D45Xh13sX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718448", "title": "Team Creative Processes: The Importance of Complementary and Shared Mental Models", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718448/12OmNAsk4Ae", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pci/2012/4825/0/4825a180", "title": "Using Microworlds to Introduce Programming to Novices", "doi": null, "abstractUrl": "/proceedings-article/pci/2012/4825a180/12OmNBKmXlZ", "parentPublication": { "id": "proceedings/pci/2012/4825/0", "title": "2012 16th Panhellenic Conference on Informatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a226", "title": "From the Virtual to the Material: The re-Appearance of the Art Object", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a226/12OmNBigFoG", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a398", "title": "EVA: A Visualization Framework for Organizing Concept Sketches", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a398/12OmNqAU6GU", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2017/4039/0/4039a002", "title": "Cross-Disciplinary Perspectives on Collaborations with Software Engineers", "doi": null, "abstractUrl": "/proceedings-article/chase/2017/4039a002/12OmNqIQS0a", "parentPublication": { "id": "proceedings/chase/2017/4039/0", "title": "2017 IEEE/ACM 10th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070398", "title": "Making programming more conversational", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070398/12OmNqIQS6E", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a277", "title": "Evaluation of Cross-Disciplinary Course Module Designs for Smart Living Topics", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a277/17D45XreC6K", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200c032", "title": "AESOP: Abstract Encoding of Stories, Objects, and Pictures", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200c032/1BmKfFADRao", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2020/7397/0/739700a621", "title": "Creative Thinking Affecting Team Creativity and Team Performance: Analysis Result of the Survey to Graduate Students in a Team Collaboration Project", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2020/739700a621/1tGcnqsYMbS", "parentPublication": { "id": "proceedings/iiai-aai/2020/7397/0", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/10/09537306", "title": "How Templated Requirements Specifications Inhibit Creativity in Software Engineering", "doi": null, "abstractUrl": "/journal/ts/2022/10/09537306/1wTiG4dgKB2", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmKfFADRao", "doi": "10.1109/ICCV48922.2021.00206", "title": "AESOP: Abstract Encoding of Stories, Objects, and Pictures", "normalizedTitle": "AESOP: Abstract Encoding of Stories, Objects, and Pictures", "abstract": "Visual storytelling and story comprehension are uniquely human skills that play a central role in how we learn about and experience the world. Despite remarkable progress in recent years in synthesis of visual and textual content in isolation and learning effective joint visual-linguistic representations, existing systems still operate only at a superficial, factual level. With the goal of developing systems that are able to comprehend rich human-generated narratives, and co-create new stories, we introduce AESOP: a new dataset that captures the creative process associated with visual storytelling. Visual panels are composed of clip-art objects with specific attributes enabling a broad range of creative expression. Using AESOP, we propose foundational storytelling tasks that are generative variants of story cloze tests, to better measure the creative and causal reasoning ability required for visual storytelling. We further develop a generalized story completion framework that models stories as the co-evolution of visual and textual concepts. We benchmark the proposed approach with human baselines and evaluate using comprehensive qualitative and quantitative metrics. Our results highlight key insights related to the dataset, modelling and evaluation of visual storytelling for future research in this promising field of study.", "abstracts": [ { "abstractType": "Regular", "content": "Visual storytelling and story comprehension are uniquely human skills that play a central role in how we learn about and experience the world. Despite remarkable progress in recent years in synthesis of visual and textual content in isolation and learning effective joint visual-linguistic representations, existing systems still operate only at a superficial, factual level. With the goal of developing systems that are able to comprehend rich human-generated narratives, and co-create new stories, we introduce AESOP: a new dataset that captures the creative process associated with visual storytelling. Visual panels are composed of clip-art objects with specific attributes enabling a broad range of creative expression. Using AESOP, we propose foundational storytelling tasks that are generative variants of story cloze tests, to better measure the creative and causal reasoning ability required for visual storytelling. We further develop a generalized story completion framework that models stories as the co-evolution of visual and textual concepts. We benchmark the proposed approach with human baselines and evaluate using comprehensive qualitative and quantitative metrics. Our results highlight key insights related to the dataset, modelling and evaluation of visual storytelling for future research in this promising field of study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual storytelling and story comprehension are uniquely human skills that play a central role in how we learn about and experience the world. Despite remarkable progress in recent years in synthesis of visual and textual content in isolation and learning effective joint visual-linguistic representations, existing systems still operate only at a superficial, factual level. With the goal of developing systems that are able to comprehend rich human-generated narratives, and co-create new stories, we introduce AESOP: a new dataset that captures the creative process associated with visual storytelling. Visual panels are composed of clip-art objects with specific attributes enabling a broad range of creative expression. Using AESOP, we propose foundational storytelling tasks that are generative variants of story cloze tests, to better measure the creative and causal reasoning ability required for visual storytelling. We further develop a generalized story completion framework that models stories as the co-evolution of visual and textual concepts. We benchmark the proposed approach with human baselines and evaluate using comprehensive qualitative and quantitative metrics. Our results highlight key insights related to the dataset, modelling and evaluation of visual storytelling for future research in this promising field of study.", "fno": "281200c032", "keywords": [ "Measurement", "Visualization", "Computer Vision", "Computational Modeling", "Benchmark Testing", "Encoding", "Cognition", "Vision Language", "Datasets And Evaluation", "Representation Learning", "Visual Reasoning And Logical Representation" ], "authors": [ { "affiliation": "Rutgers University", "fullName": "Hareesh Ravi", "givenName": "Hareesh", "surname": "Ravi", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Kushal Kafle", "givenName": "Kushal", "surname": "Kafle", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Scott Cohen", "givenName": "Scott", "surname": "Cohen", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Jonathan Brandt", "givenName": "Jonathan", "surname": "Brandt", "__typename": "ArticleAuthorType" }, { "affiliation": "Rutgers University", "fullName": "Mubbasir Kapadia", "givenName": "Mubbasir", "surname": "Kapadia", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "2032-2043", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200c022", "articleId": "1BmFjB6HvZm", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200c044", "articleId": "1BmFDfoMbLi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2010/6261/0/05673199", "title": "Analyzing engineering design stories -- Predicting engagement in inventive action", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673199/12OmNB6D71r", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/culture-computing/2011/4546/0/4546a086", "title": "Towards Preserving Indigenous Oral Stories Using Tangible Objects", "doi": null, "abstractUrl": "/proceedings-article/culture-computing/2011/4546a086/12OmNB836JJ", "parentPublication": { "id": "proceedings/culture-computing/2011/4546/0", "title": "International Conference on Culture and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645250", "title": "Setting the scene: Scaffolding stories to benefit middle school students learning to program", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645250/12OmNBPtJAb", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2017/04/07519091", "title": "Leveraging Intention Revision in Narrative Planning to Create Suspenseful Stories", "doi": null, "abstractUrl": "/journal/ci/2017/04/07519091/13rRUxCitLM", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/05/mcg2015050084", "title": "More Than Telling a Story: Transforming Data into Visually Shared Stories", "doi": null, "abstractUrl": "/magazine/cg/2015/05/mcg2015050084/13rRUxjyX6v", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a390", "title": "Storytelling Canvas: A Visual Framework for Developing and Delivering Resonating Stories", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a390/17D45We0UCY", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2019/0810/0/08818925", "title": "A Framework for Authoring Logically Ordered Visual Data Stories", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2019/08818925/1dsfTRHa1ZS", "parentPublication": { "id": "proceedings/vl-hcc/2019/0810/0", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09523761", "title": "Evaluating Effects of Background Stories on Graph Perception", "doi": null, "abstractUrl": "/journal/tg/2022/12/09523761/1wnLgUKA2fm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552203", "title": "A Design Space for Applying the Freytag&#x0027;s Pyramid Structure to Data Stories", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552203/1xic2a0UxkA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a209", "title": "On the impact of using different templates on creating and understanding user stories", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a209/1yDjHCtW360", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAPBbgs", "title": "International Symposium on Ubiquitous Virtual Reality", "acronym": "isuvr", "groupId": "1002009", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyGtjsc", "doi": "10.1109/ISUVR.2009.21", "title": "CAMAR Tag Framework: Context-Aware Mobile Augmented Reality Tag Framework for Dual-reality Linkage", "normalizedTitle": "CAMAR Tag Framework: Context-Aware Mobile Augmented Reality Tag Framework for Dual-reality Linkage", "abstract": "In this paper, we propose a novel tag framework for sharing information in dual-reality space, which is based on context-aware mobile augmented reality (CAMAR). When a user selects a target object to be tagged onto dual-reality, the proposed framework and procedures create CAMAR Tag with a user’s mobile device to be registered in virtual space. CAMAR Tag is able to play a role as a reference point, a sharing point and a key of contextual searching. We present a concept behind CAMAR Tag and how it can be generated, implemented and deployed in dual-reality.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a novel tag framework for sharing information in dual-reality space, which is based on context-aware mobile augmented reality (CAMAR). When a user selects a target object to be tagged onto dual-reality, the proposed framework and procedures create CAMAR Tag with a user’s mobile device to be registered in virtual space. CAMAR Tag is able to play a role as a reference point, a sharing point and a key of contextual searching. We present a concept behind CAMAR Tag and how it can be generated, implemented and deployed in dual-reality.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a novel tag framework for sharing information in dual-reality space, which is based on context-aware mobile augmented reality (CAMAR). When a user selects a target object to be tagged onto dual-reality, the proposed framework and procedures create CAMAR Tag with a user’s mobile device to be registered in virtual space. CAMAR Tag is able to play a role as a reference point, a sharing point and a key of contextual searching. We present a concept behind CAMAR Tag and how it can be generated, implemented and deployed in dual-reality.", "fno": "3704a039", "keywords": [ "CAMAR Tag", "Tag Framework", "Mobile Augmented Reality", "Dual Reality" ], "authors": [ { "affiliation": null, "fullName": "Hyejin Kim", "givenName": "Hyejin", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wonwoo Lee", "givenName": "Wonwoo", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Woontack Woo", "givenName": "Woontack", "surname": "Woo", "__typename": "ArticleAuthorType" } ], "idPrefix": "isuvr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "39-42", "year": "2009", "issn": null, "isbn": "978-0-7695-3704-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3704a033", "articleId": "12OmNyPQ4Oa", "__typename": "AdjacentArticleType" }, "next": { "fno": "3704a043", "articleId": "12OmNxveNNg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/svr/2013/5001/0/06655798", "title": "Shader Integration in a Virtual Reality Framework", "doi": null, "abstractUrl": "/proceedings-article/svr/2013/06655798/12OmNA1DMjS", "parentPublication": { "id": "proceedings/svr/2013/5001/0", "title": "2013 XV Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2000/0795/0/07950181", "title": "Balloon Tag: (In)visible Marker Which Tells Who's Who", "doi": null, "abstractUrl": "/proceedings-article/iswc/2000/07950181/12OmNAolH7P", "parentPublication": { "id": "proceedings/iswc/2000/0795/0", "title": "Digest of Papers. Fourth International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2009/3704/0/3704a021", "title": "CAMAR 2.0: Future Direction of Context-Aware Mobile Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2009/3704a021/12OmNBhHt5Y", "parentPublication": { "id": "proceedings/isuvr/2009/3704/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995402", "title": "Discriminative tag learning on YouTube videos with latent sub-tags", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995402/12OmNCb3fsF", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2016/1552/0/07574703", "title": "Augmented reality via temporal psycho-visual modulation", "doi": null, "abstractUrl": "/proceedings-article/icmew/2016/07574703/12OmNxveNFG", "parentPublication": { "id": "proceedings/icmew/2016/1552/0", "title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2010/4154/0/4154a436", "title": "Searching and Browsing Tag Spaces Using the Semantic Tag Clustering Search Framework", "doi": null, "abstractUrl": "/proceedings-article/icsc/2010/4154a436/12OmNxwncBi", "parentPublication": { "id": "proceedings/icsc/2010/4154/0", "title": "2010 IEEE Fourth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a417", "title": "Tag Clustering and Refinement on Semantic Unity Graph", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a417/12OmNzsrwfR", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699245", "title": "Sharing and Augmenting Emotion in Collaborative Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699245/19F1QUyCKEE", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797992", "title": "Text Presentation for Augmented Reality Applications in Dual-Task Situations", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797992/1cJ0SIvkZnG", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797806", "title": "Star Tag: A superhuman sport to promote physical activity", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797806/1cJ0SbGoFTa", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWcH0j", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "acronym": "euc", "groupId": "1002596", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNz61dEX", "doi": "10.1109/EUC.2010.65", "title": "Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context Awareness", "normalizedTitle": "Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context Awareness", "abstract": "In this paper we describe the achievement of a Context Aware platform capable of collecting contextual user data and also information about users' surrounding context such as relevant Point of Interests. We also analyze the complexity of exploiting a large amount of collected data through a proper interactive system without affecting applications' usability and avoiding information overload. We finally detail the achievement of an Augmented reality user interface which serves as pedestrian navigator towards context aware Point of Interests.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we describe the achievement of a Context Aware platform capable of collecting contextual user data and also information about users' surrounding context such as relevant Point of Interests. We also analyze the complexity of exploiting a large amount of collected data through a proper interactive system without affecting applications' usability and avoiding information overload. We finally detail the achievement of an Augmented reality user interface which serves as pedestrian navigator towards context aware Point of Interests.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we describe the achievement of a Context Aware platform capable of collecting contextual user data and also information about users' surrounding context such as relevant Point of Interests. We also analyze the complexity of exploiting a large amount of collected data through a proper interactive system without affecting applications' usability and avoiding information overload. We finally detail the achievement of an Augmented reality user interface which serves as pedestrian navigator towards context aware Point of Interests.", "fno": "4322a392", "keywords": [ "Augmented Reality", "Graphical User Interfaces", "Ubiquitous Computing", "Context Awareness", "Augmented Reality", "Contextual User Data", "User Interface", "Context Aware Point Of Interest", "Context", "Navigation", "Augmented Reality", "Context Aware Services", "Mobile Communication", "Cameras", "Mobile Handsets", "Context Awareness", "Augmented Reality", "Context AP Is", "Recommendation Techniques" ], "authors": [ { "affiliation": "Strategy & Innovation, Telecom Italia, Turin, Italy", "fullName": "Claudio Venezia", "givenName": "Claudio", "surname": "Venezia", "__typename": "ArticleAuthorType" }, { "affiliation": "Strategy & Innovation, Telecom Italia, Turin, Italy", "fullName": "Marco Marengo", "givenName": "Marco", "surname": "Marengo", "__typename": "ArticleAuthorType" } ], "idPrefix": "euc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "392-396", "year": "2010", "issn": null, "isbn": "978-1-4244-9719-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4322a386", "articleId": "12OmNsbY6PS", "__typename": "AdjacentArticleType" }, "next": { "fno": "4322a397", "articleId": "12OmNqzu6UV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2005/2296/0/22960369", "title": "A Framework of Context-Awareness for Ubiquitous Computing Middlewares", "doi": null, "abstractUrl": "/proceedings-article/icis/2005/22960369/12OmNALCNr8", "parentPublication": { "id": "proceedings/icis/2005/2296/0", "title": "Proceedings. Fourth Annual ACIS International Conference on Computer and Information Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2013/5075/0/06529446", "title": "Keynote: Context-aware computing in the era of crowd sensing from personal and space context to social and community context", "doi": null, "abstractUrl": "/proceedings-article/percomw/2013/06529446/12OmNAlNiBd", "parentPublication": { "id": "proceedings/percomw/2013/5075/0", "title": "2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2014/5066/0/5066a805", "title": "CAPPA: Context Aware Privacy Protecting Advertising - An Extension to CLOPRO Framework", "doi": null, "abstractUrl": "/proceedings-article/scc/2014/5066a805/12OmNBtl1EK", "parentPublication": { "id": "proceedings/scc/2014/5066/0", "title": "2014 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b212", "title": "Mining Personal Context-Aware Preferences for Mobile Users", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b212/12OmNBtl1wy", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2012/2719/0/06337160", "title": "Designing a Streamlined Viewport Strategy System to Enhance Performance in Context Awareness in Mobile Learning Environments", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2012/06337160/12OmNCdTeLt", "parentPublication": { "id": "proceedings/iiai-aai/2012/2719/0", "title": "2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc/2009/3737/0/3737a367", "title": "CADBA: A Context-aware Architecture Based on Context Database for Mobile Computing", "doi": null, "abstractUrl": "/proceedings-article/uic-atc/2009/3737a367/12OmNwErpAi", "parentPublication": { "id": "proceedings/uic-atc/2009/3737/0", "title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saint/2003/1872/0/18720022", "title": "Context Attributes: An Approach to Enable Context-awareness for Service Discovery", "doi": null, "abstractUrl": "/proceedings-article/saint/2003/18720022/12OmNx7ov2c", "parentPublication": { "id": "proceedings/saint/2003/1872/0", "title": "2003 Symposium on Applications and the Internet, 2003. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2013/4973/2/4973b116", "title": "A Chinese Restaurant Recommendation System Based on Mobile Context-Aware Services", "doi": null, "abstractUrl": "/proceedings-article/mdm/2013/4973b116/12OmNyL0Tyz", "parentPublication": { "id": "proceedings/mdm/2013/4973/2", "title": "2013 IEEE 14th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccve/2012/4900/0/4900a136", "title": "Context-Aware Service Recommendation for Moving Connected Devices", "doi": null, "abstractUrl": "/proceedings-article/iccve/2012/4900a136/12OmNzdoMQd", "parentPublication": { "id": "proceedings/iccve/2012/4900/0", "title": "International Conference on Connected Vehicles and Expo (ICCVE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2014/01/mmu2014010024", "title": "Mobile Photo Recommendation and Logbook Generation Using Context-Tagged Images", "doi": null, "abstractUrl": "/magazine/mu/2014/01/mmu2014010024/13rRUwd9CIm", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwE9Ott", "title": "International Symposium on Ubiquitous Virtual Reality", "acronym": "isuvr", "groupId": "1002009", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzSyCbt", "doi": "10.1109/ISUVR.2008.14", "title": "Exploiting Context-Awareness in Augmented Reality Applications", "normalizedTitle": "Exploiting Context-Awareness in Augmented Reality Applications", "abstract": "In this paper, we study how to exploit the context-awareness in augmented reality (AR) applications to take advantage of the context in both the high-level and low-level processing. We propose an AR system architecture that works with a context-awareness framework. In the system, both the preliminary and the final context is provided to the process that needs the context. We provide two scenarios that exploit the context in AR applications in the low-level processing and show implementation results with the proposed system. In the first scenario, we adopt a light sensor to enhance the marker detection performance under the varying lighting condition. In the second scenario, we exploit the context in the marker recognition stage where a single color marker is recognized as several different sub-markers based on the context. By adopting the context in the low-level processing, it is possible to address the problems that are hard to be solved by the computer vision techniques only.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we study how to exploit the context-awareness in augmented reality (AR) applications to take advantage of the context in both the high-level and low-level processing. We propose an AR system architecture that works with a context-awareness framework. In the system, both the preliminary and the final context is provided to the process that needs the context. We provide two scenarios that exploit the context in AR applications in the low-level processing and show implementation results with the proposed system. In the first scenario, we adopt a light sensor to enhance the marker detection performance under the varying lighting condition. In the second scenario, we exploit the context in the marker recognition stage where a single color marker is recognized as several different sub-markers based on the context. By adopting the context in the low-level processing, it is possible to address the problems that are hard to be solved by the computer vision techniques only.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we study how to exploit the context-awareness in augmented reality (AR) applications to take advantage of the context in both the high-level and low-level processing. We propose an AR system architecture that works with a context-awareness framework. In the system, both the preliminary and the final context is provided to the process that needs the context. We provide two scenarios that exploit the context in AR applications in the low-level processing and show implementation results with the proposed system. In the first scenario, we adopt a light sensor to enhance the marker detection performance under the varying lighting condition. In the second scenario, we exploit the context in the marker recognition stage where a single color marker is recognized as several different sub-markers based on the context. By adopting the context in the low-level processing, it is possible to address the problems that are hard to be solved by the computer vision techniques only.", "fno": "3259a051", "keywords": [ "Context Awareness", "Augmented Reality", "Smart Marker", "Personalization" ], "authors": [ { "affiliation": null, "fullName": "Wonwoo Lee", "givenName": "Wonwoo", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Woontack Woo", "givenName": "Woontack", "surname": "Woo", "__typename": "ArticleAuthorType" } ], "idPrefix": "isuvr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "51-54", "year": "2008", "issn": null, "isbn": "978-0-7695-3259-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3259a047", "articleId": "12OmNyjtNFP", "__typename": "AdjacentArticleType" }, "next": { "fno": "3259a055", "articleId": "12OmNxwncvH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/euc/2011/4552/0/4552a372", "title": "Augmented Reality Marker for Operating Home Appliances", "doi": null, "abstractUrl": "/proceedings-article/euc/2011/4552a372/12OmNAJm0lI", "parentPublication": { "id": "proceedings/euc/2011/4552/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2016/0662/0/0662a358", "title": "Mobile Augmented Reality Authoring Tool", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a358/12OmNAXglVC", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvri/2011/0054/0/05759617", "title": "AR-Ghost Hunter: An augmented reality gun application", "doi": null, "abstractUrl": "/proceedings-article/isvri/2011/05759617/12OmNAqU4Ul", "parentPublication": { "id": "proceedings/isvri/2011/0054/0", "title": "2011 IEEE International Symposium on VR Innovation (ISVRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i816", "title": "Infrared Marker Based Augmented Reality System for Equipment Maintenance", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i816/12OmNBKEyAE", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2012/4903/0/4903a124", "title": "Mobile Edutainment with Interactive Augmented Reality Using Adaptive Marker Tracking", "doi": null, "abstractUrl": "/proceedings-article/icpads/2012/4903a124/12OmNrJAe8b", "parentPublication": { "id": "proceedings/icpads/2012/4903/0", "title": "Parallel and Distributed Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336d170", "title": "Virtual Tactical Map with Tangible Augmented Reality Interface", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336d170/12OmNx38vWd", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07435333", "title": "Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2017/06/07435333/13rRUwfZBVq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/03/07867820", "title": "A Context-Aware Method for Authentically Simulating Outdoors Shadows for Mobile Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2018/03/07867820/13rRUy2YLT6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/04/09676467", "title": "Analytic Review of Using Augmented Reality for Situational Awareness", "doi": null, "abstractUrl": "/journal/tg/2023/04/09676467/1A3dpoxdxgQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a004", "title": "A Scalable and Long-Term Wearable Augmented Reality System for Order Picking", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a004/1gysmqM7SJW", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CJcAaH6aYg", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1CJd1lHH4D6", "doi": "10.1109/VRW55335.2022.00320", "title": "[DC] Context-Aware Inference and Adaptation in Augmented Reality", "normalizedTitle": "[DC] Context-Aware Inference and Adaptation in Augmented Reality", "abstract": "Augmented Reality(AR) offers the potential for easy and efficient information access, reinforcing the wide belief that AR Glasses are the next-generation of personal computing devices. However, to realize this all-day AR vision, the AR interface must be able to address the challenges that constant and pervasive presence of virtual content can cause for the user. The optimal interface, that is the most efficient yet least intrusive, in one context may be the worst interface for another context. Throughout the day, as the user switches context, an optimal all-day interface must adapts its virtual content display and interactions as well. This work aims to propose a research agenda to design and validate different adaptation techniques and context-aware AR interfaces and introduce a framework for the design of such intelligent interfaces.", "abstracts": [ { "abstractType": "Regular", "content": "Augmented Reality(AR) offers the potential for easy and efficient information access, reinforcing the wide belief that AR Glasses are the next-generation of personal computing devices. However, to realize this all-day AR vision, the AR interface must be able to address the challenges that constant and pervasive presence of virtual content can cause for the user. The optimal interface, that is the most efficient yet least intrusive, in one context may be the worst interface for another context. Throughout the day, as the user switches context, an optimal all-day interface must adapts its virtual content display and interactions as well. This work aims to propose a research agenda to design and validate different adaptation techniques and context-aware AR interfaces and introduce a framework for the design of such intelligent interfaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Augmented Reality(AR) offers the potential for easy and efficient information access, reinforcing the wide belief that AR Glasses are the next-generation of personal computing devices. However, to realize this all-day AR vision, the AR interface must be able to address the challenges that constant and pervasive presence of virtual content can cause for the user. The optimal interface, that is the most efficient yet least intrusive, in one context may be the worst interface for another context. Throughout the day, as the user switches context, an optimal all-day interface must adapts its virtual content display and interactions as well. This work aims to propose a research agenda to design and validate different adaptation techniques and context-aware AR interfaces and introduce a framework for the design of such intelligent interfaces.", "fno": "840200a938", "keywords": [ "Augmented Reality", "Inference Mechanisms", "Ubiquitous Computing", "AR Glasses", "Computing Devices", "Optimal Interface", "Virtual Content Display", "Context Aware AR Interfaces", "Intelligent Interfaces", "Information Access", "Augmented Reality", "Human Computer Interaction", "Three Dimensional Displays", "Conferences", "Glass", "Next Generation Networking", "Augmented Reality", "Human Centered Computing X 2014 Mixed Augmented Reality", "Human Centered Computing X 2014 Interaction Techniques", "Human Centered Computing X 2014 Empirical Studies In HCI" ], "authors": [ { "affiliation": "Center for Human-Computer Interaction and Department of Computer Science,Virginia Tech,USA", "fullName": "Shakiba Davari", "givenName": "Shakiba", "surname": "Davari", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "938-939", "year": "2022", "issn": null, "isbn": "978-1-6654-8402-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "840200a936", "articleId": "1CJcFsf3SU0", "__typename": "AdjacentArticleType" }, "next": { "fno": "840200a940", "articleId": "1CJelpv0Txm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/intetain/2015/0061/0/07325483", "title": "A preliminary study of a hybrid user interface for augmented reality applications", "doi": null, "abstractUrl": "/proceedings-article/intetain/2015/07325483/12OmNBtl1pV", "parentPublication": { "id": "proceedings/intetain/2015/0061/0", "title": "2015 7th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504725", "title": "Casting shadows: Ecological interface design for augmented reality pedestrian collision warning", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504725/12OmNC8uRtR", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icimt/2009/3922/0/3922a019", "title": "Collaborative Augmented Reality Approach for Multi-user Interaction in Urban Simulation", "doi": null, "abstractUrl": "/proceedings-article/icimt/2009/3922a019/12OmNwDACCo", "parentPublication": { "id": "proceedings/icimt/2009/3922/0", "title": "Information and Multimedia Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2009/3890/0/3890a187", "title": "Dual Face Interaction in Handheld Augmented Reality Environments", "doi": null, "abstractUrl": "/proceedings-article/ism/2009/3890a187/12OmNxGj9VX", "parentPublication": { "id": "proceedings/ism/2009/3890/0", "title": "2009 11th IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770761", "title": "Augmented Reality Interface Toolkit", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770761/12OmNyUnELp", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2013/06/mic2013060066", "title": "Augmented Reality Interfaces", "doi": null, "abstractUrl": "/magazine/ic/2013/06/mic2013060066/13rRUIJcWhZ", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2017/03/07469860", "title": "Ubii: Physical World Interaction Through Augmented Reality", "doi": null, "abstractUrl": "/journal/tm/2017/03/07469860/13rRUxASuca", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a436", "title": "Validating the Benefits of Glanceable and Context-Aware Augmented Reality for Everyday Information Access Tasks", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a436/1CJbVhCZuqA", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089433", "title": "Glanceable AR: Evaluating Information Access Methods for Head-Worn Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089433/1jIxf3ZEs0w", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a717", "title": "[DC] Glanceable AR: Towards an Always-on Augmented Reality Future", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a717/1tnXrUsEHYc", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0HHIXbY4", "doi": "10.1109/VR.2019.8798262", "title": "A Context-Aware Technical Information Manager for Presentation in Augmented Reality", "normalizedTitle": "A Context-Aware Technical Information Manager for Presentation in Augmented Reality", "abstract": "Technical information presentation is evolving from static contents presented on paper or via digital publishing to real-time context-aware contents displayed via virtual and augmented reality devices. We present a Context-Aware Technical Information Management system (CATIM), that dynamically manages (1) what information as well as (2) how information is presented in an augmented reality interface. CATIM acquires context data about activity, operator, and environment, and then based on these data, proposes a dynamic augmented reality output tailored to the current context. The system was successfully implemented and preliminarily evaluated in a case study regarding the maintenance of a hydraulic valve.", "abstracts": [ { "abstractType": "Regular", "content": "Technical information presentation is evolving from static contents presented on paper or via digital publishing to real-time context-aware contents displayed via virtual and augmented reality devices. We present a Context-Aware Technical Information Management system (CATIM), that dynamically manages (1) what information as well as (2) how information is presented in an augmented reality interface. CATIM acquires context data about activity, operator, and environment, and then based on these data, proposes a dynamic augmented reality output tailored to the current context. The system was successfully implemented and preliminarily evaluated in a case study regarding the maintenance of a hydraulic valve.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Technical information presentation is evolving from static contents presented on paper or via digital publishing to real-time context-aware contents displayed via virtual and augmented reality devices. We present a Context-Aware Technical Information Management system (CATIM), that dynamically manages (1) what information as well as (2) how information is presented in an augmented reality interface. CATIM acquires context data about activity, operator, and environment, and then based on these data, proposes a dynamic augmented reality output tailored to the current context. The system was successfully implemented and preliminarily evaluated in a case study regarding the maintenance of a hydraulic valve.", "fno": "08798262", "keywords": [ "Augmented Reality", "Information Management", "Ubiquitous Computing", "Digital Publishing", "Real Time Context Aware Contents", "CATIM", "Augmented Reality Interface", "Context Data", "Dynamic Augmented Reality Output", "Technical Information Presentation", "Static Contents", "Context Aware Technical Information Manager", "Context Aware Technical Information Management System", "Hydraulic Valve", "Augmented Reality", "User Interfaces", "Task Analysis", "Mathematics", "Maintenance Engineering", "Ontologies", "Layout", "Industrial Augmented Reality", "Technical Information Manager", "Context Aware Information", "Augmented Reality", "Context Aware", "Visualization" ], "authors": [ { "affiliation": "Polytechnic Institute of Bari", "fullName": "Michele Gattullo", "givenName": "Michele", "surname": "Gattullo", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Vito Dalena", "givenName": "Vito", "surname": "Dalena", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Alessandro Evangelista", "givenName": "Alessandro", "surname": "Evangelista", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Antonio E. Uva", "givenName": "Antonio E.", "surname": "Uva", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Michele Fiorentino", "givenName": "Michele", "surname": "Fiorentino", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Antonio Boccaccio", "givenName": "Antonio", "surname": "Boccaccio", "__typename": "ArticleAuthorType" }, { "affiliation": "Polytechnic Institute of Bari", "fullName": "Michele Ruta", "givenName": "Michele", "surname": "Ruta", "__typename": "ArticleAuthorType" }, { "affiliation": "Grado Department of Industrial & Systems Engineering Virginia Tech", "fullName": "Joseph L. Gabbard", "givenName": "Joseph L.", "surname": "Gabbard", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "939-940", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08797860", "articleId": "1cJ0XCzq5aw", "__typename": "AdjacentArticleType" }, "next": { "fno": "08798348", "articleId": "1cJ0H4fRjBS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/kam/2009/3888/3/3888c091", "title": "Ubiquitous Augmented Reality System", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888c091/12OmNCcKQOw", "parentPublication": { "id": "proceedings/kam/2009/3888/1", "title": "Knowledge Acquisition and Modeling, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a274", "title": "A Study on Effective Visual Communication Method with the 'Pictomation' Contents in Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a274/12OmNx3q72n", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2010/4124/0/4124a052", "title": "Unified Context-Aware Augmented Reality Application Framework for User-Driven Tour Guides", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2010/4124a052/12OmNxj23dq", "parentPublication": { "id": "proceedings/isuvr/2010/4124/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539195", "title": "Haptics in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539195/12OmNyQ7G3s", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a315", "title": "Setting up Virtual Reality and Augmented Reality Learning Environment in Unity", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a315/12OmNylKAYY", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2008/1971/0/04480808", "title": "Creating Meaningful Environment Models for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2008/04480808/12OmNzYwc7n", "parentPublication": { "id": "proceedings/vr/2008/1971/0", "title": "IEEE Virtual Reality 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223352", "title": "Using augmented reality to support situated analytics", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223352/12OmNzhELmY", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07435333", "title": "Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2017/06/07435333/13rRUwfZBVq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a390", "title": "Situated Visualization in Augmented Reality: Exploring Information Seeking Strategies", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a390/1j9xB7XDREA", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/12/09199568", "title": "Fine-Grained Visual Recognition in Mobile Augmented Reality for Technical Support", "doi": null, "abstractUrl": "/journal/tg/2020/12/09199568/1ncglEW2yUo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0UKlSMP6", "doi": "10.1109/VR.2019.8798171", "title": "[DC] Dimensionality of Augmented Reality Spatial Interfaces", "normalizedTitle": "[DC] Dimensionality of Augmented Reality Spatial Interfaces", "abstract": "The next wave of computing is visible on the horizon, heralding the widespread adoption of augmented reality spatial information manipulation on wearable and environment integrated form factors such as head-worn displays. This application for the doctoral consortium at IEEE VR 2019 describes the research conducted and planned in the context of a PhD thesis, which aims at determining a multidimensional model of user performance in spatial user interaction in augmented reality for training.", "abstracts": [ { "abstractType": "Regular", "content": "The next wave of computing is visible on the horizon, heralding the widespread adoption of augmented reality spatial information manipulation on wearable and environment integrated form factors such as head-worn displays. This application for the doctoral consortium at IEEE VR 2019 describes the research conducted and planned in the context of a PhD thesis, which aims at determining a multidimensional model of user performance in spatial user interaction in augmented reality for training.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The next wave of computing is visible on the horizon, heralding the widespread adoption of augmented reality spatial information manipulation on wearable and environment integrated form factors such as head-worn displays. This application for the doctoral consortium at IEEE VR 2019 describes the research conducted and planned in the context of a PhD thesis, which aims at determining a multidimensional model of user performance in spatial user interaction in augmented reality for training.", "fno": "08798171", "keywords": [ "Augmented Reality", "Helmet Mounted Displays", "Augmented Reality Spatial Interfaces", "Augmented Reality Spatial Information Manipulation", "Wearable Environment Integrated Form Factors", "Head Worn Displays", "IEEE VR", "Spatial User Interaction", "Multidimensional Model", "Training", "Augmented Reality", "Task Analysis", "Usability", "Ergonomics", "User Interfaces", "Augmented Reality", "Spatial User Interface", "Trainings", "Human Centered Computing Human Computer Interaction", "Interaction Paradigms", "Mixed Augmented Reality" ], "authors": [ { "affiliation": "Performance Augmentation Lab, Oxford Brookes University, Oxford, UK", "fullName": "Alla Vovk", "givenName": "Alla", "surname": "Vovk", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1377-1378", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08798256", "articleId": "1cJ0W1LjdW8", "__typename": "AdjacentArticleType" }, "next": { "fno": "08797780", "articleId": "1cJ0O5YpzLW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2016/0662/0/0662a358", "title": "Mobile Augmented Reality Authoring Tool", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a358/12OmNAXglVC", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2001/1318/0/13180077", "title": "A System for Evaluating Augmented Reality User Interfaces in Wearable Computers", "doi": null, "abstractUrl": "/proceedings-article/iswc/2001/13180077/12OmNAhxjAU", "parentPublication": { "id": "proceedings/iswc/2001/1318/0", "title": "Proceedings Fifth International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2013/6097/0/06550225", "title": "Poster: Spatial Augmented Reality user interface techniques for room size modeling tasks", "doi": null, "abstractUrl": "/proceedings-article/3dui/2013/06550225/12OmNvlxJtP", "parentPublication": { "id": "proceedings/3dui/2013/6097/0", "title": "2013 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2015/6886/0/07131755", "title": "Mapping 2D input to 3D immersive spatial augmented reality", "doi": null, "abstractUrl": "/proceedings-article/3dui/2015/07131755/12OmNwAKCNT", "parentPublication": { "id": "proceedings/3dui/2015/6886/0", "title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549362", "title": "Exploration of spatial augmented reality on person", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549362/12OmNxQOjAC", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2015/9967/0/9967a221", "title": "Learning Geometry with Augmented Reality to Enhance Spatial Ability", "doi": null, "abstractUrl": "/proceedings-article/latice/2015/9967a221/12OmNy5zsoL", "parentPublication": { "id": "proceedings/latice/2015/9967/0", "title": "2015 International Conference on Learning and Teaching in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2011/0774/0/05959577", "title": "Glove-Based Sensor Support for Dynamic Tangible Buttons in Spatial Augmented Reality Design Environments", "doi": null, "abstractUrl": "/proceedings-article/iswc/2011/05959577/12OmNzuIjpK", "parentPublication": { "id": "proceedings/iswc/2011/0774/0", "title": "2011 15th Annual International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2013/06/mic2013060066", "title": "Augmented Reality Interfaces", "doi": null, "abstractUrl": "/magazine/ic/2013/06/mic2013060066/13rRUIJcWhZ", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/05/mcg2015050066", "title": "Toward Standard Usability Questionnaires for Handheld Augmented Reality", "doi": null, "abstractUrl": "/magazine/cg/2015/05/mcg2015050066/13rRUwkfAT9", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/06/mcg2014060074", "title": "Spatial User Interfaces for Large-Scale Projector-Based Augmented Reality", "doi": null, "abstractUrl": "/magazine/cg/2014/06/mcg2014060074/13rRUxjQyjM", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tnWwqMuCzu", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tnXu8UEcve", "doi": "10.1109/VRW52623.2021.00091", "title": "Evaluating User Acceptance using WebXR for an Augmented Reality Information System", "normalizedTitle": "Evaluating User Acceptance using WebXR for an Augmented Reality Information System", "abstract": "Augmented Reality has a long history and has seen major technical advantages in the last years. With WebXR, a new web standard, Mobile Augmented Reality (MAR) applications are now available in the web browser. With our work, we implemented an Augmented Reality Information System and conducted a case study to evaluate the user acceptance of such an application build with WebXR. Our results indicate that the user acceptance regarding web-based MAR applications for our specific use case seems to be given. With our proposed architecture we also lay the foundation for other AR information systems.", "abstracts": [ { "abstractType": "Regular", "content": "Augmented Reality has a long history and has seen major technical advantages in the last years. With WebXR, a new web standard, Mobile Augmented Reality (MAR) applications are now available in the web browser. With our work, we implemented an Augmented Reality Information System and conducted a case study to evaluate the user acceptance of such an application build with WebXR. Our results indicate that the user acceptance regarding web-based MAR applications for our specific use case seems to be given. With our proposed architecture we also lay the foundation for other AR information systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Augmented Reality has a long history and has seen major technical advantages in the last years. With WebXR, a new web standard, Mobile Augmented Reality (MAR) applications are now available in the web browser. With our work, we implemented an Augmented Reality Information System and conducted a case study to evaluate the user acceptance of such an application build with WebXR. Our results indicate that the user acceptance regarding web-based MAR applications for our specific use case seems to be given. With our proposed architecture we also lay the foundation for other AR information systems.", "fno": "405700a418", "keywords": [ "Augmented Reality", "Mobile Computing", "Online Front Ends", "Augmented Reality Information System", "User Acceptance", "Web XR", "AR Information Systems", "Web Standard", "Mobile Augmented Reality Applications", "Web Browser", "Web Based MAR Applications", "Three Dimensional Displays", "Tracking", "Conferences", "User Interfaces", "Browsers", "History", "Augmented Reality", "User Accpetance", "Augmented Reality", "Web XR", "Information System" ], "authors": [ { "affiliation": "Hochschule Ruhr West,Institute of Computer Science", "fullName": "Fabian Meyer", "givenName": "Fabian", "surname": "Meyer", "__typename": "ArticleAuthorType" }, { "affiliation": "Hochschule Ruhr West,Institute of Computer Science", "fullName": "Christian Gehrke", "givenName": "Christian", "surname": "Gehrke", "__typename": "ArticleAuthorType" }, { "affiliation": "Hochschule Ruhr West,Institute of Computer Science", "fullName": "Michael Schäfer", "givenName": "Michael", "surname": "Schäfer", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "418-419", "year": "2021", "issn": null, "isbn": "978-1-6654-4057-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1tnXtU3PsxW", "name": "pvrw202140570-09419122s1-mm_405700a418.zip", "size": "37.7 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvrw202140570-09419122s1-mm_405700a418.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "405700a413", "articleId": "1tnXUqfjdlu", "__typename": "AdjacentArticleType" }, "next": { "fno": "405700a420", "articleId": "1tnXYy4IAGA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2016/9041/0/9041a307", "title": "The Acceptance of Learning Augmented Reality Environments: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a307/12OmNARiM5M", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/Ismar-mashd/2015/9628/0/9628a055", "title": "Light Detecting 3D User Interface-Equipped System for Mixed and Augmented Reality Games", "doi": null, "abstractUrl": "/proceedings-article/Ismar-mashd/2015/9628a055/12OmNqGRGrd", "parentPublication": { "id": "proceedings/Ismar-mashd/2015/9628/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality - Media, Art, Social Science, Humanities and Design (ISMAR-MASH'D)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2012/2712/0/IS225", "title": "Vision-based user tracking for outdoor augmented reality", "doi": null, "abstractUrl": "/proceedings-article/iscc/2012/IS225/12OmNrH1PAZ", "parentPublication": { "id": "proceedings/iscc/2012/2712/0", "title": "2012 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2008/1971/0/04480755", "title": "Augmented Reality for Industrial Building Acceptance", "doi": null, "abstractUrl": "/proceedings-article/vr/2008/04480755/12OmNwc3wyn", "parentPublication": { "id": "proceedings/vr/2008/1971/0", "title": "IEEE Virtual Reality 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a252", "title": "Workshop on Standards for Mixed and Augmented Reality Summary", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a252/12OmNwnYG1O", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402563", "title": "Mobile augmented reality for cultural heritage: A technology acceptance study", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402563/12OmNxwncbi", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446175", "title": "A User-Based Comparison of Two Augmented Reality Glasses", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446175/13bd1eTtWYo", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07435333", "title": "Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2017/06/07435333/13rRUwfZBVq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2019/4227/0/422700a186", "title": "Exploring in-Service Teachers' Acceptance of Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/t4e/2019/422700a186/1hgtJSi5i7e", "parentPublication": { "id": "proceedings/t4e/2019/4227/0", "title": "2019 IEEE Tenth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2020/4716/0/09156243", "title": "Invited Talk: Emerging Role of Digital Assistant in Augmented Reality Driven Human-City Interaction", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2020/09156243/1m1jIhTLeH6", "parentPublication": { "id": "proceedings/percom-workshops/2020/4716/0", "title": "2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCykm7b", "title": "Proceedings Ninth IEEE International Conference on Networks. ICON 2001", "acronym": "icon", "groupId": "1000494", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoUTlk", "doi": "10.1109/ICON.2001.962329", "title": "The group security association for secure multicasting", "normalizedTitle": "The group security association for secure multicasting", "abstract": "The growth and commercialization of the group-oriented applications on the Internet has triggered a demand for security solutions for group communications. One such solution, secure multicast, is provided because it is available for the efficiency of multicast data delivery. This paper proposes a method of advertising a group security association for secure group communication and defines extensions of SAP (session announcement protocol) and SDP (session description protocol) for the framework. It provides descriptions for group security associations (GSA) for the support of secure multicasting in IP multicast.", "abstracts": [ { "abstractType": "Regular", "content": "The growth and commercialization of the group-oriented applications on the Internet has triggered a demand for security solutions for group communications. One such solution, secure multicast, is provided because it is available for the efficiency of multicast data delivery. This paper proposes a method of advertising a group security association for secure group communication and defines extensions of SAP (session announcement protocol) and SDP (session description protocol) for the framework. It provides descriptions for group security associations (GSA) for the support of secure multicasting in IP multicast.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The growth and commercialization of the group-oriented applications on the Internet has triggered a demand for security solutions for group communications. One such solution, secure multicast, is provided because it is available for the efficiency of multicast data delivery. This paper proposes a method of advertising a group security association for secure group communication and defines extensions of SAP (session announcement protocol) and SDP (session description protocol) for the framework. It provides descriptions for group security associations (GSA) for the support of secure multicasting in IP multicast.", "fno": "00962329", "keywords": [ "Internet", "Telecommunication Security", "Protocols", "Multicast Communication", "Security Of Data", "Group Security Association", "Secure Multicasting", "Group Oriented Applications", "Internet", "Security Solutions", "Group Communications", "Multicast Data Delivery", "SAP", "Session Description Protocol", "Session Announcement Protocol", "SDP", "GSA", "IP Multicast", "Information Security", "Data Security", "Internet", "National Security", "Communication System Security", "Advertising", "Unicast", "Routing", "Cryptography", "Protection" ], "authors": [ { "affiliation": "Internet Security Res. Team, ETRI, South Korea", "fullName": "Wonjoo Park", "givenName": null, "surname": "Wonjoo Park", "__typename": "ArticleAuthorType" }, { "affiliation": "Internet Security Res. Team, ETRI, South Korea", "fullName": "Jaehoon Nah", "givenName": null, "surname": "Jaehoon Nah", "__typename": "ArticleAuthorType" }, { "affiliation": "Internet Security Res. Team, ETRI, South Korea", "fullName": "SUngwon Sohn", "givenName": null, "surname": "SUngwon Sohn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Daeyoung Kim", "givenName": null, "surname": "Daeyoung Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "icon", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "130,131,132,133", "year": "2001", "issn": "1531-2216", "isbn": "0-7695-1187-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00962328", "articleId": "12OmNybfr8k", "__typename": "AdjacentArticleType" }, "next": { "fno": "00962330", "articleId": "12OmNs0kyqS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cimca/2008/3514/0/3514a124", "title": "Design of Secure Group Key Management Scheme for Multicast Networks Using Number Theory", "doi": null, "abstractUrl": "/proceedings-article/cimca/2008/3514a124/12OmNAo45JP", "parentPublication": { "id": "proceedings/cimca/2008/3514/0", "title": "2008 International Conference on Computational Intelligence for Modelling Control &amp; Automation (CIMCA 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wimob/2007/2889/0/28890025", "title": "Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network", "doi": null, "abstractUrl": "/proceedings-article/wimob/2007/28890025/12OmNB7tUrD", "parentPublication": { "id": "proceedings/wimob/2007/2889/0", "title": "Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2000/0912/0/09120213", "title": "Group management strategies for secure multicasting on active virtual private networks", "doi": null, "abstractUrl": "/proceedings-article/lcn/2000/09120213/12OmNBKEyx4", "parentPublication": { "id": "proceedings/lcn/2000/0912/0", "title": "Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2007/3000/0/30000073", "title": "An Architecture for Secure and Accountable Multicasting", "doi": null, "abstractUrl": "/proceedings-article/lcn/2007/30000073/12OmNBOllnS", "parentPublication": { "id": "proceedings/lcn/2007/3000/0", "title": "32nd IEEE Conference on Local Computer Networks (LCN 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2015/6770/0/07366358", "title": "Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/lcn/2015/07366358/12OmNwDj1bk", "parentPublication": { "id": "proceedings/lcn/2015/6770/0", "title": "2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2008/3322/1/3322a604", "title": "Research of Secure Anycast Group Management", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322a604/12OmNxYL5ct", "parentPublication": { "id": "proceedings/ncm/2008/3322/1", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/music/2012/1956/0/4727a158", "title": "A Secure Multicast Scheme for Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/music/2012/4727a158/12OmNyqzM3i", "parentPublication": { "id": "proceedings/music/2012/1956/0", "title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/1994/6685/0/00344380", "title": "Elements of trusted multicasting", "doi": null, "abstractUrl": "/proceedings-article/icnp/1994/00344380/12OmNzd7bNj", "parentPublication": { "id": "proceedings/icnp/1994/6685/0", "title": "Proceedings of ICNP - 1994 International Conference on Network Protocols", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2022/7384/0/738400a128", "title": "The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2022/738400a128/1LFKFi5xave", "parentPublication": { "id": "proceedings/bigcom/2022/7384/0", "title": "2022 8th International Conference on Big Data Computing and Communications (BigCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2020/9866/0/986600a156", "title": "DTLS based secure group communication scheme for Internet of Things", "doi": null, "abstractUrl": "/proceedings-article/mass/2020/986600a156/1rsj3rPqVoc", "parentPublication": { "id": "proceedings/mass/2020/9866/0", "title": "2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzSh1bn", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBQ2VQS", "doi": "10.1109/CGIV.2009.19", "title": "Visualizing Air Traffic Flow Management Alert Information Using Squarified Treemaps", "normalizedTitle": "Visualizing Air Traffic Flow Management Alert Information Using Squarified Treemaps", "abstract": "The alert information play very important role in Air Traffic Flow Management (ATFM), and is often presented using simple graphics such as histogram or table. These familiar visualizations are effective for providing overview to some extent, but the details related to hierarchy are often neglected. In this paper we present a generalized treemap algorithm that aims to enhance alert information visualization for ATFM operations. We propose extensions to treemap algorithm such that treemaps can be created and updated in accordance with Air Traffic Control (ATC) manners and airspace construction in China.", "abstracts": [ { "abstractType": "Regular", "content": "The alert information play very important role in Air Traffic Flow Management (ATFM), and is often presented using simple graphics such as histogram or table. These familiar visualizations are effective for providing overview to some extent, but the details related to hierarchy are often neglected. In this paper we present a generalized treemap algorithm that aims to enhance alert information visualization for ATFM operations. We propose extensions to treemap algorithm such that treemaps can be created and updated in accordance with Air Traffic Control (ATC) manners and airspace construction in China.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The alert information play very important role in Air Traffic Flow Management (ATFM), and is often presented using simple graphics such as histogram or table. These familiar visualizations are effective for providing overview to some extent, but the details related to hierarchy are often neglected. In this paper we present a generalized treemap algorithm that aims to enhance alert information visualization for ATFM operations. We propose extensions to treemap algorithm such that treemaps can be created and updated in accordance with Air Traffic Control (ATC) manners and airspace construction in China.", "fno": "3789a419", "keywords": [ "Information Visualization", "Squarified Treemap", "ATFM", "Hierarchical Data" ], "authors": [ { "affiliation": null, "fullName": "Wang Jiening", "givenName": "Wang", "surname": "Jiening", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hou Qizhen", "givenName": "Hou", "surname": "Qizhen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Liu Yongxin", "givenName": "Liu", "surname": "Yongxin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhang Chunfeng", "givenName": "Zhang", "surname": "Chunfeng", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "419-422", "year": "2009", "issn": null, "isbn": "978-0-7695-3789-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3789a410", "articleId": "12OmNx7ov6G", "__typename": "AdjacentArticleType" }, "next": { "fno": "3789a423", "articleId": "12OmNAS9zIF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infvis/2005/9464/0/01532128", "title": "Voronoi treemaps", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532128/12OmNCmGNWg", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2012/4771/0/4771a074", "title": "Angular Treemaps - A New Technique for Visualizing and Emphasizing Hierarchical Structures", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a074/12OmNqFJhII", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532128", "title": "Voronoi treemaps", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532128/12OmNqzu6VY", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770335", "title": "Extending the Utility of Treemaps with Flexible Hierarchy", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770335/12OmNwIYZE3", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2010/4112/0/4112a085", "title": "Fast Dynamic Voronoi Treemaps", "doi": null, "abstractUrl": "/proceedings-article/isvd/2010/4112a085/12OmNxGAL4V", "parentPublication": { "id": "proceedings/isvd/2010/4112/0", "title": "2010 International Symposium on Voronoi Diagrams in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/2009/3781/0/3781a265", "title": "Visualizing Biodiversity with Voronoi Treemaps", "doi": null, "abstractUrl": "/proceedings-article/isvd/2009/3781a265/12OmNy7QfoW", "parentPublication": { "id": "proceedings/isvd/2009/3781/0", "title": "2009 Sixth International Symposium on Voronoi Diagrams", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900007", "title": "Voronoi Treemaps", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900007/12OmNzSyCdf", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0789", "title": "Visualizing Business Data with Generalized Treemaps", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0789/13rRUwfZC03", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/04376152", "title": "Visualizing Changes of Hierarchical Data using Treemaps", "doi": null, "abstractUrl": "/journal/tg/2007/06/04376152/13rRUxYrbUw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1286", "title": "Visualizing Changes of Hierarchical Data using Treemaps", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1286/13rRUy0qnLA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzFMFpl", "title": "Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)", "acronym": "snpd", "groupId": "1001811", "volume": "3", "displayVolume": "3", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDhp", "doi": "10.1109/SNPD.2007.269", "title": "Threats Analysis and Prevention for Grid and Web Service Security", "normalizedTitle": "Threats Analysis and Prevention for Grid and Web Service Security", "abstract": "In order to enhance the security level and prevent the threats in Grid interacting with Web service environment, based on discriminating participant actors during the procedure of computation, a new threat classification method is proposed before corresponding threats model is introduced. Furthermore, we illustrate how basic security services and tools should interact with each other to provide an attack-resilient multilayer protection methodology in a service-oriented architecture. As a result, such threats analysis can be further utilized as the basis of proper security services design and operational procedures development.", "abstracts": [ { "abstractType": "Regular", "content": "In order to enhance the security level and prevent the threats in Grid interacting with Web service environment, based on discriminating participant actors during the procedure of computation, a new threat classification method is proposed before corresponding threats model is introduced. Furthermore, we illustrate how basic security services and tools should interact with each other to provide an attack-resilient multilayer protection methodology in a service-oriented architecture. As a result, such threats analysis can be further utilized as the basis of proper security services design and operational procedures development.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to enhance the security level and prevent the threats in Grid interacting with Web service environment, based on discriminating participant actors during the procedure of computation, a new threat classification method is proposed before corresponding threats model is introduced. Furthermore, we illustrate how basic security services and tools should interact with each other to provide an attack-resilient multilayer protection methodology in a service-oriented architecture. As a result, such threats analysis can be further utilized as the basis of proper security services design and operational procedures development.", "fno": "290930526", "keywords": [ "Grid Computing", "Security Of Data", "Software Architecture", "Web Services", "Threat Analysis", "Threat Prevention", "Grid Security", "Web Service Security", "Attack Resilient Multilayer Protection", "Service Oriented Architecture", "Web Services", "Grid Computing", "Data Security", "Distributed Computing", "Protection", "Computer Security", "Simple Object Access Protocol", "Computer Networks", "Concurrent Computing", "Information Security" ], "authors": [ { "affiliation": "Sichuan University, China; Qufu Normal University, China", "fullName": "Jiancheng Ni", "givenName": "Jiancheng", "surname": "Ni", "__typename": "ArticleAuthorType" }, { "affiliation": "Sichuan University, Chin", "fullName": "Zhishu Li", "givenName": "Zhishu", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Qufu Normal University, China", "fullName": "Zhonghe Gao", "givenName": "Zhonghe", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Sichuan University, Chin", "fullName": "Jirong Sun", "givenName": "Jirong", "surname": "Sun", "__typename": "ArticleAuthorType" } ], "idPrefix": "snpd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-07-01T00:00:00", "pubType": "proceedings", "pages": "526-531", "year": "2007", "issn": null, "isbn": "0-7695-2909-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "290930466", "articleId": "12OmNCwUmzU", "__typename": "AdjacentArticleType" }, "next": { "fno": "290930472", "articleId": "12OmNBEpnxS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccee/2009/3925/2/3925b511", "title": "Message-Based Security Model for Grid Services", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925b511/12OmNAlvHqE", "parentPublication": { "id": "proceedings/iccee/2009/3925/2", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2015/8315/0/8315a547", "title": "Security Threats to the Platform Identification", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2015/8315a547/12OmNAsTgPQ", "parentPublication": { "id": "proceedings/bwcca/2015/8315/0", "title": "2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2008/3380/0/04736743", "title": "Re-thinking Grid Security Architecture", "doi": null, "abstractUrl": "/proceedings-article/e-science/2008/04736743/12OmNrMZpzF", "parentPublication": { "id": "proceedings/e-science/2008/3380/0", "title": "2008 IEEE Fourth International Conference on eScience", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363960", "title": "Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363960/12OmNwe2IC0", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saintw/2005/2263/0/01620048", "title": "Application of Web Services Security Using Travel Industry Model", "doi": null, "abstractUrl": "/proceedings-article/saintw/2005/01620048/12OmNxE2mUv", "parentPublication": { "id": "proceedings/saintw/2005/2263/0", "title": "2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2006/2585/2/01630919", "title": "Security issues in on-demand grid and cluster computing", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2006/01630919/12OmNxZkhtE", "parentPublication": { "id": "proceedings/ccgrid/2006/2585/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2013/5028/0/5028a383", "title": "Security Threats in Cloud Computing Models: Domains and Proposals", "doi": null, "abstractUrl": "/proceedings-article/cloud/2013/5028a383/12OmNxaw5d4", "parentPublication": { "id": "proceedings/cloud/2013/5028/0", "title": "2013 IEEE 6th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsnc/2010/4145/0/4145a189", "title": "A Security Framework to Protect against Social Networks Services Threats", "doi": null, "abstractUrl": "/proceedings-article/icsnc/2010/4145a189/12OmNyaGeHE", "parentPublication": { "id": "proceedings/icsnc/2010/4145/0", "title": "Systems and Networks Communication, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitcs/2014/6541/0/07021736", "title": "Analysing Different Threats Levels in NGN and Ensuring Its Security with Quality of Services", "doi": null, "abstractUrl": "/proceedings-article/icitcs/2014/07021736/12OmNz4SOx0", "parentPublication": { "id": "proceedings/icitcs/2014/6541/0", "title": "2014 International Conference on IT Convergence and Security (ICITCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2017/06/mco2017060081", "title": "Web Application Security: Threats, Countermeasures, and Pitfalls", "doi": null, "abstractUrl": "/magazine/co/2017/06/mco2017060081/13rRUy3gmVK", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvkYx8u", "title": "2014 10th International Conference on Network and Service Management (CNSM)", "acronym": "cnsm", "groupId": "1800239", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwDSdIG", "doi": "10.1109/CNSM.2014.7014175", "title": "Unwanted traffic characterization on IP networks by low interactive honeypot", "normalizedTitle": "Unwanted traffic characterization on IP networks by low interactive honeypot", "abstract": "The increasing amount of unwanted traffic on the Internet consumes the available bandwidth on any network connected to it. Despite efforts to address this issue, it is still a challenge to differentiate unwanted traffic. Due to lack of knowledge or investment, organizations fail to implement security policies, such as BCP 38, which helps blocking the flow of unwanted data. This paper presents a method based on lowinteraction honeypots and network telescopes for identification and classification of unwanted traffic on IP networks. Our method aims to be simple and support low cost of deployment. An evaluation employed traces of real environments to show the method effectiveness. Results offer useful information about unwanted traffic, reaching a private network in a simple manner and with the reduced cost to block it.", "abstracts": [ { "abstractType": "Regular", "content": "The increasing amount of unwanted traffic on the Internet consumes the available bandwidth on any network connected to it. Despite efforts to address this issue, it is still a challenge to differentiate unwanted traffic. Due to lack of knowledge or investment, organizations fail to implement security policies, such as BCP 38, which helps blocking the flow of unwanted data. This paper presents a method based on lowinteraction honeypots and network telescopes for identification and classification of unwanted traffic on IP networks. Our method aims to be simple and support low cost of deployment. An evaluation employed traces of real environments to show the method effectiveness. Results offer useful information about unwanted traffic, reaching a private network in a simple manner and with the reduced cost to block it.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The increasing amount of unwanted traffic on the Internet consumes the available bandwidth on any network connected to it. Despite efforts to address this issue, it is still a challenge to differentiate unwanted traffic. Due to lack of knowledge or investment, organizations fail to implement security policies, such as BCP 38, which helps blocking the flow of unwanted data. This paper presents a method based on lowinteraction honeypots and network telescopes for identification and classification of unwanted traffic on IP networks. Our method aims to be simple and support low cost of deployment. An evaluation employed traces of real environments to show the method effectiveness. Results offer useful information about unwanted traffic, reaching a private network in a simple manner and with the reduced cost to block it.", "fno": "07014175", "keywords": [ "IP Networks", "Internet", "Measurement", "Security", "Telescopes", "Europe", "Organizations" ], "authors": [ { "affiliation": "NR2 - Federal University of Paraná - Brazil", "fullName": "Alisson Puska", "givenName": "Alisson", "surname": "Puska", "__typename": "ArticleAuthorType" }, { "affiliation": "NR2 - Federal University of Paraná - Brazil", "fullName": "Michele Nogueira", "givenName": "Michele", "surname": "Nogueira", "__typename": "ArticleAuthorType" }, { "affiliation": "NR2 - Federal University of Paraná - Brazil", "fullName": "Aldri Santos", "givenName": "Aldri", "surname": "Santos", "__typename": "ArticleAuthorType" } ], "idPrefix": "cnsm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "284-287", "year": "2014", "issn": null, "isbn": "978-3-901882-67-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07014174", "articleId": "12OmNweBUNj", "__typename": "AdjacentArticleType" }, "next": { "fno": "07014176", "articleId": "12OmNzBOhTN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/npc/2008/3354/0/3354a147", "title": "Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis", "doi": null, "abstractUrl": "/proceedings-article/npc/2008/3354a147/12OmNBziBdC", "parentPublication": { "id": "proceedings/npc/2008/3354/0", "title": "Network and Parallel Computing Workshops, IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifip-networking/2015/8268/0/07145326", "title": "Online Social Networks anatomy: On the analysis of Facebook and WhatsApp in cellular networks", "doi": null, "abstractUrl": "/proceedings-article/ifip-networking/2015/07145326/12OmNCdk2FO", "parentPublication": { "id": "proceedings/ifip-networking/2015/8268/0", "title": "2015 IFIP Networking Conference (IFIP Networking)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2011/2135/0/06120876", "title": "Unwanted Traffic Control via Global Trust Management", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2011/06120876/12OmNwtEEKF", "parentPublication": { "id": "proceedings/trustcom/2011/2135/0", "title": "2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsm/2014/67/0/07014136", "title": "Unsupervised classification and characterization of honeypot attacks", "doi": null, "abstractUrl": "/proceedings-article/cnsm/2014/07014136/12OmNyTfg56", "parentPublication": { "id": "proceedings/cnsm/2014/67/0", "title": "2014 10th International Conference on Network and Service Management (CNSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icimp/2009/3612/0/3612a007", "title": "A Technique for Detecting New Attacks in Low-Interaction Honeypot Traffic", "doi": null, "abstractUrl": "/proceedings-article/icimp/2009/3612a007/12OmNzYwbXV", "parentPublication": { "id": "proceedings/icimp/2009/3612/0", "title": "Internet Monitoring and Protection, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2018/4210/0/421001a197", "title": "Micro-Honeypot: Using Browser Fingerprinting to Track Attackers", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a197/12OmNzZ5o9Z", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2013/5022/0/5022a202", "title": "Unwanted Content Control via Trust Management in Pervasive Social Networking", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2013/5022a202/12OmNzt0ILr", "parentPublication": { "id": "proceedings/trustcom/2013/5022/0", "title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2009/06/mic2009060014", "title": "Addressing Unwanted Traffic on the Internet: A Community Response", "doi": null, "abstractUrl": "/magazine/ic/2009/06/mic2009060014/13rRUwwJWJM", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0/08726681", "title": "IPchain: Securing IP Prefix Allocation and Delegation with Blockchain", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2018/08726681/1axfv0372fu", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0", "title": "2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2006/2607/0/01633509", "title": "Honeypot-Aware Advanced Botnet Construction and Maintenance", "doi": null, "abstractUrl": "/proceedings-article/dsn/2006/01633509/1iERxFmxDXy", "parentPublication": { "id": "proceedings/dsn/2006/2607/0", "title": "International Conference on Dependable Systems and Networks (DSN'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy1SFBc", "title": "2016 IEEE Symposium on Visualization for Cyber Security (VizSec)", "acronym": "vizsec", "groupId": "1810104", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwbukiX", "doi": "10.1109/VIZSEC.2016.7739583", "title": "Bigfoot: A geo-based visualization methodology for detecting BGP threats", "normalizedTitle": "Bigfoot: A geo-based visualization methodology for detecting BGP threats", "abstract": "Studies of inter-domain routing in the Internet have highlighted the complex and dynamic nature of connectivity changes that take place daily on a global scale. The ability to assess and identify normal, malicious, irregular and unexpected behaviors in routing update streams is important in daily network and security operations. In this paper we describe Bigfoot, a Border Gateway Protocol (BGP) update visualization system that has been designed to highlight and assess a wide variety of behaviors in update streams. At the core of Bigfoot is the notion of visualizing the announcements of network prefixes via IP geolocation. We investigate different representations of polygons for network footprints and show how straightforward application of IP geolocation can lead to representations that are difficult to interpret. Bigfoot includes techniques to filter, organize, analyze and visualize BGP updates that enable characteristics and behaviors of interest to be identified effectively. To demonstrate Bigfoot's capabilities, we consider 1.79B BGP updates collected over a period of one year and identify 139 candidate events in this data. We investigate a subset of these events in detail, along with ground truth from existing literature to show how network footprint visualizations can be used in operational deployments.", "abstracts": [ { "abstractType": "Regular", "content": "Studies of inter-domain routing in the Internet have highlighted the complex and dynamic nature of connectivity changes that take place daily on a global scale. The ability to assess and identify normal, malicious, irregular and unexpected behaviors in routing update streams is important in daily network and security operations. In this paper we describe Bigfoot, a Border Gateway Protocol (BGP) update visualization system that has been designed to highlight and assess a wide variety of behaviors in update streams. At the core of Bigfoot is the notion of visualizing the announcements of network prefixes via IP geolocation. We investigate different representations of polygons for network footprints and show how straightforward application of IP geolocation can lead to representations that are difficult to interpret. Bigfoot includes techniques to filter, organize, analyze and visualize BGP updates that enable characteristics and behaviors of interest to be identified effectively. To demonstrate Bigfoot's capabilities, we consider 1.79B BGP updates collected over a period of one year and identify 139 candidate events in this data. We investigate a subset of these events in detail, along with ground truth from existing literature to show how network footprint visualizations can be used in operational deployments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Studies of inter-domain routing in the Internet have highlighted the complex and dynamic nature of connectivity changes that take place daily on a global scale. The ability to assess and identify normal, malicious, irregular and unexpected behaviors in routing update streams is important in daily network and security operations. In this paper we describe Bigfoot, a Border Gateway Protocol (BGP) update visualization system that has been designed to highlight and assess a wide variety of behaviors in update streams. At the core of Bigfoot is the notion of visualizing the announcements of network prefixes via IP geolocation. We investigate different representations of polygons for network footprints and show how straightforward application of IP geolocation can lead to representations that are difficult to interpret. Bigfoot includes techniques to filter, organize, analyze and visualize BGP updates that enable characteristics and behaviors of interest to be identified effectively. To demonstrate Bigfoot's capabilities, we consider 1.79B BGP updates collected over a period of one year and identify 139 candidate events in this data. We investigate a subset of these events in detail, along with ground truth from existing literature to show how network footprint visualizations can be used in operational deployments.", "fno": "07739583", "keywords": [ "IP Networks", "Geology", "Data Visualization", "Shape", "Routing", "Security", "Engines", "Visualization", "BGP Security", "Routing Anomalies" ], "authors": [ { "affiliation": "University of Wisconsin - Madison", "fullName": "Meenakshi Syamkumar", "givenName": "Meenakshi", "surname": "Syamkumar", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Wisconsin - Madison", "fullName": "Ramakrishnan Durairajan", "givenName": "Ramakrishnan", "surname": "Durairajan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Wisconsin - Madison and comScore, Inc.", "fullName": "Paul Barford", "givenName": "Paul", "surname": "Barford", "__typename": "ArticleAuthorType" } ], "idPrefix": "vizsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2016", "issn": null, "isbn": "978-1-5090-1605-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07739582", "articleId": "12OmNAJDByx", "__typename": "AdjacentArticleType" }, "next": { "fno": "07739584", "articleId": "12OmNzSQdqs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnp/2006/0593/0/04110300", "title": "Differentiated BGP Update Processing for Improved Routing Convergence", "doi": null, "abstractUrl": "/proceedings-article/icnp/2006/04110300/12OmNASraIQ", "parentPublication": { "id": "proceedings/icnp/2006/0593/0", "title": "Proceedings of the 2006 IEEE International Conference on Network Protocols", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isads/2009/4327/0/05207350", "title": "A three-step dynamic threshold method to cluster BGP updates into routing events", "doi": null, "abstractUrl": "/proceedings-article/isads/2009/05207350/12OmNqBtiIs", "parentPublication": { "id": "proceedings/isads/2009/4327/0", "title": "2009 International Symposium on Autonomous Decentralized Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsnc/2009/3775/0/3775a212", "title": "Credible BGP -- Extensions to BGP for Secure Networking", "doi": null, "abstractUrl": "/proceedings-article/icsnc/2009/3775a212/12OmNrF2DOF", "parentPublication": { "id": "proceedings/icsnc/2009/3775/0", "title": "Systems and Networks Communication, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipccc/2012/4881/0/06407773", "title": "Effect of MRAI timers and routing policies on BGP convergence times", "doi": null, "abstractUrl": "/proceedings-article/ipccc/2012/06407773/12OmNxWcHiu", "parentPublication": { "id": "proceedings/ipccc/2012/4881/0", "title": "2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2013/5159/0/06726312", "title": "Catch the Spike: On the Locality of Individual BGP Update Bursts", "doi": null, "abstractUrl": "/proceedings-article/msn/2013/06726312/12OmNxecS0y", "parentPublication": { "id": "proceedings/msn/2013/5159/0", "title": "2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2014/4277/0/06912469", "title": "Delay tolerant EPC-BGP for discovery services in EPCGlobal networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2014/06912469/12OmNyKa6gS", "parentPublication": { "id": "proceedings/iscc/2014/4277/0", "title": "2014 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc/2016/4297/0/07828410", "title": "Study on Address Blocks with Inaccurate Geolocations of China's Internet", "doi": null, "abstractUrl": "/proceedings-article/hpcc/2016/07828410/12OmNyUWQX0", "parentPublication": { "id": "proceedings/hpcc/2016/4297/0", "title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2016/2054/0/2054a019", "title": "A Measurement Study on the Distribution Disparity of BGP Instabilities", "doi": null, "abstractUrl": "/proceedings-article/lcn/2016/2054a019/12OmNywfKEb", "parentPublication": { "id": "proceedings/lcn/2016/2054/0", "title": "2016 IEEE 41st Conference on Local Computer Networks (LCN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2006/0418/0/04116686", "title": "Detecting Selective Dropping Attacks in BGP", "doi": null, "abstractUrl": "/proceedings-article/lcn/2006/04116686/12OmNz6iOvK", "parentPublication": { "id": "proceedings/lcn/2006/0418/0", "title": "Proceedings. 2006 31st IEEE Conference on Local Computer Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2014/06/06678649", "title": "Analysis of Country-Wide Internet Outages Caused by Censorship", "doi": null, "abstractUrl": "/journal/nt/2014/06/06678649/13rRUNvgz12", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4itJ", "title": "1990 Proceedings of the Sixth Annual Computer Security Applications Conference", "acronym": "csac", "groupId": "1000141", "volume": "0", "displayVolume": "0", "year": "1990", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUPpHg", "doi": "10.1109/CSAC.1990.143812", "title": "An authorization plan for commercial service systems", "normalizedTitle": "An authorization plan for commercial service systems", "abstract": "Commercial service systems should allow customers to control their service configurations. The challenge is to make this feature feasible in such a way that the system is easy to administer while ensuring the security of both customer's service and the control system itself. Simple security mechanisms, such as access control lists used in general-purpose computer systems, are insufficient for administration control and authority delegation in commercial service systems. The author proposes a security policy called an 'authorization policy' suitable for administration and authorization controls. This security policy is enforced through a unified protection mechanism called an 'access control hierarchy'. The application of this access control hierarchy is demonstrated by examples.<>", "abstracts": [ { "abstractType": "Regular", "content": "Commercial service systems should allow customers to control their service configurations. The challenge is to make this feature feasible in such a way that the system is easy to administer while ensuring the security of both customer's service and the control system itself. Simple security mechanisms, such as access control lists used in general-purpose computer systems, are insufficient for administration control and authority delegation in commercial service systems. The author proposes a security policy called an 'authorization policy' suitable for administration and authorization controls. This security policy is enforced through a unified protection mechanism called an 'access control hierarchy'. The application of this access control hierarchy is demonstrated by examples.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Commercial service systems should allow customers to control their service configurations. The challenge is to make this feature feasible in such a way that the system is easy to administer while ensuring the security of both customer's service and the control system itself. Simple security mechanisms, such as access control lists used in general-purpose computer systems, are insufficient for administration control and authority delegation in commercial service systems. The author proposes a security policy called an 'authorization policy' suitable for administration and authorization controls. This security policy is enforced through a unified protection mechanism called an 'access control hierarchy'. The application of this access control hierarchy is demonstrated by examples.", "fno": "00143812", "keywords": [ "Security Of Data", "Service Industries", "Customer Controlled Configurations", "Authorization Plan", "Commercial Service Systems", "Service Configurations", "Security Mechanisms", "Access Control Lists", "Administration Control", "Authority Delegation", "Authorization Policy", "Unified Protection Mechanism", "Access Control Hierarchy", "Authorization", "Control Systems", "Data Security", "Access Control", "Telephony", "Protection", "Computer Security", "Application Software", "Personnel", "Permission" ], "authors": [ { "affiliation": "GTE Labs. Inc., Waltham, MA, USA", "fullName": "Che-Fn Yu", "givenName": null, "surname": "Che-Fn Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "csac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1990-01-01T00:00:00", "pubType": "proceedings", "pages": "376,377,378,379,380,381,382,383", "year": "1990", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00143797", "articleId": "12OmNxRnvWW", "__typename": "AdjacentArticleType" }, "next": { "fno": "00143813", "articleId": "12OmNqBKU9g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cloudcom/2010/4302/0/4302a634", "title": "OpenPMF SCaaS: Authorization as a Service for Cloud & SOA Applications", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2010/4302a634/12OmNwcl7KR", "parentPublication": { "id": "proceedings/cloudcom/2010/4302/0", "title": "2010 IEEE Second International Conference on Cloud Computing Technology and Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftdcs/2008/3377/0/3377a023", "title": "Towards Role-Based Authorization for OSGi Service Environments", "doi": null, "abstractUrl": "/proceedings-article/ftdcs/2008/3377a023/12OmNwfKjdj", "parentPublication": { "id": "proceedings/ftdcs/2008/3377/0", "title": "Future Trends of Distributed Computing Systems, IEEE International Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2004/2167/0/21670614", "title": "Web Service Authorization Framework", "doi": null, "abstractUrl": "/proceedings-article/icws/2004/21670614/12OmNxTVTXW", "parentPublication": { "id": "proceedings/icws/2004/2167/0", "title": "Proceedings. IEEE International Conference on Web Services, 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2009/3843/2/3843b442", "title": "A Study on the Mechanisms of Policy-Based Grid Authorization", "doi": null, "abstractUrl": "/proceedings-article/mines/2009/3843b442/12OmNxj234O", "parentPublication": { "id": "proceedings/mines/2009/3843/2", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2009/3959/0/3959a499", "title": "An Extensible XACML Authorization Web Service: Application to Dynamic Web Sites Access Control", "doi": null, "abstractUrl": "/proceedings-article/sitis/2009/3959a499/12OmNyRg4eQ", "parentPublication": { "id": "proceedings/sitis/2009/3959/0", "title": "2009 Fifth International Conference on Signal Image Technology and Internet Based Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2013/5114/0/5114a487", "title": "Authorization as a Service in Cloud Environments", "doi": null, "abstractUrl": "/proceedings-article/cgc/2013/5114a487/12OmNzYNN6i", "parentPublication": { "id": "proceedings/cgc/2013/5114/0", "title": "2013 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/umc/2008/3427/0/3427a099", "title": "Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network", "doi": null, "abstractUrl": "/proceedings-article/umc/2008/3427a099/12OmNzayNte", "parentPublication": { "id": "proceedings/umc/2008/3427/0", "title": "Ubiquitous Multimedia Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iptc/2010/4196/0/4196a417", "title": "Dynamic Authorization of Grid Based on Trust Mechanism", "doi": null, "abstractUrl": "/proceedings-article/iptc/2010/4196a417/12OmNzhnafO", "parentPublication": { "id": "proceedings/iptc/2010/4196/0", "title": "Intelligence Information Processing and Trusted Computing, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scam/2020/9248/0/924800a187", "title": "Static Extraction of Enforced Authorization Policies SeeAuthz", "doi": null, "abstractUrl": "/proceedings-article/scam/2020/924800a187/1oFH0GriSME", "parentPublication": { "id": "proceedings/scam/2020/9248/0", "title": "2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrY3LnR", "title": "COMPCON Spring '91", "acronym": "cmpcon", "groupId": "1000109", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNzWfoXy", "doi": "10.1109/CMPCON.1991.128805", "title": "Threats to privacy and public keys for protection", "normalizedTitle": "Threats to privacy and public keys for protection", "abstract": "Public-key cryptography is discussed with respect to the rights of individuals to electronic privacy. The RSA Public-Key Cryptosystem is described, and digital signatures and certificates are discussed. Applications of public-key cryptography are reviewed, and standards and future prospects in this field are considered.<>", "abstracts": [ { "abstractType": "Regular", "content": "Public-key cryptography is discussed with respect to the rights of individuals to electronic privacy. The RSA Public-Key Cryptosystem is described, and digital signatures and certificates are discussed. Applications of public-key cryptography are reviewed, and standards and future prospects in this field are considered.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Public-key cryptography is discussed with respect to the rights of individuals to electronic privacy. The RSA Public-Key Cryptosystem is described, and digital signatures and certificates are discussed. Applications of public-key cryptography are reviewed, and standards and future prospects in this field are considered.", "fno": "00128805", "keywords": [ "Cryptography", "Data Privacy", "Privacy", "Public Keys", "Electronic Privacy", "RSA Public Key Cryptosystem", "Public Key Cryptography", "Standards", "Public Key", "Protection", "Public Key Cryptography", "Communication System Control", "National Security", "Data Security", "Dolphins", "Data Privacy", "Secure Storage", "Postal Services" ], "authors": [ { "affiliation": "RSA Data Security Inc., Redwood City, CA, USA", "fullName": "J. Bidzos", "givenName": "J.", "surname": "Bidzos", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmpcon", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "189,190,191,192,193,194", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00128804", "articleId": "12OmNxVDuQu", "__typename": "AdjacentArticleType" }, "next": { "fno": "00128806", "articleId": "12OmNx3HI3N", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eee/2005/2274/0/22740112", "title": "On Splitting Public Keys for the Public Key Infrastructure", "doi": null, "abstractUrl": "/proceedings-article/eee/2005/22740112/12OmNBhpSbC", "parentPublication": { "id": "proceedings/eee/2005/2274/0", "title": "Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/1/4647a434", "title": "Public Key Cryptography Based on One-Way Shell Core Function", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647a434/12OmNwDAC7j", "parentPublication": { "id": "proceedings/iccsee/2012/4647/2", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acct/2012/4640/0/4640a426", "title": "Modified RSA Encryption Algorithm (MREA)", "doi": null, "abstractUrl": "/proceedings-article/acct/2012/4640a426/12OmNx2QUFW", "parentPublication": { "id": "proceedings/acct/2012/4640/0", "title": "Advanced Computing &amp; Communication Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfn/2009/3567/0/3567a130", "title": "Enhancing MANET Security Using Secret Public Keys", "doi": null, "abstractUrl": "/proceedings-article/icfn/2009/3567a130/12OmNxEjXVf", "parentPublication": { "id": "proceedings/icfn/2009/3567/0", "title": "Future Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2009/3557/2/3557c062", "title": "Key-Compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols", "doi": null, "abstractUrl": "/proceedings-article/etcs/2009/3557c062/12OmNyXMQlK", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2009/4672/0/05202365", "title": "A public key algorithm for optical communication based on lattice cryptography", "doi": null, "abstractUrl": "/proceedings-article/iscc/2009/05202365/12OmNym2bPS", "parentPublication": { "id": "proceedings/iscc/2009/4672/0", "title": "2009 IEEE Symposium on Computers and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2006/2687/0/04019834", "title": "Scalable interger factorization for public key crytosystems", "doi": null, "abstractUrl": "/proceedings-article/cit/2006/04019834/12OmNzwpUfY", "parentPublication": { "id": "proceedings/cit/2006/2687/0", "title": "The Sixth IEEE International Conference on Computer and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2006/04/q0386", "title": "Securing Mobile Ad Hoc Networks with Certificateless Public Keys", "doi": null, "abstractUrl": "/journal/tq/2006/04/q0386/13rRUwh80Ib", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2019/4024/0/402400a245", "title": "Accelerating Public Key Cryptography in Android Platforms", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2019/402400a245/1f8MSNLYKZi", "parentPublication": { "id": "proceedings/bigcom/2019/4024/0", "title": "2019 5th International Conference on Big Data Computing and Communications (BIGCOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2020/6582/0/09092355", "title": "F2MH Cryptosystem: Preliminary analysis of an original attempt to revive Knapsack-based public-key encryption schemes", "doi": null, "abstractUrl": "/proceedings-article/pdp/2020/09092355/1jPaZVaoAec", "parentPublication": { "id": "proceedings/pdp/2020/6582/0", "title": "2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19ZL1EZeOBy", "title": "2018 IEEE Symposium on Visualization for Cyber Security (VizSec)", "acronym": "vizsec", "groupId": "1810104", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "19ZL2TO0i64", "doi": "10.1109/VIZSEC.2018.8709182", "title": "Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data", "normalizedTitle": "Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data", "abstract": "Routing of network packets from one computer to another is the backbone of the internet and impacts the everyday life of many people. Although, this is a fully automated process it has many security issues. IP hijacks and misconfigurations occur very often and are difficult to detect. In the past visual analytics approaches aimed at detecting these phenomenons but only a few of these integrated geographical references. Geo-IP data is being used mostly as a lookup table which is an undervaluation of its capabilities. In this paper we present a visual-interactive system which only relies on Geo-IP data to create more awareness for this data source. We show that looking at Geo-IP data over time in combination with owner and location information of IP blocks already reveals suspicious cases. Together with our design study we also contribute a pre-processing algorithm for the Maxmind GeoIP2 City and ISP databases, to motivate the community to integrate this data source in future approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Routing of network packets from one computer to another is the backbone of the internet and impacts the everyday life of many people. Although, this is a fully automated process it has many security issues. IP hijacks and misconfigurations occur very often and are difficult to detect. In the past visual analytics approaches aimed at detecting these phenomenons but only a few of these integrated geographical references. Geo-IP data is being used mostly as a lookup table which is an undervaluation of its capabilities. In this paper we present a visual-interactive system which only relies on Geo-IP data to create more awareness for this data source. We show that looking at Geo-IP data over time in combination with owner and location information of IP blocks already reveals suspicious cases. Together with our design study we also contribute a pre-processing algorithm for the Maxmind GeoIP2 City and ISP databases, to motivate the community to integrate this data source in future approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Routing of network packets from one computer to another is the backbone of the internet and impacts the everyday life of many people. Although, this is a fully automated process it has many security issues. IP hijacks and misconfigurations occur very often and are difficult to detect. In the past visual analytics approaches aimed at detecting these phenomenons but only a few of these integrated geographical references. Geo-IP data is being used mostly as a lookup table which is an undervaluation of its capabilities. In this paper we present a visual-interactive system which only relies on Geo-IP data to create more awareness for this data source. We show that looking at Geo-IP data over time in combination with owner and location information of IP blocks already reveals suspicious cases. Together with our design study we also contribute a pre-processing algorithm for the Maxmind GeoIP2 City and ISP databases, to motivate the community to integrate this data source in future approaches.", "fno": "08709182", "keywords": [ "Computer Network Security", "Internet", "IP Networks", "Table Lookup", "Telecommunication Network Routing", "Geo IP Data", "Visual Interactive Identification", "Visual Interactive System", "IP Block", "IP Networks", "Data Visualization", "Routing", "Task Analysis", "Computer Aided Software Engineering", "Computer Security", "Prototypes", "Geographical Visualization", "Geo IP", "IP Blocks", "Routing", "User Centered Design", "Human Centered Computing", "Visual Analytics", "Human Centered Computing", "Geographic Visualization" ], "authors": [ { "affiliation": "Fraunhofer IGD, Technische Universität Darmstadt, Germany", "fullName": "Alex Ulmer", "givenName": "Alex", "surname": "Ulmer", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Technische Universität Darmstadt, Germany", "fullName": "Marija Schufrin", "givenName": "Marija", "surname": "Schufrin", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Technische Universität Darmstadt, Germany", "fullName": "David Sessler", "givenName": "David", "surname": "Sessler", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Technische Universität Darmstadt, Germany", "fullName": "Jörn Kohlhammer", "givenName": "Jörn", "surname": "Kohlhammer", "__typename": "ArticleAuthorType" } ], "idPrefix": "vizsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2018", "issn": null, "isbn": "978-1-5386-8194-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08709205", "articleId": "19ZL29SopcQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08709177", "articleId": "19ZL2yRWEh2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cit/2012/4858/0/4858a375", "title": "Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy", "doi": null, "abstractUrl": "/proceedings-article/cit/2012/4858a375/12OmNBIWXCy", "parentPublication": { "id": "proceedings/cit/2012/4858/0", "title": "Computer and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/soca/2014/6833/0/6833a235", "title": "An Efficient and Adaptive IP Traceback Scheme", "doi": null, "abstractUrl": "/proceedings-article/soca/2014/6833a235/12OmNBQ2VUK", "parentPublication": { "id": "proceedings/soca/2014/6833/0", "title": "2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2012/2445/0/06459962", "title": "Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies", "doi": null, "abstractUrl": "/proceedings-article/icnp/2012/06459962/12OmNCmpcMX", "parentPublication": { "id": "proceedings/icnp/2012/2445/0", "title": "2012 20th IEEE International Conference on Network Protocols (ICNP 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pccc/1988/0830/0/00010076", "title": "A case study: TCP/IP/CMOS kernel conversion to the iRMX operating system", "doi": null, "abstractUrl": "/proceedings-article/pccc/1988/00010076/12OmNqyUUGe", "parentPublication": { "id": "proceedings/pccc/1988/0830/0", "title": "IEEE International Performance Computing and Communications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2013/5287/0/06504197", "title": "Two dimensional-IP routing", "doi": null, "abstractUrl": "/proceedings-article/icnc/2013/06504197/12OmNro0IhQ", "parentPublication": { "id": "proceedings/icnc/2013/5287/0", "title": "2013 International Conference on Computing, Networking and Communications (ICNC 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn/2018/5596/0/559601a634", "title": "Practical Experience: Methodologies for Measuring Route Origin Validation", "doi": null, "abstractUrl": "/proceedings-article/dsn/2018/559601a634/12OmNx1qV7Q", "parentPublication": { "id": "proceedings/dsn/2018/5596/0", "title": "2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2017/01/07480793", "title": "Multi-Inherited Search Tree for Dynamic IP Router-Tables", "doi": null, "abstractUrl": "/journal/tc/2017/01/07480793/13rRUwInv3R", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2002/03/01012371", "title": "MLSR: a novel routing algorithm for multilayered satellite IP networks", "doi": null, "abstractUrl": "/journal/nt/2002/03/01012371/13rRUwkxc2I", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2019/01/08344439", "title": "Anchor Free IP Mobility", "doi": null, "abstractUrl": "/journal/tm/2019/01/08344439/17D45XwUAIk", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b504", "title": "Anomalous IP Address Detection on Traffic Logs Using Novel Word Embedding", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b504/1nkDgyl4rtu", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJsDwOn8E8", "doi": "10.1109/BigData47090.2019.9006586", "title": "Application of XGBoost to the cyber-security problem of detecting suspicious network traffic events", "normalizedTitle": "Application of XGBoost to the cyber-security problem of detecting suspicious network traffic events", "abstract": "This paper presents an application of XGBoost as a solution for a task associated with the IEEE BigData2019 Cup: Suspicious Network Event Recognition. As has been shown in the paper, the high-quality classification model can be based on independent predictions of each component in the sequence of network traffic events, then analyzed with statistical aggregation functions to generate the final prediction. We also propose the approach to this problem including handling high dimensionality space of IP addresses through encoding octets separately.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents an application of XGBoost as a solution for a task associated with the IEEE BigData2019 Cup: Suspicious Network Event Recognition. As has been shown in the paper, the high-quality classification model can be based on independent predictions of each component in the sequence of network traffic events, then analyzed with statistical aggregation functions to generate the final prediction. We also propose the approach to this problem including handling high dimensionality space of IP addresses through encoding octets separately.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents an application of XGBoost as a solution for a task associated with the IEEE BigData2019 Cup: Suspicious Network Event Recognition. As has been shown in the paper, the high-quality classification model can be based on independent predictions of each component in the sequence of network traffic events, then analyzed with statistical aggregation functions to generate the final prediction. We also propose the approach to this problem including handling high dimensionality space of IP addresses through encoding octets separately.", "fno": "09006586", "keywords": [ "Encoding", "IP Networks", "Statistical Analysis", "Telecommunication Traffic", "Cyber Security Problem", "IEEE Big Data 2019 Cup", "Encoding Octets", "Statistical Aggregation Function Analysis", "Suspicious Network Traffic Event Detection", "XG Boost Application", "High Quality Classification Model", "Suspicious Network Event Recognition", "Boosting", "Computer Security", "Training", "Big Data", "Data Models" ], "authors": [ { "affiliation": "National Information Processing Institute,Natural Language Processing Laboratory,Warsaw,Poland", "fullName": "Łukasz Podlodowski", "givenName": "Łukasz", "surname": "Podlodowski", "__typename": "ArticleAuthorType" }, { "affiliation": "National Information Processing Institute,Natural Language Processing Laboratory,Warsaw,Poland", "fullName": "Marek Kozłowski", "givenName": "Marek", "surname": "Kozłowski", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "5902-5907", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09005487", "articleId": "1hJsvLV2O3u", "__typename": "AdjacentArticleType" }, "next": { "fno": "09005626", "articleId": "1hJsv6O2W08", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671454", "title": "Predicting Victories in Video Games: Using Single XGBoost with Feature Engineering : IEEE BigData 2021 Cup - Predicting Victories in Video Games", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671454/1A8gyAYdt96", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10063985", "title": "Synergetic Focal Loss for Imbalanced Classification in Federated XGBoost", "doi": null, "abstractUrl": "/journal/ai/5555/01/10063985/1LlD1Q2Z3Py", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-nier/2019/1758/0/175800a013", "title": "Detecting Suspicious Package Updates", "doi": null, "abstractUrl": "/proceedings-article/icse-nier/2019/175800a013/1cI69fpbnJC", "parentPublication": { "id": "proceedings/icse-nier/2019/1758/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006178", "title": "Suspicious Network Event Recognition Leveraging on Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006178/1hJrRzrkPrW", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006391", "title": "Suspicious Network Event Recognition Using Modified Stacking Ensemble Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006391/1hJrZzuv1Ic", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006042", "title": "An Approach for Scale Suspicious Network Events Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006042/1hJs39roKvS", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006061", "title": "Gradient boosting decision trees for cyber security threats detection based on network events logs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006061/1hJs5EgJpjG", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006420", "title": "An Apriori-based Data Analysis on Suspicious Network Event Recognition", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006420/1hJsc5K1oGY", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006292", "title": "Models and Features with Covariate Shift Adaptation for Suspicious Network Event Recognition", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006292/1hJsjedfZIc", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005487", "title": "Naive Transfer Learning Approaches for Suspicious Event Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005487/1hJsvLV2O3u", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBbaH9K", "title": "2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)", "acronym": "wicsa", "groupId": "1000680", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBPc8A3", "doi": "10.1109/WICSA.2016.9", "title": "Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets", "normalizedTitle": "Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets", "abstract": "Much attention is paid nowadays to software architecture of a system as a set of design decisions providing the rationale for the system design. To document and share proven architectural design decisions, decisions made in concrete development projects are mined and distilled into reusable architectural decision models (a.k.a. guidance models). The available distillation approaches, however, remain ad hoc and biased towards the personal experience of few expert architects. Relationships between distilled decisions are not systematically explored. We propose an approach for distilling reusable architectural design decisions with emphasis on their relationships. Architectural knowledge artifacts (e.g., architecture documentation, interviews) are systematically coded for the occurrence of architectural design decisions and their details. Co-occurrences of coded design decisions are then processed for different relationship types using an established data-mining technique: frequent item-sets. The distilled relationships enter the construction of a reusable architectural decision model and contribute to organizing the design space based on empirical data (i.e., frequency patterns of co-occurrences). We report on distilling design-decision relationships from decision data collected during a three-year project on language architectures of 80 UML-based domain-specific modeling languages.", "abstracts": [ { "abstractType": "Regular", "content": "Much attention is paid nowadays to software architecture of a system as a set of design decisions providing the rationale for the system design. To document and share proven architectural design decisions, decisions made in concrete development projects are mined and distilled into reusable architectural decision models (a.k.a. guidance models). The available distillation approaches, however, remain ad hoc and biased towards the personal experience of few expert architects. Relationships between distilled decisions are not systematically explored. We propose an approach for distilling reusable architectural design decisions with emphasis on their relationships. Architectural knowledge artifacts (e.g., architecture documentation, interviews) are systematically coded for the occurrence of architectural design decisions and their details. Co-occurrences of coded design decisions are then processed for different relationship types using an established data-mining technique: frequent item-sets. The distilled relationships enter the construction of a reusable architectural decision model and contribute to organizing the design space based on empirical data (i.e., frequency patterns of co-occurrences). We report on distilling design-decision relationships from decision data collected during a three-year project on language architectures of 80 UML-based domain-specific modeling languages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Much attention is paid nowadays to software architecture of a system as a set of design decisions providing the rationale for the system design. To document and share proven architectural design decisions, decisions made in concrete development projects are mined and distilled into reusable architectural decision models (a.k.a. guidance models). The available distillation approaches, however, remain ad hoc and biased towards the personal experience of few expert architects. Relationships between distilled decisions are not systematically explored. We propose an approach for distilling reusable architectural design decisions with emphasis on their relationships. Architectural knowledge artifacts (e.g., architecture documentation, interviews) are systematically coded for the occurrence of architectural design decisions and their details. Co-occurrences of coded design decisions are then processed for different relationship types using an established data-mining technique: frequent item-sets. The distilled relationships enter the construction of a reusable architectural decision model and contribute to organizing the design space based on empirical data (i.e., frequency patterns of co-occurrences). We report on distilling design-decision relationships from decision data collected during a three-year project on language architectures of 80 UML-based domain-specific modeling languages.", "fno": "2131a061", "keywords": [ "Encoding", "Computer Architecture", "Systematics", "Software", "Documentation", "Decision Making", "Context", "Guidance Model", "Architectural Design Decision", "Design Decision Relationship", "Reusable Architectural Design Decision Model" ], "authors": [ { "affiliation": null, "fullName": "Stefan Sobernig", "givenName": "Stefan", "surname": "Sobernig", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Uwe Zdun", "givenName": "Uwe", "surname": "Zdun", "__typename": "ArticleAuthorType" } ], "idPrefix": "wicsa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-04-01T00:00:00", "pubType": "proceedings", "pages": "61-70", "year": "2016", "issn": null, "isbn": "978-1-5090-2131-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2131a051", "articleId": "12OmNvAiSch", "__typename": "AdjacentArticleType" }, "next": { "fno": "2131a071", "articleId": "12OmNqJZgC9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsa/2018/6398/0/639801a115", "title": "Architectural Design Decisions for Systems Supporting Model-Based Analysis of Runtime Events: A Qualitative Multi-method Study", "doi": null, "abstractUrl": "/proceedings-article/icsa/2018/639801a115/12OmNAmmuQw", "parentPublication": { "id": "proceedings/icsa/2018/6398/0", "title": "2018 IEEE International Conference on Software Architecture (ICSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/2011/4379/0/4379a216", "title": "Scenario-Based Architectural Design Decisions Documentation and Evolution", "doi": null, "abstractUrl": "/proceedings-article/ecbs/2011/4379a216/12OmNrMZpvz", "parentPublication": { "id": "proceedings/ecbs/2011/4379/0", "title": "Engineering of Computer-Based Systems, IEEE International Conference on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sesos/2015/7091/0/7091a037", "title": "Reusable Architectural Decision Models for Quality-Driven Decision Support: A Case Study from a Smart Cities Software Ecosystem", "doi": null, "abstractUrl": "/proceedings-article/sesos/2015/7091a037/12OmNwtn3tw", "parentPublication": { "id": "proceedings/sesos/2015/7091/0", "title": "2015 IEEE/ACM 3rd International Workshop on Software Engineering for Systems-of-Systems (SESoS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/shark-adi/2007/2951/0/29510009", "title": "Modeling and Documenting the Evolution of Architectural Design Decisions", "doi": null, "abstractUrl": "/proceedings-article/shark-adi/2007/29510009/12OmNwudQSy", "parentPublication": { "id": "proceedings/shark-adi/2007/2951/0", "title": "SHAring and Reusing architectural Knowledge Architecture, Rationale, and Design Intent, Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/march/2016/2573/0/2573a016", "title": "Architectural Decision-Making in Open-Source Systems -- Preliminary Observations", "doi": null, "abstractUrl": "/proceedings-article/march/2016/2573a016/12OmNxdVgIQ", "parentPublication": { "id": "proceedings/march/2016/2573/0", "title": "2016 1st International Workshop on decision Making in Software ARCHitecture (MARCH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edoc/2013/5081/0/5081a139", "title": "Relating Decisions in Enterprise Architecture Using Decision Design Graphs", "doi": null, "abstractUrl": "/proceedings-article/edoc/2013/5081a139/12OmNzYNN9J", "parentPublication": { "id": "proceedings/edoc/2013/5081/0", "title": "2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2013/06/mso2013060046", "title": "Sustainable Architectural Design Decisions", "doi": null, "abstractUrl": "/magazine/so/2013/06/mso2013060046/13rRUNvyarw", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2011/01/mso2011010064", "title": "Architectural Decisions as Reusable Design Assets", "doi": null, "abstractUrl": "/magazine/so/2011/01/mso2011010064/13rRUyYSWqJ", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wicsa/2005/2548/0/01620144", "title": "Architectural Design Decisions Session Report", "doi": null, "abstractUrl": "/proceedings-article/wicsa/2005/01620144/1h0JJKh6aoE", "parentPublication": { "id": "proceedings/wicsa/2005/2548/0", "title": "5th Working IEEE/IFIP Conference on Software Architecture (WICSA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2021/06/09585145", "title": "Decision-Making Principles for Better Software Design Decisions", "doi": null, "abstractUrl": "/magazine/so/2021/06/09585145/1xZlyVOzQWY", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiqH", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "acronym": "bdva", "groupId": "1809805", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VN31ge", "doi": "10.1109/BDVA.2018.8533895", "title": "Evaluating Navigation Techniques for 3D Graph Visualizations in Virtual Reality", "normalizedTitle": "Evaluating Navigation Techniques for 3D Graph Visualizations in Virtual Reality", "abstract": "Research into how virtual reality (VR) can be a beneficial technology for new and emerging large, complex data visualizations for data scientists is ongoing. In this paper, we evaluate three-dimensional VR navigation technique for data visualizations and test their effectiveness with a large graph visualization. We evaluate two prominent navigation techniques employed in VR (Teleportation and One-Handed Flying) against two less common methods (Two-Handed Flying and Worlds In Miniature) and evaluate their performance and effectiveness through a series of tasks. We found Steering Patterns (One-Handed Flying and Two-Handed Flying) to be faster and preferred by participants for completing searching tasks in comparision to Teleportation. Worlds-In-Miniature was the least physically demanding of the navigations, and was preferred by participants for tasks that required an overview of the graph such as triangle counting.", "abstracts": [ { "abstractType": "Regular", "content": "Research into how virtual reality (VR) can be a beneficial technology for new and emerging large, complex data visualizations for data scientists is ongoing. In this paper, we evaluate three-dimensional VR navigation technique for data visualizations and test their effectiveness with a large graph visualization. We evaluate two prominent navigation techniques employed in VR (Teleportation and One-Handed Flying) against two less common methods (Two-Handed Flying and Worlds In Miniature) and evaluate their performance and effectiveness through a series of tasks. We found Steering Patterns (One-Handed Flying and Two-Handed Flying) to be faster and preferred by participants for completing searching tasks in comparision to Teleportation. Worlds-In-Miniature was the least physically demanding of the navigations, and was preferred by participants for tasks that required an overview of the graph such as triangle counting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research into how virtual reality (VR) can be a beneficial technology for new and emerging large, complex data visualizations for data scientists is ongoing. In this paper, we evaluate three-dimensional VR navigation technique for data visualizations and test their effectiveness with a large graph visualization. We evaluate two prominent navigation techniques employed in VR (Teleportation and One-Handed Flying) against two less common methods (Two-Handed Flying and Worlds In Miniature) and evaluate their performance and effectiveness through a series of tasks. We found Steering Patterns (One-Handed Flying and Two-Handed Flying) to be faster and preferred by participants for completing searching tasks in comparision to Teleportation. Worlds-In-Miniature was the least physically demanding of the navigations, and was preferred by participants for tasks that required an overview of the graph such as triangle counting.", "fno": "08533895", "keywords": [ "Navigation", "Data Visualization", "Three Dimensional Displays", "Task Analysis", "Two Dimensional Displays", "Teleportation", "Resists" ], "authors": [ { "affiliation": null, "fullName": "Adam Drogemuller", "givenName": "Adam", "surname": "Drogemuller", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew Cunningham", "givenName": "Andrew", "surname": "Cunningham", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "James Walsh", "givenName": "James", "surname": "Walsh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Maxime Cordeil", "givenName": "Maxime", "surname": "Cordeil", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "William Ross", "givenName": "William", "surname": "Ross", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bruce Thomas", "givenName": "Bruce", "surname": "Thomas", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdva", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2018", "issn": null, "isbn": "978-1-5386-9194-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08533894", "articleId": "17D45Xtvpbq", "__typename": "AdjacentArticleType" }, "next": { "fno": "08533896", "articleId": "17D45Xi9rWv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vrw/2022/8402/0/840200a556", "title": "Group WiM: A Group Navigation Technique for Collaborative Virtual Reality Environments", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a556/1CJdXqzjctO", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a238", "title": "Comparing Teleportation Methods for Travel in Everyday Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a238/1CJdYyJV76E", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a501", "title": "Exploring Three-Dimensional Locomotion Techniques in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a501/1J7WrBbMYEg", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a082", "title": "WiM-Based Group Navigation for Collaborative Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a082/1KmFfzv6fWo", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090536", "title": "Elastic-Move: Passive Haptic Device with Force Feedback for Virtual Reality Locomotion", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090536/1jIxqFQXvSE", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a377", "title": "Multisensory Teleportation in Virtual Reality Applications", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a377/1tnXGQKSUPm", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a480", "title": "Analysis of Positional Tracking Space Usage when using Teleportation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a480/1tnXfrT4ere", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a278", "title": "In Touch with Everyday Objects: Teleportation Techniques in Virtual Environments Supporting Tangibility", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a278/1tnXjaZXiw0", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a345", "title": "Spherical World in Miniature: Exploring the Tiny Planets Metaphor for Discrete Locomotion in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a345/1tuAuPBgHTi", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a321", "title": "Simultaneous Real Walking and Asymmetric Input in Virtual Reality with a Smartphone-based Hybrid Interface", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a321/1yeQEyk3fbO", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1r54JdEbaxi", "title": "2020 IEEE Symposium on Visualization for Cyber Security (VizSec)", "acronym": "vizsec", "groupId": "1810104", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1r54JwIZFy8", "doi": "10.1109/VizSec51108.2020.00011", "title": "Improving Interpretability for Cyber Vulnerability Assessment Using Focus and Context Visualizations", "normalizedTitle": "Improving Interpretability for Cyber Vulnerability Assessment Using Focus and Context Visualizations", "abstract": "Risk scoring provides a simple and quantifiable metric for decision support in cyber security operations, including prioritizing how to address discovered software vulnerabilities. However, scoring systems are often opaque to operators, which makes scores difficult to interpret in the context of their own networks, each other, or in a broader threat landscape. This interpretability challenge is exacerbated by recent applications of artificial intelligence (AI) and machine learning (ML) for vulnerability assessment, where opaque machine reasoning can hinder domain experts' trust in the decision-support toolkit or the actionability of its outputs. In this paper, we address this challenge through a combination of visualizations and analytics that complement existing techniques for vulnerability assessment. We present a study toward designing more interpretable visual encodings for decision support for vulnerability assessment. In particular, we consider the problem of making datasets of known vulnerabilities more interpretable at multiple scales, inspired by focus and context principles from the information visualization design community. The first scale considers individually scored vulnerabilities by using an explainable AI (XAI) toolkit for an ML risk-scoring model and by developing new visualizations of CVSS score features. The second scale uses an embedding for vulnerability descriptions to cluster potentially similar vulnerabilities. We outline use cases for these tools and discuss opportunities for applying XAI concepts to cyber risk and vulnerability management.", "abstracts": [ { "abstractType": "Regular", "content": "Risk scoring provides a simple and quantifiable metric for decision support in cyber security operations, including prioritizing how to address discovered software vulnerabilities. However, scoring systems are often opaque to operators, which makes scores difficult to interpret in the context of their own networks, each other, or in a broader threat landscape. This interpretability challenge is exacerbated by recent applications of artificial intelligence (AI) and machine learning (ML) for vulnerability assessment, where opaque machine reasoning can hinder domain experts' trust in the decision-support toolkit or the actionability of its outputs. In this paper, we address this challenge through a combination of visualizations and analytics that complement existing techniques for vulnerability assessment. We present a study toward designing more interpretable visual encodings for decision support for vulnerability assessment. In particular, we consider the problem of making datasets of known vulnerabilities more interpretable at multiple scales, inspired by focus and context principles from the information visualization design community. The first scale considers individually scored vulnerabilities by using an explainable AI (XAI) toolkit for an ML risk-scoring model and by developing new visualizations of CVSS score features. The second scale uses an embedding for vulnerability descriptions to cluster potentially similar vulnerabilities. We outline use cases for these tools and discuss opportunities for applying XAI concepts to cyber risk and vulnerability management.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Risk scoring provides a simple and quantifiable metric for decision support in cyber security operations, including prioritizing how to address discovered software vulnerabilities. However, scoring systems are often opaque to operators, which makes scores difficult to interpret in the context of their own networks, each other, or in a broader threat landscape. This interpretability challenge is exacerbated by recent applications of artificial intelligence (AI) and machine learning (ML) for vulnerability assessment, where opaque machine reasoning can hinder domain experts' trust in the decision-support toolkit or the actionability of its outputs. In this paper, we address this challenge through a combination of visualizations and analytics that complement existing techniques for vulnerability assessment. We present a study toward designing more interpretable visual encodings for decision support for vulnerability assessment. In particular, we consider the problem of making datasets of known vulnerabilities more interpretable at multiple scales, inspired by focus and context principles from the information visualization design community. The first scale considers individually scored vulnerabilities by using an explainable AI (XAI) toolkit for an ML risk-scoring model and by developing new visualizations of CVSS score features. The second scale uses an embedding for vulnerability descriptions to cluster potentially similar vulnerabilities. We outline use cases for these tools and discuss opportunities for applying XAI concepts to cyber risk and vulnerability management.", "fno": "826200a030", "keywords": [ "Artificial Intelligence", "Computer Network Security", "Data Visualisation", "Learning Artificial Intelligence", "Risk Management", "Security Of Data", "Discovered Software Vulnerabilities", "Scoring Systems", "Broader Threat Landscape", "Interpretability Challenge", "Artificial Intelligence", "Machine Learning", "Opaque Machine Reasoning", "Decision Support Toolkit", "Interpretable Visual Encodings", "Decision Support", "Known Vulnerabilities", "Information Visualization Design Community", "Explainable AI Toolkit", "ML Risk Scoring Model", "CVSS Score Features", "Vulnerability Descriptions", "Cluster Potentially Similar Vulnerabilities", "Vulnerability Management", "Cyber Vulnerability Assessment", "Risk Scoring", "Cyber Security Operations", "Visualization", "Machine Learning", "Tools", "Encoding", "Computer Crime", "Task Analysis", "Statistics", "Human Centered Computing X 2014 Visualization X 2014 Visualization Systems And Tools X 2014 Visualization Toolkits", "Human Centered Computing X 2014 Visualization X 2014 Visualization Application Domains X 2014 Information Visualization", "Security And Privacy X 2014 Systems Security X 2014 Vulnerability Management" ], "authors": [ { "affiliation": "Massachusetts Institute of Technology", "fullName": "Kenneth B. Alperin", "givenName": "Kenneth B.", "surname": "Alperin", "__typename": "ArticleAuthorType" }, { "affiliation": "Massachusetts Institute of Technology", "fullName": "Allan B. Wollaber", "givenName": "Allan B.", "surname": "Wollaber", "__typename": "ArticleAuthorType" }, { "affiliation": "Massachusetts Institute of Technology", "fullName": "Steven R. Gomez", "givenName": "Steven R.", "surname": "Gomez", "__typename": "ArticleAuthorType" } ], "idPrefix": "vizsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "30-39", "year": "2020", "issn": null, "isbn": "978-1-7281-8262-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "826200a025", "articleId": "1r54JhxaBY4", "__typename": "AdjacentArticleType" }, "next": { "fno": "826200a040", "articleId": "1r54JB1fpyE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/waina/2017/6231/0/6231a110", "title": "Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool", "doi": null, "abstractUrl": "/proceedings-article/waina/2017/6231a110/12OmNBEYzLO", "parentPublication": { "id": "proceedings/waina/2017/6231/0", "title": "2017 31st International Conference on Advanced Information Networking and Applications: Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a125", "title": "Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a125/12OmNCyTyr4", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2017/5504/0/08022734", "title": "Security vulnerability assessment for software version upgrade", "doi": null, "abstractUrl": "/proceedings-article/snpd/2017/08022734/12OmNs0C9VK", "parentPublication": { "id": "proceedings/snpd/2017/5504/0", "title": "2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2010/4019/0/4019a431", "title": "Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model", "doi": null, "abstractUrl": "/proceedings-article/waina/2010/4019a431/12OmNwcl7B6", "parentPublication": { "id": "proceedings/waina/2010/4019/0", "title": "2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crisis/2013/3488/0/06766359", "title": "Predictive vulnerability scoring in the context of insufficient information availability", "doi": null, "abstractUrl": "/proceedings-article/crisis/2013/06766359/12OmNwdtwfZ", "parentPublication": { "id": "proceedings/crisis/2013/3488/0", "title": "2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mines/2011/4559/0/4559a352", "title": "An Improved CVSS-based Vulnerability Scoring Mechanism", "doi": null, "abstractUrl": "/proceedings-article/mines/2011/4559a352/12OmNyVes0J", "parentPublication": { "id": "proceedings/mines/2011/4559/0", "title": "Multimedia Information Networking and Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2012/06/ttq2012060825", "title": "Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks", "doi": null, "abstractUrl": "/journal/tq/2012/06/ttq2012060825/13rRUNvya2v", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2006/06/j6085", "title": "Common Vulnerability Scoring System", "doi": null, "abstractUrl": "/magazine/sp/2006/06/j6085/13rRUxcKzYS", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2019/12/08909925", "title": "Moral Hazards in Cyber Vulnerability Markets", "doi": null, "abstractUrl": "/magazine/co/2019/12/08909925/1f8KKHevHhK", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b795", "title": "Evolutionary Algorithms for Vulnerability Coverage", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b795/1nkDnyg4lwc", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAnMuCZ", "title": "2015 IFIP Networking Conference (IFIP Networking)", "acronym": "ifip-networking", "groupId": "1802997", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoUTk2", "doi": "10.1109/IFIPNetworking.2015.7145329", "title": "Global VoIP security threats - large scale validation based on independent honeynets", "normalizedTitle": "Global VoIP security threats - large scale validation based on independent honeynets", "abstract": "Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of real-world attacks collected in independent VoIP honeynet solutions with different capture mechanisms over a long period of time. Due to the validation of results from several honeynet designs we have achieved a unique, much broader view on large scale attacks. The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud.", "abstracts": [ { "abstractType": "Regular", "content": "Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of real-world attacks collected in independent VoIP honeynet solutions with different capture mechanisms over a long period of time. Due to the validation of results from several honeynet designs we have achieved a unique, much broader view on large scale attacks. The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of real-world attacks collected in independent VoIP honeynet solutions with different capture mechanisms over a long period of time. Due to the validation of results from several honeynet designs we have achieved a unique, much broader view on large scale attacks. The results show similar attacker behavior, confirm previous assumptions about attacks and present new insights in large scale VoIP attacks, e.g., for toll fraud.", "fno": "07145329", "keywords": [ "Servers", "IP Networks", "Protocols", "Security", "Internet", "Monitoring", "Engines", "Communication System Security", "Security", "Internet Telephony", "Intrusion Detection" ], "authors": [ { "affiliation": "Vienna University of Technology, Industrial Software (INSO), 1040, Austria", "fullName": "Markus Gruber", "givenName": "Markus", "surname": "Gruber", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Duisburg-Essen, Institute for Experimental Mathematics, 45326, Germany", "fullName": "Dirk Hoffstadt", "givenName": "Dirk", "surname": "Hoffstadt", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Duisburg-Essen, Institute for Experimental Mathematics, 45326, Germany", "fullName": "Adnan Aziz", "givenName": "Adnan", "surname": "Aziz", "__typename": "ArticleAuthorType" }, { "affiliation": "Vienna University of Technology, Industrial Software (INSO), 1040, Austria", "fullName": "Florian Fankhauser", "givenName": "Florian", "surname": "Fankhauser", "__typename": "ArticleAuthorType" }, { "affiliation": "Vienna University of Technology, Industrial Software (INSO), 1040, Austria", "fullName": "Christian Schanes", "givenName": "Christian", "surname": "Schanes", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Duisburg-Essen, Institute for Experimental Mathematics, 45326, Germany", "fullName": "Erwin Rathgeb", "givenName": "Erwin", "surname": "Rathgeb", "__typename": "ArticleAuthorType" }, { "affiliation": "Vienna University of Technology, Industrial Software (INSO), 1040, Austria", "fullName": "Thomas Grechenig", "givenName": "Thomas", "surname": "Grechenig", "__typename": "ArticleAuthorType" } ], "idPrefix": "ifip-networking", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-05-01T00:00:00", "pubType": "proceedings", "pages": "1-9", "year": "2015", "issn": null, "isbn": "978-3-9018-8268-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07145328", "articleId": "12OmNqBbHMk", "__typename": "AdjacentArticleType" }, "next": { "fno": "07145330", "articleId": "12OmNzFdtap", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icise/2016/2287/0/07486212", "title": "An Elastic VoIP Solution Based on OpenStack", "doi": null, "abstractUrl": "/proceedings-article/icise/2016/07486212/12OmNAS9zHB", "parentPublication": { "id": "proceedings/icise/2016/2287/0", "title": "2016 International Conference on Information Systems Engineering (ICISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/modelsward/2015/136/0/07323112", "title": "Technology independent honeynet description language", "doi": null, "abstractUrl": "/proceedings-article/modelsward/2015/07323112/12OmNCdBDPq", "parentPublication": { "id": "proceedings/modelsward/2015/136/0", "title": "2015 3rd International Conference on Model-Driven Engineering and Software Development (MODELSWARD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2016/0990/0/0990a312", "title": "VoIP Profiler: Profiling Voice over IP User Communication Behavior", "doi": null, "abstractUrl": "/proceedings-article/ares/2016/0990a312/12OmNqFJhL6", "parentPublication": { "id": "proceedings/ares/2016/0990/0", "title": "2016 11th International Conference on Availability, Reliability and Security (ARES )", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2013/5022/0/5022a675", "title": "Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2013/5022a675/12OmNrGKeuP", "parentPublication": { "id": "proceedings/trustcom/2013/5022/0", "title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aimoc/2014/3880/0/06785540", "title": "Performance analysis of VoIP spoofing attacks using classification algorithms", "doi": null, "abstractUrl": "/proceedings-article/aimoc/2014/06785540/12OmNyKrH3M", "parentPublication": { "id": "proceedings/aimoc/2014/3880/0", "title": "2014 Applications and Innovations in Mobile Computing (AIMoC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2008/3405/0/3405a219", "title": "Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network", "doi": null, "abstractUrl": "/proceedings-article/issre/2008/3405a219/12OmNyRPgNe", "parentPublication": { "id": "proceedings/issre/2008/3405/0", "title": "2008 19th International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2011/1788/0/06137625", "title": "Forensic Method Analysis Involving VoIP Crime", "doi": null, "abstractUrl": "/proceedings-article/kam/2011/06137625/12OmNzXnNpi", "parentPublication": { "id": "proceedings/kam/2011/1788/0", "title": "2011 Fourth International Symposium on Knowledge Acquisition and Modeling", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2010/4236/0/05633617", "title": "VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP)", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2010/05633617/183rAcuejpY", "parentPublication": { "id": "proceedings/bwcca/2010/4236/0", "title": "2010 International Conference on Broadband, Wireless Computing, Communication and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/6giott/2022/5484/0/548400a030", "title": "Dynamic Deployment Model of Lightweight Honeynet for Internet of Things", "doi": null, "abstractUrl": "/proceedings-article/6giott/2022/548400a030/1LKwMt2Y6dy", "parentPublication": { "id": "proceedings/6giott/2022/5484/0", "title": "2022 International Conference on 6G Communications and IoT Technologies (6GIoTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a466", "title": "Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a466/1ua4xkor6XS", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzayN6f", "title": "Networked Computing and Advanced Information Management, International Conference on", "acronym": "ncm", "groupId": "1002435", "volume": "1", "displayVolume": "1", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNArbG4p", "doi": "10.1109/NCM.2008.245", "title": "Monitoring Unused IP Addresses on Segments Managed by DHCP", "normalizedTitle": "Monitoring Unused IP Addresses on Segments Managed by DHCP", "abstract": "New threats are constantly appearing on the Internet.System administrators have developed many tools to try tomitigate those threats, however, currently available coun-termeasures are still limited. Moreover, it is difficult forsystem administrators to fully understand what happens intheir networks in (near) real time. We focus on the moni-toring of network traffic sent to unused IP addresses withhoneypot devices to capture information about network ac-tivity. More precisely, we consider ways of handling suchunused addresses on network segments managed via DHCP(Dynamic Host Configuration Protocol). In this paper, wepropose to exploit that DHCP service to dynamically assignunused IP addresses to honeypot devices, and, discuss thedesign of such monitoring system.", "abstracts": [ { "abstractType": "Regular", "content": "New threats are constantly appearing on the Internet.System administrators have developed many tools to try tomitigate those threats, however, currently available coun-termeasures are still limited. Moreover, it is difficult forsystem administrators to fully understand what happens intheir networks in (near) real time. We focus on the moni-toring of network traffic sent to unused IP addresses withhoneypot devices to capture information about network ac-tivity. More precisely, we consider ways of handling suchunused addresses on network segments managed via DHCP(Dynamic Host Configuration Protocol). In this paper, wepropose to exploit that DHCP service to dynamically assignunused IP addresses to honeypot devices, and, discuss thedesign of such monitoring system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "New threats are constantly appearing on the Internet.System administrators have developed many tools to try tomitigate those threats, however, currently available coun-termeasures are still limited. Moreover, it is difficult forsystem administrators to fully understand what happens intheir networks in (near) real time. We focus on the moni-toring of network traffic sent to unused IP addresses withhoneypot devices to capture information about network ac-tivity. More precisely, we consider ways of handling suchunused addresses on network segments managed via DHCP(Dynamic Host Configuration Protocol). In this paper, wepropose to exploit that DHCP service to dynamically assignunused IP addresses to honeypot devices, and, discuss thedesign of such monitoring system.", "fno": "3322a510", "keywords": [ "Honeypot", "DHCP", "Network Monitoring", "Network Security" ], "authors": [ { "affiliation": null, "fullName": "Seiichiro Mizoguchi", "givenName": "Seiichiro", "surname": "Mizoguchi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yoshiaki Hori", "givenName": "Yoshiaki", "surname": "Hori", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kouichi Sakurai", "givenName": "Kouichi", "surname": "Sakurai", "__typename": "ArticleAuthorType" } ], "idPrefix": "ncm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-09-01T00:00:00", "pubType": "proceedings", "pages": "510-515", "year": "2008", "issn": null, "isbn": "978-0-7695-3322-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3322a502", "articleId": "12OmNC1GuiR", "__typename": "AdjacentArticleType" }, "next": { "fno": "3322a516", "articleId": "12OmNC4eSy9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wowmom/2009/4440/0/05282437", "title": "Demonstration of automatic address and radio parameters assignment in MANET using DHCP protocol extensions", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2009/05282437/12OmNAWH9B8", "parentPublication": { "id": "proceedings/wowmom/2009/4440/0", "title": "2009 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WowMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2012/4736/0/4736a387", "title": "Insider Threats to Cloud Computing: Directions for New Research Challenges", "doi": null, "abstractUrl": "/proceedings-article/compsac/2012/4736a387/12OmNC3Xhov", "parentPublication": { "id": "proceedings/compsac/2012/4736/0", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2002/1727/0/17270893", "title": "Enhanced Intranet Management in a DHCP-Enabled Environment", "doi": null, "abstractUrl": "/proceedings-article/compsac/2002/17270893/12OmNCmGNVR", "parentPublication": { "id": "proceedings/compsac/2002/1727/0", "title": "Proceedings 26th Annual International Computer Software and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis-comsar/2006/2613/0/26130083", "title": "Security Gateway for Accessing IPv6 WLAN", "doi": null, "abstractUrl": "/proceedings-article/icis-comsar/2006/26130083/12OmNvSbBOs", "parentPublication": { "id": "proceedings/icis-comsar/2006/2613/0", "title": "Computer and Information Science, 5th IEEE/ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icn/2007/2805/0/28050098", "title": "Automated Detection of Emerging Network Security Threats", "doi": null, "abstractUrl": "/proceedings-article/icn/2007/28050098/12OmNwIYZAw", "parentPublication": { "id": "proceedings/icn/2007/2805/0", "title": "International Conference on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051865", "title": "Stream computing for large-scale, multi-channel cyber threat analytics", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051865/12OmNwdtwd3", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/2/3407c021", "title": "Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407c021/12OmNy87QzF", "parentPublication": { "id": "proceedings/iccit/2008/3407/2", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/2008/2682/0/04625480", "title": "DHCP support for secure automatic detection of host status", "doi": null, "abstractUrl": "/proceedings-article/acsac/2008/04625480/12OmNyoAA1U", "parentPublication": { "id": "proceedings/acsac/2008/2682/0", "title": "2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wistdcs/2008/3347/0/3347a058", "title": "nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis", "doi": null, "abstractUrl": "/proceedings-article/wistdcs/2008/3347a058/12OmNzYNNiQ", "parentPublication": { "id": "proceedings/wistdcs/2008/3347/0", "title": "Information Security Threats Data Collection and Sharing, WOMBAT Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b442", "title": "FACA: An effective method for detecting the survivability of large-scale IPv6 addresses", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b442/1LSPCIuUoBa", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNsh", "title": "2013 IEEE Security and Privacy Workshops", "acronym": "spw", "groupId": "1801671", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3Xhkb", "doi": "10.1109/SPW.2013.30", "title": "Reporting Insider Threats via Covert Channels", "normalizedTitle": "Reporting Insider Threats via Covert Channels", "abstract": "Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious insider (or even an outsider) to detect or block. In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication. The covert channel leverages the differences in the framing approaches used by Ethernet and IP packets to append hidden information to IP packet and transmit it to an organization's administrator. This stealthy communication is difficult for even advanced attackers and is challenging to block since it opportunistically uses unrelated communication. Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization. We introduce the covert channel, incorporate it into a working prototype, and combine it with an intrusion detection system to show its promise for security event reporting.", "abstracts": [ { "abstractType": "Regular", "content": "Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious insider (or even an outsider) to detect or block. In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication. The covert channel leverages the differences in the framing approaches used by Ethernet and IP packets to append hidden information to IP packet and transmit it to an organization's administrator. This stealthy communication is difficult for even advanced attackers and is challenging to block since it opportunistically uses unrelated communication. Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization. We introduce the covert channel, incorporate it into a working prototype, and combine it with an intrusion detection system to show its promise for security event reporting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious insider (or even an outsider) to detect or block. In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication. The covert channel leverages the differences in the framing approaches used by Ethernet and IP packets to append hidden information to IP packet and transmit it to an organization's administrator. This stealthy communication is difficult for even advanced attackers and is challenging to block since it opportunistically uses unrelated communication. Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization. We introduce the covert channel, incorporate it into a working prototype, and combine it with an intrusion detection system to show its promise for security event reporting.", "fno": "06565231", "keywords": [ "Security", "IP Networks", "Organizations", "Payloads", "Protocols", "Monitoring", "Operating Systems", "Network Security", "Insider Threats", "Covert Channels" ], "authors": [ { "affiliation": null, "fullName": "David N. Muchene", "givenName": "David N.", "surname": "Muchene", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Klevis Luli", "givenName": "Klevis", "surname": "Luli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Craig A. Shue", "givenName": "Craig A.", "surname": "Shue", "__typename": "ArticleAuthorType" } ], "idPrefix": "spw", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2013-05-01T00:00:00", "pubType": "proceedings", "pages": "68-71", "year": "2013", "issn": null, "isbn": "978-1-4799-0458-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06565230", "articleId": "12OmNzcxZ6A", "__typename": "AdjacentArticleType" }, "next": { "fno": "06565232", "articleId": "12OmNx5Yv6C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/euros&p/2018/4228/0/422801a243", "title": "Probabilistic Obfuscation Through Covert Channels", "doi": null, "abstractUrl": "/proceedings-article/euros&p/2018/422801a243/12OmNAXPyfG", "parentPublication": { "id": "proceedings/euros&p/2018/4228/0", "title": "2018 IEEE European Symposium on Security and Privacy (EuroS&P)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lcn/2008/2412/0/04664172", "title": "Covert channels in multiplayer first person shooter online games", "doi": null, "abstractUrl": "/proceedings-article/lcn/2008/04664172/12OmNB9bvdG", "parentPublication": { "id": "proceedings/lcn/2008/2412/0", "title": "2008 33rd IEEE Conference on Local Computer Networks (LCN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2015/8657/0/8657a037", "title": "Understanding the Dynamic of Covert Organization with Multilayer Networks Model", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a037/12OmNBBzohv", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsac/1988/0895/0/00113348", "title": "Characterizing network covert storage channels", "doi": null, "abstractUrl": "/proceedings-article/acsac/1988/00113348/12OmNBrV1O7", "parentPublication": { "id": "proceedings/acsac/1988/0895/0", "title": "Fourth Aerospace Computer Security Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718510", "title": "Exploring Covert Channels", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718510/12OmNrJRPbb", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csfw/1989/9999/0/00040590", "title": "Finite-state noiseless covert channels", "doi": null, "abstractUrl": "/proceedings-article/csfw/1989/00040590/12OmNvSKNIt", "parentPublication": { "id": "proceedings/csfw/1989/9999/0", "title": "Proceedings of the Computer Security Foundations Workshop II,", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/malware/2008/3288/0/04690857", "title": "Superimposing permutational covert channels onto reliable stream protocols", "doi": null, "abstractUrl": "/proceedings-article/malware/2008/04690857/12OmNxX3uPI", "parentPublication": { "id": "proceedings/malware/2008/3288/0", "title": "2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csfw/1991/2215/0/00151588", "title": "Protection against covert storage and timing channels", "doi": null, "abstractUrl": "/proceedings-article/csfw/1991/00151588/12OmNyo1o0n", "parentPublication": { "id": "proceedings/csfw/1991/2215/0", "title": "Proceedings Computer Security Foundations Workshop IV", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2013/5022/0/5022a552", "title": "Trust Enhanced Security Architecture for Detecting Insider Threats", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2013/5022a552/12OmNzUgd5c", "parentPublication": { "id": "proceedings/trustcom/2013/5022/0", "title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mi/2016/05/mmi2016050017", "title": "Detecting Hardware Covert Timing Channels", "doi": null, "abstractUrl": "/magazine/mi/2016/05/mmi2016050017/13rRUx0xPWm", "parentPublication": { "id": "mags/mi", "title": "IEEE Micro", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxQOjz3", "title": "2012 IEEE 36th Annual Computer Software and Applications Conference", "acronym": "compsac", "groupId": "1000143", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3Xhov", "doi": "10.1109/COMPSAC.2012.113", "title": "Insider Threats to Cloud Computing: Directions for New Research Challenges", "normalizedTitle": "Insider Threats to Cloud Computing: Directions for New Research Challenges", "abstract": "Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. The common notion of a cloud insider as a rogue administrator of a service provider is discussed, but we also present two additional cloudrelated insider risks: the insider who exploits a cloud-related vulnerability to steal information from a cloud system, and the insider who uses cloud systems to carry out an attack on an employer's local resources. We also characterize a hierarchy of administrators within cloud service providers, give examples of attacks from real insider threat cases, and show how the nature of cloud systems architectures enables attacks to succeed. Finally, we discuss our position on future cloud research.", "abstracts": [ { "abstractType": "Regular", "content": "Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. The common notion of a cloud insider as a rogue administrator of a service provider is discussed, but we also present two additional cloudrelated insider risks: the insider who exploits a cloud-related vulnerability to steal information from a cloud system, and the insider who uses cloud systems to carry out an attack on an employer's local resources. We also characterize a hierarchy of administrators within cloud service providers, give examples of attacks from real insider threat cases, and show how the nature of cloud systems architectures enables attacks to succeed. Finally, we discuss our position on future cloud research.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. The common notion of a cloud insider as a rogue administrator of a service provider is discussed, but we also present two additional cloudrelated insider risks: the insider who exploits a cloud-related vulnerability to steal information from a cloud system, and the insider who uses cloud systems to carry out an attack on an employer's local resources. We also characterize a hierarchy of administrators within cloud service providers, give examples of attacks from real insider threat cases, and show how the nature of cloud systems architectures enables attacks to succeed. Finally, we discuss our position on future cloud research.", "fno": "4736a387", "keywords": [ "Cloud Computing", "Security", "Servers", "Electronic Mail", "Companies", "Monitoring", "Security", "Insider", "Cloud" ], "authors": [ { "affiliation": null, "fullName": "William R Claycomb", "givenName": "William R", "surname": "Claycomb", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alex Nicoll", "givenName": "Alex", "surname": "Nicoll", "__typename": "ArticleAuthorType" } ], "idPrefix": "compsac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-07-01T00:00:00", "pubType": "proceedings", "pages": "387-394", "year": "2012", "issn": "0730-3157", "isbn": "978-1-4673-1990-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4736a380", "articleId": "12OmNARRYjb", "__typename": "AdjacentArticleType" }, "next": { "fno": "4736a395", "articleId": "12OmNBc1uys", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/trustcom/2012/4745/0/4745a857", "title": "Insider Attacks in Cloud Computing", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2012/4745a857/12OmNANkode", "parentPublication": { "id": "proceedings/trustcom/2012/4745/0", "title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/4525c412", "title": "Insider Threat Security Reference Architecture", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/4525c412/12OmNBigFoJ", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ias/2009/3744/1/3744a258", "title": "An Active Defense Model and Framework of Insider Threats Detection and Sense", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744a258/12OmNBqMDBs", "parentPublication": { "id": "proceedings/ias/2009/3744/1", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ias/2009/3744/2/3744b030", "title": "Research on Security Architecture for Defending Insider Threat", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744b030/12OmNBubOSV", "parentPublication": { "id": "proceedings/ias/2009/3744/2", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ucc/2012/4862/0/4862a215", "title": "Tackling Insider Threat in Cloud Relational Databases", "doi": null, "abstractUrl": "/proceedings-article/ucc/2012/4862a215/12OmNvk7K7f", "parentPublication": { "id": "proceedings/ucc/2012/4862/0", "title": "Utility and Cloud Computing, IEEE Internatonal Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a634", "title": "Towards Countermeasure of Insider Threat in Network Security", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a634/12OmNx5Yvqg", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2012/4525/0/4525c392", "title": "Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats", "doi": null, "abstractUrl": "/proceedings-article/hicss/2012/4525c392/12OmNxX3urL", "parentPublication": { "id": "proceedings/hicss/2012/4525/0", "title": "2012 45th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892b812", "title": "Introduction to Insider Threat Modeling, Detection, and Mitigation Minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892b812/12OmNzl3WRb", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2009/06/msp2009060014", "title": "Detecting Insider Theft of Trade Secrets", "doi": null, "abstractUrl": "/magazine/sp/2009/06/msp2009060014/13rRUxDqS6H", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2019/2558/0/255800a103", "title": "Cloud Computing: A Paradigm of More Insider Threats", "doi": null, "abstractUrl": "/proceedings-article/icise/2019/255800a103/1gysR9ZtkDS", "parentPublication": { "id": "proceedings/icise/2019/2558/0", "title": "2019 4th International Conference on Information Systems Engineering (ICISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzFMFoA", "title": "International Conference on Networking", "acronym": "icn", "groupId": "1001694", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNwIYZAw", "doi": "10.1109/ICN.2007.26", "title": "Automated Detection of Emerging Network Security Threats", "normalizedTitle": "Automated Detection of Emerging Network Security Threats", "abstract": "System and network security are significant challenges facing the Internet community today. Hi-tech crime is on the increase and is a threat to a budding online business environment. Reconnaissance technologies that enable the security community to keep abreast of new threats have been developed and deployed. These technologies monitor illegitimate Internet traffic but appropriate data analysis is required to identify new and emerging threats amongst the deluge of traffic that is illegitimate but known and understood. This paper presents an approach towards the automation of such an analysis process.", "abstracts": [ { "abstractType": "Regular", "content": "System and network security are significant challenges facing the Internet community today. Hi-tech crime is on the increase and is a threat to a budding online business environment. Reconnaissance technologies that enable the security community to keep abreast of new threats have been developed and deployed. These technologies monitor illegitimate Internet traffic but appropriate data analysis is required to identify new and emerging threats amongst the deluge of traffic that is illegitimate but known and understood. This paper presents an approach towards the automation of such an analysis process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "System and network security are significant challenges facing the Internet community today. Hi-tech crime is on the increase and is a threat to a budding online business environment. Reconnaissance technologies that enable the security community to keep abreast of new threats have been developed and deployed. These technologies monitor illegitimate Internet traffic but appropriate data analysis is required to identify new and emerging threats amongst the deluge of traffic that is illegitimate but known and understood. This paper presents an approach towards the automation of such an analysis process.", "fno": "28050098", "keywords": [ "Network Monitoring Network Management Network Security System Security Honey Net Honeypot" ], "authors": [ { "affiliation": "Loughborough University, UK", "fullName": "M.S. De-Silva", "givenName": "M.S.", "surname": "De-Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "Loughborough University, UK", "fullName": "D.J. Parish", "givenName": "D.J.", "surname": "Parish", "__typename": "ArticleAuthorType" }, { "affiliation": "Loughborough University, UK", "fullName": "P. Sandford", "givenName": "P.", "surname": "Sandford", "__typename": "ArticleAuthorType" }, { "affiliation": "Loughborough University, UK", "fullName": "J.M. Sandford", "givenName": "J.M.", "surname": "Sandford", "__typename": "ArticleAuthorType" } ], "idPrefix": "icn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-04-01T00:00:00", "pubType": "proceedings", "pages": "98", "year": "2007", "issn": null, "isbn": "0-7695-2805-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "28050096", "articleId": "12OmNyGtjmo", "__typename": "AdjacentArticleType" }, "next": { "fno": "28050099", "articleId": "12OmNx1qV1u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ncm/2008/3322/1/3322a510", "title": "Monitoring Unused IP Addresses on Segments Managed by DHCP", "doi": null, "abstractUrl": "/proceedings-article/ncm/2008/3322a510/12OmNArbG4p", "parentPublication": { "id": "proceedings/ncm/2008/3322/1", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997c096", "title": "Research on Network Security System Based on Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997c096/12OmNvlxJrK", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2016/4840/0/4840a267", "title": "A Security Threats Taxonomy for Routing System Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/cis/2016/4840a267/12OmNwIHoy9", "parentPublication": { "id": "proceedings/cis/2016/4840/0", "title": "2016 12th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icssa/2017/4808/0/6338a013", "title": "IoE Security Threats and You", "doi": null, "abstractUrl": "/proceedings-article/icssa/2017/6338a013/12OmNx19jWp", "parentPublication": { "id": "proceedings/icssa/2017/4808/0", "title": "2017 International Conference on Software Security and Assurance (ICSSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imf/2015/9902/0/07195812", "title": "Smart Home Definition and Security Threats", "doi": null, "abstractUrl": "/proceedings-article/imf/2015/07195812/12OmNy3iFl9", "parentPublication": { "id": "proceedings/imf/2015/9902/0", "title": "2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsr/2008/3135/0/3135a067", "title": "Analysis of Threats to the Security of EPC Networks", "doi": null, "abstractUrl": "/proceedings-article/cnsr/2008/3135a067/12OmNypIYDt", "parentPublication": { "id": "proceedings/cnsr/2008/3135/0", "title": "2008 6th Annual Communication Networks and Services Research Conference (CNSR '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2008/3099/0/3099b242", "title": "Security Threats on EPC Based RFID Systems", "doi": null, "abstractUrl": "/proceedings-article/itng/2008/3099b242/12OmNz4Bduk", "parentPublication": { "id": "proceedings/itng/2008/3099/0", "title": "2008 5th International Conference on Information Technology: New Generation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitcs/2014/6541/0/07021736", "title": "Analysing Different Threats Levels in NGN and Ensuring Its Security with Quality of Services", "doi": null, "abstractUrl": "/proceedings-article/icitcs/2014/07021736/12OmNz4SOx0", "parentPublication": { "id": "proceedings/icitcs/2014/6541/0", "title": "2014 International Conference on IT Convergence and Security (ICITCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccc/2019/2600/0/260000a152", "title": "Information Security: Definitions, Threats and Management in Dubai Hospitals Context", "doi": null, "abstractUrl": "/proceedings-article/ccc/2019/260000a152/1dPoDpiBMje", "parentPublication": { "id": "proceedings/ccc/2019/2600/0", "title": "2019 Cybersecurity and Cyberforensics Conference (CCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2019/2847/0/284700a026", "title": "IoT Smart Health Security Threats", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2019/284700a026/1dPoQjBuCGY", "parentPublication": { "id": "proceedings/iccsa/2019/2847/0", "title": "2019 19th International Conference on Computational Science and Its Applications (ICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMZ", "title": "2008 12th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNAle6lS", "doi": "10.1109/IV.2008.32", "title": "Voyage Analysis Applied to Geovisual Analytics", "normalizedTitle": "Voyage Analysis Applied to Geovisual Analytics", "abstract": "This paper demonstrates the synergy of common InfoVis and GeoVis interaction techniques and the logistic application domain demonstrated in the customized Visualize Performance Data (VISPER) application. In VISPER multi-dimensional, multi-source, time-varying and geospatial digital information from voyage analysis is represented to facilitate decision-making. Using common InfoVis components for multivariate data together with logistics visualization in a new synergy aids the users in their work examining ship and route performance. An evaluation of the usability was performed to gather insights for future development. The results from the evaluation show that the overall impression of VISPER was highly positive and participants enjoyed using it. Feedback obtained was highly valuable and directly applicable for improvements and further development.", "abstracts": [ { "abstractType": "Regular", "content": "This paper demonstrates the synergy of common InfoVis and GeoVis interaction techniques and the logistic application domain demonstrated in the customized Visualize Performance Data (VISPER) application. In VISPER multi-dimensional, multi-source, time-varying and geospatial digital information from voyage analysis is represented to facilitate decision-making. Using common InfoVis components for multivariate data together with logistics visualization in a new synergy aids the users in their work examining ship and route performance. An evaluation of the usability was performed to gather insights for future development. The results from the evaluation show that the overall impression of VISPER was highly positive and participants enjoyed using it. Feedback obtained was highly valuable and directly applicable for improvements and further development.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper demonstrates the synergy of common InfoVis and GeoVis interaction techniques and the logistic application domain demonstrated in the customized Visualize Performance Data (VISPER) application. In VISPER multi-dimensional, multi-source, time-varying and geospatial digital information from voyage analysis is represented to facilitate decision-making. Using common InfoVis components for multivariate data together with logistics visualization in a new synergy aids the users in their work examining ship and route performance. An evaluation of the usability was performed to gather insights for future development. The results from the evaluation show that the overall impression of VISPER was highly positive and participants enjoyed using it. Feedback obtained was highly valuable and directly applicable for improvements and further development.", "fno": "3268a381", "keywords": [ "Voyage Analysis", "Geovisual Analytics", "Visual Data Exploration And Analysis", "Usability Evaluation" ], "authors": [ { "affiliation": null, "fullName": "Patrik Lundblad", "givenName": "Patrik", "surname": "Lundblad", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mikael Jern", "givenName": "Mikael", "surname": "Jern", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Camilla Forsell", "givenName": "Camilla", "surname": "Forsell", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "381-388", "year": "2008", "issn": "1550-6037", "isbn": "978-0-7695-3268-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3268a373", "articleId": "12OmNrJROY1", "__typename": "AdjacentArticleType" }, "next": { "fno": "3268a391", "articleId": "12OmNx2zjwN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bdcat/2016/4617/0/6005a052", "title": "A Visual Analytics Approach to Author Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/bdcat/2016/6005a052/12OmNvjyxUp", "parentPublication": { "id": "proceedings/bdcat/2016/4617/0", "title": "2016 IEEE/ACM 3rd International Conference on Big Data Computing Applications and Technologies (BDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a379", "title": "Interactive Visualization of Weather and Ship Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a379/12OmNxj23dV", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/05/mcg2010050018", "title": "Guest Editors' Introduction: Multimedia Analytics", "doi": null, "abstractUrl": "/magazine/cg/2010/05/mcg2010050018/13rRUxCRFQg", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070030", "title": "Visual Analytics Support for Intelligence Analysis", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070030/13rRUxD9h0P", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805439", "title": "The Validity, Generalizability and Feasibility of Summative Evaluation Methods in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805439/1cG4DVd6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08423105", "title": "Commercial Visual Analytics Systems&#x2013;Advances in the Big Data Analytics Field", "doi": null, "abstractUrl": "/journal/tg/2019/10/08423105/1cYd7bZMLp6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006500", "title": "Dynamic Collaborative Visualization Ecosystem to Support the Analysis of Large-Scale Disparate Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006500/1hJstVDea2Y", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a061", "title": "TradAO: A Visual Analytics System for Trading Algorithm Optimization", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a061/1qROlzesM9O", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552436", "title": "TacticFlow: Visual Analytics of Ever-Changing Tactics in Racket Sports", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552436/1xibYczQBfW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a063", "title": "Visual Analytics to Support Industrial Vehicle Fleet Planning", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a063/1y4oKeqVIrK", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Ytt", "title": "2015 19th International Conference on Information Visualisation (iV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNBQ2VVu", "doi": "10.1109/iV.2015.34", "title": "Towards the Understanding of Interaction in Information Visualization", "normalizedTitle": "Towards the Understanding of Interaction in Information Visualization", "abstract": "Over the past few years the web has been responsible for the rise in popularity of visualizations and it seems that interactive or playable visualizations have become more popular and end up standing out more. The use of interactivity and animation has been extensively discussed in information visualization research, but there has been some controversy in relation to its benefits. Additionally, there is still little empirical evidence about its efficacy in terms of improving understanding of the data and there is few research that points out guidelines of how to incorporate it successfully and that proves that playable visualizations are indeed more enjoyable and popular among users. In order to guide future research on the actual benefits of interactivity in visualization it is important to understand what types of interactivity are currently being used in the field and to have a framework to help discuss and evaluate interaction techniques. After conducting an extensive review of popular visualizations and their interactive capabilities, we propose eleven categories of interaction techniques: filtering, selecting, abstract/elaborate, overview and explore, connect/relate, history, extraction of features, reconfigure, encode, participation/collaboration, and gamification.", "abstracts": [ { "abstractType": "Regular", "content": "Over the past few years the web has been responsible for the rise in popularity of visualizations and it seems that interactive or playable visualizations have become more popular and end up standing out more. The use of interactivity and animation has been extensively discussed in information visualization research, but there has been some controversy in relation to its benefits. Additionally, there is still little empirical evidence about its efficacy in terms of improving understanding of the data and there is few research that points out guidelines of how to incorporate it successfully and that proves that playable visualizations are indeed more enjoyable and popular among users. In order to guide future research on the actual benefits of interactivity in visualization it is important to understand what types of interactivity are currently being used in the field and to have a framework to help discuss and evaluate interaction techniques. After conducting an extensive review of popular visualizations and their interactive capabilities, we propose eleven categories of interaction techniques: filtering, selecting, abstract/elaborate, overview and explore, connect/relate, history, extraction of features, reconfigure, encode, participation/collaboration, and gamification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Over the past few years the web has been responsible for the rise in popularity of visualizations and it seems that interactive or playable visualizations have become more popular and end up standing out more. The use of interactivity and animation has been extensively discussed in information visualization research, but there has been some controversy in relation to its benefits. Additionally, there is still little empirical evidence about its efficacy in terms of improving understanding of the data and there is few research that points out guidelines of how to incorporate it successfully and that proves that playable visualizations are indeed more enjoyable and popular among users. In order to guide future research on the actual benefits of interactivity in visualization it is important to understand what types of interactivity are currently being used in the field and to have a framework to help discuss and evaluate interaction techniques. After conducting an extensive review of popular visualizations and their interactive capabilities, we propose eleven categories of interaction techniques: filtering, selecting, abstract/elaborate, overview and explore, connect/relate, history, extraction of features, reconfigure, encode, participation/collaboration, and gamification.", "fno": "7568a140", "keywords": [ "Data Visualization", "Taxonomy", "Feature Extraction", "Visualization", "History", "Complexity Theory", "Cognition", "Taxonomy", "Visualization", "Interaction" ], "authors": [ { "affiliation": null, "fullName": "Ana Figueiras", "givenName": "Ana", "surname": "Figueiras", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-07-01T00:00:00", "pubType": "proceedings", "pages": "140-147", "year": "2015", "issn": "1550-6037", "isbn": "978-1-4673-7568-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7568a133", "articleId": "12OmNscOUa1", "__typename": "AdjacentArticleType" }, "next": { "fno": "7568a148", "articleId": "12OmNzBOi4c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718471", "title": "Purposeful Visualization", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718471/12OmNs5rl2f", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a203", "title": "Promoting Insight: A Case Study of How to Incorporate Interaction in Existing Data Visualizations", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a203/12OmNx7G68T", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192637", "title": "Suggested Interactivity: Seeking Perceived Affordances for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192637/13rRUEgs2tt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/06/mcg2012060088", "title": "Understanding Visualization by Understanding Individual Users", "doi": null, "abstractUrl": "/magazine/cg/2012/06/mcg2012060088/13rRUNvya3t", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539348", "title": "The Attraction Effect in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539348/13rRUwj7cpe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1224", "title": "Toward a Deeper Understanding of the Role of Interaction in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1224/13rRUxD9gXy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/06/07018997", "title": "Query2Question: Translating Visualization Interaction into Natural Language", "doi": null, "abstractUrl": "/journal/tg/2015/06/07018997/13rRUy0HYRr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539578", "title": "Vol2velle: Printable Interactive Volume Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539578/13rRUyuNsx2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273892", "title": "Algorithm Visualization Environments: Degree of interactivity as an influence on student-learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273892/1phRyyC7pQs", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a146", "title": "There and then: interacting with spatio-temporal visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a146/1rSRdlZZM0U", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxYbSWl", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqdr33", "doi": "10.1109/PACIFICVIS.2010.5429617", "title": "Advanced interaction for Information Visualization", "normalizedTitle": "Advanced interaction for Information Visualization", "abstract": "Summary form only given. Information Visualization (InfoVis) is a research field dedicated to the design and evaluation of visual representations and interactions to explore and understand large data set. Until recently, the focus of InfoVis has been more on the graphical representation and less on the interaction. However, several new interactive techniques have been published in the past few years, opening perspectives for InfoVis and HCI practitioners. I describe the work conducted at our group, AVIZ, linking traditional HCI interaction research with InfoVis interaction research. I present our latest techniques for navigating large information spaces with varying dimensionalities and topologies. I outline their applicability in HCI problems that are not traditionally viewed as InfoVis in the hope that they will be experimented and adopted in standard interfaces and, more importantly, to emphasize the fact that interaction design for large information spaces is required for our complex specialized applications as well as our everyday working environment.", "abstracts": [ { "abstractType": "Regular", "content": "Summary form only given. Information Visualization (InfoVis) is a research field dedicated to the design and evaluation of visual representations and interactions to explore and understand large data set. Until recently, the focus of InfoVis has been more on the graphical representation and less on the interaction. However, several new interactive techniques have been published in the past few years, opening perspectives for InfoVis and HCI practitioners. I describe the work conducted at our group, AVIZ, linking traditional HCI interaction research with InfoVis interaction research. I present our latest techniques for navigating large information spaces with varying dimensionalities and topologies. I outline their applicability in HCI problems that are not traditionally viewed as InfoVis in the hope that they will be experimented and adopted in standard interfaces and, more importantly, to emphasize the fact that interaction design for large information spaces is required for our complex specialized applications as well as our everyday working environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Summary form only given. Information Visualization (InfoVis) is a research field dedicated to the design and evaluation of visual representations and interactions to explore and understand large data set. Until recently, the focus of InfoVis has been more on the graphical representation and less on the interaction. However, several new interactive techniques have been published in the past few years, opening perspectives for InfoVis and HCI practitioners. I describe the work conducted at our group, AVIZ, linking traditional HCI interaction research with InfoVis interaction research. I present our latest techniques for navigating large information spaces with varying dimensionalities and topologies. I outline their applicability in HCI problems that are not traditionally viewed as InfoVis in the hope that they will be experimented and adopted in standard interfaces and, more importantly, to emphasize the fact that interaction design for large information spaces is required for our complex specialized applications as well as our everyday working environment.", "fno": "05429617", "keywords": [ "Data Visualisation", "Human Computer Interaction", "Interactive Systems", "Information Visualization", "Visual Representations", "Graphical Representation", "Interactive Techniques", "HCI Practitioners", "AVIZ", "HCI Interaction Research", "Info Vis Interaction Research", "Interaction Design" ], "authors": [ { "affiliation": "INRIA, France", "fullName": "Jean-Daniel Fekete", "givenName": "Jean-Daniel", "surname": "Fekete", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2010", "issn": "2165-8765", "isbn": "978-1-4244-6685-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05429616", "articleId": "12OmNBUS732", "__typename": "AdjacentArticleType" }, "next": { "fno": "05429623", "articleId": "12OmNwx3Qch", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNClQ0o4", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGRGdF", "doi": "10.1109/CVPRW.2010.5543161", "title": "Immersive and perceptual human-computer interaction using computer vision techniques", "normalizedTitle": "Immersive and perceptual human-computer interaction using computer vision techniques", "abstract": "Computer vision techniques have been widely applied to immersive and perceptual human-computer interaction for applications like computer gaming, education, and entertainment. In this paper, relevant techniques are surveyed in terms of image capturing, normalization, motion detection, tracking, feature representation and recognition. In addition, applications of vision techniques in HCI in computer gaming are also summarized in several categories including vision enabled pointing and positioning, vision for manipulating objects, training and education, and miscellaneous applications. The characteristics of existing work are analyzed and discussed, along with corresponding challenges and future research directions proposed.", "abstracts": [ { "abstractType": "Regular", "content": "Computer vision techniques have been widely applied to immersive and perceptual human-computer interaction for applications like computer gaming, education, and entertainment. In this paper, relevant techniques are surveyed in terms of image capturing, normalization, motion detection, tracking, feature representation and recognition. In addition, applications of vision techniques in HCI in computer gaming are also summarized in several categories including vision enabled pointing and positioning, vision for manipulating objects, training and education, and miscellaneous applications. The characteristics of existing work are analyzed and discussed, along with corresponding challenges and future research directions proposed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Computer vision techniques have been widely applied to immersive and perceptual human-computer interaction for applications like computer gaming, education, and entertainment. In this paper, relevant techniques are surveyed in terms of image capturing, normalization, motion detection, tracking, feature representation and recognition. In addition, applications of vision techniques in HCI in computer gaming are also summarized in several categories including vision enabled pointing and positioning, vision for manipulating objects, training and education, and miscellaneous applications. The characteristics of existing work are analyzed and discussed, along with corresponding challenges and future research directions proposed.", "fno": "05543161", "keywords": [ "Computer Vision", "Feature Extraction", "Human Computer Interaction", "Object Recognition", "Perceptual Human Computer Interaction", "Computer Vision Techniques", "Computer Gaming", "Image Capturing", "Motion Detection", "Feature Representation", "Feature Recognition", "Computer Vision", "Application Software", "Human Computer Interaction", "Face Recognition", "Computer Applications", "Tracking", "User Interfaces", "Computer Science Education", "Motion Detection", "Image Recognition" ], "authors": [ { "affiliation": "School of Informatics, University of Bradford, UK", "fullName": "Jinchang Ren", "givenName": "Jinchang", "surname": "Ren", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of AudioVisual Arts, Ionian University, Corfu, GREECE", "fullName": "Theodore Vlachos", "givenName": "Theodore", "surname": "Vlachos", "__typename": "ArticleAuthorType" }, { "affiliation": "Digital Imaging Research Centre, Kingston University, Surrey, UK", "fullName": "Vasileios Argyriou", "givenName": "Vasileios", "surname": "Argyriou", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "66-72", "year": "2010", "issn": "2160-7508", "isbn": "978-1-4244-7029-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05543152", "articleId": "12OmNAYGluD", "__typename": "AdjacentArticleType" }, "next": { "fno": "05543160", "articleId": "12OmNqIQSjL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mmedia/2009/3693/0/3693a146", "title": "Computer Vision Method in Music Interaction", "doi": null, "abstractUrl": "/proceedings-article/mmedia/2009/3693a146/12OmNAnMuzX", "parentPublication": { "id": "proceedings/mmedia/2009/3693/0", "title": "Advances in Multimedia, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2009/3963/0/3963a064", "title": "Design and Implementation of a Flexible Hand Gesture Command Interface for Games Based on Computer Vision", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2009/3963a064/12OmNqNG3gI", "parentPublication": { "id": "proceedings/sbgames/2009/3963/0", "title": "2009 VIII Brazilian Symposium on Games and Digital Entertainment", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a708", "title": "The Study of the Input Tool Based on Computer Vision", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a708/12OmNwwd2HH", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mnrao/1994/6435/0/00346260", "title": "DigitEyes: vision-based hand tracking for human-computer interaction", "doi": null, "abstractUrl": "/proceedings-article/mnrao/1994/00346260/12OmNx5Yv6a", "parentPublication": { "id": "proceedings/mnrao/1994/6435/0", "title": "Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2010/4062/0/4062a237", "title": "A Real Time Vision-Based Hand Gesture Interaction", "doi": null, "abstractUrl": "/proceedings-article/ams/2010/4062a237/12OmNxE2mHJ", "parentPublication": { "id": "proceedings/ams/2010/4062/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2007/1016/0/04284743", "title": "Improving Human Computer Interaction Through Embedded Vision Technology", "doi": null, "abstractUrl": "/proceedings-article/icme/2007/04284743/12OmNzBOi2T", "parentPublication": { "id": "proceedings/icme/2007/1016/0", "title": "2007 International Conference on Multimedia & Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2010/6846/0/05444702", "title": "Robust vision-based hand tracking using single camera for ubiquitous 3D gesture interaction", "doi": null, "abstractUrl": "/proceedings-article/3dui/2010/05444702/12OmNzCWG2m", "parentPublication": { "id": "proceedings/3dui/2010/6846/0", "title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bwcca/2010/4236/0/05633811", "title": "Fingertip-Writing Alphanumeric Character Recognition for Vision-Based Human Computer Interaction", "doi": null, "abstractUrl": "/proceedings-article/bwcca/2010/05633811/183rAfI3UZi", "parentPublication": { "id": "proceedings/bwcca/2010/4236/0", "title": "2010 International Conference on Broadband, Wireless Computing, Communication and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2020/2261/0/226100a382", "title": "Research on the application of new generation of Human-computer interaction in education", "doi": null, "abstractUrl": "/proceedings-article/icise/2020/226100a382/1tnYe0Vqnuw", "parentPublication": { "id": "proceedings/icise/2020/2261/0", "title": "2020 International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300b667", "title": "Vision-based Hand Gesture Recognition for Human-Computer Interaction using MobileNetV2", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300b667/1wLcfAcC5tm", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMEOBcvvVe", "title": "2019 23rd International Conference in Information Visualization – Part II", "acronym": "iv-2", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMEQuDCbq8", "doi": "10.1109/IV-2.2019.00019", "title": "A Card-Based Interaction to Design Visualizations in Augmented Reality Environments", "normalizedTitle": "A Card-Based Interaction to Design Visualizations in Augmented Reality Environments", "abstract": "The use of objects for generating virtual content is increasingly present in the daily life of computer user. This form of interaction, called tangible interfaces, generates ways of visualizing data in different ways, such as Augmented Reality, which with the help of a given marker can present the user with a specific content. Thus, this work aims to demonstrate a prototype, which through cards as tangible objects, create, manipulate and interact with visualization techniques. Presenting the architecture developed for the development of the prototype, as well as the interaction approach according to the tasks of InfoVis. The prototype also seeks to offer collaboration among users, diversifying and facilitating learning about concepts and InfoVis.", "abstracts": [ { "abstractType": "Regular", "content": "The use of objects for generating virtual content is increasingly present in the daily life of computer user. This form of interaction, called tangible interfaces, generates ways of visualizing data in different ways, such as Augmented Reality, which with the help of a given marker can present the user with a specific content. Thus, this work aims to demonstrate a prototype, which through cards as tangible objects, create, manipulate and interact with visualization techniques. Presenting the architecture developed for the development of the prototype, as well as the interaction approach according to the tasks of InfoVis. The prototype also seeks to offer collaboration among users, diversifying and facilitating learning about concepts and InfoVis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of objects for generating virtual content is increasingly present in the daily life of computer user. This form of interaction, called tangible interfaces, generates ways of visualizing data in different ways, such as Augmented Reality, which with the help of a given marker can present the user with a specific content. Thus, this work aims to demonstrate a prototype, which through cards as tangible objects, create, manipulate and interact with visualization techniques. Presenting the architecture developed for the development of the prototype, as well as the interaction approach according to the tasks of InfoVis. The prototype also seeks to offer collaboration among users, diversifying and facilitating learning about concepts and InfoVis.", "fno": "285000a052", "keywords": [ "Augmented Reality", "Human Computer Interaction", "Tangible Objects", "Visualization Techniques", "Card Based Interaction", "Augmented Reality Environments", "Virtual Content", "Computer User", "Tangible Interfaces", "Info Vis", "Data Visualization", "Visualization", "Prototypes", "Augmented Reality", "Task Analysis", "Games", "Tools", "Tangible Objects Information Visualization Augmented Reality Collaborative Environments" ], "authors": [ { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Iuri Victor Costa", "givenName": "Iuri", "surname": "Victor Costa", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Vinicius Favacho Queiroz", "givenName": "Vinicius", "surname": "Favacho Queiroz", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Brunelli Pinto Miranda", "givenName": "Brunelli", "surname": "Pinto Miranda", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Alexandre Abreu de Freitas", "givenName": "Alexandre", "surname": "Abreu de Freitas", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Carlos Gustavo Resque dos Santos", "givenName": "Carlos", "surname": "Gustavo Resque dos Santos", "__typename": "ArticleAuthorType" }, { "affiliation": "Laboratory of Visualization, Interaction and Intelligent Systems (LABVIS), Federal University Of Para (UFPA)", "fullName": "Bianchi Serique Meiguins", "givenName": "Bianchi", "surname": "Serique Meiguins", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv-2", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "52-55", "year": "2019", "issn": null, "isbn": "978-1-7281-2850-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "285000a047", "articleId": "1cMEQhsYecw", "__typename": "AdjacentArticleType" }, "next": { "fno": "285000a056", "articleId": "1cMEPB7kF1K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2004/8788/0/87880235", "title": "Augmented Reality with Tangible Auto-Fabricated Models for Molecular Biology Applications", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880235/12OmNANkoe2", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836480", "title": "3D Character Customization for Non-Professional Users in Handheld Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836480/12OmNAq3hzL", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948456", "title": "[Poster] QR code alteration for augmented reality interactions", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948456/12OmNCga1QG", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2010/9343/0/05643593", "title": "Augmented reality for board games", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643593/12OmNxj23c6", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dvis/2014/6826/0/07160099", "title": "Spatial augmented reality — A tool for 3D data visualization", "doi": null, "abstractUrl": "/proceedings-article/3dvis/2014/07160099/12OmNxxvAN7", "parentPublication": { "id": "proceedings/3dvis/2014/6826/0", "title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2011/0774/0/05959577", "title": "Glove-Based Sensor Support for Dynamic Tangible Buttons in Spatial Augmented Reality Design Environments", "doi": null, "abstractUrl": "/proceedings-article/iswc/2011/05959577/12OmNzuIjpK", "parentPublication": { "id": "proceedings/iswc/2011/0774/0", "title": "2011 15th Annual International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/03/08636208", "title": "Augmented Reality Graph Visualizations", "doi": null, "abstractUrl": "/magazine/cg/2019/03/08636208/17D45VsBTUT", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904446", "title": "Exploring Interactions with Printed Data Visualizations in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904446/1H0GdhG1Ef6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2019/4528/0/09069366", "title": "Grey Island: Immersive tangible interaction through augmented reality", "doi": null, "abstractUrl": "/proceedings-article/dsc/2019/09069366/1jdCYiSUwBG", "parentPublication": { "id": "proceedings/dsc/2019/4528/0", "title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2020/4246/0/09350321", "title": "Professional Information Visualization Using Augmented Reality; AR Visiting Card", "doi": null, "abstractUrl": "/proceedings-article/sti/2020/09350321/1rgGs3ZoXL2", "parentPublication": { "id": "proceedings/sti/2020/4246/0", "title": "2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWcH0g", "title": "2012 IEEE 14th International Conference on Commerce and Enterprise Computing", "acronym": "cec", "groupId": "1002843", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvdh", "doi": "10.1109/CEC.2012.15", "title": "Behavioral Analysis of Registered Web Site Visitors with Help of Mouse Tracking", "normalizedTitle": "Behavioral Analysis of Registered Web Site Visitors with Help of Mouse Tracking", "abstract": "We present a method to extract implicit data of registered users of a web site with the help of mouse tracking. This allows us to generate more accurate interest profiles of visitors of a web site and to obtain a solid basis for the calculation of user interests or trend detection in the Web. On the one hand, web site owners have the opportunity to adjust their sites to the interests of their users. On the other hand, they can detect new trends and expand these topics on their web pages accordingly.", "abstracts": [ { "abstractType": "Regular", "content": "We present a method to extract implicit data of registered users of a web site with the help of mouse tracking. This allows us to generate more accurate interest profiles of visitors of a web site and to obtain a solid basis for the calculation of user interests or trend detection in the Web. On the one hand, web site owners have the opportunity to adjust their sites to the interests of their users. On the other hand, they can detect new trends and expand these topics on their web pages accordingly.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a method to extract implicit data of registered users of a web site with the help of mouse tracking. This allows us to generate more accurate interest profiles of visitors of a web site and to obtain a solid basis for the calculation of user interests or trend detection in the Web. On the one hand, web site owners have the opportunity to adjust their sites to the interests of their users. On the other hand, they can detect new trends and expand these topics on their web pages accordingly.", "fno": "4857a033", "keywords": [ "Mice", "Browsers", "Web Pages", "Market Research", "Tracking", "Standards", "Data Acquisition", "Computer Aided Analysis", "World Wide Web", "Data Analysis" ], "authors": [ { "affiliation": null, "fullName": "Clemens Schefels", "givenName": "Clemens", "surname": "Schefels", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sven Eschenberg", "givenName": "Sven", "surname": "Eschenberg", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christian Schoneberger", "givenName": "Christian", "surname": "Schoneberger", "__typename": "ArticleAuthorType" } ], "idPrefix": "cec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-09-01T00:00:00", "pubType": "proceedings", "pages": "33-40", "year": "2012", "issn": null, "isbn": "978-1-4673-6246-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4857a026", "articleId": "12OmNAZOK1h", "__typename": "AdjacentArticleType" }, "next": { "fno": "4857a041", "articleId": "12OmNyuy9Wb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsme/2017/0992/0/0992a024", "title": "Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a024/12OmNBlXs94", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/04061395", "title": "Improving Web Site Content Using a Concept-Based Knowledge Discovery Process", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/04061395/12OmNwl8GEX", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fosm/2008/2654/0/04659251", "title": "Frontiers of Web site evolution", "doi": null, "abstractUrl": "/proceedings-article/fosm/2008/04659251/12OmNxVlTIK", "parentPublication": { "id": "proceedings/fosm/2008/2654/0", "title": "2008 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wse/2002/1804/0/18040053", "title": "Understanding Web Usage for Dynamic Web-Site Adaptation: A Case Study", "doi": null, "abstractUrl": "/proceedings-article/wse/2002/18040053/12OmNyaGeLN", "parentPublication": { "id": "proceedings/wse/2002/1804/0", "title": "Proceedings. Fourth International Workshop on Web Site Evolution", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwssd/1998/8439/0/84390008", "title": "Towards a Software Engineering Approach to Web Site Development", "doi": null, "abstractUrl": "/proceedings-article/iwssd/1998/84390008/12OmNywxlTY", "parentPublication": { "id": "proceedings/iwssd/1998/8439/0", "title": "Software Specification and Design, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisew/2002/1813/0/18130232", "title": "Mining Web Logs for Personalized Site Maps", "doi": null, "abstractUrl": "/proceedings-article/wisew/2002/18130232/12OmNz6iOsu", "parentPublication": { "id": "proceedings/wisew/2002/1813/0", "title": "Web Information Systems Engineering Workshops, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2001/1165/0/11650511", "title": "Connectionist Approach for Website Visitors Behaviors Mining", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2001/11650511/12OmNzZmZDd", "parentPublication": { "id": "proceedings/aiccsa/2001/1165/0", "title": "Proceedings ACS/IEEE International Conference on Computer Systems and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2019/02/08105894", "title": "Gray Computing: A Framework for Computing with Background JavaScript Tasks", "doi": null, "abstractUrl": "/journal/ts/2019/02/08105894/17D45WwsQ5S", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006402", "title": "Ad Blocking Whitelist Prediction for Online Publishers", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006402/1hJrS50MEqQ", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2021/0424/0/09430861", "title": "Demo: Using Smartphone and Optical Mouse to Enhance Web Interaction", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2021/09430861/1tRORMofJ4c", "parentPublication": { "id": "proceedings/percom-workshops/2021/0424/0", "title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCf1Dp1", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNBgz4zm", "doi": "10.1109/VISUAL.2002.1183827", "title": "Case Study on the Adaptation of Interactive Visualization Applications to Web-Based Production for Operational Mesoscale Weather Models", "normalizedTitle": "Case Study on the Adaptation of Interactive Visualization Applications to Web-Based Production for Operational Mesoscale Weather Models", "abstract": "Visualization is required for the effective utilization of data from a weather simulation. Appropriate mapping of user goals to the design of pictorial content has been useful in the development of interactive applications with sufficient bandwidth for timely access to the model data. When remote access to the model visualizations is required the limited bandwidth becomes the primary bottleneck. To help address these problems, visualizations are presented on a web page as a meta-representation of the model output and serve as an index to simplify finding other visualizations of relevance. To provide consistency with extant interactive products and to leverage their cost of development, the aforementioned applications are adapted to automatically populate a web site with images and interactions for an operational weather forecasting system.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization is required for the effective utilization of data from a weather simulation. Appropriate mapping of user goals to the design of pictorial content has been useful in the development of interactive applications with sufficient bandwidth for timely access to the model data. When remote access to the model visualizations is required the limited bandwidth becomes the primary bottleneck. To help address these problems, visualizations are presented on a web page as a meta-representation of the model output and serve as an index to simplify finding other visualizations of relevance. To provide consistency with extant interactive products and to leverage their cost of development, the aforementioned applications are adapted to automatically populate a web site with images and interactions for an operational weather forecasting system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization is required for the effective utilization of data from a weather simulation. Appropriate mapping of user goals to the design of pictorial content has been useful in the development of interactive applications with sufficient bandwidth for timely access to the model data. When remote access to the model visualizations is required the limited bandwidth becomes the primary bottleneck. To help address these problems, visualizations are presented on a web page as a meta-representation of the model output and serve as an index to simplify finding other visualizations of relevance. To provide consistency with extant interactive products and to leverage their cost of development, the aforementioned applications are adapted to automatically populate a web site with images and interactions for an operational weather forecasting system.", "fno": "7498treinish", "keywords": [ "Visualization", "Meteorology", "World Wide Web" ], "authors": [ { "affiliation": "IBM T. J. Watson Research Center", "fullName": "Lloyd A. Treinish", "givenName": "Lloyd A.", "surname": "Treinish", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-10-01T00:00:00", "pubType": "proceedings", "pages": "null", "year": "2002", "issn": "1070-2385", "isbn": "0-7803-7498-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7498gregorsk", "articleId": "12OmNyQGSjm", "__typename": "AdjacentArticleType" }, "next": { "fno": "7498lowekamp", "articleId": "12OmNzVoBzw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2011/0868/0/06004059", "title": "Exploratory Visualization for Weather Data Verification", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004059/12OmNAYXWEh", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1998/9176/0/91760405", "title": "Task-Specific Visualization Design: A Case Study in Operational Weather Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760405/12OmNxXUhRq", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571250", "title": "Swedish Road Weather Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571250/12OmNxeut7K", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780065", "title": "Multi-Resolution Visualization Techniques for Nested Weather Models", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780065/12OmNzwpUr8", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2005/06/c6012", "title": "Service-Oriented Environments for Dynamically Interacting with Mesoscale Weather", "doi": null, "abstractUrl": "/magazine/cs/2005/06/c6012/13rRUNvgyZn", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061205", "title": "VisGets: Coordinated Visualizations for Web-based Information Exploration and Discovery", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061205/13rRUNvgziw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1121", "title": "ManyEyes: a Site for Visualization at Internet Scale", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1121/13rRUwI5UfW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192710", "title": "Visually Comparing Weather Features in Forecasts", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192710/13rRUxly95E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440052", "title": "An Interactive Framework for Visualization of Weather Forecast Ensembles", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440052/17D45XDIXW9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/09756301", "title": "Multiple Adverse Weather Conditions Adaptation for Object Detection via Causal Intervention", "doi": null, "abstractUrl": "/journal/tp/5555/01/09756301/1CvQcy47a4o", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvDI3MS", "title": "Proceedings 3rd International Workshop on Web Site Evolution. WSE 2001", "acronym": "wse", "groupId": "1000813", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNC4eSmC", "doi": "10.1109/WSE.2001.988787", "title": "Evolution of an organizational Web site: migrating to XML/XSL", "normalizedTitle": "Evolution of an organizational Web site: migrating to XML/XSL", "abstract": "With the advent of the World Wide Web, many organizational Web sites were initially created by a group of individuals who were interested in this new technology. These people were (and still are) often referred to as Webmasters and designed,the pages according to their taste and picked the information that they found important. Many sites were built without a systematic approach or consideration for future requirements. As the World Wide Web increased in importance, many of these Web sites grew, in an ad-hoc fashion and they became increasingly difficult to manage. Today, Web site design and management are further complicated by new emerging requirements such as multi-lingual and mobile device support. In this paper, we first discuss the evolution of an organizational Web site, give a brief overview of the site's history and discuss the problems the organization faced. We then present some of our experiences and lessons learned in re-engineering the site from HTML to XML/XSL. Many Web sites will have to make similar transitions once the XML/XSL standards firmly establish themselves as the Web technologies of choice. One of the goals of this paper is that other organizations should be able to benefit from our experiences.", "abstracts": [ { "abstractType": "Regular", "content": "With the advent of the World Wide Web, many organizational Web sites were initially created by a group of individuals who were interested in this new technology. These people were (and still are) often referred to as Webmasters and designed,the pages according to their taste and picked the information that they found important. Many sites were built without a systematic approach or consideration for future requirements. As the World Wide Web increased in importance, many of these Web sites grew, in an ad-hoc fashion and they became increasingly difficult to manage. Today, Web site design and management are further complicated by new emerging requirements such as multi-lingual and mobile device support. In this paper, we first discuss the evolution of an organizational Web site, give a brief overview of the site's history and discuss the problems the organization faced. We then present some of our experiences and lessons learned in re-engineering the site from HTML to XML/XSL. Many Web sites will have to make similar transitions once the XML/XSL standards firmly establish themselves as the Web technologies of choice. One of the goals of this paper is that other organizations should be able to benefit from our experiences.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the advent of the World Wide Web, many organizational Web sites were initially created by a group of individuals who were interested in this new technology. These people were (and still are) often referred to as Webmasters and designed,the pages according to their taste and picked the information that they found important. Many sites were built without a systematic approach or consideration for future requirements. As the World Wide Web increased in importance, many of these Web sites grew, in an ad-hoc fashion and they became increasingly difficult to manage. Today, Web site design and management are further complicated by new emerging requirements such as multi-lingual and mobile device support. In this paper, we first discuss the evolution of an organizational Web site, give a brief overview of the site's history and discuss the problems the organization faced. We then present some of our experiences and lessons learned in re-engineering the site from HTML to XML/XSL. Many Web sites will have to make similar transitions once the XML/XSL standards firmly establish themselves as the Web technologies of choice. One of the goals of this paper is that other organizations should be able to benefit from our experiences.", "fno": "00988787", "keywords": [ "XML", "Organizations", "Web Sites", "Web Page Design", "HTML", "World Wide Web", "Web Design", "History", "Graphics", "Layout" ], "authors": [ { "affiliation": "Distributed Syst. Group, Tech. Univ. of Vienna, Austria", "fullName": "E. Kirda", "givenName": "E.", "surname": "Kirda", "__typename": "ArticleAuthorType" }, { "affiliation": "Distributed Syst. Group, Tech. Univ. of Vienna, Austria", "fullName": "C. Kerer", "givenName": "C.", "surname": "Kerer", "__typename": "ArticleAuthorType" }, { "affiliation": "Distributed Syst. Group, Tech. Univ. of Vienna, Austria", "fullName": "M. Jazayeri", "givenName": "M.", "surname": "Jazayeri", "__typename": "ArticleAuthorType" }, { "affiliation": "Distributed Syst. Group, Tech. Univ. of Vienna, Austria", "fullName": "H. Gall", "givenName": "H.", "surname": "Gall", "__typename": "ArticleAuthorType" }, { "affiliation": "Distributed Syst. Group, Tech. Univ. of Vienna, Austria", "fullName": "R. Kurmanowytsch", "givenName": "R.", "surname": "Kurmanowytsch", "__typename": "ArticleAuthorType" } ], "idPrefix": "wse", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-01-01T00:00:00", "pubType": "proceedings", "pages": "62-69", "year": "2001", "issn": null, "isbn": "0-7695-1399-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00988778", "articleId": "12OmNxG1yRf", "__typename": "AdjacentArticleType" }, "next": { "fno": "1399vii", "articleId": "12OmNyGbIgB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxYbSWl", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgJe5z", "doi": "10.1109/PACIFICVIS.2010.5429593", "title": "Graph visualization techniques for conceptual Web site traffic analysis", "normalizedTitle": "Graph visualization techniques for conceptual Web site traffic analysis", "abstract": "Systems that support Web site traffic analysis are core business intelligence applications for many companies. Recent papers remark that these systems are especially useful if they measure the users' interest into the relevant concepts described in a Web site rather than counting users' accesses to the distinct pages forming the Web site. This paper extends existing measures of conceptual Web site traffic analysis and describes a system, called COWA, that supports this analysis by means of network models and graph visualization technologies. The graph drawing algorithmic core of the user interface of COWA is a force directed heuristic that computes a simultaneous embedding of two non-planar graphs. This heuristic optimizes the visualizations in terms of crossing resolution and user's geodesic tendency. Experimental results and case studies show the effectiveness of the proposed approach in practice.", "abstracts": [ { "abstractType": "Regular", "content": "Systems that support Web site traffic analysis are core business intelligence applications for many companies. Recent papers remark that these systems are especially useful if they measure the users' interest into the relevant concepts described in a Web site rather than counting users' accesses to the distinct pages forming the Web site. This paper extends existing measures of conceptual Web site traffic analysis and describes a system, called COWA, that supports this analysis by means of network models and graph visualization technologies. The graph drawing algorithmic core of the user interface of COWA is a force directed heuristic that computes a simultaneous embedding of two non-planar graphs. This heuristic optimizes the visualizations in terms of crossing resolution and user's geodesic tendency. Experimental results and case studies show the effectiveness of the proposed approach in practice.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Systems that support Web site traffic analysis are core business intelligence applications for many companies. Recent papers remark that these systems are especially useful if they measure the users' interest into the relevant concepts described in a Web site rather than counting users' accesses to the distinct pages forming the Web site. This paper extends existing measures of conceptual Web site traffic analysis and describes a system, called COWA, that supports this analysis by means of network models and graph visualization technologies. The graph drawing algorithmic core of the user interface of COWA is a force directed heuristic that computes a simultaneous embedding of two non-planar graphs. This heuristic optimizes the visualizations in terms of crossing resolution and user's geodesic tendency. Experimental results and case studies show the effectiveness of the proposed approach in practice.", "fno": "05429593", "keywords": [ "Competitive Intelligence", "Data Mining", "Data Visualisation", "Graph Theory", "User Interfaces", "Web Sites", "Graph Visualization Techniques", "Conceptual Web Site Traffic Analysis", "Business Intelligence", "COWA", "Graph Drawing Algorithmic Core", "User Interface", "Nonplanar Graphs", "Web Data Mining", "Visualization", "Computer Interfaces", "Management Information Systems", "Information Retrieval", "Companies", "Traffic Control", "Geophysics Computing", "Data Mining", "Communication Channels", "Uniform Resource Locators", "Graph Drawing", "Visual Analytics", "Web Data Mining", "Web Traffic Analysis" ], "authors": [ { "affiliation": "Universit à degli Studi di Perugia, Dipartimento di Ingegneria Elettronica e dell'Informazione, Italy", "fullName": "Walter Didimo", "givenName": "Walter", "surname": "Didimo", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit à degli Studi di Perugia, Dipartimento di Ingegneria Elettronica e dell'Informazione, Italy", "fullName": "Giuseppe Liotta", "givenName": "Giuseppe", "surname": "Liotta", "__typename": "ArticleAuthorType" }, { "affiliation": "Universit à degli Studi di Perugia, Dipartimento di Ingegneria Elettronica e dell'Informazione, Italy", "fullName": "Salvatore Agostino Romeo", "givenName": "Salvatore Agostino", "surname": "Romeo", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2010", "issn": "2165-8765", "isbn": "978-1-4244-6685-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05429592", "articleId": "12OmNyqzM3q", "__typename": "AdjacentArticleType" }, "next": { "fno": "05429590", "articleId": "12OmNxxdZE9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07846948", "title": "DomXssMicro: A Micro Benchmark for Evaluating DOM-Based Cross-Site Scripting Detection", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07846948/12OmNAlvHsR", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-css-icess/2014/6123/0/07056839", "title": "Machine Learning Based Cross-Site Scripting Detection in Online Social Network", "doi": null, "abstractUrl": "/proceedings-article/hpcc-css-icess/2014/07056839/12OmNAoUTqE", "parentPublication": { "id": "proceedings/hpcc-css-icess/2014/6123/0", "title": "2014 IEEE International Conference on High Performance Computing and Communications (HPCC), 2014 IEEE 6th International Symposium on Cyberspace Safety and Security (CSS) and 2014 IEEE 11th International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imsccs/2007/3039/0/30390398", "title": "Risk mitigation for cross site scripting attacks using signature based model on the server side", "doi": null, "abstractUrl": "/proceedings-article/imsccs/2007/30390398/12OmNBEYzNH", "parentPublication": { "id": "proceedings/imsccs/2007/3039/0", "title": "2007 Second International Multisymposium on Computer and Computational Sciences - IMSCCS '07", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2015/7287/0/7287a389", "title": "UniCrawl: A Practical Geographically Distributed Web Crawler", "doi": null, "abstractUrl": "/proceedings-article/cloud/2015/7287a389/12OmNBigFly", "parentPublication": { "id": "proceedings/cloud/2015/7287/0", "title": "2015 IEEE 8th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2017/0992/0/0992a024", "title": "Detecting DOM-Sourced Cross-Site Scripting in Browser Extensions", "doi": null, "abstractUrl": "/proceedings-article/icsme/2017/0992a024/12OmNBlXs94", "parentPublication": { "id": "proceedings/icsme/2017/0992/0", "title": "2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2005/2397/0/23970473", "title": "Adaptive Site Map Visualization Based on Landmarks", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970473/12OmNzcPA7Q", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/03/mco2016030056", "title": "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", "doi": null, "abstractUrl": "/magazine/co/2016/03/mco2016030056/13rRUxOvedt", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2022/9109/0/910900a154", "title": "Research on Cross-site Scripting Vulnerability of XSS Based on International Student Website", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2022/910900a154/1HYv3WAQBMI", "parentPublication": { "id": "proceedings/iccnea/2022/9109/0", "title": "2022 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2019/6934/0/08909578", "title": "Proactive Phishing Sites Detection", "doi": null, "abstractUrl": "/proceedings-article/wi/2019/08909578/1febmi2iRk4", "parentPublication": { "id": "proceedings/wi/2019/6934/0", "title": "2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2020/7735/0/773500a117", "title": "eAPT: enhancing APT with a mirror site resolver", "doi": null, "abstractUrl": "/proceedings-article/issrew/2020/773500a117/1q7jtZBGlPO", "parentPublication": { "id": "proceedings/issrew/2020/7735/0", "title": "2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzSh1bn", "title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNx5GU5l", "doi": "10.1109/CGIV.2009.61", "title": "Synthesis Vis: A Web Site Supporting Collaborative Information Visualization", "normalizedTitle": "Synthesis Vis: A Web Site Supporting Collaborative Information Visualization", "abstract": "This paper describes the design and deployment of Synthesis Vis, an intranet web site where various users may contribute data, create interactive visualizations, and share visualizations. The goal of the site is to support collaboration around information visualizations at a large scale by fostering a social style of design process. Moreover, the site serves as a collaborative information visualization tool for individuals, providing a medium to share visualizations among users. To support this goal, the site includes novel mechanisms for enduser creation of visualizations and collaboration in the design process of those visualizations. The early usage of Synthesis Vis verifies the design and deployment of Synthesis Vis for collaborative information visualization.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes the design and deployment of Synthesis Vis, an intranet web site where various users may contribute data, create interactive visualizations, and share visualizations. The goal of the site is to support collaboration around information visualizations at a large scale by fostering a social style of design process. Moreover, the site serves as a collaborative information visualization tool for individuals, providing a medium to share visualizations among users. To support this goal, the site includes novel mechanisms for enduser creation of visualizations and collaboration in the design process of those visualizations. The early usage of Synthesis Vis verifies the design and deployment of Synthesis Vis for collaborative information visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes the design and deployment of Synthesis Vis, an intranet web site where various users may contribute data, create interactive visualizations, and share visualizations. The goal of the site is to support collaboration around information visualizations at a large scale by fostering a social style of design process. Moreover, the site serves as a collaborative information visualization tool for individuals, providing a medium to share visualizations among users. To support this goal, the site includes novel mechanisms for enduser creation of visualizations and collaboration in the design process of those visualizations. The early usage of Synthesis Vis verifies the design and deployment of Synthesis Vis for collaborative information visualization.", "fno": "3789a443", "keywords": [ "Data Visualisation", "Groupware", "Intranets", "Web Design", "Intranet Web Site", "Collaborative Information Visualization", "Synthesis Vis", "Collaboration", "Data Visualization", "Collaborative Work", "Process Design", "Collaborative Tools", "Eyes", "Web Page Design", "Large Scale Systems", "Data Analysis", "Information Analysis", "Information Visualization", "Cooperative Design", "Social Data Analysis", "Communication Minded Visualization" ], "authors": [ { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "Tian Feng", "givenName": "Tian", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "XiongFei Luo", "givenName": "XiongFei", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "HongAn Wang", "givenName": "HongAn", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "Wei Liu", "givenName": "Wei", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "DongXing Teng", "givenName": "DongXing", "surname": "Teng", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "Tian Yang", "givenName": "Tian", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Software, Chinese Acad. of Sci., Beijing, China", "fullName": "ZaiFei Liao", "givenName": "ZaiFei", "surname": "Liao", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "443-448", "year": "2009", "issn": null, "isbn": "978-0-7695-3789-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3789a349", "articleId": "12OmNyNzhtZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3789a355", "articleId": "12OmNzwHvjD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2001/0981/0/00927227", "title": "Supporting scientific analysis within collaborative problem solving environments", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/00927227/12OmNAFWOMO", "parentPublication": { "id": "proceedings/hicss/2001/0981/2", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742380", "title": "Collaborative information linking: Bridging knowledge gaps between users by linking across applications", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742380/12OmNAXglSL", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wse/2001/1399/0/00988787", "title": "Evolution of an organizational Web site: migrating to XML/XSL", "doi": null, "abstractUrl": "/proceedings-article/wse/2001/00988787/12OmNC4eSmC", "parentPublication": { "id": "proceedings/wse/2001/1399/0", "title": "Proceedings 3rd International Workshop on Web Site Evolution. WSE 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a306", "title": "Insertion of Surprise Elements in the Collaborative Learning Process through Graphic Representations for Synthesis (GRS): A Qualitative Study", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a306/12OmNvmXJ9r", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2008/3075/0/04439069", "title": "A Collaborative Dimensions Framework: Understanding the Mediating Role of Conceptual Visualizations in Collaborative Knowledge Work", "doi": null, "abstractUrl": "/proceedings-article/hicss/2008/04439069/12OmNwGIcAL", "parentPublication": { "id": "proceedings/hicss/2008/3075/0", "title": "Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kbse/1993/4100/0/00341201", "title": "Towards supporting design phase synthesis", "doi": null, "abstractUrl": "/proceedings-article/kbse/1993/00341201/12OmNzBOi9r", "parentPublication": { "id": "proceedings/kbse/1993/4100/0", "title": "Proceedings of 8th Knowledge-Based Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1232", "title": "Interactive Tree Comparison for Co-located Collaborative Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1232/13rRUxcKzVg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2014/01/tsc2014010002", "title": "Confucius: A Tool Supporting Collaborative Scientific Workflow Composition", "doi": null, "abstractUrl": "/journal/sc/2014/01/tsc2014010002/13rRUy2YLVw", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933611", "title": "Toward a Design Space for Mitigating Cognitive Bias in Vis", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933611/1fTgFpDHY3u", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdie/2021/3870/0/387000a212", "title": "Improved Collaborative Filtering Algorithm Based on Network Site Users", "doi": null, "abstractUrl": "/proceedings-article/icbdie/2021/387000a212/1uCit44lwli", "parentPublication": { "id": "proceedings/icbdie/2021/3870/0", "title": "2021 2nd International Conference on Big Data and Informatization Education (ICBDIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRcV", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNx7ov0k", "doi": "10.1109/INFVIS.2000.885093", "title": "GADGET/IV: A Taxonomic Approach to Semi-Automatic Design of Information Visualization Applications Using Modular Visualization Environment", "normalizedTitle": "GADGET/IV: A Taxonomic Approach to Semi-Automatic Design of Information Visualization Applications Using Modular Visualization Environment", "abstract": "Since novice users of visualization systems lack the knowledge and expertise in data visualization, it is a tough task for them to generate efficient and effective visualizations that allow them to comprehend information embedded in the data. Therefore, systems supporting the users to design appropriate visualizations are of great importance. The GADGET system, which has been developed in our previous study, interactively helps them design scientific visualization applications by presenting appropriate MVE prototypes according to the specification of the visualization goals expressed mainly with the Wehrend matrix. This paper attempts to extend this approach in order to develop a system named GADGET/IV}, which is intended to provide the users with an environment for semi-automatic design of information visualization applications. To this end, a novel goal-oriented taxonomy of information visualization techniques is presented. In addition, an initial design of the system architecture and user assistance flow is described. The usefulness of the GADGET/IV system is illustrated with example problems of Web site access frequency analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Since novice users of visualization systems lack the knowledge and expertise in data visualization, it is a tough task for them to generate efficient and effective visualizations that allow them to comprehend information embedded in the data. Therefore, systems supporting the users to design appropriate visualizations are of great importance. The GADGET system, which has been developed in our previous study, interactively helps them design scientific visualization applications by presenting appropriate MVE prototypes according to the specification of the visualization goals expressed mainly with the Wehrend matrix. This paper attempts to extend this approach in order to develop a system named GADGET/IV}, which is intended to provide the users with an environment for semi-automatic design of information visualization applications. To this end, a novel goal-oriented taxonomy of information visualization techniques is presented. In addition, an initial design of the system architecture and user assistance flow is described. The usefulness of the GADGET/IV system is illustrated with example problems of Web site access frequency analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since novice users of visualization systems lack the knowledge and expertise in data visualization, it is a tough task for them to generate efficient and effective visualizations that allow them to comprehend information embedded in the data. Therefore, systems supporting the users to design appropriate visualizations are of great importance. The GADGET system, which has been developed in our previous study, interactively helps them design scientific visualization applications by presenting appropriate MVE prototypes according to the specification of the visualization goals expressed mainly with the Wehrend matrix. This paper attempts to extend this approach in order to develop a system named GADGET/IV}, which is intended to provide the users with an environment for semi-automatic design of information visualization applications. To this end, a novel goal-oriented taxonomy of information visualization techniques is presented. In addition, an initial design of the system architecture and user assistance flow is described. The usefulness of the GADGET/IV system is illustrated with example problems of Web site access frequency analysis.", "fno": "08040077", "keywords": [ "Information Visualization", "Visualization Systems", "Modular Visualization Environment MVE", "Taxonomy", "Knowledge Base", "World Wide Web WWW" ], "authors": [ { "affiliation": "Ochanomizu University", "fullName": "Issei Fujishiro", "givenName": "Issei", "surname": "Fujishiro", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University", "fullName": "Rika Furuhata", "givenName": "Rika", "surname": "Furuhata", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University", "fullName": "Yoshihiko Ichikawa", "givenName": "Yoshihiko", "surname": "Ichikawa", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University", "fullName": "Yuriko Takeshima", "givenName": "Yuriko", "surname": "Takeshima", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "77", "year": "2000", "issn": "1522-404X", "isbn": "0-7695-0804-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08040069", "articleId": "12OmNzWx0c2", "__typename": "AdjacentArticleType" }, "next": { "fno": "08040085", "articleId": "12OmNB0nW9E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC0r", "title": "Advances in Digital Libraries Conference, IEEE", "acronym": "adl", "groupId": "1000632", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNyO8tRp", "doi": "10.1109/ADL.1999.777704", "title": "Design of a Digital Mathematical Library for Science, Technology and Education", "normalizedTitle": "Design of a Digital Mathematical Library for Science, Technology and Education", "abstract": "The concept of a digital library is of proven worth because of its ability to provide dramatic capabilities that are impossible with traditional print media. We are interested in providing such capabilities for scientific, technical and educational users of mathematical reference data. Our attention is focused on the highly specialized field of mathematics that is concerned with the properties, application and computation of the elementary and higher mathematical functions. Calling upon domain experts worldwide for assistance, the National Institute of Standards and Technology is conducting an ambitious project to construct, ab initio, a comprehensive and authoritative Web resource on this subject. The need to make effective use of the latest developments in digital library research is a major focus, as is the development of content. In this paper we discuss our approach to such difficulties as the representation, display and manipulation of symbolic expressions, numerical data and graphical visualizations, and we describe a prototype Web site that has been constructed to test, evaluate and advance the NIST Digital Library of Mathematical Functions project.", "abstracts": [ { "abstractType": "Regular", "content": "The concept of a digital library is of proven worth because of its ability to provide dramatic capabilities that are impossible with traditional print media. We are interested in providing such capabilities for scientific, technical and educational users of mathematical reference data. Our attention is focused on the highly specialized field of mathematics that is concerned with the properties, application and computation of the elementary and higher mathematical functions. Calling upon domain experts worldwide for assistance, the National Institute of Standards and Technology is conducting an ambitious project to construct, ab initio, a comprehensive and authoritative Web resource on this subject. The need to make effective use of the latest developments in digital library research is a major focus, as is the development of content. In this paper we discuss our approach to such difficulties as the representation, display and manipulation of symbolic expressions, numerical data and graphical visualizations, and we describe a prototype Web site that has been constructed to test, evaluate and advance the NIST Digital Library of Mathematical Functions project.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The concept of a digital library is of proven worth because of its ability to provide dramatic capabilities that are impossible with traditional print media. We are interested in providing such capabilities for scientific, technical and educational users of mathematical reference data. Our attention is focused on the highly specialized field of mathematics that is concerned with the properties, application and computation of the elementary and higher mathematical functions. Calling upon domain experts worldwide for assistance, the National Institute of Standards and Technology is conducting an ambitious project to construct, ab initio, a comprehensive and authoritative Web resource on this subject. The need to make effective use of the latest developments in digital library research is a major focus, as is the development of content. In this paper we discuss our approach to such difficulties as the representation, display and manipulation of symbolic expressions, numerical data and graphical visualizations, and we describe a prototype Web site that has been constructed to test, evaluate and advance the NIST Digital Library of Mathematical Functions project.", "fno": "02190118", "keywords": [ "Database", "Digital Library", "Document Conversion", "Mathematics", "Special Functions", "Visualization", "World Wide Web" ], "authors": [ { "affiliation": "National Institute of Standards and Technology", "fullName": "Daniel W. Lozier", "givenName": "Daniel W.", "surname": "Lozier", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Bruce R. Miller", "givenName": "Bruce R.", "surname": "Miller", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Bonita V. Saunders", "givenName": "Bonita V.", "surname": "Saunders", "__typename": "ArticleAuthorType" } ], "idPrefix": "adl", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-03-01T00:00:00", "pubType": "proceedings", "pages": "118", "year": "1999", "issn": "1092-9959", "isbn": "0-7695-0219-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "02190105", "articleId": "12OmNARRYfn", "__typename": "AdjacentArticleType" }, "next": { "fno": "02190129", "articleId": "12OmNqAU6vK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy2agR9", "title": "Informatics and Computational Intelligence, International Conference on", "acronym": "ici", "groupId": "1800847", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyp9Mkh", "doi": "10.1109/ICI.2011.61", "title": "Living Internet - Social Objects Powering New Age Cybernetic Networks", "normalizedTitle": "Living Internet - Social Objects Powering New Age Cybernetic Networks", "abstract": "Be it a blog post, photo or a You Tube video, social objects are responsible for interactions between people, attributing to notion that 'People don't just speak, rather discuss around these objects'. Such crucial objects are often left out of network analysis, concentrating more on node-node connections. Activities around social objects across the web, reflects synaptic changes of the physical world. When modelled in cybernetics fashion, they can generate actionable feedback for system specific goals, which aids in constructing rich interest graphs, multi-faceted reputation system and better functioning groups. This paper proposes a system to read user interactions in digestible feedback form and presents a solution of similar deployment in a network citing the complexities involved in storing smart data. Modelling feedback networks in reverse fashion will give rise to plug gable smart web, where people can make better sense of their actions by peeking into communication flow on the web.", "abstracts": [ { "abstractType": "Regular", "content": "Be it a blog post, photo or a You Tube video, social objects are responsible for interactions between people, attributing to notion that 'People don't just speak, rather discuss around these objects'. Such crucial objects are often left out of network analysis, concentrating more on node-node connections. Activities around social objects across the web, reflects synaptic changes of the physical world. When modelled in cybernetics fashion, they can generate actionable feedback for system specific goals, which aids in constructing rich interest graphs, multi-faceted reputation system and better functioning groups. This paper proposes a system to read user interactions in digestible feedback form and presents a solution of similar deployment in a network citing the complexities involved in storing smart data. Modelling feedback networks in reverse fashion will give rise to plug gable smart web, where people can make better sense of their actions by peeking into communication flow on the web.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Be it a blog post, photo or a You Tube video, social objects are responsible for interactions between people, attributing to notion that 'People don't just speak, rather discuss around these objects'. Such crucial objects are often left out of network analysis, concentrating more on node-node connections. Activities around social objects across the web, reflects synaptic changes of the physical world. When modelled in cybernetics fashion, they can generate actionable feedback for system specific goals, which aids in constructing rich interest graphs, multi-faceted reputation system and better functioning groups. This paper proposes a system to read user interactions in digestible feedback form and presents a solution of similar deployment in a network citing the complexities involved in storing smart data. Modelling feedback networks in reverse fashion will give rise to plug gable smart web, where people can make better sense of their actions by peeking into communication flow on the web.", "fno": "4618a335", "keywords": [ "Knowledge Representation", "Intelligent Systems", "World Wide Web", "User Generated Content", "Social Networks" ], "authors": [ { "affiliation": null, "fullName": "Dinesh Pothineni", "givenName": "Dinesh", "surname": "Pothineni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pratik Mishra", "givenName": "Pratik", "surname": "Mishra", "__typename": "ArticleAuthorType" } ], "idPrefix": "ici", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-12-01T00:00:00", "pubType": "proceedings", "pages": "335-339", "year": "2011", "issn": null, "isbn": "978-0-7695-4618-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4618a327", "articleId": "12OmNvUaNhH", "__typename": "AdjacentArticleType" }, "next": { "fno": "4618a343", "articleId": "12OmNzT7Ow2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/la-web/2009/3856/0/3856a138", "title": "Watch & Learn: Studying the Sharing of Everyday Knowledge with Instructional Videos", "doi": null, "abstractUrl": "/proceedings-article/la-web/2009/3856a138/12OmNAs2trE", "parentPublication": { "id": "proceedings/la-web/2009/3856/0", "title": "Web Congress, Latin American", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbaivl/1997/7981/0/79810002", "title": "ImageRover: A Content-Based Image Browser for the World Wide Web", "doi": null, "abstractUrl": "/proceedings-article/cbaivl/1997/79810002/12OmNBPc8rB", "parentPublication": { "id": "proceedings/cbaivl/1997/7981/0", "title": "Content-Based Access of Image and Video Libraries, IEEE Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2006/0256/0/04117011", "title": "Work in Progress: Semantic Metadata for Learning Objects Evaluation", "doi": null, "abstractUrl": "/proceedings-article/fie/2006/04117011/12OmNC8dggL", "parentPublication": { "id": "proceedings/fie/2006/0256/0", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lgdi/2005/9228/0/01612480", "title": "Toward a Web of data and programs", "doi": null, "abstractUrl": "/proceedings-article/lgdi/2005/01612480/12OmNqJ8tbY", "parentPublication": { "id": "proceedings/lgdi/2005/9228/0", "title": "Local to Global Data Interoperability - Challenges and Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wf-iot/2014/3459/0/06803175", "title": "Internet of Things for designing smart objects", "doi": null, "abstractUrl": "/proceedings-article/wf-iot/2014/06803175/12OmNxEBzh5", "parentPublication": { "id": "proceedings/wf-iot/2014/3459/0", "title": "2014 IEEE World Forum on Internet of Things (WF-IoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/1997/7807/0/78070079", "title": "Representative objects: concise representations of semistructured, hierarchical data", "doi": null, "abstractUrl": "/proceedings-article/icde/1997/78070079/12OmNxwncdB", "parentPublication": { "id": "proceedings/icde/1997/7807/0", "title": "Proceedings 13th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2011/4624/0/4624a102", "title": "A Mechanism Generating Semi-Structured RDF Metadata from Web Documents", "doi": null, "abstractUrl": "/proceedings-article/apscc/2011/4624a102/12OmNymjN2o", "parentPublication": { "id": "proceedings/apscc/2011/4624/0", "title": "2011 IEEE Asia -Pacific Services Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wecwis/1999/0334/0/03340116", "title": "Speechnet: A Network of Hyperlinked Speech-Accessible Objects", "doi": null, "abstractUrl": "/proceedings-article/wecwis/1999/03340116/12OmNzSyCgu", "parentPublication": { "id": "proceedings/wecwis/1999/0334/0", "title": "Advanced Issues of E-Commerce and Web-Based Information Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2006/01/t0002", "title": "Objective-Optimal Algorithms for Long-Term Web Prefetching", "doi": null, "abstractUrl": "/journal/tc/2006/01/t0002/13rRUIJcWkJ", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2008/04/mpc2008040020", "title": "Object-Blog System for Environment-Generated Content", "doi": null, "abstractUrl": "/magazine/pc/2008/04/mpc2008040020/13rRUxAStY2", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvs4vpD", "title": "Software Specification and Design, International Workshop on", "acronym": "iwssd", "groupId": "1000702", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNywxlTY", "doi": "10.1109/IWSSD.1998.667914", "title": "Towards a Software Engineering Approach to Web Site Development", "normalizedTitle": "Towards a Software Engineering Approach to Web Site Development", "abstract": "The World Wide Web (WWW) has become \"the\" global infrastructure for delivering information and services. The demands and expectations of information providers and consumers are pushing WWW technology towards higher-level quality of presentation, including active contents and improved usability of the hypermedia distributed infrastructure. This technological evolution, however, is not supported by adequate Web design methodologies. Web site development is usually carried out without following a well-defined process and lacks suitable tool support. In addition, Web technologies are quite powerful but rather low-level and their semantics is often left largely unspecified. As a consequence, understanding the conceptual structure of a complex Web site and managing its evolution are complex and difficult tasks. The approach we advocate here is based on sound software engineering principles. The Web site development process goes through requirements analysis, design, and implementation in a high-level language. We define an object-oriented modeling framework, called WOOM, which provides constructs and abstractions for a high-level implementation of a Web site. An important feature of WOOM is that it clearly separates the data that are presented through the site from the context in which the user accesses such data. This feature not only enhances separation of concerns in the design stage, but also favors its subsequent evolution. The paper provides a view of the approach and of its current prototype implementation.", "abstracts": [ { "abstractType": "Regular", "content": "The World Wide Web (WWW) has become \"the\" global infrastructure for delivering information and services. The demands and expectations of information providers and consumers are pushing WWW technology towards higher-level quality of presentation, including active contents and improved usability of the hypermedia distributed infrastructure. This technological evolution, however, is not supported by adequate Web design methodologies. Web site development is usually carried out without following a well-defined process and lacks suitable tool support. In addition, Web technologies are quite powerful but rather low-level and their semantics is often left largely unspecified. As a consequence, understanding the conceptual structure of a complex Web site and managing its evolution are complex and difficult tasks. The approach we advocate here is based on sound software engineering principles. The Web site development process goes through requirements analysis, design, and implementation in a high-level language. We define an object-oriented modeling framework, called WOOM, which provides constructs and abstractions for a high-level implementation of a Web site. An important feature of WOOM is that it clearly separates the data that are presented through the site from the context in which the user accesses such data. This feature not only enhances separation of concerns in the design stage, but also favors its subsequent evolution. The paper provides a view of the approach and of its current prototype implementation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The World Wide Web (WWW) has become \"the\" global infrastructure for delivering information and services. The demands and expectations of information providers and consumers are pushing WWW technology towards higher-level quality of presentation, including active contents and improved usability of the hypermedia distributed infrastructure. This technological evolution, however, is not supported by adequate Web design methodologies. Web site development is usually carried out without following a well-defined process and lacks suitable tool support. In addition, Web technologies are quite powerful but rather low-level and their semantics is often left largely unspecified. As a consequence, understanding the conceptual structure of a complex Web site and managing its evolution are complex and difficult tasks. The approach we advocate here is based on sound software engineering principles. The Web site development process goes through requirements analysis, design, and implementation in a high-level language. We define an object-oriented modeling framework, called WOOM, which provides constructs and abstractions for a high-level implementation of a Web site. An important feature of WOOM is that it clearly separates the data that are presented through the site from the context in which the user accesses such data. This feature not only enhances separation of concerns in the design stage, but also favors its subsequent evolution. The paper provides a view of the approach and of its current prototype implementation.", "fno": "84390008", "keywords": [ "World Wide Web", "Object Oriented Model", "Authoring", "Hypermedia" ], "authors": [ { "affiliation": "Politecnico di Milano", "fullName": "Francesco Coda", "givenName": "Francesco", "surname": "Coda", "__typename": "ArticleAuthorType" }, { "affiliation": "Politecnico di Milano", "fullName": "Carlo Ghezzi", "givenName": "Carlo", "surname": "Ghezzi", "__typename": "ArticleAuthorType" }, { "affiliation": "Politecnico di Milano", "fullName": "Giovanni Vigna", "givenName": "Giovanni", "surname": "Vigna", "__typename": "ArticleAuthorType" }, { "affiliation": "Politecnico di Milano", "fullName": "Franca Garzotto", "givenName": "Franca", "surname": "Garzotto", "__typename": "ArticleAuthorType" } ], "idPrefix": "iwssd", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-04-01T00:00:00", "pubType": "proceedings", "pages": "8", "year": "1998", "issn": "1063-6765", "isbn": "0-8186-8439-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "84390002", "articleId": "12OmNBKmXnR", "__typename": "AdjacentArticleType" }, "next": { "fno": "84390018", "articleId": "12OmNvEyRaM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBQ2VPY", "title": "Proceedings Technology of Object-Oriented Languages and Systems. TOOLS 31", "acronym": "tools", "groupId": "1000744", "volume": "0", "displayVolume": "0", "year": "1999", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2C1pi", "doi": "10.1109/TOOLS.1999.796499", "title": "A Framework and Methodology for Development of Content-Based Web Sites", "normalizedTitle": "A Framework and Methodology for Development of Content-Based Web Sites", "abstract": "Web site is a new broadly used information media and application platform. One of the features of web site is that it is in an endless development cycle. Maintenance and update are happening during a site's lifecycle. The structure and content of a web site are always in extension and modification. Some tools are designed to support maintenance work for the development of a web site. We believe that the maintenance of a web site should be considered in design phase. In this paper, we discuss a component-based approach to design and maintenance a web site. By this approach, the workload of future maintenance can be reduced.", "abstracts": [ { "abstractType": "Regular", "content": "Web site is a new broadly used information media and application platform. One of the features of web site is that it is in an endless development cycle. Maintenance and update are happening during a site's lifecycle. The structure and content of a web site are always in extension and modification. Some tools are designed to support maintenance work for the development of a web site. We believe that the maintenance of a web site should be considered in design phase. In this paper, we discuss a component-based approach to design and maintenance a web site. By this approach, the workload of future maintenance can be reduced.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Web site is a new broadly used information media and application platform. One of the features of web site is that it is in an endless development cycle. Maintenance and update are happening during a site's lifecycle. The structure and content of a web site are always in extension and modification. Some tools are designed to support maintenance work for the development of a web site. We believe that the maintenance of a web site should be considered in design phase. In this paper, we discuss a component-based approach to design and maintenance a web site. By this approach, the workload of future maintenance can be reduced.", "fno": "03930316", "keywords": [ "World Wide Web", "Maintenance", "Design", "Component" ], "authors": [ { "affiliation": "University of South Australia", "fullName": "Xin Fan", "givenName": "Xin", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of South Australia", "fullName": "Jian Chen", "givenName": "Jian", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "tools", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1999-09-01T00:00:00", "pubType": "proceedings", "pages": "316", "year": "1999", "issn": "1530-2067", "isbn": "0-7695-0462-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "03930306", "articleId": "12OmNvq5ju4", "__typename": "AdjacentArticleType" }, "next": { "fno": "03930320", "articleId": "12OmNzGDsMh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCuDzt8", "title": "Theory and Practice of Computer Graphics", "acronym": "tpcg", "groupId": "1000758", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNx0A7M7", "doi": "10.1109/TPCG.2003.1206927", "title": "Guided navigation in task-oriented 3D graph visualizations", "normalizedTitle": "Guided navigation in task-oriented 3D graph visualizations", "abstract": "In many application areas an optimal visualization of a complex graph depends on the specific task to be accomplished by the user. Therefore a means of locally customizable layouts is required to focus on different problem aspects. We propose a concept of user-driven hierarchy formation and layout optimization in the context of IBM zSeries I/O configurations. We combine the concepts of glyphs, local 3D layout managers and partitioning galaxies to create an optimal layout for a given task. Additionally, to simplify global navigation, structural details are abstracted and can be refined upon user request. Since element context is crucial for understanding and consistently configuring an I/O configuration, guided navigation along the connections in this data structure is essential. To efficiently customize a graph layout, complex selection mechanisms are needed to quickly define the areas affected by a particular layout. Although we focus on IBM zSeries I/O configurations, the approach we present is quite generic and can be adopted for other fields of application.", "abstracts": [ { "abstractType": "Regular", "content": "In many application areas an optimal visualization of a complex graph depends on the specific task to be accomplished by the user. Therefore a means of locally customizable layouts is required to focus on different problem aspects. We propose a concept of user-driven hierarchy formation and layout optimization in the context of IBM zSeries I/O configurations. We combine the concepts of glyphs, local 3D layout managers and partitioning galaxies to create an optimal layout for a given task. Additionally, to simplify global navigation, structural details are abstracted and can be refined upon user request. Since element context is crucial for understanding and consistently configuring an I/O configuration, guided navigation along the connections in this data structure is essential. To efficiently customize a graph layout, complex selection mechanisms are needed to quickly define the areas affected by a particular layout. Although we focus on IBM zSeries I/O configurations, the approach we present is quite generic and can be adopted for other fields of application.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In many application areas an optimal visualization of a complex graph depends on the specific task to be accomplished by the user. Therefore a means of locally customizable layouts is required to focus on different problem aspects. We propose a concept of user-driven hierarchy formation and layout optimization in the context of IBM zSeries I/O configurations. We combine the concepts of glyphs, local 3D layout managers and partitioning galaxies to create an optimal layout for a given task. Additionally, to simplify global navigation, structural details are abstracted and can be refined upon user request. Since element context is crucial for understanding and consistently configuring an I/O configuration, guided navigation along the connections in this data structure is essential. To efficiently customize a graph layout, complex selection mechanisms are needed to quickly define the areas affected by a particular layout. Although we focus on IBM zSeries I/O configurations, the approach we present is quite generic and can be adopted for other fields of application.", "fno": "19420026", "keywords": [ "Graphical User Interfaces", "Data Visualisation", "Graphs", "Guided Navigation", "Task Oriented 3 D Graph Visualization", "Optimal Visualization", "User Driven Hierarchization", "Layout Optimization", "IBM Z Series I O Configuration", "Glyph", "Local 3 D Layout Manager", "Partitioning Galaxy", "Optimal Layout Creation", "Global Navigation", "Graph Layout Customization", "Complex Selection Mechanisms", "IBM E Server Z Series", "Graphical User Interface", "Navigation", "Visualization", "Topology", "Application Software", "Operating Systems", "Cascading Style Sheets", "Permission", "Interactive Systems", "Technology Management", "Data Structures" ], "authors": [ { "affiliation": "Visualization & Interactive Syst. Group, Stuttgart Univ., Germany", "fullName": "Guido Reina", "givenName": "Guido", "surname": "Reina", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sven Lange-Last", "givenName": "Sven", "surname": "Lange-Last", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Klaus Engel", "givenName": "Klaus", "surname": "Engel", "__typename": "ArticleAuthorType" }, { "affiliation": "Visualization & Interactive Syst. Group, University of Stuttgart, Germany", "fullName": "Thomas Ertl", "givenName": "Thomas", "surname": "Ertl", "__typename": "ArticleAuthorType" } ], "idPrefix": "tpcg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-01-01T00:00:00", "pubType": "proceedings", "pages": "26-33", "year": "2003", "issn": null, "isbn": "0-7695-1942-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "19420016", "articleId": "12OmNwF0BSK", "__typename": "AdjacentArticleType" }, "next": { "fno": "19420034", "articleId": "12OmNyGtjmw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hipc/2013/0730/0/06799132", "title": "Loop level speculation in a task based programming model", "doi": null, "abstractUrl": "/proceedings-article/hipc/2013/06799132/12OmNAKuoRI", "parentPublication": { "id": "proceedings/hipc/2013/0730/0", "title": "2013 20th International Conference on High Performance Computing (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380467", "title": "An efficient user oriented permanent deletion scheme for cloud object storage", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380467/12OmNBRbkmk", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2015/7125/0/07102635", "title": "Testing Web Applications Through Layout Constraints", "doi": null, "abstractUrl": "/proceedings-article/icst/2015/07102635/12OmNBZHih7", "parentPublication": { "id": "proceedings/icst/2015/7125/0", "title": "2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2018/5012/0/501201a182", "title": "Automatic Detection of Visibility Faults by Layout Changes in HTML5 Web Pages", "doi": null, "abstractUrl": "/proceedings-article/icst/2018/501201a182/12OmNwdL7jS", "parentPublication": { "id": "proceedings/icst/2018/5012/0", "title": "2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2012/2719/0/06337181", "title": "Research on the Decision-Making Process by Communication Specialist (CS) in the Navigation Management of Helicopter Emergency Medical Service (HEMS)", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2012/06337181/12OmNxFJXAp", "parentPublication": { "id": "proceedings/iiai-aai/2012/2719/0", "title": "2012 IIAI International Conference on Advanced Applied Informatics (IIAIAAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2015/0025/0/0025a709", "title": "Automatic Detection of Potential Layout Faults Following Changes to Responsive Web Pages (N)", "doi": null, "abstractUrl": "/proceedings-article/ase/2015/0025a709/12OmNy5zsl6", "parentPublication": { "id": "proceedings/ase/2015/0025/0", "title": "2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/03/08290687", "title": "Neurally-Guided Semantic Navigation in Knowledge Graph", "doi": null, "abstractUrl": "/journal/bd/2022/03/08290687/13rRUwfqpFF", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2019/1736/0/173600a172", "title": "Efficiently Repairing Internationalization Presentation Failures by Solving Layout Constraints", "doi": null, "abstractUrl": "/proceedings-article/icst/2019/173600a172/1aDT6weHoWc", "parentPublication": { "id": "proceedings/icst/2019/1736/0", "title": "2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2019/1736/0/173600a183", "title": "Automatic Visual Verification of Layout Failures in Responsively Designed Web Pages", "doi": null, "abstractUrl": "/proceedings-article/icst/2019/173600a183/1aDT7byKOYw", "parentPublication": { "id": "proceedings/icst/2019/1736/0", "title": "2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2019/5050/0/505000a231", "title": "JSP-Based Pet Adoption System", "doi": null, "abstractUrl": "/proceedings-article/icvris/2019/505000a231/1fHkcaGXOYE", "parentPublication": { "id": "proceedings/icvris/2019/5050/0", "title": "2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18XkfAs0lYA", "title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)", "acronym": "bigcomp", "groupId": "1803439", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18XkgEGveJW", "doi": "10.1109/BIGCOMP.2019.8679289", "title": "Event Venue Navigation for Visually Impaired People", "normalizedTitle": "Event Venue Navigation for Visually Impaired People", "abstract": "There is an increasing need for a navigation system that supports visually impaired people walking around an event venue without a human guide helper. Although various methods for indoor navigation systems have been proposed, existing navigation systems have a complicated setup procedure to prepare the environment, making it difficult for event operation staff to deploy the system within a limited time. In this paper, we propose an event venue navigation system for visually impaired people that can be prepared within one hour even if the event staff does not know how to use the system. Our experiment shows that one event staff member can prepare the environment in about 20 minutes and that the system can suppress the user's positioning error within two meters.", "abstracts": [ { "abstractType": "Regular", "content": "There is an increasing need for a navigation system that supports visually impaired people walking around an event venue without a human guide helper. Although various methods for indoor navigation systems have been proposed, existing navigation systems have a complicated setup procedure to prepare the environment, making it difficult for event operation staff to deploy the system within a limited time. In this paper, we propose an event venue navigation system for visually impaired people that can be prepared within one hour even if the event staff does not know how to use the system. Our experiment shows that one event staff member can prepare the environment in about 20 minutes and that the system can suppress the user's positioning error within two meters.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There is an increasing need for a navigation system that supports visually impaired people walking around an event venue without a human guide helper. Although various methods for indoor navigation systems have been proposed, existing navigation systems have a complicated setup procedure to prepare the environment, making it difficult for event operation staff to deploy the system within a limited time. In this paper, we propose an event venue navigation system for visually impaired people that can be prepared within one hour even if the event staff does not know how to use the system. Our experiment shows that one event staff member can prepare the environment in about 20 minutes and that the system can suppress the user's positioning error within two meters.", "fno": "08679289", "keywords": [ "Handicapped Aids", "Navigation", "Visually Impaired People", "Human Guide Helper", "Indoor Navigation Systems", "Event Operation Staff", "Event Venue Navigation System", "Event Staff Member", "Time Measurement", "Radio Navigation", "Meters", "Position Measurement", "Indoor Navigation", "Global Positioning System", "Navigation", "Indoor", "Beacon", "Accessibility" ], "authors": [ { "affiliation": "Faculty of Library, Information and Media Science, University of Tsukuba, Tsukuba, Japan", "fullName": "Chiemi Watanabe", "givenName": "Chiemi", "surname": "Watanabe", "__typename": "ArticleAuthorType" }, { "affiliation": "Mitsubishi Electric Corporation, Kanagawa, Japan", "fullName": "Jun Minagawa", "givenName": "Jun", "surname": "Minagawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigcomp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-02-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2019", "issn": null, "isbn": "978-1-5386-7789-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08679181", "articleId": "18XkkVmSPDO", "__typename": "AdjacentArticleType" }, "next": { "fno": "08679354", "articleId": "18XklAMCehq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icis/2012/1536/0/06211819", "title": "Wearable Navigation System for the Visually Impaired and Blind People", "doi": null, "abstractUrl": "/proceedings-article/icis/2012/06211819/12OmNASILEZ", "parentPublication": { "id": "proceedings/icis/2012/1536/0", "title": "2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/taai/2017/4203/0/4203a130", "title": "Pedestrian Navigation System for Visually Impaired People Using HoloLens and RFID", "doi": null, "abstractUrl": "/proceedings-article/taai/2017/4203a130/12OmNC943Pp", "parentPublication": { "id": "proceedings/taai/2017/4203/0", "title": "2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2001/1423/0/00974434", "title": "An intelligent assistant for navigation of visually impaired people", "doi": null, "abstractUrl": "/proceedings-article/bibe/2001/00974434/12OmNCu4ndg", "parentPublication": { "id": "proceedings/bibe/2001/1423/0", "title": "Proceedings 2nd Annual IEEE International Symposium on Bioinformatics and Bioengineering (BIBE 2001)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2014/5179/0/06850740", "title": "Vibration and voice operated navigation system for visually impaired person", "doi": null, "abstractUrl": "/proceedings-article/iciev/2014/06850740/12OmNCxL9Ro", "parentPublication": { "id": "proceedings/iciev/2014/5179/0", "title": "2014 International Conference on Informatics, Electronics & Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/3/3496c119", "title": "Pervasive Web News Recommendation for Visually Impaired People", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496c119/12OmNxuXcye", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2011/0774/0/05959608", "title": "Indoor-Outdoor Navigation System for Visually-Impaired Pedestrians: Preliminary Evaluation of Position Measurement and Obstacle Display", "doi": null, "abstractUrl": "/proceedings-article/iswc/2011/05959608/12OmNyUnEET", "parentPublication": { "id": "proceedings/iswc/2011/0774/0", "title": "2011 15th Annual International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsr/2008/3135/0/3135a440", "title": "The Performance of HSDPA (3.5 G) Network for Application in a Navigation System for Visually Impaired People", "doi": null, "abstractUrl": "/proceedings-article/cnsr/2008/3135a440/12OmNzlUKtn", "parentPublication": { "id": "proceedings/cnsr/2008/3135/0", "title": "2008 6th Annual Communication Networks and Services Research Conference (CNSR '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icimp/2007/2911/0/04271783", "title": "Path Planning and Following Algorithms in an Indoor Navigation Model for Visually Impaired", "doi": null, "abstractUrl": "/proceedings-article/icimp/2007/04271783/17D45XoXP7D", "parentPublication": { "id": "proceedings/icimp/2007/2911/0", "title": "Internet Monitoring and Protection, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2022/9045/0/10103268", "title": "Real-Time Computer Vision Based Autonomous Navigation System for Assisting Visually Impaired People using Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/sti/2022/10103268/1MBEZhbA1u8", "parentPublication": { "id": "proceedings/sti/2022/9045/0", "title": "2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400a936", "title": "Indoor Electronic Traveling Aids for Visually Impaired: Systemic Review", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400a936/1jdDS4l7A3u", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iTvczdcyc0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "8972688", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iTvkpsDyY8", "doi": "10.1109/CVPRW.2019.00035", "title": "Modelling Multi-Channel Emotions Using Facial Expression and Trajectory Cues for Improving Socially-Aware Robot Navigation", "normalizedTitle": "Modelling Multi-Channel Emotions Using Facial Expression and Trajectory Cues for Improving Socially-Aware Robot Navigation", "abstract": "Using facial expressions and trajectory signals, we present an emotion-aware navigation algorithm for social robots. Our approach uses a combination of Bayesian-inference, CNN-based learning and the Pleasure-Arousal-Dominance model from psychology to estimate time-varying emotional behaviors of pedestrians from their faces and trajectories. For each pedestrian, these PAD characteristics are used to generate proxemic constraints. We use a multi-channel model to classify pedestrian features into four categories of emotions (happy, sad, angry, neutral). We observe an emotional detection accuracy of 85.33% in our validation results. In low-to medium-density environments, we formulate emotion-based proxemic constraints to perform socially conscious robot navigation. With Pepper, a social humanoid robot, we demonstrate the benefits of our algorithm in simulated environments with tens of pedestrians as well as in a real world setting.", "abstracts": [ { "abstractType": "Regular", "content": "Using facial expressions and trajectory signals, we present an emotion-aware navigation algorithm for social robots. Our approach uses a combination of Bayesian-inference, CNN-based learning and the Pleasure-Arousal-Dominance model from psychology to estimate time-varying emotional behaviors of pedestrians from their faces and trajectories. For each pedestrian, these PAD characteristics are used to generate proxemic constraints. We use a multi-channel model to classify pedestrian features into four categories of emotions (happy, sad, angry, neutral). We observe an emotional detection accuracy of 85.33% in our validation results. In low-to medium-density environments, we formulate emotion-based proxemic constraints to perform socially conscious robot navigation. With Pepper, a social humanoid robot, we demonstrate the benefits of our algorithm in simulated environments with tens of pedestrians as well as in a real world setting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Using facial expressions and trajectory signals, we present an emotion-aware navigation algorithm for social robots. Our approach uses a combination of Bayesian-inference, CNN-based learning and the Pleasure-Arousal-Dominance model from psychology to estimate time-varying emotional behaviors of pedestrians from their faces and trajectories. For each pedestrian, these PAD characteristics are used to generate proxemic constraints. We use a multi-channel model to classify pedestrian features into four categories of emotions (happy, sad, angry, neutral). We observe an emotional detection accuracy of 85.33% in our validation results. In low-to medium-density environments, we formulate emotion-based proxemic constraints to perform socially conscious robot navigation. With Pepper, a social humanoid robot, we demonstrate the benefits of our algorithm in simulated environments with tens of pedestrians as well as in a real world setting.", "fno": "250600a257", "keywords": [ "Belief Networks", "Convolutional Neural Nets", "Emotion Recognition", "Face Recognition", "Feature Extraction", "Humanoid Robots", "Human Robot Interaction", "Image Classification", "Inference Mechanisms", "Learning Artificial Intelligence", "Mobile Robots", "Object Detection", "Robot Vision", "Time Varying Emotional Behaviors", "Multichannel Emotion Modelling", "Pleasure Arousal Dominance Model", "Emotional Detection Accuracy", "Pedestrian Feature Classification", "Multichannel Model", "PAD Characteristics", "CNN Based Learning", "Bayesian Inference", "Emotion Aware Navigation Algorithm", "Trajectory Signals", "Facial Expressions", "Improving Socially Aware Robot Navigation", "Trajectory Cues", "Social Humanoid Robot", "Socially Conscious Robot Navigation", "Emotion Based Proxemic Constraints", "Medium Density Environments", "Navigation", "Trajectory", "Collision Avoidance", "Legged Locomotion", "Prediction Algorithms", "Predictive Models" ], "authors": [ { "affiliation": "University of North Carolina", "fullName": "Aniket Bera", "givenName": "Aniket", "surname": "Bera", "__typename": "ArticleAuthorType" }, { "affiliation": "University of North Carolina", "fullName": "Tanmay Randhavane", "givenName": "Tanmay", "surname": "Randhavane", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland", "fullName": "Dinesh Manocha", "givenName": "Dinesh", "surname": "Manocha", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "257-266", "year": "2019", "issn": null, "isbn": "978-1-7281-2506-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250600a246", "articleId": "1iTvokzvgY0", "__typename": "AdjacentArticleType" }, "next": { "fno": "250600a267", "articleId": "1iTvnmY1yy4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892235", "title": "An evaluation of strategies for two-user redirected walking in shared physical spaces", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892235/12OmNy87Qwg", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2011/0774/0/05959608", "title": "Indoor-Outdoor Navigation System for Visually-Impaired Pedestrians: Preliminary Evaluation of Position Measurement and Obstacle Display", "doi": null, "abstractUrl": "/proceedings-article/iswc/2011/05959608/12OmNyUnEET", "parentPublication": { "id": "proceedings/iswc/2011/0774/0", "title": "2011 15th Annual International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/07/07955099", "title": "Collision Avoidance Behavior between Walkers: Global and Local Motion Cues", "doi": null, "abstractUrl": "/journal/tg/2018/07/07955099/13rRUxcbnHk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000f275", "title": "Encoding Crowd Interaction with Deep Neural Network for Pedestrian Trajectory Prediction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000f275/17D45W2WyzF", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b152", "title": "Classifying Group Emotions for Socially-Aware Autonomous Vehicle Navigation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b152/17D45WHONnG", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ds-rt/2022/9799/0/09932038", "title": "A Pedestrian Movement Model for 3D Visualization in a Driving Simulation Environment", "doi": null, "abstractUrl": "/proceedings-article/ds-rt/2022/09932038/1HWPYmJdHpu", "parentPublication": { "id": "proceedings/ds-rt/2022/9799/0", "title": "2022 IEEE/ACM 26th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2022/3197/0/319700a228", "title": "Interactive Robot Navigation in Crowded Pedestrian Environments Based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/cecit/2022/319700a228/1M66MeSqPyE", "parentPublication": { "id": "proceedings/cecit/2022/3197/0", "title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089637", "title": "Eye-Gaze Activity in Crowds: Impact of Virtual Reality and Density", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089637/1jIx9WIWd5C", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a894", "title": "How are you feeling? Multimodal Emotion Learning for Socially-Assistive Robot Navigation", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a894/1kecJ54CiVW", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i990", "title": "SGCN:Sparse Graph Convolution Network for Pedestrian Trajectory Prediction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i990/1yeJHSeK6B2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzy7uOF", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYXWIx", "doi": "10.1109/IV.2004.1320184", "title": "Time-tunnel: Visual Analysis Tool for Time-series Numerical Data and Its Aspects as Multimedia Presentation Tool", "normalizedTitle": "Time-tunnel: Visual Analysis Tool for Time-series Numerical Data and Its Aspects as Multimedia Presentation Tool", "abstract": "This paper proposes a new data analysis tool called Time-tunnel. Time-tunnel visualizes any numbers of time-series numerical data as individual charts in a 3D virtual space. Through direct manipulations on a computer screen, the user easily puts more than two different charts overlapped together to compare them in order to recognize the similarity or the difference among those data. Simultaneously a radar chart among those data at any time point is displayed to recognize the similarity and the correlation among them. In this way, using Time-tunnel, the user can visually analyse multiple time-series numerical data through interactive manipulations on a computer screen. Time-tunnel has not only aspects as a data analysis tool but also aspects as a chart-based multimedia presentation tool because Time-tunnel also treats multimedia data, i.e., texts, images, sounds and movies, as additional information represented by tags located at any point of charts. In this paper, the authors also describe the usefulness of Time-tunnel as a multimedia presentation tool.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a new data analysis tool called Time-tunnel. Time-tunnel visualizes any numbers of time-series numerical data as individual charts in a 3D virtual space. Through direct manipulations on a computer screen, the user easily puts more than two different charts overlapped together to compare them in order to recognize the similarity or the difference among those data. Simultaneously a radar chart among those data at any time point is displayed to recognize the similarity and the correlation among them. In this way, using Time-tunnel, the user can visually analyse multiple time-series numerical data through interactive manipulations on a computer screen. Time-tunnel has not only aspects as a data analysis tool but also aspects as a chart-based multimedia presentation tool because Time-tunnel also treats multimedia data, i.e., texts, images, sounds and movies, as additional information represented by tags located at any point of charts. In this paper, the authors also describe the usefulness of Time-tunnel as a multimedia presentation tool.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a new data analysis tool called Time-tunnel. Time-tunnel visualizes any numbers of time-series numerical data as individual charts in a 3D virtual space. Through direct manipulations on a computer screen, the user easily puts more than two different charts overlapped together to compare them in order to recognize the similarity or the difference among those data. Simultaneously a radar chart among those data at any time point is displayed to recognize the similarity and the correlation among them. In this way, using Time-tunnel, the user can visually analyse multiple time-series numerical data through interactive manipulations on a computer screen. Time-tunnel has not only aspects as a data analysis tool but also aspects as a chart-based multimedia presentation tool because Time-tunnel also treats multimedia data, i.e., texts, images, sounds and movies, as additional information represented by tags located at any point of charts. In this paper, the authors also describe the usefulness of Time-tunnel as a multimedia presentation tool.", "fno": "21770456", "keywords": [ "Visualization Tool", "Analysis Tool", "Multi Charts Tool", "Multimedia Presentation Tool", "Intelligent Box" ], "authors": [ { "affiliation": "RCAST, University of Tokyo, Japan", "fullName": "Mina Akaishi", "givenName": "Mina", "surname": "Akaishi", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu University, Japan", "fullName": "Yoshihiro Okada", "givenName": "Yoshihiro", "surname": "Okada", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-07-01T00:00:00", "pubType": "proceedings", "pages": "456-461", "year": "2004", "issn": "1093-9547", "isbn": "0-7695-2177-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "21770450", "articleId": "12OmNqzu6W0", "__typename": "AdjacentArticleType" }, "next": { "fno": "21770465", "articleId": "12OmNAT0mSY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2015/7568/0/7568a095", "title": "Web Based Time-Tunnel: An Interactive Multidimensional Data Visualization Tool Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a095/12OmNAlvHS8", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2005/2392/0/01521058", "title": "Time-tunnel: visual analysis tool for time-series numerical data and its extension toward parallel coordinates", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2005/01521058/12OmNB9t6jg", "parentPublication": { "id": "proceedings/cgiv/2005/2392/0", "title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcsw/2004/2087/1/208710202", "title": "MPML-FLASH: A Multimodal Presentation Markup Language with Character Agent Control in Flash Medium", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2004/208710202/12OmNBsue9S", "parentPublication": { "id": "proceedings/icdcsw/2004/2087/1", "title": "24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/1995/6902/0/69020297", "title": "SPLAT: a standard-to-standard real-time graphical scheduling and code generation tool", "doi": null, "abstractUrl": "/proceedings-article/mascots/1995/69020297/12OmNBubOWa", "parentPublication": { "id": "proceedings/mascots/1995/6902/0", "title": "MASCOTS '95. Proceedings of the Third International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1997/8262/0/82620417", "title": "exVis: developing a wind tunnel data visualization tool", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1997/82620417/12OmNqJZgyR", "parentPublication": { "id": "proceedings/ieee-vis/1997/8262/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2009/3634/4/3634d308", "title": "Simulation Model of Gas Migration and Hindering in Underground Tunnel Based on LBM", "doi": null, "abstractUrl": "/proceedings-article/icic/2009/3634d308/12OmNwDj16i", "parentPublication": { "id": "proceedings/icic/2009/3634/4", "title": "2009 Second International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2002/1862/0/18620209", "title": "Adaptive Content Model for Multimedia Presentation", "doi": null, "abstractUrl": "/proceedings-article/cw/2002/18620209/12OmNwnH4Rn", "parentPublication": { "id": "proceedings/cw/2002/1862/0", "title": "First International Symposium on Cyber Worlds, 2002. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pads/1995/7120/0/71200191", "title": "XTracker, a graphical tool for parallel simulations", "doi": null, "abstractUrl": "/proceedings-article/pads/1995/71200191/12OmNz2kqjL", "parentPublication": { "id": "proceedings/pads/1995/7120/0", "title": "Proceedings 9th Workshop on Parallel and Distributed Simulation (ACM/IEEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539661", "title": "Optimally Ensured Interactive Service in Distributed Multimedia Presentation Systems", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539661/12OmNzAohQ5", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a050", "title": "Time-Tunnel: 3D Visualization Tool and Its Aspects as 3D Parallel Coordinates", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a050/17D45WHONo5", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvA1hvh", "title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on", "acronym": "3pgcic", "groupId": "1800224", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOllp3", "doi": "10.1109/3PGCIC.2010.81", "title": "Digesting Online Multimedia Presentation Archives Based on Visual Effects", "normalizedTitle": "Digesting Online Multimedia Presentation Archives Based on Visual Effects", "abstract": "Online video archives provide a large amount of multimedia presentation contents through the Internet. But, it takes a long time to find what they really want to watch from a lot of presentation videos. We have been developing a system to summarize multiple presentation contents that match given keywords. In this paper, we intends to obtain a interesting digest including visually attractive scenes instead of generating a sketch of presentation contents. We propose methods to calculate the importance of scenes by considering color distribution and animation occurrence. Finally, we evaluate the effectiveness of the proposed methods.", "abstracts": [ { "abstractType": "Regular", "content": "Online video archives provide a large amount of multimedia presentation contents through the Internet. But, it takes a long time to find what they really want to watch from a lot of presentation videos. We have been developing a system to summarize multiple presentation contents that match given keywords. In this paper, we intends to obtain a interesting digest including visually attractive scenes instead of generating a sketch of presentation contents. We propose methods to calculate the importance of scenes by considering color distribution and animation occurrence. Finally, we evaluate the effectiveness of the proposed methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Online video archives provide a large amount of multimedia presentation contents through the Internet. But, it takes a long time to find what they really want to watch from a lot of presentation videos. We have been developing a system to summarize multiple presentation contents that match given keywords. In this paper, we intends to obtain a interesting digest including visually attractive scenes instead of generating a sketch of presentation contents. We propose methods to calculate the importance of scenes by considering color distribution and animation occurrence. Finally, we evaluate the effectiveness of the proposed methods.", "fno": "4237a477", "keywords": [ "Video Archives", "Digest Generation", "Presentation Contents" ], "authors": [ { "affiliation": null, "fullName": "Yousuke Watanabe", "givenName": "Yousuke", "surname": "Watanabe", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi Wu", "givenName": "Yi", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Haruo Yokota", "givenName": "Haruo", "surname": "Yokota", "__typename": "ArticleAuthorType" } ], "idPrefix": "3pgcic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-11-01T00:00:00", "pubType": "proceedings", "pages": "477-482", "year": "2010", "issn": null, "isbn": "978-0-7695-4237-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4237a471", "articleId": "12OmNy2agWH", "__typename": "AdjacentArticleType" }, "next": { "fno": "4237a483", "articleId": "12OmNzvhvxM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dante/1999/0496/0/04960143", "title": "Creating Multimedia Presentation Based on Constraint Satisfaction Problems in Multimedia Databases", "doi": null, "abstractUrl": "/proceedings-article/dante/1999/04960143/12OmNA14A8e", "parentPublication": { "id": "proceedings/dante/1999/0496/0", "title": "Database Applications in Non-Traditional Environments, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2001/0981/4/09814043", "title": "A TV Program Generation System using Digest of Video Scenes and a Scripting Markup Language", "doi": null, "abstractUrl": "/proceedings-article/hicss/2001/09814043/12OmNAKcNLV", "parentPublication": { "id": "proceedings/hicss/2001/0981/4", "title": "Proceedings of the 34th Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2006/0256/0/04117231", "title": "Work in Progress: Sharing Learning Resources in the Development of an Online Engineering Presentations Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2006/04117231/12OmNAXxXd6", "parentPublication": { "id": "proceedings/fie/2006/0256/0", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a590", "title": "Automatic Digest Generation by Extracting Important Scenes from the Content of Presentations", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a590/12OmNB0nWho", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/c5/2009/3620/0/3620a128", "title": "A Scene Extracting Method Based on Structural and Semantic Analysis of Presentation Content Archives", "doi": null, "abstractUrl": "/proceedings-article/c5/2009/3620a128/12OmNrFkeQl", "parentPublication": { "id": "proceedings/c5/2009/3620/0", "title": "2009 Seventh International Conference on Creating, Connecting and Collaborating through Computing (C5 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2005/9331/0/01521426", "title": "Free viewpoint video synthesis and presentation from multiple sporting videos", "doi": null, "abstractUrl": "/proceedings-article/icme/2005/01521426/12OmNwcCILL", "parentPublication": { "id": "proceedings/icme/2005/9331/0", "title": "2005 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2002/1862/0/18620209", "title": "Adaptive Content Model for Multimedia Presentation", "doi": null, "abstractUrl": "/proceedings-article/cw/2002/18620209/12OmNwnH4Rn", "parentPublication": { "id": "proceedings/cw/2002/1862/0", "title": "First International Symposium on Cyber Worlds, 2002. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wise/2001/1393/1/13931083", "title": "Digest Making Method Based on Turning Point Analysis", "doi": null, "abstractUrl": "/proceedings-article/wise/2001/13931083/12OmNxETaeV", "parentPublication": { "id": "proceedings/wise/2001/1393/1", "title": "Proceedings of 2nd International Conference on Web Information Systems Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/1997/02/u2067", "title": "IMMPS: A Multimedia Presentation Design System", "doi": null, "abstractUrl": "/magazine/mu/1997/02/u2067/13rRUwd9CIg", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2002/05/k1059", "title": "Presentation Planning for Distributed VoD Systems", "doi": null, "abstractUrl": "/journal/tk/2002/05/k1059/13rRUxly95T", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC8uRrL", "title": "2014 IT Professional Conference (IT Pro)", "acronym": "it-pro", "groupId": "1805364", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJ11Id", "doi": "10.1109/ITPRO.2014.7029282", "title": "Presentation 2. Enterprise governance model for hybrid cloud", "normalizedTitle": "Presentation 2. Enterprise governance model for hybrid cloud", "abstract": "Enterprises are evaluating various forms of cloud adoption to find paths for more effective and efficient use of their existing compute, storage and networking resources. The rise in Hybrid Cloud has allowed enterprises to realize acceptable and innovative use of cloud computing in more commendable manner. Some of the key scenarios where Hybrid Cloud can be adopted by enterprises are: • Data Security is a concern and enterprises are not ready to move sensitive enterprise data onto the cloud • Dealing with complex interrelationships within the enterprise systems which are currently on-premise. Hybrid cloud allows continuing with on-premise enterprise systems and leverage web-scale computing power from cloud in a cohesive and integrated manner • Larger enterprises which have an enormous amount of data crossing hexabytes and have constraints moving the same to cloud but, wants to use the computing power through resources provided on cloud for analytics and other innovative business needs This presentation discusses the governance model that enables hybrid cloud in enterprises. It looks at the delivery models, risks and mitigation during Hybrid cloud implementation. It provides the practical insights on choosing Hybrid cloud as a strategic option supported by use cases. It also provides the best practices and benefits aligned with governance model while implementing hybrid cloud. High Level Agenda of presentation: • Why Organizations are going to Cloud • Need for Governance for Cloud Adoption • Hybrid Cloud — Need of the hour • IT Governance — Cloud Governance — Hybrid Cloud Governance ▪ Relationship ▪ Process Attributes • Hybrid Cloud — Pre Governance & Active Governance Needs • Hybrid — Governance Model • Hybrid Cloud — Governance Board • Hybrid Cloud — Strategic Option for Enterprises • Different Use Cases for Hybrid Cloud • Best Practices for Implementation through Hybrid Cloud • Benefits of going for Hybrid Cloud • Case study for a Hybrid Cloud Scenario.", "abstracts": [ { "abstractType": "Regular", "content": "Enterprises are evaluating various forms of cloud adoption to find paths for more effective and efficient use of their existing compute, storage and networking resources. The rise in Hybrid Cloud has allowed enterprises to realize acceptable and innovative use of cloud computing in more commendable manner. Some of the key scenarios where Hybrid Cloud can be adopted by enterprises are: • Data Security is a concern and enterprises are not ready to move sensitive enterprise data onto the cloud • Dealing with complex interrelationships within the enterprise systems which are currently on-premise. Hybrid cloud allows continuing with on-premise enterprise systems and leverage web-scale computing power from cloud in a cohesive and integrated manner • Larger enterprises which have an enormous amount of data crossing hexabytes and have constraints moving the same to cloud but, wants to use the computing power through resources provided on cloud for analytics and other innovative business needs This presentation discusses the governance model that enables hybrid cloud in enterprises. It looks at the delivery models, risks and mitigation during Hybrid cloud implementation. It provides the practical insights on choosing Hybrid cloud as a strategic option supported by use cases. It also provides the best practices and benefits aligned with governance model while implementing hybrid cloud. High Level Agenda of presentation: • Why Organizations are going to Cloud • Need for Governance for Cloud Adoption • Hybrid Cloud — Need of the hour • IT Governance — Cloud Governance — Hybrid Cloud Governance ▪ Relationship ▪ Process Attributes • Hybrid Cloud — Pre Governance & Active Governance Needs • Hybrid — Governance Model • Hybrid Cloud — Governance Board • Hybrid Cloud — Strategic Option for Enterprises • Different Use Cases for Hybrid Cloud • Best Practices for Implementation through Hybrid Cloud • Benefits of going for Hybrid Cloud • Case study for a Hybrid Cloud Scenario.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Enterprises are evaluating various forms of cloud adoption to find paths for more effective and efficient use of their existing compute, storage and networking resources. The rise in Hybrid Cloud has allowed enterprises to realize acceptable and innovative use of cloud computing in more commendable manner. Some of the key scenarios where Hybrid Cloud can be adopted by enterprises are: • Data Security is a concern and enterprises are not ready to move sensitive enterprise data onto the cloud • Dealing with complex interrelationships within the enterprise systems which are currently on-premise. Hybrid cloud allows continuing with on-premise enterprise systems and leverage web-scale computing power from cloud in a cohesive and integrated manner • Larger enterprises which have an enormous amount of data crossing hexabytes and have constraints moving the same to cloud but, wants to use the computing power through resources provided on cloud for analytics and other innovative business needs This presentation discusses the governance model that enables hybrid cloud in enterprises. It looks at the delivery models, risks and mitigation during Hybrid cloud implementation. It provides the practical insights on choosing Hybrid cloud as a strategic option supported by use cases. It also provides the best practices and benefits aligned with governance model while implementing hybrid cloud. High Level Agenda of presentation: • Why Organizations are going to Cloud • Need for Governance for Cloud Adoption • Hybrid Cloud — Need of the hour • IT Governance — Cloud Governance — Hybrid Cloud Governance ▪ Relationship ▪ Process Attributes • Hybrid Cloud — Pre Governance & Active Governance Needs • Hybrid — Governance Model • Hybrid Cloud — Governance Board • Hybrid Cloud — Strategic Option for Enterprises • Different Use Cases for Hybrid Cloud • Best Practices for Implementation through Hybrid Cloud • Benefits of going for Hybrid Cloud • Case study for a Hybrid Cloud Scenario.", "fno": "07029282", "keywords": [ "Computational Modeling", "Cloud Computing", "Hybrid Power Systems", "Best Practices", "Certification", "Java" ], "authors": [ { "affiliation": "Tata Consultancy Services, India", "fullName": "Naga Venkata Sudhakar Kolluru", "givenName": "Naga Venkata Sudhakar", "surname": "Kolluru", "__typename": "ArticleAuthorType" } ], "idPrefix": "it-pro", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-05-01T00:00:00", "pubType": "proceedings", "pages": "1-3", "year": "2014", "issn": null, "isbn": "978-1-4799-4141-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07029281", "articleId": "12OmNC2OSOc", "__typename": "AdjacentArticleType" }, "next": { "fno": "07029283", "articleId": "12OmNyqRnan", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/it-pro/2014/4141/0/07029284", "title": "Presentation 3. Governance in enterprise crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/it-pro/2014/07029284/12OmNARiM4J", "parentPublication": { "id": "proceedings/it-pro/2014/4141/0", "title": "2014 IT Professional Conference (IT Pro)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/it-pro/2014/4141/0/07029285", "title": "Governance of Enterprise Crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/it-pro/2014/07029285/12OmNC0PGN8", "parentPublication": { "id": "proceedings/it-pro/2014/4141/0", "title": "2014 IT Professional Conference (IT Pro)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2012/5638/0/06406300", "title": "The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2012/06406300/12OmNqGA540", "parentPublication": { "id": "proceedings/passat-socialcom/2012/5638/0", "title": "2012 International Conference on Privacy, Security, Risk and Trust (PASSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa/2012/1631/0/06280329", "title": "Service Datastores in Cloud Governance", "doi": null, "abstractUrl": "/proceedings-article/ispa/2012/06280329/12OmNqJq4Cj", "parentPublication": { "id": "proceedings/ispa/2012/1631/0", "title": "2012 IEEE 10th International Symposium on Parallel and Distributed Processing with Applications (ISPA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2012/4897/0/4897a325", "title": "An ITIL v3-Based Solution to SOA Governance", "doi": null, "abstractUrl": "/proceedings-article/apscc/2012/4897a325/12OmNvT2phR", "parentPublication": { "id": "proceedings/apscc/2012/4897/0", "title": "2012 IEEE Asia-Pacific Services Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2012/5026/0/06481071", "title": "Service Brokering in Cloud Governance", "doi": null, "abstractUrl": "/proceedings-article/synasc/2012/06481071/12OmNwfKjc4", "parentPublication": { "id": "proceedings/synasc/2012/5026/0", "title": "2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2013/2081/0/2081a462", "title": "Cloud Governance - The Relevance of Cloud Brokers", "doi": null, "abstractUrl": "/proceedings-article/icpads/2013/2081a462/12OmNxisQVB", "parentPublication": { "id": "proceedings/icpads/2013/2081/0", "title": "2013 International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/it-pro/2014/4141/0/07029283", "title": "Enterprise governance model for hybrid cloud: IT Professional Conference @ National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA", "doi": null, "abstractUrl": "/proceedings-article/it-pro/2014/07029283/12OmNyqRnan", "parentPublication": { "id": "proceedings/it-pro/2014/4141/0", "title": "2014 IT Professional Conference (IT Pro)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2009/3705/0/3705a782", "title": "The Relationship between Corporate Governance and Corporate Performance in China's Civilian-Owned Listed Enterprise", "doi": null, "abstractUrl": "/proceedings-article/bife/2009/3705a782/12OmNzd7bwy", "parentPublication": { "id": "proceedings/bife/2009/3705/0", "title": "2009 International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cd/2016/01/mcd2016010082", "title": "The Hybrid Cloud Security Professional", "doi": null, "abstractUrl": "/magazine/cd/2016/01/mcd2016010082/13rRUx0xPyA", "parentPublication": { "id": "mags/cd", "title": "IEEE Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBfZSj8", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvjgWXB", "doi": "10.1109/VAST.2012.6400523", "title": "OWLAP — Using OLAP approach in anomaly detection: Award: Good support for the data preparation, analysis, and presentation process", "normalizedTitle": "OWLAP — Using OLAP approach in anomaly detection: Award: Good support for the data preparation, analysis, and presentation process", "abstract": "OWLAP (Operative Workbench for Large-scale Analytics and Presentation) is a visual analytics tool that allows the user to browse and drill down the multidimensional data on-line with the possibility to export result into a zooming presentation framework. We address the challenges of multidimensional visualization by aiding the cognitively hard task of understanding attributes, finding patterns and outliers. We successfully solved the challenge of real time Big Data OLAP reporting by a home developed multithreaded inmemory database manager. Our additional focus is the automatic management of summary preparation that we aid by scripting the presentation framework of Prezi Inc.", "abstracts": [ { "abstractType": "Regular", "content": "OWLAP (Operative Workbench for Large-scale Analytics and Presentation) is a visual analytics tool that allows the user to browse and drill down the multidimensional data on-line with the possibility to export result into a zooming presentation framework. We address the challenges of multidimensional visualization by aiding the cognitively hard task of understanding attributes, finding patterns and outliers. We successfully solved the challenge of real time Big Data OLAP reporting by a home developed multithreaded inmemory database manager. Our additional focus is the automatic management of summary preparation that we aid by scripting the presentation framework of Prezi Inc.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "OWLAP (Operative Workbench for Large-scale Analytics and Presentation) is a visual analytics tool that allows the user to browse and drill down the multidimensional data on-line with the possibility to export result into a zooming presentation framework. We address the challenges of multidimensional visualization by aiding the cognitively hard task of understanding attributes, finding patterns and outliers. We successfully solved the challenge of real time Big Data OLAP reporting by a home developed multithreaded inmemory database manager. Our additional focus is the automatic management of summary preparation that we aid by scripting the presentation framework of Prezi Inc.", "fno": "06400523", "keywords": [ "H 5 2 Information Systems Information Interfaces And Presentation User Interfaces", "H 2 1 Information Systems Database Management Logical Design" ], "authors": [ { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "A. Szabo", "givenName": "A.", "surname": "Szabo", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "A. Salanki", "givenName": "A.", "surname": "Salanki", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "A. Radnai", "givenName": "A.", "surname": "Radnai", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "J. Gobolos-Szabo", "givenName": "J.", "surname": "Gobolos-Szabo", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "Zs. Fekete", "givenName": "Zs.", "surname": "Fekete", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "L. Dudas", "givenName": "L.", "surname": "Dudas", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Automation Research Institute (MTA SZTAKI), Hungarian Academy of Sciences", "fullName": "G. Szucs", "givenName": "G.", "surname": "Szucs", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "267-268", "year": "2012", "issn": null, "isbn": "978-1-4673-4752-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06400522", "articleId": "12OmNx4gUoB", "__typename": "AdjacentArticleType" }, "next": { "fno": "06400524", "articleId": "12OmNzE54Hu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400525", "title": "Visual analytics for situation awareness of a large-scale network: VAST 2012 Mini Challenge #1 award: “Effective video presentation”", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400525/12OmNB6UI9w", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2011/4373/0/4373a589", "title": "An Avatar-based Interface for the Italian Sign Language", "doi": null, "abstractUrl": "/proceedings-article/cisis/2011/4373a589/12OmNBEpnvg", "parentPublication": { "id": "proceedings/cisis/2011/4373/0", "title": "2011 International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400515", "title": "Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400515/12OmNBNM8T6", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400506", "title": "Visual analytics for network security", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400506/12OmNC3o50f", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400557", "title": "Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400557/12OmNCdTeNI", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400493", "title": "An adaptive parameter space-filling algorithm for highly interactive cluster exploration", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400493/12OmNxymodS", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400518", "title": "HIVEBEAT — A highly interactive visualization environment for broad-scale exploratory analysis and tracing: VAST 2012 Mini Challenge 1 award: Honorable mention for comprehensive visualization suite", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400518/12OmNyS6RMt", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400503", "title": "situ: Situational understanding and discovery for cyber attacks", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400503/12OmNzJbQU8", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400547", "title": "Augmenting visual representation of affectively charged information using sound graphs", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400547/12OmNzWfoWT", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2007/03/w3059", "title": "Understanding UI Integration: A Survey of Problems, Technologies, and Opportunities", "doi": null, "abstractUrl": "/magazine/ic/2007/03/w3059/13rRUwcAqtS", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyGbI4V", "title": "2016 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNy4r3OB", "doi": "10.1109/ICME.2016.7552974", "title": "Automatic suggestion of presentation image for storytelling", "normalizedTitle": "Automatic suggestion of presentation image for storytelling", "abstract": "Digital storytelling applications are playing an increasingly important role in people's daily life. In contemporary storytelling applications such as PowerPoint presentation and macro/micro blogs, good presentation images are always highly desired by content creators to boost their presentation in an intuitive and attractive way. Existing studies, however, have not yet addressed the challenging problem of how to select the most appropriate presentation images for storytelling. In this paper, we formulate this problem of presentation image suggestion (given a textual query) as selecting images by maximizing visual and semantic diversity from web image search results of suggested queries. The proposed framework consists of two novel components: 1) click-through-based query suggestion, which is designed to suggest textual queries by searching relevant queries in a constructed query graph that can reflect diverse aspects of a given query, and 2) query-based image selection, which selects the most appropriate presentation images by keeping semantic relevance while maximizing visual diversity and quality, using a novel model based on Conditional Random Field (CRF) by individual and correlation characters. We evaluate the proposed approach by comparing with several baselines and a thorough subjective survey. The evaluations show inspiring results using the proposed approach for automatic suggestion of images for storytelling.", "abstracts": [ { "abstractType": "Regular", "content": "Digital storytelling applications are playing an increasingly important role in people's daily life. In contemporary storytelling applications such as PowerPoint presentation and macro/micro blogs, good presentation images are always highly desired by content creators to boost their presentation in an intuitive and attractive way. Existing studies, however, have not yet addressed the challenging problem of how to select the most appropriate presentation images for storytelling. In this paper, we formulate this problem of presentation image suggestion (given a textual query) as selecting images by maximizing visual and semantic diversity from web image search results of suggested queries. The proposed framework consists of two novel components: 1) click-through-based query suggestion, which is designed to suggest textual queries by searching relevant queries in a constructed query graph that can reflect diverse aspects of a given query, and 2) query-based image selection, which selects the most appropriate presentation images by keeping semantic relevance while maximizing visual diversity and quality, using a novel model based on Conditional Random Field (CRF) by individual and correlation characters. We evaluate the proposed approach by comparing with several baselines and a thorough subjective survey. The evaluations show inspiring results using the proposed approach for automatic suggestion of images for storytelling.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Digital storytelling applications are playing an increasingly important role in people's daily life. In contemporary storytelling applications such as PowerPoint presentation and macro/micro blogs, good presentation images are always highly desired by content creators to boost their presentation in an intuitive and attractive way. Existing studies, however, have not yet addressed the challenging problem of how to select the most appropriate presentation images for storytelling. In this paper, we formulate this problem of presentation image suggestion (given a textual query) as selecting images by maximizing visual and semantic diversity from web image search results of suggested queries. The proposed framework consists of two novel components: 1) click-through-based query suggestion, which is designed to suggest textual queries by searching relevant queries in a constructed query graph that can reflect diverse aspects of a given query, and 2) query-based image selection, which selects the most appropriate presentation images by keeping semantic relevance while maximizing visual diversity and quality, using a novel model based on Conditional Random Field (CRF) by individual and correlation characters. We evaluate the proposed approach by comparing with several baselines and a thorough subjective survey. The evaluations show inspiring results using the proposed approach for automatic suggestion of images for storytelling.", "fno": "07552974", "keywords": [ "Semantics", "Visualization", "Search Problems", "Search Engines", "Blogs", "Multimedia Communication", "Biomedical Imaging", "Storytelling", "Multimedia Presentation", "Query Suggestion", "Image Suggestion" ], "authors": [ { "affiliation": "State University of New York at Buffalo, NY, USA", "fullName": "Yu Liu", "givenName": "Yu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft Research Asia, Beijing, P. R. China", "fullName": "Tao Mei", "givenName": "Tao", "surname": "Mei", "__typename": "ArticleAuthorType" }, { "affiliation": "State University of New York at Buffalo, NY, USA", "fullName": "Chang Wen Chen", "givenName": "Chang Wen", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2016", "issn": "1945-788X", "isbn": "978-1-4673-7258-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07552973", "articleId": "12OmNCdk2UI", "__typename": "AdjacentArticleType" }, "next": { "fno": "07552975", "articleId": "12OmNyvoXby", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dexa/2009/3763/0/3763a274", "title": "Multimodal Query Suggestion and Searching for Video Search", "doi": null, "abstractUrl": "/proceedings-article/dexa/2009/3763a274/12OmNAS9zIZ", "parentPublication": { "id": "proceedings/dexa/2009/3763/0", "title": "2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2017/5507/0/07960002", "title": "A query suggestion method based on random walk and topic concepts", "doi": null, "abstractUrl": "/proceedings-article/icis/2017/07960002/12OmNApLGA0", "parentPublication": { "id": "proceedings/icis/2017/5507/0", "title": "2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2011/4557/0/4557a001", "title": "A Social-Knowledge-Directed Query Suggestion Approach for Exploratory Search", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2011/4557a001/12OmNBNM91e", "parentPublication": { "id": "proceedings/cyberc/2011/4557/0", "title": "2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816668", "title": "Personalized Query Suggestion With Diversity Awareness", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816668/12OmNBc1uxZ", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2015/6564/2/6564b822", "title": "Pythia: A Privacy-Enhanced Personalized Contextual Suggestion System for Tourism", "doi": null, "abstractUrl": "/proceedings-article/compsac/2015/6564b822/12OmNrAv3X7", "parentPublication": { "id": "compsac/2015/6564/2", "title": "2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2017/2937/0/2937a284", "title": "A Color Prediction System for Interactive Drawing Based Image Retrieval on Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a284/12OmNrMZpnO", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a647", "title": "Quantum Path Integral Inspired Query Sequence Suggestion for User Search Task Simplification", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a647/12OmNvlPkwR", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2008/3503/0/3503a884", "title": "An Efficient Search Algorithm for Content-Based Image Retrieval with User Feedback", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2008/3503a884/12OmNz6iOaK", "parentPublication": { "id": "proceedings/icdmw/2008/3503/0", "title": "2008 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2015/03/07350210", "title": "Exploration of Image Search Results Quality Assessment", "doi": null, "abstractUrl": "/journal/bd/2015/03/07350210/13rRUzphDs2", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09495286", "title": "It Runs in the Family: Unsupervised Algorithm for Alternative Name Suggestion Using Digitized Family Trees", "doi": null, "abstractUrl": "/journal/tk/2023/02/09495286/1vyjfHj30kM", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyGbI4W", "title": "2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)", "acronym": "imis", "groupId": "1800457", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNy5R3qj", "doi": "10.1109/IMIS.2016.79", "title": "Automatic Synthesis of Best Practices for Energy Consumptions", "normalizedTitle": "Automatic Synthesis of Best Practices for Energy Consumptions", "abstract": "Conflicting rules and rules with exceptions are very common in natural language specification to describe the behaviour of devices operating in a real-world context. This is common exactly because those specifications are processed by humans, and humans apply common sense and strategic reasoning about those rules. In this paper, we deal with the challenge of providing, step by step, a model of energy saving rule specification and processing methods that are used to reduce the consumptions of a system of devices. We argue that a very promising non-monotonic approach to such a problem can lie upon Defeasible Logic. Starting with rules specified at an abstract level, but compatibly with the natural aspects of such a specification (including temporal and power absorption constraints), we provide a formalism that generates the extension of a basic defeasible logic, which corresponds to turned on or off devices. We define a procedure to achieve automatic synthesis of best practices, to be used as rules to obtain savings in electric consumptions.", "abstracts": [ { "abstractType": "Regular", "content": "Conflicting rules and rules with exceptions are very common in natural language specification to describe the behaviour of devices operating in a real-world context. This is common exactly because those specifications are processed by humans, and humans apply common sense and strategic reasoning about those rules. In this paper, we deal with the challenge of providing, step by step, a model of energy saving rule specification and processing methods that are used to reduce the consumptions of a system of devices. We argue that a very promising non-monotonic approach to such a problem can lie upon Defeasible Logic. Starting with rules specified at an abstract level, but compatibly with the natural aspects of such a specification (including temporal and power absorption constraints), we provide a formalism that generates the extension of a basic defeasible logic, which corresponds to turned on or off devices. We define a procedure to achieve automatic synthesis of best practices, to be used as rules to obtain savings in electric consumptions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Conflicting rules and rules with exceptions are very common in natural language specification to describe the behaviour of devices operating in a real-world context. This is common exactly because those specifications are processed by humans, and humans apply common sense and strategic reasoning about those rules. In this paper, we deal with the challenge of providing, step by step, a model of energy saving rule specification and processing methods that are used to reduce the consumptions of a system of devices. We argue that a very promising non-monotonic approach to such a problem can lie upon Defeasible Logic. Starting with rules specified at an abstract level, but compatibly with the natural aspects of such a specification (including temporal and power absorption constraints), we provide a formalism that generates the extension of a basic defeasible logic, which corresponds to turned on or off devices. We define a procedure to achieve automatic synthesis of best practices, to be used as rules to obtain savings in electric consumptions.", "fno": "0984a154", "keywords": [ "Absorption", "Synchronization", "Context", "Time Factors", "Best Practices", "Energy Consumption", "Cognition", "Energy Savings", "Defeasible Logic" ], "authors": [ { "affiliation": null, "fullName": "Matteo Cristani", "givenName": "Matteo", "surname": "Cristani", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Francesco Olivieri", "givenName": "Francesco", "surname": "Olivieri", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Claudio Tomazzoli", "givenName": "Claudio", "surname": "Tomazzoli", "__typename": "ArticleAuthorType" } ], "idPrefix": "imis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "154-161", "year": "2016", "issn": null, "isbn": "978-1-5090-0984-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0984a149", "articleId": "12OmNAWYKGh", "__typename": "AdjacentArticleType" }, "next": { "fno": "0984a162", "articleId": "12OmNrYCXFI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icedeg/2015/8910/0/07114454", "title": "Best practices to foster a national information technology industry", "doi": null, "abstractUrl": "/proceedings-article/icedeg/2015/07114454/12OmNA1VnsR", "parentPublication": { "id": "proceedings/icedeg/2015/8910/0", "title": "2015 Second International Conference on eDemocracy & eGovernment (ICEDEG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504d410", "title": "Quality Measures for Documentation of Best Practices", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504d410/12OmNBuL1g5", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367d702", "title": "Evaluation of a Classification System for Best Practices", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367d702/12OmNrAv3LO", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isess/1999/0068/0/00680111", "title": "When Standards and Best Practices are Ignored", "doi": null, "abstractUrl": "/proceedings-article/isess/1999/00680111/12OmNvlxJwG", "parentPublication": { "id": "proceedings/isess/1999/0068/0", "title": "Software Engineering Standards, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2016/1858/0/1858a885", "title": "Defeasible Reasoning about Electric Consumptions", "doi": null, "abstractUrl": "/proceedings-article/aina/2016/1858a885/12OmNzvz6JS", "parentPublication": { "id": "proceedings/aina/2016/1858/0", "title": "2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2006/11/e0883", "title": "Selecting Best Practices for Effort Estimation", "doi": null, "abstractUrl": "/journal/ts/2006/11/e0883/13rRUB7a1hs", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2006/03/s3104", "title": "Are \"Best Practices\" Requirements Documents a Myth?", "doi": null, "abstractUrl": "/magazine/so/2006/03/s3104/13rRUILtJjJ", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2018/05/mit2018050057", "title": "Best Practices for Sustainable Datacenters", "doi": null, "abstractUrl": "/magazine/it/2018/05/mit2018050057/14Fq0YQg6aY", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2021/3784/0/378400a482", "title": "Survey on Pains and Best Practices of Code Review", "doi": null, "abstractUrl": "/proceedings-article/apsec/2021/378400a482/1B4mfVZA9Y4", "parentPublication": { "id": "proceedings/apsec/2021/3784/0", "title": "2021 28th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2022/05/09771163", "title": "Cybersecurity Best Practices for CISE Programs", "doi": null, "abstractUrl": "/magazine/co/2022/05/09771163/1DeF0Iq4uoU", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKi", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNyrqzkr", "doi": "10.1109/VISUAL.1998.745334", "title": "Visual Presentation of Magnetic Resonance Images", "normalizedTitle": "Visual Presentation of Magnetic Resonance Images", "abstract": "Medical image analysis is shifting from current film-oriented light screen environments to computer environments that involve viewing and analyzing large sets of images on a computer screen. Magnetic Resonance Imaging (MRI) studies, in particular, can involve many images. This paper examines how best to meet the needs of radiologists in a computational environment. To this end, a field study was conducted to observe radiologists' interactions during MRI analysis in the traditional light screen environment. Key issues uncovered involve control over focus and context, dynamic grouping of images and retrieval of images and image groups. To address the problem of focus and context, existing layout adjustment and magnification techniques are explored to provide the most appropriate solution. Our interest is in combining the methodologies of human computer interaction studies with computational presentation possibilities to design a visual environment for the crucial field of medical image analysis.", "abstracts": [ { "abstractType": "Regular", "content": "Medical image analysis is shifting from current film-oriented light screen environments to computer environments that involve viewing and analyzing large sets of images on a computer screen. Magnetic Resonance Imaging (MRI) studies, in particular, can involve many images. This paper examines how best to meet the needs of radiologists in a computational environment. To this end, a field study was conducted to observe radiologists' interactions during MRI analysis in the traditional light screen environment. Key issues uncovered involve control over focus and context, dynamic grouping of images and retrieval of images and image groups. To address the problem of focus and context, existing layout adjustment and magnification techniques are explored to provide the most appropriate solution. Our interest is in combining the methodologies of human computer interaction studies with computational presentation possibilities to design a visual environment for the crucial field of medical image analysis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Medical image analysis is shifting from current film-oriented light screen environments to computer environments that involve viewing and analyzing large sets of images on a computer screen. Magnetic Resonance Imaging (MRI) studies, in particular, can involve many images. This paper examines how best to meet the needs of radiologists in a computational environment. To this end, a field study was conducted to observe radiologists' interactions during MRI analysis in the traditional light screen environment. Key issues uncovered involve control over focus and context, dynamic grouping of images and retrieval of images and image groups. To address the problem of focus and context, existing layout adjustment and magnification techniques are explored to provide the most appropriate solution. Our interest is in combining the methodologies of human computer interaction studies with computational presentation possibilities to design a visual environment for the crucial field of medical image analysis.", "fno": "91760423", "keywords": [ "Human Factors", "Health Care", "Medical Images", "MRI Image Presentation", "User Interfaces", "Detail And Context" ], "authors": [ { "affiliation": "Simon Fraser University", "fullName": "J. E. van der Heyden", "givenName": "J. E.", "surname": "van der Heyden", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "M. S. T. Carpendale", "givenName": "M. S. T.", "surname": "Carpendale", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "K. Inkpen", "givenName": "K.", "surname": "Inkpen", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "M. S. Atkins", "givenName": "M. S.", "surname": "Atkins", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-10-01T00:00:00", "pubType": "proceedings", "pages": "423", "year": "1998", "issn": null, "isbn": "0-8186-9176-x", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "91760419", "articleId": "12OmNzICEBt", "__typename": "AdjacentArticleType" }, "next": { "fno": "91760427", "articleId": "12OmNvqW6VC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnc/2008/3304/3/3304c049", "title": "A Support Vector Machine Based Algorithm for Magnetic Resonance Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icnc/2008/3304c049/12OmNANkoiy", "parentPublication": { "id": "proceedings/icnc/2008/3304/3", "title": "2008 Fourth International Conference on Natural Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeae/2017/2531/0/08241317", "title": "Evaluation of Classic Super-Resolution Algorithms for Magnetic Resonance Images", "doi": null, "abstractUrl": "/proceedings-article/icmeae/2017/08241317/12OmNBOCWlN", "parentPublication": { "id": "proceedings/icmeae/2017/2531/0", "title": "2017 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbmsys/1990/9040/0/00109379", "title": "Restoration of cardiac magnetic resonance images", "doi": null, "abstractUrl": "/proceedings-article/cbmsys/1990/00109379/12OmNwcUjUt", "parentPublication": { "id": "proceedings/cbmsys/1990/9040/0", "title": "1990 Proceedings Third Annual IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2008/3456/0/3456a327", "title": "A Multistage Parallel Magnetic Resonance Image Reconstruction Method", "doi": null, "abstractUrl": "/proceedings-article/dicta/2008/3456a327/12OmNy5zsnX", "parentPublication": { "id": "proceedings/dicta/2008/3456/0", "title": "2008 Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1994/6952/2/00413485", "title": "Interslice coding of magnetic resonance images using deformable triangular patches", "doi": null, "abstractUrl": "/proceedings-article/icip/1994/00413485/12OmNyO8tIz", "parentPublication": { "id": "proceedings/icip/1994/6952/2", "title": "Proceedings of 1st International Conference on Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109c720", "title": "Joint Independent Component Analysis of Brain Perfusion and Structural Magnetic Resonance Images in Dementia", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c720/12OmNyuya9y", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imvip/2009/3796/0/3796a123", "title": "Denoising Magnetic Resonance Images Using Fourth Order Complex Diffusion", "doi": null, "abstractUrl": "/proceedings-article/imvip/2009/3796a123/12OmNz5s0EI", "parentPublication": { "id": "proceedings/imvip/2009/3796/0", "title": "International Machine Vision and Image Processing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bmei/2008/3118/2/3118b753", "title": "On Image Registration in Magnetic Resonance Imaging", "doi": null, "abstractUrl": "/proceedings-article/bmei/2008/3118b753/12OmNzG4gAM", "parentPublication": { "id": "proceedings/bmei/2008/3118/2", "title": "BioMedical Engineering and Informatics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icip/1995/7310/1/73100625", "title": "Visual masking and the design of magnetic resonance image acquisition", "doi": null, "abstractUrl": "/proceedings-article/icip/1995/73100625/12OmNzIUfLk", "parentPublication": { "id": "proceedings/icip/1995/7310/1", "title": "Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2007/03/c3052", "title": "Analysis of Functional Magnetic Resonance Imaging in Python", "doi": null, "abstractUrl": "/magazine/cs/2007/03/c3052/13rRUxBrGbo", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC1GueF", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "acronym": "isspit", "groupId": "1001026", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzgwmSb", "doi": "10.1109/ISSPIT.2006.270818", "title": "Hierarchical Segmentation of Presentation Videos through Visual and Text Analysis", "normalizedTitle": "Hierarchical Segmentation of Presentation Videos through Visual and Text Analysis", "abstract": "Presentation videos play an important role in information sharing and exchange. To effectively utilize these video assets, one of the important steps is to segment a long video stream into smaller, semantic units. In this paper, we investigate hierarchical segmentation of presentation videos by combining visual and text analysis. Slide-level segmentation employs visual information and computes a sequence of slide-level video segments so that the projected slide image of each such segment does not change. Topic-level segmentation makes use of extracted slide text and generates a sequence of topic-level video segments so that the topic of each such video segment does not change. This proposed segmentation procedure has been tested against various presentation videos and experimental results are presented and discussed", "abstracts": [ { "abstractType": "Regular", "content": "Presentation videos play an important role in information sharing and exchange. To effectively utilize these video assets, one of the important steps is to segment a long video stream into smaller, semantic units. In this paper, we investigate hierarchical segmentation of presentation videos by combining visual and text analysis. Slide-level segmentation employs visual information and computes a sequence of slide-level video segments so that the projected slide image of each such segment does not change. Topic-level segmentation makes use of extracted slide text and generates a sequence of topic-level video segments so that the topic of each such video segment does not change. This proposed segmentation procedure has been tested against various presentation videos and experimental results are presented and discussed", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presentation videos play an important role in information sharing and exchange. To effectively utilize these video assets, one of the important steps is to segment a long video stream into smaller, semantic units. In this paper, we investigate hierarchical segmentation of presentation videos by combining visual and text analysis. Slide-level segmentation employs visual information and computes a sequence of slide-level video segments so that the projected slide image of each such segment does not change. Topic-level segmentation makes use of extracted slide text and generates a sequence of topic-level video segments so that the topic of each such video segment does not change. This proposed segmentation procedure has been tested against various presentation videos and experimental results are presented and discussed", "fno": "04042260", "keywords": [ "Slide Text Extraction", "Hierarchical Segmentation", "Presentation Videos", "Visual Analysis", "Text Analysis", "Video Stream", "Slide Level Segmentation", "Slide Level Video Segments" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND", "fullName": "Honglin Li", "givenName": null, "surname": "Honglin Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND", "fullName": "Aijuan Dong", "givenName": null, "surname": "Aijuan Dong", "__typename": "ArticleAuthorType" } ], "idPrefix": "isspit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-08-01T00:00:00", "pubType": "proceedings", "pages": "314-319", "year": "2006", "issn": null, "isbn": "0-7803-9753-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04042259", "articleId": "12OmNAlvHTP", "__typename": "AdjacentArticleType" }, "next": { "fno": "04042261", "articleId": "12OmNCmGO0n", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipcc/2005/9027/0/01494188", "title": "The effects of text slide format and presentational quality on learning in college lectures", "doi": null, "abstractUrl": "/proceedings-article/ipcc/2005/01494188/12OmNAR1aXM", "parentPublication": { "id": "proceedings/ipcc/2005/9027/0", "title": "2005 IEEE International Professional Communication Conference (IPCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2005/9313/0/01577174", "title": "Educational documentary video segmentation and access through combination of visual, audio and text understanding", "doi": null, "abstractUrl": "/proceedings-article/isspit/2005/01577174/12OmNAWH9xU", "parentPublication": { "id": "proceedings/isspit/2005/9313/0", "title": "2005 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2007/2822/1/28220138", "title": "Text Line Segmentation of Historical Arabic Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2007/28220138/12OmNAYGlok", "parentPublication": { "id": "proceedings/icdar/2007/2822/1", "title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2008/3454/0/3454a692", "title": "Segmentation of Lecture Videos Based on Spontaneous Speech Recognition", "doi": null, "abstractUrl": "/proceedings-article/ism/2008/3454a692/12OmNAoDi3t", "parentPublication": { "id": "proceedings/ism/2008/3454/0", "title": "2008 Tenth IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032d621", "title": "CDTS: Collaborative Detection, Tracking, and Segmentation for Online Multiple Object Segmentation in Videos", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032d621/12OmNCf1Dk9", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c486", "title": "Text Segmentation from Image with Complex Background Based on Markov Random Fields", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c486/12OmNqBbHZK", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a126", "title": "A New Gradient Based Character Segmentation Method for Video Text Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a126/12OmNvEhg33", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2005/9331/0/01521346", "title": "Effect of segmentation method on video retrieval performance", "doi": null, "abstractUrl": "/proceedings-article/icme/2005/01521346/12OmNxWLTpR", "parentPublication": { "id": "proceedings/icme/2005/9331/0", "title": "2005 IEEE International Conference on Multimedia and Expo", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2014/02/06750040", "title": "Content Based Lecture Video Retrieval Using Speech and Video Text Information", "doi": null, "abstractUrl": "/journal/lt/2014/02/06750040/13rRUytnsT5", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a726", "title": "SPaSe - Multi-Label Page Segmentation for Presentation Slides", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a726/18j8JKQx3SE", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBBhN8U", "title": "2012 45th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBtj94", "doi": "10.1109/HICSS.2012.583", "title": "The Role of Social Interaction Filter and Visualization in Casual Browsing", "normalizedTitle": "The Role of Social Interaction Filter and Visualization in Casual Browsing", "abstract": "Traces of social interaction in information spaces have the potential to improve information exploration. We evaluated interactive interfaces that utilize social interaction history. More specifically, we compared the value of a social filter and social interaction visualization in supporting casual browsing. We hypothesized that information filtering in general plays a more important role than visualization, as it provides additional control for users to browse information collections. Our experimental results showed that, compared to the baseline interface, the social filter increased subjective user satisfaction and was perceived by the study participants to enhance their effectiveness in finding interesting information. However, there were no significant differences between the social filter and social visualization systems. Our analysis suggested that the synergy of information filtering and visualization is more effective than each feature working separately.", "abstracts": [ { "abstractType": "Regular", "content": "Traces of social interaction in information spaces have the potential to improve information exploration. We evaluated interactive interfaces that utilize social interaction history. More specifically, we compared the value of a social filter and social interaction visualization in supporting casual browsing. We hypothesized that information filtering in general plays a more important role than visualization, as it provides additional control for users to browse information collections. Our experimental results showed that, compared to the baseline interface, the social filter increased subjective user satisfaction and was perceived by the study participants to enhance their effectiveness in finding interesting information. However, there were no significant differences between the social filter and social visualization systems. Our analysis suggested that the synergy of information filtering and visualization is more effective than each feature working separately.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traces of social interaction in information spaces have the potential to improve information exploration. We evaluated interactive interfaces that utilize social interaction history. More specifically, we compared the value of a social filter and social interaction visualization in supporting casual browsing. We hypothesized that information filtering in general plays a more important role than visualization, as it provides additional control for users to browse information collections. Our experimental results showed that, compared to the baseline interface, the social filter increased subjective user satisfaction and was perceived by the study participants to enhance their effectiveness in finding interesting information. However, there were no significant differences between the social filter and social visualization systems. Our analysis suggested that the synergy of information filtering and visualization is more effective than each feature working separately.", "fno": "4525b824", "keywords": [ "Social Interaction History", "Casual Browsing", "Information Filtering", "Visualization" ], "authors": [ { "affiliation": null, "fullName": "Indratmo", "givenName": null, "surname": "Indratmo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Julita Vassileva", "givenName": "Julita", "surname": "Vassileva", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2012-01-01T00:00:00", "pubType": "proceedings", "pages": "1824-1833", "year": "2012", "issn": null, "isbn": "978-0-7695-4525-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4525b814", "articleId": "12OmNvk7JJ7", "__typename": "AdjacentArticleType" }, "next": { "fno": "4525b834", "articleId": "12OmNweTvQ4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2001/1195/0/11950413", "title": "Interaction and Visualization Supporting Web Browsing Patterns", "doi": null, "abstractUrl": "/proceedings-article/iv/2001/11950413/12OmNARiM12", "parentPublication": { "id": "proceedings/iv/2001/1195/0", "title": "Proceedings Fifth International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2011/4589/0/4589a335", "title": "3D Image Browsing on Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/ism/2011/4589a335/12OmNC3XhqI", "parentPublication": { "id": "proceedings/ism/2011/4589/0", "title": "2011 IEEE International Symposium on Multimedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2003/2030/0/20300053", "title": "Using Deformations for Browsing Volumetric Data", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2003/20300053/12OmNrHjqOm", "parentPublication": { "id": "proceedings/ieee-vis/2003/2030/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e538", "title": "Social Interaction History: A Framework for Supporting Exploration of Social Information Spaces", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e538/12OmNvmXJ6U", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1999/0001/1/00011026", "title": "Judging People's Availability for Interaction from Video Snapshots", "doi": null, "abstractUrl": "/proceedings-article/hicss/1999/00011026/12OmNwJPMW6", "parentPublication": { "id": "proceedings/hicss/1999/0001/1", "title": "Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2010/4055/0/4055a151", "title": "Browsing E-Lecture Libraries on Mobile Devices: A Spatial Interaction Concept", "doi": null, "abstractUrl": "/proceedings-article/icalt/2010/4055a151/12OmNwwMf1X", "parentPublication": { "id": "proceedings/icalt/2010/4055/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/04376144", "title": "Toward a Deeper Understanding of the Role of Interaction in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/04376144/13rRUNvyakD", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1224", "title": "Toward a Deeper Understanding of the Role of Interaction in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1224/13rRUxD9gXy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/04/mcg2009040086", "title": "Motivation and Procrastination: Methods for Evaluating Pragmatic Casual Information Visualizations", "doi": null, "abstractUrl": "/magazine/cg/2009/04/mcg2009040086/13rRUxN5evF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506520", "title": "BONNIE: Building Online Narratives from Noteworthy Interaction Events", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506520/17D45XeKgqe", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNvT2oXb", "doi": "10.1109/IV.2009.56", "title": "A Framework to Analyze Information Visualization Based on the Functional Data Model", "normalizedTitle": "A Framework to Analyze Information Visualization Based on the Functional Data Model", "abstract": "We propose a framework for analyzing information visualization (infovis) based on the concept of Functional Dependency (FD). Although functional dependencies express important semantic information of data, they are rarely taken into account by general purpose infovis tools -- a fact that may cause problems in the visualization process. The main idea of our approach is to use the concept of FD for modeling the invariant structures of all three components of information visualization that is data, visual representations, and visual mappings.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a framework for analyzing information visualization (infovis) based on the concept of Functional Dependency (FD). Although functional dependencies express important semantic information of data, they are rarely taken into account by general purpose infovis tools -- a fact that may cause problems in the visualization process. The main idea of our approach is to use the concept of FD for modeling the invariant structures of all three components of information visualization that is data, visual representations, and visual mappings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a framework for analyzing information visualization (infovis) based on the concept of Functional Dependency (FD). Although functional dependencies express important semantic information of data, they are rarely taken into account by general purpose infovis tools -- a fact that may cause problems in the visualization process. The main idea of our approach is to use the concept of FD for modeling the invariant structures of all three components of information visualization that is data, visual representations, and visual mappings.", "fno": "3733a018", "keywords": [ "Information Visualization", "Analysis Model" ], "authors": [ { "affiliation": null, "fullName": "Tsuyoshi Sugibuchi", "givenName": "Tsuyoshi", "surname": "Sugibuchi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nicolas Spyratos", "givenName": "Nicolas", "surname": "Spyratos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ekaterina Siminenko", "givenName": "Ekaterina", "surname": "Siminenko", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "18-24", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a010", "articleId": "12OmNAsTgOl", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a025", "articleId": "12OmNB06l2c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2010/6685/0/05429617", "title": "Advanced interaction for Information Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2010/05429617/12OmNBqdr33", "parentPublication": { "id": "proceedings/pacificvis/2010/6685/0", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a228", "title": "A Concurrent Architecture Proposal for Information Visualization Pipeline", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a228/12OmNxZ2Glk", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061173", "title": "Distributed Cognition as a Theoretical Framework for Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061173/13rRUwI5TQQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122689", "title": "Beyond Mouse and Keyboard: Expanding Design Considerations for Information Visualization Interactions", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122689/13rRUwInvsO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1145", "title": "Casual Information Visualization: Depictions of Data in Everyday Life", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1145/13rRUwgQpqG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1224", "title": "Toward a Deeper Understanding of the Role of Interaction in Information Visualization", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1224/13rRUxD9gXy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2000/01/v0008", "title": "A Functional Framework for Web-Based Information Visualization Systems", "doi": null, "abstractUrl": "/journal/tg/2000/01/v0008/13rRUxYINf2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010060999", "title": "Mental Models, Visual Reasoning and Interaction in Information Visualization: A Top-down Perspective", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010060999/13rRUyYBlgx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222293", "title": "Introducing Layers of Meaning (LoM): A Framework to Reduce Semantic Distance of Visualization In Humanistic Research", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222293/1nTrGyTQ0Pm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx7ouU0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "acronym": "cmv", "groupId": "1000170", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNxA3YRg", "doi": "10.1109/CMV.2007.19", "title": "Requirements for coordinated multiple view visualization systems for industrial applications", "normalizedTitle": "Requirements for coordinated multiple view visualization systems for industrial applications", "abstract": "In this paper we discuss the importance of commercial visualization application development on the progress of research on coordinated multiple view visualization techniques. There is a need for scalable infovis visualization solutions which is in fact the need to control the growing complexity in business data sets. The CMV visualization systems users need solutions which bring insight the complexity of their data. The progress in CMV visualization will be determined by the effort companies put in these problems to help clients with business data in combination with their collaboration with the CMV researchers at the universities.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we discuss the importance of commercial visualization application development on the progress of research on coordinated multiple view visualization techniques. There is a need for scalable infovis visualization solutions which is in fact the need to control the growing complexity in business data sets. The CMV visualization systems users need solutions which bring insight the complexity of their data. The progress in CMV visualization will be determined by the effort companies put in these problems to help clients with business data in combination with their collaboration with the CMV researchers at the universities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we discuss the importance of commercial visualization application development on the progress of research on coordinated multiple view visualization techniques. There is a need for scalable infovis visualization solutions which is in fact the need to control the growing complexity in business data sets. The CMV visualization systems users need solutions which bring insight the complexity of their data. The progress in CMV visualization will be determined by the effort companies put in these problems to help clients with business data in combination with their collaboration with the CMV researchers at the universities.", "fno": "29030076", "keywords": [ "Coordinated Multiple View", "Data Mining", "Text Mining", "Visualization Systems" ], "authors": [ { "affiliation": "Treparel Information Solutions", "fullName": "Anton Heijs", "givenName": "Anton", "surname": "Heijs", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "76-79", "year": "2007", "issn": null, "isbn": "0-7695-2903-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29030075", "articleId": "12OmNvCi43a", "__typename": "AdjacentArticleType" }, "next": { "fno": "29030080", "articleId": "12OmNzWOBf2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2012/4771/0/4771a630", "title": "A Model to Store Coordination Mappings", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a630/12OmNBVIUx5", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030072", "title": "Coordinated Multiple Views: a Critical View", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmv/2007/2903/0/29030061", "title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization", "doi": null, "abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5", "parentPublication": { "id": "proceedings/cmv/2007/2903/0", "title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000156", "title": "Coordinated and Multiple Views in Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a246", "title": "Coordinated and Multiple Views for Visualizing Text Collections", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a246/12OmNzBwGtI", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061383", "title": "Interactive Coordinated Multiple-View Visualization of Biomechanical Motion Data", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061383/13rRUwfI0Q3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122291", "title": "VisBricks: Multiform Visualization of Large, Inhomogeneous Data", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122291/13rRUxBa5bT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061449", "title": "Interactive Visual Analysis of Multiple Simulation Runs Using the Simulation Model View: Understanding and Tuning of an Electronic Unit Injector", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061449/13rRUxbTMyM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a104", "title": "Visualization overview: Using modern text mining techniques to provide insight into visualization research practice", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a104/1KaFNxrDmY8", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Ytt", "title": "2015 19th International Conference on Information Visualisation (iV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxZ2Glk", "doi": "10.1109/iV.2015.49", "title": "A Concurrent Architecture Proposal for Information Visualization Pipeline", "normalizedTitle": "A Concurrent Architecture Proposal for Information Visualization Pipeline", "abstract": "This paper identifies an opportunity to reduce the latency in information visualization (InfoVis) systems, exploring the parallelization of the visualization pipeline architecture. We propose a concurrent architecture where the visualization pipeline stages are modified to execute as producers and consumers threads. The threads synchronization is done by memory barriers and the data flow pass the pipeline through a unique data structure, called ring buffer, which reuses a contiguous space preallocated in memory. Two InfoVis prototypes were developed in java, the first one using sequential pipeline and the other using concurrent pipeline. The results obtained with concurrent architecture in comparison with sequential pipeline presented less execution time and memory allocation for data visualization renderization.", "abstracts": [ { "abstractType": "Regular", "content": "This paper identifies an opportunity to reduce the latency in information visualization (InfoVis) systems, exploring the parallelization of the visualization pipeline architecture. We propose a concurrent architecture where the visualization pipeline stages are modified to execute as producers and consumers threads. The threads synchronization is done by memory barriers and the data flow pass the pipeline through a unique data structure, called ring buffer, which reuses a contiguous space preallocated in memory. Two InfoVis prototypes were developed in java, the first one using sequential pipeline and the other using concurrent pipeline. The results obtained with concurrent architecture in comparison with sequential pipeline presented less execution time and memory allocation for data visualization renderization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper identifies an opportunity to reduce the latency in information visualization (InfoVis) systems, exploring the parallelization of the visualization pipeline architecture. We propose a concurrent architecture where the visualization pipeline stages are modified to execute as producers and consumers threads. The threads synchronization is done by memory barriers and the data flow pass the pipeline through a unique data structure, called ring buffer, which reuses a contiguous space preallocated in memory. Two InfoVis prototypes were developed in java, the first one using sequential pipeline and the other using concurrent pipeline. The results obtained with concurrent architecture in comparison with sequential pipeline presented less execution time and memory allocation for data visualization renderization.", "fno": "7568a228", "keywords": [ "Visualization", "Data Visualization", "Pipelines", "Instruction Sets", "Computer Architecture", "Prototypes", "Synchronization", "Concurrent Programming", "Information Visualization", "Visualization Pipeline", "Software Architecture" ], "authors": [ { "affiliation": null, "fullName": "Nikolas Carneiro", "givenName": "Nikolas", "surname": "Carneiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ranieri Teixeira", "givenName": "Ranieri", "surname": "Teixeira", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tiago Araujo", "givenName": "Tiago", "surname": "Araujo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carlos Santos", "givenName": "Carlos", "surname": "Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jairo Junior", "givenName": "Jairo", "surname": "Junior", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bianchi Meiguins", "givenName": "Bianchi", "surname": "Meiguins", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-07-01T00:00:00", "pubType": "proceedings", "pages": "228-234", "year": "2015", "issn": "1550-6037", "isbn": "978-1-4673-7568-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7568a223", "articleId": "12OmNBlFR3n", "__typename": "AdjacentArticleType" }, "next": { "fno": "7568a235", "articleId": "12OmNvmG7Wr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dfm/2013/5247/0/5247a022", "title": "MT-SDF: Scheduled Dataflow Architecture with Mini-threads", "doi": null, "abstractUrl": "/proceedings-article/dfm/2013/5247a022/12OmNBC8ArN", "parentPublication": { "id": "proceedings/dfm/2013/5247/0", "title": "2013 Data-Flow Execution Models for Extreme Scale Computing (DFM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/simultech/2014/060/0/07095069", "title": "Signature-based high-level simulation of microthreaded many-core architectures", "doi": null, "abstractUrl": "/proceedings-article/simultech/2014/07095069/12OmNBqdrgE", "parentPublication": { "id": "proceedings/simultech/2014/060/0", "title": "2014 International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2015/7166/0/07357119", "title": "Effective hardware-level thread synchronization for high performance and power efficiency in application specific multi-threaded embedded processors", "doi": null, "abstractUrl": "/proceedings-article/iccd/2015/07357119/12OmNxdDFOt", "parentPublication": { "id": "proceedings/iccd/2015/7166/0", "title": "2015 33rd IEEE International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2018/3659/0/365901a208", "title": "Accelerate GPU Concurrent Kernel Execution by Mitigating Memory Pipeline Stalls", "doi": null, "abstractUrl": "/proceedings-article/hpca/2018/365901a208/12OmNzUgcZG", "parentPublication": { "id": "proceedings/hpca/2018/3659/0", "title": "2018 IEEE International Symposium on High Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-c/2017/1589/0/07965251", "title": "Studying Multi-threaded Behavior with TSViz", "doi": null, "abstractUrl": "/proceedings-article/icse-c/2017/07965251/12OmNzUgd28", "parentPublication": { "id": "proceedings/icse-c/2017/1589/0", "title": "2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v0997", "title": "Concurrent Visualization in a Production Supercomputing Environment", "doi": null, "abstractUrl": "/journal/tg/2006/05/v0997/13rRUwcS1CO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csf/2015/7538/0/7538a137", "title": "Hybrid Monitors for Concurrent Noninterference", "doi": null, "abstractUrl": "/proceedings-article/csf/2015/7538a137/17D45WIXbPK", "parentPublication": { "id": "proceedings/csf/2015/7538/0", "title": "2015 IEEE 28th Computer Security Foundations Symposium (CSF)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2016/3593/0/07982324", "title": "Using OpenDX to Teach the Concept of Visualization Pipeline", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2016/07982324/17D45Wda7h4", "parentPublication": { "id": "proceedings/cse-euc/2016/3593/0", "title": "2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2022/6272/0/627200a213", "title": "DTexL: Decoupled Raster Pipeline for Texture Locality", "doi": null, "abstractUrl": "/proceedings-article/micro/2022/627200a213/1HMSyvEOY24", "parentPublication": { "id": "proceedings/micro/2022/6272/0", "title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a201", "title": "Exploring How Personality Models Information Visualization Preferences", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a201/1qRO6BS61ZC", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwseER5", "title": "1993 (4th) International Conference on Computer Vision", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNAfPIPs", "doi": "10.1109/ICCV.1993.378236", "title": "Looking for trouble: Using causal semantics to direct focus of attention", "normalizedTitle": "Looking for trouble: Using causal semantics to direct focus of attention", "abstract": "Vision should provide an explanation of the scene in terms of a causal semantics. The authors propose a characterization of what constitutes visual understanding. The cornerstone of the proposal is that visual understanding is fundamentally a matter of developing a causal explanation of the scene, i.e., of determining the causal significance of the elements in a scene, and the causal relationships among those elements. Simple, naive physical knowledge is used as the basis of a vertically integrated vision system that explains arbitrarily complex stacked block structures. The semantics provides a basis for controlling the application of visual attention, and forms a framework for the explanation that is generated. It is shown that the program sequentially explores scenes of complex blocks structures, identifies functional substructures such as arches and cantilevers, and develops an explanation of why the whole construction stands and the role of each block in its stability.<>", "abstracts": [ { "abstractType": "Regular", "content": "Vision should provide an explanation of the scene in terms of a causal semantics. The authors propose a characterization of what constitutes visual understanding. The cornerstone of the proposal is that visual understanding is fundamentally a matter of developing a causal explanation of the scene, i.e., of determining the causal significance of the elements in a scene, and the causal relationships among those elements. Simple, naive physical knowledge is used as the basis of a vertically integrated vision system that explains arbitrarily complex stacked block structures. The semantics provides a basis for controlling the application of visual attention, and forms a framework for the explanation that is generated. It is shown that the program sequentially explores scenes of complex blocks structures, identifies functional substructures such as arches and cantilevers, and develops an explanation of why the whole construction stands and the role of each block in its stability.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Vision should provide an explanation of the scene in terms of a causal semantics. The authors propose a characterization of what constitutes visual understanding. The cornerstone of the proposal is that visual understanding is fundamentally a matter of developing a causal explanation of the scene, i.e., of determining the causal significance of the elements in a scene, and the causal relationships among those elements. Simple, naive physical knowledge is used as the basis of a vertically integrated vision system that explains arbitrarily complex stacked block structures. The semantics provides a basis for controlling the application of visual attention, and forms a framework for the explanation that is generated. It is shown that the program sequentially explores scenes of complex blocks structures, identifies functional substructures such as arches and cantilevers, and develops an explanation of why the whole construction stands and the role of each block in its stability.", "fno": "00378236", "keywords": [ "Computer Vision", "Causal Semantics", "Focus Of Attention", "Visual Understanding", "Causal Explanation", "Causal Significance", "Naive Physical Knowledge", "Vertically Integrated Vision System", "Arbitrarily Complex Stacked Block Structures", "Visual Attention", "Complex Blocks Structures", "Arches", "Cantilevers", "Layout", "Focusing", "Organisms", "Machine Vision", "Visual Perception", "Stability", "Solid Modeling", "Geometry", "Lighting", "Reflectivity" ], "authors": [ { "affiliation": "Inst. for Learning Sci., Northwestern Univ., Evanston, IL, USA", "fullName": "L. Birnbaum", "givenName": "L.", "surname": "Birnbaum", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Learning Sci., Northwestern Univ., Evanston, IL, USA", "fullName": "M. Brand", "givenName": "M.", "surname": "Brand", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Learning Sci., Northwestern Univ., Evanston, IL, USA", "fullName": "P. Cooper", "givenName": "P.", "surname": "Cooper", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "49,50,51,52,53,54,55,56", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00378235", "articleId": "12OmNy68EEx", "__typename": "AdjacentArticleType" }, "next": { "fno": "00378237", "articleId": "12OmNyr8Yd9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wqv/1993/3692/0/00262953", "title": "Using causal scene analysis to direct focus of attention", "doi": null, "abstractUrl": "/proceedings-article/wqv/1993/00262953/12OmNC3FG7V", "parentPublication": { "id": "proceedings/wqv/1993/3692/0", "title": "Proceedings IEEE Workshop on Qualitative Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/2017/3018/0/08005095", "title": "A categorical semantics for causal structure", "doi": null, "abstractUrl": "/proceedings-article/lics/2017/08005095/12OmNCfSqPc", "parentPublication": { "id": "proceedings/lics/2017/3018/0", "title": "2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2010/7029/0/05543228", "title": "Quantifying how lighting and focus affect face recognition performance", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2010/05543228/12OmNrJiCNn", "parentPublication": { "id": "proceedings/cvprw/2010/7029/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1254", "title": "Visualizing Causal Semantics Using Animations", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1254/13rRUxBa5bL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2018/02/mex2018020083", "title": "Explaining Explanation, Part 3: The Causal Landscape", "doi": null, "abstractUrl": "/magazine/ex/2018/02/mex2018020083/13rRUxbTMtI", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b593", "title": "Stable Causal Feature Selection based on Direct Causal Effect Estimation", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b593/1LSPHFNXutG", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/09022607", "title": "Explaining Visual Models by Causal Attribution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/09022607/1i5mABXBxiU", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552187", "title": "Causal Support: Modeling Causal Inferences with Visualizations", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552187/1xic7BF3mcE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900b756", "title": "Instance-wise Causal Feature Selection for Model Interpretation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900b756/1yJYnx84kb6", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900d946", "title": "Generative Interventions for Causal Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900d946/1yeLbEk1X6E", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyjLoRu", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNAoUTeZ", "doi": "10.1109/FIE.2006.322750", "title": "Work In Progress: Developing Tablet PC Animations for Computer Science Courses", "normalizedTitle": "Work In Progress: Developing Tablet PC Animations for Computer Science Courses", "abstract": "The Tablet PC can be a tool for developing Ink-based animated software supporting the teaching of computer science concepts. We report on a Tablet PC software development course, called CPSC 481, taught in fall 2005 in which each student developed a large Tablet PC application/animation intended to serve a pedagogical tool in some course. At the end of the semester, the students presented their work in a formal class mini-conference and submitted documentation: a User's Manual and a Technical Reference Manual. We explain how CPSC 481 was taught, briefly describe each of the animations developed by the students, and explain how we will use some of the animations in exercises geared towards teaching concepts in a future data structures and algorithms class. Five students presented their work as poster presentations at WIPTE 2006. The students were enthusiastic in their evaluation as shown in the summary", "abstracts": [ { "abstractType": "Regular", "content": "The Tablet PC can be a tool for developing Ink-based animated software supporting the teaching of computer science concepts. We report on a Tablet PC software development course, called CPSC 481, taught in fall 2005 in which each student developed a large Tablet PC application/animation intended to serve a pedagogical tool in some course. At the end of the semester, the students presented their work in a formal class mini-conference and submitted documentation: a User's Manual and a Technical Reference Manual. We explain how CPSC 481 was taught, briefly describe each of the animations developed by the students, and explain how we will use some of the animations in exercises geared towards teaching concepts in a future data structures and algorithms class. Five students presented their work as poster presentations at WIPTE 2006. The students were enthusiastic in their evaluation as shown in the summary", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Tablet PC can be a tool for developing Ink-based animated software supporting the teaching of computer science concepts. We report on a Tablet PC software development course, called CPSC 481, taught in fall 2005 in which each student developed a large Tablet PC application/animation intended to serve a pedagogical tool in some course. At the end of the semester, the students presented their work in a formal class mini-conference and submitted documentation: a User's Manual and a Technical Reference Manual. We explain how CPSC 481 was taught, briefly describe each of the animations developed by the students, and explain how we will use some of the animations in exercises geared towards teaching concepts in a future data structures and algorithms class. Five students presented their work as poster presentations at WIPTE 2006. The students were enthusiastic in their evaluation as shown in the summary", "fno": "04117238", "keywords": [ "Interactive Learning", "Tablet PC Animations", "Computer Science Courses", "Ink Based Animated Software", "Teaching", "Tablet PC Software Development Course", "Pedagogical Tool" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Clemson Univ., SC", "fullName": "R.P. Pargas", "givenName": "R.P.", "surname": "Pargas", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Clemson Univ., SC", "fullName": "A. Goodbar", "givenName": "A.", "surname": "Goodbar", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "14-15", "year": "2006", "issn": "0190-5848", "isbn": "1-4244-0256-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04117237", "articleId": "12OmNxRWIeG", "__typename": "AdjacentArticleType" }, "next": { "fno": "04117239", "articleId": "12OmNyugyPH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2010/6261/0/05673215", "title": "Implementing Collaborative Project-Based Learning using the Tablet PC to enhance student learning in engineering and computer science courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673215/12OmNAfy7KF", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417887", "title": "Teaching dynamics using interactive tablet PC instruction software", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417887/12OmNAqU4Tp", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720579", "title": "Work in progress - can the Tablet PC provide \"new opportunities to learn?\"", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720579/12OmNBTJIC1", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmute/2008/3108/0/3108a047", "title": "Tablet PC to Support Collaborative Learning: An Empirical Study of English Vocabulary Learning", "doi": null, "abstractUrl": "/proceedings-article/wmute/2008/3108a047/12OmNC2xhAB", "parentPublication": { "id": "proceedings/wmute/2008/3108/0", "title": "IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720546", "title": "Work in progress - Tablet PCs as interactive web-based instruction tools in a first year engineering course", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720546/12OmNrYCY2M", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417929", "title": "The Tablet PC classroom: Erasing borders, stimulating activity, enhancing communication", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417929/12OmNx3HI61", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2010/6261/0/05673134", "title": "Tablet PCs in undergraduate mathematics", "doi": null, "abstractUrl": "/proceedings-article/fie/2010/05673134/12OmNx6g6l2", "parentPublication": { "id": "proceedings/fie/2010/6261/0", "title": "2010 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2010/4055/0/4055a591", "title": "Supporting Instructors in Designing Tablet PC-Based Courses", "doi": null, "abstractUrl": "/proceedings-article/icalt/2010/4055a591/12OmNxzMnYz", "parentPublication": { "id": "proceedings/icalt/2010/4055/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720632", "title": "Work in progress - integrating mobile Tablet-PC technology and Classroom Management Software in undergraduate electronic engineering technology courses", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720632/12OmNz6iOm2", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2009/4715/0/05350769", "title": "Impact of lecturing with the tablet PC on students of different learning styles", "doi": null, "abstractUrl": "/proceedings-article/fie/2009/05350769/12OmNzdoMta", "parentPublication": { "id": "proceedings/fie/2009/4715/0", "title": "2009 39th IEEE Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuirs", "title": "2013 First IEEE Working Conference on Software Visualization (VISSOFT)", "acronym": "vissoft", "groupId": "1001231", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOllcZ", "doi": "10.1109/VISSOFT.2013.6650537", "title": "Visualizing constituent behaviors within executions", "normalizedTitle": "Visualizing constituent behaviors within executions", "abstract": "In this New Ideas and Emerging Results paper, we present a novel visualization, THE BRAIN, that reveals clusters of source code that co-execute to produce behavioral features of the program throughout and within executions. We created a clustered visualization of source-code that is informed by dynamic control flow of multiple executions; each cluster represents commonly interacting logic that composes software features. In addition, we render individual executions atop the clustered multiple-execution visualization as user-controlled animations to reveal characteristics of specific executions-these animations may provide exemplars for the clustered features and provide chronology for those behavioral features, or they may reveal anomalous behaviors that do not fit with the overall operational profile of most executions. Both the clustered multiple-execution view and the animated individual-execution view provide insights for the constituent behaviors within executions that compose behaviors of whole executions. Inspired by neural imaging of human brains of people who were subjected to various external stimuli, we designed and implemented THE BRAIN to reveal program activity during execution. The result has revealed the principal behaviors of execution, and those behaviors were revealed to be (in some cases) cohesive, modular source-code structures and (in other cases) cross-cutting, emergent behaviors that involve multiple modules. In this paper, we describe THE BRAIN and envisage the uses to which it can be put, and we provide two example usage scenarios to demonstrate its utility.", "abstracts": [ { "abstractType": "Regular", "content": "In this New Ideas and Emerging Results paper, we present a novel visualization, THE BRAIN, that reveals clusters of source code that co-execute to produce behavioral features of the program throughout and within executions. We created a clustered visualization of source-code that is informed by dynamic control flow of multiple executions; each cluster represents commonly interacting logic that composes software features. In addition, we render individual executions atop the clustered multiple-execution visualization as user-controlled animations to reveal characteristics of specific executions-these animations may provide exemplars for the clustered features and provide chronology for those behavioral features, or they may reveal anomalous behaviors that do not fit with the overall operational profile of most executions. Both the clustered multiple-execution view and the animated individual-execution view provide insights for the constituent behaviors within executions that compose behaviors of whole executions. Inspired by neural imaging of human brains of people who were subjected to various external stimuli, we designed and implemented THE BRAIN to reveal program activity during execution. The result has revealed the principal behaviors of execution, and those behaviors were revealed to be (in some cases) cohesive, modular source-code structures and (in other cases) cross-cutting, emergent behaviors that involve multiple modules. In this paper, we describe THE BRAIN and envisage the uses to which it can be put, and we provide two example usage scenarios to demonstrate its utility.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this New Ideas and Emerging Results paper, we present a novel visualization, THE BRAIN, that reveals clusters of source code that co-execute to produce behavioral features of the program throughout and within executions. We created a clustered visualization of source-code that is informed by dynamic control flow of multiple executions; each cluster represents commonly interacting logic that composes software features. In addition, we render individual executions atop the clustered multiple-execution visualization as user-controlled animations to reveal characteristics of specific executions-these animations may provide exemplars for the clustered features and provide chronology for those behavioral features, or they may reveal anomalous behaviors that do not fit with the overall operational profile of most executions. Both the clustered multiple-execution view and the animated individual-execution view provide insights for the constituent behaviors within executions that compose behaviors of whole executions. Inspired by neural imaging of human brains of people who were subjected to various external stimuli, we designed and implemented THE BRAIN to reveal program activity during execution. The result has revealed the principal behaviors of execution, and those behaviors were revealed to be (in some cases) cohesive, modular source-code structures and (in other cases) cross-cutting, emergent behaviors that involve multiple modules. In this paper, we describe THE BRAIN and envisage the uses to which it can be put, and we provide two example usage scenarios to demonstrate its utility.", "fno": "06650537", "keywords": [], "authors": [ { "affiliation": "Department of Informatics, University of California, Irvine, USA", "fullName": "Vijay Krishna Palepu", "givenName": "Vijay Krishna", "surname": "Palepu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Informatics, University of California, Irvine, USA", "fullName": "James A. Jones", "givenName": "James A.", "surname": "Jones", "__typename": "ArticleAuthorType" } ], "idPrefix": "vissoft", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "1-4", "year": "2013", "issn": null, "isbn": "978-1-4799-1457-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06650536", "articleId": "12OmNz5s0U0", "__typename": "AdjacentArticleType" }, "next": { "fno": "06650538", "articleId": "12OmNAkWvEQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2013/0215/0/06693063", "title": "Proving MCAPI executions are correct using SMT", "doi": null, "abstractUrl": "/proceedings-article/ase/2013/06693063/12OmNB8kHNA", "parentPublication": { "id": "proceedings/ase/2013/0215/0", "title": "2013 IEEE/ACM 28th International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624054", "title": "Contextual analysis of program logs for understanding system behaviors", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624054/12OmNBkfRjy", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1996/7508/0/75080166", "title": "Visualizing Program Executions on Large Data Sets", "doi": null, "abstractUrl": "/proceedings-article/vl/1996/75080166/12OmNrkT7FZ", "parentPublication": { "id": "proceedings/vl/1996/7508/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/1995/7025/0/70250279", "title": "Adaptive Placement of Method Executions within a Customizable Distributed Object-Based Runtime System: Design, Implementation, and Performance", "doi": null, "abstractUrl": "/proceedings-article/icdcs/1995/70250279/12OmNvT2oM9", "parentPublication": { "id": "proceedings/icdcs/1995/7025/0", "title": "Proceedings of 15th International Conference on Distributed Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/1996/7376/0/73760327", "title": "Symbolic Executions of Symmetrical Parallel Programs", "doi": null, "abstractUrl": "/proceedings-article/pdp/1996/73760327/12OmNwl8GDe", "parentPublication": { "id": "proceedings/pdp/1996/7376/0", "title": "4th Euromicro Workshop on Parallel and Distributed Processing (PDP '96)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saint/2012/4737/0/4737a262", "title": "Malware Detection Method by Catching Their Random Behavior in Multiple Executions", "doi": null, "abstractUrl": "/proceedings-article/saint/2012/4737a262/12OmNxETak8", "parentPublication": { "id": "proceedings/saint/2012/4737/0", "title": "2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2005/2482/0/24820311", "title": "Visualizing Similarity between Program Executions", "doi": null, "abstractUrl": "/proceedings-article/issre/2005/24820311/12OmNxG1yBu", "parentPublication": { "id": "proceedings/issre/2005/2482/0", "title": "16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2015/7526/0/07332418", "title": "Revealing runtime features and constituent behaviors within software", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2015/07332418/12OmNyKJiou", "parentPublication": { "id": "proceedings/vissoft/2015/7526/0", "title": "2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiri/2009/3758/0/3758a113", "title": "Visualizing Multiple Program Executions to Assist Behavior Verification", "doi": null, "abstractUrl": "/proceedings-article/ssiri/2009/3758a113/12OmNzd7blr", "parentPublication": { "id": "proceedings/ssiri/2009/3758/0", "title": "Secure System Integration and Reliability Improvement", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2010/4191/1/4191a581", "title": "Learning Task Specific Web Services Compositions with Loops and Conditional Branches from Example Executions", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2010/4191a581/12OmNzmLxJv", "parentPublication": { "id": "proceedings/wi-iat/2010/4191/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNB6D70V", "title": "2011 International Conference on Cyberworlds", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNrGsDr4", "doi": "10.1109/CW.2011.18", "title": "Using Image Morphing for Memory-Efficient Impostor Rendering on GPU", "normalizedTitle": "Using Image Morphing for Memory-Efficient Impostor Rendering on GPU", "abstract": "Real-time rendering of large animated crowds consisting thousands of virtual humans is important for several applications including simulations, games and interactive walkthroughs, but cannot be performed using complex polygonal models at interactive frame rates. For that reason, several methods using large numbers of pre-computed image-based representations, which are called as impostors, have been proposed. These methods take the advantage of existing programmable graphics hardware to compensate the computational expense while maintaining the visual fidelity. Making the number of different virtual humans, which can be rendered in real-time, not restricted anymore by the required computational power but by the texture memory consumed for the variety and discretization of their animations. In this work, we proposed an alternative method that reduces the memory consumption by generating compelling intermediate textures using image-morphing techniques. In order to demonstrate the preserved perceptual quality of animations, where half of the key-frames were rendered using the proposed methodology, we have implemented the system using the graphical processing unit and obtained promising results at interactive frame rates.", "abstracts": [ { "abstractType": "Regular", "content": "Real-time rendering of large animated crowds consisting thousands of virtual humans is important for several applications including simulations, games and interactive walkthroughs, but cannot be performed using complex polygonal models at interactive frame rates. For that reason, several methods using large numbers of pre-computed image-based representations, which are called as impostors, have been proposed. These methods take the advantage of existing programmable graphics hardware to compensate the computational expense while maintaining the visual fidelity. Making the number of different virtual humans, which can be rendered in real-time, not restricted anymore by the required computational power but by the texture memory consumed for the variety and discretization of their animations. In this work, we proposed an alternative method that reduces the memory consumption by generating compelling intermediate textures using image-morphing techniques. In order to demonstrate the preserved perceptual quality of animations, where half of the key-frames were rendered using the proposed methodology, we have implemented the system using the graphical processing unit and obtained promising results at interactive frame rates.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Real-time rendering of large animated crowds consisting thousands of virtual humans is important for several applications including simulations, games and interactive walkthroughs, but cannot be performed using complex polygonal models at interactive frame rates. For that reason, several methods using large numbers of pre-computed image-based representations, which are called as impostors, have been proposed. These methods take the advantage of existing programmable graphics hardware to compensate the computational expense while maintaining the visual fidelity. Making the number of different virtual humans, which can be rendered in real-time, not restricted anymore by the required computational power but by the texture memory consumed for the variety and discretization of their animations. In this work, we proposed an alternative method that reduces the memory consumption by generating compelling intermediate textures using image-morphing techniques. In order to demonstrate the preserved perceptual quality of animations, where half of the key-frames were rendered using the proposed methodology, we have implemented the system using the graphical processing unit and obtained promising results at interactive frame rates.", "fno": "4467a197", "keywords": [ "Real Time Rendering", "Crowd Simulation", "Impostor Rendering", "Image Morphing", "Graphical Processing Unit" ], "authors": [ { "affiliation": null, "fullName": "Kamer Ali Yuksel", "givenName": "Kamer Ali", "surname": "Yuksel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aytul Ercil", "givenName": "Aytul", "surname": "Ercil", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alp Yucebilgin", "givenName": "Alp", "surname": "Yucebilgin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Selim Balcisoy", "givenName": "Selim", "surname": "Balcisoy", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "197-202", "year": "2011", "issn": null, "isbn": "978-0-7695-4467-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4467a189", "articleId": "12OmNBqdrfv", "__typename": "AdjacentArticleType" }, "next": { "fno": "4467a203", "articleId": "12OmNx3q71z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icvrv/2011/4602/0/4602a275", "title": "Direct Volume Rendering and Clipping Technology of Radar Beams", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2011/4602a275/12OmNApLGRp", "parentPublication": { "id": "proceedings/icvrv/2011/4602/0", "title": "2011 International Conference on Virtual Reality and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2017/0560/0/08026271", "title": "Distributed rendering: Interaction delay reduction in remote rendering with client-end GPU-accelerated scene warping technique", "doi": null, "abstractUrl": "/proceedings-article/icmew/2017/08026271/12OmNwIpNk0", "parentPublication": { "id": "proceedings/icmew/2017/0560/0", "title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2004/2244/0/01410478", "title": "Impostor-based animation of deformable virtual characters with dynamic shadow", "doi": null, "abstractUrl": "/proceedings-article/icig/2004/01410478/12OmNwJgAFK", "parentPublication": { "id": "proceedings/icig/2004/2244/0", "title": "Proceedings. Third International Conference on Image and Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/1998/8620/0/86200216", "title": "Disparity Mapping Technique and Fast Rendering Technique for View Morphing", "doi": null, "abstractUrl": "/proceedings-article/pg/1998/86200216/12OmNx3ZjmD", "parentPublication": { "id": "proceedings/pg/1998/8620/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004111", "title": "Real-Time Rendering of Temporal Volumetric Data on a GPU", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004111/12OmNyQ7G0q", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336d053", "title": "Real-Time Crowd Rendering and Interactions on GPU", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336d053/12OmNzDvSnD", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2002/02/mcg2002020036", "title": "Image-Based Crowd Rendering", "doi": null, "abstractUrl": "/magazine/cg/2002/02/mcg2002020036/13rRUEgarDC", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/01/v0046", "title": "Interactive Approximate Rendering of Reflections, Refractions, and Caustics", "doi": null, "abstractUrl": "/journal/tg/2007/01/v0046/13rRUxBJhmJ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/04/mcg2009040044", "title": "YaQ: An Architecture for Real-Time Navigation and Rendering of Varied Crowds", "doi": null, "abstractUrl": "/magazine/cg/2009/04/mcg2009040044/13rRUxCitBQ", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/08/ttg2013081307", "title": "Memory-Efficient Single-Pass GPU Rendering of Multifragment Effects", "doi": null, "abstractUrl": "/journal/tg/2013/08/ttg2013081307/13rRUxd2aZ0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzmclWu", "title": "Ninth International Conference on Information Visualisation (IV'05)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNvq5jGc", "doi": "10.1109/IV.2005.154", "title": "Visualizing time dependent semantics: an application to quantum algorithms", "normalizedTitle": "Visualizing time dependent semantics: an application to quantum algorithms", "abstract": "We have developed a visual syntax for representing concepts that are contingent on temporal properties (time-dependent semantics). A within-group (N=24) experiment was conducted to identify the representations that conveyed best a given semantic. We then applied our representations to the visualization of algorithms in quantum computing and carried out a second experiment (N=16) on subjects unfamiliar with the semantic concepts that were tested. The results show that our representations are intuitive and facilitate a good level of understanding of the algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "We have developed a visual syntax for representing concepts that are contingent on temporal properties (time-dependent semantics). A within-group (N=24) experiment was conducted to identify the representations that conveyed best a given semantic. We then applied our representations to the visualization of algorithms in quantum computing and carried out a second experiment (N=16) on subjects unfamiliar with the semantic concepts that were tested. The results show that our representations are intuitive and facilitate a good level of understanding of the algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have developed a visual syntax for representing concepts that are contingent on temporal properties (time-dependent semantics). A within-group (N=24) experiment was conducted to identify the representations that conveyed best a given semantic. We then applied our representations to the visualization of algorithms in quantum computing and carried out a second experiment (N=16) on subjects unfamiliar with the semantic concepts that were tested. The results show that our representations are intuitive and facilitate a good level of understanding of the algorithms.", "fno": "01509076", "keywords": [ "Visualization", "Quantum Computing", "Animation", "Software Engineering", "Software Algorithms", "Robustness", "Unified Modeling Language", "Testing", "Algorithm Design And Analysis", "Software Systems", "Quantum Algorithms", "Animations", "Structured Based Perception", "Algorithm Visualization", "Semantic Visualization" ], "authors": [ { "affiliation": "Manitoba Univ., Canada", "fullName": "N.R. Kadaba", "givenName": "N.R.", "surname": "Kadaba", "__typename": "ArticleAuthorType" }, { "affiliation": "Manitoba Univ., Canada", "fullName": "P.P. Irani", "givenName": "P.P.", "surname": "Irani", "__typename": "ArticleAuthorType" }, { "affiliation": "Manitoba Univ., Canada", "fullName": "M. Toulouse", "givenName": "M.", "surname": "Toulouse", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-01-01T00:00:00", "pubType": "proceedings", "pages": "182-187", "year": "2005", "issn": "1550-6037", "isbn": "0-7695-2397-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "23970175", "articleId": "12OmNCbkQBY", "__typename": "AdjacentArticleType" }, "next": { "fno": "23970188", "articleId": "12OmNyrZLDu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2008/3109/0/3109a907", "title": "Semantic Mappings: Out of Ontology World Limits", "doi": null, "abstractUrl": "/proceedings-article/cisis/2008/3109a907/12OmNANTAtX", "parentPublication": { "id": "proceedings/cisis/2008/3109/0", "title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2013/6447/0/06595288", "title": "Issues in representing domain-specific concerns in model-driven engineering", "doi": null, "abstractUrl": "/proceedings-article/mise/2013/06595288/12OmNCfSqPM", "parentPublication": { "id": "proceedings/mise/2013/6447/0", "title": "2013 5th International Workshop on Modeling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a025", "title": "Slicing-Based Techniques for Visualizing Large Metamodels", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a025/12OmNrIJqxT", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isise/2008/3494/1/3494a524", "title": "Defining Semantics for Data Element with Semantic Tree", "doi": null, "abstractUrl": "/proceedings-article/isise/2008/3494a524/12OmNzUxOa8", "parentPublication": { "id": "proceedings/isise/2008/3494/1", "title": "2008 International Symposium on Information Science and Engieering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1254", "title": "Visualizing Causal Semantics Using Animations", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1254/13rRUxBa5bL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/04376148", "title": "Visualizing Causal Semantics Using Animations", "doi": null, "abstractUrl": "/journal/tg/2007/06/04376148/13rRUxNW1Zf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a338", "title": "Learning Effective Distributed Representation of Complex Biomedical Concepts", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a338/17D45Vw15ur", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2022/2055/0/205500a562", "title": "Quantum learning algorithms imply circuit lower bounds", "doi": null, "abstractUrl": "/proceedings-article/focs/2022/205500a562/1BtfBlUfRFm", "parentPublication": { "id": "proceedings/focs/2022/2055/0", "title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-2/2019/2850/0/285000a030", "title": "A Proposal of Visualization System for Understanding Quantum Algorithms", "doi": null, "abstractUrl": "/proceedings-article/iv-2/2019/285000a030/1cMEPOstM3K", "parentPublication": { "id": "proceedings/iv-2/2019/2850/0", "title": "2019 23rd International Conference in Information Visualization – Part II", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2019/4648/0/464800a047", "title": "Towards the Mechanized Semantics and Refinement of UML Class Diagrams", "doi": null, "abstractUrl": "/proceedings-article/apsec/2019/464800a047/1gjRUEqY3E4", "parentPublication": { "id": "proceedings/apsec/2019/4648/0", "title": "2019 26th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1hyoTxR", "doi": "10.1109/VR.2018.8446364", "title": "Empirical Evaluation of Virtual Human Conversational and Affective Animations on Visual Attention in Inter-Personal Simulations", "normalizedTitle": "Empirical Evaluation of Virtual Human Conversational and Affective Animations on Visual Attention in Inter-Personal Simulations", "abstract": "Creating realistic animations of virtual humans remains comparatively complex and expensive. This research explores the degree to which animation fidelity affects users' gaze behavior when interacting in virtual reality training simulations that include virtual humans. Participants were randomly assigned to one of three conditions, wherein the virtual patient either: 1) was not animated; 2) played idle animations; or 3) played idle animations, looked at the participant when speaking, and lip-synced speech and facial gestures when conversing with the participant. Each participant's gaze was recorded in an inter-personal interactive patient surveillance simulation. Results suggest that conversational and passive animations elicited visual attention in a similar manner, as compared to the no animation condition. Results also suggest that when participants face critical situations in inter-personal medical simulations, visual attention towards the virtual human decreases while gaze towards goal directed activities increases.", "abstracts": [ { "abstractType": "Regular", "content": "Creating realistic animations of virtual humans remains comparatively complex and expensive. This research explores the degree to which animation fidelity affects users' gaze behavior when interacting in virtual reality training simulations that include virtual humans. Participants were randomly assigned to one of three conditions, wherein the virtual patient either: 1) was not animated; 2) played idle animations; or 3) played idle animations, looked at the participant when speaking, and lip-synced speech and facial gestures when conversing with the participant. Each participant's gaze was recorded in an inter-personal interactive patient surveillance simulation. Results suggest that conversational and passive animations elicited visual attention in a similar manner, as compared to the no animation condition. Results also suggest that when participants face critical situations in inter-personal medical simulations, visual attention towards the virtual human decreases while gaze towards goal directed activities increases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Creating realistic animations of virtual humans remains comparatively complex and expensive. This research explores the degree to which animation fidelity affects users' gaze behavior when interacting in virtual reality training simulations that include virtual humans. Participants were randomly assigned to one of three conditions, wherein the virtual patient either: 1) was not animated; 2) played idle animations; or 3) played idle animations, looked at the participant when speaking, and lip-synced speech and facial gestures when conversing with the participant. Each participant's gaze was recorded in an inter-personal interactive patient surveillance simulation. Results suggest that conversational and passive animations elicited visual attention in a similar manner, as compared to the no animation condition. Results also suggest that when participants face critical situations in inter-personal medical simulations, visual attention towards the virtual human decreases while gaze towards goal directed activities increases.", "fno": "08446364", "keywords": [ "Computer Animation", "Medical Computing", "Virtual Reality", "Affective Animations", "Visual Attention", "Inter Personal Simulations", "Realistic Animations", "Virtual Humans", "Animation Fidelity", "Virtual Reality Training Simulations", "Virtual Patient", "Idle Animations", "Lip Synced Speech", "Inter Personal Interactive Patient Surveillance Simulation", "Conversational Animations", "Passive Animations", "Inter Personal Medical Simulations", "Virtual Human Decreases", "Virtual Human Conversational Empirical Evaluation", "Animation Condition", "Animation", "Visualization", "Solid Modeling", "Training", "Virtual Reality", "Task Analysis", "Surveillance", "H 5 1 Information Interfaces And Presentation Multimedia Information Systems Animations", "Evaluation Methodology", "I 3 3 Computer Graphics Three Dimensional Graphics And Realism Virtual Reality" ], "authors": [ { "affiliation": "Human Centered Computing Lab, Clemson University", "fullName": "Matias Volonte", "givenName": "Matias", "surname": "Volonte", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Centered Computing Lab, Clemson University", "fullName": "Andrew Robb", "givenName": "Andrew", "surname": "Robb", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Centered Computing Lab, Clemson University", "fullName": "Andrew T. Duchowski", "givenName": "Andrew T.", "surname": "Duchowski", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Centered Computing Lab, Clemson University", "fullName": "Sabarish V. Babu", "givenName": "Sabarish V.", "surname": "Babu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "25-32", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08446229", "articleId": "13bd1fHrlRx", "__typename": "AdjacentArticleType" }, "next": { "fno": "08446320", "articleId": "13bd1f3HvEy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ca/1995/7062/0/70620050", "title": "Creating animations using virtual reality ThatcherWorld: a case study", "doi": null, "abstractUrl": "/proceedings-article/ca/1995/70620050/12OmNrJiCSy", "parentPublication": { "id": "proceedings/ca/1995/7062/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sigra/1997/8102/0/00625146", "title": "Building interactive animations using VRML and Java", "doi": null, "abstractUrl": "/proceedings-article/sigra/1997/00625146/12OmNvT2pb7", "parentPublication": { "id": "proceedings/sigra/1997/8102/0", "title": "Proceedings X Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2010/6331/0/05460171", "title": "Animating Gaze Shifts for Virtual Characters Based on Head Movement Propensity", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2010/05460171/12OmNyKa67Q", "parentPublication": { "id": "proceedings/vs-games/2010/6331/0", "title": "2010 2nd International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2014/4261/0/4261a106", "title": "Animar: Augmenting the Reality of Storyboards and Animations", "doi": null, "abstractUrl": "/proceedings-article/svr/2014/4261a106/12OmNyxXlwE", "parentPublication": { "id": "proceedings/svr/2014/4261/0", "title": "2014 XVI Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2010/04/mcg2010040062", "title": "The Expressive Gaze Model: Using Gaze to Express Emotion", "doi": null, "abstractUrl": "/magazine/cg/2010/04/mcg2010040062/13rRUy0ZzSc", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/04/07383334", "title": "Effects of Virtual Human Appearance Fidelity on Emotion Contagion in Affective Inter-Personal Simulations", "doi": null, "abstractUrl": "/journal/tg/2016/04/07383334/13rRUygBw7c", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a558", "title": "CV-Mora Based Lip Sync Facial Animations for Japanese Speech", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a558/1CJfmJhWzMQ", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10044277", "title": "Real-time Multi-map Saliency-driven Gaze Behavior for Non-conversational Characters", "doi": null, "abstractUrl": "/journal/tg/5555/01/10044277/1KL728MHdtu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10076832", "title": "StyleVR: Stylizing Character Animations with Normalizing Flows", "doi": null, "abstractUrl": "/journal/tg/5555/01/10076832/1LFQ6Ir6DEQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089573", "title": "Effects of Interacting with a Crowd of Emotional Virtual Humans on Users&#x2019; Affective and Non-Verbal Behaviors", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089573/1jIxfPwklig", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8taQ", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvEhfZc", "doi": "10.1109/VAST.2014.7042515", "title": "Visualizing the effects of scale and geography in multivariate comparison", "normalizedTitle": "Visualizing the effects of scale and geography in multivariate comparison", "abstract": "Our research investigates the sensitivities and complexities of visualizing multivariate data over multiple scales with the consideration of local geography. We investigate this in the context of creating geodemographic classifications, where multivariate comparison for the variable selection process is an important, yet time-consuming and intensive process. We propose a visual interactive approach which allows skewed variables and those with strong correlations to be quickly identified and investigated and the geography of multi-scale correlation to be explored. Our objective is to present comprehensive documentation of the parameter space prior to the development of the visualization tools to help explore it.", "abstracts": [ { "abstractType": "Regular", "content": "Our research investigates the sensitivities and complexities of visualizing multivariate data over multiple scales with the consideration of local geography. We investigate this in the context of creating geodemographic classifications, where multivariate comparison for the variable selection process is an important, yet time-consuming and intensive process. We propose a visual interactive approach which allows skewed variables and those with strong correlations to be quickly identified and investigated and the geography of multi-scale correlation to be explored. Our objective is to present comprehensive documentation of the parameter space prior to the development of the visualization tools to help explore it.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Our research investigates the sensitivities and complexities of visualizing multivariate data over multiple scales with the consideration of local geography. We investigate this in the context of creating geodemographic classifications, where multivariate comparison for the variable selection process is an important, yet time-consuming and intensive process. We propose a visual interactive approach which allows skewed variables and those with strong correlations to be quickly identified and investigated and the geography of multi-scale correlation to be explored. Our objective is to present comprehensive documentation of the parameter space prior to the development of the visualization tools to help explore it.", "fno": "07042515", "keywords": [ "Correlation", "Geography", "Encoding", "Image Color Analysis", "Data Visualization", "Visualization", "Input Variables", "I 5 2 Pattern Recognition Design Methodology Feature Evaluation And Selection", "D 2 2 Software Engineering Design Tools And Techniques" ], "authors": [ { "affiliation": "giCentre, City University London", "fullName": "Sarah Goodwin", "givenName": "Sarah", "surname": "Goodwin", "__typename": "ArticleAuthorType" }, { "affiliation": "giCentre, City University London", "fullName": "Jason Dykes", "givenName": "Jason", "surname": "Dykes", "__typename": "ArticleAuthorType" }, { "affiliation": "giCentre, City University London", "fullName": "Aidan Slingsby", "givenName": "Aidan", "surname": "Slingsby", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "251-252", "year": "2014", "issn": null, "isbn": "978-1-4799-6227-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07042514", "articleId": "12OmNxzMnNA", "__typename": "AdjacentArticleType" }, "next": { "fno": "07042516", "articleId": "12OmNwD1q6K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itng/2011/4367/0/4367a597", "title": "Multivariate Performance Analysis Methods - A Comparison Study", "doi": null, "abstractUrl": "/proceedings-article/itng/2011/4367a597/12OmNASraT9", "parentPublication": { "id": "proceedings/itng/2011/4367/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2008/1966/0/04475480", "title": "Visualizing Multivariate Networks: A Hybrid Approach", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2008/04475480/12OmNC17hWv", "parentPublication": { "id": "proceedings/pacificvis/2008/1966/0", "title": "IEEE Pacific Visualization Symposium 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visual/1992/2897/0/00235197", "title": "Automated design of virtual worlds for visualizing multivariate relations", "doi": null, "abstractUrl": "/proceedings-article/visual/1992/00235197/12OmNrMZpkl", "parentPublication": { "id": "proceedings/visual/1992/2897/0", "title": "Proceedings Visualization '92", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019837", "title": "Exploring Multivariate Event Sequences Using Rules, Aggregations, and Selections", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019837/13rRUEgs2C1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2008/04/mcs2008040020", "title": "An Integrated Exploration Approach to Visualizing Multivariate Particle Data", "doi": null, "abstractUrl": "/magazine/cs/2008/04/mcs2008040020/13rRUwjXZNE", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192660", "title": "Visualizing Multiple Variables Across Scale and Geography", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192660/13rRUxC0SWc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1161", "title": "Geographically Weighted Visualization: Interactive Graphics for Scale-Varying Exploratory Analysis", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1161/13rRUytF41u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a785", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a785/1LSPpseFmo0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2022/9248/0/924800a143", "title": "Investigating How to Optimize Immersive Virtual Field Trips in Geography Education", "doi": null, "abstractUrl": "/proceedings-article/eitt/2022/924800a143/1MrSP2TBz2M", "parentPublication": { "id": "proceedings/eitt/2022/9248/0", "title": "2022 Eleventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a601", "title": "Augmented Reality Game in Geography: An Orientation Activity to Elementary Education", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a601/1gjRqMfcKfm", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }