data
dict
{ "proceeding": { "id": "1Lxfm4fufy8", "title": "2022 2nd International Conference on Computer Graphics, Image and Virtualization (ICCGIV)", "acronym": "iccgiv", "groupId": "10062267", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LxfqGjszTi", "doi": "10.1109/ICCGIV57403.2022.00043", "title": "Ellipsoidal ray casting algorithm", "normalizedTitle": "Ellipsoidal ray casting algorithm", "abstract": "The Digital Earth (DE) offers a visualization platform via a reference ellipsoid (RE). However, for global volume data on the DE, ray casting algorithm (RCA) faces the challenges of poor performance, earth curvature and incorrect volume rendering due to ignoring earth occlusion. To address the issues, RCA is refactored as ellipsoidal ray casting algorithm (ERCA), which emphasizes the following aspects: ellipsoid- texture space logic mapping, ellipsoidal trilinear interpolation, ray sampling optimization operators, distinguishable transfer function, and proxy ellipsoidal geometry. In particular, a new curved multi-scale ellipsoidal volume grid (EVG) is proposed, which uniformly represents local or global volume data and supports logical mapping between ellipsoidal space and texture space. Ray sampling is optimized with a novel set of culling operators: proxy geometry culling, earth occlusion culling and ellipsoidal bounding box culling, which remove a large number of invalid sampling points to ensure high performance and eliminate correct rendering of ERCA. Experimental results show that ERCA is valid. The ellipsoid-based volume rendering framework can help humans gain insight into 3D scalar data overlaid on the DE.", "abstracts": [ { "abstractType": "Regular", "content": "The Digital Earth (DE) offers a visualization platform via a reference ellipsoid (RE). However, for global volume data on the DE, ray casting algorithm (RCA) faces the challenges of poor performance, earth curvature and incorrect volume rendering due to ignoring earth occlusion. To address the issues, RCA is refactored as ellipsoidal ray casting algorithm (ERCA), which emphasizes the following aspects: ellipsoid- texture space logic mapping, ellipsoidal trilinear interpolation, ray sampling optimization operators, distinguishable transfer function, and proxy ellipsoidal geometry. In particular, a new curved multi-scale ellipsoidal volume grid (EVG) is proposed, which uniformly represents local or global volume data and supports logical mapping between ellipsoidal space and texture space. Ray sampling is optimized with a novel set of culling operators: proxy geometry culling, earth occlusion culling and ellipsoidal bounding box culling, which remove a large number of invalid sampling points to ensure high performance and eliminate correct rendering of ERCA. Experimental results show that ERCA is valid. The ellipsoid-based volume rendering framework can help humans gain insight into 3D scalar data overlaid on the DE.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The Digital Earth (DE) offers a visualization platform via a reference ellipsoid (RE). However, for global volume data on the DE, ray casting algorithm (RCA) faces the challenges of poor performance, earth curvature and incorrect volume rendering due to ignoring earth occlusion. To address the issues, RCA is refactored as ellipsoidal ray casting algorithm (ERCA), which emphasizes the following aspects: ellipsoid- texture space logic mapping, ellipsoidal trilinear interpolation, ray sampling optimization operators, distinguishable transfer function, and proxy ellipsoidal geometry. In particular, a new curved multi-scale ellipsoidal volume grid (EVG) is proposed, which uniformly represents local or global volume data and supports logical mapping between ellipsoidal space and texture space. Ray sampling is optimized with a novel set of culling operators: proxy geometry culling, earth occlusion culling and ellipsoidal bounding box culling, which remove a large number of invalid sampling points to ensure high performance and eliminate correct rendering of ERCA. Experimental results show that ERCA is valid. The ellipsoid-based volume rendering framework can help humans gain insight into 3D scalar data overlaid on the DE.", "fno": "925000a183", "keywords": [ "Data Visualisation", "Geographic Information Systems", "Interpolation", "Ray Tracing", "Rendering Computer Graphics", "Solid Modelling", "Transfer Functions", "3 D Scalar Data", "Digital Earth", "Earth Occlusion Culling", "Ellipsoid Texture Space Logic Mapping", "Ellipsoid Based Volume Rendering", "Ellipsoidal Bounding Box Culling", "Ellipsoidal Ray Casting", "Ellipsoidal Space", "Ellipsoidal Trilinear Interpolation", "Ellipsoidal Volume Grid", "EVG", "Proxy Ellipsoidal Geometry", "Ray Sampling", "Ray Sampling Optimization Operators", "RCA", "RE", "Reference Ellipsoid", "Texture Space", "Transfer Function", "Visualization Platform", "Earth", "Geometry", "Casting", "Interpolation", "Three Dimensional Displays", "Transfer Functions", "Rendering Computer Graphics", "Ray Casting Algorithm", "Proxy Geometry", "Volume Texture", "Trilinear Interpolation", "Digital Earth", "Earth Occlusion" ], "authors": [ { "affiliation": "North China Institute of Computing Technology (NCI),Battlefield Environment Department,Beijing,China", "fullName": "Jiarun Wang", "givenName": "Jiarun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "North China Institute of Computing Technology (NCI),Battlefield Environment Department,Beijing,China", "fullName": "Fan Yang", "givenName": "Fan", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "China People’s Liberation Army National Defense University,Joint Operations Academy,Beijing,China", "fullName": "Zhiqiang Li", "givenName": "Zhiqiang", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-09-01T00:00:00", "pubType": "proceedings", "pages": "183-190", "year": "2022", "issn": null, "isbn": "978-1-6654-9250-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "925000a177", "articleId": "1LxfnQQeBAA", "__typename": "AdjacentArticleType" }, "next": { "fno": "925000a191", "articleId": "1Lxfn0Al4Wc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscsct/2008/3498/2/3498b783", "title": "An Octree Ray Casting Algorithm Based on Multi-core CPUs", "doi": null, "abstractUrl": "/proceedings-article/iscsct/2008/3498b783/12OmNAgGwg5", "parentPublication": { "id": "proceedings/iscsct/2008/3498/1", "title": "2008 International Symposium on Computer Science and Computational Technology (ISCSCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2014/6854/0/6854a424", "title": "The Study of the Terrain Rendering Method Based on Ray Casting", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2014/6854a424/12OmNAoUTx7", "parentPublication": { "id": "proceedings/icvrv/2014/6854/0", "title": "2014 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a468", "title": "An Accelerative Ray Casting Algorithm Based on Crossing-Area Technique", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a468/12OmNArbG2a", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vv/1998/9180/0/91800055", "title": "Adaptive Perspective Ray Casting", "doi": null, "abstractUrl": "/proceedings-article/vv/1998/91800055/12OmNBRsVxg", "parentPublication": { "id": "proceedings/vv/1998/9180/0", "title": "Volume Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/frontiers/1995/6965/0/69650238", "title": "An optimal parallel algorithm for volume ray casting", "doi": null, "abstractUrl": "/proceedings-article/frontiers/1995/69650238/12OmNxisQY8", "parentPublication": { "id": "proceedings/frontiers/1995/6965/0", "title": "Frontiers of Massively Parallel Processing, Symposium on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prs/1993/4920/0/00586079", "title": "Segmented ray casting for data parallel volume rendering", "doi": null, "abstractUrl": "/proceedings-article/prs/1993/00586079/12OmNybfr4E", "parentPublication": { "id": "proceedings/prs/1993/4920/0", "title": "Proceedings of 1993 IEEE Parallel Rendering Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1998/9176/0/91760247", "title": "Accelerated Ray-Casting for Curvilinear Volumes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1998/91760247/12OmNyoAA7g", "parentPublication": { "id": "proceedings/ieee-vis/1998/9176/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/03/ttg2008030603", "title": "Interactive High-Resolution Isosurface Ray Casting on Multicore Processors", "doi": null, "abstractUrl": "/journal/tg/2008/03/ttg2008030603/13rRUEgs2LW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1999/04/v0322", "title": "Fast Projection-Based Ray-Casting Algorithm for Rendering Curvilinear Volumes", "doi": null, "abstractUrl": "/journal/tg/1999/04/v0322/13rRUyY294r", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccgiv/2022/9250/0/925000a020", "title": "ELERP: An ellipsoidal linear interpolation for ellipsoidal graph visualization", "doi": null, "abstractUrl": "/proceedings-article/iccgiv/2022/925000a020/1Lxfqe26lqM", "parentPublication": { "id": "proceedings/iccgiv/2022/9250/0", "title": "2022 2nd International Conference on Computer Graphics, Image and Virtualization (ICCGIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1b1xbcN9JrW", "title": "2018 IEEE 8th Symposium on Large Data Analysis and Visualization (LDAV)", "acronym": "ldav", "groupId": "1800568", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1b1xbA4goJW", "doi": "10.1109/LDAV.2018.8739224", "title": "SpRay: Speculative Ray Scheduling for Large Data Visualization", "normalizedTitle": "SpRay: Speculative Ray Scheduling for Large Data Visualization", "abstract": "Figure 1:All images rendered with our speculative ray tracing technique. First three columns: a massive channel-flow turbulence DNS dataset. Last two columns: an RM fluid instability dataset and an Enzo Astrophysics AMR dataset (left and right). The number of triangles from left to right: DNS2 (1.8 billion), DNS1-side and DNS1-back (0.9 billion), RM (108 million), and Enzo (8 million). Five images on the bottom row show ambient occlusion shading, and the rest show three-bounce path tracing. For all datasets, 32 samples per pixel were used to render images at 1024×1024 resolution, and one diffuse ray and 16 shadow rays were generated at every hit point. Using Stampede2 Skylake at the Texas Advanced Computing Center, each node with 192 GB memory, at least eight nodes are required to render the DNS dataset with speculation enabled.With modern supercomputers offering petascale compute capability, scientific simulations are now producing terascale data. For comprehensive understanding of such large data, ray tracing is becoming increasingly important for 3D-rendering in visualization due to its inherent ability to convey physically realistic visual information to the user. Implementing efficient parallel ray tracing systems on supercomputers while maximizing locality and parallelism is challenging because of the overhead incurred by ray communication across the cluster of compute nodes and data loading from storage. To address the problem, reordering rendering computations by means of ray batching and scheduling has been proposed to temporarily avoid inherent dependencies in the rendering computations and amortize the cost of expensive data moving operations over ray batches. In this paper, we introduce a novel speculative ray scheduling method that builds upon this insight but radically changes the approach to resolving dependencies by allowing redundant computations to a certain extent. To evaluate the method, we measure the performance of different implementations for both out-of-core and in situ rendering setups. Results show that compared to a well-known scheduling method, our approach on ambient occlusion and path tracing achieves up to 2.3× speedup for the scenes comprising up to billions of triangles extracted from terascale scientific data.", "abstracts": [ { "abstractType": "Regular", "content": "Figure 1:All images rendered with our speculative ray tracing technique. First three columns: a massive channel-flow turbulence DNS dataset. Last two columns: an RM fluid instability dataset and an Enzo Astrophysics AMR dataset (left and right). The number of triangles from left to right: DNS2 (1.8 billion), DNS1-side and DNS1-back (0.9 billion), RM (108 million), and Enzo (8 million). Five images on the bottom row show ambient occlusion shading, and the rest show three-bounce path tracing. For all datasets, 32 samples per pixel were used to render images at 1024×1024 resolution, and one diffuse ray and 16 shadow rays were generated at every hit point. Using Stampede2 Skylake at the Texas Advanced Computing Center, each node with 192 GB memory, at least eight nodes are required to render the DNS dataset with speculation enabled.With modern supercomputers offering petascale compute capability, scientific simulations are now producing terascale data. For comprehensive understanding of such large data, ray tracing is becoming increasingly important for 3D-rendering in visualization due to its inherent ability to convey physically realistic visual information to the user. Implementing efficient parallel ray tracing systems on supercomputers while maximizing locality and parallelism is challenging because of the overhead incurred by ray communication across the cluster of compute nodes and data loading from storage. To address the problem, reordering rendering computations by means of ray batching and scheduling has been proposed to temporarily avoid inherent dependencies in the rendering computations and amortize the cost of expensive data moving operations over ray batches. In this paper, we introduce a novel speculative ray scheduling method that builds upon this insight but radically changes the approach to resolving dependencies by allowing redundant computations to a certain extent. To evaluate the method, we measure the performance of different implementations for both out-of-core and in situ rendering setups. Results show that compared to a well-known scheduling method, our approach on ambient occlusion and path tracing achieves up to 2.3× speedup for the scenes comprising up to billions of triangles extracted from terascale scientific data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Figure 1:All images rendered with our speculative ray tracing technique. First three columns: a massive channel-flow turbulence DNS dataset. Last two columns: an RM fluid instability dataset and an Enzo Astrophysics AMR dataset (left and right). The number of triangles from left to right: DNS2 (1.8 billion), DNS1-side and DNS1-back (0.9 billion), RM (108 million), and Enzo (8 million). Five images on the bottom row show ambient occlusion shading, and the rest show three-bounce path tracing. For all datasets, 32 samples per pixel were used to render images at 1024×1024 resolution, and one diffuse ray and 16 shadow rays were generated at every hit point. Using Stampede2 Skylake at the Texas Advanced Computing Center, each node with 192 GB memory, at least eight nodes are required to render the DNS dataset with speculation enabled.With modern supercomputers offering petascale compute capability, scientific simulations are now producing terascale data. For comprehensive understanding of such large data, ray tracing is becoming increasingly important for 3D-rendering in visualization due to its inherent ability to convey physically realistic visual information to the user. Implementing efficient parallel ray tracing systems on supercomputers while maximizing locality and parallelism is challenging because of the overhead incurred by ray communication across the cluster of compute nodes and data loading from storage. To address the problem, reordering rendering computations by means of ray batching and scheduling has been proposed to temporarily avoid inherent dependencies in the rendering computations and amortize the cost of expensive data moving operations over ray batches. In this paper, we introduce a novel speculative ray scheduling method that builds upon this insight but radically changes the approach to resolving dependencies by allowing redundant computations to a certain extent. To evaluate the method, we measure the performance of different implementations for both out-of-core and in situ rendering setups. Results show that compared to a well-known scheduling method, our approach on ambient occlusion and path tracing achieves up to 2.3× speedup for the scenes comprising up to billions of triangles extracted from terascale scientific data.", "fno": "08739224", "keywords": [ "Data Visualisation", "Mainframes", "Parallel Machines", "Ray Tracing", "Rendering Computer Graphics", "Scheduling", "Turbulence", "Stampede 2 Skylake", "Texas Advanced Computing Center", "Rendering Computations", "Ray Batching", "Data Visualization", "Speculative Ray Tracing Technique", "Massive Channel Flow Turbulence DNS Dataset", "RM Fluid Instability Dataset", "Enzo Astrophysics AMR Dataset", "Supercomputers", "Speculative Ray Scheduling Method", "Parallel Ray Tracing Systems", "Three Bounce Path Tracing", "Sp Ray", "Rendering Computer Graphics", "Ray Tracing", "Data Visualization", "Processor Scheduling", "Cameras", "Supercomputers", "Human Centered Computing", "Visualization", "Visualization Techniques", "Computing Methodologies", "Computer Graphics", "Rendering", "Ray Tracing" ], "authors": [ { "affiliation": "Electrical and Computer Engineering, The University of Texas at Austin", "fullName": "Hyungman Park", "givenName": "Hyungman", "surname": "Park", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science, The University of Texas at Austin", "fullName": "Donald Fussell", "givenName": "Donald", "surname": "Fussell", "__typename": "ArticleAuthorType" }, { "affiliation": "Texas Advanced Computing Center, The University of Texas at Austin", "fullName": "Paul Navrátil", "givenName": "Paul", "surname": "Navrátil", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "77-86", "year": "2018", "issn": null, "isbn": "978-1-5386-6873-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08739241", "articleId": "1b1xcjia3Be", "__typename": "AdjacentArticleType" }, "next": { "fno": "08739215", "articleId": "1b1xbgxlBQI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/1995/7187/0/71870019", "title": "Interactive Realism for Visualization Using Ray Tracing", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870019/12OmNAsTgR0", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rt/2006/0693/0/04061539", "title": "Ray Tracing for the Movie `Cars'", "doi": null, "abstractUrl": "/proceedings-article/rt/2006/04061539/12OmNBBzoiL", "parentPublication": { "id": "proceedings/rt/2006/0693/0", "title": "IEEE Symposium on Interactive Ray Tracing 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910011", "title": "Distributed Interactive Ray Tracing of Dynamic Scenes", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910011/12OmNBO3KjK", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvg/2003/2091/0/20910012", "title": "Distributed Interactive Ray Tracing for Large Volume Visualization", "doi": null, "abstractUrl": "/proceedings-article/pvg/2003/20910012/12OmNBsue7j", "parentPublication": { "id": "proceedings/pvg/2003/2091/0", "title": "Parallel and Large-Data Visualization and Graphics, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pvgs/2003/8122/0/01249046", "title": "Distributed interactive ray tracing for large volume visualization", "doi": null, "abstractUrl": "/proceedings-article/pvgs/2003/01249046/12OmNz2TCDv", "parentPublication": { "id": "proceedings/pvgs/2003/8122/0", "title": "IEEE Symposium on Parallel and Large-Data Visualization and Graphics 2003", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/02/ttg2010020261", "title": "Real-Time Ray Tracing of Implicit Surfaces on the GPU", "doi": null, "abstractUrl": "/journal/tg/2010/02/ttg2010020261/13rRUwI5TQT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2005/05/v0562", "title": "Faster Isosurface Ray Tracing Using Implicit KD-Trees", "doi": null, "abstractUrl": "/journal/tg/2005/05/v0562/13rRUwkfAZ5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2007/06/mcg2007060036", "title": "Exploring a Boeing 777: Ray Tracing Large-Scale CAD Data", "doi": null, "abstractUrl": "/magazine/cg/2007/06/mcg2007060036/13rRUxC0SGw", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222372", "title": "Ray Tracing Structured AMR Data Using ExaBricks", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222372/1nTqdQ0THGw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552600", "title": "Data-Aware Predictive Scheduling for Distributed-Memory Ray Tracing", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552600/1xic3V39h96", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzYwc3a", "title": "2017 IEEE Workshop on Data Systems for Interactive Analysis (DSIA)", "acronym": "dsia", "groupId": "1824964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJAdU1", "doi": "10.1109/DSIA.2017.8339088", "title": "A client-based visual analytics framework for large spatiotemporal data under architectural constraints", "normalizedTitle": "A client-based visual analytics framework for large spatiotemporal data under architectural constraints", "abstract": "A primary aim of visual analytics is to provide end-users interactive and scalable environments to facilitate their decision making tasks. Researchers have often utilized several server-client solutions to support interactive data exploration (e.g., building the data cube, parallelizing data processing). However, these solutions can suffer from scalability issues especially in the absence of adequate computation functionality provided by servers. Organizational policies can also prohibit the transfer of data to external data servers because of security or budgetary concerns; thereby, severely limiting the capability of the visual analytic systems. Therefore, in this paper, we propose an interactive client-based visual analytics framework for large-scale spatiotemporal data. The proposed framework follows a sampling based incremental visual analysis approach to sustain the real-time responsiveness, meanwhile, with affordable computation resources in a client machine. General sampling methods [34] preprocess the entire dataset to build data indexing, which can bring the client unaffordable computation overhead. Instead, our framework proposes a novel data management model, using the spatiotemporal clustering pattern to predictively organize and sample data based on historical data acquisition activities. We demonstrate the capabilities and usefulness of our framework by applying it on crime data and Twitter data. We also conduct several experimental evaluations to determine the efficacy of our framework.", "abstracts": [ { "abstractType": "Regular", "content": "A primary aim of visual analytics is to provide end-users interactive and scalable environments to facilitate their decision making tasks. Researchers have often utilized several server-client solutions to support interactive data exploration (e.g., building the data cube, parallelizing data processing). However, these solutions can suffer from scalability issues especially in the absence of adequate computation functionality provided by servers. Organizational policies can also prohibit the transfer of data to external data servers because of security or budgetary concerns; thereby, severely limiting the capability of the visual analytic systems. Therefore, in this paper, we propose an interactive client-based visual analytics framework for large-scale spatiotemporal data. The proposed framework follows a sampling based incremental visual analysis approach to sustain the real-time responsiveness, meanwhile, with affordable computation resources in a client machine. General sampling methods [34] preprocess the entire dataset to build data indexing, which can bring the client unaffordable computation overhead. Instead, our framework proposes a novel data management model, using the spatiotemporal clustering pattern to predictively organize and sample data based on historical data acquisition activities. We demonstrate the capabilities and usefulness of our framework by applying it on crime data and Twitter data. We also conduct several experimental evaluations to determine the efficacy of our framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A primary aim of visual analytics is to provide end-users interactive and scalable environments to facilitate their decision making tasks. Researchers have often utilized several server-client solutions to support interactive data exploration (e.g., building the data cube, parallelizing data processing). However, these solutions can suffer from scalability issues especially in the absence of adequate computation functionality provided by servers. Organizational policies can also prohibit the transfer of data to external data servers because of security or budgetary concerns; thereby, severely limiting the capability of the visual analytic systems. Therefore, in this paper, we propose an interactive client-based visual analytics framework for large-scale spatiotemporal data. The proposed framework follows a sampling based incremental visual analysis approach to sustain the real-time responsiveness, meanwhile, with affordable computation resources in a client machine. General sampling methods [34] preprocess the entire dataset to build data indexing, which can bring the client unaffordable computation overhead. Instead, our framework proposes a novel data management model, using the spatiotemporal clustering pattern to predictively organize and sample data based on historical data acquisition activities. We demonstrate the capabilities and usefulness of our framework by applying it on crime data and Twitter data. We also conduct several experimental evaluations to determine the efficacy of our framework.", "fno": "08339088", "keywords": [ "Servers", "Spatiotemporal Phenomena", "Data Models", "Visual Analytics", "Data Visualization", "Indexing", "Large Spatiotemporal Data", "Data Management", "Incremental Visualization" ], "authors": [ { "affiliation": "Purdue University", "fullName": "Guizhen Wang", "givenName": "Guizhen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Abish Malik", "givenName": "Abish", "surname": "Malik", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Chittayong Surakitbanharn", "givenName": "Chittayong", "surname": "Surakitbanharn", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Ceara", "fullName": "José Florencio de Queiroz Neto", "givenName": "José Florencio", "surname": "de Queiroz Neto", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Shehzad Afzal", "givenName": "Shehzad", "surname": "Afzal", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Siqiao Chen", "givenName": "Siqiao", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "David Wiszowaty", "givenName": "David", "surname": "Wiszowaty", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "David S. Ebert", "givenName": "David S.", "surname": "Ebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2017", "issn": null, "isbn": "978-1-5386-2198-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08339087", "articleId": "12OmNx3Zjp2", "__typename": "AdjacentArticleType" }, "next": { "fno": "08339089", "articleId": "12OmNAJVcCM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400536", "title": "The spatiotemporal multivariate hypercube for discovery of patterns in event data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400536/12OmNvnOwsG", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004398", "title": "Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004398/12OmNwbLVmL", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042482", "title": "An insight- and task-based methodology for evaluating spatiotemporal visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042482/12OmNwp74wP", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/05/mcg2018050026", "title": "Spatio-Temporal Urban Data Analysis: A Visual Analytics Perspective", "doi": null, "abstractUrl": "/magazine/cg/2018/05/mcg2018050026/13WBGTItFGV", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585564", "title": "Interactive Visual Analytics Application for Spatiotemporal Movement Data VAST Challenge 2017 Mini-Challenge 1: Award for Actionable and Detailed Analysis", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585564/17D45VsBU7R", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440040", "title": "A Visual Analytics Framework for Spatiotemporal Trade Network Analysis", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440040/17D45WHONjL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/02/08950124", "title": "Visual Analytics of Anomalous User Behaviors: A Survey", "doi": null, "abstractUrl": "/journal/bd/2022/02/08950124/1gKwHIY8sAo", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a072", "title": "STULL: Unbiased Online Sampling for Visual Exploration of Large Spatiotemporal Data", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a072/1q7jwDf9eTK", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a467", "title": "Spatiotemporal Phenomena Summarization through Static Visual Narratives", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a467/1rSRaNwIpFK", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09397369", "title": "Visual Cascade Analytics of Large-Scale Spatiotemporal Data", "doi": null, "abstractUrl": "/journal/tg/2022/06/09397369/1sA4WPUOESY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1q7jvqMQMww", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1q7jwDf9eTK", "doi": "10.1109/VAST50239.2020.00012", "title": "STULL: Unbiased Online Sampling for Visual Exploration of Large Spatiotemporal Data", "normalizedTitle": "STULL: Unbiased Online Sampling for Visual Exploration of Large Spatiotemporal Data", "abstract": "Online sampling-supported visual analytics is increasingly important, as it allows users to explore large datasets with acceptable approximate answers at interactive rates. However, existing online spatiotemporal sampling techniques are often biased, as most researchers have primarily focused on reducing computational latency. Biased sampling approaches select data with unequal probabilities and produce results that do not match the exact data distribution, leading end users to incorrect interpretations. In this paper, we propose a novel approach to perform unbiased online sampling of large spatiotemporal data. The proposed approach ensures the same probability of selection to every point that qualifies the specifications of a user's multidimensional query. To achieve unbiased sampling for accurate representative interactive visualizations, we design a novel data index and an associated sample retrieval plan. Our proposed sampling approach is suitable for a wide variety of visual analytics tasks, e.g., tasks that run aggregate queries of spatiotemporal data. Extensive experiments confirm the superiority of our approach over a state-of-the-art spatial online sampling technique, demonstrating that within the same computational time, data samples generated in our approach are at least 50% more accurate in representing the actual spatial distribution of the data and enable approximate visualizations to present closer visual appearances to the exact ones.", "abstracts": [ { "abstractType": "Regular", "content": "Online sampling-supported visual analytics is increasingly important, as it allows users to explore large datasets with acceptable approximate answers at interactive rates. However, existing online spatiotemporal sampling techniques are often biased, as most researchers have primarily focused on reducing computational latency. Biased sampling approaches select data with unequal probabilities and produce results that do not match the exact data distribution, leading end users to incorrect interpretations. In this paper, we propose a novel approach to perform unbiased online sampling of large spatiotemporal data. The proposed approach ensures the same probability of selection to every point that qualifies the specifications of a user's multidimensional query. To achieve unbiased sampling for accurate representative interactive visualizations, we design a novel data index and an associated sample retrieval plan. Our proposed sampling approach is suitable for a wide variety of visual analytics tasks, e.g., tasks that run aggregate queries of spatiotemporal data. Extensive experiments confirm the superiority of our approach over a state-of-the-art spatial online sampling technique, demonstrating that within the same computational time, data samples generated in our approach are at least 50% more accurate in representing the actual spatial distribution of the data and enable approximate visualizations to present closer visual appearances to the exact ones.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Online sampling-supported visual analytics is increasingly important, as it allows users to explore large datasets with acceptable approximate answers at interactive rates. However, existing online spatiotemporal sampling techniques are often biased, as most researchers have primarily focused on reducing computational latency. Biased sampling approaches select data with unequal probabilities and produce results that do not match the exact data distribution, leading end users to incorrect interpretations. In this paper, we propose a novel approach to perform unbiased online sampling of large spatiotemporal data. The proposed approach ensures the same probability of selection to every point that qualifies the specifications of a user's multidimensional query. To achieve unbiased sampling for accurate representative interactive visualizations, we design a novel data index and an associated sample retrieval plan. Our proposed sampling approach is suitable for a wide variety of visual analytics tasks, e.g., tasks that run aggregate queries of spatiotemporal data. Extensive experiments confirm the superiority of our approach over a state-of-the-art spatial online sampling technique, demonstrating that within the same computational time, data samples generated in our approach are at least 50% more accurate in representing the actual spatial distribution of the data and enable approximate visualizations to present closer visual appearances to the exact ones.", "fno": "800900a072", "keywords": [ "Data Mining", "Image Sampling", "Probability", "Query Processing", "Visual Databases", "Approximate Visualizations", "Visual Appearances", "Unbiased Online Sampling", "Visual Exploration", "Spatiotemporal Data", "Online Sampling Supported Visual Analytics", "Online Spatiotemporal Sampling Techniques", "Biased Sampling Approaches", "Exact Data Distribution", "Unbiased Sampling", "Representative Interactive Visualizations", "Data Index", "Sample Retrieval Plan", "Spatial Online Sampling Technique", "Data Samples", "STULL", "Data Visualization", "Spatiotemporal Phenomena", "Visual Analytics", "Indexes", "Task Analysis", "Spatial Databases", "Time Factors", "Geospatial Data", "Large Scale Data Techniques", "Data Management", "Visual Analytics" ], "authors": [ { "affiliation": "Purdue University", "fullName": "Guizhen Wang", "givenName": "Guizhen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Jingjing Guo", "givenName": "Jingjing", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Chinese Academy of Science", "fullName": "Mingjie Tang", "givenName": "Mingjie", "surname": "Tang", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Ceara", "fullName": "José Florencio de Queiroz Neto", "givenName": "José Florencio de", "surname": "Queiroz Neto", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Calvin Yau", "givenName": "Calvin", "surname": "Yau", "__typename": "ArticleAuthorType" }, { "affiliation": "Umm Al-Qura University", "fullName": "Anas Daghistani", "givenName": "Anas", "surname": "Daghistani", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Colorado Boulder", "fullName": "Morteza Karimzadeh", "givenName": "Morteza", "surname": "Karimzadeh", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue University", "fullName": "Walid G. Aref", "givenName": "Walid G.", "surname": "Aref", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Oklahoma", "fullName": "David S. Ebert", "givenName": "David S.", "surname": "Ebert", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "72-83", "year": "2020", "issn": null, "isbn": "978-1-7281-8009-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "800900a060", "articleId": "1q7jw7xKEh2", "__typename": "AdjacentArticleType" }, "next": { "fno": "800900a084", "articleId": "1q7jvCEjsxG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsia/2017/2198/0/08339088", "title": "A client-based visual analytics framework for large spatiotemporal data under architectural constraints", "doi": null, "abstractUrl": "/proceedings-article/dsia/2017/08339088/12OmNrJAdU1", "parentPublication": { "id": "proceedings/dsia/2017/2198/0", "title": "2017 IEEE Workshop on Data Systems for Interactive Analysis (DSIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2012/4752/0/06400536", "title": "The spatiotemporal multivariate hypercube for discovery of patterns in event data", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400536/12OmNvnOwsG", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042482", "title": "An insight- and task-based methodology for evaluating spatiotemporal visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042482/12OmNwp74wP", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2011/4557/0/4557a357", "title": "Unbiased Sampling of Bipartite Graph", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2011/4557a357/12OmNy5zsnM", "parentPublication": { "id": "proceedings/cyberc/2011/4557/0", "title": "2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363777", "title": "Parallel in-memory trajectory-based spatiotemporal topological join", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363777/12OmNz5s0MH", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585564", "title": "Interactive Visual Analytics Application for Spatiotemporal Movement Data VAST Challenge 2017 Mini-Challenge 1: Award for Actionable and Detailed Analysis", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585564/17D45VsBU7R", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440040", "title": "A Visual Analytics Framework for Spatiotemporal Trade Network Analysis", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440040/17D45WHONjL", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a294", "title": "Visualising Hidden Spatiotemporal Patterns at Multiple Levels of Detail", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a294/17D45WODarg", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005461", "title": "USTAR: Online Multimodal Embedding for Modeling User-Guided Spatiotemporal Activity", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005461/1hJsp5wouDS", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/06/09397369", "title": "Visual Cascade Analytics of Large-Scale Spatiotemporal Data", "doi": null, "abstractUrl": "/journal/tg/2022/06/09397369/1sA4WPUOESY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxeutfm", "title": "2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "acronym": "isvlsi", "groupId": "1000807", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNApu5ys", "doi": "10.1109/ISVLSI.2018.00108", "title": "A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices", "normalizedTitle": "A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices", "abstract": "Throughout many scientific and engineering fields, including control theory, quantum mechanics, advanced dynamics, and network theory, a great many important applications rely on the spectral decomposition of matrices. Traditional methods such as the power iteration method, Jacobi eigenvalue method, and QR decomposition are commonly used to compute the eigenvalues and eigenvectors of a square and symmetric matrix. However, these methods suffer from certain drawbacks: in particular, the power iteration method can only find the leading eigen-pair (i.e., the largest eigenvalue and its corresponding eigenvector), while the Jacobi and QR decomposition methods face significant performance limitations when facing with large scale matrices. Typically, even producing approximate eigenpairs of a general square matrix requires at least O(N<sup>3</sup>) time complexity, where N is the number of rows of the matrix. In this work, we exploit the newly developed memristor technology to propose a low-complexity, scalable memristorbased method for deriving a set of dominant eigenvalues and eigenvectors for real symmetric non-negative matrices. The time complexity for our proposed algorithm is O(N<sup>2</sup>/&#x0394;) (where &#x0394; governs the accuracy). We present experimental studies to simulate the memristor-supporting algorithm, with results demonstrating that the average error for our method is within 4%, while its performance is up to 1.78X better than traditional methods.", "abstracts": [ { "abstractType": "Regular", "content": "Throughout many scientific and engineering fields, including control theory, quantum mechanics, advanced dynamics, and network theory, a great many important applications rely on the spectral decomposition of matrices. Traditional methods such as the power iteration method, Jacobi eigenvalue method, and QR decomposition are commonly used to compute the eigenvalues and eigenvectors of a square and symmetric matrix. However, these methods suffer from certain drawbacks: in particular, the power iteration method can only find the leading eigen-pair (i.e., the largest eigenvalue and its corresponding eigenvector), while the Jacobi and QR decomposition methods face significant performance limitations when facing with large scale matrices. Typically, even producing approximate eigenpairs of a general square matrix requires at least O(N<sup>3</sup>) time complexity, where N is the number of rows of the matrix. In this work, we exploit the newly developed memristor technology to propose a low-complexity, scalable memristorbased method for deriving a set of dominant eigenvalues and eigenvectors for real symmetric non-negative matrices. The time complexity for our proposed algorithm is O(N<sup>2</sup>/&#x0394;) (where &#x0394; governs the accuracy). We present experimental studies to simulate the memristor-supporting algorithm, with results demonstrating that the average error for our method is within 4%, while its performance is up to 1.78X better than traditional methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Throughout many scientific and engineering fields, including control theory, quantum mechanics, advanced dynamics, and network theory, a great many important applications rely on the spectral decomposition of matrices. Traditional methods such as the power iteration method, Jacobi eigenvalue method, and QR decomposition are commonly used to compute the eigenvalues and eigenvectors of a square and symmetric matrix. However, these methods suffer from certain drawbacks: in particular, the power iteration method can only find the leading eigen-pair (i.e., the largest eigenvalue and its corresponding eigenvector), while the Jacobi and QR decomposition methods face significant performance limitations when facing with large scale matrices. Typically, even producing approximate eigenpairs of a general square matrix requires at least O(N3) time complexity, where N is the number of rows of the matrix. In this work, we exploit the newly developed memristor technology to propose a low-complexity, scalable memristorbased method for deriving a set of dominant eigenvalues and eigenvectors for real symmetric non-negative matrices. The time complexity for our proposed algorithm is O(N2/Δ) (where Δ governs the accuracy). We present experimental studies to simulate the memristor-supporting algorithm, with results demonstrating that the average error for our method is within 4%, while its performance is up to 1.78X better than traditional methods.", "fno": "709901a563", "keywords": [ "Approximation Theory", "Computational Complexity", "Eigenvalues And Eigenfunctions", "Iterative Methods", "Matrix Algebra", "Memristors", "Approximate Eigenvalues", "Nonnegative Matrices", "Control Theory", "Quantum Mechanics", "Advanced Dynamics", "Network Theory", "Power Iteration Method", "QR Decomposition", "Symmetric Matrix", "Memristor Supporting Algorithm", "Approximate Eigenvectors", "Square Matrix", "Spectral Decomposition", "Time Complexity", "Real Symmetric Non Negative Matrices", "Eigenvalues And Eigenfunctions", "Memristors", "Symmetric Matrices", "Jacobian Matrices", "Matrix Decomposition", "Transmission Line Matrix Methods", "Complexity Theory", "Memristor", "Eigen Value", "Non Negative Marices" ], "authors": [ { "affiliation": null, "fullName": "Chenghong Wang", "givenName": "Chenghong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zeinab S. Jalali", "givenName": "Zeinab S.", "surname": "Jalali", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Caiwen Ding", "givenName": "Caiwen", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanzhi Wang", "givenName": "Yanzhi", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sucheta Soundarajan", "givenName": "Sucheta", "surname": "Soundarajan", "__typename": "ArticleAuthorType" } ], "idPrefix": "isvlsi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "563-568", "year": "2018", "issn": "2159-3477", "isbn": "978-1-5386-7099-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "709901a557", "articleId": "12OmNx4Q6IM", "__typename": "AdjacentArticleType" }, "next": { "fno": "709901a569", "articleId": "12OmNwpXRQN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asap/1990/9089/0/00145511", "title": "Bit-level systolic algorithm for the symmetric eigenvalue problem", "doi": null, "abstractUrl": "/proceedings-article/asap/1990/00145511/12OmNAle6U6", "parentPublication": { "id": "proceedings/asap/1990/9089/0", "title": "Proceedings of the International Conference on Application Specific Array Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2012/4722/0/4722a069", "title": "Implementing the Jacobi Algorithm for Solving Eigenvalues of Symmetric Matrices with CUDA", "doi": null, "abstractUrl": "/proceedings-article/nas/2012/4722a069/12OmNBigFp2", "parentPublication": { "id": "proceedings/nas/2012/4722/0", "title": "2012 IEEE Seventh International Conference on Networking, Architecture, and Storage", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2011/688/0/05954553", "title": "An Inverse Eigenvalue Problem for a Special Kind of Matrices", "doi": null, "abstractUrl": "/proceedings-article/icic/2011/05954553/12OmNqIzh1k", "parentPublication": { "id": "proceedings/icic/2011/688/0", "title": "2011 Fourth International Conference on Information and Computing (ICIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270a764", "title": "An Inverse Eigenvalue Problem for Symmetric Arrow-Plus-Jacobi Matrices", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a764/12OmNrAdsxz", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2018/4368/0/436801a940", "title": "Convergence Models and Surprising Results for the Asynchronous Jacobi Method", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2018/436801a940/12OmNvSbBLN", "parentPublication": { "id": "proceedings/ipdps/2018/4368/0", "title": "2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/reconfig/2011/4551/0/06128601", "title": "Reconfigurable FPGA-Based Unit for Singular Value Decomposition of Large m x n Matrices", "doi": null, "abstractUrl": "/proceedings-article/reconfig/2011/06128601/12OmNx0A7C4", "parentPublication": { "id": "proceedings/reconfig/2011/4551/0", "title": "Reconfigurable Computing and FPGAs, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2011/4335/0/4335a172", "title": "The Inverse Eigenvalue Problem for a Special Kind of Matrices", "doi": null, "abstractUrl": "/proceedings-article/cso/2011/4335a172/12OmNxX3uOZ", "parentPublication": { "id": "proceedings/cso/2011/4335/0", "title": "2011 Fourth International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2022/08/09771084", "title": "Low-Latency and Reconfigurable VLSI-Architectures for Computing Eigenvalues and Eigenvectors Using CORDIC-Based Parallel Jacobi Method", "doi": null, "abstractUrl": "/journal/si/2022/08/09771084/1DeF2DHR6rS", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2023/05/09869704", "title": "Memristor-Based Spectral Decomposition of Matrices and Its Applications", "doi": null, "abstractUrl": "/journal/tc/2023/05/09869704/1GeVRN7s3Is", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f894", "title": "Algebraic Characterization of Essential Matrices and Their Averaging in Multiview Settings", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f894/1hVlUnTCXpC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQYtf0", "title": "Proceedings of 26th Southeastern Symposium on System Theory", "acronym": "ssst", "groupId": "1000732", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBtiI1", "doi": "10.1109/SSST.1994.287865", "title": "Parallel D-eigenvalues and parallel D-eigenvectors for linear time-varying systems", "normalizedTitle": "Parallel D-eigenvalues and parallel D-eigenvectors for linear time-varying systems", "abstract": "Singular behavior of PD-eigenvalues of an nth-order scalar polynomial differential operator (SPDO) /spl Dscrsub /spl alpha=/spl deltasup n/+/spl Sigmasub k=1sup nspl alphasub k/(t)/spl deltasup k/spl minus/1/, where /spl delta/=d/dt, is investigated. Main results of this paper include: (i) definition and properties of PD-eigenvectors associated with PD-eigenvalues, (ii) definitions and properties of generalized PD-eigenvectors and generalized PD-eigenvalues for singular PD-eigenvalues; (iii) application of (i) and (ii) in stability analysis of linear time-varying (LTV) systems /spl Dscrsub /spl alpha/spl lcub/y/spl rcub/=0, and (iv) application (i) and (ii) in the realization of PD-characteristic equation. The new results will have a significant impact on applications of the unified eigenvalue theory to the analysis and control of LTV control systems, and its further development.<>", "abstracts": [ { "abstractType": "Regular", "content": "Singular behavior of PD-eigenvalues of an nth-order scalar polynomial differential operator (SPDO) /spl Dscrsub /spl alpha=/spl deltasup n/+/spl Sigmasub k=1sup nspl alphasub k/(t)/spl deltasup k/spl minus/1/, where /spl delta/=d/dt, is investigated. Main results of this paper include: (i) definition and properties of PD-eigenvectors associated with PD-eigenvalues, (ii) definitions and properties of generalized PD-eigenvectors and generalized PD-eigenvalues for singular PD-eigenvalues; (iii) application of (i) and (ii) in stability analysis of linear time-varying (LTV) systems /spl Dscrsub /spl alpha/spl lcub/y/spl rcub/=0, and (iv) application (i) and (ii) in the realization of PD-characteristic equation. The new results will have a significant impact on applications of the unified eigenvalue theory to the analysis and control of LTV control systems, and its further development.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Singular behavior of PD-eigenvalues of an nth-order scalar polynomial differential operator (SPDO) /spl Dscrsub /spl alpha=/spl deltasup n/+/spl Sigmasub k=1sup nspl alphasub k/(t)/spl deltasup k/spl minus/1/, where /spl delta/=d/dt, is investigated. Main results of this paper include: (i) definition and properties of PD-eigenvectors associated with PD-eigenvalues, (ii) definitions and properties of generalized PD-eigenvectors and generalized PD-eigenvalues for singular PD-eigenvalues; (iii) application of (i) and (ii) in stability analysis of linear time-varying (LTV) systems /spl Dscrsub /spl alpha/spl lcub/y/spl rcub/=0, and (iv) application (i) and (ii) in the realization of PD-characteristic equation. The new results will have a significant impact on applications of the unified eigenvalue theory to the analysis and control of LTV control systems, and its further development.", "fno": "00287865", "keywords": [ "Eigenvalues And Eigenfunctions", "Linear Systems", "Time Varying Systems", "Stability", "Matrix Algebra", "Polynomials", "Parallel D Eigenvalues", "Parallel D Eigenvectors", "Linear Time Varying Systems", "Nth Order Scalar Polynomial Differential Operator", "Stability", "PD Characteristic Equation", "Time Varying Systems", "Eigenvalues And Eigenfunctions", "Control Systems", "Polynomials", "Stability Analysis", "Control System Analysis", "Riccati Equations", "Remote Sensing", "Image Processing", "Laboratories" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA", "fullName": "J.J. Zhu", "givenName": "J.J.", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ssst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "297,298,299,300,301", "year": "1994", "issn": "0094-2898", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00287864", "articleId": "12OmNBRbkl7", "__typename": "AdjacentArticleType" }, "next": { "fno": "00287866", "articleId": "12OmNzZmZBm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ssst/1993/3560/0/00522758", "title": "Design of an optimal controller with prescribed eigenvalues for power system", "doi": null, "abstractUrl": "/proceedings-article/ssst/1993/00522758/12OmNA0dMIm", "parentPublication": { "id": "proceedings/ssst/1993/3560/0", "title": "1993 (25th) Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvlsi/2018/7099/0/709901a563", "title": "A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2018/709901a563/12OmNApu5ys", "parentPublication": { "id": "proceedings/isvlsi/2018/7099/0", "title": "2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1991/2190/0/00138643", "title": "A study of PD-characteristic equations for time-varying linear systems using coordinate transformations", "doi": null, "abstractUrl": "/proceedings-article/ssst/1991/00138643/12OmNBZYTrJ", "parentPublication": { "id": "proceedings/ssst/1991/2190/0", "title": "The Twenty-Third Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1992/2665/0/00712302", "title": "Further Studies on Frozen-Time Eigenvalues in the Stability Analysis for Periodic Linear Systems", "doi": null, "abstractUrl": "/proceedings-article/ssst/1992/00712302/12OmNC3FGm0", "parentPublication": { "id": "proceedings/ssst/1992/2665/0", "title": "The 24th Southeastern Symposium on System Theory and The 3rd Annual Symposium on Communications, Signal Processing Expert Systems, and ASIC VLSI Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1989/1933/0/00072437", "title": "Unified canonical forms for linear time-varying dynamical systems under D-similarity transformations. I", "doi": null, "abstractUrl": "/proceedings-article/ssst/1989/00072437/12OmNwDACsw", "parentPublication": { "id": "proceedings/ssst/1989/1933/0", "title": "1989 The Twenty-First Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/2/07502378", "title": "A Modification of Eigenvalues to Compensate Estimation Errors of Eigenvectors", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07502378/12OmNwJybOZ", "parentPublication": { "id": "proceedings/icpr/2000/0750/2", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1996/7352/0/73520115", "title": "A Necessary and Sufficient Stability Criterion for Linear Time-Varying Systems", "doi": null, "abstractUrl": "/proceedings-article/ssst/1996/73520115/12OmNxETacc", "parentPublication": { "id": "proceedings/ssst/1996/7352/0", "title": "Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcloud-socialcom-sustaincom/2016/3936/0/3936a554", "title": "An Apache Spark Implementation of Block Power Method for Computing Dominant Eigenvalues and Eigenvectors of Large-Scale Matrices", "doi": null, "abstractUrl": "/proceedings-article/bdcloud-socialcom-sustaincom/2016/3936a554/12OmNxwWoRz", "parentPublication": { "id": "proceedings/bdcloud-socialcom-sustaincom/2016/3936/0", "title": "2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2022/08/09771084", "title": "Low-Latency and Reconfigurable VLSI-Architectures for Computing Eigenvalues and Eigenvectors Using CORDIC-Based Parallel Jacobi Method", "doi": null, "abstractUrl": "/journal/si/2022/08/09771084/1DeF2DHR6rS", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08713894", "title": "Surface Registration with Eigenvalues and Eigenvectors", "doi": null, "abstractUrl": "/journal/tg/2020/11/08713894/1a31mtLBJK0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwl8GHc", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "acronym": "icassp", "groupId": "1000002", "volume": "4", "displayVolume": "4", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzcvMY", "doi": "10.1109/ICASSP.1993.319636", "title": "Eigenvalues and eigenvectors of covariance matrices for closely-spaced signals in multi-dimensional direction finding", "normalizedTitle": "Eigenvalues and eigenvectors of covariance matrices for closely-spaced signals in multi-dimensional direction finding", "abstract": "The authors characterize the eigenvalues and eigenvectors of covariance matrices that arise in direction finding scenarios with multiple parameters such as azimuth, elevation and, in some applications, also range (multi-D scenarios). They build upon work by H. Lee (1992) for closely-spaced signals with a single directional parameter (1-D). In multi-D, the limiting (small signal spacing) eigenvalues and eigenvectors can be ascertained from a sequence of constant low-rank matrices N/sub k/ expressed in terms of the generic arrival vector, its spatial derivatives, the source configuration, and the source covariances. The limiting eigenvalues are proportional to delta omega /sup 2(k-1)/, where delta omega is the maximum spacing between sources and k epsilon (1,. . .m). It is shown that for a given number of sources m decreases as parameter dimension increases, hence covariance matrix conditioning is improved in multi-D relative to 1-D settings. The results are applicable to analysis of detection and parameter estimation algorithms in multi-D applications.", "abstracts": [ { "abstractType": "Regular", "content": "The authors characterize the eigenvalues and eigenvectors of covariance matrices that arise in direction finding scenarios with multiple parameters such as azimuth, elevation and, in some applications, also range (multi-D scenarios). They build upon work by H. Lee (1992) for closely-spaced signals with a single directional parameter (1-D). In multi-D, the limiting (small signal spacing) eigenvalues and eigenvectors can be ascertained from a sequence of constant low-rank matrices N/sub k/ expressed in terms of the generic arrival vector, its spatial derivatives, the source configuration, and the source covariances. The limiting eigenvalues are proportional to delta omega /sup 2(k-1)/, where delta omega is the maximum spacing between sources and k epsilon (1,. . .m). It is shown that for a given number of sources m decreases as parameter dimension increases, hence covariance matrix conditioning is improved in multi-D relative to 1-D settings. The results are applicable to analysis of detection and parameter estimation algorithms in multi-D applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The authors characterize the eigenvalues and eigenvectors of covariance matrices that arise in direction finding scenarios with multiple parameters such as azimuth, elevation and, in some applications, also range (multi-D scenarios). They build upon work by H. Lee (1992) for closely-spaced signals with a single directional parameter (1-D). In multi-D, the limiting (small signal spacing) eigenvalues and eigenvectors can be ascertained from a sequence of constant low-rank matrices N/sub k/ expressed in terms of the generic arrival vector, its spatial derivatives, the source configuration, and the source covariances. The limiting eigenvalues are proportional to delta omega /sup 2(k-1)/, where delta omega is the maximum spacing between sources and k epsilon (1,. . .m). It is shown that for a given number of sources m decreases as parameter dimension increases, hence covariance matrix conditioning is improved in multi-D relative to 1-D settings. The results are applicable to analysis of detection and parameter estimation algorithms in multi-D applications.", "fno": "00319636", "keywords": [], "authors": [ { "affiliation": "Atlantic Aerospace Electronics Corp., Waltham, MA, USA", "fullName": "J. Jachner", "givenName": "J.", "surname": "Jachner", "__typename": "ArticleAuthorType" }, { "affiliation": "Atlantic Aerospace Electronics Corp., Waltham, MA, USA", "fullName": "H. Lee", "givenName": "H.", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "icassp", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1993-04-01T00:00:00", "pubType": "proceedings", "pages": "228-231", "year": "1993", "issn": null, "isbn": "0-7803-0946-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00319635", "articleId": "12OmNAFFdEx", "__typename": "AdjacentArticleType" }, "next": { "fno": "00319637", "articleId": "12OmNA0vo18", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4ivU", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "2", "displayVolume": "2", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNwJybOZ", "doi": "10.1109/ICPR.2000.906091", "title": "A Modification of Eigenvalues to Compensate Estimation Errors of Eigenvectors", "normalizedTitle": "A Modification of Eigenvalues to Compensate Estimation Errors of Eigenvectors", "abstract": "In statistical pattern recognition, parameters of distributions are usually estimated from training samples. It is well known that shortage of training samples causes estimation errors, which reduce recognition accuracy. By studying estimation errors of eigenvalues, various methods of avoiding recognition accuracy reduction have been proposed. However, estimation errors of eigenvectors have not been considered enough. In this paper, we investigate estimation errors of eigenvectors to show these errors are another factor of recognition performance reduction. We propose a new method for modifying eigenvalues in order to reduce bad influence caused by estimation errors of eigenvectors. Effectiveness of the method is shown by experimental results.", "abstracts": [ { "abstractType": "Regular", "content": "In statistical pattern recognition, parameters of distributions are usually estimated from training samples. It is well known that shortage of training samples causes estimation errors, which reduce recognition accuracy. By studying estimation errors of eigenvalues, various methods of avoiding recognition accuracy reduction have been proposed. However, estimation errors of eigenvectors have not been considered enough. In this paper, we investigate estimation errors of eigenvectors to show these errors are another factor of recognition performance reduction. We propose a new method for modifying eigenvalues in order to reduce bad influence caused by estimation errors of eigenvectors. Effectiveness of the method is shown by experimental results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In statistical pattern recognition, parameters of distributions are usually estimated from training samples. It is well known that shortage of training samples causes estimation errors, which reduce recognition accuracy. By studying estimation errors of eigenvalues, various methods of avoiding recognition accuracy reduction have been proposed. However, estimation errors of eigenvectors have not been considered enough. In this paper, we investigate estimation errors of eigenvectors to show these errors are another factor of recognition performance reduction. We propose a new method for modifying eigenvalues in order to reduce bad influence caused by estimation errors of eigenvectors. Effectiveness of the method is shown by experimental results.", "fno": "07502378", "keywords": [], "authors": [ { "affiliation": "Tohoku University", "fullName": "Masakazu Iwamura", "givenName": "Masakazu", "surname": "Iwamura", "__typename": "ArticleAuthorType" }, { "affiliation": "Tohoku University", "fullName": "Shin'ichiro Omachi", "givenName": "Shin'ichiro", "surname": "Omachi", "__typename": "ArticleAuthorType" }, { "affiliation": "Tohoku University", "fullName": "Hirotomo Aso", "givenName": "Hirotomo", "surname": "Aso", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-09-01T00:00:00", "pubType": "proceedings", "pages": "2378", "year": "2000", "issn": null, "isbn": "0-7695-0750-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07502372", "articleId": "12OmNzdoMlG", "__typename": "AdjacentArticleType" }, "next": { "fno": "07502382", "articleId": "12OmNAkniXo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBezSEm", "title": "2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom)", "acronym": "bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwWoRz", "doi": "10.1109/BDCloud-SocialCom-SustainCom.2016.86", "title": "An Apache Spark Implementation of Block Power Method for Computing Dominant Eigenvalues and Eigenvectors of Large-Scale Matrices", "normalizedTitle": "An Apache Spark Implementation of Block Power Method for Computing Dominant Eigenvalues and Eigenvectors of Large-Scale Matrices", "abstract": "In this paper, we present an implementation of the block power method based on Spark, the big data processing framework, to approximate the dominant eigenvalues and eigenvectors of a large, sparse matrix in distributed computing environment. To take advantage of graph-parallel computation in Spark, we employ the property graph with specially defined vertex and edge types to represent the sparse matrix and the associated block matrix together. Graph operations are then performed on the constructed property graph to efficiently carry out the iteration and decomposition steps of the block power method in parallel. The numerical results on a Markov chain application for modeling stochastic luminal Calcium release site are provided to demonstrate the effectiveness and scalability of the block power method implementation.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present an implementation of the block power method based on Spark, the big data processing framework, to approximate the dominant eigenvalues and eigenvectors of a large, sparse matrix in distributed computing environment. To take advantage of graph-parallel computation in Spark, we employ the property graph with specially defined vertex and edge types to represent the sparse matrix and the associated block matrix together. Graph operations are then performed on the constructed property graph to efficiently carry out the iteration and decomposition steps of the block power method in parallel. The numerical results on a Markov chain application for modeling stochastic luminal Calcium release site are provided to demonstrate the effectiveness and scalability of the block power method implementation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present an implementation of the block power method based on Spark, the big data processing framework, to approximate the dominant eigenvalues and eigenvectors of a large, sparse matrix in distributed computing environment. To take advantage of graph-parallel computation in Spark, we employ the property graph with specially defined vertex and edge types to represent the sparse matrix and the associated block matrix together. Graph operations are then performed on the constructed property graph to efficiently carry out the iteration and decomposition steps of the block power method in parallel. The numerical results on a Markov chain application for modeling stochastic luminal Calcium release site are provided to demonstrate the effectiveness and scalability of the block power method implementation.", "fno": "3936a554", "keywords": [ "Sparse Matrices", "Sparks", "Eigenvalues And Eigenfunctions", "Matrix Decomposition", "Calcium", "Markov Processes", "Convergence", "Eigenvalues And Eigenvectors", "Block Power Method", "Subspace Iteration", "Spark", "Property Graph" ], "authors": [ { "affiliation": null, "fullName": "Hao Ji", "givenName": "Hao", "surname": "Ji", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Seth H. Weinberg", "givenName": "Seth H.", "surname": "Weinberg", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Min Li", "givenName": "Min", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianxin Wang", "givenName": "Jianxin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yaohang Li", "givenName": "Yaohang", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "554-559", "year": "2016", "issn": null, "isbn": "978-1-5090-3936-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3936a548", "articleId": "12OmNroijnW", "__typename": "AdjacentArticleType" }, "next": { "fno": "3936a560", "articleId": "12OmNCcbEhY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic2e/2016/1961/0/1961a222", "title": "Exploring GPU Acceleration of Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/ic2e/2016/1961a222/12OmNCzKlLZ", "parentPublication": { "id": "proceedings/ic2e/2016/1961/0", "title": "2016 IEEE International Conference on Cloud Engineering (IC2E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07841068", "title": "Large-scale text processing pipeline with Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07841068/12OmNxVDuSb", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-css-icess/2015/8937/0/07336160", "title": "Performance Prediction for Apache Spark Platform", "doi": null, "abstractUrl": "/proceedings-article/hpcc-css-icess/2015/07336160/12OmNxzMnTE", "parentPublication": { "id": "proceedings/hpcc-css-icess/2015/8937/0", "title": "2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS) and 2015 IEEE 12th International Conf on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a542", "title": "Big Data Software Analytics with Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a542/13bd1fZBGdq", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671397", "title": "Translation of Array-Based Graph Programs to Spark SQL on Block Arrays", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671397/1A8gu93Prj2", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08713894", "title": "Surface Registration with Eigenvalues and Eigenvectors", "doi": null, "abstractUrl": "/journal/tg/2020/11/08713894/1a31mtLBJK0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006323", "title": "Performance Optimization of SpMV on Spark", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006323/1hJsrh7gi0E", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2022/03/09019890", "title": "Stark: Fast and Scalable Strassen&#x2019;s Matrix Multiplication Using Apache Spark", "doi": null, "abstractUrl": "/journal/bd/2022/03/09019890/1hS2IIQIGsM", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2020/8780/0/878000a544", "title": "Spark-Tuner: An Elastic Auto-Tuner for Apache Spark Streaming", "doi": null, "abstractUrl": "/proceedings-article/cloud/2020/878000a544/1pF6j63OUqQ", "parentPublication": { "id": "proceedings/cloud/2020/8780/0", "title": "2020 IEEE 13th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313361", "title": "HRV-Spark: Computing Heart Rate Variability Measures Using Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313361/1qmfQ98KmWI", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KmF3YrboHu", "title": "2022 IEEE/ACM Workshop on Latest Advances in Scalable Algorithms for Large-Scale Heterogeneous Systems (ScalAH)", "acronym": "scalah", "groupId": "1805696", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KmF5N17FbW", "doi": "10.1109/ScalAH56622.2022.00011", "title": "Mixed-Precision Algorithm for Finding Selected Eigenvalues and Eigenvectors of Symmetric and Hermitian Matrices<sup>1</sup>", "normalizedTitle": "Mixed-Precision Algorithm for Finding Selected Eigenvalues and Eigenvectors of Symmetric and Hermitian Matrices1", "abstract": "The multi-precision methods commonly follow approximate-iterate scheme by first obtaining the approximate solution from a low-precision factorization and solve. Then, they iteratively refine the solution to the desired accuracy that is often as high as what is possible with traditional approaches. While targeting symmetric and Hermitian eigenvalue problems of the form Ax = &#x03BB;x, we revisit the SICE algorithm proposed by Dongarra et al. By applying the Sherman-Morrison formula on the diagonally-shifted tridiagonal systems, we propose an updated SICE-SM algorithm. By incorporating the latest two-stage algorithms from the PLASMA and MAGMA software libraries for numerical linear algebra, we achieved up to 3.6&#x00D7; speedup using the mixed-precision eigensolver with the blocked SICE-SM algorithm for iterative refinement when compared with full double complex precision solvers for the cases with a portion of eigenvalues and eigenvectors requested.<sup>1</sup>", "abstracts": [ { "abstractType": "Regular", "content": "The multi-precision methods commonly follow approximate-iterate scheme by first obtaining the approximate solution from a low-precision factorization and solve. Then, they iteratively refine the solution to the desired accuracy that is often as high as what is possible with traditional approaches. While targeting symmetric and Hermitian eigenvalue problems of the form Ax = &#x03BB;x, we revisit the SICE algorithm proposed by Dongarra et al. By applying the Sherman-Morrison formula on the diagonally-shifted tridiagonal systems, we propose an updated SICE-SM algorithm. By incorporating the latest two-stage algorithms from the PLASMA and MAGMA software libraries for numerical linear algebra, we achieved up to 3.6&#x00D7; speedup using the mixed-precision eigensolver with the blocked SICE-SM algorithm for iterative refinement when compared with full double complex precision solvers for the cases with a portion of eigenvalues and eigenvectors requested.<sup>1</sup>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The multi-precision methods commonly follow approximate-iterate scheme by first obtaining the approximate solution from a low-precision factorization and solve. Then, they iteratively refine the solution to the desired accuracy that is often as high as what is possible with traditional approaches. While targeting symmetric and Hermitian eigenvalue problems of the form Ax = λx, we revisit the SICE algorithm proposed by Dongarra et al. By applying the Sherman-Morrison formula on the diagonally-shifted tridiagonal systems, we propose an updated SICE-SM algorithm. By incorporating the latest two-stage algorithms from the PLASMA and MAGMA software libraries for numerical linear algebra, we achieved up to 3.6× speedup using the mixed-precision eigensolver with the blocked SICE-SM algorithm for iterative refinement when compared with full double complex precision solvers for the cases with a portion of eigenvalues and eigenvectors requested.1", "fno": "757000a043", "keywords": [ "Eigenvalues And Eigenfunctions", "Hermitian Matrices", "Iterative Methods", "Linear Algebra", "Mathematics Computing", "Software Libraries", "Approximate Solution", "Approximate Iterate Scheme", "Diagonally Shifted Tridiagonal Systems", "Eigenvalues", "Eigenvectors", "Hermitian Matrices", "Iterative Refinement", "Low Precision Factorization", "MAGMA Software Library", "Mixed Precision Eigensolver", "Multiprecision Methods", "Numerical Linear Algebra", "PLASMA Software Library", "Sherman Morrison Formula", "SICE SM Algorithm", "Symmetric Matrices", "Two Stage Algorithms", "Software Libraries", "Symmetric Matrices", "Runtime", "Software Algorithms", "Linear Algebra", "Parallel Processing", "Eigenvalues And Eigenfunctions", "Mixed Precision Algorithms", "Eigenvalue Solver", "Hardware Accelerators" ], "authors": [ { "affiliation": "University of Tennessee,Innovative Computing Laboratory,Knoxville,TN,USA", "fullName": "Yaohung M. Tsai", "givenName": "Yaohung M.", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee,Innovative Computing Laboratory,Knoxville,TN,USA", "fullName": "Piotr Luszczek", "givenName": "Piotr", "surname": "Luszczek", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee,Innovative Computing Laboratory,Knoxville,TN,USA", "fullName": "Jack Dongarra", "givenName": "Jack", "surname": "Dongarra", "__typename": "ArticleAuthorType" } ], "idPrefix": "scalah", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "43-50", "year": "2022", "issn": null, "isbn": "978-1-6654-7570-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "757000a034", "articleId": "1KmF49ISCkw", "__typename": "AdjacentArticleType" }, "next": { "fno": "757000a051", "articleId": "1KmF5woJL1K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isvlsi/2018/7099/0/709901a563", "title": "A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2018/709901a563/12OmNApu5ys", "parentPublication": { "id": "proceedings/isvlsi/2018/7099/0", "title": "2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1994/5320/0/00287865", "title": "Parallel D-eigenvalues and parallel D-eigenvectors for linear time-varying systems", "doi": null, "abstractUrl": "/proceedings-article/ssst/1994/00287865/12OmNqBtiI1", "parentPublication": { "id": "proceedings/ssst/1994/5320/0", "title": "Proceedings of 26th Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2014/4116/0/4116b150", "title": "New Algorithm for Computing Eigenvectors of the Symmetric Eigenvalue Problem", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2014/4116b150/12OmNqJHFvm", "parentPublication": { "id": "proceedings/ipdpsw/2014/4116/0", "title": "2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcloud-socialcom-sustaincom/2016/3936/0/3936a554", "title": "An Apache Spark Implementation of Block Power Method for Computing Dominant Eigenvalues and Eigenvectors of Large-Scale Matrices", "doi": null, "abstractUrl": "/proceedings-article/bdcloud-socialcom-sustaincom/2016/3936a554/12OmNxwWoRz", "parentPublication": { "id": "proceedings/bdcloud-socialcom-sustaincom/2016/3936/0", "title": "2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/empdp/1993/3610/0/00336401", "title": "An algorithm far the parallel computation of subsets of eigenvalues and associated eigenvectors of large symmetric matrices using an array processor", "doi": null, "abstractUrl": "/proceedings-article/empdp/1993/00336401/12OmNyKa5ZH", "parentPublication": { "id": "proceedings/empdp/1993/3610/0", "title": "1993 Euromicro Workshop on Parallel and Distributed Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1988/9999/0/00196929", "title": "An eigenvalue recursion for Hermitian Toeplitz matrices", "doi": null, "abstractUrl": "/proceedings-article/icassp/1988/00196929/12OmNyp9Mn5", "parentPublication": { "id": "proceedings/icassp/1988/9999/0", "title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2014/2729/0/2729a664", "title": "GPU Implementation of Inverse Iteration Algorithm for Computing Eigenvectors", "doi": null, "abstractUrl": "/proceedings-article/pdp/2014/2729a664/12OmNzkMlM9", "parentPublication": { "id": "proceedings/pdp/2014/2729/0", "title": "2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2022/04/09855826", "title": "The Influence and Contribution of Jack Dongarra to Numerical Linear Algebra", "doi": null, "abstractUrl": "/magazine/cs/2022/04/09855826/1FRJubkVZZK", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08713894", "title": "Surface Registration with Eigenvalues and Eigenvectors", "doi": null, "abstractUrl": "/journal/tg/2020/11/08713894/1a31mtLBJK0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005701", "title": "MC<sup>2</sup>:Unsupervised Multiple Social Network Alignment", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005701/1hJsmwf9Jpm", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1j9xP79CeoU", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "1j9xQlTgVyg", "doi": null, "title": "Method for Estimating the Eigenvectors of a Scaled Laplacian Matrix Using the Resonance of Oscillation Dynamics on Networks", "normalizedTitle": "Method for Estimating the Eigenvectors of a Scaled Laplacian Matrix Using the Resonance of Oscillation Dynamics on Networks", "abstract": "Spectral graph theory gives a useful approach to analyzing network structure based on the adjacency matrix or the Laplacian matrix that represents the network topology and link weights. However, in large scale and complex social networks, since it is difficult to know the network topology and link weights, we cannot determine the components of these matrices directly. To solve this problem, we consider a method for indirectly determining a Laplacian matrix from its eigenvalues and eigenvectors. As the first step, our prior study proposed a method for estimating eigenvalues of a Laplacian matrix by using the resonance of oscillation dynamics on networks with no a priori information about the network structure, and showed the effectiveness of this method. In this paper, we propose a method for estimating the eigenvectors of a Laplacian matrix by once again using the resonance of oscillation dynamics on networks.", "abstracts": [ { "abstractType": "Regular", "content": "Spectral graph theory gives a useful approach to analyzing network structure based on the adjacency matrix or the Laplacian matrix that represents the network topology and link weights. However, in large scale and complex social networks, since it is difficult to know the network topology and link weights, we cannot determine the components of these matrices directly. To solve this problem, we consider a method for indirectly determining a Laplacian matrix from its eigenvalues and eigenvectors. As the first step, our prior study proposed a method for estimating eigenvalues of a Laplacian matrix by using the resonance of oscillation dynamics on networks with no a priori information about the network structure, and showed the effectiveness of this method. In this paper, we propose a method for estimating the eigenvectors of a Laplacian matrix by once again using the resonance of oscillation dynamics on networks.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spectral graph theory gives a useful approach to analyzing network structure based on the adjacency matrix or the Laplacian matrix that represents the network topology and link weights. However, in large scale and complex social networks, since it is difficult to know the network topology and link weights, we cannot determine the components of these matrices directly. To solve this problem, we consider a method for indirectly determining a Laplacian matrix from its eigenvalues and eigenvectors. As the first step, our prior study proposed a method for estimating eigenvalues of a Laplacian matrix by using the resonance of oscillation dynamics on networks with no a priori information about the network structure, and showed the effectiveness of this method. In this paper, we propose a method for estimating the eigenvectors of a Laplacian matrix by once again using the resonance of oscillation dynamics on networks.", "fno": "09069097", "keywords": [ "Eigenvalues And Eigenfunctions", "Estimation Theory", "Graph Theory", "Matrix Algebra", "Network Theory Graphs", "Social Networking Online", "Spectral Graph Theory", "Network Structure", "Adjacency Matrix", "Network Topology", "Complex Social Networks", "Eigenvectors Estimation", "Oscillation Dynamics", "Scaled Laplacian Matrix", "Laplace Equations", "Oscillators", "Eigenvalues And Eigenfunctions", "Symmetric Matrices", "Social Network Services", "Electronic Mail", "Force" ], "authors": [ { "affiliation": "Tokyo Metropolitan University,Graduate School of System Design,Hino-shi,Japan,191-0065", "fullName": "Satoshi Furutani", "givenName": "Satoshi", "surname": "Furutani", "__typename": "ArticleAuthorType" }, { "affiliation": "Hiroshima City University,Graduate School of Information Sciences,Hiroshima-shi,Japan,731-3194", "fullName": "Chisa Takano", "givenName": "Chisa", "surname": "Takano", "__typename": "ArticleAuthorType" }, { "affiliation": "Tokyo Metropolitan University,Graduate School of System Design,Hino-shi,Japan,191-0065", "fullName": "Masaki Aida", "givenName": "Masaki", "surname": "Aida", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "615-618", "year": "2017", "issn": null, "isbn": "978-1-4503-4993-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09069122", "articleId": "1j9xTyxDZpC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09069077", "articleId": "1j9xSaQLTQ4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isvlsi/2018/7099/0/709901a563", "title": "A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2018/709901a563/12OmNApu5ys", "parentPublication": { "id": "proceedings/isvlsi/2018/7099/0", "title": "2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a358", "title": "Orthogonal Eigenvector Matrix of the Laplacian", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a358/12OmNyRPgMD", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a889", "title": "Learning with Inadequate and Incorrect Supervision", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a889/12OmNyXMQfE", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1993/4340/0/01263497", "title": "A spectral algorithm for envelope reduction of sparse matrices", "doi": null, "abstractUrl": "/proceedings-article/sc/1993/01263497/1D85mmrh9qE", "parentPublication": { "id": "proceedings/sc/1993/4340/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2022/08/09771084", "title": "Low-Latency and Reconfigurable VLSI-Architectures for Computing Eigenvalues and Eigenvectors Using CORDIC-Based Parallel Jacobi Method", "doi": null, "abstractUrl": "/journal/si/2022/08/09771084/1DeF2DHR6rS", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a426", "title": "Preliminary Study for the Impact of Small Eigenvalues on Laplacian Anomaly Detection of Dynamic Networks", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a426/1FJ5ywzr4zu", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08713894", "title": "Surface Registration with Eigenvalues and Eigenvectors", "doi": null, "abstractUrl": "/journal/tg/2020/11/08713894/1a31mtLBJK0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icess/2019/2437/0/08782449", "title": "Towards Scalable Spectral Sparsification of Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/icess/2019/08782449/1c8P7KRR4QM", "parentPublication": { "id": "proceedings/icess/2019/2437/0", "title": "2019 IEEE International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2019/4691/0/469100a449", "title": "Image Denoising Using Eigenvectors of Graph Laplacian with Low-Rank Approximation", "doi": null, "abstractUrl": "/proceedings-article/aiam/2019/469100a449/1gysvF7pGxi", "parentPublication": { "id": "proceedings/aiam/2019/4691/0", "title": "2019 International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2020/9919/0/991900a028", "title": "A New Model of Flaming Phenomena in Online Social Networks that Considers Resonance Driven by External Stimuli", "doi": null, "abstractUrl": "/proceedings-article/candarw/2020/991900a028/1rqEAzQjcLC", "parentPublication": { "id": "proceedings/candarw/2020/9919/0", "title": "2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A8gmCnipkA", "title": "2021 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A8jlR5VWH6", "doi": "10.1109/BigData52589.2021.9671328", "title": "Assessing Deep Neural Networks as Probability Estimators", "normalizedTitle": "Assessing Deep Neural Networks as Probability Estimators", "abstract": "Deep Neural Networks (DNNs) have performed admirably in classification tasks. However, the characterization of their classification uncertainties, required for certain applications, has been lacking. In this work, we investigate the issue by assessing DNNs&#x2019; ability to estimate conditional probabilities and propose a framework for systematic uncertainty characterization. Denoting the input sample as x and the category as y, the classification task of assigning a category y to a given input x can be reduced to the task of estimating the conditional probabilities p(y|x), as approximated by the DNN at its last layer using the softmax function. Since softmax yields a vector whose elements all fall in the interval (0, 1) and sum to 1, it suggests a probabilistic interpretation to the DNN&#x2019;s outcome. Using synthetic and real-world datasets, we look into the impact of various factors, e.g., probability density f(x) and inter-categorical sparsity, on the precision of DNNs&#x2019; estimations of p(y|x), and find that the likelihood probability density and the inter-categorical sparsity have greater impacts than the prior probability to DNNs&#x2019; classification uncertainty.", "abstracts": [ { "abstractType": "Regular", "content": "Deep Neural Networks (DNNs) have performed admirably in classification tasks. However, the characterization of their classification uncertainties, required for certain applications, has been lacking. In this work, we investigate the issue by assessing DNNs&#x2019; ability to estimate conditional probabilities and propose a framework for systematic uncertainty characterization. Denoting the input sample as x and the category as y, the classification task of assigning a category y to a given input x can be reduced to the task of estimating the conditional probabilities p(y|x), as approximated by the DNN at its last layer using the softmax function. Since softmax yields a vector whose elements all fall in the interval (0, 1) and sum to 1, it suggests a probabilistic interpretation to the DNN&#x2019;s outcome. Using synthetic and real-world datasets, we look into the impact of various factors, e.g., probability density f(x) and inter-categorical sparsity, on the precision of DNNs&#x2019; estimations of p(y|x), and find that the likelihood probability density and the inter-categorical sparsity have greater impacts than the prior probability to DNNs&#x2019; classification uncertainty.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep Neural Networks (DNNs) have performed admirably in classification tasks. However, the characterization of their classification uncertainties, required for certain applications, has been lacking. In this work, we investigate the issue by assessing DNNs’ ability to estimate conditional probabilities and propose a framework for systematic uncertainty characterization. Denoting the input sample as x and the category as y, the classification task of assigning a category y to a given input x can be reduced to the task of estimating the conditional probabilities p(y|x), as approximated by the DNN at its last layer using the softmax function. Since softmax yields a vector whose elements all fall in the interval (0, 1) and sum to 1, it suggests a probabilistic interpretation to the DNN’s outcome. Using synthetic and real-world datasets, we look into the impact of various factors, e.g., probability density f(x) and inter-categorical sparsity, on the precision of DNNs’ estimations of p(y|x), and find that the likelihood probability density and the inter-categorical sparsity have greater impacts than the prior probability to DNNs’ classification uncertainty.", "fno": "09671328", "keywords": [ "Data Analysis", "Deep Learning Artificial Intelligence", "Maximum Likelihood Estimation", "Pattern Classification", "Probability", "Softmax Function", "Inter Categorical Sparsity", "Likelihood Probability Density", "Deep Neural Networks", "Probability Estimators", "Deep Neural Networks", "Classification Task", "Classification Uncertainties", "Conditional Probabilities", "Systematic Uncertainty Characterization", "Training", "Deep Learning", "Uncertainty", "Systematics", "Neural Networks", "Big Data", "Probabilistic Logic", "Deep Neural Networks", "Uncertainty", "Bayesian Inference", "Generative Model", "Density And Sparsity" ], "authors": [ { "affiliation": "University of Nebraska-Lincoln,Lincoln,NE,USA", "fullName": "Yu Pan", "givenName": "Yu", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Bayesics, LLC,Bowie,MD,USA", "fullName": "Kwo-Sen Kuo", "givenName": "Kwo-Sen", "surname": "Kuo", "__typename": "ArticleAuthorType" }, { "affiliation": "Bayesics, LLC,Bowie,MD,USA", "fullName": "Michael L. Rilee", "givenName": "Michael L.", "surname": "Rilee", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Nebraska-Lincoln,Lincoln,NE,USA", "fullName": "Hongfeng Yu", "givenName": "Hongfeng", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "1083-1091", "year": "2021", "issn": null, "isbn": "978-1-6654-3902-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09671717", "articleId": "1A8gRFsQySA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09672072", "articleId": "1A8gZSb9eVi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/1998/12/i1342", "title": "Bayesian Classification With Gaussian Processes", "doi": null, "abstractUrl": "/journal/tp/1998/12/i1342/13rRUxAAT22", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f108", "title": "Entropy Maximization and Meta Classification for Out-of-Distribution Detection in Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f108/1BmKpUcBV5e", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600e723", "title": "Deep Hybrid Models for Out-of-Distribution Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600e723/1H1jrFQvDNu", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2023/01/09968119", "title": "Approximate Softmax Functions for Energy-Efficient Deep Neural Networks", "doi": null, "abstractUrl": "/journal/si/2023/01/09968119/1IKDeLm6m9G", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/euros&p/2020/5087/0/508700a139", "title": "Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models", "doi": null, "abstractUrl": "/proceedings-article/euros&p/2020/508700a139/1oqKzIf6rn2", "parentPublication": { "id": "proceedings/euros&p/2020/5087/0", "title": "2020 IEEE European Symposium on Security and Privacy (EuroS&P)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/03/09272694", "title": "iPhosS(Deep)-PseAAC: Identification of Phosphoserine Sites in Proteins Using Deep Learning on General Pseudo Amino Acid Compositions", "doi": null, "abstractUrl": "/journal/tb/2022/03/09272694/1p4vXQs8X7y", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600c326", "title": "Construction of source-charge probability distribution model for electric power field", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600c326/1x3kK379wGc", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d606", "title": "Class-Incremental Learning with Generative Classifiers", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d606/1yVA3caEIUw", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2021/3219/0/321900a542", "title": "QD-Compressor: a Quantization-based Delta Compression Framework for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccd/2021/321900a542/1zuv03zdTSE", "parentPublication": { "id": "proceedings/iccd/2021/3219/0", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a826", "title": "Capture Uncertainties in Deep Neural Networks for Safe Operation of Autonomous Driving Vehicles", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a826/1zxL7N4SG6Q", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1AUp1OqOcOA", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1AUp7gmgyCA", "doi": "10.1109/ISSRE52982.2021.00041", "title": "Black-Box Testing of Deep Neural Networks", "normalizedTitle": "Black-Box Testing of Deep Neural Networks", "abstract": "Several test adequacy criteria have been developed for quantifying the the coverage of deep neural networks (DNNs) achieved by a test suite. Being dependent on the structure of the DNN, these can be costly to measure and use, especially given the highly iterative nature of the model training workflow. Further, testing provides higher overall assurance when such implementation dependent measures are used along with implementation independent ones. In this paper, we rigorously define a new black-box coverage criterion that is independent of the DNN model under test. We further describe a few desirable properties and associated evaluation metrics for assessing test coverage criteria and use those to empirically compare and contrast the black-box criterion with several DNN structural coverage criteria. Results indicate that the black-box criterion has comparable effectiveness and provides benefits that complement white-box criteria. The results also reveal a few weaknesses of coverage criteria for DNNs.", "abstracts": [ { "abstractType": "Regular", "content": "Several test adequacy criteria have been developed for quantifying the the coverage of deep neural networks (DNNs) achieved by a test suite. Being dependent on the structure of the DNN, these can be costly to measure and use, especially given the highly iterative nature of the model training workflow. Further, testing provides higher overall assurance when such implementation dependent measures are used along with implementation independent ones. In this paper, we rigorously define a new black-box coverage criterion that is independent of the DNN model under test. We further describe a few desirable properties and associated evaluation metrics for assessing test coverage criteria and use those to empirically compare and contrast the black-box criterion with several DNN structural coverage criteria. Results indicate that the black-box criterion has comparable effectiveness and provides benefits that complement white-box criteria. The results also reveal a few weaknesses of coverage criteria for DNNs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Several test adequacy criteria have been developed for quantifying the the coverage of deep neural networks (DNNs) achieved by a test suite. Being dependent on the structure of the DNN, these can be costly to measure and use, especially given the highly iterative nature of the model training workflow. Further, testing provides higher overall assurance when such implementation dependent measures are used along with implementation independent ones. In this paper, we rigorously define a new black-box coverage criterion that is independent of the DNN model under test. We further describe a few desirable properties and associated evaluation metrics for assessing test coverage criteria and use those to empirically compare and contrast the black-box criterion with several DNN structural coverage criteria. Results indicate that the black-box criterion has comparable effectiveness and provides benefits that complement white-box criteria. The results also reveal a few weaknesses of coverage criteria for DNNs.", "fno": "258700a309", "keywords": [ "Neural Nets", "Program Testing", "DNN Model", "Test Coverage Criteria", "DNN Structural Coverage Criteria", "White Box Criteria", "Black Box Testing", "Deep Neural Networks", "Test Adequacy Criteria", "Test Suite", "Model Training Workflow", "Black Box Coverage Criterion", "Measurement", "Deep Learning", "Training", "Neural Networks", "Software Reliability", "Testing" ], "authors": [ { "affiliation": "University of Minnesota,Minneapolis,MN,United States", "fullName": "Taejoon Byun", "givenName": "Taejoon", "surname": "Byun", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Minnesota,Minneapolis,MN,United States", "fullName": "Sanjai Rayadurgam", "givenName": "Sanjai", "surname": "Rayadurgam", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Minnesota,Minneapolis,MN,United States", "fullName": "Mats P.E. Heimdahl", "givenName": "Mats P.E.", "surname": "Heimdahl", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "309-320", "year": "2021", "issn": null, "isbn": "978-1-6654-2587-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "258700a300", "articleId": "1AUp5hGInrW", "__typename": "AdjacentArticleType" }, "next": { "fno": "258700a321", "articleId": "1AUp3jJa1ri", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/stc/2017/1088/0/08234460", "title": "Using MC/DC as a black-box testing technique", "doi": null, "abstractUrl": "/proceedings-article/stc/2017/08234460/12OmNAkWvAS", "parentPublication": { "id": "proceedings/stc/2017/1088/0", "title": "2017 IEEE 28th Annual Software Technology Conference (STC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2015/6564/3/6564c447", "title": "CovDroid: A Black-Box Testing Coverage System for Android", "doi": null, "abstractUrl": "/proceedings-article/compsac/2015/6564c447/12OmNyuPKZv", "parentPublication": { "id": "proceedings/compsac/2015/6564/3", "title": "2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100a835", "title": "EREBA: Black-box Energy Testing of Adaptive Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100a835/1Emsbp85pDO", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2022/1316/0/131600a415", "title": "Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems", "doi": null, "abstractUrl": "/proceedings-article/sp/2022/131600a415/1FlQEZvBlDi", "parentPublication": { "id": "proceedings/sp/2022/1316/0/", "title": "2022 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859856", "title": "Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859856/1G9DVUpE3ok", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/5555/01/10041782", "title": "Black-Box Testing of Deep Neural Networks Through Test Case Diversity", "doi": null, "abstractUrl": "/journal/ts/5555/01/10041782/1KCLU6a4CSk", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a016", "title": "Test4Deep: an Effective White-Box Testing for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a016/1fHkwAfOQKI", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/2020/8558/0/855800a073", "title": "An Empirical Study on Correlation between Coverage and Robustness for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iceccs/2020/855800a073/1s659U6y3bW", "parentPublication": { "id": "proceedings/iceccs/2020/8558/0", "title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2021/08/09504492", "title": "From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively", "doi": null, "abstractUrl": "/magazine/co/2021/08/09504492/1vJVvePscBa", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2021/4935/0/493500a536", "title": "Efficient Black-Box Adversarial Attacks for Deep Driving Maneuver Classification Models", "doi": null, "abstractUrl": "/proceedings-article/mass/2021/493500a536/1ziOCSHXAwo", "parentPublication": { "id": "proceedings/mass/2021/4935/0", "title": "2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmJJXrMCfS", "doi": "10.1109/ICCV48922.2021.00071", "title": "Architecture Disentanglement for Deep Neural Networks", "normalizedTitle": "Architecture Disentanglement for Deep Neural Networks", "abstract": "Understanding the inner workings of deep neural networks (DNNs) is essential to provide trustworthy artificial intelligence techniques for practical applications. Existing studies typically involve linking semantic concepts to units or layers of DNNs, but fail to explain the inference process. In this paper, we introduce neural architecture disentanglement (NAD) to fill the gap. Specifically, NAD learns to disentangle a pre-trained DNN into sub-architectures according to independent tasks, forming information flows that describe the inference processes. We investigate whether, where, and how the disentanglement occurs through experiments conducted with handcrafted and automatically-searched network architectures, on both object-based and scene-based datasets. Based on the experimental results, we present three new findings that provide fresh insights into the inner logic of DNNs. First, DNNs can be divided into sub-architectures for independent tasks. Second, deeper layers do not always correspond to higher semantics. Third, the connection type in a DNN affects how the information flows across layers, leading to different disentanglement behaviors. With NAD, we further explain why DNNs sometimes give wrong predictions. Experimental results show that misclassified images have a high probability of being assigned to task sub-architectures similar to the correct ones. Our code is available at https://github.com/hujiecpp/NAD.", "abstracts": [ { "abstractType": "Regular", "content": "Understanding the inner workings of deep neural networks (DNNs) is essential to provide trustworthy artificial intelligence techniques for practical applications. Existing studies typically involve linking semantic concepts to units or layers of DNNs, but fail to explain the inference process. In this paper, we introduce neural architecture disentanglement (NAD) to fill the gap. Specifically, NAD learns to disentangle a pre-trained DNN into sub-architectures according to independent tasks, forming information flows that describe the inference processes. We investigate whether, where, and how the disentanglement occurs through experiments conducted with handcrafted and automatically-searched network architectures, on both object-based and scene-based datasets. Based on the experimental results, we present three new findings that provide fresh insights into the inner logic of DNNs. First, DNNs can be divided into sub-architectures for independent tasks. Second, deeper layers do not always correspond to higher semantics. Third, the connection type in a DNN affects how the information flows across layers, leading to different disentanglement behaviors. With NAD, we further explain why DNNs sometimes give wrong predictions. Experimental results show that misclassified images have a high probability of being assigned to task sub-architectures similar to the correct ones. Our code is available at https://github.com/hujiecpp/NAD.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Understanding the inner workings of deep neural networks (DNNs) is essential to provide trustworthy artificial intelligence techniques for practical applications. Existing studies typically involve linking semantic concepts to units or layers of DNNs, but fail to explain the inference process. In this paper, we introduce neural architecture disentanglement (NAD) to fill the gap. Specifically, NAD learns to disentangle a pre-trained DNN into sub-architectures according to independent tasks, forming information flows that describe the inference processes. We investigate whether, where, and how the disentanglement occurs through experiments conducted with handcrafted and automatically-searched network architectures, on both object-based and scene-based datasets. Based on the experimental results, we present three new findings that provide fresh insights into the inner logic of DNNs. First, DNNs can be divided into sub-architectures for independent tasks. Second, deeper layers do not always correspond to higher semantics. Third, the connection type in a DNN affects how the information flows across layers, leading to different disentanglement behaviors. With NAD, we further explain why DNNs sometimes give wrong predictions. Experimental results show that misclassified images have a high probability of being assigned to task sub-architectures similar to the correct ones. Our code is available at https://github.com/hujiecpp/NAD.", "fno": "281200a652", "keywords": [ "Deep Learning", "Computer Vision", "Codes", "Semantics", "Neural Networks", "Computer Architecture", "Network Architecture", "Explainable AI", "Fairness", "Accountability", "Transparency", "And Ethics In Vision", "Recognition And Classification", "Representation Learning" ], "authors": [ { "affiliation": "Xiamen University,MAC Lab, School of Informatics", "fullName": "Jie Hu", "givenName": "Jie", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Xiamen University,MAC Lab, School of Informatics", "fullName": "Liujuan Cao", "givenName": "Liujuan", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Xiamen University,MAC Lab, School of Informatics", "fullName": "Tong Tong", "givenName": "Tong", "surname": "Tong", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chinese Academy of Sciences", "fullName": "Qixiang Ye", "givenName": "Qixiang", "surname": "Ye", "__typename": "ArticleAuthorType" }, { "affiliation": "Xiamen University,MAC Lab, School of Informatics", "fullName": "Shengchuan Zhang", "givenName": "Shengchuan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Tencent Youtu Lab", "fullName": "Ke Li", "givenName": "Ke", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Tencent Youtu Lab", "fullName": "Feiyue Huang", "givenName": "Feiyue", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Inception Institute of Artificial Intelligence", "fullName": "Ling Shao", "givenName": "Ling", "surname": "Shao", "__typename": "ArticleAuthorType" }, { "affiliation": "Xiamen University,MAC Lab, School of Informatics", "fullName": "Rongrong Ji", "givenName": "Rongrong", "surname": "Ji", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "652-661", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200a641", "articleId": "1BmEBPVAj5K", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200a662", "articleId": "1BmIlHFBf20", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200g701", "title": "Orthogonal Jacobian Regularization for Unsupervised Disentanglement in Image Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g701/1BmIMPAjiLe", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200m2229", "title": "Homogeneous Architecture Augmentation for Neural Predictor", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200m2229/1BmLeJjFf68", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09767634", "title": "Hybrid ISTA: Unfolding ISTA With Convergence Guarantees Using Free-Form Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2023/03/09767634/1D4HhN8Vou4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600n3699", "title": "Calibrating Deep Neural Networks by Pairwise Constraints", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3699/1H0LjiFA71S", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600g424", "title": "Collaborative Multi-Teacher Knowledge Distillation for Learning Low Bit-width Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600g424/1L8qujGfWwg", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732351", "title": "Visual Genealogy of Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732351/1aDQt8709So", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2021/0060/0/006000a043", "title": "The Case for Adaptive Deep Neural Networks in Edge Computing", "doi": null, "abstractUrl": "/proceedings-article/cloud/2021/006000a043/1ymJ1E7A4og", "parentPublication": { "id": "proceedings/cloud/2021/0060/0", "title": "2021 IEEE 14th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nanoarch/2021/0959/0/09642246", "title": "Deep Neural Network Security From a Hardware Perspective", "doi": null, "abstractUrl": "/proceedings-article/nanoarch/2021/09642246/1zpAfGzcY7e", "parentPublication": { "id": "proceedings/nanoarch/2021/0959/0", "title": "2021 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2021/3219/0/321900a542", "title": "QD-Compressor: a Quantization-based Delta Compression Framework for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccd/2021/321900a542/1zuv03zdTSE", "parentPublication": { "id": "proceedings/iccd/2021/3219/0", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800a344", "title": "Characterizing Learning Dynamics of Deep Neural Networks via Complex Networks", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800a344/1zw60EvIokU", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FbSRf26Lcc", "title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "acronym": "saner", "groupId": "1831544", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1FbTbP48prO", "doi": "10.1109/SANER53432.2022.00128", "title": "NeuRecover: Regression-Controlled Repair of Deep Neural Networks with Training History", "normalizedTitle": "NeuRecover: Regression-Controlled Repair of Deep Neural Networks with Training History", "abstract": "Systematic techniques to improve quality of deep neural networks (DNNs) are critical given the increasing demand for practical applications including safety-critical ones. The key challenge comes from the little controllability in updating DNNs. Retraining to fix some behavior often has a destructive impact on other behavior, causing regressions, i.e., the updated DNN fails with inputs correctly handled by the original one. This problem is crucial when engineers are required to investigate failures in intensive assurance activities for safety or trust. Search-based repair techniques for DNNs have potentials to tackle this challenge by enabling localized updates only on &#x201C;responsible parameters&#x201D; inside the DNN. However, the potentials have not been explored to realize sufficient controllability to suppress regressions in DNN repair tasks. In this paper, we propose a novel DNN repair method that makes use of the training history for judging which DNN parameters should be changed or not to suppress regressions. We implemented the method into a tool called Neurecover and evaluated it with three datasets. Our method outperformed the existing method by achieving often less than a quarter, even a tenth in some cases, number of regressions. Our method is especially effective when the repair requirements are tight to fix specific failure types. In such cases, our method showed stably low rates (&#x003C;2 &#x0025;) of regressions, which were in many cases a tenth of regressions caused by retraining.", "abstracts": [ { "abstractType": "Regular", "content": "Systematic techniques to improve quality of deep neural networks (DNNs) are critical given the increasing demand for practical applications including safety-critical ones. The key challenge comes from the little controllability in updating DNNs. Retraining to fix some behavior often has a destructive impact on other behavior, causing regressions, i.e., the updated DNN fails with inputs correctly handled by the original one. This problem is crucial when engineers are required to investigate failures in intensive assurance activities for safety or trust. Search-based repair techniques for DNNs have potentials to tackle this challenge by enabling localized updates only on &#x201C;responsible parameters&#x201D; inside the DNN. However, the potentials have not been explored to realize sufficient controllability to suppress regressions in DNN repair tasks. In this paper, we propose a novel DNN repair method that makes use of the training history for judging which DNN parameters should be changed or not to suppress regressions. We implemented the method into a tool called Neurecover and evaluated it with three datasets. Our method outperformed the existing method by achieving often less than a quarter, even a tenth in some cases, number of regressions. Our method is especially effective when the repair requirements are tight to fix specific failure types. In such cases, our method showed stably low rates (&#x003C;2 &#x0025;) of regressions, which were in many cases a tenth of regressions caused by retraining.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Systematic techniques to improve quality of deep neural networks (DNNs) are critical given the increasing demand for practical applications including safety-critical ones. The key challenge comes from the little controllability in updating DNNs. Retraining to fix some behavior often has a destructive impact on other behavior, causing regressions, i.e., the updated DNN fails with inputs correctly handled by the original one. This problem is crucial when engineers are required to investigate failures in intensive assurance activities for safety or trust. Search-based repair techniques for DNNs have potentials to tackle this challenge by enabling localized updates only on “responsible parameters” inside the DNN. However, the potentials have not been explored to realize sufficient controllability to suppress regressions in DNN repair tasks. In this paper, we propose a novel DNN repair method that makes use of the training history for judging which DNN parameters should be changed or not to suppress regressions. We implemented the method into a tool called Neurecover and evaluated it with three datasets. Our method outperformed the existing method by achieving often less than a quarter, even a tenth in some cases, number of regressions. Our method is especially effective when the repair requirements are tight to fix specific failure types. In such cases, our method showed stably low rates (<2 %) of regressions, which were in many cases a tenth of regressions caused by retraining.", "fno": "378600b111", "keywords": [ "Deep Learning Artificial Intelligence", "Regression Analysis", "Software Maintenance", "Neu Recover", "DNN Repair Method", "Sufficient Controllability", "Search Based Repair Techniques", "Training History", "Deep Neural Networks", "Regression Controlled Repair", "Repair Requirements", "Training", "Deep Learning", "Systematics", "Neural Networks", "Maintenance Engineering", "Controllability", "Software", "Deep Neural Network", "Automated Program Repair", "Fault Localization" ], "authors": [ { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Shogo Tokui", "givenName": "Shogo", "surname": "Tokui", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Susumu Tokumoto", "givenName": "Susumu", "surname": "Tokumoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Akihito Yoshii", "givenName": "Akihito", "surname": "Yoshii", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Informatics,Tokyo,Japan", "fullName": "Fuyuki Ishikawa", "givenName": "Fuyuki", "surname": "Ishikawa", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Takao Nakagawa", "givenName": "Takao", "surname": "Nakagawa", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Kazuki Munakata", "givenName": "Kazuki", "surname": "Munakata", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Limited,Kawasaki,Japan", "fullName": "Shinji Kikuchi", "givenName": "Shinji", "surname": "Kikuchi", "__typename": "ArticleAuthorType" } ], "idPrefix": "saner", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "1111-1121", "year": "2022", "issn": "1534-5351", "isbn": "978-1-6654-3786-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "378600b101", "articleId": "1FbT4zUbRok", "__typename": "AdjacentArticleType" }, "next": { "fno": "378600b122", "articleId": "1FbSSfGDkf6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icse/2015/1934/1/1934a471", "title": "relifix: Automated Repair of Software Regressions", "doi": null, "abstractUrl": "/proceedings-article/icse/2015/1934a471/12OmNzVGcKk", "parentPublication": { "id": "proceedings/icse/2015/1934/2", "title": "2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671328", "title": "Assessing Deep Neural Networks as Probability Estimators", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671328/1A8jlR5VWH6", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a162", "title": "ReFixar: Multi-version Reasoning for Automated Repair of Regression Errors", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a162/1AUp44wq5UI", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpca/2022/2027/0/202700a846", "title": "FAST: DNN Training Under Variable Precision Block Floating Point with Stochastic Rounding", "doi": null, "abstractUrl": "/proceedings-article/hpca/2022/202700a846/1Ds0bFqiOqY", "parentPublication": { "id": "proceedings/hpca/2022/2027/0", "title": "2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2022/9747/0/974700b084", "title": "Throughput-oriented and Accuracy-aware DNN Training with BFloat16 on GPU", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2022/974700b084/1Fu9gCZkPy8", "parentPublication": { "id": "proceedings/ipdpsw/2022/9747/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2022/7404/0/740400a373", "title": "Quantization: how far should we go?", "doi": null, "abstractUrl": "/proceedings-article/dsd/2022/740400a373/1JF88q6QUrm", "parentPublication": { "id": "proceedings/dsd/2022/7404/0", "title": "2022 25th Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732351", "title": "Visual Genealogy of Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732351/1aDQt8709So", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b147", "title": "Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b147/1pK5kJM5okg", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b135", "title": "Repairing Deep Neural Networks: Fix Patterns and Challenges", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b135/1pK5lDyPEgo", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2021/4066/0/406600b025", "title": "Pase: Parallelization Strategies for Efficient DNN Training", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2021/406600b025/1uOwbKccA0g", "parentPublication": { "id": "proceedings/ipdps/2021/4066/0", "title": "2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LSP7qPzqTK", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "10074610", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LSPEVH7Nuw", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00165", "title": "Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference", "normalizedTitle": "Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership Inference", "abstract": "Deep neural networks (DNNs) have already achieved great success in a lot of application areas and brought profound changes to our society. However, it also raises new security problems, among which how to protect the intellectual property (IP) of DNNs against infringement is one of the most important yet very challenging topics. To deal with this problem, recent studies focus on the IP protection of DNNs by applying digital watermarking, which embeds source information and/or authentication data into DNN models by tuning network parameters directly or indirectly. However, tuning network parameters inevitably distorts the DNN and therefore surely impairs the performance of the DNN model on its original task regardless of the degree of the performance degradation. It has motivated the authors in this paper to propose a novel technique called pooled membership inference (PMI) so as to protect the IP of the DNN models. The proposed PMI neither alters the network parameters of the given DNN model nor fine-tunes the DNN model with a sequence of carefully crafted trigger samples. Instead, it leaves the original DNN model unchanged, but can determine the ownership of the DNN model by inferring which mini-dataset among multiple mini-datasets was once used to train the target DNN model, which differs from previous arts and has remarkable potential in practice. Experiments also have demonstrated the superiority and applicability of this work.", "abstracts": [ { "abstractType": "Regular", "content": "Deep neural networks (DNNs) have already achieved great success in a lot of application areas and brought profound changes to our society. However, it also raises new security problems, among which how to protect the intellectual property (IP) of DNNs against infringement is one of the most important yet very challenging topics. To deal with this problem, recent studies focus on the IP protection of DNNs by applying digital watermarking, which embeds source information and/or authentication data into DNN models by tuning network parameters directly or indirectly. However, tuning network parameters inevitably distorts the DNN and therefore surely impairs the performance of the DNN model on its original task regardless of the degree of the performance degradation. It has motivated the authors in this paper to propose a novel technique called pooled membership inference (PMI) so as to protect the IP of the DNN models. The proposed PMI neither alters the network parameters of the given DNN model nor fine-tunes the DNN model with a sequence of carefully crafted trigger samples. Instead, it leaves the original DNN model unchanged, but can determine the ownership of the DNN model by inferring which mini-dataset among multiple mini-datasets was once used to train the target DNN model, which differs from previous arts and has remarkable potential in practice. Experiments also have demonstrated the superiority and applicability of this work.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep neural networks (DNNs) have already achieved great success in a lot of application areas and brought profound changes to our society. However, it also raises new security problems, among which how to protect the intellectual property (IP) of DNNs against infringement is one of the most important yet very challenging topics. To deal with this problem, recent studies focus on the IP protection of DNNs by applying digital watermarking, which embeds source information and/or authentication data into DNN models by tuning network parameters directly or indirectly. However, tuning network parameters inevitably distorts the DNN and therefore surely impairs the performance of the DNN model on its original task regardless of the degree of the performance degradation. It has motivated the authors in this paper to propose a novel technique called pooled membership inference (PMI) so as to protect the IP of the DNN models. The proposed PMI neither alters the network parameters of the given DNN model nor fine-tunes the DNN model with a sequence of carefully crafted trigger samples. Instead, it leaves the original DNN model unchanged, but can determine the ownership of the DNN model by inferring which mini-dataset among multiple mini-datasets was once used to train the target DNN model, which differs from previous arts and has remarkable potential in practice. Experiments also have demonstrated the superiority and applicability of this work.", "fno": "199300b042", "keywords": [ "Deep Learning Artificial Intelligence", "Industrial Property", "Inference Mechanisms", "Deep Neural Networks", "Given DNN Model", "Intellectual Property", "IP Protection", "Original DNN Model", "Pooled Membership Inference", "Target DNN Model", "Tuning Network Parameters", "Deep Learning", "Training", "Degradation", "Artificial Neural Networks", "Watermarking", "Resists", "Intellectual Property", "Pooled Membership Inference", "Intellectual Property Protection", "Deep Neural Networks", "Watermarking", "Fingerprint" ], "authors": [ { "affiliation": "Shanghai University,Shanghai,China,200444", "fullName": "Hanzhou Wu", "givenName": "Hanzhou", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1042-1049", "year": "2022", "issn": null, "isbn": "979-8-3503-1993-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "199300b036", "articleId": "1LSPtItNsNG", "__typename": "AdjacentArticleType" }, "next": { "fno": "199300b050", "articleId": "1LSPmiSX5ja", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ares/2015/6590/0/6590a110", "title": "Fair Fingerprinting Protocol for Attesting Software Misuses", "doi": null, "abstractUrl": "/proceedings-article/ares/2015/6590a110/12OmNvAiSvI", "parentPublication": { "id": "proceedings/ares/2015/6590/0", "title": "2015 10th International Conference on Availability, Reliability and Security (ARES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800a188", "title": "DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800a188/1BBzdPlCnpm", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200o4821", "title": "Robust Watermarking for Deep Neural Networks via Bi-level Optimization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200o4821/1BmGhvUQn5K", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09844282", "title": "Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models", "doi": null, "abstractUrl": "/journal/tq/5555/01/09844282/1Fnr1AXFRv2", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300b328", "title": "Identification for Deep Neural Network: Simply Adjusting Few Weights&#x0021;", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300b328/1FwBIAnk0lq", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600n3420", "title": "Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3420/1H0Or1CxC5W", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09954194", "title": "Protecting Intellectual Property with Reliable Availability of Learning Models in AI-based Cybersecurity Services", "doi": null, "abstractUrl": "/journal/tq/5555/01/09954194/1Inox9q1Kr6", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/lc/2019/04/08843919", "title": "Crypto-Based Dual-Phase Hardware Steganography for Securing IP cores", "doi": null, "abstractUrl": "/journal/lc/2019/04/08843919/1dR0VPZpiAo", "parentPublication": { "id": "letters/lc", "title": "IEEE Letters of the Computer Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcsw/2021/4932/0/493200a013", "title": "Dynamic DNN Decomposition for Lossless Synergistic Inference", "doi": null, "abstractUrl": "/proceedings-article/icdcsw/2021/493200a013/1xgBt3aoDO8", "parentPublication": { "id": "proceedings/icdcsw/2021/4932/0", "title": "2021 IEEE 41st International Conference on Distributed Computing Systems Workshops (ICDCSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/06/09645219", "title": "Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations", "doi": null, "abstractUrl": "/journal/ai/2022/06/09645219/1zc6IpBDlfi", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pK5e3DkCcg", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "acronym": "icse", "groupId": "1000691", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pK5lDyPEgo", "doi": null, "title": "Repairing Deep Neural Networks: Fix Patterns and Challenges", "normalizedTitle": "Repairing Deep Neural Networks: Fix Patterns and Challenges", "abstract": "Significant interest in applying Deep Neural Network (DNN) has fueled the need to support engineering of software that uses DNNs. Repairing software that uses DNNs is one such unmistakable SE need where automated tools could be beneficial; however, we do not fully understand challenges to repairing and patterns that are utilized when manually repairing DNNs. What challenges should automated repair tools address? What are the repair patterns whose automation could help developers? Which repair patterns should be assigned a higher priority for building automated bug repair tools? This work presents a comprehensive study of bug fix patterns to address these questions. We have studied 415 repairs from Stack Overflow and 555 repairs from GitHub for five popular deep learning libraries Caffe, Keras, Tensorflow, Theano, and Torch to understand challenges in repairs and bug repair patterns. Our key findings reveal that DNN bug fix patterns are distinctive compared to traditional bug fix patterns; the most common bug fix patterns are fixing data dimension and neural network connectivity; DNN bug fixes have the potential to introduce adversarial vulnerabilities; DNN bug fixes frequently introduce new bugs; and DNN bug localization, reuse of trained model, and coping with frequent releases are major challenges faced by developers when fixing bugs. We also contribute a benchmark of 667 DNN (bug, repair) instances.", "abstracts": [ { "abstractType": "Regular", "content": "Significant interest in applying Deep Neural Network (DNN) has fueled the need to support engineering of software that uses DNNs. Repairing software that uses DNNs is one such unmistakable SE need where automated tools could be beneficial; however, we do not fully understand challenges to repairing and patterns that are utilized when manually repairing DNNs. What challenges should automated repair tools address? What are the repair patterns whose automation could help developers? Which repair patterns should be assigned a higher priority for building automated bug repair tools? This work presents a comprehensive study of bug fix patterns to address these questions. We have studied 415 repairs from Stack Overflow and 555 repairs from GitHub for five popular deep learning libraries Caffe, Keras, Tensorflow, Theano, and Torch to understand challenges in repairs and bug repair patterns. Our key findings reveal that DNN bug fix patterns are distinctive compared to traditional bug fix patterns; the most common bug fix patterns are fixing data dimension and neural network connectivity; DNN bug fixes have the potential to introduce adversarial vulnerabilities; DNN bug fixes frequently introduce new bugs; and DNN bug localization, reuse of trained model, and coping with frequent releases are major challenges faced by developers when fixing bugs. We also contribute a benchmark of 667 DNN (bug, repair) instances.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Significant interest in applying Deep Neural Network (DNN) has fueled the need to support engineering of software that uses DNNs. Repairing software that uses DNNs is one such unmistakable SE need where automated tools could be beneficial; however, we do not fully understand challenges to repairing and patterns that are utilized when manually repairing DNNs. What challenges should automated repair tools address? What are the repair patterns whose automation could help developers? Which repair patterns should be assigned a higher priority for building automated bug repair tools? This work presents a comprehensive study of bug fix patterns to address these questions. We have studied 415 repairs from Stack Overflow and 555 repairs from GitHub for five popular deep learning libraries Caffe, Keras, Tensorflow, Theano, and Torch to understand challenges in repairs and bug repair patterns. Our key findings reveal that DNN bug fix patterns are distinctive compared to traditional bug fix patterns; the most common bug fix patterns are fixing data dimension and neural network connectivity; DNN bug fixes have the potential to introduce adversarial vulnerabilities; DNN bug fixes frequently introduce new bugs; and DNN bug localization, reuse of trained model, and coping with frequent releases are major challenges faced by developers when fixing bugs. We also contribute a benchmark of 667 DNN (bug, repair) instances.", "fno": "712100b135", "keywords": [ "Learning Artificial Intelligence", "Neural Nets", "Program Debugging", "Public Domain Software", "Software Maintenance", "Neural Network Connectivity", "DNN Bug Fixes", "DNN Bug Localization", "Fixing Bugs", "667 DNN", "Deep Neural Networks", "Deep Neural Network", "Repairing Software", "Automated Tools", "Repair Tools Address", "Building Automated Bug Repair Tools", "Bug Repair Patterns", "DNN Bug Fix Patterns", "Traditional Bug", "Common Bug Fix Patterns", "Computer Bugs", "Neural Networks", "Maintenance Engineering", "Tools", "Software", "Software Engineering", "Software Development Management", "Deep Neural Networks", "Bugs", "Bug Fix", "Bug Fix Patterns" ], "authors": [ { "affiliation": "Iowa State University,Dept. of Computer Science,Ames,IA,USA", "fullName": "Md Johirul Islam", "givenName": "Md Johirul", "surname": "Islam", "__typename": "ArticleAuthorType" }, { "affiliation": "Iowa State University,Dept. of Computer Science,Ames,IA,USA", "fullName": "Rangeet Pan", "givenName": "Rangeet", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Iowa State University,Dept. of Computer Science,Ames,IA,USA", "fullName": "Giang Nguyen", "givenName": "Giang", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Iowa State University,Dept. of Computer Science,Ames,IA,USA", "fullName": "Hridesh Rajan", "givenName": "Hridesh", "surname": "Rajan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "1135-1146", "year": "2020", "issn": null, "isbn": "978-1-4503-7121-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "712100b122", "articleId": "1pK5eXfRjs4", "__typename": "AdjacentArticleType" }, "next": { "fno": "712100b147", "articleId": "1pK5kJM5okg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmip/2016/8940/0/8940a089", "title": "Using Test Cases Grouping and Iteration Repair to Fix Multi-points Bug", "doi": null, "abstractUrl": "/proceedings-article/icmip/2016/8940a089/12OmNrF2DFu", "parentPublication": { "id": "proceedings/icmip/2016/8940/0", "title": "2016 First International Conference on Multimedia and Image Processing (ICMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esem/2017/4039/0/4039a404", "title": "Common Bug-Fix Patterns: A Large-Scale Observational Study", "doi": null, "abstractUrl": "/proceedings-article/esem/2017/4039a404/12OmNzRZq0T", "parentPublication": { "id": "proceedings/esem/2017/4039/0", "title": "2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a184", "title": "Identifying Supplementary Bug-fix Commits", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a184/144U9aN3JKT", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/01/08565907", "title": "Mining Fix Patterns for FindBugs Violations", "doi": null, "abstractUrl": "/journal/ts/2021/01/08565907/17D45XreC6t", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2019/0591/0/08667970", "title": "AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations", "doi": null, "abstractUrl": "/proceedings-article/saner/2019/08667970/18uSxbVsX6g", "parentPublication": { "id": "proceedings/saner/2019/0591/0", "title": "2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2021/2587/0/258700a012", "title": "Expanding Fix Patterns to Enable Automatic Program Repair", "doi": null, "abstractUrl": "/proceedings-article/issre/2021/258700a012/1AUpa7towCs", "parentPublication": { "id": "proceedings/issre/2021/2587/0", "title": "2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2018/1970/0/197000a658", "title": "LSRepair: Live Search of Fix Ingredients for Automated Program Repair", "doi": null, "abstractUrl": "/proceedings-article/apsec/2018/197000a658/1b66qAhYN8s", "parentPublication": { "id": "proceedings/apsec/2018/1970/0", "title": "2018 25th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2019/3395/0/339500a030", "title": "FireBugs: Finding and Repairing Bugs with Security Patterns", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2019/339500a030/1cTILTRxaYE", "parentPublication": { "id": "proceedings/mobilesoft/2019/3395/0", "title": "2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2021/8710/0/871000a510", "title": "A large-scale study on human-cloned changes for automated program repair", "doi": null, "abstractUrl": "/proceedings-article/msr/2021/871000a510/1tB7k2ghDI4", "parentPublication": { "id": "proceedings/msr/2021/8710/0/", "title": "2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300b194", "title": "FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300b194/1wLcnabNUek", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tRP79EETbq", "title": "2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)", "acronym": "icst", "groupId": "1001832", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tRP9PPnyj6", "doi": "10.1109/ICST49551.2021.00016", "title": "A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding", "normalizedTitle": "A Search-Based Testing Framework for Deep Neural Networks of Source Code Embedding", "abstract": "Over the past few years, deep neural networks (DNNs) have been continuously expanding their real-world applications for source code processing tasks across the software engineering domain, e.g., clone detection, code search, comment generation. Although quite a few recent works have been performed on testing of DNNs in the context of image and speech processing, limited progress has been achieved so far on DNN testing in the context of source code processing, that exhibits rather unique characteristics and challenges.In this paper, we propose a search-based testing framework for DNNs of source code embedding and its downstream processing tasks like Code Search. To generate new test inputs, we adopt popular source code refactoring tools to generate the semantically equivalent variants. For more effective testing, we leverage the DNN mutation testing to guide the testing direction. To demonstrate the usefulness of our technique, we perform a large-scale evaluation on popular DNNs of source code processing based on multiple state-of-the-art code embedding methods (i.e., Code2vec, Code2seq and CodeBERT). The testing results show that our generated adversarial samples can on average reduce the performance of these DNNs from 5.41% to 9.58%. Through retraining the DNNs with our generated adversarial samples, the robustness of DNN can improve by 23.05% on average. The evaluation results also show that our adversarial test generation strategy has the least negative impact (median of 3.56%), on the performance of the DNNs for regular test data, compared to the other methods.", "abstracts": [ { "abstractType": "Regular", "content": "Over the past few years, deep neural networks (DNNs) have been continuously expanding their real-world applications for source code processing tasks across the software engineering domain, e.g., clone detection, code search, comment generation. Although quite a few recent works have been performed on testing of DNNs in the context of image and speech processing, limited progress has been achieved so far on DNN testing in the context of source code processing, that exhibits rather unique characteristics and challenges.In this paper, we propose a search-based testing framework for DNNs of source code embedding and its downstream processing tasks like Code Search. To generate new test inputs, we adopt popular source code refactoring tools to generate the semantically equivalent variants. For more effective testing, we leverage the DNN mutation testing to guide the testing direction. To demonstrate the usefulness of our technique, we perform a large-scale evaluation on popular DNNs of source code processing based on multiple state-of-the-art code embedding methods (i.e., Code2vec, Code2seq and CodeBERT). The testing results show that our generated adversarial samples can on average reduce the performance of these DNNs from 5.41% to 9.58%. Through retraining the DNNs with our generated adversarial samples, the robustness of DNN can improve by 23.05% on average. The evaluation results also show that our adversarial test generation strategy has the least negative impact (median of 3.56%), on the performance of the DNNs for regular test data, compared to the other methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Over the past few years, deep neural networks (DNNs) have been continuously expanding their real-world applications for source code processing tasks across the software engineering domain, e.g., clone detection, code search, comment generation. Although quite a few recent works have been performed on testing of DNNs in the context of image and speech processing, limited progress has been achieved so far on DNN testing in the context of source code processing, that exhibits rather unique characteristics and challenges.In this paper, we propose a search-based testing framework for DNNs of source code embedding and its downstream processing tasks like Code Search. To generate new test inputs, we adopt popular source code refactoring tools to generate the semantically equivalent variants. For more effective testing, we leverage the DNN mutation testing to guide the testing direction. To demonstrate the usefulness of our technique, we perform a large-scale evaluation on popular DNNs of source code processing based on multiple state-of-the-art code embedding methods (i.e., Code2vec, Code2seq and CodeBERT). The testing results show that our generated adversarial samples can on average reduce the performance of these DNNs from 5.41% to 9.58%. Through retraining the DNNs with our generated adversarial samples, the robustness of DNN can improve by 23.05% on average. The evaluation results also show that our adversarial test generation strategy has the least negative impact (median of 3.56%), on the performance of the DNNs for regular test data, compared to the other methods.", "fno": "683600a036", "keywords": [ "Neural Nets", "Program Testing", "Software Engineering", "Software Maintenance", "Source Coding", "Speech Processing", "Test Inputs", "Popular Source Code Refactoring Tools", "Effective Testing", "DNN Mutation Testing", "Testing Direction", "Multiple State Of The Art Code", "Code 2 Vec", "Code 2 Seq", "Generated Adversarial Samples", "Adversarial Test Generation Strategy", "Regular Test Data", "Search Based", "Deep Neural Networks", "Source Code Embedding", "Source Code Processing Tasks", "Code Search", "Comment Generation", "Speech Processing", "DNN Testing", "Downstream Processing Tasks", "Training", "Software Testing", "Neural Networks", "Tools", "Robustness", "Test Pattern Generators", "Task Analysis", "Source Code Processing", "Deep Neural Network", "Testing" ], "authors": [ { "affiliation": "University of Calgary,Schulich School of Engineering,Canada", "fullName": "Maryam Vahdat Pour", "givenName": "Maryam Vahdat", "surname": "Pour", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu University,Department of Information Science and Electrical Engineering,Japan", "fullName": "Zhuo Li", "givenName": "Zhuo", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu University,Department of Information Science and Electrical Engineering,Japan", "fullName": "Lei Ma", "givenName": "Lei", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Calgary,Schulich School of Engineering,Canada", "fullName": "Hadi Hemmati", "givenName": "Hadi", "surname": "Hemmati", "__typename": "ArticleAuthorType" } ], "idPrefix": "icst", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "36-46", "year": "2021", "issn": "2159-4848", "isbn": "978-1-7281-6836-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "683600a024", "articleId": "1tRP7IcknAc", "__typename": "AdjacentArticleType" }, "next": { "fno": "683600a047", "articleId": "1tRP8xP3ghG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/met/2018/5729/0/572901a002", "title": "Fault Detection Effectiveness of Source Test Case Generation Strategies for Metamorphic Testing", "doi": null, "abstractUrl": "/proceedings-article/met/2018/572901a002/13xI8JoTtXv", "parentPublication": { "id": "proceedings/met/2018/5729/0", "title": "2018 IEEE/ACM 3rd International Workshop on Metamorphic Testing (MET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2018/9355/0/935500a024", "title": "Dynamic Testing of C Program Interfaces Based on FSM Modeling", "doi": null, "abstractUrl": "/proceedings-article/fit/2018/935500a024/17D45XdBRQe", "parentPublication": { "id": "proceedings/fit/2018/9355/0", "title": "2018 International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsc/2019/1805/0/08665853", "title": "Code-to-Code Search Based on Deep Neural Network and Code Mutation", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2019/08665853/18qbZl2u32E", "parentPublication": { "id": "proceedings/iwsc/2019/1805/0", "title": "2019 IEEE 13th International Workshop on Software Clones (IWSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b601", "title": "FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b601/1LSPhekyYww", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2019/1764/0/176400a111", "title": "DeepConcolic: Testing and Debugging Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2019/176400a111/1cJ7lnHQyze", "parentPublication": { "id": "proceedings/icse-companion/2019/1764/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800b158", "title": "DeepMutation++: A Mutation Testing Framework for Deep Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800b158/1gysV2EtE3e", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b147", "title": "Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b147/1pK5kJM5okg", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2020/6768/0/676800a448", "title": "Defect Prediction Guided Search-Based Software Testing", "doi": null, "abstractUrl": "/proceedings-article/ase/2020/676800a448/1pP3JiHrVAc", "parentPublication": { "id": "proceedings/ase/2020/6768/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2021/0296/0/029600a226", "title": "Distribution-Aware Testing of Neural Networks Using Generative Models", "doi": null, "abstractUrl": "/proceedings-article/icse/2021/029600a226/1sEXnIdlifK", "parentPublication": { "id": "proceedings/icse/2021/0296/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2021/9630/0/963000a189", "title": "DeepCon: Contribution Coverage Testing for Deep Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/saner/2021/963000a189/1twfs5KiFd6", "parentPublication": { "id": "proceedings/saner/2021/9630/0", "title": "2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wiQY2VfqYU", "title": "2021 IEEE 32nd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "acronym": "asap", "groupId": "1000037", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wiR28TpFvO", "doi": "10.1109/ASAP52443.2021.00027", "title": "TwinDNN: A Tale of Two Deep Neural Networks", "normalizedTitle": "TwinDNN: A Tale of Two Deep Neural Networks", "abstract": "Compression technologies for deep neural networks (DNNs), such as weight quantization, have been widely investigated to reduce the model size so that they can be implemented on hardware with strict resource restrictions. However, one major downside of model compression is accuracy degradation. To deal with this problem effectively, we propose a new compressed network inference scheme with a high accuracy but slower DNN coupled with its highly compressed DNN version that typically delivers much faster inference speed but with a lower accuracy. During the inference, we determine the confidence of the prediction of the compressed DNN, and infer the original neural network for the inputs that are considered not confident by the compressed DNN. The proposed design uses a balanced number of resources available on the hardware and can deliver overall accuracy close to the high accuracy model, but with the inference speed closer to the compressed DNN. We demonstrate our design on two image classification tasks: CIFAR-10 and ImageNet. Our experiments show that our design can recover up to 94% of accuracy drop caused by extreme network compression, with more than 90% speedup compared to just using the original DNN. This is more than 17% extra accuracy recovery and 36% extra speedup compared to the previous work with a similar concept on VGG-16. This is the first work that considers using a highly compressed DNN along with the original DNN in parallel to achieve high accuracy and speed at the same time, while maintaining the resource balance by using two different main computation sources efficiently on an FPGA.", "abstracts": [ { "abstractType": "Regular", "content": "Compression technologies for deep neural networks (DNNs), such as weight quantization, have been widely investigated to reduce the model size so that they can be implemented on hardware with strict resource restrictions. However, one major downside of model compression is accuracy degradation. To deal with this problem effectively, we propose a new compressed network inference scheme with a high accuracy but slower DNN coupled with its highly compressed DNN version that typically delivers much faster inference speed but with a lower accuracy. During the inference, we determine the confidence of the prediction of the compressed DNN, and infer the original neural network for the inputs that are considered not confident by the compressed DNN. The proposed design uses a balanced number of resources available on the hardware and can deliver overall accuracy close to the high accuracy model, but with the inference speed closer to the compressed DNN. We demonstrate our design on two image classification tasks: CIFAR-10 and ImageNet. Our experiments show that our design can recover up to 94% of accuracy drop caused by extreme network compression, with more than 90% speedup compared to just using the original DNN. This is more than 17% extra accuracy recovery and 36% extra speedup compared to the previous work with a similar concept on VGG-16. This is the first work that considers using a highly compressed DNN along with the original DNN in parallel to achieve high accuracy and speed at the same time, while maintaining the resource balance by using two different main computation sources efficiently on an FPGA.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Compression technologies for deep neural networks (DNNs), such as weight quantization, have been widely investigated to reduce the model size so that they can be implemented on hardware with strict resource restrictions. However, one major downside of model compression is accuracy degradation. To deal with this problem effectively, we propose a new compressed network inference scheme with a high accuracy but slower DNN coupled with its highly compressed DNN version that typically delivers much faster inference speed but with a lower accuracy. During the inference, we determine the confidence of the prediction of the compressed DNN, and infer the original neural network for the inputs that are considered not confident by the compressed DNN. The proposed design uses a balanced number of resources available on the hardware and can deliver overall accuracy close to the high accuracy model, but with the inference speed closer to the compressed DNN. We demonstrate our design on two image classification tasks: CIFAR-10 and ImageNet. Our experiments show that our design can recover up to 94% of accuracy drop caused by extreme network compression, with more than 90% speedup compared to just using the original DNN. This is more than 17% extra accuracy recovery and 36% extra speedup compared to the previous work with a similar concept on VGG-16. This is the first work that considers using a highly compressed DNN along with the original DNN in parallel to achieve high accuracy and speed at the same time, while maintaining the resource balance by using two different main computation sources efficiently on an FPGA.", "fno": "270100a133", "keywords": [ "Data Compression", "Deep Learning Artificial Intelligence", "Image Classification", "Inference Mechanisms", "Deep Neural Networks", "Compression Technologies", "Network Inference Scheme", "Twin DNN", "Image Classification", "CIFAR 10", "Image Net", "Training", "Deep Learning", "Image Coding", "Quantization Signal", "Neural Networks", "Tools", "Hardware", "Hardware Accelerator", "High Level Synthesis", "Machine Learning", "Neural Network Quantization" ], "authors": [ { "affiliation": "University of Illinois Urbana-Champaign,Electrical and Computer Engineering,Champaign,United States", "fullName": "Hyunmin Jeong", "givenName": "Hyunmin", "surname": "Jeong", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois Urbana-Champaign,Electrical and Computer Engineering,Champaign,United States", "fullName": "Deming Chen", "givenName": "Deming", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "asap", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "133-140", "year": "2021", "issn": null, "isbn": "978-1-6654-2701-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "270100a125", "articleId": "1wiQYzOa8ik", "__typename": "AdjacentArticleType" }, "next": { "fno": "270100a141", "articleId": "1wiR1nHaTAI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/micro/2017/4952/0/08686678", "title": "CirCNN: Accelerating and Compressing Deep Neural Networks Using Block-Circulant Weight Matrices", "doi": null, "abstractUrl": "/proceedings-article/micro/2017/08686678/19RRXNocRos", "parentPublication": { "id": "proceedings/micro/2017/4952/0", "title": "2017 50th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200f231", "title": "RMSMP: A Novel Deep Neural Network Quantization Framework with Row-wise Mixed Schemes and Multiple Precisions", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200f231/1BmFw1RBeSI", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09786782", "title": "RED++ : Data-Free Pruning of Deep Neural Networks via Input Splitting and Output Merging", "doi": null, "abstractUrl": "/journal/tp/2023/03/09786782/1DSuk8SLovS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fccm/2022/8332/0/09786098", "title": "Hardware-Friendly Acceleration for Deep Neural Networks with Micro-Structured Compression", "doi": null, "abstractUrl": "/proceedings-article/fccm/2022/09786098/1DUdUW4O3x6", "parentPublication": { "id": "proceedings/fccm/2022/8332/0", "title": "2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icess/2019/2437/0/08782505", "title": "Evaluating Fault Resiliency of Compressed Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icess/2019/08782505/1c8P7wltsg8", "parentPublication": { "id": "proceedings/icess/2019/2437/0", "title": "2019 IEEE International Conference on Embedded Software and Systems (ICESS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mi/2020/05/09151283", "title": "A Programmable Approach to Neural Network Compression", "doi": null, "abstractUrl": "/magazine/mi/2020/05/09151283/1lPCxyiIH2o", "parentPublication": { "id": "mags/mi", "title": "IEEE Micro", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2020/9535/0/09217801", "title": "DNNZip: Selective Layers Compression Technique in Deep Neural Network Accelerators", "doi": null, "abstractUrl": "/proceedings-article/dsd/2020/09217801/1nLbExNHm6s", "parentPublication": { "id": "proceedings/dsd/2020/9535/0", "title": "2020 23rd Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2021/0032/0/09555552", "title": "Robustness of Compressed Deep Neural Networks with Adversarial Training", "doi": null, "abstractUrl": "/proceedings-article/iisa/2021/09555552/1xxct4wMpi0", "parentPublication": { "id": "proceedings/iisa/2021/0032/0", "title": "2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2021/3219/0/321900a542", "title": "QD-Compressor: a Quantization-based Delta Compression Framework for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccd/2021/321900a542/1zuv03zdTSE", "parentPublication": { "id": "proceedings/iccd/2021/3219/0", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2021/3219/0/321900a533", "title": "Smart-DNN: Efficiently Reducing the Memory Requirements of Running Deep Neural Networks on Resource-constrained Platforms", "doi": null, "abstractUrl": "/proceedings-article/iccd/2021/321900a533/1zuv19stzJm", "parentPublication": { "id": "proceedings/iccd/2021/3219/0", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbV00", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYGlqZ", "doi": "10.1109/CVPR.2012.6247700", "title": "Affine-invariant, elastic shape analysis of planar contours", "normalizedTitle": "Affine-invariant, elastic shape analysis of planar contours", "abstract": "We present a Riemannian framework for analyzing shapes of planar contours in which metrics and other analyses are invariant to affine transformations and re-parameterizations of contours. Current methods that are affine invariant are restricted to point sets and do not handle full curves, while methods that analyze parameterized curves are restricted to equivalence under similarity transformation (rigid motion and scale). We construct a pre-shape manifold of standardized curves - curves whose centroid is at the origin, are of unit length, and their x and y coordinates are uncorrelated - and develop a path-straightening technique for computing geodesics on this nonlinear manifold under the elastic Riemannian metric. The removal of the rotation and the re-parameterization groups results in a quotient space, termed affine elastic shape space, and the resulting geodesic paths exhibit an improved matching of features across curves. These geodesics are used for shape comparison, retrieval, and statistical modeling of given curves. Experimental results using both simulated and real data, and an application involving pose-invariant activity recognition, demonstrate the success of this framework.", "abstracts": [ { "abstractType": "Regular", "content": "We present a Riemannian framework for analyzing shapes of planar contours in which metrics and other analyses are invariant to affine transformations and re-parameterizations of contours. Current methods that are affine invariant are restricted to point sets and do not handle full curves, while methods that analyze parameterized curves are restricted to equivalence under similarity transformation (rigid motion and scale). We construct a pre-shape manifold of standardized curves - curves whose centroid is at the origin, are of unit length, and their x and y coordinates are uncorrelated - and develop a path-straightening technique for computing geodesics on this nonlinear manifold under the elastic Riemannian metric. The removal of the rotation and the re-parameterization groups results in a quotient space, termed affine elastic shape space, and the resulting geodesic paths exhibit an improved matching of features across curves. These geodesics are used for shape comparison, retrieval, and statistical modeling of given curves. Experimental results using both simulated and real data, and an application involving pose-invariant activity recognition, demonstrate the success of this framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a Riemannian framework for analyzing shapes of planar contours in which metrics and other analyses are invariant to affine transformations and re-parameterizations of contours. Current methods that are affine invariant are restricted to point sets and do not handle full curves, while methods that analyze parameterized curves are restricted to equivalence under similarity transformation (rigid motion and scale). We construct a pre-shape manifold of standardized curves - curves whose centroid is at the origin, are of unit length, and their x and y coordinates are uncorrelated - and develop a path-straightening technique for computing geodesics on this nonlinear manifold under the elastic Riemannian metric. The removal of the rotation and the re-parameterization groups results in a quotient space, termed affine elastic shape space, and the resulting geodesic paths exhibit an improved matching of features across curves. These geodesics are used for shape comparison, retrieval, and statistical modeling of given curves. Experimental results using both simulated and real data, and an application involving pose-invariant activity recognition, demonstrate the success of this framework.", "fno": "050O1B01", "keywords": [ "Statistical Analysis", "Computational Geometry", "Computer Vision", "Curve Fitting", "Image Matching", "Shape Recognition", "Pose Invariant Activity Recognition", "Affine Invariant", "Elastic Shape Analysis", "Planar Contour", "Riemannian Framework", "Affine Transformation", "Contour Reparameterization", "Similarity Transformation", "Preshape Manifold", "Standardized Curves", "Path Straightening Technique", "Nonlinear Manifold", "Elastic Riemannian Metric", "Quotient Space", "Affine Elastic Shape Space", "Geodesic Path", "Feature Matching", "Shape Comparison", "Statistical Modeling", "Shape", "Space Vehicles", "Measurement", "Vectors", "Manifolds", "Standardization", "Orbits" ], "authors": [ { "affiliation": "Dept. of Math., Florida State Univ., Tallahassee, FL, USA", "fullName": "E. Klassen", "givenName": "E.", "surname": "Klassen", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Stat., Florida State Univ., Tallahassee, FL, USA", "fullName": "A. Srivastava", "givenName": "A.", "surname": "Srivastava", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Stat., Florida State Univ., Tallahassee, FL, USA", "fullName": "D. Bryner", "givenName": "D.", "surname": "Bryner", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "390-397", "year": "2012", "issn": "1063-6919", "isbn": "978-1-4673-1226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "049O1A04", "articleId": "12OmNCmGO0P", "__typename": "AdjacentArticleType" }, "next": { "fno": "051O1B02", "articleId": "12OmNA0vo0T", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/1996/7258/0/72580520", "title": "Affine Invariant Detection: Edges, Active Contours, and Segments", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1996/72580520/12OmNrAMEOC", "parentPublication": { "id": "proceedings/cvpr/1996/7258/0", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2006/2686/0/26860019", "title": "Parabolic Polygons and Discrete Affine Geometry", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2006/26860019/12OmNwGIcCc", "parentPublication": { "id": "proceedings/sibgrapi/2006/2686/0", "title": "2006 19th Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/1/07505015", "title": "Affine-Invariant Curve Normalization for Shape-Based Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07505015/12OmNweTvQW", "parentPublication": { "id": "proceedings/icpr/2000/0750/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsm/2001/1278/0/12780097", "title": "Affine Invariant Edge Completion with Affine Geodesics", "doi": null, "abstractUrl": "/proceedings-article/vlsm/2001/12780097/12OmNxHryfW", "parentPublication": { "id": "proceedings/vlsm/2001/1278/0", "title": "Proceedings of 1st IEEE Workshop on Variational and Level Set Methods in Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118a312", "title": "Bayesian Active Contours with Affine-Invariant, Elastic Shape Prior", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118a312/12OmNxYbSWO", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/3/07503794", "title": "New Multiscale Planar Shape Invariant Representation under a General Affine Transformations", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07503794/12OmNzgeLCN", "parentPublication": { "id": "proceedings/icpr/2000/0750/3", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/07/ttp2011071415", "title": "Shape Analysis of Elastic Curves in Euclidean Spaces", "doi": null, "abstractUrl": "/journal/tp/2011/07/ttp2011071415/13rRUEgs2us", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1997/08/i0846", "title": "Wavelet-Based Affine Invariant Representation: A Tool for Recognizing Planar Objects in 3D Space", "doi": null, "abstractUrl": "/journal/tp/1997/08/i0846/13rRUwgQprE", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/05/06626302", "title": "2D Affine and Projective Shape Analysis", "doi": null, "abstractUrl": "/journal/tp/2014/05/06626302/13rRUxDqS9C", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs0kyrq", "title": "2006 Winter Simulation Conference", "acronym": "wsc", "groupId": "1000674", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNCbU31s", "doi": "10.1109/WSC.2006.323219", "title": "Learning Curve Application to Space Shuttle Processing Simulations", "normalizedTitle": "Learning Curve Application to Space Shuttle Processing Simulations", "abstract": "Traditional learning curves were pioneered by T.P. Wright in 1936, with the idea that improvements in labor-hours to manufacture an airplane could be described in a mathematical pattern. This paper will show that this concept of learning curve improvements to production metrics can be applied based on cumulative time, rather than volume of production, for one-of-a-kind applications, such as space shuttle flights, where production quantities are very limited. Policy and process changes can also be observed in production data, and the learning curve is useful in the prediction of future trends. Past data from space shuttle processing is demonstrated to fit this new definition, and prediction of future process metrics is explored. Once the learning curve is time-based, simulation can be applied to model the system and enhance the prediction effort for future process metrics", "abstracts": [ { "abstractType": "Regular", "content": "Traditional learning curves were pioneered by T.P. Wright in 1936, with the idea that improvements in labor-hours to manufacture an airplane could be described in a mathematical pattern. This paper will show that this concept of learning curve improvements to production metrics can be applied based on cumulative time, rather than volume of production, for one-of-a-kind applications, such as space shuttle flights, where production quantities are very limited. Policy and process changes can also be observed in production data, and the learning curve is useful in the prediction of future trends. Past data from space shuttle processing is demonstrated to fit this new definition, and prediction of future process metrics is explored. Once the learning curve is time-based, simulation can be applied to model the system and enhance the prediction effort for future process metrics", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional learning curves were pioneered by T.P. Wright in 1936, with the idea that improvements in labor-hours to manufacture an airplane could be described in a mathematical pattern. This paper will show that this concept of learning curve improvements to production metrics can be applied based on cumulative time, rather than volume of production, for one-of-a-kind applications, such as space shuttle flights, where production quantities are very limited. Policy and process changes can also be observed in production data, and the learning curve is useful in the prediction of future trends. Past data from space shuttle processing is demonstrated to fit this new definition, and prediction of future process metrics is explored. Once the learning curve is time-based, simulation can be applied to model the system and enhance the prediction effort for future process metrics", "fno": "04117743", "keywords": [ "Space Shuttle Flights", "Space Shuttle Processing Simulations", "Learning Curves", "Mathematical Pattern", "Production Metrics" ], "authors": [ { "affiliation": "United Space Alliance, LLC, Cape Canaveral, FL", "fullName": "M.G. Madden", "givenName": "M.G.", "surname": "Madden", "__typename": "ArticleAuthorType" } ], "idPrefix": "wsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "1240-1247", "year": "2006", "issn": null, "isbn": "1-4244-0500-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04117742", "articleId": "12OmNCdk2V9", "__typename": "AdjacentArticleType" }, "next": { "fno": "04117744", "articleId": "12OmNrJRPo5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dodugc/2005/2496/0/24960041", "title": "Analysis of the RCS and High Resolution Synthetic Radar Track Data for the Space Shuttle Mission STS-114", "doi": null, "abstractUrl": "/proceedings-article/dodugc/2005/24960041/12OmNAS9zIu", "parentPublication": { "id": "proceedings/dodugc/2005/2496/0", "title": "2005 Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2002/7614/1/01172957", "title": "Modeling the space shuttle", "doi": null, "abstractUrl": "/proceedings-article/wsc/2002/01172957/12OmNASraOn", "parentPublication": { "id": "proceedings/wsc/2002/7614/1", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2001/1050/0/10500349", "title": "Understanding IV&V in a Safety Critical and Complex Evolutionary Environment: The NASA Space Shuttle Program", "doi": null, "abstractUrl": "/proceedings-article/icse/2001/10500349/12OmNqC2uUL", "parentPublication": { "id": "proceedings/icse/2001/1050/0", "title": "Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hics/1996/7493/0/74930068", "title": "Functionally distributed coordination during anomaly response in space shuttle mission control", "doi": null, "abstractUrl": "/proceedings-article/hics/1996/74930068/12OmNrK9q0B", "parentPublication": { "id": "proceedings/hics/1996/7493/0", "title": "Human Interaction with Complex Systems, Annual Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2001/1189/0/11890118", "title": "The Role of Independent Verification and Validation in Maintaining a Safety Critical Evolutionary Software in a Complex Environment: The NASA Space Shuttle Program", "doi": null, "abstractUrl": "/proceedings-article/icsm/2001/11890118/12OmNwD1pT3", "parentPublication": { "id": "proceedings/icsm/2001/1189/0", "title": "Proceedings IEEE International Conference on Software Maintenance. ICSM 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/1992/2980/0/00242520", "title": "Reliability models and metrics for space shuttle maintenance position statement", "doi": null, "abstractUrl": "/proceedings-article/icsm/1992/00242520/12OmNwe2Izo", "parentPublication": { "id": "proceedings/icsm/1992/2980/0", "title": "Proceedings Conference on Software Maintenance 1992", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2006/01/x1068", "title": "Space Shuttle Ground Processing with Monitoring Agents", "doi": null, "abstractUrl": "/magazine/ex/2006/01/x1068/13rRUxAAT3f", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/1994/08/r8050", "title": "Validating Metrics for Ensuring Space Shuttle Flight Software Quality", "doi": null, "abstractUrl": "/magazine/co/1994/08/r8050/13rRUxBa5f1", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2012/02/mit2012020010", "title": "Farewell to the Space Shuttle", "doi": null, "abstractUrl": "/magazine/it/2012/02/mit2012020010/13rRUxZ0nXV", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/1992/04/s4028", "title": "Applying Reliability Models to the Space Shuttle", "doi": null, "abstractUrl": "/magazine/so/1992/04/s4028/13rRUyeTVfJ", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzw8jh3", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "acronym": "robot", "groupId": "1000639", "volume": "0", "displayVolume": "0", "year": "1988", "__typename": "ProceedingType" }, "article": { "id": "12OmNrNh0GA", "doi": "10.1109/ROBOT.1988.12129", "title": "Nonplanar curve and surface estimation in 3-space", "normalizedTitle": "Nonplanar curve and surface estimation in 3-space", "abstract": "The problem of minimal parameter representation and estimation for complex planar and nonplanar curves, and surfaces is considered. The representation is based on concepts from algebraic geometry: a surface is the set of roots of a polynomial of three variables, and a curve is the intersection of two different surfaces. It is shown that the surfaces of an interesting complex of objects in three-space can be represented by single high degree-polynomials, and a similar statement applies to complex curves in three-space. An approximate expression for the mean-square distance from a set of points to a curve or surface is developed, not only for quadratic surfaces, but also for surfaces and curves defined by polynomials of higher degree. A computationally efficient algorithm is presented to carry out the minimization without using nonlinear optimization techniques.<>", "abstracts": [ { "abstractType": "Regular", "content": "The problem of minimal parameter representation and estimation for complex planar and nonplanar curves, and surfaces is considered. The representation is based on concepts from algebraic geometry: a surface is the set of roots of a polynomial of three variables, and a curve is the intersection of two different surfaces. It is shown that the surfaces of an interesting complex of objects in three-space can be represented by single high degree-polynomials, and a similar statement applies to complex curves in three-space. An approximate expression for the mean-square distance from a set of points to a curve or surface is developed, not only for quadratic surfaces, but also for surfaces and curves defined by polynomials of higher degree. A computationally efficient algorithm is presented to carry out the minimization without using nonlinear optimization techniques.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The problem of minimal parameter representation and estimation for complex planar and nonplanar curves, and surfaces is considered. The representation is based on concepts from algebraic geometry: a surface is the set of roots of a polynomial of three variables, and a curve is the intersection of two different surfaces. It is shown that the surfaces of an interesting complex of objects in three-space can be represented by single high degree-polynomials, and a similar statement applies to complex curves in three-space. An approximate expression for the mean-square distance from a set of points to a curve or surface is developed, not only for quadratic surfaces, but also for surfaces and curves defined by polynomials of higher degree. A computationally efficient algorithm is presented to carry out the minimization without using nonlinear optimization techniques.", "fno": "00012129", "keywords": [ "Computational Complexity", "Geometry", "Optimisation", "Polynomials", "Parameter Estimation", "Surface Estimation", "Complex Planar", "Nonplanar Curves", "Algebraic Geometry", "Polynomial", "Complex Curves", "Minimization", "Optimization", "Polynomials", "Parameter Estimation", "Geometry", "Minimization Methods", "Stereo Vision", "Object Recognition", "Machine Vision", "Solids", "Surface Fitting" ], "authors": [ { "affiliation": "Brown Univ., Providence, RI, USA", "fullName": "G. Taubin", "givenName": "G.", "surname": "Taubin", "__typename": "ArticleAuthorType" } ], "idPrefix": "robot", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1988-01-01T00:00:00", "pubType": "proceedings", "pages": "644,645", "year": "1988", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00012128", "articleId": "12OmNzaQoED", "__typename": "AdjacentArticleType" }, "next": { "fno": "00012130", "articleId": "12OmNs0kyCB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/1995/7042/0/70420852", "title": "Curve and surface smoothing without shrinkage", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420852/12OmNANBZo4", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/2/3865b324", "title": "Optimized NURBS Curve and Surface Fitting Using Simulated Annealing", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865b324/12OmNx0A7HM", "parentPublication": { "id": "proceedings/iscid/2009/3865/2", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1998/8295/0/82950818", "title": "Integrated Surface, Curve and Junction Inference from Sparse 3-D Data Sets", "doi": null, "abstractUrl": "/proceedings-article/iccv/1998/82950818/12OmNx3ZjgY", "parentPublication": { "id": "proceedings/iccv/1998/8295/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1993/3870/0/00378149", "title": "An improved algorithm for algebraic curve and surface fitting", "doi": null, "abstractUrl": "/proceedings-article/iccv/1993/00378149/12OmNxzMnMD", "parentPublication": { "id": "proceedings/iccv/1993/3870/0", "title": "1993 (4th) International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223220", "title": "Parametrizing and fitting bounded algebraic curves and surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223220/12OmNyLA5xY", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223171", "title": "Robust object recognition based on implicit algebraic curves and surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223171/12OmNzSyCdE", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/01/i0001", "title": "Part I: Modeling Image Curves Using Invariant 3-D Object Curve Models/spl minus/a Path to 3-D Recognition and Shape Estimation from Image Contours", "doi": null, "abstractUrl": "/journal/tp/1994/01/i0001/13rRUB7a11V", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1991/11/i1115", "title": "Estimation of Planar Curves, Surfaces, and Nonplanar Space Curves Defined by Implicit Equations with Applications to Edge and Range Image Segmentation", "doi": null, "abstractUrl": "/journal/tp/1991/11/i1115/13rRUNvgzaN", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1996/03/i0321", "title": "Implicit Simplicial Models for Adaptive Curve Reconstruction", "doi": null, "abstractUrl": "/journal/tp/1996/03/i0321/13rRUxBa5oh", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/03/i0287", "title": "Parameterized Families of Polynomials for Bounded Algebraic Curve and Surface Fitting", "doi": null, "abstractUrl": "/journal/tp/1994/03/i0287/13rRUy0qnHi", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Tk", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNvT2oV6", "doi": "10.1109/ICME.2008.4607380", "title": "Three-dimensional face recognition using elastic deformations of facial surfaces", "normalizedTitle": "Three-dimensional face recognition using elastic deformations of facial surfaces", "abstract": "We propose a pattern theoretic approach for studying variability in shapes of facial surfaces. Our idea is to impose a specific, yet natural, coordinate system, called a curvilinear coordinate system, on facial surfaces. In this system, one coordinate xi1 measures the distance of a point from the tip of the nose and its level curves are called the facial curves. The other coordinate xi2 measures distances along these curves; level curves of this coordinate are orthogonal to the facial curves. To compare two facial surfaces we use elastic deformations that use stretching, shrinking, and bending to optimally register points across two surfaces. We will demonstrate this idea on Florida State University (FSU) 3D face database.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a pattern theoretic approach for studying variability in shapes of facial surfaces. Our idea is to impose a specific, yet natural, coordinate system, called a curvilinear coordinate system, on facial surfaces. In this system, one coordinate xi1 measures the distance of a point from the tip of the nose and its level curves are called the facial curves. The other coordinate xi2 measures distances along these curves; level curves of this coordinate are orthogonal to the facial curves. To compare two facial surfaces we use elastic deformations that use stretching, shrinking, and bending to optimally register points across two surfaces. We will demonstrate this idea on Florida State University (FSU) 3D face database.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a pattern theoretic approach for studying variability in shapes of facial surfaces. Our idea is to impose a specific, yet natural, coordinate system, called a curvilinear coordinate system, on facial surfaces. In this system, one coordinate xi1 measures the distance of a point from the tip of the nose and its level curves are called the facial curves. The other coordinate xi2 measures distances along these curves; level curves of this coordinate are orthogonal to the facial curves. To compare two facial surfaces we use elastic deformations that use stretching, shrinking, and bending to optimally register points across two surfaces. We will demonstrate this idea on Florida State University (FSU) 3D face database.", "fno": "04607380", "keywords": [ "Bending", "Elastic Deformation", "Face Recognition", "Feature Extraction", "Visual Databases", "Three Dimensional Face Recognition", "Facial Feature Elastic Deformations", "Curvilinear Coordinate System", "Stretching", "Shrinking", "Bending", "Florida State University 3 D Face Database", "Face", "Face Recognition", "Shape", "Three Dimensional Displays", "Probes", "Nose", "Distance Measurement", "3 D Face Recognition", "Curvilinear Coordinate System", "Elastic Deformation" ], "authors": [ { "affiliation": "Institut TELECOM ; TELECOM Lille1 ; CNRS LIFL, France", "fullName": "Mohamed Daoudi", "givenName": "Mohamed", "surname": "Daoudi", "__typename": "ArticleAuthorType" }, { "affiliation": "Institut TELECOM ; TELECOM Lille1 ; CNRS LIFL, France", "fullName": "Lahoucine Ballihi", "givenName": "Lahoucine", "surname": "Ballihi", "__typename": "ArticleAuthorType" }, { "affiliation": "Institut TELECOM ; TELECOM Lille1 ; CNRS LIFL, France", "fullName": "Chafik Samir", "givenName": "Chafik", "surname": "Samir", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Statistics, Florida State University, Tallahassee, 32306, USA", "fullName": "Anuj Srivastava", "givenName": "Anuj", "surname": "Srivastava", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-06-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "1945-7871", "isbn": "978-1-4244-2570-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04607379", "articleId": "12OmNyugyFe", "__typename": "AdjacentArticleType" }, "next": { "fno": "04607381", "articleId": "12OmNxtOO0B", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciapw/2007/2921/0/29210027", "title": "A Framework of Calculus on Facial Surfaces", "doi": null, "abstractUrl": "/proceedings-article/iciapw/2007/29210027/12OmNAlvHLZ", "parentPublication": { "id": "proceedings/iciapw/2007/2921/0", "title": "2007 14th International Conference on Image Analysis and Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2017/0852/0/0852a073", "title": "Automatic Face Recognition System Using Iso-Geodesic Curves in Riemanian Manifold", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2017/0852a073/12OmNqBtj19", "parentPublication": { "id": "proceedings/cgiv/2017/0852/0", "title": "2017 14th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2011/0529/0/05981779", "title": "Facial curves between keypoints for recognition of 3D faces with missing parts", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2011/05981779/12OmNxYL5ee", "parentPublication": { "id": "proceedings/cvprw/2011/0529/0", "title": "CVPR 2011 WORKSHOPS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2013/5545/0/06553820", "title": "A stable and accurate multi-reference representation for surfaces of R3: Application to 3D faces description", "doi": null, "abstractUrl": "/proceedings-article/fg/2013/06553820/12OmNyY4rnV", "parentPublication": { "id": "proceedings/fg/2013/5545/0", "title": "2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2013/5118/0/5118a128", "title": "3D Facial Expression Classification Based on Self-Organizing Mapping Network", "doi": null, "abstractUrl": "/proceedings-article/icicse/2013/5118a128/12OmNzGlRBQ", "parentPublication": { "id": "proceedings/icicse/2013/5118/0", "title": "2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1992/2910/0/00201567", "title": "3D facial image analysis for human identification", "doi": null, "abstractUrl": "/proceedings-article/icpr/1992/00201567/12OmNzl3X0w", "parentPublication": { "id": "proceedings/icpr/1992/2910/0", "title": "1992 11th IAPR International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/07/ttp2013071552", "title": "3D Facial Landmark Detection under Large Yaw and Expression Variations", "doi": null, "abstractUrl": "/journal/tp/2013/07/ttp2013071552/13rRUILc8gj", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2006/11/i1858", "title": "Three-Dimensional Face Recognition Using Shapes of Facial Curves", "doi": null, "abstractUrl": "/journal/tp/2006/11/i1858/13rRUwkxc6y", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2013/09/ttp2013092270", "title": "3D Face Recognition under Expressions, Occlusions, and Pose Variations", "doi": null, "abstractUrl": "/journal/tp/2013/09/ttp2013092270/13rRUwvT9hr", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500c097", "title": "Photo-Realistic Facial Texture Transfer", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500c097/18j8PsEFTUs", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyNQSGO", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNwI8c9Y", "doi": "10.1109/CVPR.2007.383185", "title": "A Novel Representation for Riemannian Analysis of Elastic Curves in Rn", "normalizedTitle": "A Novel Representation for Riemannian Analysis of Elastic Curves in Rn", "abstract": "We propose a novel representation of continuous, closed curves in R<sup>n</sup> that is quite efficient for analyzing their shapes. We combine the strengths of two important ideas-elastic shape metric and path-straightening methods - in shape analysis and present a fast algorithm for finding geodesies in shape spaces. The elastic metric allows for optimal matching of features while path-straightening provides geodesies between curves. Efficiency results from the fact that the elastic metric becomes the simple L<sup>2</sup> metric in the proposed representation. We present step-by-step algorithms for computing geodesies in this framework, and demonstrate them with 2-D as well as 3-D examples.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel representation of continuous, closed curves in R<sup>n</sup> that is quite efficient for analyzing their shapes. We combine the strengths of two important ideas-elastic shape metric and path-straightening methods - in shape analysis and present a fast algorithm for finding geodesies in shape spaces. The elastic metric allows for optimal matching of features while path-straightening provides geodesies between curves. Efficiency results from the fact that the elastic metric becomes the simple L<sup>2</sup> metric in the proposed representation. We present step-by-step algorithms for computing geodesies in this framework, and demonstrate them with 2-D as well as 3-D examples.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel representation of continuous, closed curves in Rn that is quite efficient for analyzing their shapes. We combine the strengths of two important ideas-elastic shape metric and path-straightening methods - in shape analysis and present a fast algorithm for finding geodesies in shape spaces. The elastic metric allows for optimal matching of features while path-straightening provides geodesies between curves. Efficiency results from the fact that the elastic metric becomes the simple L2 metric in the proposed representation. We present step-by-step algorithms for computing geodesies in this framework, and demonstrate them with 2-D as well as 3-D examples.", "fno": "04270210", "keywords": [ "Curve Fitting", "Differential Geometry", "Image Processing", "Riemannian Analysis", "Elastic Curves", "Elastic Shape Metric", "Path Straightening Methods", "Shape Analysis", "Geodesics", "Shape", "Geophysics Computing", "Extraterrestrial Measurements", "Mathematics", "Statistical Analysis", "Algorithm Design And Analysis", "Optimal Matching", "Information Geometry", "Performance Evaluation", "Hydrogen" ], "authors": [ { "affiliation": "Department of Electrical Engineering, Florida State University, Tallahassee, FL. joshi@eng.fsu.edu", "fullName": "Shantanu H. Joshi", "givenName": "Shantanu H.", "surname": "Joshi", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Mathematics, Florida State University, Tallahassee, FL. klassen@math.fsu.edu", "fullName": "Eric Klassen", "givenName": "Eric", "surname": "Klassen", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Statistics, Florida State University, Tallahassee, FL. anuj@stat.fsu.edu", "fullName": "Anuj Srivastava", "givenName": "Anuj", "surname": "Srivastava", "__typename": "ArticleAuthorType" }, { "affiliation": "ARIANA Group, INRIA, Sophia Antipolis, France. ian.jermyn@sophia.inria.fr", "fullName": "Ian Jermyn", "givenName": "Ian", "surname": "Jermyn", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2007", "issn": "1063-6919", "isbn": "1-4244-1179-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04270198", "articleId": "12OmNyQ7G7G", "__typename": "AdjacentArticleType" }, "next": { "fno": "04270199", "articleId": "12OmNzwZ6jz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/050O1B01", "title": "Affine-invariant, elastic shape analysis of planar contours", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/050O1B01/12OmNAYGlqZ", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/2/01315138", "title": "Elastic-string models for representation and analysis of planar shapes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315138/12OmNwt5slR", "parentPublication": { "id": "proceedings/cvpr/2004/2158/2", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a865", "title": "Parallel Transport of Deformations in Shape Space of Elastic Surfaces", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a865/12OmNzdGntw", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/07/ttp2011071415", "title": "Shape Analysis of Elastic Curves in Euclidean Spaces", "doi": null, "abstractUrl": "/journal/tp/2011/07/ttp2011071415/13rRUEgs2us", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2012/09/ttp2012091717", "title": "Elastic Geodesic Paths in Shape Space of Parameterized Surfaces", "doi": null, "abstractUrl": "/journal/tp/2012/09/ttp2012091717/13rRUwvBy9Z", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/12/07807327", "title": "Numerical Inversion of SRNF Maps for Elastic Shape Analysis of Genus-Zero Surfaces", "doi": null, "abstractUrl": "/journal/tp/2017/12/07807327/13rRUxCitKG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500c763", "title": "A Riemannian Framework for Analysis of Human Body Surface", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500c763/1B131rXOZDq", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150811", "title": "Simplifying Transformations for a Family of Elastic Metrics on the Space of Surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150811/1lPHs3D1mWk", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900e457", "title": "SrvfRegNet: Elastic Function Registration Using Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900e457/1wzs1uVspPi", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWvHk", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "acronym": "cvpr", "groupId": "1000147", "volume": "2", "displayVolume": "2", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNwt5slR", "doi": "10.1109/CVPR.2004.1315138", "title": "Elastic-string models for representation and analysis of planar shapes", "normalizedTitle": "Elastic-string models for representation and analysis of planar shapes", "abstract": "We develop a new framework for the quantitative analysis of shapes of planar curves. Shapes are modeled on elastic strings that can be bent, stretched or compressed at different rates along the curve. Shapes are treated as elements of a space obtained as the quotient of an infinite-dimensional Riemannian manifold of elastic curves by the action of a reparameterization group. The Riemannian metric encodes the elastic properties of the string and has the property that reparameterizations act by isometrics. The geodesies in shape space are used to quantify shape dissimilarities, interpolate and extrapolate shapes, and align shapes according to their elastic properties. The shape spaces and metrics constructed offer a novel environment for the study of shape statistics and for the investigation and simulation of shape dynamics.", "abstracts": [ { "abstractType": "Regular", "content": "We develop a new framework for the quantitative analysis of shapes of planar curves. Shapes are modeled on elastic strings that can be bent, stretched or compressed at different rates along the curve. Shapes are treated as elements of a space obtained as the quotient of an infinite-dimensional Riemannian manifold of elastic curves by the action of a reparameterization group. The Riemannian metric encodes the elastic properties of the string and has the property that reparameterizations act by isometrics. The geodesies in shape space are used to quantify shape dissimilarities, interpolate and extrapolate shapes, and align shapes according to their elastic properties. The shape spaces and metrics constructed offer a novel environment for the study of shape statistics and for the investigation and simulation of shape dynamics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We develop a new framework for the quantitative analysis of shapes of planar curves. Shapes are modeled on elastic strings that can be bent, stretched or compressed at different rates along the curve. Shapes are treated as elements of a space obtained as the quotient of an infinite-dimensional Riemannian manifold of elastic curves by the action of a reparameterization group. The Riemannian metric encodes the elastic properties of the string and has the property that reparameterizations act by isometrics. The geodesies in shape space are used to quantify shape dissimilarities, interpolate and extrapolate shapes, and align shapes according to their elastic properties. The shape spaces and metrics constructed offer a novel environment for the study of shape statistics and for the investigation and simulation of shape dynamics.", "fno": "01315138", "keywords": [ "Differential Geometry", "Image Representation", "Statistical Analysis", "Object Recognition", "Elastic String Models", "Planar Curve Shapes", "Quantitative Analysis", "Infinite Dimensional Riemannian Manifold", "Riemannian Metric", "Shape Dissimilarities", "Shape", "Infrared Detectors", "Algorithm Design And Analysis", "Deformable Models", "Interpolation", "Mathematics", "Statistical Analysis", "Statistics", "Image Analysis", "Magnetic Resonance Imaging" ], "authors": [ { "affiliation": "Dept. of Math., Florida State Univ., Tallahassee, FL, USA", "fullName": "W. Mio", "givenName": "W.", "surname": "Mio", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "A. Srivastava", "givenName": "A.", "surname": "Srivastava", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-01-01T00:00:00", "pubType": "proceedings", "pages": "II-10-II-15 Vol.2", "year": "2004", "issn": "1063-6919", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01315137", "articleId": "12OmNC4wtwf", "__typename": "AdjacentArticleType" }, "next": { "fno": "01315139", "articleId": "12OmNzaQoJO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/050O1B01", "title": "Affine-invariant, elastic shape analysis of planar contours", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/050O1B01/12OmNAYGlqZ", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2010/6984/0/05540177", "title": "Diffeomorphic sulcal shape analysis for cortical surface registration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2010/05540177/12OmNqOwQCY", "parentPublication": { "id": "proceedings/cvpr/2010/6984/0", "title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270210", "title": "A Novel Representation for Riemannian Analysis of Elastic Curves in Rn", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270210/12OmNwI8c9Y", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457d578", "title": "Template-Based Monocular 3D Recovery of Elastic Shapes Using Lagrangian Multipliers", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d578/12OmNyeECss", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2011/07/ttp2011071415", "title": "Shape Analysis of Elastic Curves in Euclidean Spaces", "doi": null, "abstractUrl": "/journal/tp/2011/07/ttp2011071415/13rRUEgs2us", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2004/03/i0372", "title": "Analysis of Planar Shapes Using Geodesic Paths on Shape Spaces", "doi": null, "abstractUrl": "/journal/tp/2004/03/i0372/13rRUxASuiK", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a471", "title": "Locally-Weighted Elastic Comparison of Planar Shapes", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a471/17D45Xcttm7", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08733104", "title": "Visualization and Outlier Detection for Multivariate Elastic Curve Data", "doi": null, "abstractUrl": "/journal/tg/2020/11/08733104/1aFvqOkRi5G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09626620", "title": "Shape Analysis of Functional Data With Elastic Partial Matching", "doi": null, "abstractUrl": "/journal/tp/2022/12/09626620/1yNcXGwYBfG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVT", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxYbSWO", "doi": "10.1109/CVPR.2014.47", "title": "Bayesian Active Contours with Affine-Invariant, Elastic Shape Prior", "normalizedTitle": "Bayesian Active Contours with Affine-Invariant, Elastic Shape Prior", "abstract": "Active contour, especially in conjunction with prior-shape models, has become an important tool in image segmentation. However, most contour methods use shape priors based on similarity-shape analysis, i.e. analysis that is invariant to rotation, translation, and scale. In practice, the training shapes used for prior-shape models may be collected from viewing angles different from those for the test images and require invariance to a larger class of transformation. Using an elastic, affine-invariant shape modeling of planar curves, we propose an active contour algorithm in which the training and test shapes can be at arbitrary affine transformations, and the resulting segmentation is robust to perspective skews. We construct a shape space of affine-standardized curves and derive a statistical model for capturing class-specific shape variability. The active contour is then driven by the true gradient of a total energy composed of a data term, a smoothing term, and an affine-invariant shape-prior term. This framework is demonstrated using a number of examples involving the segmentation of occluded or noisy images of targets subject to perspective skew.", "abstracts": [ { "abstractType": "Regular", "content": "Active contour, especially in conjunction with prior-shape models, has become an important tool in image segmentation. However, most contour methods use shape priors based on similarity-shape analysis, i.e. analysis that is invariant to rotation, translation, and scale. In practice, the training shapes used for prior-shape models may be collected from viewing angles different from those for the test images and require invariance to a larger class of transformation. Using an elastic, affine-invariant shape modeling of planar curves, we propose an active contour algorithm in which the training and test shapes can be at arbitrary affine transformations, and the resulting segmentation is robust to perspective skews. We construct a shape space of affine-standardized curves and derive a statistical model for capturing class-specific shape variability. The active contour is then driven by the true gradient of a total energy composed of a data term, a smoothing term, and an affine-invariant shape-prior term. This framework is demonstrated using a number of examples involving the segmentation of occluded or noisy images of targets subject to perspective skew.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Active contour, especially in conjunction with prior-shape models, has become an important tool in image segmentation. However, most contour methods use shape priors based on similarity-shape analysis, i.e. analysis that is invariant to rotation, translation, and scale. In practice, the training shapes used for prior-shape models may be collected from viewing angles different from those for the test images and require invariance to a larger class of transformation. Using an elastic, affine-invariant shape modeling of planar curves, we propose an active contour algorithm in which the training and test shapes can be at arbitrary affine transformations, and the resulting segmentation is robust to perspective skews. We construct a shape space of affine-standardized curves and derive a statistical model for capturing class-specific shape variability. The active contour is then driven by the true gradient of a total energy composed of a data term, a smoothing term, and an affine-invariant shape-prior term. This framework is demonstrated using a number of examples involving the segmentation of occluded or noisy images of targets subject to perspective skew.", "fno": "5118a312", "keywords": [ "Shape", "Active Contours", "Algorithms", "Computational Modeling", "Measurement", "Space Vehicles", "Bayes Methods", "Shape Modeling", "Active Contour", "Affine Shape Analysis", "Riemannian Geometry" ], "authors": [ { "affiliation": null, "fullName": "Darshan Bryner", "givenName": "Darshan", "surname": "Bryner", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Anuj Srivastava", "givenName": "Anuj", "surname": "Srivastava", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "312-319", "year": "2014", "issn": "1063-6919", "isbn": "978-1-4799-5118-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5118a304", "articleId": "12OmNAOKnUW", "__typename": "AdjacentArticleType" }, "next": { "fno": "5118a320", "articleId": "12OmNxaNGoW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2012/1226/0/050O1B01", "title": "Affine-invariant, elastic shape analysis of planar contours", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/050O1B01/12OmNAYGlqZ", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgi/2001/1007/0/10070055", "title": "Affine-Invariant Sketch-Based Retrieval of Images", "doi": null, "abstractUrl": "/proceedings-article/cgi/2001/10070055/12OmNBscD0x", "parentPublication": { "id": "proceedings/cgi/2001/1007/0", "title": "Proceedings. Computer Graphics International 2001", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1996/7258/0/72580520", "title": "Affine Invariant Detection: Edges, Active Contours, and Segments", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1996/72580520/12OmNrAMEOC", "parentPublication": { "id": "proceedings/cvpr/1996/7258/0", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1994/6265/1/00576250", "title": "Integral and local affine invariant parameter and application to shape recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576250/12OmNwJPN0w", "parentPublication": { "id": "proceedings/icpr/1994/6265/1", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2004/2127/0/21270217", "title": "Affine Invariant Multiscale Wavelet-Based Shape Matching Algorithm", "doi": null, "abstractUrl": "/proceedings-article/crv/2004/21270217/12OmNx57HRc", "parentPublication": { "id": "proceedings/crv/2004/2127/0", "title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2013/4990/0/4990a375", "title": "Shadow Segmentation in SAS and SAR Using Bayesian Elastic Contours", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2013/4990a375/12OmNxGj9Vp", "parentPublication": { "id": "proceedings/cvprw/2013/4990/0", "title": "2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/11/i1084", "title": "Deformable Contours: Modeling and Extraction", "doi": null, "abstractUrl": "/journal/tp/1995/11/i1084/13rRUB7a11Y", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2006/08/i1352", "title": "Affine-Invariant Geometric Shape Priors for Region-Based Active Contours", "doi": null, "abstractUrl": "/journal/tp/2006/08/i1352/13rRUNvyam4", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1997/10/i1100", "title": "\"Brownian Strings\": Segmenting Images with Stochastically Deformable Contours", "doi": null, "abstractUrl": "/journal/tp/1997/10/i1100/13rRUwInvlU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/05/06626302", "title": "2D Affine and Projective Shape Analysis", "doi": null, "abstractUrl": "/journal/tp/2014/05/06626302/13rRUxDqS9C", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wzs0vrjyWQ", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wzs1uVspPi", "doi": "10.1109/CVPRW53098.2021.00503", "title": "SrvfRegNet: Elastic Function Registration Using Deep Neural Networks", "normalizedTitle": "SrvfRegNet: Elastic Function Registration Using Deep Neural Networks", "abstract": "Registering functions (curves) using time warpings (re-parameterizations) is central to many computer vision and shape analysis solutions. While traditional registration methods minimize penalized-Z_${\\mathbb{L}^2}$_Z norm, the elastic Riemannian metric and square-root velocity functions (SRVFs) have resulted in significant improvements in terms of theory and practical performance. This solution uses the dynamic programming algorithm to minimize the Z_${\\mathbb{L}^2}$_Z norm between SRVFs of given functions. However, the computational cost of this elastic dynamic programming framework &#x2013; O(nT<sup>2</sup>k) &#x2013; where T is the number of time samples along curves, n is the number of curves, and k &#x003C; T is a parameter &#x2013; limits its use in applications involving big data. This paper introduces a deep-learning approach, named SRVF Registration Net or SrvfRegNet to overcome these limitations. SrvfRegNet architecture trains by optimizing the elastic metric-based objective function on the training data and then applies this trained network to the test data to perform fast registration. In case the training and the test data are from different classes, it generalizes to the test data using transfer learning, i.e., retraining of only the last few layers of the network. It achieves the state-of-the-art alignment performance albeit at much reduced computational cost. We demonstrate the efficiency and efficacy of this framework using several standard curve datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Registering functions (curves) using time warpings (re-parameterizations) is central to many computer vision and shape analysis solutions. While traditional registration methods minimize penalized-${\\mathbb{L}^2}$ norm, the elastic Riemannian metric and square-root velocity functions (SRVFs) have resulted in significant improvements in terms of theory and practical performance. This solution uses the dynamic programming algorithm to minimize the ${\\mathbb{L}^2}$ norm between SRVFs of given functions. However, the computational cost of this elastic dynamic programming framework &#x2013; O(nT<sup>2</sup>k) &#x2013; where T is the number of time samples along curves, n is the number of curves, and k &#x003C; T is a parameter &#x2013; limits its use in applications involving big data. This paper introduces a deep-learning approach, named SRVF Registration Net or SrvfRegNet to overcome these limitations. SrvfRegNet architecture trains by optimizing the elastic metric-based objective function on the training data and then applies this trained network to the test data to perform fast registration. In case the training and the test data are from different classes, it generalizes to the test data using transfer learning, i.e., retraining of only the last few layers of the network. It achieves the state-of-the-art alignment performance albeit at much reduced computational cost. We demonstrate the efficiency and efficacy of this framework using several standard curve datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Registering functions (curves) using time warpings (re-parameterizations) is central to many computer vision and shape analysis solutions. While traditional registration methods minimize penalized-- norm, the elastic Riemannian metric and square-root velocity functions (SRVFs) have resulted in significant improvements in terms of theory and practical performance. This solution uses the dynamic programming algorithm to minimize the - norm between SRVFs of given functions. However, the computational cost of this elastic dynamic programming framework – O(nT2k) – where T is the number of time samples along curves, n is the number of curves, and k < T is a parameter – limits its use in applications involving big data. This paper introduces a deep-learning approach, named SRVF Registration Net or SrvfRegNet to overcome these limitations. SrvfRegNet architecture trains by optimizing the elastic metric-based objective function on the training data and then applies this trained network to the test data to perform fast registration. In case the training and the test data are from different classes, it generalizes to the test data using transfer learning, i.e., retraining of only the last few layers of the network. It achieves the state-of-the-art alignment performance albeit at much reduced computational cost. We demonstrate the efficiency and efficacy of this framework using several standard curve datasets.", "fno": "489900e457", "keywords": [], "authors": [ { "affiliation": "Florida State University,Department of Statistics,Tallahassee,FL,USA,32306", "fullName": "Chao Chen", "givenName": "Chao", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Florida State University,Department of Statistics,Tallahassee,FL,USA,32306", "fullName": "Anuj Srivastava", "givenName": "Anuj", "surname": "Srivastava", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "4457-4466", "year": "2021", "issn": null, "isbn": "978-1-6654-4899-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "489900e448", "articleId": "1yXsCa1SzQY", "__typename": "AdjacentArticleType" }, "next": { "fno": "489900e467", "articleId": "1yJYheBZJe0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icinis/2008/3391/0/3391a479", "title": "A New Elastic Registration Algorithm of Medical Image Based on Markov-Gibbs Random Field Model and B-Spline Wavelet", "doi": null, "abstractUrl": "/proceedings-article/icinis/2008/3391a479/12OmNAY79gz", "parentPublication": { "id": "proceedings/icinis/2008/3391/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2007/1179/0/04270013", "title": "Free-Form Nonrigid Image Registration Using Generalized Elastic Nets", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2007/04270013/12OmNApLGqW", "parentPublication": { "id": "proceedings/cvpr/2007/1179/0", "title": "2007 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2007/2996/0/29960305", "title": "Multiresolution Elastic Medical Image Registration in Standard Intensity Scale", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2007/29960305/12OmNAsk4As", "parentPublication": { "id": "proceedings/sibgrapi/2007/2996/0", "title": "XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isda/2006/2528/2/252820502", "title": "Elastic & Efficient Three-Dimensional Registration for Abdominal Images", "doi": null, "abstractUrl": "/proceedings-article/isda/2006/252820502/12OmNBDgZ3c", "parentPublication": { "id": "proceedings/isda/2006/2528/2", "title": "Intelligent Systems Design and Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/medivis/2006/2603/0/26030015", "title": "Estimation of Internal Body Deformations Using an Elastic Registration Technique", "doi": null, "abstractUrl": "/proceedings-article/medivis/2006/26030015/12OmNBZpH8B", "parentPublication": { "id": "proceedings/medivis/2006/2603/0", "title": "International Conference on Medical Information Visualisation - BioMedical Visualisation (MedVis'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2009/3994/0/05204350", "title": "TIMER: Tensor Image Morphing for Elastic Registration", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2009/05204350/12OmNCfAPxq", "parentPublication": { "id": "proceedings/cvprw/2009/3994/0", "title": "2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437b066", "title": "Fast Dynamic Programming for Elastic Registration of Curves", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b066/12OmNCw3z4V", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmv/2009/3944/0/3944a054", "title": "A Hybrid Particle Swarm Steepest Gradient Algorithm for Elastic Brain Image Registration", "doi": null, "abstractUrl": "/proceedings-article/icmv/2009/3944a054/12OmNx76TTg", "parentPublication": { "id": "proceedings/icmv/2009/3944/0", "title": "Machine Vision, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437a972", "title": "A Statistical Framework for Elastic Shape Analysis of Spatio-Temporal Evolutions of Planar Closed Curves", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437a972/12OmNzgwmPX", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2017/12/07807327", "title": "Numerical Inversion of SRNF Maps for Elastic Shape Analysis of Genus-Zero Surfaces", "doi": null, "abstractUrl": "/journal/tp/2017/12/07807327/13rRUxCitKG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVr", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBSjIU0", "doi": "10.1109/CVPR.2017.397", "title": "Controlling Perceptual Factors in Neural Style Transfer", "normalizedTitle": "Controlling Perceptual Factors in Neural Style Transfer", "abstract": "Neural Style Transfer has shown very exciting results enabling new forms of image manipulation. Here we extend the existing method to introduce control over spatial location, colour information and across spatial scale. We demonstrate how this enhances the method by allowing high-resolution controlled stylisation and helps to alleviate common failure cases such as applying ground textures to sky regions. Furthermore, by decomposing style into these perceptual factors we enable the combination of style information from multiple sources to generate new, perceptually appealing styles from existing ones. We also describe how these methods can be used to more efficiently produce large size, high-quality stylisation. Finally we show how the introduced control measures can be applied in recent methods for Fast Neural Style Transfer.", "abstracts": [ { "abstractType": "Regular", "content": "Neural Style Transfer has shown very exciting results enabling new forms of image manipulation. Here we extend the existing method to introduce control over spatial location, colour information and across spatial scale. We demonstrate how this enhances the method by allowing high-resolution controlled stylisation and helps to alleviate common failure cases such as applying ground textures to sky regions. Furthermore, by decomposing style into these perceptual factors we enable the combination of style information from multiple sources to generate new, perceptually appealing styles from existing ones. We also describe how these methods can be used to more efficiently produce large size, high-quality stylisation. Finally we show how the introduced control measures can be applied in recent methods for Fast Neural Style Transfer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Neural Style Transfer has shown very exciting results enabling new forms of image manipulation. Here we extend the existing method to introduce control over spatial location, colour information and across spatial scale. We demonstrate how this enhances the method by allowing high-resolution controlled stylisation and helps to alleviate common failure cases such as applying ground textures to sky regions. Furthermore, by decomposing style into these perceptual factors we enable the combination of style information from multiple sources to generate new, perceptually appealing styles from existing ones. We also describe how these methods can be used to more efficiently produce large size, high-quality stylisation. Finally we show how the introduced control measures can be applied in recent methods for Fast Neural Style Transfer.", "fno": "0457d730", "keywords": [ "Image Colour Analysis", "Image Resolution", "Image Texture", "Neural Nets", "Image Manipulation", "Spatial Location", "Colour Information", "High Resolution Controlled Stylisation", "High Quality Stylisation", "Fast Neural Style Transfer", "Image Color Analysis", "Painting", "Shape", "Rendering Computer Graphics", "Neurons", "Conferences", "Computer Vision" ], "authors": [ { "affiliation": null, "fullName": "Leon A. Gatys", "givenName": "Leon A.", "surname": "Gatys", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexander S. Ecker", "givenName": "Alexander S.", "surname": "Ecker", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthias Bethge", "givenName": "Matthias", "surname": "Bethge", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aaron Hertzmann", "givenName": "Aaron", "surname": "Hertzmann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eli Shechtman", "givenName": "Eli", "surname": "Shechtman", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "3730-3738", "year": "2017", "issn": "1063-6919", "isbn": "978-1-5386-0457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0457d720", "articleId": "12OmNwwd2H3", "__typename": "AdjacentArticleType" }, "next": { "fno": "0457d739", "articleId": "12OmNzvz6NZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457g997", "title": "Deep Photo Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457g997/12OmNs59JSE", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571370", "title": "Preserving Coherent Illumination in Style Transfer Functions for Volume Rendering", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571370/12OmNwF0BUx", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/02/08640099", "title": "Automatic Color Sketch Generation Using Deep Style Transfer", "doi": null, "abstractUrl": "/magazine/cg/2019/02/08640099/17D45VsBTXm", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i222", "title": "Arbitrary Style Transfer with Deep Feature Reshuffle", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i222/17D45Xbl4Op", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a193", "title": "Two-Stage Color ink Painting Style Transfer via Convolution Neural Network", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a193/17D45XvMcbn", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a009", "title": "MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a009/17D45XwUAKX", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2019/9214/0/921400a066", "title": "Saliency-Guided Image Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmew/2019/921400a066/1cJ0zw9Ceru", "parentPublication": { "id": "proceedings/icmew/2019/9214/0", "title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a805", "title": "Selective Style Transfer for Text", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a805/1h81zIkqfeM", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2191", "title": "Rethinking Style Transfer: From Pixels to Parameterized Brushstrokes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2191/1yeKcTehYzu", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBKmXfs", "title": "2018 13th IAPR International Workshop on Document Analysis Systems (DAS)", "acronym": "das", "groupId": "1002506", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZmZhf", "doi": "10.1109/DAS.2018.78", "title": "Contained Neural Style Transfer for Decorated Logo Generation", "normalizedTitle": "Contained Neural Style Transfer for Decorated Logo Generation", "abstract": "Making decorated logos requires image editing skills, without sufficient skills, it could be a time-consuming task. While there are many on-line web services to make new logos, they have limited designs and duplicates can be made. We propose using neural style transfer with clip art and text for the creation of new and genuine logos. We introduce a new loss function based on distance transform of the input image, which allows the preservation of the silhouettes of text and objects. The proposed method contains style transfer to only a designated area. We demonstrate the characteristics of proposed method. Finally, we show the results of logo generation with various input images.", "abstracts": [ { "abstractType": "Regular", "content": "Making decorated logos requires image editing skills, without sufficient skills, it could be a time-consuming task. While there are many on-line web services to make new logos, they have limited designs and duplicates can be made. We propose using neural style transfer with clip art and text for the creation of new and genuine logos. We introduce a new loss function based on distance transform of the input image, which allows the preservation of the silhouettes of text and objects. The proposed method contains style transfer to only a designated area. We demonstrate the characteristics of proposed method. Finally, we show the results of logo generation with various input images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Making decorated logos requires image editing skills, without sufficient skills, it could be a time-consuming task. While there are many on-line web services to make new logos, they have limited designs and duplicates can be made. We propose using neural style transfer with clip art and text for the creation of new and genuine logos. We introduce a new loss function based on distance transform of the input image, which allows the preservation of the silhouettes of text and objects. The proposed method contains style transfer to only a designated area. We demonstrate the characteristics of proposed method. Finally, we show the results of logo generation with various input images.", "fno": "3346a317", "keywords": [ "Image Processing", "Web Services", "Decorated Logo Generation", "Image Editing Skills", "On Line Web Services", "Neural Style Transfer", "Clip Art", "Genuine Logos", "Transforms", "Shape", "Art", "Gallium Nitride", "Convolutional Neural Networks", "Feature Extraction", "Neural Style Transfer", "Logo Generation", "Convolutional Neural Network" ], "authors": [ { "affiliation": null, "fullName": "Gantugs Atarsaikhan", "givenName": "Gantugs", "surname": "Atarsaikhan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Kenji Iwana", "givenName": "Brian Kenji", "surname": "Iwana", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Seiichi Uchida", "givenName": "Seiichi", "surname": "Uchida", "__typename": "ArticleAuthorType" } ], "idPrefix": "das", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "317-322", "year": "2018", "issn": null, "isbn": "978-1-5386-3346-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3346a311", "articleId": "12OmNx6PiAm", "__typename": "AdjacentArticleType" }, "next": { "fno": "3346a323", "articleId": "12OmNwJPMVy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032b510", "title": "Arbitrary Style Transfer in Real-Time with Adaptive Instance Normalization", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b510/12OmNzkMlWi", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a040", "title": "PairedCycleGAN: Asymmetric Style Transfer for Applying and Removing Makeup", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a040/17D45WnnFWY", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i447", "title": "Separating Style and Content for Generalized Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i447/17D45Xh13uO", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a193", "title": "Two-Stage Color ink Painting Style Transfer via Convolution Neural Network", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a193/17D45XvMcbn", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h824", "title": "Industrial Style Transfer with Large-scale Geometric Warping and Content Preservation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h824/1H1iX5EVaoM", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200a910", "title": "Semantic GAN: Application for Cross-Domain Image Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200a910/1cdOFuQjESA", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2019/5527/0/552700a068", "title": "User Input Based Style Transfer While Retaining Facial Attributes", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2019/552700a068/1fHjJrdShOw", "parentPublication": { "id": "proceedings/bigmm/2019/5527/0", "title": "2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e441", "title": "Controllable Artistic Text Style Transfer via Shape-Matching GAN", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e441/1hVlRglbrk4", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/01/09146781", "title": "A Geometrical Perspective on Image Style Transfer With Adversarial Learning", "doi": null, "abstractUrl": "/journal/tp/2022/01/09146781/1lHjLvQETQI", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09339900", "title": "Shape-Matching GAN++: Scale Controllable Dynamic Artistic Text Style Transfer", "doi": null, "abstractUrl": "/journal/tp/2022/07/09339900/1qL54N4119S", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WaTkkG", "doi": "10.1109/CVPR.2018.00696", "title": "Stereoscopic Neural Style Transfer", "normalizedTitle": "Stereoscopic Neural Style Transfer", "abstract": "This paper presents the first attempt at stereoscopic neural style transfer, which responds to the emerging demand for 3D movies or AR/VR. We start with a careful examination of applying existing monocular style transfer methods to left and right views of stereoscopic images separately. This reveals that the original disparity consistency cannot be well preserved in the final stylization results, which causes 3D fatigue to the viewers. To address this issue, we incorporate a new disparity loss into the widely adopted style loss function by enforcing the bidirectional disparity constraint in non-occluded regions. For a practical realtime solution, we propose the first feed-forward network by jointly training a stylization sub-network and a disparity sub-network, and integrate them in a feature level middle domain. Our disparity sub-network is also the first end-to-end network for simultaneous bidirectional disparity and occlusion mask estimation. Finally, our network is effectively extended to stereoscopic videos, by considering both temporal coherence and disparity consistency. We will show that the proposed method clearly outperforms the baseline algorithms both quantitatively and qualitatively.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents the first attempt at stereoscopic neural style transfer, which responds to the emerging demand for 3D movies or AR/VR. We start with a careful examination of applying existing monocular style transfer methods to left and right views of stereoscopic images separately. This reveals that the original disparity consistency cannot be well preserved in the final stylization results, which causes 3D fatigue to the viewers. To address this issue, we incorporate a new disparity loss into the widely adopted style loss function by enforcing the bidirectional disparity constraint in non-occluded regions. For a practical realtime solution, we propose the first feed-forward network by jointly training a stylization sub-network and a disparity sub-network, and integrate them in a feature level middle domain. Our disparity sub-network is also the first end-to-end network for simultaneous bidirectional disparity and occlusion mask estimation. Finally, our network is effectively extended to stereoscopic videos, by considering both temporal coherence and disparity consistency. We will show that the proposed method clearly outperforms the baseline algorithms both quantitatively and qualitatively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents the first attempt at stereoscopic neural style transfer, which responds to the emerging demand for 3D movies or AR/VR. We start with a careful examination of applying existing monocular style transfer methods to left and right views of stereoscopic images separately. This reveals that the original disparity consistency cannot be well preserved in the final stylization results, which causes 3D fatigue to the viewers. To address this issue, we incorporate a new disparity loss into the widely adopted style loss function by enforcing the bidirectional disparity constraint in non-occluded regions. For a practical realtime solution, we propose the first feed-forward network by jointly training a stylization sub-network and a disparity sub-network, and integrate them in a feature level middle domain. Our disparity sub-network is also the first end-to-end network for simultaneous bidirectional disparity and occlusion mask estimation. Finally, our network is effectively extended to stereoscopic videos, by considering both temporal coherence and disparity consistency. We will show that the proposed method clearly outperforms the baseline algorithms both quantitatively and qualitatively.", "fno": "642000g654", "keywords": [ "Stereo Image Processing", "Video Signal Processing", "Occlusion Mask Estimation", "Stereoscopic Videos", "Temporal Coherence", "Stereoscopic Neural Style Transfer", "Stereoscopic Images", "Original Disparity Consistency", "Disparity Loss", "Widely Adopted Style Loss Function", "Bidirectional Disparity Constraint", "Feed Forward Network", "Stylization Sub Network", "Disparity Sub Network", "End To End Network", "Simultaneous Bidirectional Disparity", "3 D Movies", "AR VR", "3 D Fatigue", "Stereo Image Processing", "Three Dimensional Displays", "Videos", "Fatigue", "Motion Pictures", "Painting", "Optimization" ], "authors": [ { "affiliation": null, "fullName": "Dongdong Chen", "givenName": "Dongdong", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lu Yuan", "givenName": "Lu", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jing Liao", "givenName": "Jing", "surname": "Liao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nenghai Yu", "givenName": "Nenghai", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gang Hua", "givenName": "Gang", "surname": "Hua", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "6654-6663", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000g644", "articleId": "17D45WLdYQH", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000g664", "articleId": "17D45WODaq7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2012/1611/0/06238904", "title": "The measurement of eyestrain caused from diverse binocular disparities, viewing time and display sizes in watching stereoscopic 3D content", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06238904/12OmNqJHFuT", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2012/1611/0/06238901", "title": "Keystone correction for stereoscopic cinematography", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2012/06238901/12OmNylboM1", "parentPublication": { "id": "proceedings/cvprw/2012/1611/0", "title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2016/1552/0/07574680", "title": "Reducing perspective distortion for stereoscopic image stitching", "doi": null, "abstractUrl": "/proceedings-article/icmew/2016/07574680/12OmNzlUKBO", "parentPublication": { "id": "proceedings/icmew/2016/1552/0", "title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/08/06951494", "title": "Pose Estimation and Segmentation of Multiple People in Stereoscopic Movies", "doi": null, "abstractUrl": "/journal/tp/2015/08/06951494/13rRUNvgz5E", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/08/ttg2013081375", "title": "StereoPasting: Interactive Composition in Stereoscopic Images", "doi": null, "abstractUrl": "/journal/tg/2013/08/ttg2013081375/13rRUxC0SWa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a009", "title": "MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a009/17D45XwUAKX", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2022/7218/0/09859510", "title": "Tachiegan: Generative Adversarial Networks for Tachie Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859510/1G4F4aecPqE", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e421", "title": "Content and Style Disentanglement for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e421/1hVlS83UBB6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093478", "title": "Style Transfer for Light Field Photography", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093478/1jPbzdrvv8Y", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2191", "title": "Rethinking Style Transfer: From Pixels to Parameterized Brushstrokes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2191/1yeKcTehYzu", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirI", "title": "2018 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XwUAKX", "doi": "10.1109/CW.2018.00016", "title": "MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks", "normalizedTitle": "MaeSTrO: A Mobile App for Style Transfer Orchestration Using Neural Networks", "abstract": "Mobile expressive rendering gained increasing popularity among users seeking casual creativity by image stylization and supports the development of mobile artists as a new user group. In particular, neural style transfer has advanced as a core technology to emulate characteristics of manifold artistic styles. However, when it comes to creative expression, the technology still faces inherent limitations in providing low-level controls for localized image stylization. This work enhances state-of-the-art neural style transfer techniques by a generalized user interface with interactive tools to facilitate a creative and localized editing process. Thereby, we first propose a problem characterization representing trade-offs between visual quality, run-time performance, and user control. We then present MaeSTrO, a mobile app for orchestration of neural style transfer techniques using iterative, multi-style generative and adaptive neural networks that can be locally controlled by on-screen painting metaphors. At this, first user tests indicate different levels of satisfaction for the implemented techniques and interaction design.", "abstracts": [ { "abstractType": "Regular", "content": "Mobile expressive rendering gained increasing popularity among users seeking casual creativity by image stylization and supports the development of mobile artists as a new user group. In particular, neural style transfer has advanced as a core technology to emulate characteristics of manifold artistic styles. However, when it comes to creative expression, the technology still faces inherent limitations in providing low-level controls for localized image stylization. This work enhances state-of-the-art neural style transfer techniques by a generalized user interface with interactive tools to facilitate a creative and localized editing process. Thereby, we first propose a problem characterization representing trade-offs between visual quality, run-time performance, and user control. We then present MaeSTrO, a mobile app for orchestration of neural style transfer techniques using iterative, multi-style generative and adaptive neural networks that can be locally controlled by on-screen painting metaphors. At this, first user tests indicate different levels of satisfaction for the implemented techniques and interaction design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mobile expressive rendering gained increasing popularity among users seeking casual creativity by image stylization and supports the development of mobile artists as a new user group. In particular, neural style transfer has advanced as a core technology to emulate characteristics of manifold artistic styles. However, when it comes to creative expression, the technology still faces inherent limitations in providing low-level controls for localized image stylization. This work enhances state-of-the-art neural style transfer techniques by a generalized user interface with interactive tools to facilitate a creative and localized editing process. Thereby, we first propose a problem characterization representing trade-offs between visual quality, run-time performance, and user control. We then present MaeSTrO, a mobile app for orchestration of neural style transfer techniques using iterative, multi-style generative and adaptive neural networks that can be locally controlled by on-screen painting metaphors. At this, first user tests indicate different levels of satisfaction for the implemented techniques and interaction design.", "fno": "731500a009", "keywords": [ "Neural Networks", "Rendering Computer Graphics", "Tools", "Creativity", "Adaptive Systems", "Painting", "Mobile Handsets", "Non Photorealistic Rendering", "Style Transfer" ], "authors": [ { "affiliation": null, "fullName": "Max Reimann", "givenName": "Max", "surname": "Reimann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mandy Klingbeil", "givenName": "Mandy", "surname": "Klingbeil", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sebastian Pasewaldt", "givenName": "Sebastian", "surname": "Pasewaldt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Amir Semmo", "givenName": "Amir", "surname": "Semmo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Matthias Trapp", "givenName": "Matthias", "surname": "Trapp", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jürgen Döllner", "givenName": "Jürgen", "surname": "Döllner", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "9-16", "year": "2018", "issn": null, "isbn": "978-1-5386-7315-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "731500a001", "articleId": "17D45WrVgg7", "__typename": "AdjacentArticleType" }, "next": { "fno": "731500a017", "articleId": "17D45VTRonL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/0457d730", "title": "Controlling Perceptual Factors in Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457d730/12OmNBSjIU0", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000g654", "title": "Stereoscopic Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000g654/17D45WaTkkG", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2022/7218/0/09859510", "title": "Tachiegan: Generative Adversarial Networks for Tachie Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859510/1G4F4aecPqE", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g188", "title": "StyleMesh: Style Transfer for Indoor 3D Scene Reconstructions", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g188/1H0Njf7XQtO", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e421", "title": "Content and Style Disentanglement for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e421/1hVlS83UBB6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093478", "title": "Style Transfer for Light Field Photography", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093478/1jPbzdrvv8Y", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800b857", "title": "Collaborative Distillation for Ultra-Resolution Universal Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800b857/1m3o3Bu9VPa", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2021/4065/0/406500a001", "title": "Interactive Multi-level Stroke Control for Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cw/2021/406500a001/1yBF2w2CM5q", "parentPublication": { "id": "proceedings/cw/2021/4065/0", "title": "2021 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2191", "title": "Rethinking Style Transfer: From Pixels to Parameterized Brushstrokes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2191/1yeKcTehYzu", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G4EUUmGcrS", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "acronym": "icmew", "groupId": "1801805", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G4F4aecPqE", "doi": "10.1109/ICMEW56448.2022.9859510", "title": "Tachiegan: Generative Adversarial Networks for Tachie Style Transfer", "normalizedTitle": "Tachiegan: Generative Adversarial Networks for Tachie Style Transfer", "abstract": "Tachie painting is an emerging digital portrait art form that shows a character in a standing pose. Automatic generation of a Tachie picture from a real photo would facilitate many creation tasks. However, it is non-trivial to represent Tachie&#x2019;s artistic styles and establish a delicate mapping from the real-world image domain to the Tachie domain. Existing approaches generally suffer from inaccurate style transformation and severe structure distortion when applied to Tachie style transfer. In this paper, we propose the first approach for Tachie stylization of portrait photographs. Based on the unsupervised CycleGAN framework, we design two novel loss functions to emphasize lines and tones in the Tachie style. Furthermore, we design a character-enhanced stylization framework by introducing an auxiliary body mask to better preserve the global body structure. Experiment results demonstrate the robustness and better generation capability of our method in Tachie stylization from photos in a wide range of poses, even trained on a small dataset.", "abstracts": [ { "abstractType": "Regular", "content": "Tachie painting is an emerging digital portrait art form that shows a character in a standing pose. Automatic generation of a Tachie picture from a real photo would facilitate many creation tasks. However, it is non-trivial to represent Tachie&#x2019;s artistic styles and establish a delicate mapping from the real-world image domain to the Tachie domain. Existing approaches generally suffer from inaccurate style transformation and severe structure distortion when applied to Tachie style transfer. In this paper, we propose the first approach for Tachie stylization of portrait photographs. Based on the unsupervised CycleGAN framework, we design two novel loss functions to emphasize lines and tones in the Tachie style. Furthermore, we design a character-enhanced stylization framework by introducing an auxiliary body mask to better preserve the global body structure. Experiment results demonstrate the robustness and better generation capability of our method in Tachie stylization from photos in a wide range of poses, even trained on a small dataset.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tachie painting is an emerging digital portrait art form that shows a character in a standing pose. Automatic generation of a Tachie picture from a real photo would facilitate many creation tasks. However, it is non-trivial to represent Tachie’s artistic styles and establish a delicate mapping from the real-world image domain to the Tachie domain. Existing approaches generally suffer from inaccurate style transformation and severe structure distortion when applied to Tachie style transfer. In this paper, we propose the first approach for Tachie stylization of portrait photographs. Based on the unsupervised CycleGAN framework, we design two novel loss functions to emphasize lines and tones in the Tachie style. Furthermore, we design a character-enhanced stylization framework by introducing an auxiliary body mask to better preserve the global body structure. Experiment results demonstrate the robustness and better generation capability of our method in Tachie stylization from photos in a wide range of poses, even trained on a small dataset.", "fno": "09859510", "keywords": [ "Art", "Feature Extraction", "Image Classification", "Image Colour Analysis", "Image Segmentation", "Learning Artificial Intelligence", "Generative Adversarial Networks", "Tachie Style Transfer", "Tachie Painting", "Emerging Digital Portrait Art Form", "Automatic Generation", "Tachie Picture", "Tachies Artistic Styles", "Real World Image Domain", "Tachie Domain", "Inaccurate Style Transformation", "Tachie Stylization", "Character Enhanced Stylization Framework", "Generation Capability", "Art", "Conferences", "Generative Adversarial Networks", "Distortion", "Robustness", "Task Analysis", "Painting", "Image Stylization", "Tachie Generation", "Image To Image Translation", "Cycle GAN" ], "authors": [ { "affiliation": "University of Science and Technology of China", "fullName": "Zihan Chen", "givenName": "Zihan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China", "fullName": "Xuejin Chen", "givenName": "Xuejin", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmew", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": null, "isbn": "978-1-6654-7218-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09859468", "articleId": "1G4EVpHmSFq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09859525", "articleId": "1G4EYmyrPMc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000h564", "title": "Multi-content GAN for Few-Shot Font Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000h564/17D45WXIkCO", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c165", "title": "Generative Adversarial Style Transfer Networks for Face Aging", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c165/17D45Xcttm9", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a848", "title": "Style and Content Disentanglement in Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a848/18j8FazPuwM", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g363", "title": "DRB-GAN: A Dynamic ResBlock Generative Adversarial Network for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g363/1BmEIaAvaV2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859987", "title": "DunhuangGAN: A Generative Adversarial Network for Dunhuang Mural Art Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859987/1G9E74GJUzK", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a271", "title": "Generative adversarial networks combined with deep feature interpolation for image style transfer", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a271/1HcnaI41tV6", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a694", "title": "Realistic Style-Transfer Generative Adversarial Network With a Weight-Sharing Strategy", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a694/1pP3zTKL8xq", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a451", "title": "Artistic Text Style Transfer based on Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a451/1rvCEvTEN7W", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a063", "title": "Multi-Style Transfer Generative Adversarial Network for Text Images", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a063/1xPsjXkDspq", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2021/4486/0/448600a191", "title": "Image Style Transfer Based on Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2021/448600a191/1yEZnAUl3qg", "parentPublication": { "id": "proceedings/iccnea/2021/4486/0", "title": "2021 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H2petWxAqI", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "acronym": "cost", "groupId": "1847867", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H2po7gfeM0", "doi": "10.1109/CoST57098.2022.00021", "title": "PSTNet: Protectable Style Transfer Network Based on Steganography", "normalizedTitle": "PSTNet: Protectable Style Transfer Network Based on Steganography", "abstract": "Neural style transfer (NST) is a technique based on deep learning that preserves the content of an image and converts its style to a target style. In recent years, NST has been widely used to generate new artworks based on existent styles to promote cultural communication. However, there is little research that considers the protection of copyright during the generation of stylised images. To this end, we propose an end-to-end protectable style transfer network based on steganography, called PSTNet. This network, including a pair of encoder and decoder, takes a content image and copyright information as input. The encoder embeds copyright information directly into the input content image and render the content image in a specific style. When the copyright needs to be verified, only the corresponding decoder can extract copyright information correctly. Furthermore, an elaborated designed noise layer is added between the encoder and decoder to improve the robustness of the copyright protection method. Experiments show that the protectable stylised images generated by PSTNet have significant visual effects and the undetectability of copyright information is proved by steganalysis. In addition, our method is robust enough that the copyright of generated stylised images can still be proved even after spreading on real social networks. We hope this work will raise awareness of the protection of artworks created by NST.", "abstracts": [ { "abstractType": "Regular", "content": "Neural style transfer (NST) is a technique based on deep learning that preserves the content of an image and converts its style to a target style. In recent years, NST has been widely used to generate new artworks based on existent styles to promote cultural communication. However, there is little research that considers the protection of copyright during the generation of stylised images. To this end, we propose an end-to-end protectable style transfer network based on steganography, called PSTNet. This network, including a pair of encoder and decoder, takes a content image and copyright information as input. The encoder embeds copyright information directly into the input content image and render the content image in a specific style. When the copyright needs to be verified, only the corresponding decoder can extract copyright information correctly. Furthermore, an elaborated designed noise layer is added between the encoder and decoder to improve the robustness of the copyright protection method. Experiments show that the protectable stylised images generated by PSTNet have significant visual effects and the undetectability of copyright information is proved by steganalysis. In addition, our method is robust enough that the copyright of generated stylised images can still be proved even after spreading on real social networks. We hope this work will raise awareness of the protection of artworks created by NST.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Neural style transfer (NST) is a technique based on deep learning that preserves the content of an image and converts its style to a target style. In recent years, NST has been widely used to generate new artworks based on existent styles to promote cultural communication. However, there is little research that considers the protection of copyright during the generation of stylised images. To this end, we propose an end-to-end protectable style transfer network based on steganography, called PSTNet. This network, including a pair of encoder and decoder, takes a content image and copyright information as input. The encoder embeds copyright information directly into the input content image and render the content image in a specific style. When the copyright needs to be verified, only the corresponding decoder can extract copyright information correctly. Furthermore, an elaborated designed noise layer is added between the encoder and decoder to improve the robustness of the copyright protection method. Experiments show that the protectable stylised images generated by PSTNet have significant visual effects and the undetectability of copyright information is proved by steganalysis. In addition, our method is robust enough that the copyright of generated stylised images can still be proved even after spreading on real social networks. We hope this work will raise awareness of the protection of artworks created by NST.", "fno": "624800a054", "keywords": [ "Art", "Copy Protection", "Copyright", "Learning Artificial Intelligence", "Security Of Data", "Steganography", "Neural Style Transfer", "NST", "Target Style", "Existent Styles", "End To End Protectable Style Transfer Network", "Called PST Net", "Encoder", "Decoder", "Copyright Information", "Input Content Image", "Specific Style", "Copyright Protection Method", "Protectable Stylised Images", "Generated Stylised Images", "Social Networks", "Deep Learning", "Steganography", "Costs", "Social Networking Online", "Visual Effects", "Robustness", "Decoding", "Neural Style Transfer", "Copyright Protection", "Image Steganography" ], "authors": [ { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Yuliang Xue", "givenName": "Yuliang", "surname": "Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Nan Zhong", "givenName": "Nan", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Zhenxing Qian", "givenName": "Zhenxing", "surname": "Qian", "__typename": "ArticleAuthorType" }, { "affiliation": "Fudan University,School of Computer Science,Shanghai,China", "fullName": "Xinpeng Zhang", "givenName": "Xinpeng", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cost", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "54-59", "year": "2022", "issn": null, "isbn": "978-1-6654-6248-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "624800a049", "articleId": "1H2ps4vFCw0", "__typename": "AdjacentArticleType" }, "next": { "fno": "624800a060", "articleId": "1H2peEDCyhq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200o4860", "title": "Diverse Image Style Transfer via Invertible Cross-Space Mapping", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200o4860/1BmHe6ICekw", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859987", "title": "DunhuangGAN: A Generative Adversarial Network for Dunhuang Mural Art Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859987/1G9E74GJUzK", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300b467", "title": "Attention-Aware Multi-Stroke Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300b467/1gyrAK80fHq", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300e421", "title": "Content and Style Disentanglement for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300e421/1hVlS83UBB6", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900a772", "title": "Chameleon: Image Style Transfer Based on Image Classification Networks", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900a772/1t7mQYEE8cU", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaie/2021/2492/0/249200a058", "title": "Image Arbitrary Style Transfer via Self-Attention Mechanism Based on Feature Fusion", "doi": null, "abstractUrl": "/proceedings-article/icaie/2021/249200a058/1wV1GPEYuOI", "parentPublication": { "id": "proceedings/icaie/2021/2492/0", "title": "2021 2nd International Conference on Artificial Intelligence and Education (ICAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a872", "title": "DualAST: Dual Style-Learning Networks for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a872/1yeKFMpqICs", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a134", "title": "Style-Aware Normalized Loss for Improving Arbitrary Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a134/1yeKiYpMEKI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j377", "title": "In the light of feature distributions: moment matching for Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j377/1yeLk0BAh0c", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1t7mQaZpzb2", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-dss-smartcity", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1t7mQYEE8cU", "doi": "10.1109/HPCC-SmartCity-DSS50907.2020.00101", "title": "Chameleon: Image Style Transfer Based on Image Classification Networks", "normalizedTitle": "Chameleon: Image Style Transfer Based on Image Classification Networks", "abstract": "In recent years, deep neural networks enabled computers to extract features of images; this stimulated interest in image style transfer. Since the first NST algorithm, many schemes are proposed to accelerate the process. Yet, these methods more or less sacrifice the visual quality of the output. In this paper, we analyze two precursive algorithms and generalize the results. We propose an Image Style Transfer method based on Image Classification Networks. With Chameleon, we accelerate the runtime by 11 times and we show that general CNN techniques would improve the stylization process. Our work provides novel insights into the classification capacity of CNNs and demonstrates the potential of NST algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, deep neural networks enabled computers to extract features of images; this stimulated interest in image style transfer. Since the first NST algorithm, many schemes are proposed to accelerate the process. Yet, these methods more or less sacrifice the visual quality of the output. In this paper, we analyze two precursive algorithms and generalize the results. We propose an Image Style Transfer method based on Image Classification Networks. With Chameleon, we accelerate the runtime by 11 times and we show that general CNN techniques would improve the stylization process. Our work provides novel insights into the classification capacity of CNNs and demonstrates the potential of NST algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, deep neural networks enabled computers to extract features of images; this stimulated interest in image style transfer. Since the first NST algorithm, many schemes are proposed to accelerate the process. Yet, these methods more or less sacrifice the visual quality of the output. In this paper, we analyze two precursive algorithms and generalize the results. We propose an Image Style Transfer method based on Image Classification Networks. With Chameleon, we accelerate the runtime by 11 times and we show that general CNN techniques would improve the stylization process. Our work provides novel insights into the classification capacity of CNNs and demonstrates the potential of NST algorithms.", "fno": "764900a772", "keywords": [ "Convolutional Neural Nets", "Feature Extraction", "Image Classification", "Chameleon", "Image Classification", "Deep Neural Networks", "NST Algorithm", "Image Style Transfer", "Feature Extraction", "Visual Quality", "Precursive Algorithm", "CNN", "Stylization Process", "Computers", "Visualization", "Runtime", "High Performance Computing", "Conferences", "Neural Networks", "Feature Extraction", "Neural Style Transfer NST", "Convolutional Neural Networks CNN" ], "authors": [ { "affiliation": "NYU Shanghai USTC,China", "fullName": "Haobo Li", "givenName": "Haobo", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "USTC,School of Computer Science,China", "fullName": "Ratan Dey", "givenName": "Ratan", "surname": "Dey", "__typename": "ArticleAuthorType" }, { "affiliation": "USTC,School of Computer Science,China", "fullName": "Lei Gong", "givenName": "Lei", "surname": "Gong", "__typename": "ArticleAuthorType" }, { "affiliation": "NYU Shanghai USTC,China", "fullName": "Chao Wang", "givenName": "Chao", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "772-777", "year": "2020", "issn": null, "isbn": "978-1-7281-7649-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "764900a764", "articleId": "1t7n3oBS3kY", "__typename": "AdjacentArticleType" }, "next": { "fno": "764900a778", "articleId": "1t7n6pSiIHS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmew/2022/7218/0/09859510", "title": "Tachiegan: Generative Adversarial Networks for Tachie Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859510/1G4F4aecPqE", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a054", "title": "PSTNet: Protectable Style Transfer Network Based on Steganography", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a054/1H2po7gfeM0", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300k0024", "title": "A Content Transformation Block for Image Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300k0024/1gys18YbpRu", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b208", "title": "Exploiting Spatial Relation for Reducing Distortion in Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b208/1uqGDs3tvRC", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a330", "title": "Text Style Transfer With Decorative Elements", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a330/1xPsjQDmj72", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b915", "title": "Manipulating Image Style Transformation via Latent-Space SVM", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b915/1yNieS5e3hS", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a862", "title": "ArtFlow: Unbiased Image Style Transfer via Reversible Neural Flows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a862/1yeKbXV1ijS", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a134", "title": "Style-Aware Normalized Loss for Improving Arbitrary Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a134/1yeKiYpMEKI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j377", "title": "In the light of feature distributions: moment matching for Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j377/1yeLk0BAh0c", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yBEZe3hqyQ", "title": "2021 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yBF2w2CM5q", "doi": "10.1109/CW52790.2021.00009", "title": "Interactive Multi-level Stroke Control for Neural Style Transfer", "normalizedTitle": "Interactive Multi-level Stroke Control for Neural Style Transfer", "abstract": "We present StyleTune, a mobile app for interactive multi-level control of neural style transfers that facilitates creative adjustments of style elements and enables high output fidelity. In contrast to current mobile neural style transfer apps, StyleTune supports users to adjust both the size and orientation of style elements, such as brushstrokes and texture patches, on a global as well as local level. To this end, we propose a novel stroke-adaptive feed-forward style transfer network, that enables control over stroke size and intensity and allows a larger range of edits than current approaches. For additional level-of-control, we propose a network-agnostic method for stroke-orientation adjustment by utilizing the rotation-variance of Convolutional Neural Networks (CNNs). To achieve high output fidelity, we further add a patch-based style transfer method that enables users to obtain output resolutions of more than 20 Megapixel (Mpix). Our approach empowers users to create many novel results that are not possible with current mobile neural style transfer apps.", "abstracts": [ { "abstractType": "Regular", "content": "We present StyleTune, a mobile app for interactive multi-level control of neural style transfers that facilitates creative adjustments of style elements and enables high output fidelity. In contrast to current mobile neural style transfer apps, StyleTune supports users to adjust both the size and orientation of style elements, such as brushstrokes and texture patches, on a global as well as local level. To this end, we propose a novel stroke-adaptive feed-forward style transfer network, that enables control over stroke size and intensity and allows a larger range of edits than current approaches. For additional level-of-control, we propose a network-agnostic method for stroke-orientation adjustment by utilizing the rotation-variance of Convolutional Neural Networks (CNNs). To achieve high output fidelity, we further add a patch-based style transfer method that enables users to obtain output resolutions of more than 20 Megapixel (Mpix). Our approach empowers users to create many novel results that are not possible with current mobile neural style transfer apps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present StyleTune, a mobile app for interactive multi-level control of neural style transfers that facilitates creative adjustments of style elements and enables high output fidelity. In contrast to current mobile neural style transfer apps, StyleTune supports users to adjust both the size and orientation of style elements, such as brushstrokes and texture patches, on a global as well as local level. To this end, we propose a novel stroke-adaptive feed-forward style transfer network, that enables control over stroke size and intensity and allows a larger range of edits than current approaches. For additional level-of-control, we propose a network-agnostic method for stroke-orientation adjustment by utilizing the rotation-variance of Convolutional Neural Networks (CNNs). To achieve high output fidelity, we further add a patch-based style transfer method that enables users to obtain output resolutions of more than 20 Megapixel (Mpix). Our approach empowers users to create many novel results that are not possible with current mobile neural style transfer apps.", "fno": "406500a001", "keywords": [ "Convolutional Neural Nets", "Image Texture", "Mobile Computing", "Rendering Computer Graphics", "Style Tune", "Stroke Adaptive Feed Forward Style", "Stroke Orientation Adjustment", "Convolutional Neural Networks", "Patch Based Style Transfer Method", "Interactive Multilevel Stroke Control", "Neural Style Transfer", "Mobile App", "Creative Adjustments", "Mobile Neural Style", "CN Ns", "Stroke Medical Condition", "Rendering Computer Graphics", "Mobile Applications", "Convolutional Neural Networks", "Neural Style Transfer", "Local Adjustments", "Mobile Devices", "Artistic Rendering", "Interaction" ], "authors": [ { "affiliation": "University of Potsdam,Hasso Plattner Institute,Germany", "fullName": "Max Reimann", "givenName": "Max", "surname": "Reimann", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Potsdam,Hasso Plattner Institute,Germany", "fullName": "Benito Buchheim", "givenName": "Benito", "surname": "Buchheim", "__typename": "ArticleAuthorType" }, { "affiliation": "Digital Masterpieces GmbH,Potsdam,Germany", "fullName": "Amir Semmo", "givenName": "Amir", "surname": "Semmo", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Potsdam,Hasso Plattner Institute,Germany", "fullName": "Jürgen Döllner", "givenName": "Jürgen", "surname": "Döllner", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Potsdam,Hasso Plattner Institute,Germany", "fullName": "Matthias Trapp", "givenName": "Matthias", "surname": "Trapp", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2021", "issn": null, "isbn": "978-1-6654-4065-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "406500z018", "articleId": "1yBF0DGvrhK", "__typename": "AdjacentArticleType" }, "next": { "fno": "406500a009", "articleId": "1yBF45K2HQc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/5/3586f051", "title": "Neural Font Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586f051/12OmNy68ELb", "parentPublication": { "id": "icdar/2017/3586/5", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594985", "title": "DeepAD: A Deep Learning Based Approach to Stroke-Level Abnormality Detection in Handwritten Chinese Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594985/17D45VtKitQ", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i222", "title": "Arbitrary Style Transfer with Deep Feature Reshuffle", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i222/17D45Xbl4Op", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbar/2022/3426/0/342600a060", "title": "A Study on Neural Style Transfer Methods for Images", "doi": null, "abstractUrl": "/proceedings-article/icbar/2022/342600a060/1MIhIwdIc7K", "parentPublication": { "id": "proceedings/icbar/2022/3426/0", "title": "2022 2nd International Conference on Big Data, Artificial Intelligence and Risk Management (ICBAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/4/505404a043", "title": "Text-Based Image Style Transfer and Synthesis", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505404a043/1eLydWnZkK4", "parentPublication": { "id": "icdarw/2019/5054/4", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/visap/2019/5027/0/08900858", "title": "Data Brushes: Interactive Style Transfer for Data Art", "doi": null, "abstractUrl": "/proceedings-article/visap/2019/08900858/1eXazw8NWi4", "parentPublication": { "id": "proceedings/visap/2019/5027/0", "title": "2019 IEEE VIS Arts Program (VISAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300b467", "title": "Attention-Aware Multi-Stroke Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300b467/1gyrAK80fHq", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313127", "title": "Stroke screening data modeling based on openEHR and NINDS Stroke CDE", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313127/1qmfOrN0IQ8", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5684", "title": "Stylized Neural Painting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5684/1yeLwrKTv56", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeIZgayJ68", "doi": "10.1109/CVPR46437.2021.00370", "title": "Learning to Warp for Style Transfer", "normalizedTitle": "Learning to Warp for Style Transfer", "abstract": "Since its inception in 2015, Style Transfer has focused on texturing a content image using an art exemplar. Recently, the geometric changes that artists make have been acknowledged as an important component of style[42], [55], [62], [63]. Our contribution is to propose a neural network that, uniquely, learns a mapping from a 4D array of inter-feature distances to a non-parametric 2D warp field. The system is generic in not being limited by semantic class, a single learned model will suffice; all examples in this paper are output from one model.Our approach combines the benefits of the high speed of Liu et al. [42] with the non-parametric warping of Kim et al. [55]. Furthermore, our system extends the normal NST paradigm: although it can be used with a single exemplar, we also allow two style exemplars: one for texture and another geometry. This supports far greater flexibility in use cases than single exemplars can provide.", "abstracts": [ { "abstractType": "Regular", "content": "Since its inception in 2015, Style Transfer has focused on texturing a content image using an art exemplar. Recently, the geometric changes that artists make have been acknowledged as an important component of style[42], [55], [62], [63]. Our contribution is to propose a neural network that, uniquely, learns a mapping from a 4D array of inter-feature distances to a non-parametric 2D warp field. The system is generic in not being limited by semantic class, a single learned model will suffice; all examples in this paper are output from one model.Our approach combines the benefits of the high speed of Liu et al. [42] with the non-parametric warping of Kim et al. [55]. Furthermore, our system extends the normal NST paradigm: although it can be used with a single exemplar, we also allow two style exemplars: one for texture and another geometry. This supports far greater flexibility in use cases than single exemplars can provide.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Since its inception in 2015, Style Transfer has focused on texturing a content image using an art exemplar. Recently, the geometric changes that artists make have been acknowledged as an important component of style[42], [55], [62], [63]. Our contribution is to propose a neural network that, uniquely, learns a mapping from a 4D array of inter-feature distances to a non-parametric 2D warp field. The system is generic in not being limited by semantic class, a single learned model will suffice; all examples in this paper are output from one model.Our approach combines the benefits of the high speed of Liu et al. [42] with the non-parametric warping of Kim et al. [55]. Furthermore, our system extends the normal NST paradigm: although it can be used with a single exemplar, we also allow two style exemplars: one for texture and another geometry. This supports far greater flexibility in use cases than single exemplars can provide.", "fno": "450900d701", "keywords": [ "Feature Extraction", "Image Texture", "Learning Artificial Intelligence", "Neural Nets", "Geometric Changes", "Neural Network", "Inter Feature Distances", "Semantic Class", "Single Learned Model", "Nonparametric Warping", "Single Exemplar", "Style Exemplars", "Style Transfer", "Texturing", "Content Image", "Nonparametric 2 D Warp Field", "Geometry", "Computer Vision", "Art", "Semantics", "Neural Networks", "Pattern Recognition", "Strain" ], "authors": [ { "affiliation": "University of Bath", "fullName": "Xiao-Chang Liu", "givenName": "Xiao-Chang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bath", "fullName": "Yong-Liang Yang", "givenName": "Yong-Liang", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bath", "fullName": "Peter Hall", "givenName": "Peter", "surname": "Hall", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "3701-3710", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeIZaYXcJ2", "name": "pcvpr202145090-09577906s1-mm_450900d701.zip", "size": "6.51 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09577906s1-mm_450900d701.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900d690", "articleId": "1yeKOdIEBkQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900d711", "articleId": "1yeIcxFg1NK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "mags/mu/2016/04/mmu2016040060", "title": "Example-Based Image Textural Style Transfer", "doi": null, "abstractUrl": "/magazine/mu/2016/04/mmu2016040060/13rRUB6SpXp", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g629", "title": "AdaAttN: Revisit Attention Mechanism in Arbitrary Neural Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g629/1BmL6VIinvi", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8041", "title": "CLIPstyler: Image Style Transfer with a Single Text Condition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8041/1H0KEFdpA2c", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h683", "title": "Pastiche Master: Exemplar-Based High-Resolution Portrait Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h683/1H0NNPChQsM", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600h824", "title": "Industrial Style Transfer with Large-scale Geometric Warping and Content Preservation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600h824/1H1iX5EVaoM", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300f873", "title": "Arbitrary Style Transfer With Style-Attentional Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300f873/1gyrDDIpBW8", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f942", "title": "Multimodal Style Transfer via Graph Cuts", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f942/1hQqvGiUQyk", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a872", "title": "DualAST: Dual Style-Learning Networks for Artistic Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a872/1yeKFMpqICs", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900m2191", "title": "Rethinking Style Transfer: From Pixels to Parameterized Brushstrokes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900m2191/1yeKcTehYzu", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a134", "title": "Style-Aware Normalized Loss for Improving Arbitrary Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a134/1yeKiYpMEKI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeLk0BAh0c", "doi": "10.1109/CVPR46437.2021.00926", "title": "In the light of feature distributions: moment matching for Neural Style Transfer", "normalizedTitle": "In the light of feature distributions: moment matching for Neural Style Transfer", "abstract": "Style transfer aims to render the content of a given image in the graphical/artistic style of another image. The fundamental concept underlying Neural Style Transfer (NST) is to interpret style as a distribution in the feature space of a Convolutional Neural Network, such that a desired style can be achieved by matching its feature distribution. We show that most current implementations of that concept have important theoretical and practical limitations, as they only partially align the feature distributions. We propose a novel approach that matches the distributions more precisely, thus reproducing the desired style more faithfully, while still being computationally efficient. Specifically, we adapt the dual form of Central Moment Discrepancy (CMD), as recently proposed for domain adaptation, to minimize the difference between the target style and the feature distribution of the output image. The dual interpretation of this metric explicitly matches all higher-order centralized moments and is therefore a natural extension of existing NST methods that only take into account the first and second moments. Our experiments confirm that the strong theoretical properties also translate to visually better style transfer, and better disentangle style from semantic image content.", "abstracts": [ { "abstractType": "Regular", "content": "Style transfer aims to render the content of a given image in the graphical/artistic style of another image. The fundamental concept underlying Neural Style Transfer (NST) is to interpret style as a distribution in the feature space of a Convolutional Neural Network, such that a desired style can be achieved by matching its feature distribution. We show that most current implementations of that concept have important theoretical and practical limitations, as they only partially align the feature distributions. We propose a novel approach that matches the distributions more precisely, thus reproducing the desired style more faithfully, while still being computationally efficient. Specifically, we adapt the dual form of Central Moment Discrepancy (CMD), as recently proposed for domain adaptation, to minimize the difference between the target style and the feature distribution of the output image. The dual interpretation of this metric explicitly matches all higher-order centralized moments and is therefore a natural extension of existing NST methods that only take into account the first and second moments. Our experiments confirm that the strong theoretical properties also translate to visually better style transfer, and better disentangle style from semantic image content.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Style transfer aims to render the content of a given image in the graphical/artistic style of another image. The fundamental concept underlying Neural Style Transfer (NST) is to interpret style as a distribution in the feature space of a Convolutional Neural Network, such that a desired style can be achieved by matching its feature distribution. We show that most current implementations of that concept have important theoretical and practical limitations, as they only partially align the feature distributions. We propose a novel approach that matches the distributions more precisely, thus reproducing the desired style more faithfully, while still being computationally efficient. Specifically, we adapt the dual form of Central Moment Discrepancy (CMD), as recently proposed for domain adaptation, to minimize the difference between the target style and the feature distribution of the output image. The dual interpretation of this metric explicitly matches all higher-order centralized moments and is therefore a natural extension of existing NST methods that only take into account the first and second moments. Our experiments confirm that the strong theoretical properties also translate to visually better style transfer, and better disentangle style from semantic image content.", "fno": "450900j377", "keywords": [ "Computer Graphics", "Feature Extraction", "Learning Artificial Intelligence", "Neural Nets", "Feature Distribution", "Moment Matching", "Neural Style Transfer", "Feature Space", "Convolutional Neural Network", "Desired Style", "Target Style", "Disentangle Style", "Semantic Image Content", "NST", "Measurement", "Computer Vision", "Semantics", "Computational Efficiency", "Convolutional Neural Networks", "Pattern Matching" ], "authors": [ { "affiliation": "ETH Zürich,EcoVision Lab, Photogrammetry and Remote Sensing", "fullName": "Nikolai Kalischek", "givenName": "Nikolai", "surname": "Kalischek", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,EcoVision Lab, Photogrammetry and Remote Sensing", "fullName": "Jan D. Wegner", "givenName": "Jan D.", "surname": "Wegner", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,EcoVision Lab, Photogrammetry and Remote Sensing", "fullName": "Konrad Schindler", "givenName": "Konrad", "surname": "Schindler", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "9377-9386", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeLjVYBOuY", "name": "pcvpr202145090-09578819s1-mm_450900j377.zip", "size": "5.8 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578819s1-mm_450900j377.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900j367", "articleId": "1yeI3DSKLa8", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900j387", "articleId": "1yeJVSjdsjK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000i242", "title": "Avatar-Net: Multi-scale Zero-Shot Style Transfer by Feature Decoration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i242/17D45VUZMYV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cost/2022/6248/0/624800a054", "title": "PSTNet: Protectable Style Transfer Network Based on Steganography", "doi": null, "abstractUrl": "/proceedings-article/cost/2022/624800a054/1H2po7gfeM0", "parentPublication": { "id": "proceedings/cost/2022/6248/0", "title": "2022 International Conference on Culture-Oriented Science and Technology (CoST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732370", "title": "Neural Style Transfer: A Review", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732370/1aDQucqBOYU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300f873", "title": "Arbitrary Style Transfer With Style-Attentional Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300f873/1gyrDDIpBW8", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f942", "title": "Multimodal Style Transfer via Graph Cuts", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f942/1hQqvGiUQyk", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0/764900a772", "title": "Chameleon: Image Style Transfer Based on Image Classification Networks", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity/2020/764900a772/1t7mQYEE8cU", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity/2020/7649/0", "title": "2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b915", "title": "Manipulating Image Style Transformation via Latent-Space SVM", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b915/1yNieS5e3hS", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900d701", "title": "Learning to Warp for Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900d701/1yeIZgayJ68", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a862", "title": "ArtFlow: Unbiased Image Style Transfer via Reversible Neural Flows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a862/1yeKbXV1ijS", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a134", "title": "Style-Aware Normalized Loss for Improving Arbitrary Style Transfer", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a134/1yeKiYpMEKI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1HcmNfwzO80", "title": "2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "acronym": "ithings-greencom-cpscom-smartdata-cybermatics", "groupId": "1800308", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Hcn3AosGFa", "doi": "10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00011", "title": "GreenCom 2022 Message from the General and Program Chairs", "normalizedTitle": "GreenCom 2022 Message from the General and Program Chairs", "abstract": "Presents the welcome message from the conference chairs.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the welcome message from the conference chairs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the welcome message from the conference chairs.", "fno": "541700z027", "keywords": [], "authors": [], "idPrefix": "ithings-greencom-cpscom-smartdata-cybermatics", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "27-28", "year": "2022", "issn": null, "isbn": "978-1-6654-5417-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "541700z025", "articleId": "1HcmSyGJUYw", "__typename": "AdjacentArticleType" }, "next": { "fno": "541700z029", "articleId": "1HcmZS4XPdC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/micro/2022/6272/0/627200z022", "title": "Message from the MICRO 2022 Program Chairs", "doi": null, "abstractUrl": "/proceedings-article/micro/2022/627200z022/1HMSDEeqT1m", "parentPublication": { "id": "proceedings/micro/2022/6272/0", "title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micro/2022/6272/0/627200z020", "title": "Message from the MICRO 2022 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/micro/2022/627200z020/1HMSE8OQX2o", "parentPublication": { "id": "proceedings/micro/2022/6272/0", "title": "2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956364", "title": "Forward from the General Chairs", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956364/1IHq83Eu9nq", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09991009", "title": "Welcome: Message from the VIS 2022 General Chairs", "doi": null, "abstractUrl": "/journal/tg/2023/01/09991009/1J9yoQqlFss", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2022/6152/0/615200z016", "title": "Message from the SEAA 2022 Program Co-Chairs", "doi": null, "abstractUrl": "/proceedings-article/seaa/2022/615200z016/1JZ5jTo2trO", "parentPublication": { "id": "proceedings/seaa/2022/6152/0", "title": "2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000z022", "title": "Workshop - REUNS 2022 Chairs Message: MASS 2022", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000z022/1JeEgVs2zok", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000z023", "title": "Workshop - IoTEF 2022 Chairs Message: MASS 2022", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000z023/1JeEn6RzIti", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2022/7679/0/767900z041", "title": "WAAM 2022 Workshop Committee: ISSREW 2022", "doi": null, "abstractUrl": "/proceedings-article/issrew/2022/767900z041/1JqDWfys3iU", "parentPublication": { "id": "proceedings/issrew/2022/7679/0", "title": "2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500z011", "title": "Message from the ISMAR 2022 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500z011/1JrQPtPjwfC", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000z044", "title": "Message from the GreenCom 2019 General and Program Chairs", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000z044/1ehBLDPz4uQ", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J7WyguSL6w", "title": "2022 IEEE VIS Arts Program (VISAP)", "acronym": "visap", "groupId": "9975351", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J7WCxYW9LG", "doi": "10.1109/VISAP57411.2022.00027", "title": "VISAP 2022 Welcome Message", "normalizedTitle": "VISAP 2022 Welcome Message", "abstract": "Presents the welcome message from the conference chairs.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the welcome message from the conference chairs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the welcome message from the conference chairs.", "fno": "636500z007", "keywords": [], "authors": [], "idPrefix": "visap", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "7-7", "year": "2022", "issn": null, "isbn": "978-1-6654-6365-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "636500z005", "articleId": "1J7WynIwbeg", "__typename": "AdjacentArticleType" }, "next": { "fno": "636500z008", "articleId": "1J7WyK1Ju4E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/coins/2022/8356/0/09854977", "title": "Welcome Message from the Chairs", "doi": null, "abstractUrl": "/proceedings-article/coins/2022/09854977/1FWmaPqDFEA", "parentPublication": { "id": "proceedings/coins/2022/8356/0", "title": "2022 IEEE International Conference on Omni-layer Intelligent Systems (COINS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0/541700z027", "title": "GreenCom 2022 Message from the General and Program Chairs", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2022/541700z027/1Hcn3AosGFa", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0", "title": "2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2022/9856/0/985600z025", "title": "Welcome Message from HPCEuropeLatAm 2022", "doi": null, "abstractUrl": "/proceedings-article/cluster/2022/985600z025/1HzBnl8xH9e", "parentPublication": { "id": "proceedings/cluster/2022/9856/0", "title": "2022 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2022/9856/0/985600z031", "title": "Welcome Message from HPCMASPA 2022", "doi": null, "abstractUrl": "/proceedings-article/cluster/2022/985600z031/1HzBpzRz7u8", "parentPublication": { "id": "proceedings/cluster/2022/9856/0", "title": "2022 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2022/9856/0/985600z029", "title": "Welcome Message from REX-IO 2022", "doi": null, "abstractUrl": "/proceedings-article/cluster/2022/985600z029/1HzBqQtBlXW", "parentPublication": { "id": "proceedings/cluster/2022/9856/0", "title": "2022 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09991009", "title": "Welcome: Message from the VIS 2022 General Chairs", "doi": null, "abstractUrl": "/journal/tg/2023/01/09991009/1J9yoQqlFss", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000z022", "title": "Workshop - REUNS 2022 Chairs Message: MASS 2022", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000z022/1JeEgVs2zok", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000z023", "title": "Workshop - IoTEF 2022 Chairs Message: MASS 2022", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000z023/1JeEn6RzIti", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/testvis/2022/9627/0/962700z006", "title": "Welcome from the Organizers: TestVis 2022 Organizers", "doi": null, "abstractUrl": "/proceedings-article/testvis/2022/962700z006/1JgrVo0Flde", "parentPublication": { "id": "proceedings/testvis/2022/9627/0", "title": "2022 First International Workshop on Visualization in Testing of Hardware, Software, and Manufacturing (TestVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2022/7679/0/767900z041", "title": "WAAM 2022 Workshop Committee: ISSREW 2022", "doi": null, "abstractUrl": "/proceedings-article/issrew/2022/767900z041/1JqDWfys3iU", "parentPublication": { "id": "proceedings/issrew/2022/7679/0", "title": "2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1aDSuDp9DuU", "title": "2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "acronym": "percom-workshops", "groupId": "1000552", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1aDSB2kl3qg", "doi": "10.1109/PERCOMW.2019.8730663", "title": "Welcome Message from the General Chairs", "normalizedTitle": "Welcome Message from the General Chairs", "abstract": "Welcome Message from the General Chairs", "abstracts": [ { "abstractType": "Regular", "content": "Welcome Message from the General Chairs", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Welcome Message from the General Chairs", "fno": "08730663", "keywords": [], "authors": [], "idPrefix": "percom-workshops", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1-2", "year": "2019", "issn": null, "isbn": "978-1-5386-9151-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08730735", "articleId": "1aDSKBq2WI0", "__typename": "AdjacentArticleType" }, "next": { "fno": "08730862", "articleId": "1aDSKKUL0tO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1aDSuDp9DuU", "title": "2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "acronym": "percom-workshops", "groupId": "1000552", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1aDSKKUL0tO", "doi": "10.1109/PERCOMW.2019.8730862", "title": "Welcome Message from the General Chairs", "normalizedTitle": "Welcome Message from the General Chairs", "abstract": "Welcome Message from the General Chairs", "abstracts": [ { "abstractType": "Regular", "content": "Welcome Message from the General Chairs", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Welcome Message from the General Chairs", "fno": "08730862", "keywords": [], "authors": [], "idPrefix": "percom-workshops", "isOpenAccess": true, "showRecommendedArticles": false, "showBuyMe": false, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1-2", "year": "2019", "issn": null, "isbn": "978-1-5386-9151-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08730663", "articleId": "1aDSB2kl3qg", "__typename": "AdjacentArticleType" }, "next": { "fno": "08730656", "articleId": "1aDSxmsZbHi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1pLJFgyE7Kw", "title": "2020 IEEE International Conference on Web Services (ICWS)", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pLJJbxhsYw", "doi": "10.1109/ICWS49710.2020.00005", "title": "Welcome Message from Congress 2020 General Chairs", "normalizedTitle": "Welcome Message from Congress 2020 General Chairs", "abstract": "Welcome Message from Congress 2020 General Chairs.", "abstracts": [ { "abstractType": "Regular", "content": "Welcome Message from Congress 2020 General Chairs.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Welcome Message from Congress 2020 General Chairs.", "fno": "878600z018", "keywords": [], "authors": [], "idPrefix": "icws", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "18-19", "year": "2020", "issn": null, "isbn": "978-1-7281-8786-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "878600z017", "articleId": "1pLJGH6DUuk", "__typename": "AdjacentArticleType" }, "next": { "fno": "878600z020", "articleId": "1pLJIRcYts4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/edge/2020/8254/0/825400z010", "title": "IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/edge/2020/825400z010/1pDrgVvZ8Pu", "parentPublication": { "id": "proceedings/edge/2020/8254/0", "title": "2020 IEEE International Conference on Edge Computing (EDGE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edge/2020/8254/0/825400z009", "title": "IEEE 2020 World Congress on Services Message from the General Chair of Congress Symposia", "doi": null, "abstractUrl": "/proceedings-article/edge/2020/825400z009/1pDrhU7lpBu", "parentPublication": { "id": "proceedings/edge/2020/8254/0", "title": "2020 IEEE International Conference on Edge Computing (EDGE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edge/2020/8254/0/825400z012", "title": "IEEE 2020 World Congress on Services Message from the Program Chairs in Chief", "doi": null, "abstractUrl": "/proceedings-article/edge/2020/825400z012/1pDrhn0eLMQ", "parentPublication": { "id": "proceedings/edge/2020/8254/0", "title": "2020 IEEE International Conference on Edge Computing (EDGE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edge/2020/8254/0/825400z014", "title": "IEEE 2020 World Congress on Services Welcome Message from the Women in Services Computing Symposium Chair", "doi": null, "abstractUrl": "/proceedings-article/edge/2020/825400z014/1pDricv0SQw", "parentPublication": { "id": "proceedings/edge/2020/8254/0", "title": "2020 IEEE International Conference on Edge Computing (EDGE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2020/8780/0/878000z018", "title": "Welcome Message from Congress 2020 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/cloud/2020/878000z018/1pF6nzxhKKY", "parentPublication": { "id": "proceedings/cloud/2020/8780/0", "title": "2020 IEEE 13th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2020/8203/0/820300z022", "title": "IEEE 2020 World Congress on Services Welcome Message from Workshops Program Chairs", "doi": null, "abstractUrl": "/proceedings-article/services/2020/820300z022/1pK4MPQINIk", "parentPublication": { "id": "proceedings/services/2020/8203/0", "title": "2020 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2020/8203/0/820300z015", "title": "IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/services/2020/820300z015/1pK4N7d5IWY", "parentPublication": { "id": "proceedings/services/2020/8203/0", "title": "2020 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2020/8203/0/820300z019", "title": "IEEE 2020 World Congress on Services Welcome Message from the Women in Services Computing Symposium Chair", "doi": null, "abstractUrl": "/proceedings-article/services/2020/820300z019/1pK4NWBCF9e", "parentPublication": { "id": "proceedings/services/2020/8203/0", "title": "2020 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/services/2020/8203/0/820300z017", "title": "IEEE 2020 World Congress on Services Message from the Program Chairs in Chief", "doi": null, "abstractUrl": "/proceedings-article/services/2020/820300z017/1pK4OnZUIne", "parentPublication": { "id": "proceedings/services/2020/8203/0", "title": "2020 IEEE World Congress on Services (SERVICES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smds/2020/8777/0/877700z010", "title": "Welcome Message from Congress 2020 General Chairs", "doi": null, "abstractUrl": "/proceedings-article/smds/2020/877700z010/1pP3OiMNxpS", "parentPublication": { "id": "proceedings/smds/2020/8777/0", "title": "2020 IEEE International Conference on Smart Data Services (SMDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxX3uN2", "title": "2014 International Conference on Wireless Communication and Sensor Network", "acronym": "wcsn", "groupId": "1849269", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNz6iOa2", "doi": "10.1109/WCSN.2014.5", "title": "Preface", "normalizedTitle": "Preface", "abstract": "Presents the preface from this conference.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the preface from this conference.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the preface from this conference.", "fno": "7091z013", "keywords": [], "authors": [], "idPrefix": "wcsn", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "xiii-xiii", "year": "2014", "issn": null, "isbn": "978-1-4799-7091-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7091ztoc", "articleId": "12OmNBubOVn", "__typename": "AdjacentArticleType" }, "next": { "fno": "7091z014", "articleId": "12OmNwqx46q", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367z056", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367z056/12OmNzsrwfP", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/reet/2018/8408/0/840800z006", "title": "Workshop Preface", "doi": null, "abstractUrl": "/proceedings-article/reet/2018/840800z006/17D45VTRonX", "parentPublication": { "id": "proceedings/reet/2018/8408/0", "title": "2018 IEEE 8th International Workshop on Requirements Engineering Education and Training (REET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08676391", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2019/05/08676391/18NkhBw6NUY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assp/2021/9883/0/988300z014", "title": "Preface ASSP 2021", "doi": null, "abstractUrl": "/proceedings-article/assp/2021/988300z014/1CakSv8qt56", "parentPublication": { "id": "proceedings/assp/2021/9883/0", "title": "2021 2nd Asia Symposium on Signal Processing (ASSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2022/8308/0/830800z009", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/asap/2022/830800z009/1HxWsX4x4gU", "parentPublication": { "id": "proceedings/asap/2022/8308/0", "title": "2022 IEEE 33rd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09991007", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2023/01/09991007/1J9z8EpCr72", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2020/8278/0/827800z020", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2020/827800z020/1p4ADA72p44", "parentPublication": { "id": "proceedings/icsgea/2020/8278/0", "title": "2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2020/7628/0/762800z012", "title": "Preface SYNASC 2020", "doi": null, "abstractUrl": "/proceedings-article/synasc/2020/762800z012/1rtXBVLW7O8", "parentPublication": { "id": "proceedings/synasc/2020/7628/0", "title": "2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2021/3283/0/328300z007", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/ldav/2021/328300z007/1zdPF0DPWLu", "parentPublication": { "id": "proceedings/ldav/2021/3283/0", "title": "2021 IEEE 11th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631537", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631537/1zmvzHCS3Pa", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Yts", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzsrwfP", "doi": "10.1109/HICSS.2015.5", "title": "Preface", "normalizedTitle": "Preface", "abstract": "Presents the preface to the conference proceedings.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the preface to the conference proceedings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the preface to the conference proceedings.", "fno": "7367z056", "keywords": [], "authors": [], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2015-01-01T00:00:00", "pubType": "proceedings", "pages": "lvi-lvi", "year": "2015", "issn": "1530-1605", "isbn": "978-1-4799-7367-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7367ztoc", "articleId": "12OmNs0TKLC", "__typename": "AdjacentArticleType" }, "next": { "fno": "7367z057", "articleId": "12OmNvjQ8Z0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcsn/2014/7091/0/7091z013", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/wcsn/2014/7091z013/12OmNz6iOa2", "parentPublication": { "id": "proceedings/wcsn/2014/7091/0", "title": "2014 International Conference on Wireless Communication and Sensor Network", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a688", "title": "Preface to 3D Reconstruction and Understanding with Video and Sound", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a688/12OmNzb7ZoX", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08676391", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2019/05/08676391/18NkhBw6NUY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800z033", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800z033/1ByeuDsDcaY", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600z020", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600z020/1CJgoaefHd6", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2022/8308/0/830800z009", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/asap/2022/830800z009/1HxWsX4x4gU", "parentPublication": { "id": "proceedings/asap/2022/8308/0", "title": "2022 IEEE 33rd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09991007", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2023/01/09991007/1J9z8EpCr72", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2019/5527/0/552700z014", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2019/552700z014/1fHjGGw8JUY", "parentPublication": { "id": "proceedings/bigmm/2019/5527/0", "title": "2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaie/2021/2492/0/249200z020", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/icaie/2021/249200z020/1wV1EYb4xRm", "parentPublication": { "id": "proceedings/icaie/2021/2492/0", "title": "2021 2nd International Conference on Artificial Intelligence and Education (ICAIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/models-c/2021/2484/0/248400z447", "title": "Preface for the 2nd Workshop on DevOps at MODELS'21", "doi": null, "abstractUrl": "/proceedings-article/models-c/2021/248400z447/1zutuf5kojS", "parentPublication": { "id": "proceedings/models-c/2021/2484/0", "title": "2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1HxWrZEYvjG", "title": "2022 IEEE 33rd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "acronym": "asap", "groupId": "1000037", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1HxWsX4x4gU", "doi": "10.1109/ASAP54787.2022.00005", "title": "Preface", "normalizedTitle": "Preface", "abstract": "Presents the preface to the conference.", "abstracts": [ { "abstractType": "Regular", "content": "Presents the preface to the conference.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents the preface to the conference.", "fno": "830800z009", "keywords": [], "authors": [], "idPrefix": "asap", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "ix-ix", "year": "2022", "issn": null, "isbn": "978-1-6654-8308-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "830800z005", "articleId": "1HxWuOvB1VC", "__typename": "AdjacentArticleType" }, "next": { "fno": "830800z010", "articleId": "1HxWtfnEXqU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcsn/2014/7091/0/7091z013", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/wcsn/2014/7091z013/12OmNz6iOa2", "parentPublication": { "id": "proceedings/wcsn/2014/7091/0", "title": "2014 International Conference on Wireless Communication and Sensor Network", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367z056", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367z056/12OmNzsrwfP", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/reet/2018/8408/0/840800z006", "title": "Workshop Preface", "doi": null, "abstractUrl": "/proceedings-article/reet/2018/840800z006/17D45VTRonX", "parentPublication": { "id": "proceedings/reet/2018/8408/0", "title": "2018 IEEE 8th International Workshop on Requirements Engineering Education and Training (REET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/05/08676391", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2019/05/08676391/18NkhBw6NUY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assp/2021/9883/0/988300z014", "title": "Preface ASSP 2021", "doi": null, "abstractUrl": "/proceedings-article/assp/2021/988300z014/1CakSv8qt56", "parentPublication": { "id": "proceedings/assp/2021/9883/0", "title": "2021 2nd Asia Symposium on Signal Processing (ASSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09991007", "title": "Preface", "doi": null, "abstractUrl": "/journal/tg/2023/01/09991007/1J9z8EpCr72", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2020/8278/0/827800z020", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2020/827800z020/1p4ADA72p44", "parentPublication": { "id": "proceedings/icsgea/2020/8278/0", "title": "2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2020/7628/0/762800z012", "title": "Preface SYNASC 2020", "doi": null, "abstractUrl": "/proceedings-article/synasc/2020/762800z012/1rtXBVLW7O8", "parentPublication": { "id": "proceedings/synasc/2020/7628/0", "title": "2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2021/3283/0/328300z007", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/ldav/2021/328300z007/1zdPF0DPWLu", "parentPublication": { "id": "proceedings/ldav/2021/3283/0", "title": "2021 IEEE 11th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631537", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631537/1zmvzHCS3Pa", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KxUc17KC2c", "title": "2022 2nd International Conference on Computers and Automation (CompAuto)", "acronym": "compauto", "groupId": "10026852", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KxUfGviB6o", "doi": "10.1109/CompAuto55930.2022.00005", "title": "Preface", "normalizedTitle": "Preface", "abstract": "This proceedings include the conference papers accepted and presented in 2022 2nd International Conference on Computers and Automation (CompAuto 2022) which is held in fully virtual style during August 18-20, 2022.", "abstracts": [ { "abstractType": "Regular", "content": "This proceedings include the conference papers accepted and presented in 2022 2nd International Conference on Computers and Automation (CompAuto 2022) which is held in fully virtual style during August 18-20, 2022.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This proceedings include the conference papers accepted and presented in 2022 2nd International Conference on Computers and Automation (CompAuto 2022) which is held in fully virtual style during August 18-20, 2022.", "fno": "819400z009", "keywords": [], "authors": [], "idPrefix": "compauto", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "ix-ix", "year": "2022", "issn": null, "isbn": "978-1-6654-8194-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "819400z005", "articleId": "1KxUgOBW7Uk", "__typename": "AdjacentArticleType" }, "next": { "fno": "819400z010", "articleId": "1KxUeLyaCZO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/chinacom/2015/8795/0/07497898", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2015/07497898/12OmNCvumS6", "parentPublication": { "id": "proceedings/chinacom/2015/8795/0", "title": "2015 10th International Conference on Communications and Networking in China (ChinaCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2011/0100/0/06158107", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2011/06158107/12OmNy68ENz", "parentPublication": { "id": "proceedings/chinacom/2011/0100/0", "title": "2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2013/1406/0/06694553", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2013/06694553/12OmNzlUKJI", "parentPublication": { "id": "proceedings/chinacom/2013/1406/0", "title": "2013 8th International Conference on Communications and Networking in China (CHINACOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinacom/2012/2698/0/06417436", "title": "Preface", "doi": null, "abstractUrl": "/proceedings-article/chinacom/2012/06417436/12OmNznkKbX", "parentPublication": { "id": "proceedings/chinacom/2012/2698/0", "title": "7th International Conference on Communications and Networking in China", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iseeie/2022/6874/0/687400z013", "title": "Message from the General Chair", "doi": null, "abstractUrl": "/proceedings-article/iseeie/2022/687400z013/1FWmHLCib4I", "parentPublication": { "id": "proceedings/iseeie/2022/6874/0", "title": "2022 International Symposium on Electrical, Electronics and Information Engineering (ISEEIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acie/2022/7973/0/797300z008", "title": "Preface ACIE 2022", "doi": null, "abstractUrl": "/proceedings-article/acie/2022/797300z008/1FiyblG98e4", "parentPublication": { "id": "proceedings/acie/2022/7973/0", "title": "2022 2nd Asia Conference on Information Engineering (ACIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlccim/2022/9858/0/985800z016", "title": "Preface MLCCIM 2022", "doi": null, "abstractUrl": "/proceedings-article/mlccim/2022/985800z016/1IAKuG0TLvW", "parentPublication": { "id": "proceedings/mlccim/2022/9858/0", "title": "2022 International Conference on Machine Learning, Cloud Computing and Intelligent Mining (MLCCIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compauto/2022/8194/0/819400z001", "title": "Proceedings 2022 2nd International Conference on Computers and Automation CompAuto 2022", "doi": null, "abstractUrl": "/proceedings-article/compauto/2022/819400z001/1KxUelPuafm", "parentPublication": { "id": "proceedings/compauto/2022/8194/0", "title": "2022 2nd International Conference on Computers and Automation (CompAuto)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiipcc/2022/6287/0/628700z017", "title": "Preface: AIIPCC 2022", "doi": null, "abstractUrl": "/proceedings-article/aiipcc/2022/628700z017/1LRko5kvgxq", "parentPublication": { "id": "proceedings/aiipcc/2022/6287/0", "title": "2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300z073", "title": "Message from DIKW 2022 Program Chairs", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300z073/1LSPGTEXKDe", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWcH13", "title": "2009 39th IEEE Frontiers in Education Conference", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNBd9T4k", "doi": "10.1109/FIE.2009.5350496", "title": "Discrete Mathematics assessment using learning objectives based on Bloom's taxonomy", "normalizedTitle": "Discrete Mathematics assessment using learning objectives based on Bloom's taxonomy", "abstract": "We have developed grading criteria using learning objectives inspired by Bloom's taxonomy for a two-course Discrete Mathematics sequence. For each topic in the courses we developed a hierarchy of learning objectives where the lower-level objectives correspond to the lower levels of Bloom's taxonomy and the higher-level learning objectives require deeper understanding as in the higher levels of Bloom's taxonomy. The grading system was designed to directly link a student's level of comprehension to his or her grade while maintaining the structure of a more traditional course. The grading system clarifies course expectations, helps students to see clearly where they need improvement, and assesses student's total achievement rather than their rate of achievement. Students are evaluated based on their progress with the learning objectives, primarily through quizzes and exams. Because traditional quizzes and exams are used, the assessment method can be implemented without affecting other instructional strategies. We discuss the benefits and challenges of this system along with modifications that help to address some of the challenges we experienced.", "abstracts": [ { "abstractType": "Regular", "content": "We have developed grading criteria using learning objectives inspired by Bloom's taxonomy for a two-course Discrete Mathematics sequence. For each topic in the courses we developed a hierarchy of learning objectives where the lower-level objectives correspond to the lower levels of Bloom's taxonomy and the higher-level learning objectives require deeper understanding as in the higher levels of Bloom's taxonomy. The grading system was designed to directly link a student's level of comprehension to his or her grade while maintaining the structure of a more traditional course. The grading system clarifies course expectations, helps students to see clearly where they need improvement, and assesses student's total achievement rather than their rate of achievement. Students are evaluated based on their progress with the learning objectives, primarily through quizzes and exams. Because traditional quizzes and exams are used, the assessment method can be implemented without affecting other instructional strategies. We discuss the benefits and challenges of this system along with modifications that help to address some of the challenges we experienced.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have developed grading criteria using learning objectives inspired by Bloom's taxonomy for a two-course Discrete Mathematics sequence. For each topic in the courses we developed a hierarchy of learning objectives where the lower-level objectives correspond to the lower levels of Bloom's taxonomy and the higher-level learning objectives require deeper understanding as in the higher levels of Bloom's taxonomy. The grading system was designed to directly link a student's level of comprehension to his or her grade while maintaining the structure of a more traditional course. The grading system clarifies course expectations, helps students to see clearly where they need improvement, and assesses student's total achievement rather than their rate of achievement. Students are evaluated based on their progress with the learning objectives, primarily through quizzes and exams. Because traditional quizzes and exams are used, the assessment method can be implemented without affecting other instructional strategies. We discuss the benefits and challenges of this system along with modifications that help to address some of the challenges we experienced.", "fno": "05350496", "keywords": [ "Instructional Strategies", "Bloom Taxonomy", "Grading Criteria", "Discrete Mathematics Course", "Learning Objective Hierarchy", "Student Comprehension Level", "Quizzes", "Exams" ], "authors": [ { "affiliation": null, "fullName": "T. Highley", "givenName": "T.", "surname": "Highley", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "A.E. Edlin", "givenName": "A.E.", "surname": "Edlin", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-10-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2009", "issn": null, "isbn": "978-1-4244-4715-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05350494", "articleId": "12OmNvHGrxV", "__typename": "AdjacentArticleType" }, "next": { "fno": "05350497", "articleId": "12OmNvjyxv2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2004/8552/0/01408541", "title": "Work in progress - using Bloom's taxonomy as a format for self-evaluation of design education activities", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408541/12OmNAndivX", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344084", "title": "Bloom's taxonomy in software engineering education: A systematic mapping study", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344084/12OmNBTJIHv", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2008/3176/0/3176a224", "title": "Checklist Inspections and Modifications: Applying Bloom's Taxonomy to Categorise Developer Comprehension", "doi": null, "abstractUrl": "/proceedings-article/icpc/2008/3176a224/12OmNBd9T5e", "parentPublication": { "id": "proceedings/icpc/2008/3176/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a391", "title": "Best Practices in WebQuest Design: Stimulating the Higher Levels of Bloom's Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a391/12OmNCeaPUM", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684978", "title": "A systems approach to managing learning based on Bloom's revised taxonomy to support student assessment in PBL", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684978/12OmNCgrD7i", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2004/8552/0/01408515", "title": "Incorporating HCI into the undergraduate curriculum: Bloom's taxonomy meets the CC'01 curricular guidelines", "doi": null, "abstractUrl": "/proceedings-article/fie/2004/01408515/12OmNCm7BCB", "parentPublication": { "id": "proceedings/fie/2004/8552/0", "title": "34th Annual Frontiers in Education, 2004. FIE 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2007/1083/0/04417846", "title": "A Taxonomy for learning, teaching, and assessing Digital Logic Design", "doi": null, "abstractUrl": "/proceedings-article/fie/2007/04417846/12OmNyQYtoE", "parentPublication": { "id": "proceedings/fie/2007/1083/0", "title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cseet/2009/3539/0/3539a232", "title": "Evaluating Software Inspection Cognition Levels Using Bloom's Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/cseet/2009/3539a232/12OmNyaGeIq", "parentPublication": { "id": "proceedings/cseet/2009/3539/0", "title": "Software Engineering Education and Training, Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2017/5920/0/08190523", "title": "”I wish I could rank my exam's challenge level!”: An algorithm of Bloom's taxonomy in teaching CS1", "doi": null, "abstractUrl": "/proceedings-article/fie/2017/08190523/12OmNzTYBOc", "parentPublication": { "id": "proceedings/fie/2017/5920/0", "title": "2017 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2006/0256/0/04116890", "title": "Work in Progress - Using Bloom's Taxonomy as a Format for Self-Evaluation of Design Education Activities II", "doi": null, "abstractUrl": "/proceedings-article/fie/2006/04116890/12OmNzlD9fc", "parentPublication": { "id": "proceedings/fie/2006/0256/0", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOhX1", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNrMZpn1", "doi": "10.1109/ACII.2013.11", "title": "A Preliminary Investigation of the Effect of Social Media on Affective Trust in Customer-Supplier Relationships", "normalizedTitle": "A Preliminary Investigation of the Effect of Social Media on Affective Trust in Customer-Supplier Relationships", "abstract": "We present the preliminary results of an ongoing research aimed at investigating the role of social media in the process of trust building, with particular attention to the case of small-medium enterprises (SME). Our findings show that social media contribute to increase the affective trust more than traditional websites. This result suggests that social media have the potential to enhance the business of SMEs other than large companies, by fostering the affective commitment of customers.", "abstracts": [ { "abstractType": "Regular", "content": "We present the preliminary results of an ongoing research aimed at investigating the role of social media in the process of trust building, with particular attention to the case of small-medium enterprises (SME). Our findings show that social media contribute to increase the affective trust more than traditional websites. This result suggests that social media have the potential to enhance the business of SMEs other than large companies, by fostering the affective commitment of customers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present the preliminary results of an ongoing research aimed at investigating the role of social media in the process of trust building, with particular attention to the case of small-medium enterprises (SME). Our findings show that social media contribute to increase the affective trust more than traditional websites. This result suggests that social media have the potential to enhance the business of SMEs other than large companies, by fostering the affective commitment of customers.", "fno": "5048a025", "keywords": [ "Companies", "Media", "Buildings", "Appraisal", "Facebook", "Interviews", "Analysis Of Variance", "Social Computing", "Affective Trust", "Cognitive Trust", "Social Media", "Empirical Study", "Human Factors" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Univ. of Bari, Bari, Italy", "fullName": "Fabio Calefato", "givenName": "Fabio", "surname": "Calefato", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Univ. of Bari, Bari, Italy", "fullName": "Filippo Lanubile", "givenName": "Filippo", "surname": "Lanubile", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Univ. of Bari, Bari, Italy", "fullName": "Nicole Novielli", "givenName": "Nicole", "surname": "Novielli", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "25-30", "year": "2013", "issn": "2156-8103", "isbn": "978-0-7695-5048-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5048a019", "articleId": "12OmNvwTGBu", "__typename": "AdjacentArticleType" }, "next": { "fno": "5048a031", "articleId": "12OmNzTH13M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670f106", "title": "Examining the Role of Social Media for Social Development: Lessons from Malaysian Soup Kitchens", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670f106/12OmNBpEeXX", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718659", "title": "Online Organization of an Offline Protest: From Social to Traditional Media and Back", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718659/12OmNCdk2T5", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiaiaai/2014/4174/0/06913288", "title": "Preliminary Survey on the Information-Providing Method in the Music Industry According to the Levels of SNS Media", "doi": null, "abstractUrl": "/proceedings-article/iiaiaai/2014/06913288/12OmNwJgAHo", "parentPublication": { "id": "proceedings/iiaiaai/2014/4174/0", "title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/semotion/2016/4169/0/4169a003", "title": "Affective Trust as a Predictor of Successful Collaboration in Distributed Software Projects", "doi": null, "abstractUrl": "/proceedings-article/semotion/2016/4169a003/12OmNyUWQQM", "parentPublication": { "id": "proceedings/semotion/2016/4169/0", "title": "2016 IEEE/ACM 1st International Workshop on Emotional Awareness in Software Engineering (SEmotion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c013", "title": "Mixed Media: Interactions of Social and Traditional Media in Political Decision Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c013/12OmNyv7msG", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv-vis/2008/3271/0/3271a018", "title": "Mixing Emotions, How Physical Discomfort Influences the Affective Appraisal of Virtual Places", "doi": null, "abstractUrl": "/proceedings-article/iv-vis/2008/3271a018/12OmNzwpU2I", "parentPublication": { "id": "proceedings/iv-vis/2008/3271/0", "title": "Visualisation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2017/03/mex2017030080", "title": "Aspect-Based Extraction and Analysis of Affective Knowledge from Social Media Streams", "doi": null, "abstractUrl": "/magazine/ex/2017/03/mex2017030080/13rRUwwJWD0", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2018/7325/0/732500a740", "title": "Social CRM from the Customer Perspective: A Preliminary Analysis of Differences between Brazilian and German Users", "doi": null, "abstractUrl": "/proceedings-article/wi/2018/732500a740/17D45XzbnJi", "parentPublication": { "id": "proceedings/wi/2018/7325/0", "title": "2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09905872", "title": "Affective Learning Objectives for Communicative Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09905872/1H3ZV2tCxTa", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/respect/2021/4905/0/09620658", "title": "Cognitive, Affective, and Politicized Trust in a Community Youth Program: A Participatory Design Research Project", "doi": null, "abstractUrl": "/proceedings-article/respect/2021/09620658/1yXuHAUHE88", "parentPublication": { "id": "proceedings/respect/2021/4905/0", "title": "2021 Conference on Research in Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvkYx8t", "title": "2011 44th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNy7h39O", "doi": "10.1109/HICSS.2011.451", "title": "Towards a Taxonomy of Requirements for Hybrid Products", "normalizedTitle": "Towards a Taxonomy of Requirements for Hybrid Products", "abstract": "In order to differentiate from competitors and to respond to new customer expectations, many organizations develop hybrid products, composed of hardware, software and service elements. Determining the requirements for a hybrid product, however, can be complex. Designers must address the requirements for each of the product elements, as well as the interfaces and interdependencies among them and the service organization. Complexity increases with stakeholder interests associated with each element. As a first st ep towards reducing this complexity, we derive a taxonomy of requirements for hybrid products. We begin by analyzing requirements literature in the three disciplines: hardware, software, and service requirements and synthesize requirements categories from each discipline. Next, we synthesize a taxonomy of requirements for hybrid products, defining and describing each category. We conclude with limitations of our work and directions for future research to refine and utilize the taxonomy.", "abstracts": [ { "abstractType": "Regular", "content": "In order to differentiate from competitors and to respond to new customer expectations, many organizations develop hybrid products, composed of hardware, software and service elements. Determining the requirements for a hybrid product, however, can be complex. Designers must address the requirements for each of the product elements, as well as the interfaces and interdependencies among them and the service organization. Complexity increases with stakeholder interests associated with each element. As a first st ep towards reducing this complexity, we derive a taxonomy of requirements for hybrid products. We begin by analyzing requirements literature in the three disciplines: hardware, software, and service requirements and synthesize requirements categories from each discipline. Next, we synthesize a taxonomy of requirements for hybrid products, defining and describing each category. We conclude with limitations of our work and directions for future research to refine and utilize the taxonomy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to differentiate from competitors and to respond to new customer expectations, many organizations develop hybrid products, composed of hardware, software and service elements. Determining the requirements for a hybrid product, however, can be complex. Designers must address the requirements for each of the product elements, as well as the interfaces and interdependencies among them and the service organization. Complexity increases with stakeholder interests associated with each element. As a first st ep towards reducing this complexity, we derive a taxonomy of requirements for hybrid products. We begin by analyzing requirements literature in the three disciplines: hardware, software, and service requirements and synthesize requirements categories from each discipline. Next, we synthesize a taxonomy of requirements for hybrid products, defining and describing each category. We conclude with limitations of our work and directions for future research to refine and utilize the taxonomy.", "fno": "05718577", "keywords": [ "DP Industry", "Product Development", "Software Engineering", "Requirement Taxonomy", "Hybrid Product Development", "Customer Expectation", "Hardware Element", "Software Element", "Service Element", "Service Organization", "Hardware", "Taxonomy", "Software", "Software Engineering", "Interviews", "Security", "Complexity Theory" ], "authors": [ { "affiliation": null, "fullName": "Alexander Herzfeldt", "givenName": "Alexander", "surname": "Herzfeldt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Robert O. Briggs", "givenName": "Robert O.", "surname": "Briggs", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aaron Read", "givenName": "Aaron", "surname": "Read", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Helmut Krcmar", "givenName": "Helmut", "surname": "Krcmar", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2011-01-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2011", "issn": "1530-1605", "isbn": "978-1-4244-9618-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05718576", "articleId": "12OmNvDI3SL", "__typename": "AdjacentArticleType" }, "next": { "fno": "05718578", "articleId": "12OmNCgJe9Z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/usare/2012/1846/0/06226789", "title": "Towards a usability requirements taxonomy for mobile AAC services", "doi": null, "abstractUrl": "/proceedings-article/usare/2012/06226789/12OmNC3FGbl", "parentPublication": { "id": "proceedings/usare/2012/1846/0", "title": "2012 First International Workshop on Usability and Accessibility Focused Requirements Engineering (UsARE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceccs/1995/7123/0/71230373", "title": "A requirements taxonomy for specifying complex systems", "doi": null, "abstractUrl": "/proceedings-article/iceccs/1995/71230373/12OmNCdBDGr", "parentPublication": { "id": "proceedings/iceccs/1995/7123/0", "title": "Engineering of Complex Computer Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2013/4981/0/4981a424", "title": "Towards a Taxonomy of Programming-Related Difficulties during Maintenance", "doi": null, "abstractUrl": "/proceedings-article/icsm/2013/4981a424/12OmNvDI3Xn", "parentPublication": { "id": "proceedings/icsm/2013/4981/0", "title": "2013 IEEE International Conference on Software Maintenance (ICSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgse/2015/8409/0/8409a071", "title": "Reporting Empirical Evidence in Distributed Software Development: An Extended Taxonomy", "doi": null, "abstractUrl": "/proceedings-article/icgse/2015/8409a071/12OmNvkplfh", "parentPublication": { "id": "proceedings/icgse/2015/8409/0", "title": "2015 IEEE 10th International Conference on Global Software Engineering (ICGSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icre/1994/5480/0/00292388", "title": "Taxonomy for requirements analysis", "doi": null, "abstractUrl": "/proceedings-article/icre/1994/00292388/12OmNx5GU2V", "parentPublication": { "id": "proceedings/icre/1994/5480/0", "title": "Proceedings of IEEE International Conference on Requirements Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-esa/2009/3652/0/3652a283", "title": "Taxonomy of Mobility-Related Requirements", "doi": null, "abstractUrl": "/proceedings-article/i-esa/2009/3652a283/12OmNzlUKLc", "parentPublication": { "id": "proceedings/i-esa/2009/3652/0", "title": "Interoperability for Enterprise Software and Applications China, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/conisoft/2018/6577/0/08645899", "title": "Adapting Bloom&#x0027;s Taxonomy for an Agile Classification of the Complexity of the User Stories in SCRUM", "doi": null, "abstractUrl": "/proceedings-article/conisoft/2018/08645899/17QjJf0qqqZ", "parentPublication": { "id": "proceedings/conisoft/2018/6577/0", "title": "2018 6th International Conference in Software Engineering Research and Innovation (CONISOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/seaa/2019/3421/0/342100a038", "title": "A Taxonomy for Improving Industry-Academia Communication in IoT Vulnerability Management", "doi": null, "abstractUrl": "/proceedings-article/seaa/2019/342100a038/1f8MIKJADTy", "parentPublication": { "id": "proceedings/seaa/2019/3421/0", "title": "2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2020/7438/0/09218194", "title": "Towards a Taxonomy for Eliciting Design-Operation Continuum Requirements of Cyber-Physical Systems", "doi": null, "abstractUrl": "/proceedings-article/re/2020/09218194/1nMQwUmJHqg", "parentPublication": { "id": "proceedings/re/2020/7438/0", "title": "2020 IEEE 28th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/10/09513607", "title": "A Faceted Taxonomy of Requirements Changes in Agile Contexts", "doi": null, "abstractUrl": "/journal/ts/2022/10/09513607/1w2fecAhxKw", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyfdOIP", "title": "Visualisation, International Conference on", "acronym": "iv-vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzwpU2I", "doi": "10.1109/VIS.2008.15", "title": "Mixing Emotions, How Physical Discomfort Influences the Affective Appraisal of Virtual Places", "normalizedTitle": "Mixing Emotions, How Physical Discomfort Influences the Affective Appraisal of Virtual Places", "abstract": "The ambiance in virtual environments is affected by the loss of multimodal information. For many purposes, the affective qualities of a virtual environment require special attention in the modeling process. In order to construct the right ambiance it can be beneficial to engineer the affective appraisal of the virtual environment. However, a userpsilas assessment of the affective qualities of a (virtual) environment is preceded by an internalized appraisal process, which is still relatively unclear. A myriad of factors are known or hypothesized to influence the attributed affective qualities of an environment. We tested if cybersickness, induced by camera movement in the virtual environment, had an effect on the affective appraisal of a virtual cityscape. People experiencing cybersickness rated the environment as less pleasant and more arousing, as compared to people with no symptoms. This implies that the change in affective state that a person experiencing cybersickness undergoes is erroneously attributed to the environment.", "abstracts": [ { "abstractType": "Regular", "content": "The ambiance in virtual environments is affected by the loss of multimodal information. For many purposes, the affective qualities of a virtual environment require special attention in the modeling process. In order to construct the right ambiance it can be beneficial to engineer the affective appraisal of the virtual environment. However, a userpsilas assessment of the affective qualities of a (virtual) environment is preceded by an internalized appraisal process, which is still relatively unclear. A myriad of factors are known or hypothesized to influence the attributed affective qualities of an environment. We tested if cybersickness, induced by camera movement in the virtual environment, had an effect on the affective appraisal of a virtual cityscape. People experiencing cybersickness rated the environment as less pleasant and more arousing, as compared to people with no symptoms. This implies that the change in affective state that a person experiencing cybersickness undergoes is erroneously attributed to the environment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ambiance in virtual environments is affected by the loss of multimodal information. For many purposes, the affective qualities of a virtual environment require special attention in the modeling process. In order to construct the right ambiance it can be beneficial to engineer the affective appraisal of the virtual environment. However, a userpsilas assessment of the affective qualities of a (virtual) environment is preceded by an internalized appraisal process, which is still relatively unclear. A myriad of factors are known or hypothesized to influence the attributed affective qualities of an environment. We tested if cybersickness, induced by camera movement in the virtual environment, had an effect on the affective appraisal of a virtual cityscape. People experiencing cybersickness rated the environment as less pleasant and more arousing, as compared to people with no symptoms. This implies that the change in affective state that a person experiencing cybersickness undergoes is erroneously attributed to the environment.", "fno": "3271a018", "keywords": [ "Environmental Factors", "Psychology", "Social Aspects Of Automation", "Virtual Reality", "Physical Discomfort", "Virtual Place", "Ambiance", "Virtual Environment", "Multimodal Information", "Modeling Process", "Affective Appraisal", "Cybersickness", "Camera Movement", "Virtual Cityscape", "Environmental Psychology", "Appraisal", "Virtual Environment", "Visualization", "Psychology", "Testing", "Buildings", "Architecture", "Mood", "Physics Computing", "Cameras", "Affective Appraisal", "Affective State", "Environmental Psychology", "Cybersickness" ], "authors": [ { "affiliation": null, "fullName": "Joske M. Houtkamp", "givenName": "Joske M.", "surname": "Houtkamp", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Inf. & Comput. Sci., Utrecht Univ., Utrecht", "fullName": "Erik D. van der Spek", "givenName": "Erik D.", "surname": "van der Spek", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "18-22", "year": "2008", "issn": null, "isbn": "978-0-7695-3271-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3271z004", "articleId": "12OmNvnwViX", "__typename": "AdjacentArticleType" }, "next": { "fno": "3271z001", "articleId": "12OmNAYoKop", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icee/2010/3997/0/3997a911", "title": "Analysis of Bank Performance Appraisal Based on the Contingency Theory", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997a911/12OmNs4S8EZ", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2015/9953/0/07344558", "title": "The appraisal equivalence hypothesis: Verifying the domain-independence of a computational model of emotion dynamics", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344558/12OmNvStcMK", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2012/4687/0/4687a899", "title": "Spatial Presence in Virtual Worlds as a Perceptual Emotion: An Expansion on Cognitive Feeling?", "doi": null, "abstractUrl": "/proceedings-article/cisis/2012/4687a899/12OmNwudQS8", "parentPublication": { "id": "proceedings/cisis/2012/4687/0", "title": "2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2008/3435/2/3435b195", "title": "Research on Performance Appraisal Model for Cooperative Manufacturing Project in Virtual Enterprise and its Application", "doi": null, "abstractUrl": "/proceedings-article/iciii/2008/3435b195/12OmNx76TKs", "parentPublication": { "id": "proceedings/iciii/2008/3435/2", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2010/7543/0/05563019", "title": "Appraisal Reputation of Community Resources Based on Sensitive Factors", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2010/05563019/12OmNy2JtbF", "parentPublication": { "id": "proceedings/chinagrid/2010/7543/0", "title": "2010 Fifth Annual ChinaGrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2017/0771/0/08109737", "title": "Cognitive modulation of appraisal variables in the emotion process of autonomous agents", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2017/08109737/12OmNzV70pZ", "parentPublication": { "id": "proceedings/icci*cc/2017/0771/0", "title": "2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492788", "title": "The relationship between age and incidence of cybersickness among immersive environment users", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492788/12OmNzWfoZK", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2018/7744/0/774400a673", "title": "The Relationship Among Cognitive Appraisal, Psychological Control, Social Support and Employment Stress in University Students", "doi": null, "abstractUrl": "/proceedings-article/itme/2018/774400a673/17D45WZZ7CZ", "parentPublication": { "id": "proceedings/itme/2018/7744/0", "title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2022/5725/0/572500a135", "title": "The Design and Development of a Goal-Oriented Framework for Emotional Virtual Humans", "doi": null, "abstractUrl": "/proceedings-article/aivr/2022/572500a135/1KmFfqArfGM", "parentPublication": { "id": "proceedings/aivr/2022/5725/0", "title": "2022 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hcc/2019/4125/0/412500a031", "title": "Appraisal Algorithms for Relevance and Controllability in Human-Robot Collaboration", "doi": null, "abstractUrl": "/proceedings-article/hcc/2019/412500a031/1grQ3fyIQY8", "parentPublication": { "id": "proceedings/hcc/2019/4125/0", "title": "2019 IEEE International Conference on Humanized Computing and Communication (HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiru", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WgziQE", "doi": "10.1109/CVPRW.2018.00209", "title": "Human Perceptions of Sensitive Content in Photos", "normalizedTitle": "Human Perceptions of Sensitive Content in Photos", "abstract": "Before we can obfuscate portions of an image to enhance privacy, we must know what portions are considered sensitive. In this paper, we report results from a study aimed at identifying sensitive content in photos from a human-centered perspective. We collected sensitive photos and/or descriptions of sensitive photos from participants and asked them to identify which elements of the photo made each photo sensitive. Using this information, we propose an initial two-level taxonomy of sensitive content categories. This taxonomy may be useful to privacy researchers, online social network designers, policy makers, computer vision researchers and anyone wishing to identify potentially sensitive content in photos. We conclude by providing insights about how these results may be used to enhance computer vision approaches to protecting image privacy.", "abstracts": [ { "abstractType": "Regular", "content": "Before we can obfuscate portions of an image to enhance privacy, we must know what portions are considered sensitive. In this paper, we report results from a study aimed at identifying sensitive content in photos from a human-centered perspective. We collected sensitive photos and/or descriptions of sensitive photos from participants and asked them to identify which elements of the photo made each photo sensitive. Using this information, we propose an initial two-level taxonomy of sensitive content categories. This taxonomy may be useful to privacy researchers, online social network designers, policy makers, computer vision researchers and anyone wishing to identify potentially sensitive content in photos. We conclude by providing insights about how these results may be used to enhance computer vision approaches to protecting image privacy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Before we can obfuscate portions of an image to enhance privacy, we must know what portions are considered sensitive. In this paper, we report results from a study aimed at identifying sensitive content in photos from a human-centered perspective. We collected sensitive photos and/or descriptions of sensitive photos from participants and asked them to identify which elements of the photo made each photo sensitive. Using this information, we propose an initial two-level taxonomy of sensitive content categories. This taxonomy may be useful to privacy researchers, online social network designers, policy makers, computer vision researchers and anyone wishing to identify potentially sensitive content in photos. We conclude by providing insights about how these results may be used to enhance computer vision approaches to protecting image privacy.", "fno": "610000b671", "keywords": [ "Computer Vision", "Data Protection", "Human Centered Perspective", "Sensitive Content Categories", "Human Perceptions", "Image Privacy Protection", "Sensitive Photo Content Identification", "Computer Vision", "Privacy", "Computer Vision", "Security", "Law", "Interviews", "Taxonomy" ], "authors": [ { "affiliation": null, "fullName": "Yifang Li", "givenName": "Yifang", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wyatt Troutman", "givenName": "Wyatt", "surname": "Troutman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bart P. Knijnenburg", "givenName": "Bart P.", "surname": "Knijnenburg", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kelly Caine", "givenName": "Kelly", "surname": "Caine", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "1671-16716", "year": "2018", "issn": null, "isbn": "978-1-5386-6100-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "610000b661", "articleId": "17D45VsBTZG", "__typename": "AdjacentArticleType" }, "next": { "fno": "610000b678", "articleId": "17D45VsBTWi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmew/2015/7079/0/07169750", "title": "Investigating human behaviors in selecting personal photos to preserve memories", "doi": null, "abstractUrl": "/proceedings-article/icmew/2015/07169750/12OmNCzb9yC", "parentPublication": { "id": "proceedings/icmew/2015/7079/0", "title": "2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2015/7214/0/7214a758", "title": "On Privacy Preserving Partial Image Sharing", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2015/7214a758/12OmNzmclsy", "parentPublication": { "id": "proceedings/icdcs/2015/7214/0", "title": "2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pac/2018/8442/0/844200a010", "title": "PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones", "doi": null, "abstractUrl": "/proceedings-article/pac/2018/844200a010/17D45Vw15vy", "parentPublication": { "id": "proceedings/pac/2018/8442/0", "title": "2018 IEEE Symposium on Privacy-Aware Computing (PAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2018/4388/0/438801b852", "title": "Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2018/438801b852/17D45WrVgbS", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2018/4388/0", "title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500a857", "title": "Novel-View Synthesis of Human Tourist Photos", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500a857/1B12EuWHyow", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d896", "title": "3D Moments from Near-Duplicate Photos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d896/1H1jjbSW0LK", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcat/2022/6090/0/609000a170", "title": "Learning and Preserving Relationship Privacy in Photo Sharing", "doi": null, "abstractUrl": "/proceedings-article/bdcat/2022/609000a170/1Lu4csi6vFC", "parentPublication": { "id": "proceedings/bdcat/2022/6090/0", "title": "2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2020/3497/0/349700a079", "title": "Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings", "doi": null, "abstractUrl": "/proceedings-article/sp/2020/349700a079/1j2LftbomBy", "parentPublication": { "id": "proceedings/sp/2020/3497/0/", "title": "2020 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsn-w/2021/3950/0/395000a085", "title": "Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior", "doi": null, "abstractUrl": "/proceedings-article/dsn-w/2021/395000a085/1vNjAQ1fOQ8", "parentPublication": { "id": "proceedings/dsn-w/2021/3950/0", "title": "2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2023/01/09633176", "title": "&#x201C;Do You Know You Are Tracked by Photos That You Didn&#x2019;t Take&#x201D;: Large-Scale Location-Aware Multi-Party Image Privacy Protection", "doi": null, "abstractUrl": "/journal/tq/2023/01/09633176/1z0u984CtKo", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9VchbY4Mw", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9Wd9IQ4zS", "doi": "10.1109/BIBM52615.2021.9669604", "title": "CCTV: a new network-based methodology for the analysis and visualization of COVID-19 data", "normalizedTitle": "CCTV: a new network-based methodology for the analysis and visualization of COVID-19 data", "abstract": "The novel COVID-19 pandemic has posed unprecedented challenges to the society and the health sector all over the globe. Here, we present a new network-based methodology to analyze COVID-19 data measures and its application on a real dataset. The goal of the methodology is to analyze set of homogeneous datasets (i.e. COVID-19 data in several regions) using a statistical test to find similar/dissimilar dataset, mapping such similarity information on a graph and then using community detection algorithm to visualize and analyze the initial dataset. The methodology and its implementation as R function are publicly available at https://github.com/mmilano87/analyzeC19D. We evaluated diverse Italian COVID-19 data made publicly available by the Italian Protezione Civile Department at https://github.com/pcm-dpc/COVID-19/", "abstracts": [ { "abstractType": "Regular", "content": "The novel COVID-19 pandemic has posed unprecedented challenges to the society and the health sector all over the globe. Here, we present a new network-based methodology to analyze COVID-19 data measures and its application on a real dataset. The goal of the methodology is to analyze set of homogeneous datasets (i.e. COVID-19 data in several regions) using a statistical test to find similar/dissimilar dataset, mapping such similarity information on a graph and then using community detection algorithm to visualize and analyze the initial dataset. The methodology and its implementation as R function are publicly available at https://github.com/mmilano87/analyzeC19D. We evaluated diverse Italian COVID-19 data made publicly available by the Italian Protezione Civile Department at https://github.com/pcm-dpc/COVID-19/", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The novel COVID-19 pandemic has posed unprecedented challenges to the society and the health sector all over the globe. Here, we present a new network-based methodology to analyze COVID-19 data measures and its application on a real dataset. The goal of the methodology is to analyze set of homogeneous datasets (i.e. COVID-19 data in several regions) using a statistical test to find similar/dissimilar dataset, mapping such similarity information on a graph and then using community detection algorithm to visualize and analyze the initial dataset. The methodology and its implementation as R function are publicly available at https://github.com/mmilano87/analyzeC19D. We evaluated diverse Italian COVID-19 data made publicly available by the Italian Protezione Civile Department at https://github.com/pcm-dpc/COVID-19/", "fno": "09669604", "keywords": [ "Closed Circuit Television", "Data Visualisation", "Diseases", "Graph Theory", "Health Care", "Statistical Testing", "Network Based Methodology", "Visualization", "COVID 19 Pandemic", "Homogeneous Datasets", "Italian COVID 19 Data", "Statistical Test", "Health Sector", "CCTV", "Graph", "COVID 19", "Pandemics", "Data Visualization", "Network Analyzers", "Planning", "COVID 19", "Network Analysis", "Community Detection" ], "authors": [ { "affiliation": "University Magna Gracia of Catanzaro,Department of Medical and Surgical Sciences,Catanzaro,Italy", "fullName": "Marianna Milano", "givenName": "Marianna", "surname": "Milano", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "2000-2001", "year": "2021", "issn": null, "isbn": "978-1-6654-0126-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09669317", "articleId": "1A9W9Zfitva", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669765", "articleId": "1A9VYj7rgoU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671740", "title": "Characterizing the Online Discourse in Twitter: Users&#x2019; Reaction to Misinformation around COVID-19 in Twitter", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671740/1A8gH4aXhIc", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a859", "title": "Cross-lingual COVID-19 Fake News Detection", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a859/1AjSWn6rhiU", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2021/2186/0/218600a740", "title": "Diagnose COVID-19 Based on CT Images Using Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/icaice/2021/218600a740/1Et4yH2viuI", "parentPublication": { "id": "proceedings/icaice/2021/2186/0", "title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a965", "title": "COVID-19 Fake News and Misinformation Detection using Transformer Learning", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a965/1KpBBfBvr9K", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068592", "title": "Portuguese Twitter Dataset on COVID-19", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068592/1LKx0Zgn8be", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400b277", "title": "Evaluation of Early Diagnosis of COVID-19 Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400b277/1MrFZNey1eE", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2020/06/09222822", "title": "Data Visualization for the Understanding of COVID-19", "doi": null, "abstractUrl": "/magazine/cs/2020/06/09222822/1nTpVintIu4", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313281", "title": "Consumer Demand Modeling During COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313281/1qmfYzauzf2", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378472", "title": "Toward A Multilingual and Multimodal Data Repository for COVID-19 Disinformation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378472/1s64iSQht4s", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2020/2644/0/264400a001", "title": "Daily Visualization of Statewide COVID-19 Healthcare Data", "doi": null, "abstractUrl": "/proceedings-article/vahc/2020/264400a001/1yhFE04Jzpe", "parentPublication": { "id": "proceedings/vahc/2020/2644/0", "title": "2020 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BN65Acpjck", "title": "2021 3rd International Conference on Sustainable Technologies for Industry 4.0 (STI)", "acronym": "sti", "groupId": "1835744", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BN69ew6m5y", "doi": "10.1109/STI53101.2021.9732576", "title": "Forecasting the COVID-19 Pandemic in Bangladesh Using ARIMA Model", "normalizedTitle": "Forecasting the COVID-19 Pandemic in Bangladesh Using ARIMA Model", "abstract": "The effects of the coronavirus disease in 2019 are visible in every corner of the globe. The public health system is mostly affected, and the economic and social crises are also increasing day by day. Due to the widespread nature and the unavailability of drugs or vaccines for this pandemic, it is urgent to predict the COVID-19 infected cases to handle the situation more efficiently. Time series prediction is a crucial technique of the machine learning domain to deal with the issue. This research aims to predict the number of daily confirmed COVID-19 cases for a successful time. To forecast COVID-19 instances in Bangladesh, we use the Autoregressive Integrated Moving Average (ARIMA) model. The experimental results show that the estimated best models are: ARIMA(3,1,0) with drift, ARIMA(3,1,2) with drift, ARIMA(5,1,0) perform significant predictions on three different kinds of COVID-19 datasets.", "abstracts": [ { "abstractType": "Regular", "content": "The effects of the coronavirus disease in 2019 are visible in every corner of the globe. The public health system is mostly affected, and the economic and social crises are also increasing day by day. Due to the widespread nature and the unavailability of drugs or vaccines for this pandemic, it is urgent to predict the COVID-19 infected cases to handle the situation more efficiently. Time series prediction is a crucial technique of the machine learning domain to deal with the issue. This research aims to predict the number of daily confirmed COVID-19 cases for a successful time. To forecast COVID-19 instances in Bangladesh, we use the Autoregressive Integrated Moving Average (ARIMA) model. The experimental results show that the estimated best models are: ARIMA(3,1,0) with drift, ARIMA(3,1,2) with drift, ARIMA(5,1,0) perform significant predictions on three different kinds of COVID-19 datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The effects of the coronavirus disease in 2019 are visible in every corner of the globe. The public health system is mostly affected, and the economic and social crises are also increasing day by day. Due to the widespread nature and the unavailability of drugs or vaccines for this pandemic, it is urgent to predict the COVID-19 infected cases to handle the situation more efficiently. Time series prediction is a crucial technique of the machine learning domain to deal with the issue. This research aims to predict the number of daily confirmed COVID-19 cases for a successful time. To forecast COVID-19 instances in Bangladesh, we use the Autoregressive Integrated Moving Average (ARIMA) model. The experimental results show that the estimated best models are: ARIMA(3,1,0) with drift, ARIMA(3,1,2) with drift, ARIMA(5,1,0) perform significant predictions on three different kinds of COVID-19 datasets.", "fno": "09732576", "keywords": [ "Autoregressive Moving Average Processes", "Diseases", "Epidemics", "Learning Artificial Intelligence", "Time Series", "COVID 19 Pandemic", "Bangladesh", "ARIMA Model", "Coronavirus Disease", "Public Health System", "Economic Crises", "Social Crises", "Drugs", "Vaccines", "COVID 19 Infected Cases", "Time Series Prediction", "Crucial Technique", "Daily Confirmed COVID 19 Cases", "Successful Time", "COVID 19 Instances", "Autoregressive Integrated Moving Average Model", "Estimated Best Models", "COVID 19 Datasets", "COVID 19", "Economics", "Pandemics", "Time Series Analysis", "Machine Learning", "Predictive Models", "Vaccines", "Akaike Information Criterion", "ARIMA", "COVID 19", "Forecasting", "Time Series" ], "authors": [ { "affiliation": "Patuakhali Science and Technology University,Faculty of Computer Science and Engineering,Bangladesh", "fullName": "Julshan Alam Ratu", "givenName": "Julshan Alam", "surname": "Ratu", "__typename": "ArticleAuthorType" }, { "affiliation": "Patuakhali Science and Technology University,Department of Computer Science and Information Technology,Bangladesh", "fullName": "Md. Abdul Masud", "givenName": "Md. Abdul", "surname": "Masud", "__typename": "ArticleAuthorType" }, { "affiliation": "Patuakhali Science and Technology University,Faculty of Computer Science and Engineering,Bangladesh", "fullName": "Md. Munim Hossain", "givenName": "Md. Munim", "surname": "Hossain", "__typename": "ArticleAuthorType" }, { "affiliation": "Patuakhali Science and Technology University,Department of Computer and Communication Engineering,Bangladesh", "fullName": "Md. Samsuzzaman", "givenName": "Md.", "surname": "Samsuzzaman", "__typename": "ArticleAuthorType" } ], "idPrefix": "sti", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-0007-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09732608", "articleId": "1BN69IzSy9a", "__typename": "AdjacentArticleType" }, "next": { "fno": "09732599", "articleId": "1BN6atH0xJ6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2021/2427/0/242700a893", "title": "Online Partisan Polarization of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a893/1AjSP7vOr1m", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2022/01/09734778", "title": "The COVID-19 High-Performance Computing Consortium", "doi": null, "abstractUrl": "/magazine/cs/2022/01/09734778/1BLn0zdzhIY", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2022/01/09717336", "title": "iTrace: When IOTA Meets COVID-19 Contact Tracing", "doi": null, "abstractUrl": "/magazine/it/2022/01/09717336/1BaW3h0sFLW", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2022/02/09721272", "title": "Unpacking Misinformation Amid the COVID-19 Pandemic: A Mixed Methods Study", "doi": null, "abstractUrl": "/magazine/ic/2022/02/09721272/1Bhz0cZpHOM", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a072", "title": "COVID-19 Pandemic Trend Prediction in America Using ARIMA Model", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a072/1CJfZKrt196", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmss/2022/9685/0/968500a132", "title": "Research on Forecasting of Port Bulk Freight Volume during the COVID-19 Pandemic Based on Time Series Analysis", "doi": null, "abstractUrl": "/proceedings-article/icmss/2022/968500a132/1F8z5VmBtrG", "parentPublication": { "id": "proceedings/icmss/2022/9685/0", "title": "2022 International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a522", "title": "Improving Covid-19 vaccine literacy among undergraduate students in Burkina Faso", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a522/1GvdxMxQBlC", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a965", "title": "COVID-19 Fake News and Misinformation Detection using Transformer Learning", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a965/1KpBBfBvr9K", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313281", "title": "Consumer Demand Modeling During COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313281/1qmfYzauzf2", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400a801", "title": "Time Series Forecasting of COVID-19 Infections in United Arab Emirates using ARIMA", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400a801/1uGYVvi5UQM", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CJfV9MV8RO", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "acronym": "bdicn", "groupId": "1846324", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1CJgvXIeZqg", "doi": "10.1109/BDICN55575.2022.00032", "title": "Global COVID-19 development trend forecast based on machine learning", "normalizedTitle": "Global COVID-19 development trend forecast based on machine learning", "abstract": "The outbreak of COVID-19 not only affects people's health, but also hinders the pace of economic progress of various countries. Our goal was to develop a prediction model based on machine learning, which could be used to predict development trend of COVID-19 in the future. It can provide governments and health authorities with useful information conducive to decision-making. Considering that the propagation of COVID-19 is affected by many factors and a single prediction model lacks all-round monitoring of the data set, the ARIMA-SVM integration model was established by using the global cumulative number of confirmed cases. The individual models of ARIMA and SVM were used to predict the COVID-19 trend. Based on the prediction results of the above prediction model, a new integration forecast model was formed through a combination of weighted weights. Finally, the forecast results of the combined model and the individual model were compared. The prediction performance of models were compared according to Mean Absolute Percentage Error (MAPE). The prediction results showed that the MAPE values of ARIMA model, SVM model and ARIMA-SVM integration model were 15.843%, 1.251%, 1.132% respectively. Compared with the traditional machine learning models ARIMA and SVM, the combined model has reduced the average absolute error percentage by 92.103% and 9.51%, respectively, and can achieve more accurate and reliable COVID-19 trend prediction. It used two single models to complement each other, reduced the systematic error of the prediction model, and significantly improved the prediction effect.", "abstracts": [ { "abstractType": "Regular", "content": "The outbreak of COVID-19 not only affects people's health, but also hinders the pace of economic progress of various countries. Our goal was to develop a prediction model based on machine learning, which could be used to predict development trend of COVID-19 in the future. It can provide governments and health authorities with useful information conducive to decision-making. Considering that the propagation of COVID-19 is affected by many factors and a single prediction model lacks all-round monitoring of the data set, the ARIMA-SVM integration model was established by using the global cumulative number of confirmed cases. The individual models of ARIMA and SVM were used to predict the COVID-19 trend. Based on the prediction results of the above prediction model, a new integration forecast model was formed through a combination of weighted weights. Finally, the forecast results of the combined model and the individual model were compared. The prediction performance of models were compared according to Mean Absolute Percentage Error (MAPE). The prediction results showed that the MAPE values of ARIMA model, SVM model and ARIMA-SVM integration model were 15.843%, 1.251%, 1.132% respectively. Compared with the traditional machine learning models ARIMA and SVM, the combined model has reduced the average absolute error percentage by 92.103% and 9.51%, respectively, and can achieve more accurate and reliable COVID-19 trend prediction. It used two single models to complement each other, reduced the systematic error of the prediction model, and significantly improved the prediction effect.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The outbreak of COVID-19 not only affects people's health, but also hinders the pace of economic progress of various countries. Our goal was to develop a prediction model based on machine learning, which could be used to predict development trend of COVID-19 in the future. It can provide governments and health authorities with useful information conducive to decision-making. Considering that the propagation of COVID-19 is affected by many factors and a single prediction model lacks all-round monitoring of the data set, the ARIMA-SVM integration model was established by using the global cumulative number of confirmed cases. The individual models of ARIMA and SVM were used to predict the COVID-19 trend. Based on the prediction results of the above prediction model, a new integration forecast model was formed through a combination of weighted weights. Finally, the forecast results of the combined model and the individual model were compared. The prediction performance of models were compared according to Mean Absolute Percentage Error (MAPE). The prediction results showed that the MAPE values of ARIMA model, SVM model and ARIMA-SVM integration model were 15.843%, 1.251%, 1.132% respectively. Compared with the traditional machine learning models ARIMA and SVM, the combined model has reduced the average absolute error percentage by 92.103% and 9.51%, respectively, and can achieve more accurate and reliable COVID-19 trend prediction. It used two single models to complement each other, reduced the systematic error of the prediction model, and significantly improved the prediction effect.", "fno": "847600a128", "keywords": [ "Autoregressive Moving Average Processes", "Diseases", "Epidemics", "Learning Artificial Intelligence", "Neural Nets", "Support Vector Machines", "ARIMA SVM Integration Model", "Integration Forecast Model", "Individual Model", "ARIMA Model", "SVM Model", "Traditional Machine Learning Models ARIMA", "Accurate COVID 19 Trend Prediction", "Reliable COVID 19 Trend Prediction", "Single Models", "Prediction Effect", "Global COVID 19 Development Trend Forecast", "Single Prediction Model", "Machine Learning", "Health Authorities", "Decision Making", "Mean Absolute Percentage Error", "COVID 19", "Support Vector Machines", "Systematics", "Computational Modeling", "Machine Learning", "Predictive Models", "Market Research", "COVID 19 Forecast", "Machine Learning", "ARIMA", "SVM", "Integrated Learning" ], "authors": [ { "affiliation": "North University of China,School of Sciences,Taiyuan,China,030051", "fullName": "Yunyun Cheng", "givenName": "Yunyun", "surname": "Cheng", "__typename": "ArticleAuthorType" }, { "affiliation": "North University of China,School of Sciences,Taiyuan,China,030051", "fullName": "Yanping Bai", "givenName": "Yanping", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "North University of China,School of Sciences,Taiyuan,China,030051", "fullName": "Ting Xu", "givenName": "Ting", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "North University of China,School of Sciences,Taiyuan,China,030051", "fullName": "Hongping Hu", "givenName": "Hongping", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdicn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-01-01T00:00:00", "pubType": "proceedings", "pages": "128-131", "year": "2022", "issn": null, "isbn": "978-1-6654-8476-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "847600a124", "articleId": "1CJgdNGmMSs", "__typename": "AdjacentArticleType" }, "next": { "fno": "847600a132", "articleId": "1CJfYKCBrLW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sti/2021/0007/0/09732576", "title": "Forecasting the COVID-19 Pandemic in Bangladesh Using ARIMA Model", "doi": null, "abstractUrl": "/proceedings-article/sti/2021/09732576/1BN69ew6m5y", "parentPublication": { "id": "proceedings/sti/2021/0007/0", "title": "2021 3rd International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718385", "title": "Australian COVID-19 Data Visualisation and Forecast Modelling Performance Analysis", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718385/1BogNwZCjfO", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdicn/2022/8476/0/847600a072", "title": "COVID-19 Pandemic Trend Prediction in America Using ARIMA Model", "doi": null, "abstractUrl": "/proceedings-article/bdicn/2022/847600a072/1CJfZKrt196", "parentPublication": { "id": "proceedings/bdicn/2022/8476/0", "title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100b209", "title": "Estimating the Trend of COVID-19 in Iran Before and After the Start of Vaccination", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100b209/1EpL3rGtmW4", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cacml/2022/8290/0/829000a769", "title": "ST-COVID: a Deep Multi-View Spatio-temporal Model for COVID-19 Forecasting", "doi": null, "abstractUrl": "/proceedings-article/cacml/2022/829000a769/1FY1gkfKdOM", "parentPublication": { "id": "proceedings/cacml/2022/8290/0", "title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2022/9402/0/940200a782", "title": "A Contact Matrix-Based Approach for Predicting COVID-19 Using Influenza Data", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2022/940200a782/1MBEH6O8j3q", "parentPublication": { "id": "proceedings/wi-iat/2022/9402/0", "title": "2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlbdbi/2020/9638/0/963800a040", "title": "Epidemic Case Prediction of COVID-19: Using Regression and Deep based Models", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2020/963800a040/1rxhyL0JCI8", "parentPublication": { "id": "proceedings/mlbdbi/2020/9638/0", "title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msieid/2020/1541/0/154100a243", "title": "Bitcoin price prediction in the time of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/msieid/2020/154100a243/1scHJhhaXfi", "parentPublication": { "id": "proceedings/msieid/2020/1541/0", "title": "2020 Management Science Informatization and Economic Innovation Development Conference (MSIEID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381436", "title": "An Interactive Platform to Track Global COVID-19 Epidemic", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381436/1semEo6YX6w", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cds/2021/0428/0/042800a064", "title": "Data-driven COVID-19 growth prediction", "doi": null, "abstractUrl": "/proceedings-article/cds/2021/042800a064/1uZxwpLhI2c", "parentPublication": { "id": "proceedings/cds/2021/0428/0", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1q0FNEe25KU", "title": "2020 IEEE Workshop on Evaluation and Beyond - Methodological Approaches to Visualization (BELIV)", "acronym": "beliv", "groupId": "1830325", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1q0FOJPYeFG", "doi": "10.1109/BELIV51497.2020.00015", "title": "Understanding User Experience of COVID-19 Maps through Remote Elicitation Interviews", "normalizedTitle": "Understanding User Experience of COVID-19 Maps through Remote Elicitation Interviews", "abstract": "During the coronavirus pandemic, visualizations gained a new level of popularity and meaning for a wider audience. People were bombarded with a wide set of public health visualizations ranging from simple graphs to complex interactive dashboards. In a pandemic setting, where large amounts of the world population are socially distancing themselves, it becomes an urgent need to refine existing user experience evaluation methods for remote settings to understand how people make sense out of COVID-19 related visualizations. When evaluating visualizations aimed towards the general public with vastly different socio-demographic backgrounds and varying levels of technical savviness and data literacy, it is important to understand user feedback beyond aspects such as speed, task accuracy, or usability problems. As a part of this wider evaluation perspective, micro-phenomenology has been used to evaluate static and narrative visualizations to reveal the lived experience in a detailed way. Building upon these studies, we conducted a user study to understand how to employ Elicitation (aka Micro-phenomenological) interviews in remote settings. In a case study, we investigated what experiences the participants had with map-based interactive visualizations. Our findings reveal positive and negative aspects of conducting Elicitation interviews remotely. Our results can inform the process of planning and executing remote Elicitation interviews to evaluate interactive visualizations. In addition, we share recommendations regarding visualization techniques and interaction design about public health data.", "abstracts": [ { "abstractType": "Regular", "content": "During the coronavirus pandemic, visualizations gained a new level of popularity and meaning for a wider audience. People were bombarded with a wide set of public health visualizations ranging from simple graphs to complex interactive dashboards. In a pandemic setting, where large amounts of the world population are socially distancing themselves, it becomes an urgent need to refine existing user experience evaluation methods for remote settings to understand how people make sense out of COVID-19 related visualizations. When evaluating visualizations aimed towards the general public with vastly different socio-demographic backgrounds and varying levels of technical savviness and data literacy, it is important to understand user feedback beyond aspects such as speed, task accuracy, or usability problems. As a part of this wider evaluation perspective, micro-phenomenology has been used to evaluate static and narrative visualizations to reveal the lived experience in a detailed way. Building upon these studies, we conducted a user study to understand how to employ Elicitation (aka Micro-phenomenological) interviews in remote settings. In a case study, we investigated what experiences the participants had with map-based interactive visualizations. Our findings reveal positive and negative aspects of conducting Elicitation interviews remotely. Our results can inform the process of planning and executing remote Elicitation interviews to evaluate interactive visualizations. In addition, we share recommendations regarding visualization techniques and interaction design about public health data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "During the coronavirus pandemic, visualizations gained a new level of popularity and meaning for a wider audience. People were bombarded with a wide set of public health visualizations ranging from simple graphs to complex interactive dashboards. In a pandemic setting, where large amounts of the world population are socially distancing themselves, it becomes an urgent need to refine existing user experience evaluation methods for remote settings to understand how people make sense out of COVID-19 related visualizations. When evaluating visualizations aimed towards the general public with vastly different socio-demographic backgrounds and varying levels of technical savviness and data literacy, it is important to understand user feedback beyond aspects such as speed, task accuracy, or usability problems. As a part of this wider evaluation perspective, micro-phenomenology has been used to evaluate static and narrative visualizations to reveal the lived experience in a detailed way. Building upon these studies, we conducted a user study to understand how to employ Elicitation (aka Micro-phenomenological) interviews in remote settings. In a case study, we investigated what experiences the participants had with map-based interactive visualizations. Our findings reveal positive and negative aspects of conducting Elicitation interviews remotely. Our results can inform the process of planning and executing remote Elicitation interviews to evaluate interactive visualizations. In addition, we share recommendations regarding visualization techniques and interaction design about public health data.", "fno": "964200a065", "keywords": [ "Data Visualisation", "Demography", "Diseases", "Epidemics", "Health Care", "Human Computer Interaction", "Interactive Systems", "Medical Information Systems", "User Experience", "User Interfaces", "COVID 19 Maps", "Remote Elicitation Interviews", "Coronavirus Pandemic", "Public Health Visualizations", "Pandemic Setting", "Existing User Experience Evaluation Methods", "Remote Settings", "COVID 19 Related Visualizations", "Socio Demographic Backgrounds", "Data Literacy", "Microphenomenology", "Map Based Interactive Visualizations", "Elicitation Interviews", "Interaction Design", "Public Health Data", "Narrative Visualization Evaluation", "Static Visualization Evaluation", "Microphenomenological Interview", "Interviews", "Data Visualization", "COVID 19", "Pandemics", "Visualization", "User Experience", "Tools", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Koç University", "fullName": "Damla Çay", "givenName": "Damla", "surname": "Çay", "__typename": "ArticleAuthorType" }, { "affiliation": "Mannheim University of Applied Sciences", "fullName": "Till Nagel", "givenName": "Till", "surname": "Nagel", "__typename": "ArticleAuthorType" }, { "affiliation": "Koç University", "fullName": "Asım Evren Yantaç", "givenName": "Asım Evren", "surname": "Yantaç", "__typename": "ArticleAuthorType" } ], "idPrefix": "beliv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "65-73", "year": "2020", "issn": null, "isbn": "978-1-7281-9642-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1qWLvC6aOnm", "name": "pbeliv202096420-09307749s1-mm_964200a065.zip", "size": "689 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pbeliv202096420-09307749s1-mm_964200a065.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "964200a055", "articleId": "1q0FO09GGNW", "__typename": "AdjacentArticleType" }, "next": { "fno": "964200a074", "articleId": "1q0FOauCWvC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/chase/2022/9342/0/934200a081", "title": "Practices to Improve Teamwork in Software Development During the COVID-19 Pandemic: An Ethnographic Study", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/934200a081/1Eo5KZ1lDYk", "parentPublication": { "id": "proceedings/chase/2022/9342/0", "title": "2022 IEEE/ACM 15th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0/806900a092", "title": "Public Transit Prediction During COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2022/806900a092/1EykIWDqaHe", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2022/8069/0", "title": "2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a411", "title": "Computer Education of the Primary Years Programme Exhibition at International Baccalaureate Schools During the COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a411/1FJ5QeMU7Vm", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2022/5176/0/517600a302", "title": "CovidLens: Visually Understanding the Covid-19 Indicators through the Lens of Mobility Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2022/517600a302/1G89Rob5vC8", "parentPublication": { "id": "proceedings/mdm/2022/5176/0", "title": "2022 23rd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904866", "title": "Visualization Design Practices in a Crisis: Behind the Scenes with COVID-19 Dashboard Creators", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904866/1H2llxba9ws", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2020/06/09222822", "title": "Data Visualization for the Understanding of COVID-19", "doi": null, "abstractUrl": "/magazine/cs/2020/06/09222822/1nTpVintIu4", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a734", "title": "COVID-19 Topic Modeling and Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a734/1rSReeCVw2I", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/pc/2021/02/09444668", "title": "Teaching Tangible Interaction Remotely During COVID-19: Transcending Physical Boundaries", "doi": null, "abstractUrl": "/magazine/pc/2021/02/09444668/1u3mysLcNQk", "parentPublication": { "id": "mags/pc", "title": "IEEE Pervasive Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2020/2644/0/264400a001", "title": "Daily Visualization of Statewide COVID-19 Healthcare Data", "doi": null, "abstractUrl": "/proceedings-article/vahc/2020/264400a001/1yhFE04Jzpe", "parentPublication": { "id": "proceedings/vahc/2020/2644/0", "title": "2020 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2021/2594/0/259400a042", "title": "Research on a Remote and Digital Walking Program During the COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icphds/2021/259400a042/1ymIONTBOU0", "parentPublication": { "id": "proceedings/icphds/2021/2594/0", "title": "2021 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tROFXZKX3q", "title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "acronym": "percom-workshops", "groupId": "1000552", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tRP1sXMaTm", "doi": "10.1109/PerComWorkshops51409.2021.9431064", "title": "Detecting malicious COVID-19 URLs using machine learning techniques", "normalizedTitle": "Detecting malicious COVID-19 URLs using machine learning techniques", "abstract": "Throughout the COVID-19 outbreak, malicious attacks have become more pervasive and damaging than ever. Malicious intruders have been responsible for most of the cybercrimes committed recently and are the cause for a growing number of cyber threats, including identity and IP thefts, financial crimes, and cyber-attacks to critical infrastructures. Machine learning (ML) has proven itself as a prominent field of study over the past decade due to solving highly complex and sophisticated realworld problems. This paper proposes an ML-based classification technique to detect the growing number of malicious URLs, due to the COVID-19 pandemic, which is currently considered a threat to IT users. We have used a large volume of Open Source data and preprocessed it using our developed tool to generate feature vectors and trained the ML model using an apprehensive malicious threat weight. Our ML model has been tested, with and without entropy to forecast the threatening factors of COVID-19 URLs. The empirical evidence proves our methods to be a promising mechanism to mitigate COVID-19 related threats early in the attack lifecycle.", "abstracts": [ { "abstractType": "Regular", "content": "Throughout the COVID-19 outbreak, malicious attacks have become more pervasive and damaging than ever. Malicious intruders have been responsible for most of the cybercrimes committed recently and are the cause for a growing number of cyber threats, including identity and IP thefts, financial crimes, and cyber-attacks to critical infrastructures. Machine learning (ML) has proven itself as a prominent field of study over the past decade due to solving highly complex and sophisticated realworld problems. This paper proposes an ML-based classification technique to detect the growing number of malicious URLs, due to the COVID-19 pandemic, which is currently considered a threat to IT users. We have used a large volume of Open Source data and preprocessed it using our developed tool to generate feature vectors and trained the ML model using an apprehensive malicious threat weight. Our ML model has been tested, with and without entropy to forecast the threatening factors of COVID-19 URLs. The empirical evidence proves our methods to be a promising mechanism to mitigate COVID-19 related threats early in the attack lifecycle.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Throughout the COVID-19 outbreak, malicious attacks have become more pervasive and damaging than ever. Malicious intruders have been responsible for most of the cybercrimes committed recently and are the cause for a growing number of cyber threats, including identity and IP thefts, financial crimes, and cyber-attacks to critical infrastructures. Machine learning (ML) has proven itself as a prominent field of study over the past decade due to solving highly complex and sophisticated realworld problems. This paper proposes an ML-based classification technique to detect the growing number of malicious URLs, due to the COVID-19 pandemic, which is currently considered a threat to IT users. We have used a large volume of Open Source data and preprocessed it using our developed tool to generate feature vectors and trained the ML model using an apprehensive malicious threat weight. Our ML model has been tested, with and without entropy to forecast the threatening factors of COVID-19 URLs. The empirical evidence proves our methods to be a promising mechanism to mitigate COVID-19 related threats early in the attack lifecycle.", "fno": "09431064", "keywords": [ "Computer Crime", "Diseases", "Internet", "Learning Artificial Intelligence", "Financial Crimes", "Cyber Attacks", "Critical Infrastructures", "Machine Learning", "ML Based Classification Technique", "Malicious UR Ls", "COVID 19 Pandemic", "Open Source Data", "ML Model", "COVID 19 Related Threats", "Malicious COVID 19 UR Ls", "COVID 19 Outbreak", "Malicious Attacks", "Malicious Intruders", "Cyber Threats", "COVID 19", "Pervasive Computing", "Solid Modeling", "Pandemics", "Conferences", "Machine Learning", "Tools", "Malware", "Phishing", "UR Ls", "COVID 19", "Entropy", "ML Model" ], "authors": [ { "affiliation": "School of Computing and Mathematics, Charles Sturt University,Australia", "fullName": "Jamil Ispahany", "givenName": "Jamil", "surname": "Ispahany", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing and Mathematics, Charles Sturt University,Australia", "fullName": "Rafiqul Islam", "givenName": "Rafiqul", "surname": "Islam", "__typename": "ArticleAuthorType" } ], "idPrefix": "percom-workshops", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "718-723", "year": "2021", "issn": null, "isbn": "978-1-6654-0424-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09431053", "articleId": "1tROHbZqD8k", "__typename": "AdjacentArticleType" }, "next": { "fno": "09431000", "articleId": "1tRONFUipY4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/ai/2023/01/09677942", "title": "A Review of the Machine Learning Algorithms for Covid-19 Case Analysis", "doi": null, "abstractUrl": "/journal/ai/2023/01/09677942/1A4SzCBF2Rq", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671817", "title": "Learning Domain-Specific Word Embeddings from COVID-19 Tweets", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671817/1A8h27XaO2Y", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671700", "title": "COVID-19 Infection Detection Using Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671700/1A8jq4IHuHS", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a893", "title": "Online Partisan Polarization of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a893/1AjSP7vOr1m", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718501", "title": "CovidEnvelope: An Automated Fast Approach to Diagnose COVID-19 from Cough Signals", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718501/1Boh2hBaB2g", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a965", "title": "COVID-19 Fake News and Misinformation Detection using Transformer Learning", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a965/1KpBBfBvr9K", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2023/7578/0/757800a330", "title": "SmartEye: Detecting COVID-19 Misinformation on Twitter for Mitigating Public Health Risk", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2023/757800a330/1LFLAK3xhfO", "parentPublication": { "id": "proceedings/bigcomp/2023/7578/0", "title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2020/03/09366414", "title": "A Systematic Review on the Use of AI and ML for Fighting the COVID-19 Pandemic", "doi": null, "abstractUrl": "/journal/ai/2020/03/09366414/1rR7ZujY7zq", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378301", "title": "Mask Mandates and COVID-19 Infection Growth Rates", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378301/1s656uoD0mA", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400a843", "title": "Clustering County-Wise COVID-19 Dynamics in North Carolina", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400a843/1uGZ69mzj6o", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uOw2dwmToA", "title": "2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "acronym": "ipdps", "groupId": "1000530", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uOwa62AWGI", "doi": "10.1109/IPDPS49936.2021.00072", "title": "Scalable Epidemiological Workflows to Support COVID-19 Planning and Response", "normalizedTitle": "Scalable Epidemiological Workflows to Support COVID-19 Planning and Response", "abstract": "The COVID-19 global outbreak represents the most significant epidemic event since the 1918 influenza pandemic. Simulations have played a crucial role in supporting COVID-19 planning and response efforts. Developing scalable workflows to provide policymakers quick responses to important questions pertaining to logistics, resource allocation, epidemic forecasts and intervention analysis remains a challenging computational problem. In this work, we present scalable high performance computing-enabled workflows for COVID-19 pandemic planning and response. The scalability of our methodology allows us to run fine-grained simulations daily, and to generate county-level forecasts and other counterfactual analysis for each of the 50 states (and DC), 3140 counties across the USA. Our workflows use a hybrid cloud/cluster system utilizing a combination of local and remote cluster computing facilities, and using over 20,000 CPU cores running for 6-9 hours every day to meet this objective. Our state (Virginia), state hospital network, our university, the DOD and the CDC use our models to guide their COVID-19 planning and response efforts. We began executing these pipelines March 25, 2020, and have delivered and briefed weekly updates to these stakeholders for over 30 weeks without interruption.", "abstracts": [ { "abstractType": "Regular", "content": "The COVID-19 global outbreak represents the most significant epidemic event since the 1918 influenza pandemic. Simulations have played a crucial role in supporting COVID-19 planning and response efforts. Developing scalable workflows to provide policymakers quick responses to important questions pertaining to logistics, resource allocation, epidemic forecasts and intervention analysis remains a challenging computational problem. In this work, we present scalable high performance computing-enabled workflows for COVID-19 pandemic planning and response. The scalability of our methodology allows us to run fine-grained simulations daily, and to generate county-level forecasts and other counterfactual analysis for each of the 50 states (and DC), 3140 counties across the USA. Our workflows use a hybrid cloud/cluster system utilizing a combination of local and remote cluster computing facilities, and using over 20,000 CPU cores running for 6-9 hours every day to meet this objective. Our state (Virginia), state hospital network, our university, the DOD and the CDC use our models to guide their COVID-19 planning and response efforts. We began executing these pipelines March 25, 2020, and have delivered and briefed weekly updates to these stakeholders for over 30 weeks without interruption.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The COVID-19 global outbreak represents the most significant epidemic event since the 1918 influenza pandemic. Simulations have played a crucial role in supporting COVID-19 planning and response efforts. Developing scalable workflows to provide policymakers quick responses to important questions pertaining to logistics, resource allocation, epidemic forecasts and intervention analysis remains a challenging computational problem. In this work, we present scalable high performance computing-enabled workflows for COVID-19 pandemic planning and response. The scalability of our methodology allows us to run fine-grained simulations daily, and to generate county-level forecasts and other counterfactual analysis for each of the 50 states (and DC), 3140 counties across the USA. Our workflows use a hybrid cloud/cluster system utilizing a combination of local and remote cluster computing facilities, and using over 20,000 CPU cores running for 6-9 hours every day to meet this objective. Our state (Virginia), state hospital network, our university, the DOD and the CDC use our models to guide their COVID-19 planning and response efforts. We began executing these pipelines March 25, 2020, and have delivered and briefed weekly updates to these stakeholders for over 30 weeks without interruption.", "fno": "406600a639", "keywords": [ "Cloud Computing", "Data Visualisation", "Diseases", "Emergency Services", "Health Care", "Hospitals", "Medical Computing", "Medical Information Systems", "Resource Allocation", "Remote Cluster Computing Facilities", "Local Cluster Computing Facilities", "Scalable High Performance Computing Enabled Workflows", "Epidemic Forecasts", "Policymakers Quick Responses", "Scalable Workflows", "Response Efforts", "1918 Influenza Pandemic", "Significant Epidemic Event", "COVID 19 Global Outbreak", "Scalable Epidemiological Workflows", "Time 6 0 Hour To 9 0 Hour", "COVID 19", "Analytical Models", "Pandemics", "Computational Modeling", "Surveillance", "Scalability", "Tools", "COVID 19", "Epidemic Modeling", "HPC Workflow Development" ], "authors": [ { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Dustin Machi", "givenName": "Dustin", "surname": "Machi", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Parantapa Bhattacharya", "givenName": "Parantapa", "surname": "Bhattacharya", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Stefan Hoops", "givenName": "Stefan", "surname": "Hoops", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Jiangzhuo Chen", "givenName": "Jiangzhuo", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Henning Mortveit", "givenName": "Henning", "surname": "Mortveit", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Srinivasan Venkatramanan", "givenName": "Srinivasan", "surname": "Venkatramanan", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Bryan Lewis", "givenName": "Bryan", "surname": "Lewis", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Mandy Wilson", "givenName": "Mandy", "surname": "Wilson", "__typename": "ArticleAuthorType" }, { "affiliation": "Argonne National Laboratory", "fullName": "Arindam Fadikar", "givenName": "Arindam", "surname": "Fadikar", "__typename": "ArticleAuthorType" }, { "affiliation": "Pittsburgh Supercomputing Center", "fullName": "Tom Maiden", "givenName": "Tom", "surname": "Maiden", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Christopher L. Barrett", "givenName": "Christopher L.", "surname": "Barrett", "__typename": "ArticleAuthorType" }, { "affiliation": "Biocomplexity Institute and Initiative, University of Virginia", "fullName": "Madhav V. Marathe", "givenName": "Madhav V.", "surname": "Marathe", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdps", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2021-05-01T00:00:00", "pubType": "proceedings", "pages": "639-650", "year": "2021", "issn": null, "isbn": "978-1-6654-4066-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "406600a629", "articleId": "1uOw8sHejoA", "__typename": "AdjacentArticleType" }, "next": { "fno": "406600a651", "articleId": "1uOwaYHehuU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671429", "title": "UPHO: Leveraging an Explainable Multimodal Big Data Analytics Framework for COVID-19 Surveillance and Research", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671429/1A8he6xwFBm", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0/217400a985", "title": "Analyzing COVID-19 Epidemiological Data", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2021/217400a985/1BLnLffIJTa", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2021/2174/0", "title": "2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2021/9552/0/09718501", "title": "CovidEnvelope: An Automated Fast Approach to Diagnose COVID-19 from Cough Signals", "doi": null, "abstractUrl": "/proceedings-article/csde/2021/09718501/1Boh2hBaB2g", "parentPublication": { "id": "proceedings/csde/2021/9552/0", "title": "2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904455", "title": "Multiple Forecast Visualizations (MFVs): Trade-offs in Trust and Performance in Multiple COVID-19 Forecast Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904455/1H1gjlaBqVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995659", "title": "Identifying Variability in U.S. COVID-19 Response Through Temporal Partial Ordering Detection", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995659/1JC2FANyro4", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2022/6812/0/681200a364", "title": "High-Performance, All-Scenario COVID-19 Pathogen Detection, Prevention, and Control System", "doi": null, "abstractUrl": "/proceedings-article/cipae/2022/681200a364/1KExNOON47C", "parentPublication": { "id": "proceedings/cipae/2022/6812/0", "title": "2022 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313281", "title": "Consumer Demand Modeling During COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313281/1qmfYzauzf2", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378435", "title": "From 5Vs to 6Cs: Operationalizing Epidemic Data Management with COVID-19 Surveillance", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378435/1s64Y2WjXu8", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2020/2644/0/264400a001", "title": "Daily Visualization of Statewide COVID-19 Healthcare Data", "doi": null, "abstractUrl": "/proceedings-article/vahc/2020/264400a001/1yhFE04Jzpe", "parentPublication": { "id": "proceedings/vahc/2020/2644/0", "title": "2020 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2021/2067/0/206700a001", "title": "COVID-19 EnsembleVis: Visual Analysis of County-Level Ensemble Forecast Models", "doi": null, "abstractUrl": "/proceedings-article/vahc/2021/206700a001/1z0yltnU46I", "parentPublication": { "id": "proceedings/vahc/2021/2067/0", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uZxqXIabIs", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "acronym": "cds", "groupId": "1838884", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uZxAPaYlZ6", "doi": "10.1109/CDS52072.2021.00086", "title": "Exponential Smoothing Forecast of African Americans&#x27; COVID-19 Fatalities", "normalizedTitle": "Exponential Smoothing Forecast of African Americans' COVID-19 Fatalities", "abstract": "This work focuses on the spread and impact of COVID-19 in the black community. A detailed analysis will improve the universality of a comprehensive mitigation strategy in reducing and combatting the spread of coronavirus. Our analysis of COVID-19 spans March 2020 to November 2020. Forecasting computation was based on exponential smoothing. The quality of our models was evaluated using the Mean Absolute Percentage Error. Predominantly black states in the US were considered for the experiment. All things being equal, a forecast to February 2021 suggests a disturbing forecast for the African American communities in the states investigated.", "abstracts": [ { "abstractType": "Regular", "content": "This work focuses on the spread and impact of COVID-19 in the black community. A detailed analysis will improve the universality of a comprehensive mitigation strategy in reducing and combatting the spread of coronavirus. Our analysis of COVID-19 spans March 2020 to November 2020. Forecasting computation was based on exponential smoothing. The quality of our models was evaluated using the Mean Absolute Percentage Error. Predominantly black states in the US were considered for the experiment. All things being equal, a forecast to February 2021 suggests a disturbing forecast for the African American communities in the states investigated.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work focuses on the spread and impact of COVID-19 in the black community. A detailed analysis will improve the universality of a comprehensive mitigation strategy in reducing and combatting the spread of coronavirus. Our analysis of COVID-19 spans March 2020 to November 2020. Forecasting computation was based on exponential smoothing. The quality of our models was evaluated using the Mean Absolute Percentage Error. Predominantly black states in the US were considered for the experiment. All things being equal, a forecast to February 2021 suggests a disturbing forecast for the African American communities in the states investigated.", "fno": "042800a466", "keywords": [ "Epidemics", "Forecasting Theory", "Health Care", "Mean Absolute Percentage Error", "African American Communities", "Exponential Smoothing Forecast", "COVID 19 Fatalities", "Black Community", "Comprehensive Mitigation Strategy", "Corona Virus", "COVID 19", "Smoothing Methods", "Computational Modeling", "Sociology", "Predictive Models", "Data Science", "Statistics", "COVID 19", "Forecast", "Trend", "Exponential Smoothing", "Coronavirus", "Pandemic", "African American" ], "authors": [ { "affiliation": "University of the District of Columbia,Computer Science Department,Washington DC,USA,20008", "fullName": "Timothy Oladunni", "givenName": "Timothy", "surname": "Oladunni", "__typename": "ArticleAuthorType" }, { "affiliation": "University of the District of Columbia,Mechanical Engineering Department,Washington DC,USA,20008", "fullName": "Max Denis", "givenName": "Max", "surname": "Denis", "__typename": "ArticleAuthorType" }, { "affiliation": "University of the District of Columbia,Electrical Engineering Department,Washington DC,USA,20008", "fullName": "Esther Ososanya", "givenName": "Esther", "surname": "Ososanya", "__typename": "ArticleAuthorType" }, { "affiliation": "University of the District of Columbia,Computer Science Department,Washington DC,USA,20008", "fullName": "Abdoulaye Barry", "givenName": "Abdoulaye", "surname": "Barry", "__typename": "ArticleAuthorType" } ], "idPrefix": "cds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "466-471", "year": "2021", "issn": null, "isbn": "978-1-6654-0428-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "042800a460", "articleId": "1uZxsXrzj44", "__typename": "AdjacentArticleType" }, "next": { "fno": "042800a472", "articleId": "1uZxuigbiX6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmss/2022/9685/0/968500a132", "title": "Research on Forecasting of Port Bulk Freight Volume during the COVID-19 Pandemic Based on Time Series Analysis", "doi": null, "abstractUrl": "/proceedings-article/icmss/2022/968500a132/1F8z5VmBtrG", "parentPublication": { "id": "proceedings/icmss/2022/9685/0", "title": "2022 International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904455", "title": "Multiple Forecast Visualizations (MFVs): Trade-offs in Trust and Performance in Multiple COVID-19 Forecast Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904455/1H1gjlaBqVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cogmi/2022/7406/0/740600a059", "title": "PSLotto: A Privacy-Enhanced COVID Lottery System", "doi": null, "abstractUrl": "/proceedings-article/cogmi/2022/740600a059/1Lu4jFHTTaw", "parentPublication": { "id": "proceedings/cogmi/2022/7406/0", "title": "2022 IEEE 4th International Conference on Cognitive Machine Intelligence (CogMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09312981", "title": "An Improved SEIR Model for Reconstructing the Dynamic Transmission of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09312981/1qmgfLRlMUE", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313399", "title": "A data capture model and its associate study on the public web published COVID-19 data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313399/1qmghBKKVJC", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatase/2020/1114/0/111400a014", "title": "Big Data Science on COVID-19 Data", "doi": null, "abstractUrl": "/proceedings-article/bigdatase/2020/111400a014/1r3p8qMK98s", "parentPublication": { "id": "proceedings/bigdatase/2020/1114/0", "title": "2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a403", "title": "The effects of travel containment measures within COVID-19", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a403/1rSR9s5dmXS", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a718", "title": "An Initial Visual Analysis of the Relationship between COVID-19 and Local Community Features", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a718/1rSRelUxjZm", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378301", "title": "Mask Mandates and COVID-19 Infection Growth Rates", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378301/1s656uoD0mA", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annsim/2021/375/0/09552116", "title": "Towards a Verification and Validation Framework for COVID-19 Forecast Models", "doi": null, "abstractUrl": "/proceedings-article/annsim/2021/09552116/1xsdG9SYABq", "parentPublication": { "id": "proceedings/annsim/2021/375/0", "title": "2021 Annual Modeling and Simulation Conference (ANNSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yNiM8rfAGc", "title": "2021 IEEE VIS Arts Program (VISAP)", "acronym": "visap", "groupId": "1824484", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yNiQ6Quukw", "doi": "10.1109/VISAP52981.2021.00008", "title": "Creating Meaningful Connections Through COVID-19 Data Manifestation", "normalizedTitle": "Creating Meaningful Connections Through COVID-19 Data Manifestation", "abstract": "This paper proposes that the physical manifestation of data can help people to meaningfully connect with the COVID-19 pandemic. Four data objects are presented and analyzed, created by third-year graphic design students at OCAD University. The projects are developed through the design practice of data manifestation; the communication of quantitative information through objects, installations, and sensory experiences. Designed in the autumn of 2020, these projects stop time, offering people an opportunity to reflect on what has happened (and is happening). They illustrate the potential of data manifestation to connect people to the shared experiences of the pandemic, as well as its disproportionate impacts. They further demonstrate the capacity of data manifestation to connect people to incomprehensible magnitudes of loss. Concern by Binhwa Cho explores the fear of infection; Yellow Mask by Lynn Liang takes on anti-East Asian discrimination; A Blinding Truth by Michael Zhang examines COVID-19 case numbers in the United States; Mourning Globe by Minah Lee translates global deaths into a contemplative object.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes that the physical manifestation of data can help people to meaningfully connect with the COVID-19 pandemic. Four data objects are presented and analyzed, created by third-year graphic design students at OCAD University. The projects are developed through the design practice of data manifestation; the communication of quantitative information through objects, installations, and sensory experiences. Designed in the autumn of 2020, these projects stop time, offering people an opportunity to reflect on what has happened (and is happening). They illustrate the potential of data manifestation to connect people to the shared experiences of the pandemic, as well as its disproportionate impacts. They further demonstrate the capacity of data manifestation to connect people to incomprehensible magnitudes of loss. Concern by Binhwa Cho explores the fear of infection; Yellow Mask by Lynn Liang takes on anti-East Asian discrimination; A Blinding Truth by Michael Zhang examines COVID-19 case numbers in the United States; Mourning Globe by Minah Lee translates global deaths into a contemplative object.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes that the physical manifestation of data can help people to meaningfully connect with the COVID-19 pandemic. Four data objects are presented and analyzed, created by third-year graphic design students at OCAD University. The projects are developed through the design practice of data manifestation; the communication of quantitative information through objects, installations, and sensory experiences. Designed in the autumn of 2020, these projects stop time, offering people an opportunity to reflect on what has happened (and is happening). They illustrate the potential of data manifestation to connect people to the shared experiences of the pandemic, as well as its disproportionate impacts. They further demonstrate the capacity of data manifestation to connect people to incomprehensible magnitudes of loss. Concern by Binhwa Cho explores the fear of infection; Yellow Mask by Lynn Liang takes on anti-East Asian discrimination; A Blinding Truth by Michael Zhang examines COVID-19 case numbers in the United States; Mourning Globe by Minah Lee translates global deaths into a contemplative object.", "fno": "402100a011", "keywords": [ "Computer Graphics", "Diseases", "Epidemics", "Medical Computing", "COVID 19 Data Manifestation", "COVID 19 Pandemic", "Data Objects", "Third Year Graphic Design Students", "OCAD University", "COVID 19", "Art", "Pandemics", "Data Visualization", "Data Physicalization", "Data Art", "COVID 19" ], "authors": [ { "affiliation": "OCAD University", "fullName": "Karin von Ompteda", "givenName": "Karin", "surname": "von Ompteda", "__typename": "ArticleAuthorType" } ], "idPrefix": "visap", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "11-19", "year": "2021", "issn": null, "isbn": "978-1-6654-4021-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "402100a001", "articleId": "1yNiMRzKS4g", "__typename": "AdjacentArticleType" }, "next": { "fno": "402100a020", "articleId": "1yNiQvZ7TyM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671817", "title": "Learning Domain-Specific Word Embeddings from COVID-19 Tweets", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671817/1A8h27XaO2Y", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a893", "title": "Online Partisan Polarization of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a893/1AjSP7vOr1m", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a859", "title": "Cross-lingual COVID-19 Fake News Detection", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a859/1AjSWn6rhiU", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2022/01/09717336", "title": "iTrace: When IOTA Meets COVID-19 Contact Tracing", "doi": null, "abstractUrl": "/magazine/it/2022/01/09717336/1BaW3h0sFLW", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a522", "title": "Improving Covid-19 vaccine literacy among undergraduate students in Burkina Faso", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a522/1GvdxMxQBlC", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068592", "title": "Portuguese Twitter Dataset on COVID-19", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068592/1LKx0Zgn8be", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isci/2022/9631/0/963100a022", "title": "An Evidence Study of Long-term Impacts on Mobility Patterns Brought by COVID-19", "doi": null, "abstractUrl": "/proceedings-article/isci/2022/963100a022/1Lz20v6kOm4", "parentPublication": { "id": "proceedings/isci/2022/9631/0", "title": "2022 IEEE 10th International Conference on Smart City and Informatization (iSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378435", "title": "From 5Vs to 6Cs: Operationalizing Epidemic Data Management with COVID-19 Surveillance", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378435/1s64Y2WjXu8", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2022/03/09547788", "title": "An Empirical Study on How Well Do COVID-19 Information Dashboards Service Users&#x2019; Information Needs", "doi": null, "abstractUrl": "/journal/sc/2022/03/09547788/1x9Tr00kZH2", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2021/2594/0/259400a024", "title": "How COVID-19 Affects Health Status of Chinese Immigrants", "doi": null, "abstractUrl": "/proceedings-article/icphds/2021/259400a024/1ymIPk9DtoA", "parentPublication": { "id": "proceedings/icphds/2021/2594/0", "title": "2021 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yQB4Fmf7vq", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yQB6xGERwI", "doi": "10.1109/TREX53765.2021.00009", "title": "Should I Follow this Model? The Effect of Uncertainty Visualization on the Acceptance of Time Series Forecasts", "normalizedTitle": "Should I Follow this Model? The Effect of Uncertainty Visualization on the Acceptance of Time Series Forecasts", "abstract": "Time series forecasts are ubiquitous, ranging from daily weather forecasts to projections of pandemics such as COVID-19. Communicating the uncertainty associated with such forecasts is important, because it may affect users&#x2019; trust in a forecasting model and, in turn, the decisions made based on the model. Although there exists a growing body of research on visualizing uncertainty in general, the important case of visualizing prediction uncertainty in time series forecasting is under-researched. Against this background, we investigated how different visualizations of predictive uncertainty affect the extent to which people follow predictions of a time series forecasting model. More specifically, we conducted an online experiment on forecasting occupied hospital beds due to the COVID-19 pandemic, measuring the influence of uncertainty visualization of algorithmic predictions on participants&#x2019; own predictions. In contrast to prior studies, our empirical results suggest that more salient visualizations of uncertainty lead to decreased willingness to follow algorithmic forecasts.", "abstracts": [ { "abstractType": "Regular", "content": "Time series forecasts are ubiquitous, ranging from daily weather forecasts to projections of pandemics such as COVID-19. Communicating the uncertainty associated with such forecasts is important, because it may affect users&#x2019; trust in a forecasting model and, in turn, the decisions made based on the model. Although there exists a growing body of research on visualizing uncertainty in general, the important case of visualizing prediction uncertainty in time series forecasting is under-researched. Against this background, we investigated how different visualizations of predictive uncertainty affect the extent to which people follow predictions of a time series forecasting model. More specifically, we conducted an online experiment on forecasting occupied hospital beds due to the COVID-19 pandemic, measuring the influence of uncertainty visualization of algorithmic predictions on participants&#x2019; own predictions. In contrast to prior studies, our empirical results suggest that more salient visualizations of uncertainty lead to decreased willingness to follow algorithmic forecasts.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Time series forecasts are ubiquitous, ranging from daily weather forecasts to projections of pandemics such as COVID-19. Communicating the uncertainty associated with such forecasts is important, because it may affect users’ trust in a forecasting model and, in turn, the decisions made based on the model. Although there exists a growing body of research on visualizing uncertainty in general, the important case of visualizing prediction uncertainty in time series forecasting is under-researched. Against this background, we investigated how different visualizations of predictive uncertainty affect the extent to which people follow predictions of a time series forecasting model. More specifically, we conducted an online experiment on forecasting occupied hospital beds due to the COVID-19 pandemic, measuring the influence of uncertainty visualization of algorithmic predictions on participants’ own predictions. In contrast to prior studies, our empirical results suggest that more salient visualizations of uncertainty lead to decreased willingness to follow algorithmic forecasts.", "fno": "181700a020", "keywords": [ "Forecasting Theory", "Hospitals", "Time Series", "Weather Forecasting", "Uncertainty Visualization", "Algorithmic Forecasts", "Time Series Forecasts", "Daily Weather Forecasts", "Visualizing Uncertainty", "Prediction Uncertainty", "Predictive Uncertainty", "Time Series Forecasting Model", "Occupied Hospital Bed Forecasting", "COVID 19", "Visualization", "Uncertainty", "Pandemics", "Visual Analytics", "Time Series Analysis", "Weather Forecasting", "Uncertainty Visualization", "Visualization", "Visualization Techniques", "Human Centered Computing", "Decision Making", "Non Expert Audiences" ], "authors": [ { "affiliation": "Paderborn University,Department of Information Systems,Germany", "fullName": "Dirk Leffrang", "givenName": "Dirk", "surname": "Leffrang", "__typename": "ArticleAuthorType" }, { "affiliation": "Paderborn University,Department of Information Systems,Germany", "fullName": "Oliver Müller", "givenName": "Oliver", "surname": "Müller", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "20-26", "year": "2021", "issn": null, "isbn": "978-1-6654-1817-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "181700a014", "articleId": "1yQB6h3HL6o", "__typename": "AdjacentArticleType" }, "next": { "fno": "181700a027", "articleId": "1yQB55Tsbpm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "mags/cs/2002/04/c4014", "title": "A Hybrid Approach to Improving Rainfall Forecasts", "doi": null, "abstractUrl": "/magazine/cs/2002/04/c4014/13rRUwcS1yf", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0/666700a281", "title": "The effects of regularisation on RNN models for Covid-19 time series forecasting", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2021/666700a281/1BrAIpCjwo8", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2021/6667/0", "title": "2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000a250", "title": "Long Term Interval Forecasts of Demand using Data-Driven Dynamic Regression Models", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000a250/1FJ5ohr6JPi", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904455", "title": "Multiple Forecast Visualizations (MFVs): Trade-offs in Trust and Performance in Multiple COVID-19 Forecast Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904455/1H1gjlaBqVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2022/6390/0/09904363", "title": "In Search of Deep Learning Architectures for Load Forecasting: A Comparative Analysis and the Impact of the Covid-19 Pandemic on Model Performance", "doi": null, "abstractUrl": "/proceedings-article/iisa/2022/09904363/1H5KwUb5QYw", "parentPublication": { "id": "proceedings/iisa/2022/6390/0", "title": "2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020895", "title": "Shape-based Evaluation of Epidemic Forecasts", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020895/1KfSsZgve5G", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2022/7532/0/753200a014", "title": "Evaluation of sightseeing application using BLE beacon in Oku-Nikko", "doi": null, "abstractUrl": "/proceedings-article/candarw/2022/753200a014/1LAz0KeFm1i", "parentPublication": { "id": "proceedings/candarw/2022/7532/0", "title": "2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377904", "title": "Examining Deep Learning Models with Multiple Data Sources for COVID-19 Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377904/1s64vl78q1a", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2021/2463/0/246300a166", "title": "Intelligent Probabilistic Forecasts of Day-Ahead Electricity Prices in a Highly Volatile Power Market", "doi": null, "abstractUrl": "/proceedings-article/compsac/2021/246300a166/1wLcecNl7XO", "parentPublication": { "id": "proceedings/compsac/2021/2463/0", "title": "2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2021/2067/0/206700a001", "title": "COVID-19 EnsembleVis: Visual Analysis of County-Level Ensemble Forecast Models", "doi": null, "abstractUrl": "/proceedings-article/vahc/2021/206700a001/1z0yltnU46I", "parentPublication": { "id": "proceedings/vahc/2021/2067/0", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1z0yj0F8T8A", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "acronym": "vahc", "groupId": "1826204", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1z0yltnU46I", "doi": "10.1109/VAHC53616.2021.00005", "title": "COVID-19 EnsembleVis: Visual Analysis of County-Level Ensemble Forecast Models", "normalizedTitle": "COVID-19 EnsembleVis: Visual Analysis of County-Level Ensemble Forecast Models", "abstract": "The spread of the SARS-Co V- 2 virus and its contagious disease COVID-19 has impacted countries to an extent not seen since the 1918 flu pandemic. In the absence of an effective vaccine and as cases surge worldwide, governments were forced to adopt measures to inhibit the spread of the disease. To reduce its impact and to guide policy planning and resource allocation, researchers have been developing models to forecast the infectious disease. Ensemble models, by aggregating forecasts from multiple individual models, have been shown to be a useful forecasting method. However, these models can still provide less-than-adequate forecasts at higher spatial resolutions. In this paper, we built COVID-19 Ensemble Vis, a web-based interactive visual interface that allows the assessment of the errors of ensembles and individual models by enabling users to effortlessly navigate through and compare the outputs of models considering their space and time dimensions. COVID-19 Ensemble Vis enables a more detailed understanding of uncertainty and the range of forecasts generated by individual models.", "abstracts": [ { "abstractType": "Regular", "content": "The spread of the SARS-Co V- 2 virus and its contagious disease COVID-19 has impacted countries to an extent not seen since the 1918 flu pandemic. In the absence of an effective vaccine and as cases surge worldwide, governments were forced to adopt measures to inhibit the spread of the disease. To reduce its impact and to guide policy planning and resource allocation, researchers have been developing models to forecast the infectious disease. Ensemble models, by aggregating forecasts from multiple individual models, have been shown to be a useful forecasting method. However, these models can still provide less-than-adequate forecasts at higher spatial resolutions. In this paper, we built COVID-19 Ensemble Vis, a web-based interactive visual interface that allows the assessment of the errors of ensembles and individual models by enabling users to effortlessly navigate through and compare the outputs of models considering their space and time dimensions. COVID-19 Ensemble Vis enables a more detailed understanding of uncertainty and the range of forecasts generated by individual models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The spread of the SARS-Co V- 2 virus and its contagious disease COVID-19 has impacted countries to an extent not seen since the 1918 flu pandemic. In the absence of an effective vaccine and as cases surge worldwide, governments were forced to adopt measures to inhibit the spread of the disease. To reduce its impact and to guide policy planning and resource allocation, researchers have been developing models to forecast the infectious disease. Ensemble models, by aggregating forecasts from multiple individual models, have been shown to be a useful forecasting method. However, these models can still provide less-than-adequate forecasts at higher spatial resolutions. In this paper, we built COVID-19 Ensemble Vis, a web-based interactive visual interface that allows the assessment of the errors of ensembles and individual models by enabling users to effortlessly navigate through and compare the outputs of models considering their space and time dimensions. COVID-19 Ensemble Vis enables a more detailed understanding of uncertainty and the range of forecasts generated by individual models.", "fno": "206700a001", "keywords": [ "Data Visualisation", "Diseases", "Internet", "Learning Artificial Intelligence", "Medical Computing", "COVID 19 Ensemble Vis", "Visual Analysis", "Flu Pandemic", "Infectious Disease", "Web Based Interactive Visual Interface", "County Level Ensemble Forecast Models", "SARS Co V 2 Virus", "COVID 19 Disease", "COVID 19", "Uncertainty", "Computational Modeling", "Visual Analytics", "Predictive Models", "Vaccines", "Planning", "Human Centered Computing Visualization Visualization Application Domains Visual Analytics" ], "authors": [ { "affiliation": "University of Illinois,Chicago", "fullName": "Sanjana Srabanti", "givenName": "Sanjana", "surname": "Srabanti", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois,Chicago", "fullName": "G. Elisabeta Marai", "givenName": "G. Elisabeta", "surname": "Marai", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois,Chicago", "fullName": "Fabio Miranda", "givenName": "Fabio", "surname": "Miranda", "__typename": "ArticleAuthorType" } ], "idPrefix": "vahc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2021", "issn": null, "isbn": "978-1-6654-2067-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "206700z005", "articleId": "1z0ylAXGcnu", "__typename": "AdjacentArticleType" }, "next": { "fno": "206700a006", "articleId": "1z0ylclGF6E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09672055", "title": "Visual Understanding of COVID-19 Knowledge Graph for Predictive Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09672055/1A8hmThsSbK", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a893", "title": "Online Partisan Polarization of COVID-19", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a893/1AjSP7vOr1m", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2022/02/09770449", "title": "COVID-19 Fake News Detection Using Ensemble-Based Deep Learning Model", "doi": null, "abstractUrl": "/magazine/it/2022/02/09770449/1D9Gaq1ylqw", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a539", "title": "Multi-perspective Characterization of Anaphylactic Risk for COVID-19 Vaccination - A Visual Analytic Approach", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a539/1GvdJ98N1yE", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904455", "title": "Multiple Forecast Visualizations (MFVs): Trade-offs in Trust and Performance in Multiple COVID-19 Forecast Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904455/1H1gjlaBqVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2022/1008/0/10017516", "title": "Predicting COVID-19 Related Tweets Using Ensemble of Transformers Models", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2022/10017516/1KJxs6zYtTG", "parentPublication": { "id": "proceedings/aiccsa/2022/1008/0", "title": "2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020579", "title": "Enhancing COVID-19 Ensemble Forecasting Model Performance Using Auxiliary Data Sources", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020579/1KfSmBv8k4E", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a965", "title": "COVID-19 Fake News and Misinformation Detection using Transformer Learning", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a965/1KpBBfBvr9K", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377904", "title": "Examining Deep Learning Models with Multiple Data Sources for COVID-19 Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377904/1s64vl78q1a", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2020/7624/0/762400a843", "title": "Clustering County-Wise COVID-19 Dynamics in North Carolina", "doi": null, "abstractUrl": "/proceedings-article/csci/2020/762400a843/1uGZ69mzj6o", "parentPublication": { "id": "proceedings/csci/2020/7624/0", "title": "2020 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxETa7L", "title": "Parallel and Distributed Computing Applications and Technologies, International Conference on", "acronym": "pdcat", "groupId": "1001048", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNqESuen", "doi": "10.1109/PDCAT.2011.79", "title": "The Multidimensional Scaling and Barycentric Coordinates Based Distributed Localization in Wireless Sensor Networks", "normalizedTitle": "The Multidimensional Scaling and Barycentric Coordinates Based Distributed Localization in Wireless Sensor Networks", "abstract": "Position information is vital for wireless sensor networks in many applications. In this paper, based on the barycentric coordinate system, we incorporate a term constrains sensors to remain the intrinsic structure revealed by range measurements between neighboring nodes into the STRESS function, which is the cost function optimized by the distributed weighted-multidimensional scaling algorithm (dwMDS). By minimizing the modified cost function, we derive a distributed localization algorithm called the Multidimensional Scaling and Barycentric Coordinates based Distributed Localization Algorithm (MDS_BC_DLA). Experimental results on four different types of WSNs show MDS_BC_DLA outperforms dwMDS.", "abstracts": [ { "abstractType": "Regular", "content": "Position information is vital for wireless sensor networks in many applications. In this paper, based on the barycentric coordinate system, we incorporate a term constrains sensors to remain the intrinsic structure revealed by range measurements between neighboring nodes into the STRESS function, which is the cost function optimized by the distributed weighted-multidimensional scaling algorithm (dwMDS). By minimizing the modified cost function, we derive a distributed localization algorithm called the Multidimensional Scaling and Barycentric Coordinates based Distributed Localization Algorithm (MDS_BC_DLA). Experimental results on four different types of WSNs show MDS_BC_DLA outperforms dwMDS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Position information is vital for wireless sensor networks in many applications. In this paper, based on the barycentric coordinate system, we incorporate a term constrains sensors to remain the intrinsic structure revealed by range measurements between neighboring nodes into the STRESS function, which is the cost function optimized by the distributed weighted-multidimensional scaling algorithm (dwMDS). By minimizing the modified cost function, we derive a distributed localization algorithm called the Multidimensional Scaling and Barycentric Coordinates based Distributed Localization Algorithm (MDS_BC_DLA). Experimental results on four different types of WSNs show MDS_BC_DLA outperforms dwMDS.", "fno": "4564a156", "keywords": [ "Wireless Sensor Networks", "Barycentric Coordinates", "Distributed Localization", "Multidimensional Scaling" ], "authors": [ { "affiliation": null, "fullName": "Cuiqin Hou", "givenName": "Cuiqin", "surname": "Hou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yibin Hou", "givenName": "Yibin", "surname": "Hou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhangqin Huang", "givenName": "Zhangqin", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huibing Zhang", "givenName": "Huibing", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "pdcat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-10-01T00:00:00", "pubType": "proceedings", "pages": "156-160", "year": "2011", "issn": null, "isbn": "978-0-7695-4564-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4564a152", "articleId": "12OmNAtaRXu", "__typename": "AdjacentArticleType" }, "next": { "fno": "4564a161", "articleId": "12OmNBubOPI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoip/2010/4252/2/4252b240", "title": "Research on Improved Multidimensional Scaling Localization Algorithm for Wireless Sensor Network", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252b240/12OmNALUoyt", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/1996/7668/0/76680072", "title": "Animating multidimensional scaling to visualize N-dimensional data sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1996/76680072/12OmNCesr2B", "parentPublication": { "id": "proceedings/ieee-infovis/1996/7668/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/20550012", "title": "A Visual Workspace for Hybrid Multidimensional Scaling Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550012/12OmNsd6vmw", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770561", "title": "Visualizing Time-Varying Matrices Using Multidimensional Scaling and Reorderable Matrices", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770561/12OmNvStcPl", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/1/4647a624", "title": "A Distributed Node Localization Algorithm for Wireless Sensor Network Based on MDS and SDP", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647a624/12OmNvTjZV9", "parentPublication": { "id": "proceedings/iccsee/2012/4647/2", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140202", "title": "Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140202/12OmNx9WSYj", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2009/3935/0/3935a102", "title": "Long-Range Beacons on Sea Surface Based 3D-Localization for Underwater Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/msn/2009/3935a102/12OmNxzMnLH", "parentPublication": { "id": "proceedings/msn/2009/3935/0", "title": "2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2008/3095/0/3095a748", "title": "A Hierarchical MDS-Based Localization Algorithm for Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/aina/2008/3095a748/12OmNyaXPRq", "parentPublication": { "id": "proceedings/aina/2008/3095/0", "title": "22nd International Conference on Advanced Information Networking and Applications (aina 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790057", "title": "Steerable, Progressive Multidimensional Scaling", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790057/12OmNzV70oY", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/06/ttg2009061001", "title": "Scattering Points in Parallel Coordinates", "doi": null, "abstractUrl": "/journal/tg/2009/06/ttg2009061001/13rRUxNW1TQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC1GueK", "title": "2014 IEEE International Congress on Big Data (BigData Congress)", "acronym": "bigdata-congress", "groupId": "1801789", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwfb6Sm", "doi": "10.1109/BigData.Congress.2014.87", "title": "A Combinatorial Approach to Multidimensional Scaling", "normalizedTitle": "A Combinatorial Approach to Multidimensional Scaling", "abstract": "In standard Multidimensional Scaling (MDS) one is concerned with finding a low-dimensional representation of a set of n objects, so that pairwise dissimilarities among the original objects are realized as distances in the embedded space with minimum error. We propose an MDS algorithm that, in addition to minimizing a usual Stress function, can accommodate additional optimization criteria, as well as side constraints associated with the underlying visualization task. We present an application in which we attempt to minimize a secondary objective funcion: the cluster membership discrepancy between a given cluster structure in the original data and the resulting cluster structure in the low-dimensional embedding. Preliminary computational experiments show that the algorithm is able to find MDS embeddings that preserve the original cluster structure while incurring a relatively small increase in Stress, as compared to standard MDS. Finally, we discuss a few properties of the algorithm that make it an interesting choice for Big Data visualization.", "abstracts": [ { "abstractType": "Regular", "content": "In standard Multidimensional Scaling (MDS) one is concerned with finding a low-dimensional representation of a set of n objects, so that pairwise dissimilarities among the original objects are realized as distances in the embedded space with minimum error. We propose an MDS algorithm that, in addition to minimizing a usual Stress function, can accommodate additional optimization criteria, as well as side constraints associated with the underlying visualization task. We present an application in which we attempt to minimize a secondary objective funcion: the cluster membership discrepancy between a given cluster structure in the original data and the resulting cluster structure in the low-dimensional embedding. Preliminary computational experiments show that the algorithm is able to find MDS embeddings that preserve the original cluster structure while incurring a relatively small increase in Stress, as compared to standard MDS. Finally, we discuss a few properties of the algorithm that make it an interesting choice for Big Data visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In standard Multidimensional Scaling (MDS) one is concerned with finding a low-dimensional representation of a set of n objects, so that pairwise dissimilarities among the original objects are realized as distances in the embedded space with minimum error. We propose an MDS algorithm that, in addition to minimizing a usual Stress function, can accommodate additional optimization criteria, as well as side constraints associated with the underlying visualization task. We present an application in which we attempt to minimize a secondary objective funcion: the cluster membership discrepancy between a given cluster structure in the original data and the resulting cluster structure in the low-dimensional embedding. Preliminary computational experiments show that the algorithm is able to find MDS embeddings that preserve the original cluster structure while incurring a relatively small increase in Stress, as compared to standard MDS. Finally, we discuss a few properties of the algorithm that make it an interesting choice for Big Data visualization.", "fno": "06906829", "keywords": [ "Stress", "Clustering Algorithms", "Data Visualization", "Standards", "Euclidean Distance", "Partitioning Algorithms", "Tin", "Large Scale Visualization", "Clustering", "Multidimensional Scaling", "Branch Andprune" ], "authors": [ { "affiliation": null, "fullName": "Jorge Alencar", "givenName": "Jorge", "surname": "Alencar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tiberius O. Bonates", "givenName": "Tiberius O.", "surname": "Bonates", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carlile Lavor", "givenName": "Carlile", "surname": "Lavor", "__typename": "ArticleAuthorType" } ], "idPrefix": "bigdata-congress", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-06-01T00:00:00", "pubType": "proceedings", "pages": "562-569", "year": "2014", "issn": null, "isbn": "978-1-4799-5057-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06906828", "articleId": "12OmNzXnNoU", "__typename": "AdjacentArticleType" }, "next": { "fno": "06906830", "articleId": "12OmNx3HI3E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sibgrapi/2013/5099/0/5099a008", "title": "Feature Learning by Multidimensional Scaling and Its Applications in Object Recognition", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2013/5099a008/12OmNAkWvwV", "parentPublication": { "id": "proceedings/sibgrapi/2013/5099/0", "title": "2013 XXVI Conference on Graphics, Patterns and Images", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2013/5083/0/06683892", "title": "A Robust and Scalable Solution for Interpolative Multidimensional Scaling with Weighting", "doi": null, "abstractUrl": "/proceedings-article/e-science/2013/06683892/12OmNAo45Ip", "parentPublication": { "id": "proceedings/e-science/2013/5083/0", "title": "2013 IEEE 9th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/1996/7668/0/76680072", "title": "Animating multidimensional scaling to visualize N-dimensional data sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1996/76680072/12OmNCesr2B", "parentPublication": { "id": "proceedings/ieee-infovis/1996/7668/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsap/2010/3960/0/3960a073", "title": "Abnormality Detection from Medical Thermographs in Human Using Euclidean Distance Based Color Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icsap/2010/3960a073/12OmNCmGNYb", "parentPublication": { "id": "proceedings/icsap/2010/3960/0", "title": "Signal Acquisition and Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a133", "title": "Simplified Stress and Simplified Silhouette Coefficient to a Faster Quality Evaluation of Multidimensional Projection Techniques and Feature Spaces", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a133/12OmNscOUa1", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004b365", "title": "Multidimensional Scaling-Based Complex Matrix Analysis for Wireless Networks Position", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004b365/12OmNyKa6bc", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2010/8957/0/05693921", "title": "Multidimensional Scaling by Deterministic Annealing with Iterative Majorization Algorithm", "doi": null, "abstractUrl": "/proceedings-article/e-science/2010/05693921/12OmNyeWdBO", "parentPublication": { "id": "proceedings/e-science/2010/8957/0", "title": "E-Science 2010. 6th IEEE International Conference on E-Science (E-Science 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/03/ttg2014030351", "title": "A Structure-Based Distance Metric for High-Dimensional Space Exploration with Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2014/03/ttg2014030351/13rRUxAAT0V", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/02/v0198", "title": "Texture Mapping Using Surface Flattening via Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2002/02/v0198/13rRUyuvRxf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09908526", "title": "Uncertainty-Aware Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2023/01/09908526/1HbauB9Srsc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvEyR7P", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "4", "displayVolume": "4", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNx9WSYj", "doi": "10.1109/ICPR.2006.774", "title": "Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction", "normalizedTitle": "Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction", "abstract": "A data embedding method is introduced to configure global coordinates of data using local distances as input. The method applies classical multidimensional scaling within a neighborhood of each data point. The local models are then aligned to derive global coordinates in order to minimize a residual measure. The residual measure has a quadratic form of resulting global coordinates, which makes the alignment problem solved analytically by using an eigensolver. Experiments show that the method produces less deformed embedding results than locally linear embedding. Variations of the method and possible extensions are also discussed.", "abstracts": [ { "abstractType": "Regular", "content": "A data embedding method is introduced to configure global coordinates of data using local distances as input. The method applies classical multidimensional scaling within a neighborhood of each data point. The local models are then aligned to derive global coordinates in order to minimize a residual measure. The residual measure has a quadratic form of resulting global coordinates, which makes the alignment problem solved analytically by using an eigensolver. Experiments show that the method produces less deformed embedding results than locally linear embedding. Variations of the method and possible extensions are also discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A data embedding method is introduced to configure global coordinates of data using local distances as input. The method applies classical multidimensional scaling within a neighborhood of each data point. The local models are then aligned to derive global coordinates in order to minimize a residual measure. The residual measure has a quadratic form of resulting global coordinates, which makes the alignment problem solved analytically by using an eigensolver. Experiments show that the method produces less deformed embedding results than locally linear embedding. Variations of the method and possible extensions are also discussed.", "fno": "252140202", "keywords": [ "Dimensionality Reduction", "Locally Linear Embedding", "Manifold Learning", "Multidimensional Scaling" ], "authors": [ { "affiliation": "Western Michigan University,Kalamazoo", "fullName": "Li Yang", "givenName": "Li", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-08-01T00:00:00", "pubType": "proceedings", "pages": "202-205", "year": "2006", "issn": "1051-4651", "isbn": "0-7695-2521-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "252140198", "articleId": "12OmNAk5HPx", "__typename": "AdjacentArticleType" }, "next": { "fno": "252140206", "articleId": "12OmNBr4ese", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bsn/2012/4698/0/4698a161", "title": "Dimensionality Reduction for Anomaly Detection in Electrocardiography: A Manifold Approach", "doi": null, "abstractUrl": "/proceedings-article/bsn/2012/4698a161/12OmNAJDBtS", "parentPublication": { "id": "proceedings/bsn/2012/4698/0", "title": "Wearable and Implantable Body Sensor Networks, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2009/3859/3/3859c031", "title": "Supervised Locally Linear Embedding in Tensor Space", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859c031/12OmNARRYpM", "parentPublication": { "id": "proceedings/iita/2009/3859/3", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140194", "title": "Building Connected Neighborhood Graphs for Locally Linear Embedding", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140194/12OmNBEYzLG", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109a531", "title": "Globally-Preserving Based Locally Linear Embedding", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a531/12OmNCm7BMN", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2008/3305/5/3305e305", "title": "Generalized Locally Linear Embedding Based on Local Reconstruction Similarity", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305e305/12OmNqNoscX", "parentPublication": { "id": "proceedings/fskd/2008/3305/5", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2005/2319/0/23190290", "title": "Face Recognition with Weighted Locally Linear Embedding", "doi": null, "abstractUrl": "/proceedings-article/crv/2005/23190290/12OmNweBUPT", "parentPublication": { "id": "proceedings/crv/2005/2319/0", "title": "The 2nd Canadian Conference on Computer and Robot Vision (CRV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2008/3495/0/3495a174", "title": "Boundary Constrained Manifold Unfolding", "doi": null, "abstractUrl": "/proceedings-article/icmla/2008/3495a174/12OmNzTYCa1", "parentPublication": { "id": "proceedings/icmla/2008/3495/0", "title": "2008 Seventh International Conference on Machine Learning and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2007/01/i0040", "title": "Graph Embedding and Extensions: A General Framework for Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tp/2007/01/i0040/13rRUB7a12a", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2008/03/ttp2008030438", "title": "Alignment of Overlapping Locally Scaled Patches for Multidimensional Scaling and Dimensionality Reduction", "doi": null, "abstractUrl": "/journal/tp/2008/03/ttp2008030438/13rRUIJuxwn", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2009/09/ttk2009091285", "title": "Nonlinear Dimensionality Reduction with Local Spline Embedding", "doi": null, "abstractUrl": "/journal/tk/2009/09/ttk2009091285/13rRUwI5TRt", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC3Xhho", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2004", "__typename": "ProceedingType" }, "article": { "id": "12OmNzV70oY", "doi": "10.1109/INFVIS.2004.60", "title": "Steerable, Progressive Multidimensional Scaling", "normalizedTitle": "Steerable, Progressive Multidimensional Scaling", "abstract": "Current implementations of Multidimensional Scaling (MDS), an approach that attempts to best represent data point similarity in a low-dimensional representation, are not suited for many of today's large-scale datasets. We propose an extension to the spring model approach that allows the user to interactively explore datasets that are far beyond the scale of previous implementations of MDS. We present MDSteer, a steerable MDS computation engine and visualization tool that progressively computes an MDS layout and handles datasets of over one million points. Our technique employs hierarchical data structures and progressive layouts to allow the user to steer the computation of the algorithm to the interesting areas of the dataset. The algorithm iteratively alternates between a layout stage in which a sub-selection of points are added to the set of active points affected by the MDS iteration, and a binning stage which increases the depth of the bin hierarchy and organizes the currently unplaced points into separate spatial regions. This binning strategy allows the user to select onscreen regions of the layout to focus the MDS computation into the areas of the dataset that are assigned to the selected bins. We show both real and common synthetic benchmark datasets with dimensionalities ranging from 3 to 300 and cardinalities of over one million points.", "abstracts": [ { "abstractType": "Regular", "content": "Current implementations of Multidimensional Scaling (MDS), an approach that attempts to best represent data point similarity in a low-dimensional representation, are not suited for many of today's large-scale datasets. We propose an extension to the spring model approach that allows the user to interactively explore datasets that are far beyond the scale of previous implementations of MDS. We present MDSteer, a steerable MDS computation engine and visualization tool that progressively computes an MDS layout and handles datasets of over one million points. Our technique employs hierarchical data structures and progressive layouts to allow the user to steer the computation of the algorithm to the interesting areas of the dataset. The algorithm iteratively alternates between a layout stage in which a sub-selection of points are added to the set of active points affected by the MDS iteration, and a binning stage which increases the depth of the bin hierarchy and organizes the currently unplaced points into separate spatial regions. This binning strategy allows the user to select onscreen regions of the layout to focus the MDS computation into the areas of the dataset that are assigned to the selected bins. We show both real and common synthetic benchmark datasets with dimensionalities ranging from 3 to 300 and cardinalities of over one million points.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current implementations of Multidimensional Scaling (MDS), an approach that attempts to best represent data point similarity in a low-dimensional representation, are not suited for many of today's large-scale datasets. We propose an extension to the spring model approach that allows the user to interactively explore datasets that are far beyond the scale of previous implementations of MDS. We present MDSteer, a steerable MDS computation engine and visualization tool that progressively computes an MDS layout and handles datasets of over one million points. Our technique employs hierarchical data structures and progressive layouts to allow the user to steer the computation of the algorithm to the interesting areas of the dataset. The algorithm iteratively alternates between a layout stage in which a sub-selection of points are added to the set of active points affected by the MDS iteration, and a binning stage which increases the depth of the bin hierarchy and organizes the currently unplaced points into separate spatial regions. This binning strategy allows the user to select onscreen regions of the layout to focus the MDS computation into the areas of the dataset that are assigned to the selected bins. We show both real and common synthetic benchmark datasets with dimensionalities ranging from 3 to 300 and cardinalities of over one million points.", "fno": "87790057", "keywords": [ "Dimensionality Reduction", "Multidimensional Scaling" ], "authors": [ { "affiliation": "University of British Columbia", "fullName": "Matt Williams", "givenName": "Matt", "surname": "Williams", "__typename": "ArticleAuthorType" }, { "affiliation": "University of British Columbia", "fullName": "Tamara Munzner", "givenName": "Tamara", "surname": "Munzner", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2004-10-01T00:00:00", "pubType": "proceedings", "pages": "57-64", "year": "2004", "issn": "1522-404X", "isbn": "0-7803-8779-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "87790049", "articleId": "12OmNBRsVz9", "__typename": "AdjacentArticleType" }, "next": { "fno": "87790065", "articleId": "12OmNwD1q7R", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2008/3305/2/3305b541", "title": "A Heuristic Approach for Fast Mining Association Rules in Transportation System", "doi": null, "abstractUrl": "/proceedings-article/fskd/2008/3305b541/12OmNC2OSI4", "parentPublication": { "id": "fskd/2008/3305/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/1996/7668/0/76680072", "title": "Animating multidimensional scaling to visualize N-dimensional data sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/1996/76680072/12OmNCesr2B", "parentPublication": { "id": "proceedings/ieee-infovis/1996/7668/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2003/2055/0/20550012", "title": "A Visual Workspace for Hybrid Multidimensional Scaling Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2003/20550012/12OmNsd6vmw", "parentPublication": { "id": "proceedings/ieee-infovis/2003/2055/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2004/2177/0/21770561", "title": "Visualizing Time-Varying Matrices Using Multidimensional Scaling and Reorderable Matrices", "doi": null, "abstractUrl": "/proceedings-article/iv/2004/21770561/12OmNvStcPl", "parentPublication": { "id": "proceedings/iv/2004/2177/0", "title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2008/3358/0/3358a305", "title": "Exploratory Visualization of RFLP-PCR Genomic Data Using Multidimensional Scaling", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2008/3358a305/12OmNwwuDYu", "parentPublication": { "id": "proceedings/sibgrapi/2008/3358/0", "title": "2008 XXI Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140202", "title": "Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140202/12OmNx9WSYj", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/10/ttg2011101487", "title": "A User-Assisted Approach to Visualizing Multidimensional Images", "doi": null, "abstractUrl": "/journal/tg/2011/10/ttg2011101487/13rRUwhpBO2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2002/02/v0198", "title": "Texture Mapping Using Surface Flattening via Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2002/02/v0198/13rRUyuvRxf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09908526", "title": "Uncertainty-Aware Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2023/01/09908526/1HbauB9Srsc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cds/2021/0428/0/042800a516", "title": "Multidimensional Scaling for Gene Sequence Data with Autoencoders", "doi": null, "abstractUrl": "/proceedings-article/cds/2021/042800a516/1uZxwVnhVbG", "parentPublication": { "id": "proceedings/cds/2021/0428/0", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uZxqXIabIs", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "acronym": "cds", "groupId": "1838884", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uZxwVnhVbG", "doi": "10.1109/CDS52072.2021.00095", "title": "Multidimensional Scaling for Gene Sequence Data with Autoencoders", "normalizedTitle": "Multidimensional Scaling for Gene Sequence Data with Autoencoders", "abstract": "Multidimensional scaling of gene sequence data has long played a vital role in analysing gene sequence data to identify clusters and patterns. However the computation complexities and memory requirements of state-of-the-art dimensional scaling algorithms make it infeasible to scale to large datasets. In this paper we present an autoencoder-based dimensional reduction model which can easily scale to datasets containing millions of gene sequences, while attaining results comparable to state-of-the-art MDS algorithms with minimal resource requirements. The model also supports out-of-sample data points with a 99.5%+ accuracy based on our experiments. The proposed model is evaluated against DAMDS with a real world fungi gene sequence dataset. The presented results showcase the effectiveness of the autoencoder-based dimension reduction model and its advantages.", "abstracts": [ { "abstractType": "Regular", "content": "Multidimensional scaling of gene sequence data has long played a vital role in analysing gene sequence data to identify clusters and patterns. However the computation complexities and memory requirements of state-of-the-art dimensional scaling algorithms make it infeasible to scale to large datasets. In this paper we present an autoencoder-based dimensional reduction model which can easily scale to datasets containing millions of gene sequences, while attaining results comparable to state-of-the-art MDS algorithms with minimal resource requirements. The model also supports out-of-sample data points with a 99.5%+ accuracy based on our experiments. The proposed model is evaluated against DAMDS with a real world fungi gene sequence dataset. The presented results showcase the effectiveness of the autoencoder-based dimension reduction model and its advantages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multidimensional scaling of gene sequence data has long played a vital role in analysing gene sequence data to identify clusters and patterns. However the computation complexities and memory requirements of state-of-the-art dimensional scaling algorithms make it infeasible to scale to large datasets. In this paper we present an autoencoder-based dimensional reduction model which can easily scale to datasets containing millions of gene sequences, while attaining results comparable to state-of-the-art MDS algorithms with minimal resource requirements. The model also supports out-of-sample data points with a 99.5%+ accuracy based on our experiments. The proposed model is evaluated against DAMDS with a real world fungi gene sequence dataset. The presented results showcase the effectiveness of the autoencoder-based dimension reduction model and its advantages.", "fno": "042800a516", "keywords": [ "Biology Computing", "Computational Complexity", "Data Analysis", "Feature Extraction", "Genetics", "Learning Artificial Intelligence", "Neural Nets", "Pattern Classification", "Pattern Clustering", "Multidimensional Scaling", "Gene Sequence Data", "State Of The Art Dimensional Scaling Algorithms", "Autoencoder Based Dimensional Reduction Model", "Gene Sequences", "Out Of Sample Data Points", "World Fungi Gene Sequence Dataset", "Autoencoder Based Dimension Reduction Model", "Dimensionality Reduction", "Fungi", "Analytical Models", "Computational Modeling", "Biological System Modeling", "Neural Networks", "Memory Management", "Autoencoder", "Multidimensional Scaling", "Gene Sequences", "Neural Networks" ], "authors": [ { "affiliation": "SICE, Indiana University,Bloomington,IN,USA", "fullName": "Pulasthi Wickramasinghe", "givenName": "Pulasthi", "surname": "Wickramasinghe", "__typename": "ArticleAuthorType" }, { "affiliation": "SICE, Indiana University,Bloomington,IN,USA", "fullName": "Geoffrey Fox Sice", "givenName": "Geoffrey Fox", "surname": "Sice", "__typename": "ArticleAuthorType" } ], "idPrefix": "cds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "516-523", "year": "2021", "issn": null, "isbn": "978-1-6654-0428-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "042800a510", "articleId": "1uZxAwGcUus", "__typename": "AdjacentArticleType" }, "next": { "fno": "042800a524", "articleId": "1uZxxjDHWzC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2006/0054/0/01639298", "title": "Achieving strong scaling with NAMD on Blue Gene/L", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2006/01639298/12OmNCga1Rb", "parentPublication": { "id": "proceedings/ipdps/2006/0054/0", "title": "Proceedings 20th IEEE International Parallel & Distributed Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/252140202", "title": "Locally Multidimensional Scaling for Nonlinear Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252140202/12OmNx9WSYj", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicn/2010/4254/0/4254a424", "title": "Sequential Sequence Mining Technique in Large Database of Gene Sequence", "doi": null, "abstractUrl": "/proceedings-article/cicn/2010/4254a424/12OmNxGAKR6", "parentPublication": { "id": "proceedings/cicn/2010/4254/0", "title": "Computational Intelligence and Communication Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2008/3452/0/3452a376", "title": "Systematic Evaluation of Scaling Methods for Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2008/3452a376/12OmNy50g3A", "parentPublication": { "id": "proceedings/bibm/2008/3452/0", "title": "2008 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2004/8779/0/87790057", "title": "Steerable, Progressive Multidimensional Scaling", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2004/87790057/12OmNzV70oY", "parentPublication": { "id": "proceedings/ieee-infovis/2004/8779/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/01/08417448", "title": "Class Balanced Multifactor Dimensionality Reduction to Detect Gene&#x2013;Gene Interactions", "doi": null, "abstractUrl": "/journal/tb/2020/01/08417448/13rRUwjGoEG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2021/0668/0/066800a687", "title": "Examing and Evaluating Dimension Reduction Algorithms for Classifying Alzheimer&#x2019;s Diseases using Gene Expression Data", "doi": null, "abstractUrl": "/proceedings-article/msn/2021/066800a687/1CxzOX5024g", "parentPublication": { "id": "proceedings/msn/2021/0668/0", "title": "2021 17th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09908526", "title": "Uncertainty-Aware Multidimensional Scaling", "doi": null, "abstractUrl": "/journal/tg/2023/01/09908526/1HbauB9Srsc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aike/2019/1488/0/148800a211", "title": "Empirical Comparison between Autoencoders and Traditional Dimensionality Reduction Methods", "doi": null, "abstractUrl": "/proceedings-article/aike/2019/148800a211/1ckrBdbs7Ru", "parentPublication": { "id": "proceedings/aike/2019/1488/0", "title": "2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09492780", "title": "scRAE: Deterministic Regularized Autoencoders With Flexible Priors for Clustering Single-Cell Gene Expression Data", "doi": null, "abstractUrl": "/journal/tb/2022/05/09492780/1vq0DffSnDi", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC3FG3S", "title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)", "acronym": "isdea", "groupId": "1800333", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNClQ0Am", "doi": "10.1109/ISDEA.2012.106", "title": "Classification of Multivariate Time Series Using Supervised Locality Preserving Projection", "normalizedTitle": "Classification of Multivariate Time Series Using Supervised Locality Preserving Projection", "abstract": "Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised Locality Preserving Projection (LPP) is proposed. MTS samples are projected into the PCA (principal component analysis) subspace by throwing away the smallest principal components, and then, the MTS samples in the PCA subspace are projected into a lower-dimensional space by using supervised LPP. Experimental results performed on five real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.", "abstracts": [ { "abstractType": "Regular", "content": "Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised Locality Preserving Projection (LPP) is proposed. MTS samples are projected into the PCA (principal component analysis) subspace by throwing away the smallest principal components, and then, the MTS samples in the PCA subspace are projected into a lower-dimensional space by using supervised LPP. Experimental results performed on five real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multivariate time series (MTS) are used in very broad areas such as finance, medicine, multimedia and speech recognition. Most of existing approaches for MTS classification are not designed for preserving the within-class local structure of the MTS dataset. The within-class local structure is important when a classifier is used for classification. In this paper, a new feature extraction method for MTS classification based on supervised Locality Preserving Projection (LPP) is proposed. MTS samples are projected into the PCA (principal component analysis) subspace by throwing away the smallest principal components, and then, the MTS samples in the PCA subspace are projected into a lower-dimensional space by using supervised LPP. Experimental results performed on five real-world datasets demonstrate the effectiveness of our proposed approach for MTS classification.", "fno": "06456667", "keywords": [ "Feature Extraction", "Pattern Classification", "Principal Component Analysis", "Time Series", "Multivariate Time Series", "Supervised Locality Preserving Projection", "MTS Classification", "MTS Dataset", "Feature Extraction", "PCA", "Principal Component Analysis", "Error Analysis", "Time Series Analysis", "Support Vector Machines", "Principal Component Analysis", "Training", "Electrocardiography", "Feature Extraction", "Multivariate Time Series", "Supervised Locality Preserving Projection", "Singular Value Decomposition", "Classification" ], "authors": [ { "affiliation": null, "fullName": "Weng Xiaoqing", "givenName": "Weng", "surname": "Xiaoqing", "__typename": "ArticleAuthorType" } ], "idPrefix": "isdea", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-01-01T00:00:00", "pubType": "proceedings", "pages": "428-431", "year": "2013", "issn": null, "isbn": "978-1-4673-4893-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06456672", "articleId": "12OmNA14Ab4", "__typename": "AdjacentArticleType" }, "next": { "fno": "06456660", "articleId": "12OmNz2C1t3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2008/2174/0/04761132", "title": "Ridge Regression for Two Dimensional Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761132/12OmNAYoKw5", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2007/2929/0/29290791", "title": "Iterative Locality Preserving Projection for Image Retrieval", "doi": null, "abstractUrl": "/proceedings-article/icig/2007/29290791/12OmNAio74s", "parentPublication": { "id": "proceedings/icig/2007/2929/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2010/4212/1/4212a734", "title": "Fault Diagnosis in Industrial Process Based on Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/isdea/2010/4212a734/12OmNAu1Fk7", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762b034", "title": "Face Image Super-Resolution Using Two-dimensional Locality Preserving Projection", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762b034/12OmNBQC87H", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/4/3119d613", "title": "Locality Preserving Projection in Orthogonal Domain", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119d613/12OmNvTTckq", "parentPublication": { "id": "proceedings/cisp/2008/3119/4", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcsn/2014/7091/0/7091a348", "title": "Automatic Digital Modulation Recognition Based on Locality Preserved Projection", "doi": null, "abstractUrl": "/proceedings-article/wcsn/2014/7091a348/12OmNwDj13S", "parentPublication": { "id": "proceedings/wcsn/2014/7091/0", "title": "2014 International Conference on Wireless Communication and Sensor Network", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2012/3072/0/06449502", "title": "Classification of Multivariate Time Series Using Supervised Isomap", "doi": null, "abstractUrl": "/proceedings-article/gcis/2012/06449502/12OmNyuPLfb", "parentPublication": { "id": "proceedings/gcis/2012/3072/0", "title": "2012 Third Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a214", "title": "Two-Stage Tensor Locality-Preserving Projection Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a214/12OmNzICELs", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsps/2009/3654/0/3654a718", "title": "Identification of Human Faces Using Orthogonal Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/icsps/2009/3654a718/12OmNzl3WVz", "parentPublication": { "id": "proceedings/icsps/2009/3654/0", "title": "2009 International Conference on Signal Processing Systems (ICSPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09999484", "title": "Time-Varying Gaussian Markov Random Fields Learning for Multivariate Time Series Clustering", "doi": null, "abstractUrl": "/journal/tk/5555/01/09999484/1JrMyTGTtNC", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNscfI2d", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "acronym": "icm", "groupId": "1800613", "volume": "2", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNvnOwvc", "doi": "10.1109/ICM.2011.306", "title": "Multivariate Time Series Analysis in Corporate Decision-Making Application", "normalizedTitle": "Multivariate Time Series Analysis in Corporate Decision-Making Application", "abstract": "In order to solve nonlinear, non-stationary and complex problem with the time series in practical production and life, a multiple regression model for time series analysis is used in this paper. By introducing the principle of multiple regression, the multivariate time series analysis model not only overcome random factors of the time series, but also consider the many factors affecting the development of things, so as to improve forecasting accuracy and increase the reliability of predictio. For illustration, an example of a business forecast is utilized to show the feasibility of the multivariate time series analysis model in solving nonlinear, non-stationary and complex problem with the time series in practical production and life. Empirical results show that using the model in the case of known factors, combined with experimental data, can effective forecast for corporate earnings. This multivariate time series analysis model effective solution to the nonlinear time series, non-stationary and complex issues, so as to provide decision-making basis with an accurate quantitative and intuitive for decision makers.", "abstracts": [ { "abstractType": "Regular", "content": "In order to solve nonlinear, non-stationary and complex problem with the time series in practical production and life, a multiple regression model for time series analysis is used in this paper. By introducing the principle of multiple regression, the multivariate time series analysis model not only overcome random factors of the time series, but also consider the many factors affecting the development of things, so as to improve forecasting accuracy and increase the reliability of predictio. For illustration, an example of a business forecast is utilized to show the feasibility of the multivariate time series analysis model in solving nonlinear, non-stationary and complex problem with the time series in practical production and life. Empirical results show that using the model in the case of known factors, combined with experimental data, can effective forecast for corporate earnings. This multivariate time series analysis model effective solution to the nonlinear time series, non-stationary and complex issues, so as to provide decision-making basis with an accurate quantitative and intuitive for decision makers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to solve nonlinear, non-stationary and complex problem with the time series in practical production and life, a multiple regression model for time series analysis is used in this paper. By introducing the principle of multiple regression, the multivariate time series analysis model not only overcome random factors of the time series, but also consider the many factors affecting the development of things, so as to improve forecasting accuracy and increase the reliability of predictio. For illustration, an example of a business forecast is utilized to show the feasibility of the multivariate time series analysis model in solving nonlinear, non-stationary and complex problem with the time series in practical production and life. Empirical results show that using the model in the case of known factors, combined with experimental data, can effective forecast for corporate earnings. This multivariate time series analysis model effective solution to the nonlinear time series, non-stationary and complex issues, so as to provide decision-making basis with an accurate quantitative and intuitive for decision makers.", "fno": "4522b374", "keywords": [ "Time Series Analysis", "Multiple Regression Model", "Forecast" ], "authors": [ { "affiliation": null, "fullName": "Yatao Li", "givenName": "Yatao", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fen Ying", "givenName": "Fen", "surname": "Ying", "__typename": "ArticleAuthorType" } ], "idPrefix": "icm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "374-376", "year": "2011", "issn": null, "isbn": "978-0-7695-4522-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4522b370", "articleId": "12OmNxAlzZX", "__typename": "AdjacentArticleType" }, "next": { "fno": "4522b377", "articleId": "12OmNyLiuA2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2007/2874/1/28740453", "title": "A New Metric for Classification of Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/fskd/2007/28740453/12OmNxdVgK9", "parentPublication": { "id": "proceedings/fskd/2007/2874/1", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a914", "title": "Interaction-Based Clustering of Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a914/12OmNxveNJb", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a103", "title": "Granger Causality for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a103/12OmNzahc9L", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258216", "title": "Solar flare prediction using multivariate time series decision trees", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258216/17D45WHONsg", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a083", "title": "Sequence Attention for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a083/1CuhWbfuEYU", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2021/2420/0/242000a486", "title": "Historical time series prediction framework based on recurrent neural network using multivariate time series", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2021/242000a486/1Eb2GFXOMw0", "parentPublication": { "id": "proceedings/iiai-aai/2021/2420/0", "title": "2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09856934", "title": "Multiview Unsupervised Shapelet Learning for Multivariate Time Series Clustering", "doi": null, "abstractUrl": "/journal/tp/2023/04/09856934/1FSY5sQC3tu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600b644", "title": "Unsupervised 4D LiDAR Moving Object Segmentation in Stationary Settings with Multivariate Occupancy Time Series", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600b644/1L8qrCqPxPq", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiipcc/2022/6287/0/628700a299", "title": "Multivariate time series prediction based on graph convolutional neural networks", "doi": null, "abstractUrl": "/proceedings-article/aiipcc/2022/628700a299/1LR9XZb9AXu", "parentPublication": { "id": "proceedings/aiipcc/2022/6287/0", "title": "2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006112", "title": "Utilizing Multivariate Time Series for Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006112/1hJsko814TC", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAI", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzahc9L", "doi": "10.1109/ICBK.2017.36", "title": "Granger Causality for Multivariate Time Series Classification", "normalizedTitle": "Granger Causality for Multivariate Time Series Classification", "abstract": "Multivariate time series, which is a set of ordered observations for multiple variables, is pervasively generated in air condition, traffic, entertainment, etc. Echo State Network has shown promising performance for processing multivariate time series due to its ability to approximate sequential dynamics. However, the intrinsic relationships among time series have not been generally analyzed in the previous Echo State Network based methods. These relationships may help reveal the intrinsic characteristics of multivariate time series and benefit the classification performance. In this paper, we propose a novel method for approximating the sequential dynamics and learning the relationship among multiple variables explicitly in a unified framework. We learn a model for each multivariate time series and evaluate the distance of the original multivariate time series by the distance of their models. The relationship among variables in a multivariate time series is learnt according to Granger causality. We further constrain the sparsity of the learnt time series models to find the Focal series which help explain all the series. Experiments on benchmark datasets demonstrate superior classification performance of the proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "Multivariate time series, which is a set of ordered observations for multiple variables, is pervasively generated in air condition, traffic, entertainment, etc. Echo State Network has shown promising performance for processing multivariate time series due to its ability to approximate sequential dynamics. However, the intrinsic relationships among time series have not been generally analyzed in the previous Echo State Network based methods. These relationships may help reveal the intrinsic characteristics of multivariate time series and benefit the classification performance. In this paper, we propose a novel method for approximating the sequential dynamics and learning the relationship among multiple variables explicitly in a unified framework. We learn a model for each multivariate time series and evaluate the distance of the original multivariate time series by the distance of their models. The relationship among variables in a multivariate time series is learnt according to Granger causality. We further constrain the sparsity of the learnt time series models to find the Focal series which help explain all the series. Experiments on benchmark datasets demonstrate superior classification performance of the proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multivariate time series, which is a set of ordered observations for multiple variables, is pervasively generated in air condition, traffic, entertainment, etc. Echo State Network has shown promising performance for processing multivariate time series due to its ability to approximate sequential dynamics. However, the intrinsic relationships among time series have not been generally analyzed in the previous Echo State Network based methods. These relationships may help reveal the intrinsic characteristics of multivariate time series and benefit the classification performance. In this paper, we propose a novel method for approximating the sequential dynamics and learning the relationship among multiple variables explicitly in a unified framework. We learn a model for each multivariate time series and evaluate the distance of the original multivariate time series by the distance of their models. The relationship among variables in a multivariate time series is learnt according to Granger causality. We further constrain the sparsity of the learnt time series models to find the Focal series which help explain all the series. Experiments on benchmark datasets demonstrate superior classification performance of the proposed method.", "fno": "3120a103", "keywords": [ "Time Series Analysis", "Reservoirs", "Hidden Markov Models", "Kernel", "Neurons", "Silicon", "Computational Modeling", "Granger Causality", "Echo State Network", "Multivariate Time Series", "Focal Serie" ], "authors": [ { "affiliation": null, "fullName": "Dandan Yang", "givenName": "Dandan", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Huanhuan Chen", "givenName": "Huanhuan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yinlong Song", "givenName": "Yinlong", "surname": "Song", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhichen Gong", "givenName": "Zhichen", "surname": "Gong", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "103-110", "year": "2017", "issn": null, "isbn": "978-1-5386-3120-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3120a096", "articleId": "12OmNxWuib3", "__typename": "AdjacentArticleType" }, "next": { "fno": "3120a111", "articleId": "12OmNApu5EA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mcsi/2015/8673/0/8673a086", "title": "Multivariate Chaotic Time Series Prediction Using a Wavelet Diagonal Echo State Network", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2015/8673a086/12OmNAoUTbv", "parentPublication": { "id": "proceedings/mcsi/2015/8673/0", "title": "2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2016/6167/0/07838253", "title": "Time Series Classification Using Time Warping Invariant Echo State Networks", "doi": null, "abstractUrl": "/proceedings-article/icmla/2016/07838253/12OmNB1wkIL", "parentPublication": { "id": "proceedings/icmla/2016/6167/0", "title": "2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837993", "title": "Deep Convolutional Factor Analyser for Multivariate Time Series Modeling", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837993/12OmNqHItGP", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b074", "title": "Granger Causality for Time-Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b074/12OmNzYwccd", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a692", "title": "The Application of SHESN on Financial Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a692/12OmNzzfTlD", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a760", "title": "Disjoint-CNN for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a760/1AjSRWLpF4Y", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194461", "title": "Learning Wasserstein Distance-Based Gaussian Graphical Model for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194461/1n2niwFQThm", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219631", "title": "Using DenseNet for IoT multivariate time series classification", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219631/1nRPlJJpt9S", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a972", "title": "Inductive Granger Causal Modeling for Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a972/1r54F2RY7qE", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2021/3483/0/348300a190", "title": "A Similarity Measurement for Multivariate Time Series Based on Variable Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2021/348300a190/1xNNqRvqFbO", "parentPublication": { "id": "proceedings/bigdataservice/2021/3483/0", "title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRdd", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzxPTJX", "doi": "10.1109/ICDM.2014.153", "title": "An Examination of Multivariate Time Series Hashing with Applications to Health Care", "normalizedTitle": "An Examination of Multivariate Time Series Hashing with Applications to Health Care", "abstract": "As large-scale multivariate time series data become increasingly common in application domains, such as health care and traffic analysis, researchers are challenged to build efficient tools to analyze it and provide useful insights. Similarity search, as a basic operator for many machine learning and data mining algorithms, has been extensively studied before, leading to several efficient solutions. However, similarity search for multivariate time series data is intrinsically challenging because (1) there is no conclusive agreement on what is a good similarity metric for multivariate time series data and (2) calculating similarity scores between two time series is often computationally expensive. In this paper, we address this problem by applying a generalized hashing framework, namely kernelized locality sensitive hashing, to accelerate time series similarity search with a series of representative similarity metrics. Experiment results on three large-scale clinical data sets demonstrate the effectiveness of the proposed approach.", "abstracts": [ { "abstractType": "Regular", "content": "As large-scale multivariate time series data become increasingly common in application domains, such as health care and traffic analysis, researchers are challenged to build efficient tools to analyze it and provide useful insights. Similarity search, as a basic operator for many machine learning and data mining algorithms, has been extensively studied before, leading to several efficient solutions. However, similarity search for multivariate time series data is intrinsically challenging because (1) there is no conclusive agreement on what is a good similarity metric for multivariate time series data and (2) calculating similarity scores between two time series is often computationally expensive. In this paper, we address this problem by applying a generalized hashing framework, namely kernelized locality sensitive hashing, to accelerate time series similarity search with a series of representative similarity metrics. Experiment results on three large-scale clinical data sets demonstrate the effectiveness of the proposed approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As large-scale multivariate time series data become increasingly common in application domains, such as health care and traffic analysis, researchers are challenged to build efficient tools to analyze it and provide useful insights. Similarity search, as a basic operator for many machine learning and data mining algorithms, has been extensively studied before, leading to several efficient solutions. However, similarity search for multivariate time series data is intrinsically challenging because (1) there is no conclusive agreement on what is a good similarity metric for multivariate time series data and (2) calculating similarity scores between two time series is often computationally expensive. In this paper, we address this problem by applying a generalized hashing framework, namely kernelized locality sensitive hashing, to accelerate time series similarity search with a series of representative similarity metrics. Experiment results on three large-scale clinical data sets demonstrate the effectiveness of the proposed approach.", "fno": "4302a260", "keywords": [ "Time Series Analysis", "Kernel", "Time Measurement", "Databases", "Euclidean Distance", "Vectors", "Alignment", "Time Series", "Hashing", "Search", "Similarity", "Nearest Neighbor", "Kernel Methods", "Dynamic Time Warping" ], "authors": [ { "affiliation": null, "fullName": "David C. Kale", "givenName": "David C.", "surname": "Kale", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dian Gong", "givenName": "Dian", "surname": "Gong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhengping Che", "givenName": "Zhengping", "surname": "Che", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yan Liu", "givenName": "Yan", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gerard Medioni", "givenName": "Gerard", "surname": "Medioni", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Randall Wetzel", "givenName": "Randall", "surname": "Wetzel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Patrick Ross", "givenName": "Patrick", "surname": "Ross", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "260-269", "year": "2014", "issn": "1550-4786", "isbn": "978-1-4799-4302-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4302a250", "articleId": "12OmNwtn3oX", "__typename": "AdjacentArticleType" }, "next": { "fno": "4302a270", "articleId": "12OmNBTawt4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2016/5473/0/07837992", "title": "Matrix Profile I: All Pairs Similarity Joins for Time Series: A Unifying View That Includes Motifs, Discords and Shapelets", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837992/12OmNrAMF0n", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118c083", "title": "Collective Matrix Factorization Hashing for Multimodal Data", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c083/12OmNvonIGF", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118b955", "title": "Adaptive Object Retrieval with Kernel Reconstructive Hashing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118b955/12OmNwF0BU3", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2010/8507/0/05628635", "title": "The Similarity of Multivariate Time Series and Its Application", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2010/05628635/12OmNxVlTIO", "parentPublication": { "id": "proceedings/icmecg/2010/8507/0", "title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a914", "title": "Interaction-Based Clustering of Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a914/12OmNxveNJb", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2017/3120/0/3120a103", "title": "Granger Causality for Multivariate Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/icbk/2017/3120a103/12OmNzahc9L", "parentPublication": { "id": "proceedings/icbk/2017/3120/0", "title": "2017 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2021/2125/0/212500a057", "title": "Time Series Search Based on Locality Sensitive Hashing", "doi": null, "abstractUrl": "/proceedings-article/icaml/2021/212500a057/1B60V914C1q", "parentPublication": { "id": "proceedings/icaml/2021/2125/0", "title": "2021 3rd International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904933", "title": "PSEUDo: Interactive Pattern Search in Multivariate Time Series with Locality-Sensitive Hashing and Relevance Feedback", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904933/1H2lnRlp2o0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020729", "title": "Spatio-Temporal Based Architecture Topology Search for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020729/1KfQW8NLtLi", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2021/3483/0/348300a190", "title": "A Similarity Measurement for Multivariate Time Series Based on Variable Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2021/348300a190/1xNNqRvqFbO", "parentPublication": { "id": "proceedings/bigdataservice/2021/3483/0", "title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CuhMtnDJlu", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "acronym": "dsc", "groupId": "1815424", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1CuhWbfuEYU", "doi": "10.1109/DSC53577.2021.00019", "title": "Sequence Attention for Multivariate Time Series Forecasting", "normalizedTitle": "Sequence Attention for Multivariate Time Series Forecasting", "abstract": "Many real-world applications require the prediction of multivariate time series, including traffic route planning and electricity consumption organizing. Temporal data that arise in these real-world applications often involves mixed periodic temporal patterns and the dependencies of different series, which complicate this task. The typical transformer reviews the information at each time step and selects relevant information to help generate the outputs. However, it fails to capture complex dynamic interdependencies between different series. In this paper, we propose a novel attention mechanism to select relevant time series for multivariate time series forecasting. Then we propose a flexible multi-output strategy to avoid error accumulation in the inference phase. Finally, we apply the proposed model to several real-world tasks and achieve state-of-the-art performance in almost all cases.", "abstracts": [ { "abstractType": "Regular", "content": "Many real-world applications require the prediction of multivariate time series, including traffic route planning and electricity consumption organizing. Temporal data that arise in these real-world applications often involves mixed periodic temporal patterns and the dependencies of different series, which complicate this task. The typical transformer reviews the information at each time step and selects relevant information to help generate the outputs. However, it fails to capture complex dynamic interdependencies between different series. In this paper, we propose a novel attention mechanism to select relevant time series for multivariate time series forecasting. Then we propose a flexible multi-output strategy to avoid error accumulation in the inference phase. Finally, we apply the proposed model to several real-world tasks and achieve state-of-the-art performance in almost all cases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many real-world applications require the prediction of multivariate time series, including traffic route planning and electricity consumption organizing. Temporal data that arise in these real-world applications often involves mixed periodic temporal patterns and the dependencies of different series, which complicate this task. The typical transformer reviews the information at each time step and selects relevant information to help generate the outputs. However, it fails to capture complex dynamic interdependencies between different series. In this paper, we propose a novel attention mechanism to select relevant time series for multivariate time series forecasting. Then we propose a flexible multi-output strategy to avoid error accumulation in the inference phase. Finally, we apply the proposed model to several real-world tasks and achieve state-of-the-art performance in almost all cases.", "fno": "181500a083", "keywords": [ "Data Analysis", "Deep Learning Artificial Intelligence", "Feature Selection", "Time Series", "Multivariate Time Series Data Forecasting", "Traffic Route Planning", "Temporal Data", "Mixed Periodic Temporal Patterns", "Multivariate Time Series Prediction", "Transformer", "Flexible Multi Output Strategy", "Sequence Attention Mechanism", "Conferences", "Time Series Analysis", "Data Visualization", "Cyberspace", "Data Science", "Transformers", "Planning", "Multivariate Time Series", "Neural Network", "Transformer" ], "authors": [ { "affiliation": "Beijing University of Posts and Telecommunications,Dept. Computer Science,Beijing,China", "fullName": "Wenrui Wu", "givenName": "Wenrui", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "China Mobile Information Technology Co. Ltd.,Beijing,China", "fullName": "Tao Tao", "givenName": "Tao", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": "China Mobile Information Technology Co. Ltd.,Department of Big Data Platform,Beijing,China", "fullName": "Jing Shang", "givenName": "Jing", "surname": "Shang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications,Dept. Computer Science,Beijing,China", "fullName": "Ding Xiao", "givenName": "Ding", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications,Dept. Computer Science,Beijing,China", "fullName": "Chuan Shi", "givenName": "Chuan", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "China Mobile Information Technology Co. Ltd.,Department of Big Data Platform,Beijing,China", "fullName": "Yong Jiang", "givenName": "Yong", "surname": "Jiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "83-90", "year": "2021", "issn": null, "isbn": "978-1-6654-1815-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "181500a076", "articleId": "1Cui9pHC8OA", "__typename": "AdjacentArticleType" }, "next": { "fno": "181500a091", "articleId": "1Cui0Hiu4pi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/paap/2018/9403/0/940300a171", "title": "Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework", "doi": null, "abstractUrl": "/proceedings-article/paap/2018/940300a171/19JE9MimPza", "parentPublication": { "id": "proceedings/paap/2018/9403/0", "title": "2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021063", "title": "Decomposed Transformer with Frequency Attention for Multivariate Time Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021063/1KfRWG876bS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020675", "title": "Verification of Sparsity in the Attention Mechanism of Transformer for Anomaly Detection in Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020675/1KfTgnFCNOw", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a785", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a785/1LSPpseFmo0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a982", "title": "MTSMAE: Masked Autoencoders for Multivariate Time-Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a982/1MrFMafgble", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a967", "title": "How Features Benefit: Parallel Series Embedding for Multivariate Time Series Forecasting with Transformer", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a967/1MrFT581kiY", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10105527", "title": "Multi-Scale Adaptive Graph Neural Network for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/journal/tk/5555/01/10105527/1MtgpjufAOc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219721", "title": "A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219721/1nRPiypm51e", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a841", "title": "Multivariate Time-Series Anomaly Detection via Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a841/1r54xrHxN72", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378380", "title": "Combining Global and Sequential Patterns for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378380/1s64SdG49Hi", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KfQshha0dW", "title": "2022 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "10020192", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KfQW8NLtLi", "doi": "10.1109/BigData55660.2022.10020729", "title": "Spatio-Temporal Based Architecture Topology Search for Multivariate Time Series Prediction", "normalizedTitle": "Spatio-Temporal Based Architecture Topology Search for Multivariate Time Series Prediction", "abstract": "Multivariate time series (MTS) prediction has been widely applied in a diverse range of fields including electricity, economics, finance, and traffic. Many studies have successfully constructed spatial and temporal convolution modules called spatio-temporal block (ST-block) for multivariate time series prediction. However, existing methods need to manually design the architecture topology based on ST-blocks, which is time-consuming and requires extensive expert experience. In this paper, we propose a Spatio-Temporal based Architecture Topology Search (STATS) method for multivariate time series prediction, which can automatically design the ST-block for multivariate time series prediction. In the STATS, we construct static and dynamic graphs topologically to integrate both static and dynamic information to obtain more expressive ST-graphs for the prediction task. Then, STATS explores the architecture topology with the differentiable search algorithm based on ST-blocks automatically. Extensive experiments on four commonly used multivariate time series prediction benchmark datasets demonstrate that our proposed method STATS can outperform the state-of-the-art baseline models.", "abstracts": [ { "abstractType": "Regular", "content": "Multivariate time series (MTS) prediction has been widely applied in a diverse range of fields including electricity, economics, finance, and traffic. Many studies have successfully constructed spatial and temporal convolution modules called spatio-temporal block (ST-block) for multivariate time series prediction. However, existing methods need to manually design the architecture topology based on ST-blocks, which is time-consuming and requires extensive expert experience. In this paper, we propose a Spatio-Temporal based Architecture Topology Search (STATS) method for multivariate time series prediction, which can automatically design the ST-block for multivariate time series prediction. In the STATS, we construct static and dynamic graphs topologically to integrate both static and dynamic information to obtain more expressive ST-graphs for the prediction task. Then, STATS explores the architecture topology with the differentiable search algorithm based on ST-blocks automatically. Extensive experiments on four commonly used multivariate time series prediction benchmark datasets demonstrate that our proposed method STATS can outperform the state-of-the-art baseline models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multivariate time series (MTS) prediction has been widely applied in a diverse range of fields including electricity, economics, finance, and traffic. Many studies have successfully constructed spatial and temporal convolution modules called spatio-temporal block (ST-block) for multivariate time series prediction. However, existing methods need to manually design the architecture topology based on ST-blocks, which is time-consuming and requires extensive expert experience. In this paper, we propose a Spatio-Temporal based Architecture Topology Search (STATS) method for multivariate time series prediction, which can automatically design the ST-block for multivariate time series prediction. In the STATS, we construct static and dynamic graphs topologically to integrate both static and dynamic information to obtain more expressive ST-graphs for the prediction task. Then, STATS explores the architecture topology with the differentiable search algorithm based on ST-blocks automatically. Extensive experiments on four commonly used multivariate time series prediction benchmark datasets demonstrate that our proposed method STATS can outperform the state-of-the-art baseline models.", "fno": "10020729", "keywords": [ "Big Data", "Convolutional Neural Nets", "Graph Neural Networks", "Search Problems", "Time Series", "Big Data", "Differentiable Search Algorithm", "Dynamic Graphs", "Graph Neural Network", "MTS", "Multivariate Time Series Prediction", "Spatial Convolution Modules", "Spatio Temporal Based Architecture Topology Search", "Spatio Temporal Block", "ST Block", "ST Graphs", "Static Graphs", "STATS", "Temporal Convolution Modules", "Economics", "Network Topology", "Heuristic Algorithms", "Time Series Analysis", "Finance", "Big Data", "Predictive Models", "Multivariate Time Series Prediction", "Spatiotemporal Graph ST Graph", "Graph Neural Network", "Architecture Topology Search ATS" ], "authors": [ { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China", "fullName": "Xinqi Lyu", "givenName": "Xinqi", "surname": "Lyu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Hunan Electric Power Company Limited,Changsha,China", "fullName": "Yibo Chen", "givenName": "Yibo", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China", "fullName": "Jiamin Chen", "givenName": "Jiamin", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China", "fullName": "Xiangyue Liu", "givenName": "Xiangyue", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Central South University,School of Computer Science and Engineering,Changsha,China", "fullName": "Jianliang Gao", "givenName": "Jianliang", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1304-1309", "year": "2022", "issn": null, "isbn": "978-1-6654-8045-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10020643", "articleId": "1KfRc1vo65y", "__typename": "AdjacentArticleType" }, "next": { "fno": "10021089", "articleId": "1KfRJiz7RvO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2010/4257/0/4257a249", "title": "Spatio-Temporal Symbolization of Multidimensional Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a249/12OmNyeWdNk", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/12/06763045", "title": "Discovery of Temporal Associations in Multivariate Time Series", "doi": null, "abstractUrl": "/journal/tk/2014/12/06763045/13rRUxNW1Uh", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hase/2019/8540/0/854000a115", "title": "A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment", "doi": null, "abstractUrl": "/proceedings-article/hase/2019/854000a115/18IoVUIj4TS", "parentPublication": { "id": "proceedings/hase/2019/8540/0", "title": "2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b565", "title": "SMATE: Semi-Supervised Spatio-Temporal Representation Learning on Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b565/1Aqx8Cgv6Wk", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a083", "title": "Sequence Attention for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a083/1CuhWbfuEYU", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiipcc/2022/6287/0/628700a299", "title": "Multivariate time series prediction based on graph convolutional neural networks", "doi": null, "abstractUrl": "/proceedings-article/aiipcc/2022/628700a299/1LR9XZb9AXu", "parentPublication": { "id": "proceedings/aiipcc/2022/6287/0", "title": "2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a785", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a785/1LSPpseFmo0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a711", "title": "Order-Preserving Metric Learning for Mining Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a711/1r54x1W1l3W", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378059", "title": "Temporal Tensor Transformation Network for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378059/1s64RP9boLC", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378380", "title": "Combining Global and Sequential Patterns for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378380/1s64SdG49Hi", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LRkkolTh4I", "title": "2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing (AIIPCC)", "acronym": "aiipcc", "groupId": "10070113", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LR9XZb9AXu", "doi": "10.1109/AIIPCC57291.2022.00071", "title": "Multivariate time series prediction based on graph convolutional neural networks", "normalizedTitle": "Multivariate time series prediction based on graph convolutional neural networks", "abstract": "The advent of the big data era has led to the explosive growth of multivariate and multi-channel time series data. Multivariate time series, because of their high dimensional and Spatio-temporal correlation characteristics, make it difficult for classical statistical approaches to effectively model and efficiently handle the Spatio-temporal characteristics among data. Therefore, a multivariate time series prediction model based on a graph convolutional neural network is proposed better to explore the spatial relationships between multivariate time series and predict multivariate time series more accurately. The spatial correlation between each monitoring point in the data monitoring system is extracted using the graph convolutional neural network, and the temporal features in the sequences are processed using GRU. Finally, it is normalized. Experiments prove that the GCN-GRU model has higher prediction accuracy and better results than other commonly used prediction methods.", "abstracts": [ { "abstractType": "Regular", "content": "The advent of the big data era has led to the explosive growth of multivariate and multi-channel time series data. Multivariate time series, because of their high dimensional and Spatio-temporal correlation characteristics, make it difficult for classical statistical approaches to effectively model and efficiently handle the Spatio-temporal characteristics among data. Therefore, a multivariate time series prediction model based on a graph convolutional neural network is proposed better to explore the spatial relationships between multivariate time series and predict multivariate time series more accurately. The spatial correlation between each monitoring point in the data monitoring system is extracted using the graph convolutional neural network, and the temporal features in the sequences are processed using GRU. Finally, it is normalized. Experiments prove that the GCN-GRU model has higher prediction accuracy and better results than other commonly used prediction methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The advent of the big data era has led to the explosive growth of multivariate and multi-channel time series data. Multivariate time series, because of their high dimensional and Spatio-temporal correlation characteristics, make it difficult for classical statistical approaches to effectively model and efficiently handle the Spatio-temporal characteristics among data. Therefore, a multivariate time series prediction model based on a graph convolutional neural network is proposed better to explore the spatial relationships between multivariate time series and predict multivariate time series more accurately. The spatial correlation between each monitoring point in the data monitoring system is extracted using the graph convolutional neural network, and the temporal features in the sequences are processed using GRU. Finally, it is normalized. Experiments prove that the GCN-GRU model has higher prediction accuracy and better results than other commonly used prediction methods.", "fno": "628700a299", "keywords": [ "Big Data", "Convolutional Neural Nets", "Deep Learning Artificial Intelligence", "Graph Theory", "Recurrent Neural Nets", "Time Series", "Big Data Era", "Graph Convolutional Neural Network", "High Dimensional Spatio Temporal Correlation Characteristics", "Multichannel Time Series Data", "Multivariate Time Series Prediction Model", "Spatio Temporal Characteristics", "Correlation", "Computational Modeling", "Time Series Analysis", "Predictive Models", "Feature Extraction", "Data Models", "Topology", "Time Series Data", "GCN", "Deep Learning", "Spatiotemporal Characteristics", "GRU" ], "authors": [ { "affiliation": "School of Mathematics & Computer Science Wuhan Polytechnic University,Wuhan,Hubei", "fullName": "LaLao Gao", "givenName": "LaLao", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mathematics & Computer Science Wuhan Polytechnic University,Wuhan,Hubei", "fullName": "DingJun Zhang", "givenName": "DingJun", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mathematics & Computer Science Wuhan Polytechnic University,Wuhan,Hubei", "fullName": "MingChao Liao", "givenName": "MingChao", "surname": "Liao", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mathematics & Computer Science Wuhan Polytechnic University,Wuhan,Hubei", "fullName": "ZhiQiang Huang", "givenName": "ZhiQiang", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "aiipcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "299-303", "year": "2022", "issn": null, "isbn": "978-1-6654-6287-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "628700a294", "articleId": "1LR9ZQ7QtHi", "__typename": "AdjacentArticleType" }, "next": { "fno": "628700a304", "articleId": "1LRkohAF2Sc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csci/2021/5841/0/584100a026", "title": "ConvGRU-TSNet: A Novel Deep Learning Approach for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a026/1EpLxmbRI9q", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09950330", "title": "Multivariate Time Series Forecasting with Dynamic Graph Neural ODEs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09950330/1IiLdUwEK7m", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994993", "title": "Research on Bidirectional Recurrent Imputation of Multivariate Time Series for Clinical Outcomes Prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994993/1JC2IbVby2A", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020729", "title": "Spatio-Temporal Based Architecture Topology Search for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020729/1KfQW8NLtLi", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/5555/01/10026346", "title": "Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach", "doi": null, "abstractUrl": "/magazine/ex/5555/01/10026346/1KkXtjX73cQ", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a785", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a785/1LSPpseFmo0", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940265", "title": "Time Series Prediction Based on Temporal Convolutional Network", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940265/1gjROTu6oo0", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219721", "title": "A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219721/1nRPiypm51e", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a841", "title": "Multivariate Time-Series Anomaly Detection via Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a841/1r54xrHxN72", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378059", "title": "Temporal Tensor Transformation Network for Multivariate Time Series Prediction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378059/1s64RP9boLC", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LSP7qPzqTK", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "10074610", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LSPpseFmo0", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00130", "title": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "normalizedTitle": "Key Factor Selection Transformer for Multivariate Time Series Forecasting", "abstract": "Multivariate time series forecasting has a wide range of applications in transportation, meteorology, finance, etc. Multivariate time series include time-varying target series, exogenous time series and static data series. With the continuous expansion of dimension and scale, multiple exogenous time series can affect the target series in different degrees, and the time dependencies within different series become more complex. However, the previous researches neglect to efficiently identify the key factors and the temporal change information while learning historical time series. In order to solve the problem, we designed Key Factor Selection Transformer. It has three notable features: (i) A two-stage key factor identification-selection mechanism based on variable selection network and Prob-sparse self-attention, emphasizing the influence of key factors on prediction results. (ii) Use GRU network and self-attention mechanism to effectively learn local information and long-term correlation of historical time series. (iii) A new objective function, used to guide the learning of temporal change information. Experimental results on 4 real datasets show that our method significantly improve the prediction performance, providing a new solution to the multivariate time series forecasting problem.", "abstracts": [ { "abstractType": "Regular", "content": "Multivariate time series forecasting has a wide range of applications in transportation, meteorology, finance, etc. Multivariate time series include time-varying target series, exogenous time series and static data series. With the continuous expansion of dimension and scale, multiple exogenous time series can affect the target series in different degrees, and the time dependencies within different series become more complex. However, the previous researches neglect to efficiently identify the key factors and the temporal change information while learning historical time series. In order to solve the problem, we designed Key Factor Selection Transformer. It has three notable features: (i) A two-stage key factor identification-selection mechanism based on variable selection network and Prob-sparse self-attention, emphasizing the influence of key factors on prediction results. (ii) Use GRU network and self-attention mechanism to effectively learn local information and long-term correlation of historical time series. (iii) A new objective function, used to guide the learning of temporal change information. Experimental results on 4 real datasets show that our method significantly improve the prediction performance, providing a new solution to the multivariate time series forecasting problem.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multivariate time series forecasting has a wide range of applications in transportation, meteorology, finance, etc. Multivariate time series include time-varying target series, exogenous time series and static data series. With the continuous expansion of dimension and scale, multiple exogenous time series can affect the target series in different degrees, and the time dependencies within different series become more complex. However, the previous researches neglect to efficiently identify the key factors and the temporal change information while learning historical time series. In order to solve the problem, we designed Key Factor Selection Transformer. It has three notable features: (i) A two-stage key factor identification-selection mechanism based on variable selection network and Prob-sparse self-attention, emphasizing the influence of key factors on prediction results. (ii) Use GRU network and self-attention mechanism to effectively learn local information and long-term correlation of historical time series. (iii) A new objective function, used to guide the learning of temporal change information. Experimental results on 4 real datasets show that our method significantly improve the prediction performance, providing a new solution to the multivariate time series forecasting problem.", "fno": "199300a785", "keywords": [ "Forecasting Theory", "Learning Artificial Intelligence", "Recurrent Neural Nets", "Time Series", "Different Series", "Key Factor Selection Transformer", "Learning Historical Time Series", "Multiple Exogenous Time Series", "Multivariate Time Series Forecasting Problem", "Static Data Series", "Temporal Change Information", "Time Dependencies", "Time Varying Target Series", "Two Stage Key Factor Identification Selection Mechanism", "Smart Cities", "Input Variables", "Time Series Analysis", "Transportation", "Predictive Models", "Transformers", "Linear Programming", "Time Series Forecasting", "Deep Learning", "Attention Mechanism" ], "authors": [ { "affiliation": "College of Computer Science and Electronic Engineering Hunan University,Changsha,China", "fullName": "Jun Hu", "givenName": "Jun", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science and Electronic Engineering Hunan University,Changsha,China", "fullName": "Zehao Liu", "givenName": "Zehao", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "785-792", "year": "2022", "issn": null, "isbn": "979-8-3503-1993-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "199300a777", "articleId": "1LSP7K1Lvig", "__typename": "AdjacentArticleType" }, "next": { "fno": "199300a793", "articleId": "1LSPwm6YKJy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsc/2021/1815/0/181500a083", "title": "Sequence Attention for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a083/1CuhWbfuEYU", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021063", "title": "Decomposed Transformer with Frequency Attention for Multivariate Time Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021063/1KfRWG876bS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020675", "title": "Verification of Sparsity in the Attention Mechanism of Transformer for Anomaly Detection in Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020675/1KfTgnFCNOw", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300c110", "title": "Multivariate Time Series Imputation Based on Masked Autoencoding with Transformer", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300c110/1LSPhBB6ryo", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a982", "title": "MTSMAE: Masked Autoencoders for Multivariate Time-Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a982/1MrFMafgble", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a967", "title": "How Features Benefit: Parallel Series Embedding for Multivariate Time Series Forecasting with Transformer", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a967/1MrFT581kiY", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006192", "title": "Deep Learning for Non-stationary Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006192/1hJsE3dcmaI", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2020/4246/0/09350326", "title": "A Multivariate Time Series Approach for Forecasting of Electricity Demand in Bangladesh Using ARIMAX Model", "doi": null, "abstractUrl": "/proceedings-article/sti/2020/09350326/1rgGtGoRqw0", "parentPublication": { "id": "proceedings/sti/2020/4246/0", "title": "2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378380", "title": "Combining Global and Sequential Patterns for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378380/1s64SdG49Hi", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdataservice/2021/3483/0/348300a190", "title": "A Similarity Measurement for Multivariate Time Series Based on Variable Clustering", "doi": null, "abstractUrl": "/proceedings-article/bigdataservice/2021/348300a190/1xNNqRvqFbO", "parentPublication": { "id": "proceedings/bigdataservice/2021/3483/0", "title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJsko814TC", "doi": "10.1109/BigData47090.2019.9006112", "title": "Utilizing Multivariate Time Series for Semantic Segmentation", "normalizedTitle": "Utilizing Multivariate Time Series for Semantic Segmentation", "abstract": "The rise of connected devices and new communication technologies has resulted in an enormous wealth of multivariate time series data. The identification and extraction of meaningful segments by means of data mining algorithms has many applications. The problem of multivariate time series segmentation has been studied extensively with statistical methods that rely on the statistical properties of the time series for segmentation. We introduce a novel method, which exploits domain-specific information from the multivariate time series for segmentation. As a proof-of-principle, we demonstrate the feasibility of our method. Results show that after segmentation, the running time of anomaly detection algorithms reduces significantly, while preserving the effectiveness of anomaly detection.", "abstracts": [ { "abstractType": "Regular", "content": "The rise of connected devices and new communication technologies has resulted in an enormous wealth of multivariate time series data. The identification and extraction of meaningful segments by means of data mining algorithms has many applications. The problem of multivariate time series segmentation has been studied extensively with statistical methods that rely on the statistical properties of the time series for segmentation. We introduce a novel method, which exploits domain-specific information from the multivariate time series for segmentation. As a proof-of-principle, we demonstrate the feasibility of our method. Results show that after segmentation, the running time of anomaly detection algorithms reduces significantly, while preserving the effectiveness of anomaly detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The rise of connected devices and new communication technologies has resulted in an enormous wealth of multivariate time series data. The identification and extraction of meaningful segments by means of data mining algorithms has many applications. The problem of multivariate time series segmentation has been studied extensively with statistical methods that rely on the statistical properties of the time series for segmentation. We introduce a novel method, which exploits domain-specific information from the multivariate time series for segmentation. As a proof-of-principle, we demonstrate the feasibility of our method. Results show that after segmentation, the running time of anomaly detection algorithms reduces significantly, while preserving the effectiveness of anomaly detection.", "fno": "09006112", "keywords": [ "Data Mining", "Statistical Analysis", "Time Series", "Semantic Segmentation", "Multivariate Time Series Data", "Data Mining Algorithms", "Multivariate Time Series Segmentation", "Statistical Methods", "Domain Specific Information", "Anomaly Detection Algorithms", "Time Series Analysis", "Anomaly Detection", "Semantics", "Control Systems", "Sensors", "Microsoft Windows" ], "authors": [ { "affiliation": "Tilburg University,Jheronimus Academy of Data Science,The Netherlands", "fullName": "Frederique van Leeuwen", "givenName": "Frederique van", "surname": "Leeuwen", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "6125-6127", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09005576", "articleId": "1hJsqdcUVtS", "__typename": "AdjacentArticleType" }, "next": { "fno": "09005695", "articleId": "1hJrSZsp96g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csie/2009/3507/4/3507d483", "title": "C3M: A Classification Model for Multivariate Motion Time Series", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507d483/12OmNqI04Iz", "parentPublication": { "id": "proceedings/csie/2009/3507/4", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2008/3503/0/3503a349", "title": "A Robust Graph-Based Algorithm for Detection and Characterization of Anomalies in Noisy Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2008/3503a349/12OmNzdoN4K", "parentPublication": { "id": "proceedings/icdmw/2008/3503/0", "title": "2008 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartiot/2018/8543/0/854300a129", "title": "RADM:Real-Time Anomaly Detection in Multivariate Time Series Based on Bayesian Network", "doi": null, "abstractUrl": "/proceedings-article/smartiot/2018/854300a129/13HFz3dT8c2", "parentPublication": { "id": "proceedings/smartiot/2018/8543/0", "title": "2018 IEEE International Conference on Smart Internet of Things (SmartIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021063", "title": "Decomposed Transformer with Frequency Attention for Multivariate Time Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021063/1KfRWG876bS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10064694", "title": "Deep Federated Anomaly Detection for Multivariate Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10064694/1Lu4azdHKzS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a071", "title": "GAN-Based Anomaly Detection and Localization of Multivariate Time Series Data for Power Plant", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a071/1jdDAi1BxhS", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a841", "title": "Multivariate Time-Series Anomaly Detection via Graph Attention Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a841/1r54xrHxN72", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a543", "title": "Anomaly Detection of Periodic Multivariate Time Series under High Acquisition Frequency Scene in IoT", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a543/1rgGn4JIlB6", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400c225", "title": "DAEMON: Unsupervised Anomaly Detection and Interpretation for Multivariate Time Series", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400c225/1uGXwqDJSg0", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09618824", "title": "GAN-Based Anomaly Detection for Multivariate Time Series Using Polluted Training Set", "doi": null, "abstractUrl": "/journal/tk/5555/01/09618824/1yBALP5y0Xm", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrIJqqk", "title": "Knowledge Acquisition and Modeling, International Symposium on", "acronym": "kam", "groupId": "1002562", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNAPjA5V", "doi": "10.1109/KAM.2009.232", "title": "Risk Assessment of Supply Chain Based on BP Neural Network", "normalizedTitle": "Risk Assessment of Supply Chain Based on BP Neural Network", "abstract": "This paper discusses risk assessment of supply chain based on BP neural network. The risk assessment procedure is discussed and after the risk factors of supply chain identification and analysis, the risk assessment model is built with BP neural network. Through training of the model using MATLAB neural network toolbox and testing the model shows the preciseness and comprehensive practicability.", "abstracts": [ { "abstractType": "Regular", "content": "This paper discusses risk assessment of supply chain based on BP neural network. The risk assessment procedure is discussed and after the risk factors of supply chain identification and analysis, the risk assessment model is built with BP neural network. Through training of the model using MATLAB neural network toolbox and testing the model shows the preciseness and comprehensive practicability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper discusses risk assessment of supply chain based on BP neural network. The risk assessment procedure is discussed and after the risk factors of supply chain identification and analysis, the risk assessment model is built with BP neural network. Through training of the model using MATLAB neural network toolbox and testing the model shows the preciseness and comprehensive practicability.", "fno": "3888b186", "keywords": [ "Risk Assessment", "Supply Chain Risk", "BP Neural Network" ], "authors": [ { "affiliation": null, "fullName": "Ying Wang", "givenName": "Ying", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lei Huang", "givenName": "Lei", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "kam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "186-188", "year": "2009", "issn": null, "isbn": "978-0-7695-3888-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3888b182", "articleId": "12OmNyaGeKV", "__typename": "AdjacentArticleType" }, "next": { "fno": "3888b189", "articleId": "12OmNyYDDMp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2010/4077/3/4077e508", "title": "Study on Evaluation Index System for the Whole Risk Assessment of Supply Chains", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077e508/12OmNAYGlsM", "parentPublication": { "id": "proceedings/icicta/2010/4077/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2010/8507/0/05628697", "title": "Supply Chain Risk Assessment Based on AHP and Fuzzy Comprehensive Evaluation", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2010/05628697/12OmNBajTII", "parentPublication": { "id": "proceedings/icmecg/2010/8507/0", "title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2009/3876/1/3876a545", "title": "The Research on the BP Neural Network Application in Food Supply Chain Risk Management", "doi": null, "abstractUrl": "/proceedings-article/iciii/2009/3876a545/12OmNBtCCEQ", "parentPublication": { "id": "proceedings/iciii/2009/3876/1", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2010/4279/3/4279c461", "title": "Empirical Research about Credit Risk on Neural Network Based Bp Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iciii/2010/4279c461/12OmNC4eSof", "parentPublication": { "id": "proceedings/iciii/2010/4279/3", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270b341", "title": "The Application of DEA in the Risk Assessment of the Supply Chain Partner", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270b341/12OmNvTjZRo", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kam/2009/3888/2/3888b281", "title": "The Research on the BP Neural Network in the Food Security Risk Early Warning Applied under Supply Chain Environment", "doi": null, "abstractUrl": "/proceedings-article/kam/2009/3888b281/12OmNviHKh7", "parentPublication": { "id": "proceedings/kam/2009/3888/2", "title": "Knowledge Acquisition and Modeling, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2010/4198/1/4198a103", "title": "Research and Application of PSO-BP Neural Networks in Credit Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/iscid/2010/4198a103/12OmNwlqhOR", "parentPublication": { "id": "proceedings/iscid/2010/4198/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997c587", "title": "The Risk Assessment of E-commerce Based on BP Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997c587/12OmNwvVrDm", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwcs/2010/4003/0/4003a379", "title": "Method of Risk Assessment Based on Classified Security Protection and Fuzzy Neural Network", "doi": null, "abstractUrl": "/proceedings-article/apwcs/2010/4003a379/12OmNyL0Tk9", "parentPublication": { "id": "proceedings/apwcs/2010/4003/0", "title": "Wearable Computing Systems, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icm/2011/4522/4/4522d186", "title": "The Assessment of Supply Chain Risk Based on Scenario Analysis", "doi": null, "abstractUrl": "/proceedings-article/icm/2011/4522d186/12OmNyNzhy3", "parentPublication": { "id": "proceedings/icm/2011/4522/4", "title": "Information Technology, Computer Engineering and Management Sciences, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy6qfO0", "title": "Intelligent Computation Technology and Automation, International Conference on", "acronym": "icicta", "groupId": "1002487", "volume": "3", "displayVolume": "3", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNAtst56", "doi": "10.1109/ICICTA.2010.273", "title": "Research on Real-Time Network Security Risk Assessment and Forecast", "normalizedTitle": "Research on Real-Time Network Security Risk Assessment and Forecast", "abstract": "Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. However, current risk assessment methodologies focus on manual risk analysis of network during design or through periodic reviews. Techniques for real-time risk assessment are scarce. In this paper, we propose a novel real-time risk assessment method using fuzzy logic and Petri Nets. The proposed method enables decision analysts to better understand the complete evaluation process of network security risk assessment, Furthermore, this approach can predict the potential network risk and provide credible confidence scores of risk assessment. The experimental results show that the proposed method is very useful in network security risk assessment.", "abstracts": [ { "abstractType": "Regular", "content": "Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. However, current risk assessment methodologies focus on manual risk analysis of network during design or through periodic reviews. Techniques for real-time risk assessment are scarce. In this paper, we propose a novel real-time risk assessment method using fuzzy logic and Petri Nets. The proposed method enables decision analysts to better understand the complete evaluation process of network security risk assessment, Furthermore, this approach can predict the potential network risk and provide credible confidence scores of risk assessment. The experimental results show that the proposed method is very useful in network security risk assessment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. However, current risk assessment methodologies focus on manual risk analysis of network during design or through periodic reviews. Techniques for real-time risk assessment are scarce. In this paper, we propose a novel real-time risk assessment method using fuzzy logic and Petri Nets. The proposed method enables decision analysts to better understand the complete evaluation process of network security risk assessment, Furthermore, this approach can predict the potential network risk and provide credible confidence scores of risk assessment. The experimental results show that the proposed method is very useful in network security risk assessment.", "fno": "4077e084", "keywords": [ "Risk Assessment", "Risk Forecast", "Petri Nets", "Fuzzy Logic", "Network Security" ], "authors": [ { "affiliation": null, "fullName": "Niandong Liao", "givenName": "Niandong", "surname": "Liao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Feng Li", "givenName": "Feng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yun Song", "givenName": "Yun", "surname": "Song", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-05-01T00:00:00", "pubType": "proceedings", "pages": "84-87", "year": "2010", "issn": null, "isbn": "978-0-7695-4077-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4077e081", "articleId": "12OmNzTppy9", "__typename": "AdjacentArticleType" }, "next": { "fno": "4077e088", "articleId": "12OmNAkWvOc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2010/3962/1/3962a616", "title": "Application of GB/T20984 in Electric Power Information Security Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962a616/12OmNAKuoT4", "parentPublication": { "id": "proceedings/icmtma/2010/3962/1", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wism/2009/3817/0/3817a515", "title": "Immunity-Inspired Risk Assessment Approach for Network Security", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a515/12OmNApLGte", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isbim/2008/3560/2/3560b453", "title": "The Risk Assessment with Fuzzy Reasoning", "doi": null, "abstractUrl": "/proceedings-article/isbim/2008/3560b453/12OmNBLdKQZ", "parentPublication": { "id": "proceedings/isbim/2008/3560/2", "title": "Business and Information Management, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hase/2012/4912/0/4912a171", "title": "Fast Abstract: Software Selection Based on Quantitative Security Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/hase/2012/4912a171/12OmNBNM8ZB", "parentPublication": { "id": "proceedings/hase/2012/4912/0", "title": "2012 IEEE 14th International Symposium on High-Assurance Systems Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/3/3336e571", "title": "Information Security Risk Assessment Method Based on CORAS Frame", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336e571/12OmNBOll7t", "parentPublication": { "id": "proceedings/csse/2008/3336/3", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fgcn/2008/3431/2/3431b249", "title": "A Network Security Risk Assessment Framework Based on Game Theory", "doi": null, "abstractUrl": "/proceedings-article/fgcn/2008/3431b249/12OmNCb3fuC", "parentPublication": { "id": "proceedings/fgcn/2008/3431/1", "title": "Future Generation Communication and Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialcom/2010/4211/0/4211a952", "title": "Network Security Risk Assessment Using Bayesian Belief Networks", "doi": null, "abstractUrl": "/proceedings-article/socialcom/2010/4211a952/12OmNs5rl1M", "parentPublication": { "id": "proceedings/socialcom/2010/4211/0", "title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2010/4339/0/4339a176", "title": "Network Security Risk Assessment Based on Service Dependency Analysis", "doi": null, "abstractUrl": "/proceedings-article/icicse/2010/4339a176/12OmNy2rS2q", "parentPublication": { "id": "proceedings/icicse/2010/4339/0", "title": "2010 Fifth International Conference on Internet Computing for Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nss/2010/4159/0/4159a199", "title": "Business Process-Based Information Security Risk Assessment", "doi": null, "abstractUrl": "/proceedings-article/nss/2010/4159a199/12OmNzXnNoO", "parentPublication": { "id": "proceedings/nss/2010/4159/0", "title": "Network and System Security, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2013/4996/0/4996a442", "title": "Security Risk Assessment of Cloud Carrier", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2013/4996a442/12OmNzZWbFR", "parentPublication": { "id": "proceedings/ccgrid/2013/4996/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZc", "title": "Education Technology and Computer Science, International Workshop on", "acronym": "etcs", "groupId": "1002740", "volume": "3", "displayVolume": "3", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNqIhFQc", "doi": "10.1109/ETCS.2010.568", "title": "Design of the Natural Gas Pipeline Quantitative Risk Assessment System", "normalizedTitle": "Design of the Natural Gas Pipeline Quantitative Risk Assessment System", "abstract": "Due to large span across the region, the complex natural and social environment, inflammability and explosive of the transmission media, the safety management of long-distance natural gas pipeline is very difficult. In this paper, we adopt quantitative risk assessment method, base on GIS technology, network technology and database technology, then design the Natural Gas Pipeline Quantitative Risk Assessment System, to provide an effective safety management method for long-distance natural gas pipelines.", "abstracts": [ { "abstractType": "Regular", "content": "Due to large span across the region, the complex natural and social environment, inflammability and explosive of the transmission media, the safety management of long-distance natural gas pipeline is very difficult. In this paper, we adopt quantitative risk assessment method, base on GIS technology, network technology and database technology, then design the Natural Gas Pipeline Quantitative Risk Assessment System, to provide an effective safety management method for long-distance natural gas pipelines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to large span across the region, the complex natural and social environment, inflammability and explosive of the transmission media, the safety management of long-distance natural gas pipeline is very difficult. In this paper, we adopt quantitative risk assessment method, base on GIS technology, network technology and database technology, then design the Natural Gas Pipeline Quantitative Risk Assessment System, to provide an effective safety management method for long-distance natural gas pipelines.", "fno": "3987c303", "keywords": [ "GIS Technology", "Long Distance Natural Gas Pipeline", "Quantitative Risk Assessment", "System Design" ], "authors": [ { "affiliation": null, "fullName": "Guo Hainlin", "givenName": "Guo", "surname": "Hainlin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ni Xiaoyang", "givenName": "Ni", "surname": "Xiaoyang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuan Mei", "givenName": "Yuan", "surname": "Mei", "__typename": "ArticleAuthorType" } ], "idPrefix": "etcs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-03-01T00:00:00", "pubType": "proceedings", "pages": "303-306", "year": "2010", "issn": null, "isbn": "978-0-7695-3987-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3987c299", "articleId": "12OmNB836Hj", "__typename": "AdjacentArticleType" }, "next": { "fno": "3987c307", "articleId": "12OmNzt0IBd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccms/2010/3941/4/3941d226", "title": "Research on Dynamic Simulation for Leakage of Natural Gas Pipeline", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941d226/12OmNARiM1x", "parentPublication": { "id": "proceedings/iccms/2010/3941/4", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031b688", "title": "Research on Gas Station of Pipeline for Nondestructive Testing Technology", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031b688/12OmNBqv2mi", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997a808", "title": "Research on Water & Soil Conservation and Eco-restoration Management in West-East Natural Gas Pipeline Project of China", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997a808/12OmNwDACjw", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789b248", "title": "Steady-State Model and Its Application in Natural Gas during Transportation in Pipeline", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789b248/12OmNwF0Ca9", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2013/4932/0/4932a712", "title": "Natural Gas Pipeline Leakage Detection Based on FBG Strain Sensor", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a712/12OmNxveNQY", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270b297", "title": "Study on the Precautionary Indicator of Transmission Shortage for Natural Gas Pipeline Network", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270b297/12OmNy2Jt0l", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsem/2010/4223/1/4223a111", "title": "Thermal Calculation of a Buried Gas Pipeline", "doi": null, "abstractUrl": "/proceedings-article/icsem/2010/4223a111/12OmNzlUKBP", "parentPublication": { "id": "proceedings/icsem/2010/4223/1", "title": "2010 International Conference on System Science, Engineering Design and Manufacturing Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2010/4270/0/4270a254", "title": "Optimization of Large-Scale Natural Gas Pipeline Network Base on the Combined GASA Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270a254/12OmNzn38Zr", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2011/4501/0/4501a698", "title": "An Effective Internal Corrosion Rate Prediction Model for the Wet Natural Gas Gathering Pipeline", "doi": null, "abstractUrl": "/proceedings-article/iccis/2011/4501a698/12OmNzsrwkL", "parentPublication": { "id": "proceedings/iccis/2011/4501/0", "title": "2011 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedme/2020/8145/0/09122200", "title": "pplication of risk assessment technology on PE Gas Pipeline System of the Residential Area", "doi": null, "abstractUrl": "/proceedings-article/icedme/2020/09122200/1kRSAi5wUJG", "parentPublication": { "id": "proceedings/icedme/2020/8145/0", "title": "2020 3rd International Conference on Electron Device and Mechanical Engineering (ICEDME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNA0MYYX", "title": "Proceedings 11th International Symposium on Software Reliability Engineering. ISSRE 2000", "acronym": "issre", "groupId": "1000700", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNxVlTC9", "doi": "10.1109/ISSRE.2000.885873", "title": "A Methodology for Architectural-Level Risk Assessment Using Dynamic Metrics", "normalizedTitle": "A Methodology for Architectural-Level Risk Assessment Using Dynamic Metrics", "abstract": "Risk assessment is an essential process of every software risk management plan. Several risk assessment techniques are based on the subjective judgment of domain experts. Subjective risk assessment techniques are human intensive and error-prone. Risk assessment should be based on product attributes that we can quantitatively measure using product metrics.This paper presents a methodology for risk assessment at the early stages of the development lifecycle, namely the architecture level. We describe a heuristic risk assessment methodology that is based on dynamic metrics obtained from UML specifications. The methodology uses dynamic complexity and dynamic coupling metrics to define complexity factors for the architecture elements (components and connectors). Severity analysis is performed using Failure Mode and Effect Analysis (FMEA) as applied to the architecture simulation models.We combine severity and complexity factors to develop heuristic risk factors for the architecture components and connectors. Based on component dependency graphs - that were developed earlier for reliability analysis - and using analysis scenarios, we develop a risk assessment model and a risk analysis algorithm that aggregates risk factors of components and connectors to the architectural level.We show how to analyze the overall risk factor of the architecture as the function of the risk factors of its constituting components and connectors. A case study of a pacemaker is used to illustrate the application of the methodology.", "abstracts": [ { "abstractType": "Regular", "content": "Risk assessment is an essential process of every software risk management plan. Several risk assessment techniques are based on the subjective judgment of domain experts. Subjective risk assessment techniques are human intensive and error-prone. Risk assessment should be based on product attributes that we can quantitatively measure using product metrics.This paper presents a methodology for risk assessment at the early stages of the development lifecycle, namely the architecture level. We describe a heuristic risk assessment methodology that is based on dynamic metrics obtained from UML specifications. The methodology uses dynamic complexity and dynamic coupling metrics to define complexity factors for the architecture elements (components and connectors). Severity analysis is performed using Failure Mode and Effect Analysis (FMEA) as applied to the architecture simulation models.We combine severity and complexity factors to develop heuristic risk factors for the architecture components and connectors. Based on component dependency graphs - that were developed earlier for reliability analysis - and using analysis scenarios, we develop a risk assessment model and a risk analysis algorithm that aggregates risk factors of components and connectors to the architectural level.We show how to analyze the overall risk factor of the architecture as the function of the risk factors of its constituting components and connectors. A case study of a pacemaker is used to illustrate the application of the methodology.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Risk assessment is an essential process of every software risk management plan. Several risk assessment techniques are based on the subjective judgment of domain experts. Subjective risk assessment techniques are human intensive and error-prone. Risk assessment should be based on product attributes that we can quantitatively measure using product metrics.This paper presents a methodology for risk assessment at the early stages of the development lifecycle, namely the architecture level. We describe a heuristic risk assessment methodology that is based on dynamic metrics obtained from UML specifications. The methodology uses dynamic complexity and dynamic coupling metrics to define complexity factors for the architecture elements (components and connectors). Severity analysis is performed using Failure Mode and Effect Analysis (FMEA) as applied to the architecture simulation models.We combine severity and complexity factors to develop heuristic risk factors for the architecture components and connectors. Based on component dependency graphs - that were developed earlier for reliability analysis - and using analysis scenarios, we develop a risk assessment model and a risk analysis algorithm that aggregates risk factors of components and connectors to the architectural level.We show how to analyze the overall risk factor of the architecture as the function of the risk factors of its constituting components and connectors. A case study of a pacemaker is used to illustrate the application of the methodology.", "fno": "08070210", "keywords": [ "Risk Analysis", "Risk Assessment", "Risk Modeling", "Component Dependency Graphs", "And Dynamic Metrics" ], "authors": [ { "affiliation": "West Virginia University", "fullName": "Sherif M. Yacoub", "givenName": "Sherif M.", "surname": "Yacoub", "__typename": "ArticleAuthorType" }, { "affiliation": "West Virginia University", "fullName": "Hany H. Ammar", "givenName": "Hany H.", "surname": "Ammar", "__typename": "ArticleAuthorType" }, { "affiliation": "West Virginia University", "fullName": "Tom Robinson", "givenName": "Tom", "surname": "Robinson", "__typename": "ArticleAuthorType" } ], "idPrefix": "issre", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "210", "year": "2000", "issn": "1071-9458", "isbn": "0-7695-0807-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08070198", "articleId": "12OmNrJAe7w", "__typename": "AdjacentArticleType" }, "next": { "fno": "08070222", "articleId": "12OmNwDACB7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz61d8z", "title": "First International Conference on Availability, Reliability and Security (ARES'06)", "acronym": "ares", "groupId": "1001707", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNyS6RyY", "doi": "10.1109/ARES.2006.112", "title": "Risk Management and Risk Assessment at ENISA: Issues and Challenges", "normalizedTitle": "Risk Management and Risk Assessment at ENISA: Issues and Challenges", "abstract": "In this talk, the main directions followed in current and future work in the area of Risk Management and Risk Assessment at ENISA will be presented. The efforts in this area range from an initial inventory of Risk Management /Risk Assessment methods and tools up to the elaboration of interoperability, comparability and scalability issues. The technical issues of Risk Management / Risk Assessment that are on the agenda of the Agency for 2006 and beyond will be presented. Further, lessons learned within the ENISA ad hoc Working Group \"Risk Management and Risk Assessment\" as well as the essentials of the ENISA Work Programme 2006 in this area will be addressed.", "abstracts": [ { "abstractType": "Regular", "content": "In this talk, the main directions followed in current and future work in the area of Risk Management and Risk Assessment at ENISA will be presented. The efforts in this area range from an initial inventory of Risk Management /Risk Assessment methods and tools up to the elaboration of interoperability, comparability and scalability issues. The technical issues of Risk Management / Risk Assessment that are on the agenda of the Agency for 2006 and beyond will be presented. Further, lessons learned within the ENISA ad hoc Working Group \"Risk Management and Risk Assessment\" as well as the essentials of the ENISA Work Programme 2006 in this area will be addressed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this talk, the main directions followed in current and future work in the area of Risk Management and Risk Assessment at ENISA will be presented. The efforts in this area range from an initial inventory of Risk Management /Risk Assessment methods and tools up to the elaboration of interoperability, comparability and scalability issues. The technical issues of Risk Management / Risk Assessment that are on the agenda of the Agency for 2006 and beyond will be presented. Further, lessons learned within the ENISA ad hoc Working Group \"Risk Management and Risk Assessment\" as well as the essentials of the ENISA Work Programme 2006 in this area will be addressed.", "fno": "25670002", "keywords": [ "Risk Management", "Risk Assessment", "Interoperability Of Methods", "Comparability Of Methods", "Emerging Risks" ], "authors": [ { "affiliation": "ENISA - European Network and Information Security Agency", "fullName": "Louis Marinos", "givenName": "Louis", "surname": "Marinos", "__typename": "ArticleAuthorType" } ], "idPrefix": "ares", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-04-01T00:00:00", "pubType": "proceedings", "pages": "2-3", "year": "2006", "issn": null, "isbn": "0-7695-2567-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01625285", "articleId": "12OmNwCsdOR", "__typename": "AdjacentArticleType" }, "next": { "fno": "25670004", "articleId": "12OmNBTJIvC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmecg/2010/8507/0/05628700", "title": "Research on Risk Assessment in International Logistics", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2010/05628700/12OmNAoUTa6", "parentPublication": { "id": "proceedings/icmecg/2010/8507/0", "title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2010/8507/0/05628697", "title": "Supply Chain Risk Assessment Based on AHP and Fuzzy Comprehensive Evaluation", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2010/05628697/12OmNBajTII", "parentPublication": { "id": "proceedings/icmecg/2010/8507/0", "title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2008/3308/0/3308a963", "title": "Software Risk Assessment and Estimation Model", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2008/3308a963/12OmNCf1DiZ", "parentPublication": { "id": "proceedings/iccsit/2008/3308/0", "title": "2008 International Conference on Computer Science and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2009/3705/0/3705a414", "title": "An Integrated Risk Management Model for Financial Institutions", "doi": null, "abstractUrl": "/proceedings-article/bife/2009/3705a414/12OmNrJROZ3", "parentPublication": { "id": "proceedings/bife/2009/3705/0", "title": "2009 International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2000/0807/0/08070210", "title": "A Methodology for Architectural-Level Risk Assessment Using Dynamic Metrics", "doi": null, "abstractUrl": "/proceedings-article/issre/2000/08070210/12OmNxVlTC9", "parentPublication": { "id": "proceedings/issre/2000/0807/0", "title": "Proceedings 11th International Symposium on Software Reliability Engineering. ISSRE 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2011/4501/0/4501a387", "title": "Risk Summarization", "doi": null, "abstractUrl": "/proceedings-article/iccis/2011/4501a387/12OmNxVlTE6", "parentPublication": { "id": "proceedings/iccis/2011/4501/0", "title": "2011 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706b845", "title": "The Risk Assessment of Groundwater Pollution in the Dawu Water Source", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706b845/12OmNzlUKkI", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/cc/2016/03/06868985", "title": "A Risk Assessment Framework for Cloud Computing", "doi": null, "abstractUrl": "/journal/cc/2016/03/06868985/13rRUxly9fS", "parentPublication": { "id": "trans/cc", "title": "IEEE Transactions on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/conisoft/2018/6577/0/08645949", "title": "Risk Assessment Forum", "doi": null, "abstractUrl": "/proceedings-article/conisoft/2018/08645949/17QjJdS1Ub3", "parentPublication": { "id": "proceedings/conisoft/2018/6577/0", "title": "2018 6th International Conference in Software Engineering Research and Innovation (CONISOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edcc/2020/8936/0/893600a059", "title": "Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations", "doi": null, "abstractUrl": "/proceedings-article/edcc/2020/893600a059/1oa5B0rXg8U", "parentPublication": { "id": "proceedings/edcc/2020/8936/0", "title": "2020 16th European Dependable Computing Conference (EDCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgooOF7IpG", "title": "2014 21st Asia-Pacific Software Engineering Conference (APSEC)", "acronym": "apsec", "groupId": "1000681", "volume": "2", "displayVolume": "2", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNyuy9Tp", "doi": "10.1109/APSEC.2014.95", "title": "A CMMI-Based Automated Risk Assessment Framework", "normalizedTitle": "A CMMI-Based Automated Risk Assessment Framework", "abstract": "Risk assessment is crucial to the increase of software development project success. Current risk assessment approaches provide only a rough guide. Risk assessment experts and domain experts are required in conducting risk assessments in software projects. Therefore, traditional risk assessment approaches require extra activities besides development tasks, and possibly leading to extra costs. We believe that an effective risk assessment approach should be transparently embedded in software development process. This paper aims to present an automated risk assessment framework using CMMI and risk taxnomy as a guidance to develop a risk assessment model. A pragmatic approach will be applied as a basis in building this suggested risk prediction model and the case studies of our practice. These studies are considered as our proof of concept.", "abstracts": [ { "abstractType": "Regular", "content": "Risk assessment is crucial to the increase of software development project success. Current risk assessment approaches provide only a rough guide. Risk assessment experts and domain experts are required in conducting risk assessments in software projects. Therefore, traditional risk assessment approaches require extra activities besides development tasks, and possibly leading to extra costs. We believe that an effective risk assessment approach should be transparently embedded in software development process. This paper aims to present an automated risk assessment framework using CMMI and risk taxnomy as a guidance to develop a risk assessment model. A pragmatic approach will be applied as a basis in building this suggested risk prediction model and the case studies of our practice. These studies are considered as our proof of concept.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Risk assessment is crucial to the increase of software development project success. Current risk assessment approaches provide only a rough guide. Risk assessment experts and domain experts are required in conducting risk assessments in software projects. Therefore, traditional risk assessment approaches require extra activities besides development tasks, and possibly leading to extra costs. We believe that an effective risk assessment approach should be transparently embedded in software development process. This paper aims to present an automated risk assessment framework using CMMI and risk taxnomy as a guidance to develop a risk assessment model. A pragmatic approach will be applied as a basis in building this suggested risk prediction model and the case studies of our practice. These studies are considered as our proof of concept.", "fno": "07091218", "keywords": [ "Risk Management", "Software", "Planning", "Monitoring", "Taxonomy", "Availability", "Capability Maturity Model", "CMMI", "Software Development", "Risk Assessment" ], "authors": [ { "affiliation": null, "fullName": "Morakot Choetkiertikul", "givenName": "Morakot", "surname": "Choetkiertikul", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hoa Khanh Dam", "givenName": "Hoa Khanh", "surname": "Dam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aditya Ghose", "givenName": "Aditya", "surname": "Ghose", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thanwadee T. Sunetnanta", "givenName": "Thanwadee T.", "surname": "Sunetnanta", "__typename": "ArticleAuthorType" } ], "idPrefix": "apsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "63-68", "year": "2014", "issn": "1530-1362", "isbn": "978-1-4799-7425-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07091217", "articleId": "12OmNwDACAZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07091219", "articleId": "12OmNAle6GG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsea/2010/4144/0/4144a331", "title": "A Risk Assessment Model for Offshoring Using CMMI Quantitative Approach", "doi": null, "abstractUrl": "/proceedings-article/icsea/2010/4144a331/12OmNBW0vyK", "parentPublication": { "id": "proceedings/icsea/2010/4144/0", "title": "Software Engineering Advances, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2008/3308/0/3308a963", "title": "Software Risk Assessment and Estimation Model", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2008/3308a963/12OmNCf1DiZ", "parentPublication": { "id": "proceedings/iccsit/2008/3308/0", "title": "2008 International Conference on Computer Science and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic2e/2014/3766/0/3766a147", "title": "Cloud Computing: A Risk Assessment Model", "doi": null, "abstractUrl": "/proceedings-article/ic2e/2014/3766a147/12OmNviZlk9", "parentPublication": { "id": "proceedings/ic2e/2014/3766/0", "title": "2014 IEEE International Conference on Cloud Engineering (IC2E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwssd/2000/0884/0/08840105", "title": "Design and Development Assessment", "doi": null, "abstractUrl": "/proceedings-article/iwssd/2000/08840105/12OmNwE9OTi", "parentPublication": { "id": "proceedings/iwssd/2000/0884/0", "title": "Software Specification and Design, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2010/4081/0/4081a286", "title": "A Practical Availability Risk Assessment Framework in ITIL", "doi": null, "abstractUrl": "/proceedings-article/sose/2010/4081a286/12OmNwGZNCT", "parentPublication": { "id": "proceedings/sose/2010/4081/0", "title": "2010 Fifth IEEE International Symposium on Service Oriented System Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2009/3593/0/3593a041", "title": "Programming Risk Assessment Models for Online Security Evaluation Systems", "doi": null, "abstractUrl": "/proceedings-article/uksim/2009/3593a041/12OmNx1IwcL", "parentPublication": { "id": "proceedings/uksim/2009/3593/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2000/0807/0/08070210", "title": "A Methodology for Architectural-Level Risk Assessment Using Dynamic Metrics", "doi": null, "abstractUrl": "/proceedings-article/issre/2000/08070210/12OmNxVlTC9", "parentPublication": { "id": "proceedings/issre/2000/0807/0", "title": "Proceedings 11th International Symposium on Software Reliability Engineering. ISSRE 2000", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsps/2009/3654/0/3654a536", "title": "Cross-Cultural Risk Assessment Model", "doi": null, "abstractUrl": "/proceedings-article/icsps/2009/3654a536/12OmNym2bVm", "parentPublication": { "id": "proceedings/icsps/2009/3654/0", "title": "2009 International Conference on Signal Processing Systems (ICSPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2017/3035/1/3035a099", "title": "Risk Management: A Maturity Model Based on ISO 31000", "doi": null, "abstractUrl": "/proceedings-article/cbi/2017/3035a099/12OmNymjN1E", "parentPublication": { "id": "cbi/2017/3035/1", "title": "2017 IEEE 19th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit-csii-bcd/2017/3302/0/3302a019", "title": "Automated Risk Identification of CMMI Project Planning Using Ontology", "doi": null, "abstractUrl": "/proceedings-article/acit-csii-bcd/2017/3302a019/1cdOAeEEOA0", "parentPublication": { "id": "proceedings/acit-csii-bcd/2017/3302/0", "title": "2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Applied Informatics/2nd Intl Conf on Big Data, Cloud Computing, Data Science (ACIT-CSII-BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "181W9lQFnW2", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "acronym": "chase", "groupId": "1814404", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "181W9nHlku6", "doi": "10.1145/3278576.3278589", "title": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "normalizedTitle": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "abstract": "Rapid Upper Limb Assessment (RULA) is a posture driven ergonomic risk assessment method. The RULA is simple to apply, but consequently has substantial limitations because of limited force and joint angle resolutions. Using OpenSim to understand soft tissue loading and inertial measurement units (IMUs) to measure posture represents a novel approach and provides greater resolution. We simulated the upper limb in multiple postures and under various loading conditions using OpenSim. We compared five OpenSim model output metrics to RULA risk scores. Total joint reaction forces aligned best with RULA scores. Future work will incorporate IMUs, more simulations, and analyze longitudinal injury data to model and estimate ergonomic risk.", "abstracts": [ { "abstractType": "Regular", "content": "Rapid Upper Limb Assessment (RULA) is a posture driven ergonomic risk assessment method. The RULA is simple to apply, but consequently has substantial limitations because of limited force and joint angle resolutions. Using OpenSim to understand soft tissue loading and inertial measurement units (IMUs) to measure posture represents a novel approach and provides greater resolution. We simulated the upper limb in multiple postures and under various loading conditions using OpenSim. We compared five OpenSim model output metrics to RULA risk scores. Total joint reaction forces aligned best with RULA scores. Future work will incorporate IMUs, more simulations, and analyze longitudinal injury data to model and estimate ergonomic risk.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Rapid Upper Limb Assessment (RULA) is a posture driven ergonomic risk assessment method. The RULA is simple to apply, but consequently has substantial limitations because of limited force and joint angle resolutions. Using OpenSim to understand soft tissue loading and inertial measurement units (IMUs) to measure posture represents a novel approach and provides greater resolution. We simulated the upper limb in multiple postures and under various loading conditions using OpenSim. We compared five OpenSim model output metrics to RULA risk scores. Total joint reaction forces aligned best with RULA scores. Future work will incorporate IMUs, more simulations, and analyze longitudinal injury data to model and estimate ergonomic risk.", "fno": "720600a027", "keywords": [ "Biomechanics", "Computer Simulation", "Ergonomics", "Injuries", "Occupational Health", "Occupational Safety", "Risk Management", "Ergonomic Risk Assessment Method", "Joint Angle Resolutions", "Soft Tissue Loading", "Inertial Measurement Units", "Loading Conditions", "RULA Risk Scores", "Rapid Upper Limb Assessment", "Open Sim", "Joint Reaction Forces", "Ergonomic Risk Factor Assessment", "Load Modeling", "Muscles", "Ergonomics", "Computational Modeling", "Injuries", "Measurement Units", "Ergonomics", "IMU", "Open Sim" ], "authors": [ { "affiliation": "Dept. Mech. Eng., Univ. of Utah, Salt Lake City, UT, USA", "fullName": "Jonathan Mortensen", "givenName": "Jonathan", "surname": "Mortensen", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. Mech. Eng., Univ. of Utah, Salt Lake City, UT, USA", "fullName": "Mitja Trkov", "givenName": "Mitja", "surname": "Trkov", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. Mech. Eng., Univ. of Utah, Salt Lake City, UT, USA", "fullName": "Andrew Merryweather", "givenName": "Andrew", "surname": "Merryweather", "__typename": "ArticleAuthorType" } ], "idPrefix": "chase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-09-01T00:00:00", "pubType": "proceedings", "pages": "27-28", "year": "2018", "issn": null, "isbn": "978-1-5386-7206-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720600a025", "articleId": "181W9py1h29", "__typename": "AdjacentArticleType" }, "next": { "fno": "720600a029", "articleId": "181W9p15NWK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccvw/2017/1034/0/1034b408", "title": "Postural Assessment in Dentistry Based on Multiple Markers Tracking", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b408/12OmNx6g6e2", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/05/06654129", "title": "Assessing the Ability of a VR-Based Assembly Task Simulation to Evaluate PhysicalRisk Factors", "doi": null, "abstractUrl": "/journal/tg/2014/05/06654129/13rRUyuegp7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/inciscos/2018/7612/0/761200a042", "title": "Mobile Application for Ergonomic Analysis of the Sitting Posture of the Torso", "doi": null, "abstractUrl": "/proceedings-article/inciscos/2018/761200a042/17D45VWpMz6", "parentPublication": { "id": "proceedings/inciscos/2018/7612/0", "title": "2018 International Conference on Information Systems and Computer Science (INCISCOS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icim/2022/5174/0/517400a146", "title": "A Model aimed at Reducing Absenteeism by Redesigning Workspaces at School Supply Companies in the Plastics Industry", "doi": null, "abstractUrl": "/proceedings-article/icim/2022/517400a146/1FHqBHOpzlC", "parentPublication": { "id": "proceedings/icim/2022/5174/0", "title": "2022 8th International Conference on Information Management (ICIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912348", "title": "ErgoExplorer: Interactive Ergonomic Risk Assessment from Video Collections", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912348/1HeiX5L0HGo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/03/08826009", "title": "Automatic Sitting Pose Generation for Ergonomic Ratings of Chairs", "doi": null, "abstractUrl": "/journal/tg/2021/03/08826009/1eTOD4tcaSk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089629", "title": "Visualization and evaluation of ergonomic visual field parameters in first person virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089629/1jIxcLPaFR6", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpai/2020/4262/0/426200a268", "title": "The Risk Classification of Ergonomic Musculoskeletal Disorders in Work-related Repetitive Manual Handling Operations with Deep Learning Approaches", "doi": null, "abstractUrl": "/proceedings-article/icpai/2020/426200a268/1pZ16Qn0MOQ", "parentPublication": { "id": "proceedings/icpai/2020/4262/0", "title": "2020 International Conference on Pervasive Artificial Intelligence (ICPAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cTJfoCxsFa", "title": "2019 IEEE International Congress on Internet of Things (ICIOT)", "acronym": "iciot", "groupId": "1821944", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cTJg9vtvJS", "doi": "10.1109/ICIOT.2019.00024", "title": "ActSen - AI-Enabled Real-Time IoT-Based Ergonomic Risk Assessment System", "normalizedTitle": "ActSen - AI-Enabled Real-Time IoT-Based Ergonomic Risk Assessment System", "abstract": "Musculoskeletal Disorders (MSDs) are injuries and disorders that affect the human body's movement or musculoskeletal system. There are three primary ergonomic MSD risk factors, High task repetition, Forceful exertions and Repetitive awkward postures. Exposure to these workplace risk factors fatigue the worker's body beyond their ability to recover, leading to MSD. A variety of ergonomic risk assessment tools have been developed such as Rodgers Muscle Fatigue Analysis to help to evaluate the risk of MSD so that early intervention can be applied to prevent the development of an MSD. However, ergonomic risk assessment tools are usually carried out using subjective observational methods, which require a field expert performing a time-consuming analysis of the postures on site. Monitoring workers under staged environment and high manpower cost make observational methods impractical and not accurate to conduct ergonomic risk assessment especially for dynamic and nonroutine work. In this paper, ActSen, a real-time ergonomic risk assessment system is proposed. ActSen leverages on the recent development of embedded and Artificial Intelligent (AI) technologies. ActSen can continuously (a) acquire workers activities/postures data using various sensors, (b) process, classify and tabulate the workers movements using AI algorithms, (c) conduct real ergonomic risk assessment based on the detected activities/postures, and (d) output to interactive dashboard to facilitate smart scheduling and provide assistance when needed.", "abstracts": [ { "abstractType": "Regular", "content": "Musculoskeletal Disorders (MSDs) are injuries and disorders that affect the human body's movement or musculoskeletal system. There are three primary ergonomic MSD risk factors, High task repetition, Forceful exertions and Repetitive awkward postures. Exposure to these workplace risk factors fatigue the worker's body beyond their ability to recover, leading to MSD. A variety of ergonomic risk assessment tools have been developed such as Rodgers Muscle Fatigue Analysis to help to evaluate the risk of MSD so that early intervention can be applied to prevent the development of an MSD. However, ergonomic risk assessment tools are usually carried out using subjective observational methods, which require a field expert performing a time-consuming analysis of the postures on site. Monitoring workers under staged environment and high manpower cost make observational methods impractical and not accurate to conduct ergonomic risk assessment especially for dynamic and nonroutine work. In this paper, ActSen, a real-time ergonomic risk assessment system is proposed. ActSen leverages on the recent development of embedded and Artificial Intelligent (AI) technologies. ActSen can continuously (a) acquire workers activities/postures data using various sensors, (b) process, classify and tabulate the workers movements using AI algorithms, (c) conduct real ergonomic risk assessment based on the detected activities/postures, and (d) output to interactive dashboard to facilitate smart scheduling and provide assistance when needed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Musculoskeletal Disorders (MSDs) are injuries and disorders that affect the human body's movement or musculoskeletal system. There are three primary ergonomic MSD risk factors, High task repetition, Forceful exertions and Repetitive awkward postures. Exposure to these workplace risk factors fatigue the worker's body beyond their ability to recover, leading to MSD. A variety of ergonomic risk assessment tools have been developed such as Rodgers Muscle Fatigue Analysis to help to evaluate the risk of MSD so that early intervention can be applied to prevent the development of an MSD. However, ergonomic risk assessment tools are usually carried out using subjective observational methods, which require a field expert performing a time-consuming analysis of the postures on site. Monitoring workers under staged environment and high manpower cost make observational methods impractical and not accurate to conduct ergonomic risk assessment especially for dynamic and nonroutine work. In this paper, ActSen, a real-time ergonomic risk assessment system is proposed. ActSen leverages on the recent development of embedded and Artificial Intelligent (AI) technologies. ActSen can continuously (a) acquire workers activities/postures data using various sensors, (b) process, classify and tabulate the workers movements using AI algorithms, (c) conduct real ergonomic risk assessment based on the detected activities/postures, and (d) output to interactive dashboard to facilitate smart scheduling and provide assistance when needed.", "fno": "271400a076", "keywords": [ "Costing", "Ergonomics", "Injuries", "Internet Of Things", "Labour Resources", "Learning Artificial Intelligence", "Muscle", "Occupational Health", "Occupational Safety", "Risk Analysis", "Scheduling", "Sensors", "Workplace Risk Factors", "Real Time Io T Based Ergonomic Risk Assessment System", "Injuries", "Act Sen System", "Artificial Intelligent Technologies", "Musculoskeletal Disorders", "Human Body Movement", "High Task Repetition", "Forceful Exertions", "Repetitive Awkward Postures", "Rodgers Muscle Fatigue Analysis", "Subjective Observational Method", "Workers Monitoring", "Manpower Cost", "Embedded Technologies", "Sensors", "Smart Scheduling", "Machine Learning", "Musculoskeletal Disorders", "Muscle Fatigue Analysis", "Artificial Intelligence", "Machine Learning", "Io T" ], "authors": [ { "affiliation": "Nanyang Polytechnic", "fullName": "Jia Xin Low", "givenName": "Jia Xin", "surname": "Low", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Polytechnic", "fullName": "Yongmei Wei", "givenName": "Yongmei", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Polytechnic", "fullName": "Joshua Chow", "givenName": "Joshua", "surname": "Chow", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Polytechnic", "fullName": "Iskandar F.B. Ali", "givenName": "Iskandar F.B.", "surname": "Ali", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciot", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "76-78", "year": "2019", "issn": null, "isbn": "978-1-7281-2714-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "271400a108", "articleId": "1cTJhjBiWZO", "__typename": "AdjacentArticleType" }, "next": { "fno": "271400a117", "articleId": "1cTJgfOl9QI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsn-w/2018/6553/0/655301a065", "title": "Stateless Security Risk Assessment for Dynamic Networks", "doi": null, "abstractUrl": "/proceedings-article/dsn-w/2018/655301a065/12OmNBOUxor", "parentPublication": { "id": "proceedings/dsn-w/2018/6553/0", "title": "2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732499", "title": "Detecting high-risk regions for pressure ulcer risk assessment", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732499/12OmNBfZSlP", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034b408", "title": "Postural Assessment in Dentistry Based on Multiple Markers Tracking", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034b408/12OmNx6g6e2", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1998/5133/1/51330297", "title": "A tutorial on ergonomic and process modeling using QUEST and IGRIP", "doi": null, "abstractUrl": "/proceedings-article/wsc/1998/51330297/12OmNySosLv", "parentPublication": { "id": "proceedings/wsc/1998/5133/1", "title": "Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a027", "title": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a027/181W9nHlku6", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icim/2022/5174/0/517400a146", "title": "A Model aimed at Reducing Absenteeism by Redesigning Workspaces at School Supply Companies in the Plastics Industry", "doi": null, "abstractUrl": "/proceedings-article/icim/2022/517400a146/1FHqBHOpzlC", "parentPublication": { "id": "proceedings/icim/2022/5174/0", "title": "2022 8th International Conference on Information Management (ICIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912348", "title": "ErgoExplorer: Interactive Ergonomic Risk Assessment from Video Collections", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912348/1HeiX5L0HGo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2022/5537/0/553700a582", "title": "Risk assessment to design business process incorporating AI tasks", "doi": null, "abstractUrl": "/proceedings-article/apsec/2022/553700a582/1KOvclsHHFu", "parentPublication": { "id": "proceedings/apsec/2022/5537/0", "title": "2022 29th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpai/2020/4262/0/426200a268", "title": "The Risk Classification of Ergonomic Musculoskeletal Disorders in Work-related Repetitive Manual Handling Operations with Deep Learning Approaches", "doi": null, "abstractUrl": "/proceedings-article/icpai/2020/426200a268/1pZ16Qn0MOQ", "parentPublication": { "id": "proceedings/icpai/2020/4262/0", "title": "2020 International Conference on Pervasive Artificial Intelligence (ICPAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqDCE9Xsk", "title": "2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "acronym": "icicta", "groupId": "1002487", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hQqJHyCHPG", "doi": "10.1109/ICICTA49267.2019.00125", "title": "Risk Assessment Model of College Students' New Ventures Based on Big Data Analysis and Fuzzy Evaluation", "normalizedTitle": "Risk Assessment Model of College Students' New Ventures Based on Big Data Analysis and Fuzzy Evaluation", "abstract": "In recent decades, the number of newly-employed people in China has continued to grow. At the same time, with the expansion of universities, the number of university graduates has also grown linearly. Based on the employment pressures of society and college graduates, the state clearly puts forward the slogan of promoting employment through entrepreneurship, and college students have become the focal point for responding to this slogan. This paper proposes a fuzzy comprehensive evaluation model and method for college students' online entrepreneurship risk. The research status of college students' entrepreneurship risk assessment at home and abroad is analyzed, and the reasons for the high error rate of College Students' entrepreneurship risk assessment are found. Then the model of risk assessment is established based on the support vector machine of large data analysis method. Finally, the effectiveness and superiority of the algorithm are tested through specific simulation and comparison experiments, which provided a scientific basis for the college students' online venture risk aversion strategies.", "abstracts": [ { "abstractType": "Regular", "content": "In recent decades, the number of newly-employed people in China has continued to grow. At the same time, with the expansion of universities, the number of university graduates has also grown linearly. Based on the employment pressures of society and college graduates, the state clearly puts forward the slogan of promoting employment through entrepreneurship, and college students have become the focal point for responding to this slogan. This paper proposes a fuzzy comprehensive evaluation model and method for college students' online entrepreneurship risk. The research status of college students' entrepreneurship risk assessment at home and abroad is analyzed, and the reasons for the high error rate of College Students' entrepreneurship risk assessment are found. Then the model of risk assessment is established based on the support vector machine of large data analysis method. Finally, the effectiveness and superiority of the algorithm are tested through specific simulation and comparison experiments, which provided a scientific basis for the college students' online venture risk aversion strategies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent decades, the number of newly-employed people in China has continued to grow. At the same time, with the expansion of universities, the number of university graduates has also grown linearly. Based on the employment pressures of society and college graduates, the state clearly puts forward the slogan of promoting employment through entrepreneurship, and college students have become the focal point for responding to this slogan. This paper proposes a fuzzy comprehensive evaluation model and method for college students' online entrepreneurship risk. The research status of college students' entrepreneurship risk assessment at home and abroad is analyzed, and the reasons for the high error rate of College Students' entrepreneurship risk assessment are found. Then the model of risk assessment is established based on the support vector machine of large data analysis method. Finally, the effectiveness and superiority of the algorithm are tested through specific simulation and comparison experiments, which provided a scientific basis for the college students' online venture risk aversion strategies.", "fno": "428400a557", "keywords": [ "Commerce", "Data Analysis", "Fuzzy Set Theory", "Risk Analysis", "Support Vector Machines", "Fuzzy Evaluation", "University Graduates", "College Graduates", "Fuzzy Comprehensive Evaluation Model", "College Students", "Big Data Analysis", "College Students Entrepreneurship Risk Assessment", "Support Vector Machine", "Entrepreneurship", "Risk Management", "Indexes", "Internet", "Analytical Models", "Employment", "College Students New Ventures", "Risk Assessment", "Fuzzy Comprehensive Evaluation", "Big Data" ], "authors": [ { "affiliation": "Chongqing Vocational Institute of Engineering, Chongqing, China", "fullName": "Yi Zheng", "givenName": "Yi", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "557-560", "year": "2019", "issn": null, "isbn": "978-1-7281-4284-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "428400a552", "articleId": "1hQqGUf5NNm", "__typename": "AdjacentArticleType" }, "next": { "fno": "428400a561", "articleId": "1hQqFzfH2XS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itme/2016/3906/0/3906a701", "title": "Research on Innovation and Entrepreneurship Education for College Students of Electronic and Information Majors", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a701/12OmNvjyy3j", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2012/4789/0/4789a758", "title": "E-commerce Entrepreneurship Education Research of College Students Majoring in Ceramics Art Design", "doi": null, "abstractUrl": "/proceedings-article/iccis/2012/4789a758/12OmNzIUfMq", "parentPublication": { "id": "proceedings/iccis/2012/4789/0", "title": "2012 Fourth International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2021/0679/0/067900a480", "title": "Driven by Subject Competitions to Cultivate College Students&#x0027; Innovation and Entrepreneurship Ability", "doi": null, "abstractUrl": "/proceedings-article/itme/2021/067900a480/1CATlpgT7Nu", "parentPublication": { "id": "proceedings/itme/2021/0679/0", "title": "2021 11th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600b106", "title": "On Establishment of Stratified Guidance System for College Students of Entrepreneurship Capability", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600b106/1KpBSjx4pRS", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2020/7081/0/708100a979", "title": "University Student Innovation Risk Assessment Model Based on Big Data", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2020/708100a979/1iERJqjRFhS", "parentPublication": { "id": "proceedings/icmtma/2020/7081/0", "title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdie/2020/5900/0/09150221", "title": "Research on the innovation of the teaching mode of entrepreneurship education for college students based on the theory of &#x201C;bisection class&#x201D;", "doi": null, "abstractUrl": "/proceedings-article/icbdie/2020/09150221/1lPGPgyD3Gw", "parentPublication": { "id": "proceedings/icbdie/2020/5900/0", "title": "2020 International Conference on Big Data and Informatization Education (ICBDIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeim/2020/9623/0/962300a244", "title": "Analysis on Entrepreneurship of Chinese Minority College Students basedon New Background and Big Data Survey", "doi": null, "abstractUrl": "/proceedings-article/icmeim/2020/962300a244/1syvpmT5vGg", "parentPublication": { "id": "proceedings/icmeim/2020/9623/0", "title": "2020 International Conference on Modern Education and Information Management (ICMEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a607", "title": "Personalized Recommendation System of Resource Database for College Students' Innovation and Entrepreneurship", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a607/1t2naEW6xRS", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsmt/2020/8668/0/866800a355", "title": "Research on the effectiveness of educational incentive mechanism to promote college students' e-commerce Entrepreneurship", "doi": null, "abstractUrl": "/proceedings-article/iccsmt/2020/866800a355/1u8pBcxoDEA", "parentPublication": { "id": "proceedings/iccsmt/2020/8668/0", "title": "2020 International Conference on Computer Science and Management Technology (ICCSMT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2021/3263/0/326300a546", "title": "Thinking of College Students&#x0027; innovation and Entrepreneurship Education under the background of big data", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2021/326300a546/1vb9eFIa4j6", "parentPublication": { "id": "proceedings/icsgea/2021/3263/0", "title": "2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1GIutpGpcEE", "title": "2022 IEEE International Conference on Web Services (ICWS)", "acronym": "icws", "groupId": "1001210", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1GIuwPNS9bO", "doi": "10.1109/ICWS55610.2022.00019", "title": "Spatio-Temporal Mogrifier LSTM and Attention Network for Next POI Recommendation", "normalizedTitle": "Spatio-Temporal Mogrifier LSTM and Attention Network for Next POI Recommendation", "abstract": "The next point-of-interest (POI) recommendation is indispensable in enhancing the richness of users&#x2019; lives and helping service providers achieve more economic earnings. Recurrent Neural Network (RNN) based methods are remarkable in learning users&#x2019; long-term or short-term behavioral dependencies. However, existing RNN-based methods lack sufficient interaction with their contexts, and at the same time, ignore the importance of non-consecutive POIs with different degrees for understanding users&#x2019; behaviors. In order to solve these problems, we propose a novel Spatio-Temporal model based on mogrifier LSTM and attention network (named STMLA) for next POI recommendation. The STMLA model builds a parallel structure to process the users&#x2019; check-in sequences through the mogrifier LSTM and the multi-head attention network, which can achieve better contextual interaction while selectively considering nonconsecutive factors with different degrees of significance. Our STMLA algorithm explicitly integrates temporal and spatial information to capture users&#x2019; long-term and short-term preferences, incorporating spatial information to build the Location-Saltant algorithm. Through extensive experiments on several real-world datasets, we demonstrate that our model outperforms the existing state-of-the-art methods in the next POI recommendation task.", "abstracts": [ { "abstractType": "Regular", "content": "The next point-of-interest (POI) recommendation is indispensable in enhancing the richness of users&#x2019; lives and helping service providers achieve more economic earnings. Recurrent Neural Network (RNN) based methods are remarkable in learning users&#x2019; long-term or short-term behavioral dependencies. However, existing RNN-based methods lack sufficient interaction with their contexts, and at the same time, ignore the importance of non-consecutive POIs with different degrees for understanding users&#x2019; behaviors. In order to solve these problems, we propose a novel Spatio-Temporal model based on mogrifier LSTM and attention network (named STMLA) for next POI recommendation. The STMLA model builds a parallel structure to process the users&#x2019; check-in sequences through the mogrifier LSTM and the multi-head attention network, which can achieve better contextual interaction while selectively considering nonconsecutive factors with different degrees of significance. Our STMLA algorithm explicitly integrates temporal and spatial information to capture users&#x2019; long-term and short-term preferences, incorporating spatial information to build the Location-Saltant algorithm. Through extensive experiments on several real-world datasets, we demonstrate that our model outperforms the existing state-of-the-art methods in the next POI recommendation task.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The next point-of-interest (POI) recommendation is indispensable in enhancing the richness of users’ lives and helping service providers achieve more economic earnings. Recurrent Neural Network (RNN) based methods are remarkable in learning users’ long-term or short-term behavioral dependencies. However, existing RNN-based methods lack sufficient interaction with their contexts, and at the same time, ignore the importance of non-consecutive POIs with different degrees for understanding users’ behaviors. In order to solve these problems, we propose a novel Spatio-Temporal model based on mogrifier LSTM and attention network (named STMLA) for next POI recommendation. The STMLA model builds a parallel structure to process the users’ check-in sequences through the mogrifier LSTM and the multi-head attention network, which can achieve better contextual interaction while selectively considering nonconsecutive factors with different degrees of significance. Our STMLA algorithm explicitly integrates temporal and spatial information to capture users’ long-term and short-term preferences, incorporating spatial information to build the Location-Saltant algorithm. Through extensive experiments on several real-world datasets, we demonstrate that our model outperforms the existing state-of-the-art methods in the next POI recommendation task.", "fno": "814300a017", "keywords": [ "Learning Artificial Intelligence", "Query Processing", "Recommender Systems", "Recurrent Neural Nets", "Spatiotemporal Phenomena", "POI Recommendation Task", "Spatio Temporal Mogrifier LSTM", "Next POI Recommendation", "Point Of Interest Recommendation", "Economic Earnings", "Recurrent Neural Network Based Methods", "RNN Based Methods", "Sufficient Interaction", "Nonconsecutive PO Is", "Understanding Users", "Novel Spatio Temporal Model", "STMLA Model", "Multihead Attention Network", "Contextual Interaction", "STMLA Algorithm", "Spatial Information", "Short Term Preferences", "Economics", "Recurrent Neural Networks", "Web Services", "Fuses", "Heuristic Algorithms", "Behavioral Sciences", "Sparse Matrices", "Next Point Of Interest", "Recommendation", "User Preference", "Attention", "Mogrifier LSTM" ], "authors": [ { "affiliation": "Chongqing University of Technology,School of Artificial Intelligence,Chongqing,China", "fullName": "Yihao Zhang", "givenName": "Yihao", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing University of Technology,School of Artificial Intelligence,Chongqing,China", "fullName": "Pengxiang Lan", "givenName": "Pengxiang", "surname": "Lan", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing University of Technology,School of Artificial Intelligence,Chongqing,China", "fullName": "Yuhao Wang", "givenName": "Yuhao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing University of Technology,School of Artificial Intelligence,Chongqing,China", "fullName": "Haoran Xiang", "givenName": "Haoran", "surname": "Xiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icws", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "17-26", "year": "2022", "issn": null, "isbn": "978-1-6654-8143-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "814300a011", "articleId": "1GIuzgAz08E", "__typename": "AdjacentArticleType" }, "next": { "fno": "814300a027", "articleId": "1GIuCBCFBa8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2021/2427/0/242700a036", "title": "DynaPosGNN: Dynamic-Positional GNN for Next POI Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a036/1AjSVXRyHde", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900b154", "title": "Next POI Recommender System: Multi-view Representation Learning for Outstanding Performance in Various Context", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900b154/1KBr3H2eaCk", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a221", "title": "Kernel-based Substructure Exploration for Next POI Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a221/1KpCLHt848g", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2023/5719/0/10074037", "title": "Verification of a method for latent interest estimation based on user behavior analysis and POI attributes", "doi": null, "abstractUrl": "/proceedings-article/icnc/2023/10074037/1LKwA1d52CY", "parentPublication": { "id": "proceedings/icnc/2023/5719/0", "title": "2023 International Conference on Computing, Networking and Communications (ICNC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2022/3197/0/319700a001", "title": "Fine-grained Preference Learning for Next POI Recommendation", "doi": null, "abstractUrl": "/proceedings-article/cecit/2022/319700a001/1M66ICmRl2U", "parentPublication": { "id": "proceedings/cecit/2022/3197/0", "title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2019/3363/0/336300a128", "title": "A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation", "doi": null, "abstractUrl": "/proceedings-article/mdm/2019/336300a128/1ckrKUX3SDu", "parentPublication": { "id": "proceedings/mdm/2019/3363/0", "title": "2019 20th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09117156", "title": "Personalized Long- and Short-term Preference Learning for Next POI Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/04/09117156/1kGfwz0QfpS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2020/05/09102414", "title": "Personalized Geographical Influence Modeling for POI Recommendation", "doi": null, "abstractUrl": "/magazine/ex/2020/05/09102414/1kaIr5UwTDi", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09133505", "title": "Where to Go Next: A Spatio-Temporal Gated Network for Next POI Recommendation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09133505/1lf6zzg6hva", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2021/06/08723186", "title": "An Attention-Based Spatiotemporal LSTM Network for Next POI Recommendation", "doi": null, "abstractUrl": "/journal/sc/2021/06/08723186/1zarN1rJdbW", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Iiu9jBDq2A", "title": "2022 IEEE 30th International Conference on Network Protocols (ICNP)", "acronym": "icnp", "groupId": "9940251", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Iiua0bsVIA", "doi": "10.1109/ICNP55882.2022.9940352", "title": "Behavior-decoupled Labeling Mechanism in Generalized SRv6", "normalizedTitle": "Behavior-decoupled Labeling Mechanism in Generalized SRv6", "abstract": "In this paper, we study the problem of compression efficiency of SRH (Segment Routing Header) in G-SRv6 (Generalized SRv6). We propose the Function-decoupled Segment Routing Mechanism (FDSRM) to optimize the SID list in SRH while ensuring that the routing policy decision would not be affected. FDSRM logically decouples the functions of SID/G-SID according to the function in routing decision and instruction indication. Based on FDSRM, we propose a mathematical optimization framework that leverages the LSTM neural network to optimize the SID allocation to adapt to future traffic. Simulation results indicate that FDSRM can improve the probability of SRH compression by 50.86&#x0025;, and compress more than 24.50 bytes when the hop count is greater than 20.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we study the problem of compression efficiency of SRH (Segment Routing Header) in G-SRv6 (Generalized SRv6). We propose the Function-decoupled Segment Routing Mechanism (FDSRM) to optimize the SID list in SRH while ensuring that the routing policy decision would not be affected. FDSRM logically decouples the functions of SID/G-SID according to the function in routing decision and instruction indication. Based on FDSRM, we propose a mathematical optimization framework that leverages the LSTM neural network to optimize the SID allocation to adapt to future traffic. Simulation results indicate that FDSRM can improve the probability of SRH compression by 50.86&#x0025;, and compress more than 24.50 bytes when the hop count is greater than 20.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we study the problem of compression efficiency of SRH (Segment Routing Header) in G-SRv6 (Generalized SRv6). We propose the Function-decoupled Segment Routing Mechanism (FDSRM) to optimize the SID list in SRH while ensuring that the routing policy decision would not be affected. FDSRM logically decouples the functions of SID/G-SID according to the function in routing decision and instruction indication. Based on FDSRM, we propose a mathematical optimization framework that leverages the LSTM neural network to optimize the SID allocation to adapt to future traffic. Simulation results indicate that FDSRM can improve the probability of SRH compression by 50.86%, and compress more than 24.50 bytes when the hop count is greater than 20.", "fno": "09940352", "keywords": [ "Computer Networks", "Optimisation", "Probability", "Recurrent Neural Nets", "Telecommunication Computing", "Telecommunication Network Routing", "Telecommunication Traffic", "Behavior Decoupled Labeling Mechanism", "Compression Efficiency", "FDSRM", "Function Decoupled Segment Routing Mechanism", "G S Rv 6", "Generalized S Rv 6", "Instruction Indication", "Mathematical Optimization Framework", "Routing Policy Decision", "Segment Routing Header", "SID Allocation", "SID List", "SRH Compression", "Protocols", "Simulation", "Neural Networks", "Routing", "Prediction Algorithms", "Behavioral Sciences", "Resource Management", "Segment Routing Over I Pv 6 S Rv 6", "Generalized S Rv 6 G S Rv 6", "Traffic Engineering", "Segment Compression" ], "authors": [ { "affiliation": "Beijing University of Posts and Telecommunications", "fullName": "Weihong Wu", "givenName": "Weihong", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications", "fullName": "Sijia Li", "givenName": "Sijia", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications", "fullName": "Anbang Pei", "givenName": "Anbang", "surname": "Pei", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Posts and Telecommunications", "fullName": "Tao Huang", "givenName": "Tao", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": null, "isbn": "978-1-6654-8234-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09940343", "articleId": "1Iiub8OKktW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09940259", "articleId": "1IiuaHUPmaQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/euros&pw/2022/9560/0/956000a252", "title": "SRv6: Is There Anybody Out There?", "doi": null, "abstractUrl": "/proceedings-article/euros&pw/2022/956000a252/1Eygy8Zf1cY", "parentPublication": { "id": "proceedings/euros&pw/2022/9560/0", "title": "2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09849003", "title": "Generative Adversarial Reward Learning for Generalized Behavior Tendency Inference", "doi": null, "abstractUrl": "/journal/tk/5555/01/09849003/1FxojIQl2FO", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10080971", "title": "Time to Think the Security of WiFi-Based Behavior Recognition Systems", "doi": null, "abstractUrl": "/journal/tq/5555/01/10080971/1LM6Z41TsXK", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cnsm/2019/24/0/09012725", "title": "Performance Evaluation of GTP-U and SRv6 Stateless Translation", "doi": null, "abstractUrl": "/proceedings-article/cnsm/2019/09012725/1hQr3kWMoYU", "parentPublication": { "id": "proceedings/cnsm/2019/24/0", "title": "2019 15th International Conference on Network and Service Management (CNSM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2020/04/09084288", "title": "Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/nt/2020/04/09084288/1jtyEoyoREs", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2020/8086/0/09219705", "title": "SR-TPP: Extending IPv6 Segment Routing to enable Trusted and Private Network Paths", "doi": null, "abstractUrl": "/proceedings-article/iscc/2020/09219705/1nRPiCdNWmY", "parentPublication": { "id": "proceedings/iscc/2020/8086/0", "title": "2020 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2022/01/09525825", "title": "Optimal Deployment of SRv6 to Enable Network Interconnection Service", "doi": null, "abstractUrl": "/journal/nt/2022/01/09525825/1ww3G4BriIo", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2021/4513/0/451300a910", "title": "SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area Network", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2021/451300a910/1xqyUHKSHv2", "parentPublication": { "id": "proceedings/icdcs/2021/4513/0", "title": "2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400b320", "title": "Fault-Tolerant Routing of Generalized Hypercubes under 3-Component Connectivity", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400b320/1zxKW1ZTugM", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a723", "title": "Multi-path Routing Deployment Method Based on SRv6", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a723/1zxLmz1T28g", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LKwWcGXok0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "10068562", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LKx4taiK9G", "doi": "10.1109/ASONAM55673.2022.10068633", "title": "Extracting and Visualizing Wildlife Trafficking Events from Wildlife Trafficking Reports", "normalizedTitle": "Extracting and Visualizing Wildlife Trafficking Events from Wildlife Trafficking Reports", "abstract": "Experts combating wildlife trafficking manually sift through articles about seizures and arrests, which is time consuming and make identifying trends difficult. We apply natural language processing techniques to automatically extract data from reports published by the Eco Activists for Governance and Law Enforcement (EAGLE). We expanded Python spaCy&#x0027;s pre-trained pipeline and added a custom named entity ruler, which identified 15 fully correct and 36 partially correct events in 15 reports against an existing baseline, which did not identify any fully correct events. The extracted wildlife trafficking events were inserted to a database. Then, we created visualizations to display trends over time and across regions to support domain experts. These are accessible on our website, Wildlife Trafficking in Africa.", "abstracts": [ { "abstractType": "Regular", "content": "Experts combating wildlife trafficking manually sift through articles about seizures and arrests, which is time consuming and make identifying trends difficult. We apply natural language processing techniques to automatically extract data from reports published by the Eco Activists for Governance and Law Enforcement (EAGLE). We expanded Python spaCy&#x0027;s pre-trained pipeline and added a custom named entity ruler, which identified 15 fully correct and 36 partially correct events in 15 reports against an existing baseline, which did not identify any fully correct events. The extracted wildlife trafficking events were inserted to a database. Then, we created visualizations to display trends over time and across regions to support domain experts. These are accessible on our website, Wildlife Trafficking in Africa.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Experts combating wildlife trafficking manually sift through articles about seizures and arrests, which is time consuming and make identifying trends difficult. We apply natural language processing techniques to automatically extract data from reports published by the Eco Activists for Governance and Law Enforcement (EAGLE). We expanded Python spaCy's pre-trained pipeline and added a custom named entity ruler, which identified 15 fully correct and 36 partially correct events in 15 reports against an existing baseline, which did not identify any fully correct events. The extracted wildlife trafficking events were inserted to a database. Then, we created visualizations to display trends over time and across regions to support domain experts. These are accessible on our website, Wildlife Trafficking in Africa.", "fno": "10068633", "keywords": [ "Data Analysis", "Feature Extraction", "Natural Language Processing", "Python", "Sentiment Analysis", "Text Analysis", "15 Fully Correct Events", "36 Partially Correct Events", "Arrests", "Custom Named Entity Ruler", "Extracted Wildlife Trafficking Events", "Natural Language", "Python Spa Cys Pre", "Wildlife Trafficking Reports", "Social Networking Online", "Law Enforcement", "Databases", "Wildlife", "Pipelines", "Africa", "Market Research", "Wildlife Trafficking", "Extraction", "Database", "Visualization" ], "authors": [ { "affiliation": "Worcester Polytechnic Institute", "fullName": "Devin Coughlin", "givenName": "Devin", "surname": "Coughlin", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Maylee Gagnon", "givenName": "Maylee", "surname": "Gagnon", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Victoria Grasso", "givenName": "Victoria", "surname": "Grasso", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Guanyi Mou", "givenName": "Guanyi", "surname": "Mou", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Kyumin Lee", "givenName": "Kyumin", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute", "fullName": "Renata Konrad", "givenName": "Renata", "surname": "Konrad", "__typename": "ArticleAuthorType" }, { "affiliation": "Focused Conservation", "fullName": "Patricia Raxter", "givenName": "Patricia", "surname": "Raxter", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland", "fullName": "Meredith Gore", "givenName": "Meredith", "surname": "Gore", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "575-578", "year": "2022", "issn": null, "isbn": "978-1-6654-5661-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10068570", "articleId": "1LKx258cOnC", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2016/5670/0/5670e344", "title": "Using Knowledge Management to Assist in Identifying Human Sex Trafficking", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670e344/12OmNAP1YZu", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2016/2846/0/07752332", "title": "Virtual indicators of sex trafficking to identify potential victims in online advertisements", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752332/12OmNrNh0Jk", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504b556", "title": "Detection of Domestic Human Trafficking Indicators and Movement Trends Using Content Available on Open Internet Sources", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504b556/12OmNzXWZJP", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2017/1235/0/08457947", "title": "TraffickCam: Crowdsourced and Computer Vision Based Approaches to Fighting Sex Trafficking", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457947/13xI8A0ZNjj", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912645", "title": "TrafficVis: Visualizing Organized Activity and Spatio-Temporal Patterns for Detecting and Labeling Human Trafficking", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912645/1HfCushQayI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2022/6131/0/613100a329", "title": "Bioacoustics Monitoring of Wildlife using Artificial Intelligence: A Methodological Literature Review", "doi": null, "abstractUrl": "/proceedings-article/nana/2022/613100a329/1JwPNrwiaRO", "parentPublication": { "id": "proceedings/nana/2022/6131/0", "title": "2022 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073612", "title": "On Augmented Identifying Codes for Monitoring Drug Trafficking Organizations", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073612/1jjA6GflVU4", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073184", "title": "Reconstructing and Analyzing the Transnational Human Trafficking Network", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073184/1jjAaQhimOc", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400b116", "title": "INFOSHIELD: Generalizable Information-Theoretic Human-Trafficking Detection", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400b116/1uGXfNG4fFS", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis-fall/2021/7679/0/09627435", "title": "Feature Selection for Human Trafficking Detection Models", "doi": null, "abstractUrl": "/proceedings-article/icis-fall/2021/09627435/1z7dIWF72yA", "parentPublication": { "id": "proceedings/icis-fall/2021/7679/0", "title": "2021 IEEE/ACIS 20th International Fall Conference on Computer and Information Science (ICIS Fall)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNA0MYYl", "title": "Computer and Information Technology, IEEE 8th International Conference on", "acronym": "citworkshops", "groupId": "1001948", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNA0dMKu", "doi": "10.1109/CIT.2008.Workshops.19", "title": "Using Semantic Web Technologies in Visualizing Medicinal Vocabularies", "normalizedTitle": "Using Semantic Web Technologies in Visualizing Medicinal Vocabularies", "abstract": "The number of new medications and medicinal knowledge increases all the time. Further, as each drug has its unique indications, cross-reactivity, complications and costs also the management and dissemination of medication information becomes still more complex giving rise for potential medication errors. However, by utilizing the Semantic Web technologies in visualizing medication information this complexity can be alleviated in many ways. In this paper we report our work on developing an electronic medicinal vocabulary. It deviates from other medicinal vocabularies in that the terms and their relationships are graphically illustrated and additional queries can be made on the graphical presentation. The supported visualization format is a variation of the concept mapping.", "abstracts": [ { "abstractType": "Regular", "content": "The number of new medications and medicinal knowledge increases all the time. Further, as each drug has its unique indications, cross-reactivity, complications and costs also the management and dissemination of medication information becomes still more complex giving rise for potential medication errors. However, by utilizing the Semantic Web technologies in visualizing medication information this complexity can be alleviated in many ways. In this paper we report our work on developing an electronic medicinal vocabulary. It deviates from other medicinal vocabularies in that the terms and their relationships are graphically illustrated and additional queries can be made on the graphical presentation. The supported visualization format is a variation of the concept mapping.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The number of new medications and medicinal knowledge increases all the time. Further, as each drug has its unique indications, cross-reactivity, complications and costs also the management and dissemination of medication information becomes still more complex giving rise for potential medication errors. However, by utilizing the Semantic Web technologies in visualizing medication information this complexity can be alleviated in many ways. In this paper we report our work on developing an electronic medicinal vocabulary. It deviates from other medicinal vocabularies in that the terms and their relationships are graphically illustrated and additional queries can be made on the graphical presentation. The supported visualization format is a variation of the concept mapping.", "fno": "3242a325", "keywords": [ "Data Visualisation", "Medical Computing", "Semantic Web", "Vocabulary", "Semantic Web", "Medication Information Visualization", "Electronic Medicinal Vocabulary", "Semantic Web", "Visualization", "Vocabulary", "Knowledge Management", "Pharmaceutical Technology", "Resource Description Framework", "Computer Errors", "Thesauri", "OWL", "Information Technology", "Semantic Web", "E Health", "Ontologies" ], "authors": [ { "affiliation": "Lappeenranta Univ. of Technol., Lappeenranta", "fullName": "Juha Puustjärvi", "givenName": "Juha", "surname": "Puustjärvi", "__typename": "ArticleAuthorType" }, { "affiliation": "The Pharmacy of Kaivopuisto", "fullName": "Leena Puustjärvi", "givenName": "Leena", "surname": "Puustjärvi", "__typename": "ArticleAuthorType" } ], "idPrefix": "citworkshops", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "325-329", "year": "2008", "issn": null, "isbn": "978-0-7695-3242-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3242a216", "articleId": "12OmNqIzh0o", "__typename": "AdjacentArticleType" }, "next": { "fno": "3242a236", "articleId": "12OmNwbukin", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/etelemed/2009/3532/0/3532a190", "title": "Using Knowledge Management Technologies in Searching Medicinal Learning Objects", "doi": null, "abstractUrl": "/proceedings-article/etelemed/2009/3532a190/12OmNxG1yU4", "parentPublication": { "id": "proceedings/etelemed/2009/3532/0", "title": "eHealth, Telemedicine, and Social Medicine, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2008/3380/0/04736880", "title": "An Automatic Drug Discovery Workflow Generation Tool Using Semantic Web Technologies", "doi": null, "abstractUrl": "/proceedings-article/e-science/2008/04736880/12OmNxXl5DG", "parentPublication": { "id": "proceedings/e-science/2008/3380/0", "title": "2008 IEEE Fourth International Conference on eScience", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/2003/8131/2/01261650", "title": "Redesigning the medication ordering, dispensing, and administration process in an acute care academic health sciences centre", "doi": null, "abstractUrl": "/proceedings-article/wsc/2003/01261650/12OmNxisQNZ", "parentPublication": { "id": "proceedings/wsc/2003/8131/2", "title": "Proceedings of the 2003 Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icds/2009/3526/0/3526a168", "title": "Semantic Exchange of Medicinal Data: A Way Towards Open Healthcare Systems", "doi": null, "abstractUrl": "/proceedings-article/icds/2009/3526a168/12OmNyQYtzh", "parentPublication": { "id": "proceedings/icds/2009/3526/0", "title": "International Conference on the Digital Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlD94f", "title": "Machine Learning and Applications, Fourth International Conference on", "acronym": "icmla", "groupId": "1001544", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYXWCQ", "doi": "10.1109/ICMLA.2010.128", "title": "Pre-Processing Structured Data for Standard Machine Learning Algorithms by Supervised Graph Propositionalization - A Case Study with Medicinal Chemistry Datasets", "normalizedTitle": "Pre-Processing Structured Data for Standard Machine Learning Algorithms by Supervised Graph Propositionalization - A Case Study with Medicinal Chemistry Datasets", "abstract": "Graph propositionalization methods can be used to transform structured and relational data into fixed-length feature vectors, enabling standard machine learning algorithms to be used for generating predictive models. It is however not clear how well different propositionalization methods work in conjunction with different standard machine learning algorithms. Three different graph propositionalization methods are investigated in conjunction with three standard learning algorithms: random forests, support vector machines and nearest neighbor classifiers. An experiment on 21 datasets from the domain of medicinal chemistry shows that the choice of propositionalization method may have a significant impact on the resulting accuracy. The empirical investigation further shows that for datasets from this domain, the use of the maximal frequent item set approach for propositionalization results in the most accurate classifiers, significantly outperforming the two other graph propositionalization methods considered in this study, SUBDUE and MOSS, for all three learning methods.", "abstracts": [ { "abstractType": "Regular", "content": "Graph propositionalization methods can be used to transform structured and relational data into fixed-length feature vectors, enabling standard machine learning algorithms to be used for generating predictive models. It is however not clear how well different propositionalization methods work in conjunction with different standard machine learning algorithms. Three different graph propositionalization methods are investigated in conjunction with three standard learning algorithms: random forests, support vector machines and nearest neighbor classifiers. An experiment on 21 datasets from the domain of medicinal chemistry shows that the choice of propositionalization method may have a significant impact on the resulting accuracy. The empirical investigation further shows that for datasets from this domain, the use of the maximal frequent item set approach for propositionalization results in the most accurate classifiers, significantly outperforming the two other graph propositionalization methods considered in this study, SUBDUE and MOSS, for all three learning methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph propositionalization methods can be used to transform structured and relational data into fixed-length feature vectors, enabling standard machine learning algorithms to be used for generating predictive models. It is however not clear how well different propositionalization methods work in conjunction with different standard machine learning algorithms. Three different graph propositionalization methods are investigated in conjunction with three standard learning algorithms: random forests, support vector machines and nearest neighbor classifiers. An experiment on 21 datasets from the domain of medicinal chemistry shows that the choice of propositionalization method may have a significant impact on the resulting accuracy. The empirical investigation further shows that for datasets from this domain, the use of the maximal frequent item set approach for propositionalization results in the most accurate classifiers, significantly outperforming the two other graph propositionalization methods considered in this study, SUBDUE and MOSS, for all three learning methods.", "fno": "4300a828", "keywords": [ "Structured Data", "Graph Propositionalization", "Random Forests", "Support Vector Machines", "K Nearest Neighbor", "Medicinal Chemistry" ], "authors": [ { "affiliation": null, "fullName": "Thashmee Karunaratne", "givenName": "Thashmee", "surname": "Karunaratne", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Henrik Boström", "givenName": "Henrik", "surname": "Boström", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ulf Norinder", "givenName": "Ulf", "surname": "Norinder", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmla", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "828-833", "year": "2010", "issn": null, "isbn": "978-0-7695-4300-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4300a823", "articleId": "12OmNxw5BcI", "__typename": "AdjacentArticleType" }, "next": { "fno": "4300a834", "articleId": "12OmNx6g6m1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmla/2009/3926/0/3926a196", "title": "Graph Propositionalization for Random Forests", "doi": null, "abstractUrl": "/proceedings-article/icmla/2009/3926a196/12OmNvjgWrr", "parentPublication": { "id": "proceedings/icmla/2009/3926/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2002/1695/3/169530041", "title": "An Experimental Comparison between Consistency-Based and Adaptive Prototype Replacement Schemes", "doi": null, "abstractUrl": "/proceedings-article/icpr/2002/169530041/12OmNwJgAII", "parentPublication": { "id": "proceedings/icpr/2002/1695/3", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2008/3502/0/3502a983", "title": "Similarity Learning for Nearest Neighbor Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a983/12OmNx8ficV", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2012/4899/0/4899a246", "title": "Indistinct Segmentation of Scene in Video Using Instance Learning", "doi": null, "abstractUrl": "/proceedings-article/icdh/2012/4899a246/12OmNxecRS2", "parentPublication": { "id": "proceedings/icdh/2012/4899/0", "title": "4th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2009/3926/0/3926a771", "title": "Improving Fusion of Dimensionality Reduction Methods for Nearest Neighbor Classification", "doi": null, "abstractUrl": "/proceedings-article/icmla/2009/3926a771/12OmNyUWR6J", "parentPublication": { "id": "proceedings/icmla/2009/3926/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2010/4300/0/4300a003", "title": "Improved Fine-Grained Component-Conditional Class Labeling with Active Learning", "doi": null, "abstractUrl": "/proceedings-article/icmla/2010/4300a003/12OmNzA6GO7", "parentPublication": { "id": "proceedings/icmla/2010/4300/0", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2008/11/ttp2008111958", "title": "80 Million Tiny Images: A Large Data Set for Nonparametric Object and Scene Recognition", "doi": null, "abstractUrl": "/journal/tp/2008/11/ttp2008111958/13rRUwcS1E9", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/06/i0599", "title": "Best-Case Results for Nearest-Neighbor Learning", "doi": null, "abstractUrl": "/journal/tp/1995/06/i0599/13rRUwghd5S", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073625", "title": "Semi-Supervised Learning and Graph Neural Networks for Fake News Detection", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073625/1jjA5HMe1TW", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428094", "title": "Deep Unsupervised Hashing by Global and Local Consistency", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428094/1uilWCcJo08", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrnJ6Js", "title": "2010 Fifth Annual ChinaGrid Conference", "acronym": "chinagrid", "groupId": "1002436", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBz101d", "doi": "10.1109/ChinaGrid.2010.46", "title": "ChemDataBase 2: An Enhanced Chemical Database Management System for Virtual Screening", "normalizedTitle": "ChemDataBase 2: An Enhanced Chemical Database Management System for Virtual Screening", "abstract": "Virtual screening is a newly emerging method used in new drug research and development (R&D). The introduction of virtual screening immensely reduces R&D cycle and decreases R&D cost directly. Mass of chemical data used for virtual screening needs to be managed effectively in certain ways. We have developed the first release of ChemDataBase, but it only has the basic functions of chemical database which can not meet requirement of virtual screening fully. This paper investigates and implements the second and improved release of ChemDataBase which is better suitable for virtual screening. Compared with the first release, the second release has several new features. For one thing, it is based on CSGrid and supports accessing of Grid database created in CSGrid. For another thing, it adopts Hibernate framework for data persistence management. In addition, it can invoke data analysis software to analyze the results of virtual screening experiment. Finally, a case study in computational chemistry shows that the second release plays an important role in new drug R&D.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual screening is a newly emerging method used in new drug research and development (R&D). The introduction of virtual screening immensely reduces R&D cycle and decreases R&D cost directly. Mass of chemical data used for virtual screening needs to be managed effectively in certain ways. We have developed the first release of ChemDataBase, but it only has the basic functions of chemical database which can not meet requirement of virtual screening fully. This paper investigates and implements the second and improved release of ChemDataBase which is better suitable for virtual screening. Compared with the first release, the second release has several new features. For one thing, it is based on CSGrid and supports accessing of Grid database created in CSGrid. For another thing, it adopts Hibernate framework for data persistence management. In addition, it can invoke data analysis software to analyze the results of virtual screening experiment. Finally, a case study in computational chemistry shows that the second release plays an important role in new drug R&D.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual screening is a newly emerging method used in new drug research and development (R&D). The introduction of virtual screening immensely reduces R&D cycle and decreases R&D cost directly. Mass of chemical data used for virtual screening needs to be managed effectively in certain ways. We have developed the first release of ChemDataBase, but it only has the basic functions of chemical database which can not meet requirement of virtual screening fully. This paper investigates and implements the second and improved release of ChemDataBase which is better suitable for virtual screening. Compared with the first release, the second release has several new features. For one thing, it is based on CSGrid and supports accessing of Grid database created in CSGrid. For another thing, it adopts Hibernate framework for data persistence management. In addition, it can invoke data analysis software to analyze the results of virtual screening experiment. Finally, a case study in computational chemistry shows that the second release plays an important role in new drug R&D.", "fno": "05563023", "keywords": [ "Chemical Engineering Computing", "Database Management Systems", "Chem Data Base 2", "Enhanced Chemical Database Management System", "Virtual Screening", "Drug Research", "CS Grid", "Grid Database", "Hibernate Framework", "Data Persistence Management", "Data Analysis Software", "Computational Chemistry", "Databases", "Chemicals", "Software", "Data Analysis", "Drugs", "Compounds", "Graphical User Interfaces", "New Drug RD", "Virtual Screening", "Chemical Database Management", "CS Grid", "Hibernate" ], "authors": [ { "affiliation": null, "fullName": "Lifen Li", "givenName": "Lifen", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ruisheng Zhang", "givenName": "Ruisheng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiuqiang Chen", "givenName": "Jiuqiang", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ying Zhang", "givenName": "Ying", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lian Li", "givenName": "Lian", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhili Zhao", "givenName": "Zhili", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "chinagrid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "74-79", "year": "2010", "issn": "1949-131X", "isbn": "978-1-4244-7543-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05563026", "articleId": "12OmNyvoXgL", "__typename": "AdjacentArticleType" }, "next": { "fno": "05563024", "articleId": "12OmNxcvh5X", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwsg/2014/5819/0/5819a024", "title": "A Grid-Enabled Virtual Screening Gateway", "doi": null, "abstractUrl": "/proceedings-article/iwsg/2014/5819a024/12OmNwqx468", "parentPublication": { "id": "proceedings/iwsg/2014/5819/0", "title": "2014 6th International Workshop on Science Gateways (IWSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2010/7543/0/05563017", "title": "A Data Management System for Pre-docking in Large-Scale Virtual Screening", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2010/05563017/12OmNy49sE1", "parentPublication": { "id": "proceedings/chinagrid/2010/7543/0", "title": "2010 Fifth Annual ChinaGrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2012/4357/0/06399766", "title": "A workflow system for virtual screening in cancer chemoprevention", "doi": null, "abstractUrl": "/proceedings-article/bibe/2012/06399766/12OmNyL0TDt", "parentPublication": { "id": "proceedings/bibe/2012/4357/0", "title": "2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420679", "title": "Predicting the Absorption Potential of Chemical Compounds Through a Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420679/13rRUxlgy2e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08353138", "title": "Resource Cut, a New Bounding Procedure to Algorithms for Enumerating Tree-Like Chemical Graphs", "doi": null, "abstractUrl": "/journal/tb/2019/01/08353138/17D45XwUAMZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669513", "title": "Docking-based Virtual Screening with Multi-Task Learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669513/1A9WeSMJHkA", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a483", "title": "Research on Parallel Processing Method for Ultra-large-scale Drug Screening Data", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a483/1BmOj9ifDFK", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2023/01/09817028", "title": "EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-2", "doi": null, "abstractUrl": "/journal/ec/2023/01/09817028/1EMV96xHxnO", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a251", "title": "A Protein Embedding Model for Drug Molecular Screening", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a251/1jdDwPZLRvO", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222282", "title": "ChemVA: Interactive Visual Analysis of Chemical Compound Similarity in Virtual Screening", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222282/1nTqBnKw66Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFul", "title": "2014 18th International Conference on Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqAU6AN", "doi": "10.1109/IV.2014.10", "title": "iSyn: WebGL-Based Interactive De Novo Drug Design", "normalizedTitle": "iSyn: WebGL-Based Interactive De Novo Drug Design", "abstract": "We present iSyn, a WebGL-based tool for interactivede novo drug design. It features an evolutionary algorithm that automatically designs novel ligands with drug-like properties and synthetic feasibility using click chemistry. Isyn interfaces with our popular and fast molecular docking engine idock, remarkably reducing the evaluation and ranking time of drug candidates. Furthermore, inspired by our user friendly and high-performance WebGL visualizer iview, our iSyn also implements a tailor-made interactive visualizer to aid novel drug design. We believe iSyn can supplement the efforts of medicinal chemists in drug discovery research. To illustrate the utility of iSyn in generating novelligands ex nihilo, we designed predicted inhibitors of two important drug targets, which are RNA editing ligase 1(REL1) from T. Brucei, the etiological agent of African sleeping sickness, and cyclin-dependent kinase 2 (CDK2), a positive regulator of eukaryotic cell cycle progression. Results show that iSyn managed to significantly enhance the predicted binding affinity of the best generated ligand by more than 3 orders of magnitude in potency. Isyn is written in C++, Python, HTML5 and JavaScript. It is free and open source, available athttp://istar.cse.cuhk.edu.hk/iSyn.tgz. It has been tested successfully on both Linux and Windows.", "abstracts": [ { "abstractType": "Regular", "content": "We present iSyn, a WebGL-based tool for interactivede novo drug design. It features an evolutionary algorithm that automatically designs novel ligands with drug-like properties and synthetic feasibility using click chemistry. Isyn interfaces with our popular and fast molecular docking engine idock, remarkably reducing the evaluation and ranking time of drug candidates. Furthermore, inspired by our user friendly and high-performance WebGL visualizer iview, our iSyn also implements a tailor-made interactive visualizer to aid novel drug design. We believe iSyn can supplement the efforts of medicinal chemists in drug discovery research. To illustrate the utility of iSyn in generating novelligands ex nihilo, we designed predicted inhibitors of two important drug targets, which are RNA editing ligase 1(REL1) from T. Brucei, the etiological agent of African sleeping sickness, and cyclin-dependent kinase 2 (CDK2), a positive regulator of eukaryotic cell cycle progression. Results show that iSyn managed to significantly enhance the predicted binding affinity of the best generated ligand by more than 3 orders of magnitude in potency. Isyn is written in C++, Python, HTML5 and JavaScript. It is free and open source, available athttp://istar.cse.cuhk.edu.hk/iSyn.tgz. It has been tested successfully on both Linux and Windows.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present iSyn, a WebGL-based tool for interactivede novo drug design. It features an evolutionary algorithm that automatically designs novel ligands with drug-like properties and synthetic feasibility using click chemistry. Isyn interfaces with our popular and fast molecular docking engine idock, remarkably reducing the evaluation and ranking time of drug candidates. Furthermore, inspired by our user friendly and high-performance WebGL visualizer iview, our iSyn also implements a tailor-made interactive visualizer to aid novel drug design. We believe iSyn can supplement the efforts of medicinal chemists in drug discovery research. To illustrate the utility of iSyn in generating novelligands ex nihilo, we designed predicted inhibitors of two important drug targets, which are RNA editing ligase 1(REL1) from T. Brucei, the etiological agent of African sleeping sickness, and cyclin-dependent kinase 2 (CDK2), a positive regulator of eukaryotic cell cycle progression. Results show that iSyn managed to significantly enhance the predicted binding affinity of the best generated ligand by more than 3 orders of magnitude in potency. Isyn is written in C++, Python, HTML5 and JavaScript. It is free and open source, available athttp://istar.cse.cuhk.edu.hk/iSyn.tgz. It has been tested successfully on both Linux and Windows.", "fno": "4103a302", "keywords": [ "Drugs", "Proteins", "Visualization", "Compounds", "Libraries", "Surface Resistance", "Web GL Visualization", "Bioinformatics", "Computer Aided Drug Discovery", "Evolutionary Algorithm" ], "authors": [ { "affiliation": null, "fullName": "Hongjian Li", "givenName": "Hongjian", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kwong-Sak Leung", "givenName": "Kwong-Sak", "surname": "Leung", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chun Ho Chan", "givenName": "Chun Ho", "surname": "Chan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hei Lun Cheung", "givenName": "Hei Lun", "surname": "Cheung", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Man-Hon Wong", "givenName": "Man-Hon", "surname": "Wong", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "302-307", "year": "2014", "issn": "1550-6037", "isbn": "978-1-4799-4103-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4103a298", "articleId": "12OmNvT2pcN", "__typename": "AdjacentArticleType" }, "next": { "fno": "4103a308", "articleId": "12OmNAS9zBJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icsc/2013/5119/0/5119a453", "title": "Semantic Computing and Drug Discovery - A Preliminary Report", "doi": null, "abstractUrl": "/proceedings-article/icsc/2013/5119a453/12OmNwF0C1u", "parentPublication": { "id": "proceedings/icsc/2013/5119/0", "title": "2013 IEEE Seventh International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2015/8562/0/07439493", "title": "Application of machine leaning approaches in drug target identification and network pharmacology", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2015/07439493/12OmNxecS1g", "parentPublication": { "id": "proceedings/iciibms/2015/8562/0", "title": "2015 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2017/4881/0/4881a556", "title": "Predicting High-Order Directional Drug-Drug Interaction Relations", "doi": null, "abstractUrl": "/proceedings-article/ichi/2017/4881a556/12OmNz2kqij", "parentPublication": { "id": "proceedings/ichi/2017/4881/0", "title": "2017 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2011/0868/0/06004005", "title": "Interactive Drug Design in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/iv/2011/06004005/12OmNz61cYQ", "parentPublication": { "id": "proceedings/iv/2011/0868/0", "title": "2011 15th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/04/08606950", "title": "nAPOLI: A Graph-Based Strategy to Detect and Visualize Conserved Protein-Ligand Interactions in Large-Scale", "doi": null, "abstractUrl": "/journal/tb/2020/04/08606950/17D45W9KVHi", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669568", "title": "De Novo Drug Design via Multi-Label Learning and Adversarial Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669568/1A9VQYmligw", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2022/8487/0/848700a124", "title": "DCPC: Drug Candidates for the Prevention of COVID-19 Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2022/848700a124/1J6hGbvyu8o", "parentPublication": { "id": "proceedings/bibe/2022/8487/0", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/04/09354982", "title": "Overcoming Sparseness of Biomedical Networks to Identify Drug Repositioning Candidates", "doi": null, "abstractUrl": "/journal/tb/2022/04/09354982/1rgC9uuzjuE", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09511868", "title": "DeepFusionDTA: Drug-Target Binding Affinity Prediction With Information Fusion and Hybrid Deep-Learning Ensemble Model", "doi": null, "abstractUrl": "/journal/tb/2022/05/09511868/1vYRCLGBbdm", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2021/4121/0/412100a172", "title": "Optimizing Recurrent Neural Network Architectures for De Novo Drug Design", "doi": null, "abstractUrl": "/proceedings-article/cbms/2021/412100a172/1vb8Qbdi9oI", "parentPublication": { "id": "proceedings/cbms/2021/4121/0", "title": "2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAAtmz", "doi": "10.1109/BIBM.2017.8217932", "title": "CuHerbDB- for pharmacogenomics and study of phytochemicals in culinary and medicinal herbs", "normalizedTitle": "CuHerbDB- for pharmacogenomics and study of phytochemicals in culinary and medicinal herbs", "abstract": "Drug development using plant sources is an important and fast evolving area. Plants contain valuable phytochemicals that possess a wide variety of curative functions including antibacterial, antifungal, anti-carcinogenic, enzyme stimulating, and many more. The growing prevalence of chronic diseases and rising health care costs have renewed the interests of many researchers to collect, store and retrieve information on medically relevant phytochemicals. The renewed interest has opened the path for designing practical approaches to increase the biochemical productivity of medicinal plants using large-scale but low-cost solutions. However, the interactions between bioactive compounds from herbal-supplements and prescription drugs leading to serious clinical consequences has become a widespread safety concern. The key to achieving production goals as well as addressing safety concerns lie in our thorough understanding of secondary metabolism in plant. Hence, to elucidate the importance of phytochemicals, and to unveil the underlying metabolic mechanisms that could affect the nature and level of bioactive compounds in the herbs we consume, we have developed CuHerbDB-a graph based database, for efficient storage/retrieval and graphical presentation of botanical, biochemical and pharmacological data for culinary herbs, using a Neo4j database framework. This database is the first step towards integrating herbal data for pharmacogenomics, which can be currently used to identify and facilitate feasible drug production strategies using plant sources and to investigate ways to significantly enhance the quality of herbs, in an urban farm setting.", "abstracts": [ { "abstractType": "Regular", "content": "Drug development using plant sources is an important and fast evolving area. Plants contain valuable phytochemicals that possess a wide variety of curative functions including antibacterial, antifungal, anti-carcinogenic, enzyme stimulating, and many more. The growing prevalence of chronic diseases and rising health care costs have renewed the interests of many researchers to collect, store and retrieve information on medically relevant phytochemicals. The renewed interest has opened the path for designing practical approaches to increase the biochemical productivity of medicinal plants using large-scale but low-cost solutions. However, the interactions between bioactive compounds from herbal-supplements and prescription drugs leading to serious clinical consequences has become a widespread safety concern. The key to achieving production goals as well as addressing safety concerns lie in our thorough understanding of secondary metabolism in plant. Hence, to elucidate the importance of phytochemicals, and to unveil the underlying metabolic mechanisms that could affect the nature and level of bioactive compounds in the herbs we consume, we have developed CuHerbDB-a graph based database, for efficient storage/retrieval and graphical presentation of botanical, biochemical and pharmacological data for culinary herbs, using a Neo4j database framework. This database is the first step towards integrating herbal data for pharmacogenomics, which can be currently used to identify and facilitate feasible drug production strategies using plant sources and to investigate ways to significantly enhance the quality of herbs, in an urban farm setting.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Drug development using plant sources is an important and fast evolving area. Plants contain valuable phytochemicals that possess a wide variety of curative functions including antibacterial, antifungal, anti-carcinogenic, enzyme stimulating, and many more. The growing prevalence of chronic diseases and rising health care costs have renewed the interests of many researchers to collect, store and retrieve information on medically relevant phytochemicals. The renewed interest has opened the path for designing practical approaches to increase the biochemical productivity of medicinal plants using large-scale but low-cost solutions. However, the interactions between bioactive compounds from herbal-supplements and prescription drugs leading to serious clinical consequences has become a widespread safety concern. The key to achieving production goals as well as addressing safety concerns lie in our thorough understanding of secondary metabolism in plant. Hence, to elucidate the importance of phytochemicals, and to unveil the underlying metabolic mechanisms that could affect the nature and level of bioactive compounds in the herbs we consume, we have developed CuHerbDB-a graph based database, for efficient storage/retrieval and graphical presentation of botanical, biochemical and pharmacological data for culinary herbs, using a Neo4j database framework. This database is the first step towards integrating herbal data for pharmacogenomics, which can be currently used to identify and facilitate feasible drug production strategies using plant sources and to investigate ways to significantly enhance the quality of herbs, in an urban farm setting.", "fno": "08217932", "keywords": [ "Compounds", "Biochemistry", "Databases", "Stress", "Drugs", "Production", "Data Models", "Graph Database", "Pharmacogenomics", "Phytochemicals", "Drought Stress", "Neo 4 J", "Culinary Herbs" ], "authors": [ { "affiliation": "School of Interdisciplinary Informatics, University of Nebraska at Omaha, Omaha, U.S.A", "fullName": "Suganya Chandrababu", "givenName": "Suganya", "surname": "Chandrababu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Interdisciplinary Informatics, University of Nebraska at Omaha, Omaha, U.S.A", "fullName": "Dhundy R Bastola", "givenName": "Dhundy R", "surname": "Bastola", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "1787-1794", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217931", "articleId": "12OmNvAiSIg", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217933", "articleId": "12OmNrMHOoJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2013/1309/0/06732625", "title": "Mutual information mining for component law and development of new recipes of topical herbs for atopic dermatitis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732625/12OmNASILPe", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999332", "title": "Efficiency and safety of sponge bathing in combination with different Chinese herbal preparations in patients with hyperthermia", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999332/12OmNxFsmrR", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2011/1612/0/06112488", "title": "Analysis of herbal formulation in TCM: Infertility as a case study", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2011/06112488/12OmNxisQQK", "parentPublication": { "id": "proceedings/bibmw/2011/1612/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470334", "title": "Study on the law of ancient herbs in the treatment of osteoarthritis", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470334/12OmNxvNZZu", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999398", "title": "Picking out herbs with analogous efficacy based on MeSH semantic similarity", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999398/12OmNyQGRXK", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2018/7447/0/744701a655", "title": "Automation of Personal Food Computers for Research in Drug Development and Biomedicine", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2018/744701a655/19m3EwpSrhm", "parentPublication": { "id": "proceedings/iiai-aai/2018/7447/0", "title": "2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669905", "title": "Data Mining-Based and Network Pharmacology-Based Analysis of Medication Rules and Action Mechanism of Professor Zhou Zhongying in Lung Cancer Treatment", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669905/1A9VzyFUtrO", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995305", "title": "A Study on the Distribution and Influencing Factors of the Origin of Plant Herbs in Compendium of Materia Medica", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995305/1JC1O7iLC6I", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995433", "title": "In silico Screening, Docking, and Redesigning of Traditional Chinese Medicinal Compounds Against Streptococcus pneumoniae Glycosyl Hydrolase GHIP and Peptidoglycan Hydrolase LytB", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995433/1JC2p94ss0g", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088298", "title": "A Revolutionary Machine-Learning based approach for identifying Ayurvedic Medicinal Plants", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088298/1M4rJKGRTWw", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6hzKkIqdi", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "9973398", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hGbvyu8o", "doi": "10.1109/BIBE55377.2022.00034", "title": "DCPC: Drug Candidates for the Prevention of COVID-19 Database", "normalizedTitle": "DCPC: Drug Candidates for the Prevention of COVID-19 Database", "abstract": "The world immediately studied Coronavirus Disease 2019 (COVID-19) and raced towards finding the cure and developing an effective treatment. An automated approach is needed to discover drug candidates and provide those data to facilitate clinical trials in saving time and only focusing on the candidates which potentially become the cure for COVID-19. We propose the Drug Candidates for the Prevention of COVID-19 (DCPC) Database. DCPC Database provides a list of candidates of potential drugs for the prevention of COVID-19 based on disease-drug associations which are automatically discovered from biomedical literature. DCPC database is an integrative structural database, which involves a chemical database repository, such as PubChem and DrugBank to ensure that drug compound candidates have a standard representation of compounds. The database provides keyword-chosen categories and a determination of minimum supported articles for search, a list of drug candidates in the sorted table followed by the detail for each candidate, and a download feature. The keyword category consists of three keywords, they are Chinese herbal compounds, Indian medicinal plants, and Indian medicinal plants &#x0026; diabetic treatment herbs. Each candidate links to an article in the biomedical literature and to a page of the compound structure visualization. DCPC is freely available at https://dcpc.brin.go.id/dcpc/.", "abstracts": [ { "abstractType": "Regular", "content": "The world immediately studied Coronavirus Disease 2019 (COVID-19) and raced towards finding the cure and developing an effective treatment. An automated approach is needed to discover drug candidates and provide those data to facilitate clinical trials in saving time and only focusing on the candidates which potentially become the cure for COVID-19. We propose the Drug Candidates for the Prevention of COVID-19 (DCPC) Database. DCPC Database provides a list of candidates of potential drugs for the prevention of COVID-19 based on disease-drug associations which are automatically discovered from biomedical literature. DCPC database is an integrative structural database, which involves a chemical database repository, such as PubChem and DrugBank to ensure that drug compound candidates have a standard representation of compounds. The database provides keyword-chosen categories and a determination of minimum supported articles for search, a list of drug candidates in the sorted table followed by the detail for each candidate, and a download feature. The keyword category consists of three keywords, they are Chinese herbal compounds, Indian medicinal plants, and Indian medicinal plants &#x0026; diabetic treatment herbs. Each candidate links to an article in the biomedical literature and to a page of the compound structure visualization. DCPC is freely available at https://dcpc.brin.go.id/dcpc/.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The world immediately studied Coronavirus Disease 2019 (COVID-19) and raced towards finding the cure and developing an effective treatment. An automated approach is needed to discover drug candidates and provide those data to facilitate clinical trials in saving time and only focusing on the candidates which potentially become the cure for COVID-19. We propose the Drug Candidates for the Prevention of COVID-19 (DCPC) Database. DCPC Database provides a list of candidates of potential drugs for the prevention of COVID-19 based on disease-drug associations which are automatically discovered from biomedical literature. DCPC database is an integrative structural database, which involves a chemical database repository, such as PubChem and DrugBank to ensure that drug compound candidates have a standard representation of compounds. The database provides keyword-chosen categories and a determination of minimum supported articles for search, a list of drug candidates in the sorted table followed by the detail for each candidate, and a download feature. The keyword category consists of three keywords, they are Chinese herbal compounds, Indian medicinal plants, and Indian medicinal plants & diabetic treatment herbs. Each candidate links to an article in the biomedical literature and to a page of the compound structure visualization. DCPC is freely available at https://dcpc.brin.go.id/dcpc/.", "fno": "848700a124", "keywords": [ "Bioinformatics", "Database Management Systems", "Diseases", "Drugs", "Medical Information Systems", "Medicine", "Molecular Biophysics", "Patient Treatment", "Chemical Database Repository", "Chinese Herbal Compounds", "Compound Structure Visualization", "Coronavirus Disease 2019", "COVID 19 Database", "DCPC Database", "Diabetic Treatment Herbs", "Disease Drug Associations", "Drug Candidates", "Drug Compound Candidates", "Drug Bank", "Indian Medicinal Plants", "Integrative Structural Database", "Keyword Chosen Categories", "Potential Drugs", "Pub Chem", "Drugs", "COVID 19", "Proteins", "Databases", "Open Access", "Focusing", "Compounds", "SARS Co V 2", "COVID 19", "Text Mining", "Disease Drug Associations", "Herbal Medicine" ], "authors": [ { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Ahmad Afif Supianto", "givenName": "Ahmad Afif", "surname": "Supianto", "__typename": "ArticleAuthorType" }, { "affiliation": "Indonesia International Institute for Life Sciences,Department of Bioinformatics,Indonesia", "fullName": "Rizky Nurdiansyah", "givenName": "Rizky", "surname": "Nurdiansyah", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Medicine, Chung Shan Medical University,Taiwan", "fullName": "Chia-Wei Weng", "givenName": "Chia-Wei", "surname": "Weng", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitas Brawijaya,Faculty of Medicine,Department of Mental Health Nursing,Indonesia", "fullName": "Heni Dwi Windarwati", "givenName": "Heni Dwi", "surname": "Windarwati", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Raden Sandra Yuwana", "givenName": "Raden Sandra", "surname": "Yuwana", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Andria Arisal", "givenName": "Andria", "surname": "Arisal", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Vicky Zilvan", "givenName": "Vicky", "surname": "Zilvan", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Hilman Ferdinandus Pardede", "givenName": "Hilman Ferdinandus", "surname": "Pardede", "__typename": "ArticleAuthorType" }, { "affiliation": "National Formosa University,Department of Computer Science and Information Engineering,Taiwan", "fullName": "Chien-Hung Huang", "givenName": "Chien-Hung", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Ana Heryana", "givenName": "Ana", "surname": "Heryana", "__typename": "ArticleAuthorType" }, { "affiliation": "Research Center for Data and Information Sciences, National Research and Innovation Agency,Indonesia", "fullName": "Dikdik Krisnandi", "givenName": "Dikdik", "surname": "Krisnandi", "__typename": "ArticleAuthorType" }, { "affiliation": "Asia University,Department of Bioinformatics and Medical Engineering,Taiwan", "fullName": "Ka-Lok Ng", "givenName": "Ka-Lok", "surname": "Ng", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "124-127", "year": "2022", "issn": null, "isbn": "978-1-6654-8487-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "848700a121", "articleId": "1J6hE11617a", "__typename": "AdjacentArticleType" }, "next": { "fno": "848700a128", "articleId": "1J6hJGkP4nS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2021/0126/0/09669736", "title": "COVID-19 Knowledge Graph for Drug and Vaccine Development", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669736/1A9VZkt6RdC", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669340", "title": "Self-Supervised Learning with Heterogeneous Graph Neural Network for COVID-19 Drug Recommendation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669340/1A9VePaj9WE", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995319", "title": "Development of Machine Learning Regression Model for COVID-19 Drug Target Prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995319/1JC39SCkeVW", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/01/09248607", "title": "COVID-19-CT-CXR: A Freely Accessible and Weakly Labeled Chest X-Ray and CT Image Collection on COVID-19 From Biomedical Literature", "doi": null, "abstractUrl": "/journal/bd/2021/01/09248607/1otZZzqPLMY", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2021/01/09250525", "title": "Supercomputing Pipelines Search for Therapeutics Against COVID-19", "doi": null, "abstractUrl": "/magazine/cs/2021/01/09250525/1oxkm31R5e0", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313472", "title": "Predicting Drugs for COVID-19/SARS-CoV-2 via Heterogeneous Graph Attention Networks", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313472/1qmga3GMDBK", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378164", "title": "Graph Neural Networks for COVID-19 Drug Discovery", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378164/1s64m8AxmRq", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d796", "title": "Quantifying Variability in Microscopy Image Analyses for COVID-19 Drug Discovery", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d796/1wG5NB4kMPC", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/escience/2021/0361/0/036100a060", "title": "Compound Segmentation via Clustering on Mol2Vec-based Embeddings", "doi": null, "abstractUrl": "/proceedings-article/escience/2021/036100a060/1y14EDAS8lq", "parentPublication": { "id": "proceedings/escience/2021/0361/0", "title": "2021 IEEE 17th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2021/1770/0/177000a291", "title": "Building the COVID-19 Portal By Integrating Literature, Clinical Trials, and Knowledge Graphs", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2021/177000a291/1zJmRq80SaY", "parentPublication": { "id": "proceedings/jcdl/2021/1770/0", "title": "2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iffxTX5EwU", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1iffAd5Kog0", "doi": "10.1109/ICSC.2020.00042", "title": "OntoQSAR: an Ontology for Interpreting Chemical and Biological Data in Quantitative Structure-Activity Relationship Studies", "normalizedTitle": "OntoQSAR: an Ontology for Interpreting Chemical and Biological Data in Quantitative Structure-Activity Relationship Studies", "abstract": "Recent developments in the fields of medicinal chemistry and computer science have made possible to perform rational drug design, helping reduce the cost and time required to discover new therapeutic agents. Particularly, quantitative structure-activity relationship (QSAR) studies have been widely employed to correlate molecular structure to biological activity. Such analyses take into account a set of chemical compounds encoded by numerical descriptors and biological data for generating mathematical models capable to predict biological activity values for structurally similar unknown compounds. Although a huge amount of chemical and biological data has become publicly available, there is an increasing need for integrating and sharing the data from various repositories in order to derive a reusable domain knowledge base. Attempting to overcome such limitation, this article proposes an ontology for QSAR studies, named OntoQSAR, which describes the major concepts in these analyses, like methods used to obtain chemical descriptors and biological properties of chemical compounds. Since the compounds of interest in these studies must be subjected to the same methods for obtaining the necessary numerical descriptors, the developed ontology will allow that information to be reused in other related researches.", "abstracts": [ { "abstractType": "Regular", "content": "Recent developments in the fields of medicinal chemistry and computer science have made possible to perform rational drug design, helping reduce the cost and time required to discover new therapeutic agents. Particularly, quantitative structure-activity relationship (QSAR) studies have been widely employed to correlate molecular structure to biological activity. Such analyses take into account a set of chemical compounds encoded by numerical descriptors and biological data for generating mathematical models capable to predict biological activity values for structurally similar unknown compounds. Although a huge amount of chemical and biological data has become publicly available, there is an increasing need for integrating and sharing the data from various repositories in order to derive a reusable domain knowledge base. Attempting to overcome such limitation, this article proposes an ontology for QSAR studies, named OntoQSAR, which describes the major concepts in these analyses, like methods used to obtain chemical descriptors and biological properties of chemical compounds. Since the compounds of interest in these studies must be subjected to the same methods for obtaining the necessary numerical descriptors, the developed ontology will allow that information to be reused in other related researches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent developments in the fields of medicinal chemistry and computer science have made possible to perform rational drug design, helping reduce the cost and time required to discover new therapeutic agents. Particularly, quantitative structure-activity relationship (QSAR) studies have been widely employed to correlate molecular structure to biological activity. Such analyses take into account a set of chemical compounds encoded by numerical descriptors and biological data for generating mathematical models capable to predict biological activity values for structurally similar unknown compounds. Although a huge amount of chemical and biological data has become publicly available, there is an increasing need for integrating and sharing the data from various repositories in order to derive a reusable domain knowledge base. Attempting to overcome such limitation, this article proposes an ontology for QSAR studies, named OntoQSAR, which describes the major concepts in these analyses, like methods used to obtain chemical descriptors and biological properties of chemical compounds. Since the compounds of interest in these studies must be subjected to the same methods for obtaining the necessary numerical descriptors, the developed ontology will allow that information to be reused in other related researches.", "fno": "633200a203", "keywords": [ "Biochemistry", "Biology Computing", "Chemistry Computing", "Data Handling", "Drugs", "Molecular Biophysics", "Molecular Configurations", "Ontologies Artificial Intelligence", "QSAR", "Biological Data", "Quantitative Structure Activity Relationship Studies", "Medicinal Chemistry", "Computer Science", "Rational Drug Design", "Molecular Structure", "Chemical Compounds", "Biological Activity Values", "Structurally Similar Unknown Compounds", "QSAR Studies", "Chemical Descriptors", "Biological Properties", "Developed Ontology", "Ontologies", "Inhibitors", "Chemicals", "Biological Information Theory", "Drugs", "Compounds", "Ontologies Drug Design Quantitative Structure Activity Relationships" ], "authors": [ { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Rafaela M. Angelo", "givenName": "Rafaela M.", "surname": "Angelo", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Andreia K. Io", "givenName": "Andreia K.", "surname": "Io", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Matheus P. Almeida", "givenName": "Matheus P.", "surname": "Almeida", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Rafael G. Silveira", "givenName": "Rafael G.", "surname": "Silveira", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Patricia R. Oliveira", "givenName": "Patricia R.", "surname": "Oliveira", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Jose J. P. Alcazar", "givenName": "Jose J. P.", "surname": "Alcazar", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Kathia M. Honorio", "givenName": "Kathia M.", "surname": "Honorio", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Sao Paulo, Brazil", "fullName": "Fernanda Bettanin", "givenName": "Fernanda", "surname": "Bettanin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-02-01T00:00:00", "pubType": "proceedings", "pages": "203-206", "year": "2020", "issn": "2325-6516", "isbn": "978-1-7281-6332-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "633200a199", "articleId": "1iffB07OjkY", "__typename": "AdjacentArticleType" }, "next": { "fno": "633200a211", "articleId": "1iffzT9hHEY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2013/5004/0/5004a106", "title": "Quantitative Structure-Activity Relationship Model of Lenalidomide Analogues as TNF-Inhibitors", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a106/12OmNvjgWTJ", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2006/2701/0/04053093", "title": "Comparison of Descriptor Spaces for Chemical Compound Retrieval and Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2006/04053093/12OmNwE9OOF", "parentPublication": { "id": "proceedings/icdm/2006/2701/0", "title": "Sixth International Conference on Data Mining (ICDM'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999387", "title": "Scaffold-based chemical space exploration", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999387/12OmNyywxAA", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/05/ttb2011051373", "title": "Using Kernel Alignment to Select Features of Molecular Descriptors in a QSAR Study", "doi": null, "abstractUrl": "/journal/tb/2011/05/ttb2011051373/13rRUxOdDbg", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/02/08126850", "title": "Estrogenic Active Stilbene Derivatives as Anti-Cancer Agents: A DFT and QSAR Study", "doi": null, "abstractUrl": "/journal/tb/2019/02/08126850/13rRUxlgxN1", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420679", "title": "Predicting the Absorption Potential of Chemical Compounds Through a Deep Learning Approach", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420679/13rRUxlgy2e", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/01/08353138", "title": "Resource Cut, a New Bounding Procedure to Algorithms for Enumerating Tree-Like Chemical Graphs", "doi": null, "abstractUrl": "/journal/tb/2019/01/08353138/17D45XwUAMZ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a363", "title": "Embedding of FDA Approved Drugs in Chemical Space Using Cascade Autoencoder with Metric Learning", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a363/1BYIFDtIOe4", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a111", "title": "Chemical Induced Differential Gene Expression Prediction on LINCS Database", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a111/1pBMoaXyHVC", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313317", "title": "Generating Novel Compounds Targeting SARS-CoV-2 Main Protease Based on Imbalanced Dataset", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313317/1qmfT7fjOz6", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1x4YWKn7RSw", "title": "2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "acronym": "icvris", "groupId": "1828444", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1x4ZaiJIQoM", "doi": "10.1109/ICVRIS51417.2020.00012", "title": "Construction of Design System of Network Virtual Chemistry Laboratory based on Virtual Reality Technology", "normalizedTitle": "Construction of Design System of Network Virtual Chemistry Laboratory based on Virtual Reality Technology", "abstract": "In order to improve the teaching efficiency of chemistry classroom, to enhance students' interest in chemistry, this paper constructs a novel design system of network virtual chemistry laboratory based on virtual reality technology. This system is based on virtual reality technology and Internet technology, which is different from the traditional chemistry laboratory. It can build a realistic chemistry laboratory for teachers and students and promote the communication between teachers and students. The research results show that the design system can not only improve the teaching quality and efficiency of chemistry classroom, but also promote the modernization and intelligent development of chemistry classroom.", "abstracts": [ { "abstractType": "Regular", "content": "In order to improve the teaching efficiency of chemistry classroom, to enhance students' interest in chemistry, this paper constructs a novel design system of network virtual chemistry laboratory based on virtual reality technology. This system is based on virtual reality technology and Internet technology, which is different from the traditional chemistry laboratory. It can build a realistic chemistry laboratory for teachers and students and promote the communication between teachers and students. The research results show that the design system can not only improve the teaching quality and efficiency of chemistry classroom, but also promote the modernization and intelligent development of chemistry classroom.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to improve the teaching efficiency of chemistry classroom, to enhance students' interest in chemistry, this paper constructs a novel design system of network virtual chemistry laboratory based on virtual reality technology. This system is based on virtual reality technology and Internet technology, which is different from the traditional chemistry laboratory. It can build a realistic chemistry laboratory for teachers and students and promote the communication between teachers and students. The research results show that the design system can not only improve the teaching quality and efficiency of chemistry classroom, but also promote the modernization and intelligent development of chemistry classroom.", "fno": "963600a019", "keywords": [ "Chemistry Computing", "Computer Aided Instruction", "Internet", "Laboratories", "Teaching", "Virtual Reality", "Network Virtual Chemistry Laboratory", "Virtual Reality Technology", "Chemistry Classroom", "Design System", "Internet Technology", "Traditional Chemistry Laboratory", "Realistic Chemistry Laboratory", "Chemistry", "Education", "Virtual Reality", "Production", "Internet", "Intelligent Systems", "Chemicals", "Virtual Reality Technology", "Virtual Laboratory", "Network Virtual Chemistry Laboratory" ], "authors": [ { "affiliation": "Shanghai Institute of Technology,Shanghai,China,201418", "fullName": "Zhang Xiaopan", "givenName": "Zhang", "surname": "Xiaopan", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Institute of Technology,Shanghai,China,201418", "fullName": "Yao Zhiyi", "givenName": "Yao", "surname": "Zhiyi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvris", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "19-22", "year": "2020", "issn": null, "isbn": "978-1-7281-9636-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "963600a015", "articleId": "1x4Z3khyzYI", "__typename": "AdjacentArticleType" }, "next": { "fno": "963600a023", "articleId": "1x4ZhiAKmCA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigmm/2017/6549/0/07966775", "title": "Experiences with Multi-modal Collaborative Virtual Laboratory (MMCVL)", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2017/07966775/12OmNBiygwX", "parentPublication": { "id": "proceedings/bigmm/2017/6549/0", "title": "2017 IEEE Third International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2017/0621/0/0621a579", "title": "Development of Smartphone-Based Inquiry Laboratory Lessons in Chemistry Learning of Solution and Concentration: An Evidence-Based Practice", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2017/0621a579/12OmNqJHFKr", "parentPublication": { "id": "proceedings/iiai-aai/2017/0621/0", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2017/0621/0/0621b005", "title": "The Development and Evaluation of an Educational Game Integrated with Augmented Reality and Virtual Laboratory for Chemistry Experiment Learning", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2017/0621b005/12OmNwF0C22", "parentPublication": { "id": "proceedings/iiai-aai/2017/0621/0", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2004/2181/0/21810605", "title": "Virtual Chemistry Laboratory for School Education", "doi": null, "abstractUrl": "/proceedings-article/icalt/2004/21810605/12OmNwcUk3p", "parentPublication": { "id": "proceedings/icalt/2004/2181/0", "title": "Proceedings. IEEE International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2003/1967/0/19670455", "title": "A Web-Based Virtual Reality Physics Laboratory", "doi": null, "abstractUrl": "/proceedings-article/icalt/2003/19670455/12OmNxZTtHQ", "parentPublication": { "id": "proceedings/icalt/2003/1967/0", "title": "Advanced Learning Technologies, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2001/6669/3/00964021", "title": "Chemistry laboratory innovations using Universal Lab Interface (ULI)", "doi": null, "abstractUrl": "/proceedings-article/fie/2001/00964021/12OmNxZkhvG", "parentPublication": { "id": "proceedings/fie/2001/6669/3", "title": "31st Annual Frontiers in Education Conference. Impact on Engineering and Science Education. Conference Proceedings (Cat. No.01CH37193)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757580", "title": "Hands-on and Virtual laboratories to undergraduate Chemistry education: Toward a pedagogical integration", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757580/12OmNxeut5F", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sutc/2008/3158/0/3158a561", "title": "Hands-On Training for Chemistry Laboratory in a Ubiquitous Computing Environment", "doi": null, "abstractUrl": "/proceedings-article/sutc/2008/3158a561/12OmNyo1o7Q", "parentPublication": { "id": "proceedings/sutc/2008/3158/0", "title": "2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2019/4227/0/422700a201", "title": "Blended Learning Approach using Virtual Laboratory Applications in Engineering Chemistry", "doi": null, "abstractUrl": "/proceedings-article/t4e/2019/422700a201/1hgtHTldA0E", "parentPublication": { "id": "proceedings/t4e/2019/4227/0", "title": "2019 IEEE Tenth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/laclo/2019/4286/0/428600a393", "title": "Augmented Reality in the Development of a Virtual Chemistry Laboratory", "doi": null, "abstractUrl": "/proceedings-article/laclo/2019/428600a393/1hrMuuQoLcs", "parentPublication": { "id": "proceedings/laclo/2019/4286/0", "title": "2019 XIV Latin American Conference on Learning Technologies (LACLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvEyR81", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "acronym": "re", "groupId": "1000630", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJ11yp", "doi": "10.1109/RE.2013.6636762", "title": "Visual analytics for software requirements engineering", "normalizedTitle": "Visual analytics for software requirements engineering", "abstract": "The research on visual analytics for requirements engineering has noticeably advanced in the past few years. For many software projects, requirements management needs an effective and efficient path from data to decision. Visual analytics (VA) creates such a path that enables the user to extract insights by interacting with the relevant information. While various requirements visualization techniques exist, only few have produced end-to-end values to practitioners. In this research proposal, we advance the literature on visual requirements analytics by characterizing its key components and relationships. Such a characterization allows us to not only assess existing approaches, but also develop tool enhancements in a principled manner. We describe our ongoing work on VA and outline future research plans.", "abstracts": [ { "abstractType": "Regular", "content": "The research on visual analytics for requirements engineering has noticeably advanced in the past few years. For many software projects, requirements management needs an effective and efficient path from data to decision. Visual analytics (VA) creates such a path that enables the user to extract insights by interacting with the relevant information. While various requirements visualization techniques exist, only few have produced end-to-end values to practitioners. In this research proposal, we advance the literature on visual requirements analytics by characterizing its key components and relationships. Such a characterization allows us to not only assess existing approaches, but also develop tool enhancements in a principled manner. We describe our ongoing work on VA and outline future research plans.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The research on visual analytics for requirements engineering has noticeably advanced in the past few years. For many software projects, requirements management needs an effective and efficient path from data to decision. Visual analytics (VA) creates such a path that enables the user to extract insights by interacting with the relevant information. While various requirements visualization techniques exist, only few have produced end-to-end values to practitioners. In this research proposal, we advance the literature on visual requirements analytics by characterizing its key components and relationships. Such a characterization allows us to not only assess existing approaches, but also develop tool enhancements in a principled manner. We describe our ongoing work on VA and outline future research plans.", "fno": "06636762", "keywords": [ "Data Visualization", "Visual Analytics", "Software", "Decision Making", "Cognition", "Labeling", "Decision Making", "Requirements Management", "Requirements Engineering Visualization", "Visual Analytics" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering Mississippi State University Mississippi State, USA", "fullName": "Sandeep Reddivari", "givenName": "Sandeep", "surname": "Reddivari", "__typename": "ArticleAuthorType" } ], "idPrefix": "re", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "389-392", "year": "2013", "issn": null, "isbn": "978-1-4673-5765-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06636761", "articleId": "12OmNylbour", "__typename": "AdjacentArticleType" }, "next": { "fno": "06636763", "articleId": "12OmNyeWdIl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/04/mcg2014040008", "title": "Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation", "doi": null, "abstractUrl": "/magazine/cg/2014/04/mcg2014040008/13rRUwwslv3", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/02/mcg2015020016", "title": "Preparing Undergraduates for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/02/mcg2015020016/13rRUxjQyjN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06908006", "title": "Personal Visualization and Personal Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09906559", "title": "In Defence of Visual Analytics Systems: Replies to Critics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09906559/1H5F2wJXT4Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08423105", "title": "Commercial Visual Analytics Systems&#x2013;Advances in the Big Data Analytics Field", "doi": null, "abstractUrl": "/journal/tg/2019/10/08423105/1cYd7bZMLp6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2020/8514/0/851400a009", "title": "Beyond Trust Building &#x2014; Calibrating Trust in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2020/851400a009/1pXm2QUw2ek", "parentPublication": { "id": "proceedings/trex/2020/8514/0", "title": "2020 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a014", "title": "Making and Trusting Decisions in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a014/1yQB6h3HL6o", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyugyQo", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNrMHOiW", "doi": "10.1109/WACV.2014.6836093", "title": "Selectively guiding visual concept discovery", "normalizedTitle": "Selectively guiding visual concept discovery", "abstract": "Labeling data to train visual concept classifiers requires significant human effort. Active learning addresses labeling overhead by selecting a meaningful subset of data, but often these approaches assume that the set of visual concepts is known in advance. Clustering approaches perform bottom-up discovery of concepts, and reduce labeling effort by moving from instance-based to group-based labeling. Unfortunately, clustering techniques assume a one-to-one mapping between clusters and visual concepts even though learned groups are often not coherent and fail to represent all concepts. We introduce Selective Guidance, a technique that hierarchically clusters data and selectively queries labels of coherent clusters representing different visual concepts. Unlike most active learning and clustering techniques, Selective Guidance does not require any a priori knowledge. Using benchmark data sets we show that Selective Guidance achieves classification accuracy better than active learning and clustering approaches with fewer labeling queries.", "abstracts": [ { "abstractType": "Regular", "content": "Labeling data to train visual concept classifiers requires significant human effort. Active learning addresses labeling overhead by selecting a meaningful subset of data, but often these approaches assume that the set of visual concepts is known in advance. Clustering approaches perform bottom-up discovery of concepts, and reduce labeling effort by moving from instance-based to group-based labeling. Unfortunately, clustering techniques assume a one-to-one mapping between clusters and visual concepts even though learned groups are often not coherent and fail to represent all concepts. We introduce Selective Guidance, a technique that hierarchically clusters data and selectively queries labels of coherent clusters representing different visual concepts. Unlike most active learning and clustering techniques, Selective Guidance does not require any a priori knowledge. Using benchmark data sets we show that Selective Guidance achieves classification accuracy better than active learning and clustering approaches with fewer labeling queries.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Labeling data to train visual concept classifiers requires significant human effort. Active learning addresses labeling overhead by selecting a meaningful subset of data, but often these approaches assume that the set of visual concepts is known in advance. Clustering approaches perform bottom-up discovery of concepts, and reduce labeling effort by moving from instance-based to group-based labeling. Unfortunately, clustering techniques assume a one-to-one mapping between clusters and visual concepts even though learned groups are often not coherent and fail to represent all concepts. We introduce Selective Guidance, a technique that hierarchically clusters data and selectively queries labels of coherent clusters representing different visual concepts. Unlike most active learning and clustering techniques, Selective Guidance does not require any a priori knowledge. Using benchmark data sets we show that Selective Guidance achieves classification accuracy better than active learning and clustering approaches with fewer labeling queries.", "fno": "06836093", "keywords": [ "Visualization", "Labeling", "Training Data", "Accuracy", "Training", "Clustering Algorithms", "Testing" ], "authors": [ { "affiliation": "Colorado State University, Fort Collins, USA", "fullName": "Maggie Wigness", "givenName": "Maggie", "surname": "Wigness", "__typename": "ArticleAuthorType" }, { "affiliation": "Colorado State University, Fort Collins, USA", "fullName": "Bruce A. Draper", "givenName": "Bruce A.", "surname": "Draper", "__typename": "ArticleAuthorType" }, { "affiliation": "Colorado State University, Fort Collins, USA", "fullName": "J. Ross Beveridge", "givenName": "J. Ross", "surname": "Beveridge", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-03-01T00:00:00", "pubType": "proceedings", "pages": "247-254", "year": "2014", "issn": null, "isbn": "978-1-4799-4985-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06836092", "articleId": "12OmNxw5B42", "__typename": "AdjacentArticleType" }, "next": { "fno": "06836094", "articleId": "12OmNAIMO9V", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bracis/2015/0016/0/0016a062", "title": "Selectively Inhibiting Learning Bias for Active Sampling", "doi": null, "abstractUrl": "/proceedings-article/bracis/2015/0016a062/12OmNBqMDrN", "parentPublication": { "id": "proceedings/bracis/2015/0016/0", "title": "2015 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/suite/2012/1848/0/06225472", "title": "Automatic labeling of software requirements clusters", "doi": null, "abstractUrl": "/proceedings-article/suite/2012/06225472/12OmNro0Ieg", "parentPublication": { "id": "proceedings/suite/2012/1848/0", "title": "2012 4th International Workshop on Search-driven Development: Users, Infrastructure, Tools, and Evaluation (SUITE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cimca/2006/2731/0/04052852", "title": "A New Web Search Result Clustering based on True Common Phrase Label Discovery", "doi": null, "abstractUrl": "/proceedings-article/cimca/2006/04052852/12OmNyQYt3K", "parentPublication": { "id": "proceedings/cimca/2006/2731/0", "title": "2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference on Intelligent Agents Web Technologies and International Commerce (CIMCA'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391c596", "title": "Automatic Concept Discovery from Parallel Text and Visual Corpora", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c596/12OmNzZ5okt", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032b472", "title": "Automatic Spatially-Aware Fashion Concept Discovery", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b472/12OmNzcPAFH", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2017/3684/0/3684a186", "title": "Research on Image Fusion Algorithm Based on Fuzzy Clustering and Semantics", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2017/3684a186/12OmNzuZUy9", "parentPublication": { "id": "proceedings/smartcloud/2017/3684/0", "title": "2017 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/07/06606788", "title": "Iterative Discovery of Multiple AlternativeClustering Views", "doi": null, "abstractUrl": "/journal/tp/2014/07/06606788/13rRUwkfB0u", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2016/04/07035115", "title": "An Approach to Computation of Similarity, Inter-Cluster Distance and Selection of Threshold for Service Discovery Using Clusters", "doi": null, "abstractUrl": "/journal/sc/2016/04/07035115/13rRUxAASQA", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/11/ttk2013112494", "title": "Efficient Cluster Labeling for Support Vector Clustering", "doi": null, "abstractUrl": "/journal/tk/2013/11/ttk2013112494/13rRUxly965", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904017", "title": "Visual Concept Programming: A Visual Analytics Approach to Injecting Human Intelligence at Scale", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904017/1H0GlgwfKak", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwl8GHe", "title": "Management of e-Commerce and e-Government, International Conference on", "acronym": "icmecg", "groupId": "1002486", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAY79ea", "doi": "10.1109/ICMeCG.2012.29", "title": "Building a Tag Map for Recommendations in Microblogging", "normalizedTitle": "Building a Tag Map for Recommendations in Microblogging", "abstract": "In its brief history of about two decades, the Web has evolved from a technical framework for information dissemination to more of an enabler of social interactions among its users. This weaves a huge virtual social network for users. Finding friends and targeting useful information are great challenges in such a complicated social network. Different with traditional content-based and collaborative information filtering techniques without considering social connections among users, we propose a naive recommendation approach utilizing user relationships to find friends and hot topics in social media. This is achieved by weaving a tag map from user preferences. Our experiments based on Microblogging data from Sina.com show a promising result in social media recommendation.", "abstracts": [ { "abstractType": "Regular", "content": "In its brief history of about two decades, the Web has evolved from a technical framework for information dissemination to more of an enabler of social interactions among its users. This weaves a huge virtual social network for users. Finding friends and targeting useful information are great challenges in such a complicated social network. Different with traditional content-based and collaborative information filtering techniques without considering social connections among users, we propose a naive recommendation approach utilizing user relationships to find friends and hot topics in social media. This is achieved by weaving a tag map from user preferences. Our experiments based on Microblogging data from Sina.com show a promising result in social media recommendation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In its brief history of about two decades, the Web has evolved from a technical framework for information dissemination to more of an enabler of social interactions among its users. This weaves a huge virtual social network for users. Finding friends and targeting useful information are great challenges in such a complicated social network. Different with traditional content-based and collaborative information filtering techniques without considering social connections among users, we propose a naive recommendation approach utilizing user relationships to find friends and hot topics in social media. This is achieved by weaving a tag map from user preferences. Our experiments based on Microblogging data from Sina.com show a promising result in social media recommendation.", "fno": "4853a169", "keywords": [ "Microblogging", "Tag Map", "Recommender", "Social Media" ], "authors": [ { "affiliation": null, "fullName": "Yinghua Xiao", "givenName": "Yinghua", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ting Du", "givenName": "Ting", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wen Zhu", "givenName": "Wen", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qing Li", "givenName": "Qing", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmecg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "169-172", "year": "2012", "issn": null, "isbn": "978-1-4673-2943-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4853a165", "articleId": "12OmNyprntQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "4853a173", "articleId": "12OmNBSSVbT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ihmsc/2010/4151/1/4151a292", "title": "Integrating Social Relations into Personalized Tag Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ihmsc/2010/4151a292/12OmNwE9OxK", "parentPublication": { "id": "proceedings/ihmsc/2010/4151/1", "title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a148", "title": "Exploiting Additional Context for Graph-Based Tag Recommendations in Folksonomy Systems", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a148/12OmNwcl7L3", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612b222", "title": "Incorporating Sentiment Analysis for Improved Tag-Based Recommendation", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612b222/12OmNwnH4UQ", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a038", "title": "SoCaST: Exploiting Social, Categorical and Spatio-Temporal Preferences for Personalized Event Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a038/12OmNybfr70", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2017/6517/0/07947006", "title": "EventRec: Personalized Event Recommendations for Smart Event-Based Social Networks", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2017/07947006/12OmNzUgd2I", "parentPublication": { "id": "proceedings/smartcomp/2017/6517/0", "title": "2017 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/02/ttk2010020179", "title": "A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis", "doi": null, "abstractUrl": "/journal/tk/2010/02/ttk2010020179/13rRUwhHcRb", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2013/04/ttd2013040642", "title": "Bayesian-Inference-Based Recommendation in Online Social Networks", "doi": null, "abstractUrl": "/journal/td/2013/04/ttd2013040642/13rRUxE04te", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2012/03/mic2012030037", "title": "HorNet: Microblogging for a Contributory Social Network", "doi": null, "abstractUrl": "/magazine/ic/2012/03/mic2012030037/13rRUxly99X", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594827", "title": "Social Recommendation with Missing Not at Random Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594827/17D45XDIXWH", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a429", "title": "A Computational Model for Promoting Targeted Communication and Supplying Social Explainable Recommendations", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a429/1cdO3QhPb0s", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrMHOdd", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBDQbnR", "doi": "10.1109/VAST.2016.7883512", "title": "EventAction: Visual analytics for temporal event sequence recommendation", "normalizedTitle": "EventAction: Visual analytics for temporal event sequence recommendation", "abstract": "Recommender systems are being widely used to assist people in making decisions, for example, recommending films to watch or books to buy. Despite its ubiquity, the problem of presenting the recommendations of temporal event sequences has not been studied. We propose EventAction, which to our knowledge, is the first attempt at a prescriptive analytics interface designed to present and explain recommendations of temporal event sequences. EventAction provides a visual analytics approach to (1) identify similar records, (2) explore potential outcomes, (3) review recommended temporal event sequences that might help achieve the users' goals, and (4) interactively assist users as they define a personalized action plan associated with a probability of success. Following the design study framework, we designed and deployed EventAction in the context of student advising and reported on the evaluation with a student review manager and three graduate students.", "abstracts": [ { "abstractType": "Regular", "content": "Recommender systems are being widely used to assist people in making decisions, for example, recommending films to watch or books to buy. Despite its ubiquity, the problem of presenting the recommendations of temporal event sequences has not been studied. We propose EventAction, which to our knowledge, is the first attempt at a prescriptive analytics interface designed to present and explain recommendations of temporal event sequences. EventAction provides a visual analytics approach to (1) identify similar records, (2) explore potential outcomes, (3) review recommended temporal event sequences that might help achieve the users' goals, and (4) interactively assist users as they define a personalized action plan associated with a probability of success. Following the design study framework, we designed and deployed EventAction in the context of student advising and reported on the evaluation with a student review manager and three graduate students.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recommender systems are being widely used to assist people in making decisions, for example, recommending films to watch or books to buy. Despite its ubiquity, the problem of presenting the recommendations of temporal event sequences has not been studied. We propose EventAction, which to our knowledge, is the first attempt at a prescriptive analytics interface designed to present and explain recommendations of temporal event sequences. EventAction provides a visual analytics approach to (1) identify similar records, (2) explore potential outcomes, (3) review recommended temporal event sequences that might help achieve the users' goals, and (4) interactively assist users as they define a personalized action plan associated with a probability of success. Following the design study framework, we designed and deployed EventAction in the context of student advising and reported on the evaluation with a student review manager and three graduate students.", "fno": "07883512", "keywords": [ "Recommender Systems", "Visual Analytics", "Medical Services", "History", "Timing", "Prototypes", "Visual Analytics", "Temporal Event Sequences", "Recommender Systems", "Prescriptive Analytics" ], "authors": [ { "affiliation": "University of Maryland, United States of America", "fullName": "Fan Du", "givenName": "Fan", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland, United States of America", "fullName": "Catherine Plaisant", "givenName": "Catherine", "surname": "Plaisant", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland, United States of America", "fullName": "Neil Spring", "givenName": "Neil", "surname": "Spring", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Maryland, United States of America", "fullName": "Ben Shneiderman", "givenName": "Ben", "surname": "Shneiderman", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "61-70", "year": "2016", "issn": null, "isbn": "978-1-5090-5661-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07883511", "articleId": "12OmNvmG80S", "__typename": "AdjacentArticleType" }, "next": { "fno": "07883513", "articleId": "12OmNrY3LBe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a038", "title": "SoCaST: Exploiting Social, Categorical and Spatio-Temporal Preferences for Personalized Event Recommendations", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a038/12OmNybfr70", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/04/ttg2011040440", "title": "Forecasting Hotspots—A Predictive Analytics Approach", "doi": null, "abstractUrl": "/journal/tg/2011/04/ttg2011040440/13rRUwdrdSv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/06/07429778", "title": "Coping with Volume and Variety in Temporal Event Sequences: Strategies for Sharpening Analytic Focus", "doi": null, "abstractUrl": "/journal/tg/2017/06/07429778/13rRUwjGoG9", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875996", "title": "DecisionFlow: Visual Analytics for High-Dimensional Temporal Event Sequence Data", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875996/13rRUxE04tA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08025640", "title": "Sequence Synopsis: Optimize Visual Summary of Temporal Event Data", "doi": null, "abstractUrl": "/journal/tg/2018/01/08025640/13rRUyft7D8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a251", "title": "Visual Analytics for Decomposing Temporal Event Series of Production Lines", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a251/17D45WcjjRK", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585638", "title": "E-Map: A Visual Analytics Approach for Exploring Significant Event Evolutions in Social Media", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585638/17D45WrVg7l", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807220", "title": "Visual Analysis of High-Dimensional Event Sequence Data via Dynamic Hierarchical Aggregation", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807220/1cG6bfa8KkM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933770", "title": "Analyzing Time Attributes in Temporal Event Sequences", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933770/1fTgG41zCqA", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222294", "title": "Visual Causality Analysis of Event Sequence Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222294/1nTqOCPOdTq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzgNXYN", "title": "Communication Systems and Network Technologies, International Conference on", "acronym": "csnt", "groupId": "1800448", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqdrbO", "doi": "10.1109/CSNT.2012.218", "title": "Hybrid Recommender Systems: Content-Boosted Collaborative Filtering for Improved Recommendations", "normalizedTitle": "Hybrid Recommender Systems: Content-Boosted Collaborative Filtering for Improved Recommendations", "abstract": "Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, knowledge-based and other techniques. To improve performance, these methods have sometimes been combined in hybrid recommenders. This paper explains the landscape of actual and possible hybrid recommenders, and introduces a novel hybrid, a system that combines content boosted recommendation and collaborative Filtering to recommend restaurants.", "abstracts": [ { "abstractType": "Regular", "content": "Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, knowledge-based and other techniques. To improve performance, these methods have sometimes been combined in hybrid recommenders. This paper explains the landscape of actual and possible hybrid recommenders, and introduces a novel hybrid, a system that combines content boosted recommendation and collaborative Filtering to recommend restaurants.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recommender systems represent user preferences for the purpose of suggesting items to purchase or examine. They have become fundamental applications in electronic commerce and information access, providing suggestions that effectively prune large information spaces so that users are directed toward those items that best meet their needs and preferences. A variety of techniques have been proposed for performing recommendation, including content-based, collaborative, knowledge-based and other techniques. To improve performance, these methods have sometimes been combined in hybrid recommenders. This paper explains the landscape of actual and possible hybrid recommenders, and introduces a novel hybrid, a system that combines content boosted recommendation and collaborative Filtering to recommend restaurants.", "fno": "4692a649", "keywords": [ "Collaborative Filtering", "Electronic Commerce", "Recommender Systems" ], "authors": [ { "affiliation": null, "fullName": "Vipul Vekariya", "givenName": "Vipul", "surname": "Vekariya", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "G. R. Kulkarni", "givenName": "G. R.", "surname": "Kulkarni", "__typename": "ArticleAuthorType" } ], "idPrefix": "csnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-05-01T00:00:00", "pubType": "proceedings", "pages": "649-653", "year": "2012", "issn": null, "isbn": "978-0-7695-4692-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4692a643", "articleId": "12OmNBOCWcd", "__typename": "AdjacentArticleType" }, "next": { "fno": "4692a654", "articleId": "12OmNylsZXS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2014/4143/1/4143a340", "title": "Improving Collaborative Filtering Based Recommenders Using Topic Modelling", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143a340/12OmNBUAvYr", "parentPublication": { "id": "wi-iat/2014/4143/1", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-cpscom/2010/4331/0/4331a846", "title": "A Hybrid Movie Recommender Based on Ontology and Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/greencom-cpscom/2010/4331a846/12OmNs0C9Bk", "parentPublication": { "id": "proceedings/greencom-cpscom/2010/4331/0", "title": "IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2008/3496/1/3496a806", "title": "Iterative Neighbourhood Similarity Computation for Collaborative Filtering", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2008/3496a806/12OmNvSbBnX", "parentPublication": { "id": "proceedings/wi-iat/2008/3496/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a796", "title": "Madrid live: a context-aware recommender systems of leisure plans", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a796/12OmNvzJFVp", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/paccs/2009/3614/0/3614a690", "title": "Combining Memory-Based and Model-Based Collaborative Filtering in Recommender System", "doi": null, "abstractUrl": "/proceedings-article/paccs/2009/3614a690/12OmNxFaLp7", "parentPublication": { "id": "proceedings/paccs/2009/3614/0", "title": "2009 Pacific-Asia Conference on Circuits, Communications and Systems (PACCS 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mmit/2008/3556/0/3556a143", "title": "Research on Improved Collaborative Filtering-Based Mobile E-Commerce Personalized Recommender System", "doi": null, "abstractUrl": "/proceedings-article/mmit/2008/3556a143/12OmNyTfg3N", "parentPublication": { "id": "proceedings/mmit/2008/3556/0", "title": "MultiMedia and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2005/06/k0734", "title": "Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions", "doi": null, "abstractUrl": "/journal/tk/2005/06/k0734/13rRUxDIthy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020921", "title": "Collaborative Filtering Guided Deep Reinforcement Learning for Sequential Recommendations", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020921/1KfTeQPTLu8", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2020/9866/0/986600a347", "title": "Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/mass/2020/986600a347/1rsiYUJrnb2", "parentPublication": { "id": "proceedings/mass/2020/9866/0", "title": "2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2021/1252/0/125200a203", "title": "A Hybrid Recommender System for Cultural Heritage Promotion", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2021/125200a203/1xxcCnkfUE8", "parentPublication": { "id": "proceedings/smartcomp/2021/1252/0", "title": "2021 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }