data
dict
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hcTVtKNy", "doi": "10.1109/VIS54862.2022.00010", "title": "Facilitating Conversational Interaction in Natural Language Interfaces for Visualization", "normalizedTitle": "Facilitating Conversational Interaction in Natural Language Interfaces for Visualization", "abstract": "Natural language (NL) toolkits enable visualization developers, who may not have a background in natural language processing (NLP), to create natural language interfaces (NLIs) for end-users to flexibly specify and interact with visualizations. However, these toolkits currently only support one-off utterances, with minimal capability to facilitate a multi-turn dialog between the user and the system. Developing NLIs with such conversational interaction capabilities remains a challenging task, requiring implementations of low-level NLP techniques to process a new query as an intent to follow-up on an older query. We extend an existing Python-based toolkit, NL4DV, that processes an NL query about a tabular dataset and returns an analytic specification containing data attributes, analytic tasks, and relevant visualizations, modeled as a JSON object. Specifically, NL4DV now enables developers to facilitate multiple simultaneous conversations about a dataset and resolve associated ambiguities, augmenting new conversational information into the output JSON object. We demonstrate these capabilities through three examples: (1) an NLI to learn aspects of the Vega-Lite grammar, (2) a mind mapping application to create free-flowing conversations, and (3) a chatbot to answer questions and resolve ambiguities.", "abstracts": [ { "abstractType": "Regular", "content": "Natural language (NL) toolkits enable visualization developers, who may not have a background in natural language processing (NLP), to create natural language interfaces (NLIs) for end-users to flexibly specify and interact with visualizations. However, these toolkits currently only support one-off utterances, with minimal capability to facilitate a multi-turn dialog between the user and the system. Developing NLIs with such conversational interaction capabilities remains a challenging task, requiring implementations of low-level NLP techniques to process a new query as an intent to follow-up on an older query. We extend an existing Python-based toolkit, NL4DV, that processes an NL query about a tabular dataset and returns an analytic specification containing data attributes, analytic tasks, and relevant visualizations, modeled as a JSON object. Specifically, NL4DV now enables developers to facilitate multiple simultaneous conversations about a dataset and resolve associated ambiguities, augmenting new conversational information into the output JSON object. We demonstrate these capabilities through three examples: (1) an NLI to learn aspects of the Vega-Lite grammar, (2) a mind mapping application to create free-flowing conversations, and (3) a chatbot to answer questions and resolve ambiguities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Natural language (NL) toolkits enable visualization developers, who may not have a background in natural language processing (NLP), to create natural language interfaces (NLIs) for end-users to flexibly specify and interact with visualizations. However, these toolkits currently only support one-off utterances, with minimal capability to facilitate a multi-turn dialog between the user and the system. Developing NLIs with such conversational interaction capabilities remains a challenging task, requiring implementations of low-level NLP techniques to process a new query as an intent to follow-up on an older query. We extend an existing Python-based toolkit, NL4DV, that processes an NL query about a tabular dataset and returns an analytic specification containing data attributes, analytic tasks, and relevant visualizations, modeled as a JSON object. Specifically, NL4DV now enables developers to facilitate multiple simultaneous conversations about a dataset and resolve associated ambiguities, augmenting new conversational information into the output JSON object. We demonstrate these capabilities through three examples: (1) an NLI to learn aspects of the Vega-Lite grammar, (2) a mind mapping application to create free-flowing conversations, and (3) a chatbot to answer questions and resolve ambiguities.", "fno": "881200a006", "keywords": [ "Data Visualisation", "Grammars", "Interactive Systems", "Learning Artificial Intelligence", "Natural Language Interfaces", "Natural Language Processing", "Natural Languages", "Query Processing", "User Interfaces", "Conversational Information", "Conversational Interaction Capabilities", "Developing NL Is", "Existing Python Based Toolkit", "Low Level NLP Techniques", "Minimal Capability", "Multiple Simultaneous Conversations", "Multiturn Dialog", "Natural Language Interfaces", "Natural Language Processing", "NL Query", "NL 4 DV", "Older Query", "Relevant Visualizations", "Toolkits", "Visualization Developers", "Analytical Models", "Visual Analytics", "Data Visualization", "Oral Communication", "Chatbots", "Data Models", "Grammar", "Human Centered Computing", "Visualization", "Visualization Systems And Tools", "Visualization Toolkits", "Human Computer Interaction HCI", "Interaction Techniques", "Text Input" ], "authors": [ { "affiliation": "Georgia Institute of Technology", "fullName": "Rishab Mitra", "givenName": "Rishab", "surname": "Mitra", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Arpit Narechania", "givenName": "Arpit", "surname": "Narechania", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "Alex Endert", "givenName": "Alex", "surname": "Endert", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Institute of Technology", "fullName": "John Stasko", "givenName": "John", "surname": "Stasko", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "6-10", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J6hcLN4yEU", "name": "pvis202288120-09973222s1-mm_881200a006.zip", "size": "69.3 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvis202288120-09973222s1-mm_881200a006.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "881200a001", "articleId": "1J6h6awUbbG", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a011", "articleId": "1J6hcsbkAyA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cisis/2012/4687/0/4687a552", "title": "Towards a Model for Recognising the Social Attitude in Natural Interaction with Embodied Agents", "doi": null, "abstractUrl": "/proceedings-article/cisis/2012/4687a552/12OmNBgQFNb", "parentPublication": { "id": "proceedings/cisis/2012/4687/0", "title": "2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2014/02/mic2014020074", "title": "The Road to Natural Conversational Speech Interfaces", "doi": null, "abstractUrl": "/magazine/ic/2014/02/mic2014020074/13rRUyuNsBB", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2022/09/09869567", "title": "Understanding Conversational Artificial Intelligence", "doi": null, "abstractUrl": "/magazine/co/2022/09/09869567/1GeVxx12iFG", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912366", "title": "Towards Natural Language-Based Visualization Authoring", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912366/1HeiWkRN3tC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020689", "title": "Improving Conversational Recommender Systems via Knowledge Graph-based Semantic Fusion with Historical Interaction Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020689/1KfRuyTc98s", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2023/7578/0/757800a183", "title": "Dialogue Response Evaluation Model with Conversational Feature Sensitive Negative Sampling", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2023/757800a183/1LFLxRuqt1u", "parentPublication": { "id": "proceedings/bigcomp/2023/7578/0", "title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/10081075", "title": "GA2MIF: Graph and Attention Based Two-Stage Multi-Source Information Fusion for Conversational Emotion Detection", "doi": null, "abstractUrl": "/journal/ta/5555/01/10081075/1LM6ToBVePC", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222342", "title": "NL4DV: A Toolkit for Generating Analytic Specifications for Data Visualization from Natural Language Queries", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222342/1nTqOo5NR3G", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itnac/2021/2784/0/09652153", "title": "Question Answering Model Based Conversational Chatbot using BERT Model and Google Dialogflow", "doi": null, "abstractUrl": "/proceedings-article/itnac/2021/09652153/1zG3ckV5A8o", "parentPublication": { "id": "proceedings/itnac/2021/2784/0", "title": "2021 31st International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09674867", "title": "SMIN: Semi-supervised Multi-modal Interaction Network for Conversational Emotion Recognition", "doi": null, "abstractUrl": "/journal/ta/5555/01/09674867/1zYez45OH9C", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBfZSj8", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNBh8gRI", "doi": "10.1109/VAST.2012.6400490", "title": "Visual pattern discovery using random projections", "normalizedTitle": "Visual pattern discovery using random projections", "abstract": "An essential element of exploratory data analysis is the use of revealing low-dimensional projections of high-dimensional data. Projection Pursuit has been an effective method for finding interesting low-dimensional projections of multidimensional spaces by optimizing a score function called a projection pursuit index. However, the technique is not scalable to high-dimensional spaces. Here, we introduce a novel method for discovering noteworthy views of high-dimensional data spaces by using binning and random projections. We define score functions, akin to projection pursuit indices, that characterize visual patterns of the low-dimensional projections that constitute feature subspaces. We also describe an analytic, multivariate visualization platform based on this algorithm that is scalable to extremely large problems.", "abstracts": [ { "abstractType": "Regular", "content": "An essential element of exploratory data analysis is the use of revealing low-dimensional projections of high-dimensional data. Projection Pursuit has been an effective method for finding interesting low-dimensional projections of multidimensional spaces by optimizing a score function called a projection pursuit index. However, the technique is not scalable to high-dimensional spaces. Here, we introduce a novel method for discovering noteworthy views of high-dimensional data spaces by using binning and random projections. We define score functions, akin to projection pursuit indices, that characterize visual patterns of the low-dimensional projections that constitute feature subspaces. We also describe an analytic, multivariate visualization platform based on this algorithm that is scalable to extremely large problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An essential element of exploratory data analysis is the use of revealing low-dimensional projections of high-dimensional data. Projection Pursuit has been an effective method for finding interesting low-dimensional projections of multidimensional spaces by optimizing a score function called a projection pursuit index. However, the technique is not scalable to high-dimensional spaces. Here, we introduce a novel method for discovering noteworthy views of high-dimensional data spaces by using binning and random projections. We define score functions, akin to projection pursuit indices, that characterize visual patterns of the low-dimensional projections that constitute feature subspaces. We also describe an analytic, multivariate visualization platform based on this algorithm that is scalable to extremely large problems.", "fno": "06400490", "keywords": [ "Vectors", "Data Visualization", "Data Mining", "Manifolds", "Indexes", "Visual Analytics", "High Dimensional Data", "Random Projections" ], "authors": [ { "affiliation": "Department of Computer Science, University of Illinois at Chicago", "fullName": "Tuan Nhon Dang", "givenName": "Tuan Nhon", "surname": "Dang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Illinois at Chicago", "fullName": "Leland Wilkinson", "givenName": "Leland", "surname": "Wilkinson", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Illinois at Chicago", "fullName": "Anushka Anand", "givenName": "Anushka", "surname": "Anand", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-10-01T00:00:00", "pubType": "proceedings", "pages": "43-52", "year": "2012", "issn": null, "isbn": "978-1-4673-4752-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06400489", "articleId": "12OmNzFMFqy", "__typename": "AdjacentArticleType" }, "next": { "fno": "06400491", "articleId": "12OmNAkEU1K", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcbs/2009/3739/0/3739a501", "title": "Constraint Projections for Discriminative Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/ijcbs/2009/3739a501/12OmNBRbktb", "parentPublication": { "id": "proceedings/ijcbs/2009/3739/0", "title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1996/7258/0/72580885", "title": "Recovering the viewing parameters of random, translated and noisy projections of asymmetric objects", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1996/72580885/12OmNCgJe41", "parentPublication": { "id": "proceedings/cvpr/1996/7258/0", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apcip/2009/3699/2/3699b003", "title": "Face Recognition Using Two-Dimensional Discriminant Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/apcip/2009/3699b003/12OmNvjyy2p", "parentPublication": { "id": "proceedings/apcip/2009/3699/1", "title": "Information Processing, Asia-Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2014/4985/0/06836085", "title": "Random projections on manifolds of Symmetric Positive Definite matrices for image classification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2014/06836085/12OmNvmowR5", "parentPublication": { "id": "proceedings/wacv/2014/4985/0", "title": "2014 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209b568", "title": "Nonlinear Supervised Locality Preserving Projections for Visual Pattern Discrimination", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209b568/12OmNy2agT9", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840682", "title": "Fast nearest neighbor search through sparse random projections and voting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840682/12OmNyKa5Vz", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithingscpscom/2011/4580/0/4580a252", "title": "Supervised Gabor-Based Kernel Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/ithingscpscom/2011/4580a252/12OmNzTH0KO", "parentPublication": { "id": "proceedings/ithingscpscom/2011/4580/0", "title": "International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585613", "title": "Pattern Trails: Visual Analysis of Pattern Transitions in Subspaces", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585613/17D45VTRowo", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671596", "title": "RLAC: Random Line Approximation Clustering", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671596/1A8gnidZHkk", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020827", "title": "DCPViz: A Visual Analytics Approach for Downscaled Climate Projections", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020827/1KfRgbdb0L6", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1mK7j6mr5kc", "title": "2018 IEEE 11th Workshop on Software Engineering and Architectures for Real-time Interactive Systems (SEARIS)", "acronym": "searis", "groupId": "1801605", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1mK7jikqxkQ", "doi": "10.1109/SEARIS44442.2018.9180229", "title": "Realtime Interactive Hybrid 2D and 3D Visual Analytics on Large High Resolution Display and Immersive Virtual Environment", "normalizedTitle": "Realtime Interactive Hybrid 2D and 3D Visual Analytics on Large High Resolution Display and Immersive Virtual Environment", "abstract": "We present a data-flow-oriented scalable and extensible visualization system for supporting hybrid 2D and 3D visual analytics. Our application allows users to visually analyze the results of a complex multivariate Monte Carlo simulation. The simulation outputs variables describing various properties of 3D objects interacting in a dynamic 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the 3D simulation in a virtual environment showing the time-varying results of the dynamics in a 3D environment. The Unity application runs on both a 2D high resolution display system and a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the 2D and 3D visualization components. Preliminary results show our data-centric design provides a user-centric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "abstracts": [ { "abstractType": "Regular", "content": "We present a data-flow-oriented scalable and extensible visualization system for supporting hybrid 2D and 3D visual analytics. Our application allows users to visually analyze the results of a complex multivariate Monte Carlo simulation. The simulation outputs variables describing various properties of 3D objects interacting in a dynamic 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the 3D simulation in a virtual environment showing the time-varying results of the dynamics in a 3D environment. The Unity application runs on both a 2D high resolution display system and a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the 2D and 3D visualization components. Preliminary results show our data-centric design provides a user-centric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a data-flow-oriented scalable and extensible visualization system for supporting hybrid 2D and 3D visual analytics. Our application allows users to visually analyze the results of a complex multivariate Monte Carlo simulation. The simulation outputs variables describing various properties of 3D objects interacting in a dynamic 3D environment. Our system uses 2D charting tools to visualize the statistical relationships between simulation variables. We developed a Unity application to animate the 3D simulation in a virtual environment showing the time-varying results of the dynamics in a 3D environment. The Unity application runs on both a 2D high resolution display system and a complete-immersive Head Mounted Display device. The 2D visualization framework running on our Large High-Resolution Display system supports multiple coordinated views across all the 2D and 3D visualization components. Preliminary results show our data-centric design provides a user-centric visualization tool that can greatly enhance the analytical process and speed up the derivation of insights from data.", "fno": "09180229", "keywords": [ "Data Analysis", "Data Visualisation", "Helmet Mounted Displays", "Monte Carlo Methods", "Virtual Reality", "High Resolution Display System", "3 D Visualization Components", "User Centric Visualization Tool", "3 D Visual Analytics", "High Resolution Display", "Immersive Virtual Environment", "Extensible Visualization System", "Complex Multivariate Monte Carlo Simulation", "Dynamic 3 D Environment", "2 D Charting Tools", "Unity Application", "Head Mounted Display Device", "2 D Visualization Framework", "Realtime Interactive Hybrid 2 D Visual Analytics", "Data Visualization", "Three Dimensional Displays", "Two Dimensional Displays", "Tools", "Visual Analytics", "Resists", "Software", "Human Centered Computing", "Visualization Application Domains", "Visual Analytics" ], "authors": [ { "affiliation": "US Army Research Lab", "fullName": "Simon Su", "givenName": "Simon", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Research Lab", "fullName": "Michael An", "givenName": "Michael", "surname": "An", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Research Lab", "fullName": "Vincent Perry", "givenName": "Vincent", "surname": "Perry", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Research Lab", "fullName": "Michael Chen", "givenName": "Michael", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "searis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2018", "issn": null, "isbn": "978-1-5386-6272-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09180230", "articleId": "1mK7jepaiRy", "__typename": "AdjacentArticleType" }, "next": { "fno": "09180233", "articleId": "1mK7jqlsa5O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vg/2005/26/0/01500522", "title": "An evaluation of using real-time volumetric display of 3D ultrasound data for intracardiac catheter manipulation tasks", "doi": null, "abstractUrl": "/proceedings-article/vg/2005/01500522/12OmNAIdBRP", "parentPublication": { "id": "proceedings/vg/2005/26/0", "title": "Volume Graphics 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1994/6660/0/00363621", "title": "Viewing a graph in a virtual reality display is three times as good as a 2D diagram", "doi": null, "abstractUrl": "/proceedings-article/vl/1994/00363621/12OmNAkWvKo", "parentPublication": { "id": "proceedings/vl/1994/6660/0", "title": "Proceedings of 1994 IEEE Symposium on Visual Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2005/2766/0/01532837", "title": "Eyegaze analysis of displays with combined 2D and 3D views", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2005/01532837/12OmNBvkdk6", "parentPublication": { "id": "proceedings/ieee-vis/2005/2766/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492776", "title": "Cross-dimensional gestural interaction techniques for hybrid immersive environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492776/12OmNCfjeB1", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2007/3056/0/30560063", "title": "LUMAR: A Hybrid Spatial Display System for 2D and 3D Handheld Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/icat/2007/30560063/12OmNwpoFDq", "parentPublication": { "id": "proceedings/icat/2007/3056/0", "title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019876", "title": "The Hologram in My Hand: How Effective is Interactive Exploration of 3D Visualizations in Immersive Tangible Augmented Reality?", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019876/13rRUzp02oy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2018/9194/0/08533893", "title": "Building Multiple Coordinated Spaces for Effective Immersive Analytics through Distributed Cognition", "doi": null, "abstractUrl": "/proceedings-article/bdva/2018/08533893/17D45Wuc3a3", "parentPublication": { "id": "proceedings/bdva/2018/9194/0", "title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a155", "title": "HybridAxes: An Immersive Analytics Tool With Interoperability Between 2D and Immersive Reality Modes", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a155/1J7Wc83LEUo", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006235", "title": "Hybrid 2D and 3D Visual Analytics of Network Simulation Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006235/1hJspq9r0KA", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089446", "title": "Graphical Perception for Immersive Analytics", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089446/1jIxfA3tlUk", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBrDqFc", "title": "2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 IEEE 11th Intl Conf on Autonomic & Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "acronym": "uic-atc-scalcom", "groupId": "1002946", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAS4qN", "doi": "10.1109/UIC-ATC-ScalCom.2014.27", "title": "Partial Least Squares Improvement and Research Principal Component Regression Extraction Methods", "normalizedTitle": "Partial Least Squares Improvement and Research Principal Component Regression Extraction Methods", "abstract": "Partial least squares algorithm as a new type of multivariate data analysis methods, the number of cross-validation to determine the effect of poor primary component. In this paper, cross-validation, based on the interpretation of the degree of integration of the main components of the independent variables and the dependent variable, the importance of the variables as a test indicators, the data on the efficacy indexes were calculated, compared with more conventional partial least squares consistent with the theoretical value, indicating that this algorithm can solve the partial least squares method to determine the main issues to score.", "abstracts": [ { "abstractType": "Regular", "content": "Partial least squares algorithm as a new type of multivariate data analysis methods, the number of cross-validation to determine the effect of poor primary component. In this paper, cross-validation, based on the interpretation of the degree of integration of the main components of the independent variables and the dependent variable, the importance of the variables as a test indicators, the data on the efficacy indexes were calculated, compared with more conventional partial least squares consistent with the theoretical value, indicating that this algorithm can solve the partial least squares method to determine the main issues to score.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Partial least squares algorithm as a new type of multivariate data analysis methods, the number of cross-validation to determine the effect of poor primary component. In this paper, cross-validation, based on the interpretation of the degree of integration of the main components of the independent variables and the dependent variable, the importance of the variables as a test indicators, the data on the efficacy indexes were calculated, compared with more conventional partial least squares consistent with the theoretical value, indicating that this algorithm can solve the partial least squares method to determine the main issues to score.", "fno": "7646a583", "keywords": [ "Predictive Models", "Yttrium", "Analytical Models", "Data Models", "Conferences", "Data Mining", "Accuracy", "Variable Importance", "Partial Least Squares", "Cross Validation", "Interpretation Of Numerical" ], "authors": [ { "affiliation": null, "fullName": "Wangping Xiong", "givenName": "Wangping", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianqiang Du", "givenName": "Jianqiang", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Nie", "givenName": "Wang", "surname": "Nie", "__typename": "ArticleAuthorType" } ], "idPrefix": "uic-atc-scalcom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "583-585", "year": "2014", "issn": null, "isbn": "978-1-4799-7646-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7646a577", "articleId": "12OmNxd4tnk", "__typename": "AdjacentArticleType" }, "next": { "fno": "7646a586", "articleId": "12OmNBKmXmH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2005/2660/0/237230145", "title": "Classification of Proteomic Data with Logistic Kernel Partial Least Squares Algorithm", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2005/237230145/12OmNBp52Hq", "parentPublication": { "id": "proceedings/cvprw/2005/2660/0", "title": "2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2014/4717/0/06890696", "title": "Two dimensional non-negative sparse Partial Least Squares for face recognition", "doi": null, "abstractUrl": "/proceedings-article/icmew/2014/06890696/12OmNC3XhyL", "parentPublication": { "id": "proceedings/icmew/2014/4717/0", "title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921635", "title": "Penalized partial least squares for multi-label data", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921635/12OmNxFaLqN", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2011/4584/0/4584b118", "title": "Face Reconstruction from Skull Based on Partial Least Squares Regression", "doi": null, "abstractUrl": "/proceedings-article/cis/2011/4584b118/12OmNyrIaFr", "parentPublication": { "id": "proceedings/cis/2011/4584/0", "title": "2011 Seventh International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2015/7962/0/7962a041", "title": "Partial Least Squares Image Clustering", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2015/7962a041/12OmNyuy9Tc", "parentPublication": { "id": "proceedings/sibgrapi/2015/7962/0", "title": "2015 28th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2009/4519/0/05234751", "title": "Relief wrapper based Kernel Partial Least Squares subspace selection", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2009/05234751/12OmNz4SOCH", "parentPublication": { "id": "proceedings/iccsit/2009/4519/0", "title": "Computer Science and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2013/5092/0/5092a231", "title": "Statistical and Heuristic Model Selection in Regularized Least-Squares", "doi": null, "abstractUrl": "/proceedings-article/bracis/2013/5092a231/12OmNzVoBTN", "parentPublication": { "id": "proceedings/bracis/2013/5092/0", "title": "2013 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005833", "title": "Partial Least Squares Regression Based Facial Age Estimation", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005833/17D45XERmmq", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797823", "title": "Towards Robot Arm Training in Virtual Reality Using Partial Least Squares Regression", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797823/1cJ1cAC53Ik", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0/000600a138", "title": "Using Least Squares Support Vector Machine and Polynomial Partial Least Squares Method Quantitative Analysis of Gases in Mines", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2019/000600a138/1cTIFg4oCzK", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0", "title": "2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvO07F", "title": "IEEE International Conference on Shape Modeling and Applications 2006", "acronym": "smi", "groupId": "1000664", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNxGSm5e", "doi": "10.1109/SMI.2006.1", "title": "A Constrained Least Squares Approach to Interactive Mesh Deformation", "normalizedTitle": "A Constrained Least Squares Approach to Interactive Mesh Deformation", "abstract": "In this paper, we propose a constrained least squares approach for stably computing Laplacian deformation with strict positional constraints. In the existing work on Laplacian deformation, strict positional constraints are described using large values of least squares weights, which often cause numerical problems when Laplacians are described using cotangent weights. In our method, we describe strict positional constraints as hard constraints. We solve the combination of hard and soft constraints by constructing a typical least squares matrix form using QR decomposition. In addition, our method can manage shape deformation under over-constraints, such as redundant and conflicting constraints. Our framework achieves excellent performance for interactive deformation of mesh models.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a constrained least squares approach for stably computing Laplacian deformation with strict positional constraints. In the existing work on Laplacian deformation, strict positional constraints are described using large values of least squares weights, which often cause numerical problems when Laplacians are described using cotangent weights. In our method, we describe strict positional constraints as hard constraints. We solve the combination of hard and soft constraints by constructing a typical least squares matrix form using QR decomposition. In addition, our method can manage shape deformation under over-constraints, such as redundant and conflicting constraints. Our framework achieves excellent performance for interactive deformation of mesh models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a constrained least squares approach for stably computing Laplacian deformation with strict positional constraints. In the existing work on Laplacian deformation, strict positional constraints are described using large values of least squares weights, which often cause numerical problems when Laplacians are described using cotangent weights. In our method, we describe strict positional constraints as hard constraints. We solve the combination of hard and soft constraints by constructing a typical least squares matrix form using QR decomposition. In addition, our method can manage shape deformation under over-constraints, such as redundant and conflicting constraints. Our framework achieves excellent performance for interactive deformation of mesh models.", "fno": "25910023", "keywords": [], "authors": [ { "affiliation": "The University of Tokyo, Japan", "fullName": "Yasuhiro Yoshioka", "givenName": "Yasuhiro", "surname": "Yoshioka", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tokyo, Japan", "fullName": "Hiroshi Masuda", "givenName": "Hiroshi", "surname": "Masuda", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Advanced Industrial Science and Technology, Japan", "fullName": "Yoshiyuki Furukawa", "givenName": "Yoshiyuki", "surname": "Furukawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "smi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-06-01T00:00:00", "pubType": "proceedings", "pages": "23", "year": "2006", "issn": null, "isbn": "0-7695-2591-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "25910022", "articleId": "12OmNvT2p2Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "25910025", "articleId": "12OmNzlUKtQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2015/6964/0/07298771", "title": "A linear least-squares solution to elastic Shape-from-Template", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298771/12OmNBdJ5jb", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/shpcc/1992/2775/0/00232669", "title": "Solving equality constrained least squares problems", "doi": null, "abstractUrl": "/proceedings-article/shpcc/1992/00232669/12OmNqyUUsR", "parentPublication": { "id": "proceedings/shpcc/1992/2775/0", "title": "1992 Proceedings Scalable High Performance Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/2/4647b457", "title": "Mutiresolution Freeform Mesh Deformation", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b457/12OmNrkT7r9", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019423", "title": "Feature guided non-rigid image/surface deformation via moving least squares with manifold regularization", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019423/12OmNvAiSFu", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336d016", "title": "Mesh Deformation Based on Preserving Distances and Angles", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336d016/12OmNvEyR9C", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1993/3560/0/00522787", "title": "Total least squares and constrained least squares applied to frequency domain system identification", "doi": null, "abstractUrl": "/proceedings-article/ssst/1993/00522787/12OmNvTBB3z", "parentPublication": { "id": "proceedings/ssst/1993/3560/0", "title": "1993 (25th) Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1992/0532/4/00226421", "title": "A fast least squares algorithm for constrained adaptive filtering", "doi": null, "abstractUrl": "/proceedings-article/icassp/1992/00226421/12OmNvnOwyN", "parentPublication": { "id": "proceedings/icassp/1992/0532/4", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smi/2010/7259/0/05521473", "title": "Local Constraint-Based General Surface Deformation", "doi": null, "abstractUrl": "/proceedings-article/smi/2010/05521473/12OmNzUgd2b", "parentPublication": { "id": "proceedings/smi/2010/7259/0", "title": "Shape Modeling International (SMI 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2008/3358/0/3358a278", "title": "Shape Aware Deformation Using a Skeleton-Guided Scheme", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2008/3358a278/12OmNzvz6Ou", "parentPublication": { "id": "proceedings/sibgrapi/2008/3358/0", "title": "2008 XXI Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/03/ttg2009030518", "title": "Quasi-Developable Mesh Surface Interpolation via Mesh Deformation", "doi": null, "abstractUrl": "/journal/tg/2009/03/ttg2009030518/13rRUxjQybN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBUAvUm", "title": "Innovative Computing ,Information and Control, International Conference on", "acronym": "icicic", "groupId": "1001501", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNy3147z", "doi": "10.1109/ICICIC.2008.375", "title": "Multiclass Least Squares Auto-Correlation Wavelet Support Vector Machines", "normalizedTitle": "Multiclass Least Squares Auto-Correlation Wavelet Support Vector Machines", "abstract": "In this paper, combining the auto-correlation wavelet kernel with multiclass least squares support vector machine (MLS-SVM), a novel notion of multiclass least squares support vector machine with universal auto-correlation wavelet kernels (MLSAWSVM) is proposed. The translation invariant property of the kernel function enhances the generalization ability of the LS-SVM method and the spiral multiclass classification experimental results show some advantages of MLS-AWSVM over MLSSVM on the classification and the generalization performance.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, combining the auto-correlation wavelet kernel with multiclass least squares support vector machine (MLS-SVM), a novel notion of multiclass least squares support vector machine with universal auto-correlation wavelet kernels (MLSAWSVM) is proposed. The translation invariant property of the kernel function enhances the generalization ability of the LS-SVM method and the spiral multiclass classification experimental results show some advantages of MLS-AWSVM over MLSSVM on the classification and the generalization performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, combining the auto-correlation wavelet kernel with multiclass least squares support vector machine (MLS-SVM), a novel notion of multiclass least squares support vector machine with universal auto-correlation wavelet kernels (MLSAWSVM) is proposed. The translation invariant property of the kernel function enhances the generalization ability of the LS-SVM method and the spiral multiclass classification experimental results show some advantages of MLS-AWSVM over MLSSVM on the classification and the generalization performance.", "fno": "31610085", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Yongzhong Xing", "givenName": "Yongzhong", "surname": "Xing", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiaobei Wu", "givenName": "Xiaobei", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhiliang Xu", "givenName": "Zhiliang", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "85", "year": "2008", "issn": null, "isbn": "978-0-7695-3161-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "31610084", "articleId": "12OmNrK9q2v", "__typename": "AdjacentArticleType" }, "next": { "fno": "31610086", "articleId": "12OmNBBQZpz", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/1988/9999/0/00196992", "title": "New DSP type phase synchronizer with the method of least squares", "doi": null, "abstractUrl": "/proceedings-article/icassp/1988/00196992/12OmNqJ8tmG", "parentPublication": { "id": "proceedings/icassp/1988/9999/0", "title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifcsta/2009/3930/1/3930a452", "title": "Research on Least Squares Support Vector Machine Combinatorial Optimization Algorithm", "doi": null, "abstractUrl": "/proceedings-article/ifcsta/2009/3930a452/12OmNvStcyk", "parentPublication": { "id": "proceedings/ifcsta/2009/3930/3", "title": "Computer Science-Technology and Applications, International Forum on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2007/2994/2/29940586", "title": "A Fast Training Algorithm for Least Squares SVM", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2007/29940586/12OmNx5Yv9g", "parentPublication": { "id": "proceedings/iih-msp/2007/2994/2", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336j017", "title": "Exchange Rates Forecasting with Least Squares Support Vector Machine", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336j017/12OmNylKAVc", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/10/ttg2012101638", "title": "Analytic Solutions of Integral Moving Least Squares for Polygon Soups", "doi": null, "abstractUrl": "/journal/tg/2012/10/ttg2012101638/13rRUwIF6dO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539404", "title": "Squares: Supporting Interactive Performance Analysis for Multiclass Classifiers", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539404/13rRUxAASVX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546018", "title": "Visualization of Hyperspectral Images Using Moving Least Squares", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546018/17D45WXIkDk", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0/000600a138", "title": "Using Least Squares Support Vector Machine and Polynomial Partial Least Squares Method Quantitative Analysis of Gases in Mines", "doi": null, "abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2019/000600a138/1cTIFg4oCzK", "parentPublication": { "id": "proceedings/bigdatasecurity-hpsc-ids/2019/0006/0", "title": "2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b788", "title": "Deep Implicit Moving Least-Squares Functions for 3D Reconstruction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b788/1yeJLV1UIRa", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "144U9ak6Eue", "title": "2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA)", "acronym": "sera", "groupId": "1001129", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "144U9bzjxRV", "doi": "10.1109/SERA.2018.8477214", "title": "Least-Squares Support Vector Machine for Semi-Supervised Multi-Tasking", "normalizedTitle": "Least-Squares Support Vector Machine for Semi-Supervised Multi-Tasking", "abstract": "The semi-supervised multi-tasking using least-squares support vector machine can further improve performance by using related information of related tasks, and it inherits the advantages of high training speed and high efficiency of the least square support vector machine. Standard support vector machine is based on supervised learning, and it is necessary to manually mark large amounts of data for obtaining sufficient training data, which is costly and inefficient. In this paper, we apply least squares support vector machine based on semi-supervised learning to the multi-tasks and propose a semi-supervised multi-tasking approach using least-squares support vector machine. Based on related tasks learning simultaneously, multi-task least-squares support vector machine is used to train both labeled and unlabeled samples, overcoming the limitation of slow training, and using the useful information among related tasks to improve the efficiency of all tasks. In the training process, the regional tagging and the tag reset methods are used to reduce the number of iterations to achieve convergence and increases the fault tolerance rate. The experiment on the actual dataset shows the effectiveness of the approach.", "abstracts": [ { "abstractType": "Regular", "content": "The semi-supervised multi-tasking using least-squares support vector machine can further improve performance by using related information of related tasks, and it inherits the advantages of high training speed and high efficiency of the least square support vector machine. Standard support vector machine is based on supervised learning, and it is necessary to manually mark large amounts of data for obtaining sufficient training data, which is costly and inefficient. In this paper, we apply least squares support vector machine based on semi-supervised learning to the multi-tasks and propose a semi-supervised multi-tasking approach using least-squares support vector machine. Based on related tasks learning simultaneously, multi-task least-squares support vector machine is used to train both labeled and unlabeled samples, overcoming the limitation of slow training, and using the useful information among related tasks to improve the efficiency of all tasks. In the training process, the regional tagging and the tag reset methods are used to reduce the number of iterations to achieve convergence and increases the fault tolerance rate. The experiment on the actual dataset shows the effectiveness of the approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The semi-supervised multi-tasking using least-squares support vector machine can further improve performance by using related information of related tasks, and it inherits the advantages of high training speed and high efficiency of the least square support vector machine. Standard support vector machine is based on supervised learning, and it is necessary to manually mark large amounts of data for obtaining sufficient training data, which is costly and inefficient. In this paper, we apply least squares support vector machine based on semi-supervised learning to the multi-tasks and propose a semi-supervised multi-tasking approach using least-squares support vector machine. Based on related tasks learning simultaneously, multi-task least-squares support vector machine is used to train both labeled and unlabeled samples, overcoming the limitation of slow training, and using the useful information among related tasks to improve the efficiency of all tasks. In the training process, the regional tagging and the tag reset methods are used to reduce the number of iterations to achieve convergence and increases the fault tolerance rate. The experiment on the actual dataset shows the effectiveness of the approach.", "fno": "08477214", "keywords": [ "Support Vector Machines", "Task Analysis", "Semisupervised Learning", "Training", "Classification Algorithms", "Analytical Models", "Supervised Learning", "Multi Task Learning", "Least Squares Support Vector Machine", "Semi Supervised Learning", "Semi Supervised Support Vector Machine", "Semi Supervised Multi Task Learning" ], "authors": [ { "affiliation": "Yunnan University, School of Software, Kunming, China", "fullName": "Xuekuo Jia", "givenName": "Xuekuo", "surname": "Jia", "__typename": "ArticleAuthorType" }, { "affiliation": "Yunnan University, School of Software, Kunming, China", "fullName": "Shipu Wang", "givenName": "Shipu", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Yunnan University, School of Software, Kunming, China", "fullName": "Yun Yang", "givenName": "Yun", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "sera", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "79-86", "year": "2018", "issn": null, "isbn": "978-1-5386-5886-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08477194", "articleId": "144U9bsvaKp", "__typename": "AdjacentArticleType" }, "next": { "fno": "08477221", "articleId": "144U9bnXAFo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2012/4905/0/4905a585", "title": "Unsupervised Multi-class Regularized Least-Squares Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905a585/12OmNC4eSHr", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761091", "title": "Help-training for semi-supervised discriminative classifiers. Application to SVM", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761091/12OmNqJZgLr", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2012/4637/0/4637a308", "title": "Semi-supervised Machine Learning Algorithm in Near Infrared Spectral Calibration: A Case Study to Determine Cetane Number and Total Aromatics of Diesel Fuels", "doi": null, "abstractUrl": "/proceedings-article/icicta/2012/4637a308/12OmNvSKNLp", "parentPublication": { "id": "proceedings/icicta/2012/4637/0", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2014/4258/0/4258a111", "title": "Semi-supervised Pattern Classification Using Optimum-Path Forest", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2014/4258a111/12OmNwtEEKW", "parentPublication": { "id": "proceedings/sibgrapi/2014/4258/0", "title": "2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/2/4647b169", "title": "Colleges Employment Forecasting by Least Squares Support Vector Machine", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647b169/12OmNyFU6WX", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/2/4077c529", "title": "Incremental Learning Method of Least Squares Support Vector Machine", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077c529/12OmNzTH11d", "parentPublication": { "id": "proceedings/icicta/2010/4077/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999196", "title": "Ensemble-based semi-supervised learning approaches for imbalanced splice site datasets", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999196/12OmNzZ5ogD", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2010/4154/0/4154a386", "title": "Semi-supervised Methods for Biomedical Hedge Classification", "doi": null, "abstractUrl": "/proceedings-article/icsc/2010/4154a386/12OmNzlD9Dr", "parentPublication": { "id": "proceedings/icsc/2010/4154/0", "title": "2010 IEEE Fourth International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bcd/2019/0886/0/08885337", "title": "Scalable Laplacian Regularized Least Squares Classification on Anchor Graph", "doi": null, "abstractUrl": "/proceedings-article/bcd/2019/08885337/1ezS1Cg3ihO", "parentPublication": { "id": "proceedings/bcd/2019/0886/0", "title": "2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I0bRZfL0L6", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "acronym": "sc", "groupId": "10046045", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1I0bT76v0hq", "doi": "10.1109/SC41404.2022.00069", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "normalizedTitle": "Boosting Performance Optimization with Interactive Data Movement Visualization", "abstract": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "abstracts": [ { "abstractType": "Regular", "content": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "fno": "544400a921", "keywords": [ "Data Flow Analysis", "Data Visualisation", "Interactive Systems", "Software Performance Evaluation", "Application Performance Optimization", "Fine Grained Data Access", "Hardware Architecture Landscape", "Interactive Data Movement Visualization", "Optimization Decisions", "Parameterized Program Simulations", "Performance Tuning Process", "Performance Visualization", "Program Representation", "Static Dataflow Analysis", "Analytical Models", "Visualization", "Source Coding", "Instruments", "Layout", "Data Visualization", "Performance Analysis", "Software Performance" ], "authors": [ { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Philipp Schaad", "givenName": "Philipp", "surname": "Schaad", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Tal Ben-Nun", "givenName": "Tal", "surname": "Ben-Nun", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Torsten Hoefler", "givenName": "Torsten", "surname": "Hoefler", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-16", "year": "2022", "issn": null, "isbn": "978-1-6654-5444-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1L1MhfpxTSE", "name": "psc202254440-010046131s1-mm_544400a921.zip", "size": "25.2 MB", "location": "https://www.computer.org/csdl/api/v1/extra/psc202254440-010046131s1-mm_544400a921.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "544400b225", "articleId": "1L07miz6DQc", "__typename": "AdjacentArticleType" }, "next": { "fno": "544400b239", "articleId": "1L07g9xaUoM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icinis/2013/2809/0/2809a043", "title": "Glowworm Swarm Optimization Algorithm with Improved Movement Pattern", "doi": null, "abstractUrl": "/proceedings-article/icinis/2013/2809a043/12OmNqBtiW3", "parentPublication": { "id": "proceedings/icinis/2013/2809/0", "title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a196", "title": "Directional Aggregate Visualization of Large Scale Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a196/12OmNx8Ouzu", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/interact/2004/2061/0/20610120", "title": "Data Movement Optimization for Software-Controlled On-Chip Memory", "doi": null, "abstractUrl": "/proceedings-article/interact/2004/20610120/12OmNxWuiqZ", "parentPublication": { "id": "proceedings/interact/2004/2061/0", "title": "Eighth Workshop on Interaction between Compilers and Computer Architectures, 2004. INTERACT-8 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vpa/2014/7058/0/7058a050", "title": "Linking Performance Data into Scientific Visualization Tools", "doi": null, "abstractUrl": "/proceedings-article/vpa/2014/7058a050/12OmNzUPpIo", "parentPublication": { "id": "proceedings/vpa/2014/7058/0", "title": "2014 First Workshop on Visual Performance Analysis (VPA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2019/1436/0/08661201", "title": "BOLT: A Practical Binary Optimizer for Data Centers and Beyond", "doi": null, "abstractUrl": "/proceedings-article/cgo/2019/08661201/18j8W7Ngwyk", "parentPublication": { "id": "proceedings/cgo/2019/1436/0", "title": "2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a048", "title": "A Systematic Literature Review of Solution-Space Visualization Approaches in the Context of Optimization Problems", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a048/1KaH0fxFs4M", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a280", "title": "Visualization Tool for Comparative Analysis of Seabird Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a280/1KaH5N5YOK4", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a921", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a921/1L07kMpoeLm", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/03/09172089", "title": "Visualizing Movement Control Optimization Landscapes", "doi": null, "abstractUrl": "/journal/tg/2022/03/09172089/1mrN57MhqSI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2021/8613/0/09370325", "title": "Data Layout and Data Representation Optimizations to Reduce Data Movement (Keynote)", "doi": null, "abstractUrl": "/proceedings-article/cgo/2021/09370325/1rSR5giQan6", "parentPublication": { "id": "proceedings/cgo/2021/8613/0", "title": "2021 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I0bRZfL0L6", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "acronym": "sc", "groupId": "10046045", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1L07kMpoeLm", "doi": "10.1109/SC41404.2022.00069", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "normalizedTitle": "Boosting Performance Optimization with Interactive Data Movement Visualization", "abstract": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "abstracts": [ { "abstractType": "Regular", "content": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Optimizing application performance in today's hardware architecture landscape is an important, but increasingly complex task, often requiring detailed performance analyses. In particular, data movement and reuse play a crucial role in optimization and are often hard to improve without detailed program inspection. Performance visualizations can assist in the diagnosis of performance problems, but generally rely on data gathered through lengthy program executions. In this paper, we present a performance visualization geared towards analyzing data movement and reuse to inform impactful optimization decisions, without requiring program execution. We propose an approach that combines static dataflow analysis with parameterized program simulations to analyze both global data movement and fine-grained data access and reuse behavior, and visualize insights in-situ on the program representation. Case studies analyzing and optimizing real-world applications demonstrate our tool's effectiveness in guiding optimization decisions and making the performance tuning process more interactive.", "fno": "544400a921", "keywords": [ "Analytical Models", "Visualization", "Source Coding", "Instruments", "Layout", "Data Visualization", "Performance Analysis", "Software Performance" ], "authors": [ { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Philipp Schaad", "givenName": "Philipp", "surname": "Schaad", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Tal Ben-Nun", "givenName": "Tal", "surname": "Ben-Nun", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, ETH Zürich,ZüRich,Switzerland", "fullName": "Torsten Hoefler", "givenName": "Torsten", "surname": "Hoefler", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-16", "year": "2022", "issn": null, "isbn": "978-1-6654-5444-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1L1MhfpxTSE", "name": "psc202254440-010046131s1-mm_544400a921.zip", "size": "25.2 MB", "location": "https://www.computer.org/csdl/api/v1/extra/psc202254440-010046131s1-mm_544400a921.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "544400a677", "articleId": "1I0bT1mgq2s", "__typename": "AdjacentArticleType" }, "next": { "fno": "544400a937", "articleId": "1L07tjkTW4U", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icinis/2013/2809/0/2809a043", "title": "Glowworm Swarm Optimization Algorithm with Improved Movement Pattern", "doi": null, "abstractUrl": "/proceedings-article/icinis/2013/2809a043/12OmNqBtiW3", "parentPublication": { "id": "proceedings/icinis/2013/2809/0", "title": "2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a196", "title": "Directional Aggregate Visualization of Large Scale Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a196/12OmNx8Ouzu", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/interact/2004/2061/0/20610120", "title": "Data Movement Optimization for Software-Controlled On-Chip Memory", "doi": null, "abstractUrl": "/proceedings-article/interact/2004/20610120/12OmNxWuiqZ", "parentPublication": { "id": "proceedings/interact/2004/2061/0", "title": "Eighth Workshop on Interaction between Compilers and Computer Architectures, 2004. INTERACT-8 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vpa/2014/7058/0/7058a050", "title": "Linking Performance Data into Scientific Visualization Tools", "doi": null, "abstractUrl": "/proceedings-article/vpa/2014/7058a050/12OmNzUPpIo", "parentPublication": { "id": "proceedings/vpa/2014/7058/0", "title": "2014 First Workshop on Visual Performance Analysis (VPA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2019/1436/0/08661201", "title": "BOLT: A Practical Binary Optimizer for Data Centers and Beyond", "doi": null, "abstractUrl": "/proceedings-article/cgo/2019/08661201/18j8W7Ngwyk", "parentPublication": { "id": "proceedings/cgo/2019/1436/0", "title": "2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a921", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a921/1I0bT76v0hq", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a048", "title": "A Systematic Literature Review of Solution-Space Visualization Approaches in the Context of Optimization Problems", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a048/1KaH0fxFs4M", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a280", "title": "Visualization Tool for Comparative Analysis of Seabird Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a280/1KaH5N5YOK4", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/03/09172089", "title": "Visualizing Movement Control Optimization Landscapes", "doi": null, "abstractUrl": "/journal/tg/2022/03/09172089/1mrN57MhqSI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2021/8613/0/09370325", "title": "Data Layout and Data Representation Optimizations to Reduce Data Movement (Keynote)", "doi": null, "abstractUrl": "/proceedings-article/cgo/2021/09370325/1rSR5giQan6", "parentPublication": { "id": "proceedings/cgo/2021/8613/0", "title": "2021 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cpqjBXCukg", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF6RynL68", "doi": "10.1109/PacificVis.2019.00044", "title": "ComDia+: An Interactive Visual Analytics System for Comparing, Diagnosing, and Improving Multiclass Classifiers", "normalizedTitle": "ComDia+: An Interactive Visual Analytics System for Comparing, Diagnosing, and Improving Multiclass Classifiers", "abstract": "Performance analysis is essential for improving classification models. However, existing performance analysis tools do not provide actionable insights such as the cause of misclassification. Machine learning practitioners face difficulties such as prioritizing model, looking over confusion between classes. In addition, existing performance analysis tools that provide feature-level analysis are difficult to apply to image classification problems. This study has been proposed to solve these difficulties. In this paper, we present an interactive visual analytics system for diagnosing the performance of multiclass classification models. Our system is able to compare multiple models, find weaknesses, and obtain actionable insights for improving models. Our visualization consists of three views for analyzing performance at the class, confusion, and instance levels. We demonstrate our system using MNIST handwritten digits data.", "abstracts": [ { "abstractType": "Regular", "content": "Performance analysis is essential for improving classification models. However, existing performance analysis tools do not provide actionable insights such as the cause of misclassification. Machine learning practitioners face difficulties such as prioritizing model, looking over confusion between classes. In addition, existing performance analysis tools that provide feature-level analysis are difficult to apply to image classification problems. This study has been proposed to solve these difficulties. In this paper, we present an interactive visual analytics system for diagnosing the performance of multiclass classification models. Our system is able to compare multiple models, find weaknesses, and obtain actionable insights for improving models. Our visualization consists of three views for analyzing performance at the class, confusion, and instance levels. We demonstrate our system using MNIST handwritten digits data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Performance analysis is essential for improving classification models. However, existing performance analysis tools do not provide actionable insights such as the cause of misclassification. Machine learning practitioners face difficulties such as prioritizing model, looking over confusion between classes. In addition, existing performance analysis tools that provide feature-level analysis are difficult to apply to image classification problems. This study has been proposed to solve these difficulties. In this paper, we present an interactive visual analytics system for diagnosing the performance of multiclass classification models. Our system is able to compare multiple models, find weaknesses, and obtain actionable insights for improving models. Our visualization consists of three views for analyzing performance at the class, confusion, and instance levels. We demonstrate our system using MNIST handwritten digits data.", "fno": "922600a313", "keywords": [ "Data Analysis", "Data Visualisation", "Image Classification", "Interactive Systems", "Learning Artificial Intelligence", "Interactive Visual Analytics System", "Multiclass Classifiers", "Feature Level Analysis", "Image Classification Problems", "Multiclass Classification Models", "Com Dia", "MNIST Handwritten Digits Data", "Analytical Models", "Performance Analysis", "Machine Learning", "Image Classification", "Visualization", "Computational Modeling", "Data Visualization", "Performance Analysis", "Classification", "Model Comparision", "Confusion Analysis" ], "authors": [ { "affiliation": "Ajou University", "fullName": "Chanhee Park", "givenName": "Chanhee", "surname": "Park", "__typename": "ArticleAuthorType" }, { "affiliation": "Ajou University", "fullName": "Jina Lee", "givenName": "Jina", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Ajou University", "fullName": "Hyunwoo Han", "givenName": "Hyunwoo", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Ajou University", "fullName": "Kyungwon Lee", "givenName": "Kyungwon", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "313-317", "year": "2019", "issn": null, "isbn": "978-1-5386-9226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922600z014", "articleId": "1cYhrnSnhE4", "__typename": "AdjacentArticleType" }, "next": { "fno": "922600a318", "articleId": "1cMF7Q0WsQ8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icacc/2013/5033/0/06686417", "title": "Comparative Study of Multiclass Classifiers for Underwater Target Classification", "doi": null, "abstractUrl": "/proceedings-article/icacc/2013/06686417/12OmNrYCXWe", "parentPublication": { "id": "proceedings/icacc/2013/5033/0", "title": "2013 Third International Conference on Advances in Computing and Communications (ICACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/449P3C21", "title": "DCMSVM: Distributed parallel training for single-machine multiclass classifiers", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/449P3C21/12OmNzBOhPP", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539404", "title": "Squares: Supporting Interactive Performance Analysis for Multiclass Classifiers", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539404/13rRUxAASVX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2021/03/08502125", "title": "Integrating Data and Model Space in Ensemble Learning by Visual Analytics", "doi": null, "abstractUrl": "/journal/bd/2021/03/08502125/14ArjyliufC", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09767606", "title": "Learning-From-Disagreement: A Model Comparison and Visual Analytics Framework", "doi": null, "abstractUrl": "/journal/tg/5555/01/09767606/1D4MJ8H1fk4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/09/09795241", "title": "Diagnosing Ensemble Few-Shot Classifiers", "doi": null, "abstractUrl": "/journal/tg/2022/09/09795241/1Eb192ypuzS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2020/7121/0/712100b122", "title": "Testing DNN Image Classifiers for Confusion &#x0026; Bias Errors", "doi": null, "abstractUrl": "/proceedings-article/icse/2020/712100b122/1pK5eXfRjs4", "parentPublication": { "id": "proceedings/icse/2020/7121/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a012", "title": "Diagnosing Concept Drift with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a012/1q7jvQC41gs", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2020/8666/0/866600a214", "title": "Review on Classification Algorithm and Evaluation System of Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/icicta/2020/866600a214/1wRIE1YHhPq", "parentPublication": { "id": "proceedings/icicta/2020/8666/0", "title": "2020 13th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552909", "title": "<italic>Where Can We Help</italic>? A Visual Analytics Approach to Diagnosing and Improving Semantic Segmentation of Movable Objects", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552909/1xibW2zLd9C", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxH9X7O", "title": "2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC)", "acronym": "ucc", "groupId": "1800743", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBaBuSi", "doi": "10.1109/UCC.2014.135", "title": "Climate Downscaling Processes Using WRF/Chem and CALMET Modelling Systems: Madrid Case Study", "normalizedTitle": "Climate Downscaling Processes Using WRF/Chem and CALMET Modelling Systems: Madrid Case Study", "abstract": "Downscaling techniques are very important to assure the robustness and credibility of climate modelling exercises. Regional climate simulations use boundary conditions and initial conditions from global climate and meteorological models. The regional climate simulations (WRF/chem model) have much higher spatial resolution and using nesting approaches can be used to derive climate indicators at urban level. Dynamical nesting approaches -- also known as dynamical downscaling procedures -- use a substantial amount of computer power, particularly for urban applications, other alternatives such as CALMET diagnostic model (for meteorological applications) and CMAQ model (with linear chemistry) produce results faster and can be used for climate applications with reasonable required computer power. In this contribution, we are using the European Centre for Medium-Range Weather Forecasts (ECMWF) model data sets to provide boundary conditions for the mesoscale model WRF/Chem (NOAA, US) that has been ran over Europe with 23 km spatial resolution and 33 vertical levels up to 50 hPa. We have used the full nesting approach defined into WRF model to produce simulations centered over the city of Madrid (Spain) with 4.6 km spatial resolution (nesting level 1, l1), 0.92 km spatial resolution (nesting level 2, l2) and 0.184 km spatial resolution (nesting level 3, l3). In l3, we have run the CMAQ (full chemistry) model (EPA, US) to produce chemical pollution data. We have applied both downscaling techniques over Madrid area using Retiro meteorological and air pollution monitoring station as observational station. The comparison between both downscaling techniques shows that CALMET-CMAQL (linear chemistry) model is much faster and the results are good enough (compared with other simulations results) to consider this tool, when the number of simulations for climate purposes is very high (due to many years and several climate scenarios) and the application of the WRF/chem model (dynamical downscaling) is prohibited computationally.", "abstracts": [ { "abstractType": "Regular", "content": "Downscaling techniques are very important to assure the robustness and credibility of climate modelling exercises. Regional climate simulations use boundary conditions and initial conditions from global climate and meteorological models. The regional climate simulations (WRF/chem model) have much higher spatial resolution and using nesting approaches can be used to derive climate indicators at urban level. Dynamical nesting approaches -- also known as dynamical downscaling procedures -- use a substantial amount of computer power, particularly for urban applications, other alternatives such as CALMET diagnostic model (for meteorological applications) and CMAQ model (with linear chemistry) produce results faster and can be used for climate applications with reasonable required computer power. In this contribution, we are using the European Centre for Medium-Range Weather Forecasts (ECMWF) model data sets to provide boundary conditions for the mesoscale model WRF/Chem (NOAA, US) that has been ran over Europe with 23 km spatial resolution and 33 vertical levels up to 50 hPa. We have used the full nesting approach defined into WRF model to produce simulations centered over the city of Madrid (Spain) with 4.6 km spatial resolution (nesting level 1, l1), 0.92 km spatial resolution (nesting level 2, l2) and 0.184 km spatial resolution (nesting level 3, l3). In l3, we have run the CMAQ (full chemistry) model (EPA, US) to produce chemical pollution data. We have applied both downscaling techniques over Madrid area using Retiro meteorological and air pollution monitoring station as observational station. The comparison between both downscaling techniques shows that CALMET-CMAQL (linear chemistry) model is much faster and the results are good enough (compared with other simulations results) to consider this tool, when the number of simulations for climate purposes is very high (due to many years and several climate scenarios) and the application of the WRF/chem model (dynamical downscaling) is prohibited computationally.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Downscaling techniques are very important to assure the robustness and credibility of climate modelling exercises. Regional climate simulations use boundary conditions and initial conditions from global climate and meteorological models. The regional climate simulations (WRF/chem model) have much higher spatial resolution and using nesting approaches can be used to derive climate indicators at urban level. Dynamical nesting approaches -- also known as dynamical downscaling procedures -- use a substantial amount of computer power, particularly for urban applications, other alternatives such as CALMET diagnostic model (for meteorological applications) and CMAQ model (with linear chemistry) produce results faster and can be used for climate applications with reasonable required computer power. In this contribution, we are using the European Centre for Medium-Range Weather Forecasts (ECMWF) model data sets to provide boundary conditions for the mesoscale model WRF/Chem (NOAA, US) that has been ran over Europe with 23 km spatial resolution and 33 vertical levels up to 50 hPa. We have used the full nesting approach defined into WRF model to produce simulations centered over the city of Madrid (Spain) with 4.6 km spatial resolution (nesting level 1, l1), 0.92 km spatial resolution (nesting level 2, l2) and 0.184 km spatial resolution (nesting level 3, l3). In l3, we have run the CMAQ (full chemistry) model (EPA, US) to produce chemical pollution data. We have applied both downscaling techniques over Madrid area using Retiro meteorological and air pollution monitoring station as observational station. The comparison between both downscaling techniques shows that CALMET-CMAQL (linear chemistry) model is much faster and the results are good enough (compared with other simulations results) to consider this tool, when the number of simulations for climate purposes is very high (due to many years and several climate scenarios) and the application of the WRF/chem model (dynamical downscaling) is prohibited computationally.", "fno": "7881a830", "keywords": [ "Atmospheric Modeling", "Spatial Resolution", "Meteorology", "Computational Modeling", "Data Models", "Land Surface", "Europe", "ECMWF", "Downscaling", "WRF Chem", "CALMET", "CMAQ" ], "authors": [ { "affiliation": null, "fullName": "Roberto San Jose", "givenName": "Roberto San", "surname": "Jose", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Juan L. Perez", "givenName": "Juan L.", "surname": "Perez", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Julia Pecci", "givenName": "Julia", "surname": "Pecci", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio Garzon", "givenName": "Antonio", "surname": "Garzon", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Marino Palacios", "givenName": "Marino", "surname": "Palacios", "__typename": "ArticleAuthorType" } ], "idPrefix": "ucc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "830-835", "year": "2014", "issn": null, "isbn": "978-1-4799-7881-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7881a824", "articleId": "12OmNBubOV2", "__typename": "AdjacentArticleType" }, "next": { "fno": "7881a836", "articleId": "12OmNAle6Zf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccsa/2014/4264/0/4264a248", "title": "Case Study in Large Scale Climate Simulations: Optimizing the Speedup/Efficiency Balance in Supercomputing Environments", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2014/4264a248/12OmNqBbHOJ", "parentPublication": { "id": "proceedings/iccsa/2014/4264/0", "title": "2014 14th International Conference on Computational Science and Its Applications (ICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/simultech/2014/060/0/07095118", "title": "Price responses of grain market under climate change in pre-industrial Western Europe by ARX modelling", "doi": null, "abstractUrl": "/proceedings-article/simultech/2014/07095118/12OmNqNG3eS", "parentPublication": { "id": "proceedings/simultech/2014/060/0", "title": "2014 International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a332", "title": "A Machine Learning Approach to Non-uniform Spatial Downscaling of Climate Variables", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a332/12OmNwDj0WS", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmp-ugc/2009/3946/0/3946a249", "title": "Climatologies Based on the Weather Research and Forecast (WRF) Model", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a249/12OmNwHyZWS", "parentPublication": { "id": "proceedings/hpcmp-ugc/2009/3946/0", "title": "HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dodugc/2005/2496/0/24960234", "title": "Integration of the WRF Model into the Advanced Climate Modeling and Environmental Simulations Program", "doi": null, "abstractUrl": "/proceedings-article/dodugc/2005/24960234/12OmNySG3Ve", "parentPublication": { "id": "proceedings/dodugc/2005/2496/0", "title": "2005 Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2013/05/mcs2013050032", "title": "Climate Informatics: Accelerating Discovering in Climate Science with Machine Learning", "doi": null, "abstractUrl": "/magazine/cs/2013/05/mcs2013050032/13rRUy2YLOR", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2011/05/mcs2011050036", "title": "Climate Change Modeling: Computational Opportunities and Challenges", "doi": null, "abstractUrl": "/magazine/cs/2011/05/mcs2011050036/13rRUyoPSSG", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2023/7578/0/757800a013", "title": "Self-supervised learning for climate downscaling", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2023/757800a013/1LFLH6rsV7q", "parentPublication": { "id": "proceedings/bigcomp/2023/7578/0", "title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/escience/2019/2451/0/245100a498", "title": "ESiWACE: On European Infrastructure Efforts for Weather and Climate Modeling at Exascale", "doi": null, "abstractUrl": "/proceedings-article/escience/2019/245100a498/1ike1oTsoZa", "parentPublication": { "id": "proceedings/escience/2019/2451/0", "title": "2019 15th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icectt/2020/9928/0/992800a359", "title": "Multi-Scale Downscaling with Bayesian Convolution Network for ENSO SST Pattern", "doi": null, "abstractUrl": "/proceedings-article/icectt/2020/992800a359/1oa5k5y9fW0", "parentPublication": { "id": "proceedings/icectt/2020/9928/0", "title": "2020 5th International Conference on Electromechanical Control Technology and Transportation (ICECTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirJ", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "acronym": "e-science", "groupId": "1001511", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VsBU12", "doi": "10.1109/eScience.2018.00043", "title": "Resolving clouds in a global atmosphere model - A multiscale approach with nested models", "normalizedTitle": "Resolving clouds in a global atmosphere model - A multiscale approach with nested models", "abstract": "Clouds are challenging to incorporate in global weather and climate models, since they involve processes on length scales much smaller than the typical simulation grid resolution. Therefore clouds are usually not resolved, but represented in a simplified way using so-called parametrization schemes. Accurate cloud modeling is important, since one of the largest remaining uncertainties in climate simulations is related to clouds and the strong effects of cloud feedback on the climate. We present our project on replacing the cloud parametrization scheme in a global weather model by another smallscale model which can explicitly resolve the cloud processes. This can be seen as a two-way nesting of a high -resolution model inside selected grid columns of the global model. The global weather model in our case is OpenIFS, a version of the ECMWF operational weather forecasting model. The high resolution model is DALES [1], a 3D large -eddy simulation code", "abstracts": [ { "abstractType": "Regular", "content": "Clouds are challenging to incorporate in global weather and climate models, since they involve processes on length scales much smaller than the typical simulation grid resolution. Therefore clouds are usually not resolved, but represented in a simplified way using so-called parametrization schemes. Accurate cloud modeling is important, since one of the largest remaining uncertainties in climate simulations is related to clouds and the strong effects of cloud feedback on the climate. We present our project on replacing the cloud parametrization scheme in a global weather model by another smallscale model which can explicitly resolve the cloud processes. This can be seen as a two-way nesting of a high -resolution model inside selected grid columns of the global model. The global weather model in our case is OpenIFS, a version of the ECMWF operational weather forecasting model. The high resolution model is DALES [1], a 3D large -eddy simulation code", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clouds are challenging to incorporate in global weather and climate models, since they involve processes on length scales much smaller than the typical simulation grid resolution. Therefore clouds are usually not resolved, but represented in a simplified way using so-called parametrization schemes. Accurate cloud modeling is important, since one of the largest remaining uncertainties in climate simulations is related to clouds and the strong effects of cloud feedback on the climate. We present our project on replacing the cloud parametrization scheme in a global weather model by another smallscale model which can explicitly resolve the cloud processes. This can be seen as a two-way nesting of a high -resolution model inside selected grid columns of the global model. The global weather model in our case is OpenIFS, a version of the ECMWF operational weather forecasting model. The high resolution model is DALES [1], a 3D large -eddy simulation code", "fno": "915600a270", "keywords": [ "Clouds", "Geophysics Computing", "High Resolution Model", "3 D Large Eddy Simulation Code", "ECMWF Operational Weather Forecasting Model", "Open IFS", "Grid Columns", "High Resolution Model", "Cloud Processes", "Global Weather Model", "Cloud Parametrization Scheme", "Cloud Feedback", "Climate Simulations", "Accurate Cloud Modeling", "Parametrization Schemes", "Nested Models", "Global Atmosphere Model", "Clouds", "Atmospheric Modeling", "Computational Modeling", "Meteorology", "Solid Modeling", "Predictive Models", "Couplings", "Atmospheric Modeling", "Superparametrization", "Multi Scale Model" ], "authors": [ { "affiliation": "Centrum Wiskunde & Inf., Amsterdam, Netherlands", "fullName": "Fredrik Jansson", "givenName": "Fredrik", "surname": "Jansson", "__typename": "ArticleAuthorType" }, { "affiliation": "Netherlands eScience Center, Amsterdam, Netherlands", "fullName": "Gijs van den Oord", "givenName": "Gijs", "surname": "van den Oord", "__typename": "ArticleAuthorType" }, { "affiliation": "KNMI & Delft Univ. of Technol., Delft, Netherlands", "fullName": "Pier Siebesma", "givenName": "Pier", "surname": "Siebesma", "__typename": "ArticleAuthorType" }, { "affiliation": "Centrum Wiskunde & Inf., Amsterdam, Netherlands", "fullName": "Daan Crommelin", "givenName": "Daan", "surname": "Crommelin", "__typename": "ArticleAuthorType" } ], "idPrefix": "e-science", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "270-270", "year": "2018", "issn": null, "isbn": "978-1-5386-9156-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "915600a268", "articleId": "17D45WXIkCT", "__typename": "AdjacentArticleType" }, "next": { "fno": "915600a271", "articleId": "17D45XlyDvn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460411", "title": "Daylight spectrum model under weather conditions from clear sky to cloudy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460411/12OmNqGiu6n", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eait/2014/4272/0/4272a279", "title": "Temperature Induced Mean Based Cloud Motion Prediction Model for Multiple Cloud Clusters in Satellite Infrared Images", "doi": null, "abstractUrl": "/proceedings-article/eait/2014/4272a279/12OmNxFsmIe", "parentPublication": { "id": "proceedings/eait/2014/4272/0", "title": "2014 Fourth International Conference of Emerging Applications of Information Technology (EAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457f797", "title": "Multiple-Scattering Microphysics Tomography", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457f797/12OmNyPQ4Ik", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2016/03/mcg2016030036", "title": "Visualizing Volcanic Clouds in the Atmosphere and Their Impact on Air Traffic", "doi": null, "abstractUrl": "/magazine/cg/2016/03/mcg2016030036/13rRUwgQptR", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2013/05/mcs2013050056", "title": "Improving NASA's Multiscale Modeling Framework for Tropical Cyclone Climate Study", "doi": null, "abstractUrl": "/magazine/cs/2013/05/mcs2013050056/13rRUx0geji", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539323", "title": "Multi-Resolution Climate Ensemble Parameter Analysis with Nested Parallel Coordinates Plots", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539323/13rRUxNEqPZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2017/2588/0/08291945", "title": "Deep and Shallow Convections in Atmosphere Models on Intel® Xeon Phi™ Coprocessor Systems", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2017/08291945/17D45WK5Ap6", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2017/2588/0", "title": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2017/2588/0/2588a316", "title": "Deep and Shallow Convections in Atmosphere Models on Intel&#xae; Xeon Phi&#x2122; Coprocessor Systems", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2017/2588a316/18rMtUcFJHG", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2017/2588/0", "title": "2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/escience/2019/2451/0/245100a498", "title": "ESiWACE: On European Infrastructure Efforts for Weather and Climate Modeling at Exascale", "doi": null, "abstractUrl": "/proceedings-article/escience/2019/245100a498/1ike1oTsoZa", "parentPublication": { "id": "proceedings/escience/2019/2451/0", "title": "2019 15th International Conference on eScience (eScience)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2021/03/09384262", "title": "Bringing the Future Into Focus: Benefits and Challenges of High-Resolution Global Climate Change Simulations", "doi": null, "abstractUrl": "/magazine/cs/2021/03/09384262/1scDqsJ2diM", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzZmZgR", "title": "2017 IEEE 7th International Conference on Computational Advances in Bio- and Medical Sciences (ICCABS)", "acronym": "iccabs", "groupId": "1800307", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "1DICe5bFQJ2", "doi": "10.1109/ICCABS.2017.8114310", "title": "Survey on deep convolutional neural networks in mammography", "normalizedTitle": "Survey on deep convolutional neural networks in mammography", "abstract": "The limitations of traditional Computer Aided Detection (CAD) systems for mammography, the extreme importance of early detection of breast cancer and the high impact of the false diagnosis of patients lead to investigating Deep Learning methods (DL) for mammograms. Deep Learning, in particular, Convolutional Neural Networks (CNNs) have been recently used for object localization and detection, risk assessment, and classification tasks in mammogram images. CNNs help radiologists provide more accurate diagnosis by delivering precise quantitative analysis of suspicious lesions in short time. This survey reviews the strengths and limitations of major CNNs applications in analyzing mammogram images. It summarizes 51 contributions on applying CNNs on various tasks in mammography. Moreover, it discusses the best practices done using CNN methods and suggesting directions for further improvement in medical images and in particular mammogram images.", "abstracts": [ { "abstractType": "Regular", "content": "The limitations of traditional Computer Aided Detection (CAD) systems for mammography, the extreme importance of early detection of breast cancer and the high impact of the false diagnosis of patients lead to investigating Deep Learning methods (DL) for mammograms. Deep Learning, in particular, Convolutional Neural Networks (CNNs) have been recently used for object localization and detection, risk assessment, and classification tasks in mammogram images. CNNs help radiologists provide more accurate diagnosis by delivering precise quantitative analysis of suspicious lesions in short time. This survey reviews the strengths and limitations of major CNNs applications in analyzing mammogram images. It summarizes 51 contributions on applying CNNs on various tasks in mammography. Moreover, it discusses the best practices done using CNN methods and suggesting directions for further improvement in medical images and in particular mammogram images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The limitations of traditional Computer Aided Detection (CAD) systems for mammography, the extreme importance of early detection of breast cancer and the high impact of the false diagnosis of patients lead to investigating Deep Learning methods (DL) for mammograms. Deep Learning, in particular, Convolutional Neural Networks (CNNs) have been recently used for object localization and detection, risk assessment, and classification tasks in mammogram images. CNNs help radiologists provide more accurate diagnosis by delivering precise quantitative analysis of suspicious lesions in short time. This survey reviews the strengths and limitations of major CNNs applications in analyzing mammogram images. It summarizes 51 contributions on applying CNNs on various tasks in mammography. Moreover, it discusses the best practices done using CNN methods and suggesting directions for further improvement in medical images and in particular mammogram images.", "fno": "08114310", "keywords": [ "Mammography", "Convolutional Neural Networks", "Computed Tomography", "Breast Cancer", "Deep Learning", "Computer Science", "Task Analysis", "Mammograms", "Breast Cancer", "Deep Learning DL", "Convolutional Neural Networks CNN", "Machine Learning", "Transfer Learning TL", "Computer Aided Detection CAD", "Segmentation", "Classification", "Feature Detection" ], "authors": [ { "affiliation": "Computer Science and Engineering, University of Connecticut, Storrs, CT, USA", "fullName": "Dina Abdelhafiz", "givenName": "Dina", "surname": "Abdelhafiz", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Engineering, University of Connecticut, Storrs, CT, USA", "fullName": "Sheida Nabavi", "givenName": "Sheida", "surname": "Nabavi", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Engineering, University of Connecticut, Storrs, CT, USA", "fullName": "Reda Ammar", "givenName": "Reda", "surname": "Ammar", "__typename": "ArticleAuthorType" }, { "affiliation": "Diagnostic Imaging, University of Connecticut Health Center, Farmington, CT, USA", "fullName": "Clifford Yang", "givenName": "Clifford", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccabs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2017", "issn": "2473-4659", "isbn": "978-1-5386-2594-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08114309", "articleId": "12OmNyz5JUL", "__typename": "AdjacentArticleType" }, "next": { "fno": "08114311", "articleId": "1DICc9mozks", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ucma/2011/4435/0/4435a035", "title": "Identification of Abnormal Masses in Digital Mammography Images", "doi": null, "abstractUrl": "/proceedings-article/ucma/2011/4435a035/12OmNAObbHh", "parentPublication": { "id": "proceedings/ucma/2011/4435/0", "title": "Ubiquitous Computing and Multimedia Applications, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2017/3684/0/3684a176", "title": "Spectral Graph Wavelets for the Classification of Microcalcifications in Mammograms", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2017/3684a176/12OmNAsk4Ff", "parentPublication": { "id": "proceedings/smartcloud/2017/3684/0", "title": "2017 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2015/9666/0/9666a234", "title": "Diverse and Discrimintative Features Based Breast Cancer Detection Using Digital Mammography", "doi": null, "abstractUrl": "/proceedings-article/fit/2015/9666a234/12OmNwlHSTq", "parentPublication": { "id": "proceedings/fit/2015/9666/0", "title": "2015 13th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2015/0478/0/07507106", "title": "Curvelet-based locality sensitive hashing for mammogram retrieval in large-scale datasets", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2015/07507106/12OmNx9WSZY", "parentPublication": { "id": "proceedings/aiccsa/2015/0478/0", "title": "2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217738", "title": "Whole mammogram image classification with convolutional neural networks", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217738/12OmNzRHOO4", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2008/3308/0/3308a097", "title": "A Novel Semantic-based CAD System for Mammography", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2008/3308a097/12OmNzV70mD", "parentPublication": { "id": "proceedings/iccsit/2008/3308/0", "title": "2008 International Conference on Computer Science and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a040", "title": "Mammography Image Segmentation Based on Fuzzy Morphological Operations", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a040/17PYEjURy8i", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imitec/2021/1749/0/09714520", "title": "Towards a Cost-Effective Predictive Mammogram Classification Model for Breast Cancer Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/imitec/2021/09714520/1BaZGSmG5na", "parentPublication": { "id": "proceedings/imitec/2021/1749/0", "title": "2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmbs/2022/6770/0/677000a090", "title": "Hyperparameter for Deep Learning Applied in Mammogram Image Classification", "doi": null, "abstractUrl": "/proceedings-article/cmbs/2022/677000a090/1GhVUSkdMf6", "parentPublication": { "id": "proceedings/cmbs/2022/6770/0", "title": "2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2019/3918/0/391800a102", "title": "Deep Learning from Small Dataset for BI-RADS Density Classification of Mammography Images", "doi": null, "abstractUrl": "/proceedings-article/itme/2019/391800a102/1gRxhiUjlpS", "parentPublication": { "id": "proceedings/itme/2019/3918/0", "title": "2019 10th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MrFLC1Kdb2", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "10097829", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1MrFOSRyDVm", "doi": "10.1109/ICTAI56018.2022.00077", "title": "Morphological Classification of Neurons Based Deep Residual Multiscale Convolutional Neural Network", "normalizedTitle": "Morphological Classification of Neurons Based Deep Residual Multiscale Convolutional Neural Network", "abstract": "The study of neuron morphological classification has important application value to improve the accuracy and efficiency of three-dimensional reconstruction of neurons. However, due to the complex structure of neurons and the existence of global and local self-similarity in morphological distribution, it brings great difficulties to the classification of neuron morphology. Therefore, a new neuronal morphological classification model based on deep residual multiscale convolutional neural network is proposed. Firstly, the overall architecture of the model is based on the fast connection idea of ResNet, which can effectively prevent network model degradation. Secondly, by using the residual connection module, the input information is directly transferred to the output layer through a shortcut, so as to simplify the goal and difficulty of feature learning. Finally, the multi-scale convolution module is combined for feature extraction, and the dilated convolution with different dilation rates is adopted to increase the receiving field to expand the diversity of features, so as to improve the classification accuracy. To verify the effectiveness of the model, experiments are carried out on the neuron morphology classification dataset. The experimental results show that the accuracy, precision, sensitivity and specificity of our method reach 90.11&#x0025;, 89.63&#x0025;, 90.77&#x0025; and 93.27&#x0025;, respectively. Compared with other classification models (VGG, ResNet, RNN), the proposed model has better classification effect.", "abstracts": [ { "abstractType": "Regular", "content": "The study of neuron morphological classification has important application value to improve the accuracy and efficiency of three-dimensional reconstruction of neurons. However, due to the complex structure of neurons and the existence of global and local self-similarity in morphological distribution, it brings great difficulties to the classification of neuron morphology. Therefore, a new neuronal morphological classification model based on deep residual multiscale convolutional neural network is proposed. Firstly, the overall architecture of the model is based on the fast connection idea of ResNet, which can effectively prevent network model degradation. Secondly, by using the residual connection module, the input information is directly transferred to the output layer through a shortcut, so as to simplify the goal and difficulty of feature learning. Finally, the multi-scale convolution module is combined for feature extraction, and the dilated convolution with different dilation rates is adopted to increase the receiving field to expand the diversity of features, so as to improve the classification accuracy. To verify the effectiveness of the model, experiments are carried out on the neuron morphology classification dataset. The experimental results show that the accuracy, precision, sensitivity and specificity of our method reach 90.11&#x0025;, 89.63&#x0025;, 90.77&#x0025; and 93.27&#x0025;, respectively. Compared with other classification models (VGG, ResNet, RNN), the proposed model has better classification effect.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The study of neuron morphological classification has important application value to improve the accuracy and efficiency of three-dimensional reconstruction of neurons. However, due to the complex structure of neurons and the existence of global and local self-similarity in morphological distribution, it brings great difficulties to the classification of neuron morphology. Therefore, a new neuronal morphological classification model based on deep residual multiscale convolutional neural network is proposed. Firstly, the overall architecture of the model is based on the fast connection idea of ResNet, which can effectively prevent network model degradation. Secondly, by using the residual connection module, the input information is directly transferred to the output layer through a shortcut, so as to simplify the goal and difficulty of feature learning. Finally, the multi-scale convolution module is combined for feature extraction, and the dilated convolution with different dilation rates is adopted to increase the receiving field to expand the diversity of features, so as to improve the classification accuracy. To verify the effectiveness of the model, experiments are carried out on the neuron morphology classification dataset. The experimental results show that the accuracy, precision, sensitivity and specificity of our method reach 90.11%, 89.63%, 90.77% and 93.27%, respectively. Compared with other classification models (VGG, ResNet, RNN), the proposed model has better classification effect.", "fno": "974400a481", "keywords": [ "Convolutional Neural Nets", "Deep Learning Artificial Intelligence", "Feature Extraction", "Image Classification", "Recurrent Neural Nets", "Classification Accuracy", "Classification Effect", "Classification Models", "Deep Residual Multiscale Convolutional Neural Network", "Dilated Convolution", "Global Self Similarity", "Local Self Similarity", "Morphological Distribution", "Multiscale Convolution Module", "Network Model Degradation", "Neuron Morphological Classification", "Neuron Morphology Classification Dataset", "Neuronal Morphological Classification Model", "Residual Connection Module", "Res Net", "Representation Learning", "Analytical Models", "Convolution", "Neurons", "Morphology", "Neuroinformatics", "Sensitivity And Specificity", "Neurons Morphological Classification", "Convolutional Neural Network", "Multiscale Convolution", "Dilated Convolution" ], "authors": [ { "affiliation": "School of Electronic and Information Engineering, Guangxi Normal University,Guilin,China", "fullName": "Fuyun He", "givenName": "Fuyun", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electronic and Information Engineering, Guangxi Normal University,Guilin,China", "fullName": "Yan Wei", "givenName": "Yan", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electronic and Information Engineering, Guangxi Normal University,Guilin,China", "fullName": "Youwei Qian", "givenName": "Youwei", "surname": "Qian", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "481-485", "year": "2022", "issn": null, "isbn": "979-8-3503-9744-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "974400a476", "articleId": "1MrFOsdOO1W", "__typename": "AdjacentArticleType" }, "next": { "fno": "974400a486", "articleId": "1MrG3PekqRy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcnn/2009/3548/0/05178860", "title": "An introduction to morphological perceptrons with competitive learning", "doi": null, "abstractUrl": "/proceedings-article/ijcnn/2009/05178860/12OmNBgQFQk", "parentPublication": { "id": "proceedings/ijcnn/2009/3548/0", "title": "Neural Networks, IEEE - INNS - ENNS International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmlc/2003/7865/5/01260037", "title": "Color images restoration with multi-layer morphological(MLM) neural network", "doi": null, "abstractUrl": "/proceedings-article/icmlc/2003/01260037/12OmNs59JDF", "parentPublication": { "id": "proceedings/icmlc/2003/7865/1", "title": "Proceedings of the 2003 International Conference on Machine Learning and Cybernetics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2000/0595/0/05950227", "title": "Morphological Pyramid Image Registration", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2000/05950227/12OmNvRU0lz", "parentPublication": { "id": "proceedings/ssiai/2000/0595/0", "title": "Image Analysis and Interpretation, IEEE Southwest Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/1995/7190/0/71900139", "title": "Morphological multiscale representation for boundaries and surfaces", "doi": null, "abstractUrl": "/proceedings-article/iscv/1995/71900139/12OmNvyjGib", "parentPublication": { "id": "proceedings/iscv/1995/7190/0", "title": "Computer Vision, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a048", "title": "Rupture Status Classification of Intracranial Aneurysms Using Morphological Parameters", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a048/12OmNwfb6U0", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1996/09/i0951", "title": "Comparison Between the Morphological Skeleton and Morphological Shape Decomposition", "doi": null, "abstractUrl": "/journal/tp/1996/09/i0951/13rRUx0xPnW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2000/03/i0227", "title": "Morphological Reversible Contour Representation", "doi": null, "abstractUrl": "/journal/tp/2000/03/i0227/13rRUyY28Zo", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669574", "title": "Diagnosis of Thyroid Nodules Based on Lightweight Residual Network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669574/1A9VVa7ivcY", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000b396", "title": "Application of Improved Mask R-CNN Algorithm Based on Gastroscopic Image in Detection of Early Gastric Cancer", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000b396/1FJ5WW9rNMA", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0/298000a289", "title": "Optimization Algorithms in Reconstructions of Neuron Morphology: An Overview", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2019/298000a289/1ehBI4wpbUc", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2019/2980/0", "title": "2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJsqC2OO7S", "doi": "10.1109/BigData47090.2019.9006069", "title": "Activation Ensembles for Deep Neural Networks", "normalizedTitle": "Activation Ensembles for Deep Neural Networks", "abstract": "Many activation functions have been proposed in the past, but selecting an adequate one requires trial and error. We propose a new methodology of designing activation functions within a neural network at each layer. We call this technique an &#x201C;activation ensemble&#x201D; because it allows the use of multiple activation functions at each layer. This is done by introducing additional variables, &#x03B1;, at each activation layer of a network to allow for multiple activation functions to be active at each neuron. By design, activations with larger &#x03B1; values at a neuron is equivalent to being &#x201C;chosen&#x201D; by the network. We implement the activation ensembles on a variety of datasets using an array of FFNs and CNNs. By using the activation ensemble, we achieve superior results compared to traditional techniques. In addition, because of the flexibility of this methodology, we more deeply explore activation functions and the features that they capture.", "abstracts": [ { "abstractType": "Regular", "content": "Many activation functions have been proposed in the past, but selecting an adequate one requires trial and error. We propose a new methodology of designing activation functions within a neural network at each layer. We call this technique an &#x201C;activation ensemble&#x201D; because it allows the use of multiple activation functions at each layer. This is done by introducing additional variables, &#x03B1;, at each activation layer of a network to allow for multiple activation functions to be active at each neuron. By design, activations with larger &#x03B1; values at a neuron is equivalent to being &#x201C;chosen&#x201D; by the network. We implement the activation ensembles on a variety of datasets using an array of FFNs and CNNs. By using the activation ensemble, we achieve superior results compared to traditional techniques. In addition, because of the flexibility of this methodology, we more deeply explore activation functions and the features that they capture.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many activation functions have been proposed in the past, but selecting an adequate one requires trial and error. We propose a new methodology of designing activation functions within a neural network at each layer. We call this technique an “activation ensemble” because it allows the use of multiple activation functions at each layer. This is done by introducing additional variables, α, at each activation layer of a network to allow for multiple activation functions to be active at each neuron. By design, activations with larger α values at a neuron is equivalent to being “chosen” by the network. We implement the activation ensembles on a variety of datasets using an array of FFNs and CNNs. By using the activation ensemble, we achieve superior results compared to traditional techniques. In addition, because of the flexibility of this methodology, we more deeply explore activation functions and the features that they capture.", "fno": "09006069", "keywords": [ "Convolutional Neural Nets", "CNN", "FFN", "Activation Layer", "Multiple Activation Functions", "Deep Neural Networks", "Activation Ensemble", "Neurons", "Biological Neural Networks", "Training", "Feature Extraction", "Stochastic Processes", "Big Data", "Deep Learning", "Activation Functions" ], "authors": [ { "affiliation": "Northwestern University,Industrial Engineering and Management Sciences,Evanston,IL,USA", "fullName": "Diego Klabjan", "givenName": "Diego", "surname": "Klabjan", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern Univesity,Engineering Sciences and Applied Mathematics,Evanston,IL,USA", "fullName": "Mark Harmon", "givenName": "Mark", "surname": "Harmon", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "206-214", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006446", "articleId": "1hJsx8nhcvC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09006060", "articleId": "1hJsgRh0c1y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2015/9926/0/07364099", "title": "Genetic deep neural networks using different activation functions for financial data mining", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364099/12OmNAT0mLU", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a974", "title": "P-TELU: Parametric Tan Hyperbolic Linear Unit Activation for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a974/12OmNsd6vov", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1991/2300/0/00167096", "title": "The capability of feedforward neural networks with Omega -shaped activation functions", "doi": null, "abstractUrl": "/proceedings-article/tai/1991/00167096/12OmNwMXnsU", "parentPublication": { "id": "proceedings/tai/1991/2300/0", "title": "1991 Third International Conference on Tools for Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2017/2254/0/2254a097", "title": "Neural Network Classifiers Using Stochastic Computing with a Hardware-Oriented Approximate Activation Function", "doi": null, "abstractUrl": "/proceedings-article/iccd/2017/2254a097/12OmNwc3wBf", "parentPublication": { "id": "proceedings/iccd/2017/2254/0", "title": "2017 IEEE 35th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/5555/01/09882304", "title": "Energy-Efficient Recurrent Neural Network with MRAM-based Probabilistic Activation Functions", "doi": null, "abstractUrl": "/journal/ec/5555/01/09882304/1GwNZJWWWha", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2019/0888/0/088800a281", "title": "Variable Strength Combinatorial Testing for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icstw/2019/088800a281/1aDTat6htKM", "parentPublication": { "id": "proceedings/icstw/2019/0888/0", "title": "2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800a797", "title": "Property Inference for Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800a797/1gysWcFLve8", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005674", "title": "On Neural Network Activation Functions and Optimizers in Relation to Polynomial Regression", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005674/1hJrVe62bXW", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2019/6092/0/609200a078", "title": "Research on Overfitting of Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/cis/2019/609200a078/1i5m6A1NP6U", "parentPublication": { "id": "proceedings/cis/2019/6092/0", "title": "2019 15th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413338", "title": "Fractional Adaptation of Activation Functions In Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413338/1tmjcotrpxC", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iTvczdcyc0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "8972688", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iTvksNhxF6", "doi": "10.1109/CVPRW.2019.00089", "title": "Deep Anchored Convolutional Neural Networks", "normalizedTitle": "Deep Anchored Convolutional Neural Networks", "abstract": "Convolutional Neural Networks (CNNs) have been proven to be extremely successful at solving computer vision tasks. State-of-the-art methods favor such deep network architectures for its accuracy performance, with the cost of having massive number of parameters and high weights redundancy. Previous works have studied how to prune such CNNs weights. In this paper, we go to another extreme and analyze the performance of a network stacked with a single convolution kernel across layers, as well as other weights sharing techniques. We name it Deep Anchored Convolutional Neural Network (DACNN). Sharing the same kernel weights across layers allows to reduce the model size tremendously, more precisely, the network is compressed in memory by a factor of L, where L is the desired depth of the network, disregarding the fully connected layer for prediction. The number of parameters in DACNN barely increases as the network grows deeper, which allows us to build deep DACNNs without any concern about memory costs. We also introduce a partial shared weights network (DACNN-mix) as well as an easy-plug-in module, coined regulators, to boost the performance of our architecture. We validated our idea on 3 datasets: CIFAR-10, CIFAR-100 and SVHN. Our results show that we can save massive amounts of memory with our model, while maintaining a high accuracy performance.", "abstracts": [ { "abstractType": "Regular", "content": "Convolutional Neural Networks (CNNs) have been proven to be extremely successful at solving computer vision tasks. State-of-the-art methods favor such deep network architectures for its accuracy performance, with the cost of having massive number of parameters and high weights redundancy. Previous works have studied how to prune such CNNs weights. In this paper, we go to another extreme and analyze the performance of a network stacked with a single convolution kernel across layers, as well as other weights sharing techniques. We name it Deep Anchored Convolutional Neural Network (DACNN). Sharing the same kernel weights across layers allows to reduce the model size tremendously, more precisely, the network is compressed in memory by a factor of L, where L is the desired depth of the network, disregarding the fully connected layer for prediction. The number of parameters in DACNN barely increases as the network grows deeper, which allows us to build deep DACNNs without any concern about memory costs. We also introduce a partial shared weights network (DACNN-mix) as well as an easy-plug-in module, coined regulators, to boost the performance of our architecture. We validated our idea on 3 datasets: CIFAR-10, CIFAR-100 and SVHN. Our results show that we can save massive amounts of memory with our model, while maintaining a high accuracy performance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Convolutional Neural Networks (CNNs) have been proven to be extremely successful at solving computer vision tasks. State-of-the-art methods favor such deep network architectures for its accuracy performance, with the cost of having massive number of parameters and high weights redundancy. Previous works have studied how to prune such CNNs weights. In this paper, we go to another extreme and analyze the performance of a network stacked with a single convolution kernel across layers, as well as other weights sharing techniques. We name it Deep Anchored Convolutional Neural Network (DACNN). Sharing the same kernel weights across layers allows to reduce the model size tremendously, more precisely, the network is compressed in memory by a factor of L, where L is the desired depth of the network, disregarding the fully connected layer for prediction. The number of parameters in DACNN barely increases as the network grows deeper, which allows us to build deep DACNNs without any concern about memory costs. We also introduce a partial shared weights network (DACNN-mix) as well as an easy-plug-in module, coined regulators, to boost the performance of our architecture. We validated our idea on 3 datasets: CIFAR-10, CIFAR-100 and SVHN. Our results show that we can save massive amounts of memory with our model, while maintaining a high accuracy performance.", "fno": "250600a629", "keywords": [ "Computer Vision", "Convolutional Neural Nets", "Image Classification", "Learning Artificial Intelligence", "High Accuracy Performance", "DACNN Mix", "Partial Shared Weights Network", "Memory Costs", "Deep DACN Ns", "Fully Connected Layer", "Kernel Weights", "Single Convolution Kernel", "CN Ns Weights", "High Weights Redundancy", "Deep Network Architectures", "Computer Vision Tasks", "Deep Anchored Convolutional Neural Networks", "Convolution", "Kernel", "Regulators", "Computer Architecture", "Task Analysis", "Neural Networks", "Adaptation Models" ], "authors": [ { "affiliation": "Singapore University of Technology and Design", "fullName": "Jiahui Huang", "givenName": "Jiahui", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore University of Technology and Design", "fullName": "Kshitij Dwivedi", "givenName": "Kshitij", "surname": "Dwivedi", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore University of Technology and Design", "fullName": "Gemma Roig", "givenName": "Gemma", "surname": "Roig", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "629-637", "year": "2019", "issn": null, "isbn": "978-1-7281-2506-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250600a621", "articleId": "1iTvfG4v2vK", "__typename": "AdjacentArticleType" }, "next": { "fno": "250600a638", "articleId": "1iTvlVn1D1u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2017/0457/0/08099939", "title": "Local Binary Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/08099939/12OmNBhHtfQ", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2018/5984/0/598401a662", "title": "SnaPEA: Predictive Early Activation for Reducing Computation in Deep Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/isca/2018/598401a662/12OmNCeK2mg", "parentPublication": { "id": "proceedings/isca/2018/5984/0", "title": "2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2016/6167/0/07838122", "title": "Automated Optimal Architecture of Deep Convolutional Neural Networks for Image Recognition", "doi": null, "abstractUrl": "/proceedings-article/icmla/2016/07838122/12OmNxWcHdx", "parentPublication": { "id": "proceedings/icmla/2016/6167/0", "title": "2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/10/07961216", "title": "Deep Learning of Graphs with Ngram Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tk/2017/10/07961216/13rRUxEhFt7", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a268", "title": "Irregular Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a268/17D45VTRoBe", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a382", "title": "GM-Net: Learning Features with more Efficiency", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a382/17D45VsBTU7", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/04/09847369", "title": "1xN Pattern for Pruning Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2023/04/09847369/1FvJrf1XGrS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b672", "title": "Self-Representation Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b672/1cdOIDs2USY", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093431", "title": "ADNet: Adaptively Dense Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093431/1jPbDHUziH6", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800l1531", "title": "ECA-Net: Efficient Channel Attention for Deep Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800l1531/1m3ncHwV9iE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oFGBxwA7AI", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "acronym": "micro", "groupId": "1000440", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oFGE53o78A", "doi": "10.1109/MICRO50266.2020.00030", "title": "Fast-BCNN: Massive Neuron Skipping in Bayesian Convolutional Neural Networks", "normalizedTitle": "Fast-BCNN: Massive Neuron Skipping in Bayesian Convolutional Neural Networks", "abstract": "Bayesian Convolutional Neural Networks (BCNNs) have emerged as a robust form of Convolutional Neural Networks (CNNs) with the capability of uncertainty estimation. A BCNN model is implemented by adding a dropout layer after each convolutional layer in the original CNN. By executing the stochastic inferences many times, BCNNs are able to provide an output distribution that reflects the uncertainty of the final prediction. Repeated inferences in this process lead to much longer execution time, which makes it challenging to apply Bayesian technique to CNNs in real-world applications. In this study, we propose Fast-BCNN, an FPGA-based hardware accelerator design that intelligently skips the redundant computations for two types of neurons during repeated BCNN inferences. Firstly, within a sample inference, we aim to skip the dropped neurons that predetermined by dropout masks. Secondly, by leveraging the information from the first inference and dropout masks, we predict the zero neurons and skip all their corresponding computations during the following sample inferences. Particularly, an optimization algorithm is employed to guarantee the accuracy of zero neuron prediction while achieving the maximal computation reduction. To support our neuron skipping strategy at hardware level, we explore an efficient parallelism for CNN convolution to gracefully skip the corresponding computations for both types of neurons, we then propose a novel PE architecture that accommodates the parallel operation of convolution and prediction with negligible overhead. Experimental results demonstrate that our Fast-BCNN achieves 2.1~8.2&#x00D7; speedup and 44%~84% energy reduction over the baseline CNN accelerator.", "abstracts": [ { "abstractType": "Regular", "content": "Bayesian Convolutional Neural Networks (BCNNs) have emerged as a robust form of Convolutional Neural Networks (CNNs) with the capability of uncertainty estimation. A BCNN model is implemented by adding a dropout layer after each convolutional layer in the original CNN. By executing the stochastic inferences many times, BCNNs are able to provide an output distribution that reflects the uncertainty of the final prediction. Repeated inferences in this process lead to much longer execution time, which makes it challenging to apply Bayesian technique to CNNs in real-world applications. In this study, we propose Fast-BCNN, an FPGA-based hardware accelerator design that intelligently skips the redundant computations for two types of neurons during repeated BCNN inferences. Firstly, within a sample inference, we aim to skip the dropped neurons that predetermined by dropout masks. Secondly, by leveraging the information from the first inference and dropout masks, we predict the zero neurons and skip all their corresponding computations during the following sample inferences. Particularly, an optimization algorithm is employed to guarantee the accuracy of zero neuron prediction while achieving the maximal computation reduction. To support our neuron skipping strategy at hardware level, we explore an efficient parallelism for CNN convolution to gracefully skip the corresponding computations for both types of neurons, we then propose a novel PE architecture that accommodates the parallel operation of convolution and prediction with negligible overhead. Experimental results demonstrate that our Fast-BCNN achieves 2.1~8.2&#x00D7; speedup and 44%~84% energy reduction over the baseline CNN accelerator.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Bayesian Convolutional Neural Networks (BCNNs) have emerged as a robust form of Convolutional Neural Networks (CNNs) with the capability of uncertainty estimation. A BCNN model is implemented by adding a dropout layer after each convolutional layer in the original CNN. By executing the stochastic inferences many times, BCNNs are able to provide an output distribution that reflects the uncertainty of the final prediction. Repeated inferences in this process lead to much longer execution time, which makes it challenging to apply Bayesian technique to CNNs in real-world applications. In this study, we propose Fast-BCNN, an FPGA-based hardware accelerator design that intelligently skips the redundant computations for two types of neurons during repeated BCNN inferences. Firstly, within a sample inference, we aim to skip the dropped neurons that predetermined by dropout masks. Secondly, by leveraging the information from the first inference and dropout masks, we predict the zero neurons and skip all their corresponding computations during the following sample inferences. Particularly, an optimization algorithm is employed to guarantee the accuracy of zero neuron prediction while achieving the maximal computation reduction. To support our neuron skipping strategy at hardware level, we explore an efficient parallelism for CNN convolution to gracefully skip the corresponding computations for both types of neurons, we then propose a novel PE architecture that accommodates the parallel operation of convolution and prediction with negligible overhead. Experimental results demonstrate that our Fast-BCNN achieves 2.1~8.2× speedup and 44%~84% energy reduction over the baseline CNN accelerator.", "fno": "738300a229", "keywords": [ "Bayes Methods", "Convolutional Neural Nets", "Field Programmable Gate Arrays", "Bayesian Convolutional Neural Networks", "BCN Ns", "BCNN Model", "Dropout Layer", "Convolutional Layer", "Stochastic Inferences", "Repeated Inferences", "Bayesian Technique", "Fast BCNN", "FPGA Based Hardware Accelerator Design", "Dropout Masks", "Zero Neuron Prediction", "Neuron Skipping Strategy", "CNN Convolution", "BCNN Inference", "Uncertainty", "Convolution", "Neurons", "Parallel Processing", "Hardware", "Bayes Methods", "Convolutional Neural Networks", "Bayesian Deep Learning", "Uncertainty", "Neural Networks Accelerator", "Neuron Skipping" ], "authors": [ { "affiliation": "University of Houston,ECOMS Lab,ECE Department,Houston,USA", "fullName": "Qiyu Wan", "givenName": "Qiyu", "surname": "Wan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Houston,ECOMS Lab,ECE Department,Houston,USA", "fullName": "Xin Fu", "givenName": "Xin", "surname": "Fu", "__typename": "ArticleAuthorType" } ], "idPrefix": "micro", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "229-240", "year": "2020", "issn": null, "isbn": "978-1-7281-7383-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "738300a215", "articleId": "1oFGBXCxH0s", "__typename": "AdjacentArticleType" }, "next": { "fno": "738300a241", "articleId": "1oFGEvQd7c4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crv/2018/6481/0/648101a375", "title": "Convolutional Neural Networks Regularized by Correlated Noise", "doi": null, "abstractUrl": "/proceedings-article/crv/2018/648101a375/17D45Wc1IJy", "parentPublication": { "id": "proceedings/crv/2018/6481/0", "title": "2018 15th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2021/9489/0/948900a137", "title": "Gradient-based Dynamic Dropout", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a137/1AUpmInjlKM", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2021/2420/0/242000a536", "title": "Synchronous Dropout for Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2021/242000a536/1Eb2u3OH408", "parentPublication": { "id": "proceedings/iiai-aai/2021/2420/0", "title": "2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600a109", "title": "Learning Bayesian Sparse Networks with Full Experience Replay for Continual Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600a109/1H0LBwqNoAg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09072484", "title": "Learning Channel-Wise Interactions for Binary Convolutional Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2021/10/09072484/1jbiNFc8hS8", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cibda/2020/9837/0/983700a219", "title": "Bearing Fault Detection Method Based on Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cibda/2020/983700a219/1lO1JXM3xC0", "parentPublication": { "id": "proceedings/cibda/2020/9837/0", "title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09336266", "title": "Convolutional Neural Networks With Gated Recurrent Connections", "doi": null, "abstractUrl": "/journal/tp/2022/07/09336266/1qHLVWWys24", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a753", "title": "Improved Convolutional Neural Network Fault Diagnosis Method Based on Dropout", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a753/1rvCFXqXVXG", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2021/2701/0/270100a226", "title": "ASBNN: Acceleration of Bayesian Convolutional Neural Networks by Algorithm-hardware Co-design", "doi": null, "abstractUrl": "/proceedings-article/asap/2021/270100a226/1wiR2GcJ3Ve", "parentPublication": { "id": "proceedings/asap/2021/2701/0", "title": "2021 IEEE 32nd International Conference on Application-specific Systems, Architectures and Processors (ASAP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900c392", "title": "Bayesian Nested Neural Networks for Uncertainty Calibration and Adaptive Compression", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900c392/1yeLVAglXHi", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAolH1x", "title": "1992 Proceedings The Twenty-Second International Symposium on Multiple-Valued Logic", "acronym": "ismvl", "groupId": "1000485", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNASILR3", "doi": "10.1109/ISMVL.1992.186781", "title": "Design of a 4-valued digital multiplier using an artificial heterogeneous two-layered neural network", "normalizedTitle": "Design of a 4-valued digital multiplier using an artificial heterogeneous two-layered neural network", "abstract": "A two-layered parallel cascaded neural network using heterogeneous binary and ternary artificial neurons is used to implement the four-valued digital multiplication process. The hardware design is derived from a general M-valued perceptron mapping theory. It requires only three binary neurons and one ternary neuron. The use of heterogeneous perceptron mapping techniques allows the design to be reasonably simple and accurate.<>", "abstracts": [ { "abstractType": "Regular", "content": "A two-layered parallel cascaded neural network using heterogeneous binary and ternary artificial neurons is used to implement the four-valued digital multiplication process. The hardware design is derived from a general M-valued perceptron mapping theory. It requires only three binary neurons and one ternary neuron. The use of heterogeneous perceptron mapping techniques allows the design to be reasonably simple and accurate.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A two-layered parallel cascaded neural network using heterogeneous binary and ternary artificial neurons is used to implement the four-valued digital multiplication process. The hardware design is derived from a general M-valued perceptron mapping theory. It requires only three binary neurons and one ternary neuron. The use of heterogeneous perceptron mapping techniques allows the design to be reasonably simple and accurate.", "fno": "00186781", "keywords": [ "Artificial Intelligence", "Many Valued Logics", "Multiplying Circuits", "Neural Nets", "4 Valued Digital Multiplier", "Artificial Heterogeneous Two Layered Neural Network", "Parallel Cascaded Neural Network", "Digital Multiplication Process", "Hardware Design", "M Valued Perceptron Mapping Theory", "Artificial Neural Networks", "Switches", "Neural Networks", "Neurons", "Hardware", "Digital Systems", "Process Design", "Iron", "Circuits", "Adders" ], "authors": [ { "affiliation": "Dept. of Electr. Eng., Southern Illinois Univ., Carbondale, IL, USA", "fullName": "C.-L.J. Hu", "givenName": "C.-L.J.", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismvl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "84,85,86,87", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00186780", "articleId": "12OmNxwWoKQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "00186782", "articleId": "12OmNzkMlNl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acssc/1988/9999/2/00754648", "title": "A Fast Multi-valued Sbnr Multiplier", "doi": null, "abstractUrl": "/proceedings-article/acssc/1988/00754648/12OmNBJNL1a", "parentPublication": { "id": "proceedings/acssc/1988/9999/2", "title": "Twenty-Second Asilomar Conference on Signals, Systems and Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/2017/5496/0/07964961", "title": "A Novel Ternary Multiplier Based on Ternary CMOS Compact Model", "doi": null, "abstractUrl": "/proceedings-article/ismvl/2017/07964961/12OmNBTs7sc", "parentPublication": { "id": "proceedings/ismvl/2017/5496/0", "title": "2017 IEEE 47th International Symposium on Multiple-Valued Logic (ISMVL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2013/4777/0/4777a070", "title": "Complex-Valued GMDH-type Neural Network for Real-Valued Classification Problems", "doi": null, "abstractUrl": "/proceedings-article/bife/2013/4777a070/12OmNC3FG9B", "parentPublication": { "id": "proceedings/bife/2013/4777/0", "title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/1989/1947/0/00037772", "title": "Synthesis of binary-ternary mixed-valued sequential machine", "doi": null, "abstractUrl": "/proceedings-article/ismvl/1989/00037772/12OmNqBtj2i", "parentPublication": { "id": "proceedings/ismvl/1989/1947/0", "title": "Proceedings The Nineteenth International Symposium on Multiple-Valued Logic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/1991/2145/0/00130701", "title": "Application of multi-zero artificial neural network to the design of an m-valued digital multiplier", "doi": null, "abstractUrl": "/proceedings-article/ismvl/1991/00130701/12OmNvAiS9Y", "parentPublication": { "id": "proceedings/ismvl/1991/2145/0", "title": "1991 Proceedings of the Twenty-First International Symposium on Multiple-Valued Logic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/1992/2680/0/00186776", "title": "Aliasing in multiple-valued test data compaction", "doi": null, "abstractUrl": "/proceedings-article/ismvl/1992/00186776/12OmNwc3wwG", "parentPublication": { "id": "proceedings/ismvl/1992/2680/0", "title": "1992 Proceedings The Twenty-Second International Symposium on Multiple-Valued Logic", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ftcs/1990/2051/0/00089336", "title": "Three-valued neural networks for test generation", "doi": null, "abstractUrl": "/proceedings-article/ftcs/1990/00089336/12OmNxYbSZ4", "parentPublication": { "id": "proceedings/ftcs/1990/2051/0", "title": "Digest of Papers. Fault-Tolerant Computing: 20th International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2008/3497/1/04739544", "title": "The Lower Bound on the Number of Hidden Neurons in Multi-Valued Multi-Threshold Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iita/2008/04739544/12OmNyqRndD", "parentPublication": { "id": "proceedings/iita/2008/3497/3", "title": "2008 Second International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1993/08/t0950", "title": "Some Fundamental Properties of Multiple-Valued Kleenean Functions and Determination of Their Logic Formulas", "doi": null, "abstractUrl": "/journal/tc/1993/08/t0950/13rRUwhHcQ2", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2019/4253/0/425300a830", "title": "Exploring Artificial Neural Networks: A Data Complexity Perspective", "doi": null, "abstractUrl": "/proceedings-article/bracis/2019/425300a830/1fHkG5B3gvC", "parentPublication": { "id": "proceedings/bracis/2019/4253/0", "title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxaw597", "title": "2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)", "acronym": "icat", "groupId": "1002979", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAWH9z5", "doi": "10.1109/ICAT.2017.8171610", "title": "Distinguishing physical actions using an artificial neural network", "normalizedTitle": "Distinguishing physical actions using an artificial neural network", "abstract": "Analysis of electromyography (EMG) signals of normal physical actions have found to be important in order to detect certain abnormalities of the musculoskeletal system and diagnose abnormalities in patient behavior. This paper presents the results of the development of an Artificial Neural Network (ANN) for classification of EMG signals, according to the type of human behavior. The developed ANN is able to distinguish between 10 normal behaviors: bowing, clapping, handshaking, hugging, jumping, running, sitting, standing, walking, and waving. Feedforward neural network architecture was developed using dataset from UCI Machine Learning Repository database. QPC of each episode in EMG signal were obtained using bispectrum signal analysis. Training of ANN was performed using k-fold cross validation and impact of different number of neurons in hidden layer on system output was evaluated. Finally, the single-layer, feedforward neural network architecture with 17 neurons in hidden layer achieved the best performance and had sensitivity of 86.67% and of specificity 85.00%. The overall accuracy of developed structure is 86.25%.", "abstracts": [ { "abstractType": "Regular", "content": "Analysis of electromyography (EMG) signals of normal physical actions have found to be important in order to detect certain abnormalities of the musculoskeletal system and diagnose abnormalities in patient behavior. This paper presents the results of the development of an Artificial Neural Network (ANN) for classification of EMG signals, according to the type of human behavior. The developed ANN is able to distinguish between 10 normal behaviors: bowing, clapping, handshaking, hugging, jumping, running, sitting, standing, walking, and waving. Feedforward neural network architecture was developed using dataset from UCI Machine Learning Repository database. QPC of each episode in EMG signal were obtained using bispectrum signal analysis. Training of ANN was performed using k-fold cross validation and impact of different number of neurons in hidden layer on system output was evaluated. Finally, the single-layer, feedforward neural network architecture with 17 neurons in hidden layer achieved the best performance and had sensitivity of 86.67% and of specificity 85.00%. The overall accuracy of developed structure is 86.25%.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Analysis of electromyography (EMG) signals of normal physical actions have found to be important in order to detect certain abnormalities of the musculoskeletal system and diagnose abnormalities in patient behavior. This paper presents the results of the development of an Artificial Neural Network (ANN) for classification of EMG signals, according to the type of human behavior. The developed ANN is able to distinguish between 10 normal behaviors: bowing, clapping, handshaking, hugging, jumping, running, sitting, standing, walking, and waving. Feedforward neural network architecture was developed using dataset from UCI Machine Learning Repository database. QPC of each episode in EMG signal were obtained using bispectrum signal analysis. Training of ANN was performed using k-fold cross validation and impact of different number of neurons in hidden layer on system output was evaluated. Finally, the single-layer, feedforward neural network architecture with 17 neurons in hidden layer achieved the best performance and had sensitivity of 86.67% and of specificity 85.00%. The overall accuracy of developed structure is 86.25%.", "fno": "08171610", "keywords": [ "Electromyography", "Biological Neural Networks", "Training", "Artificial Neural Networks", "Neurons", "Muscles", "Physical Action", "Bispectrum Analysis", "Artificial Neural Network", "Expert System", "Electromyography" ], "authors": [ { "affiliation": "International Burch University, Sarajevo, Bosnia and Herzegovina", "fullName": "Hana Šahinbegović", "givenName": "Hana", "surname": "Šahinbegović", "__typename": "ArticleAuthorType" }, { "affiliation": "International Burch University, Sarajevo, Bosnia and Herzegovina", "fullName": "Laila Mušić", "givenName": "Laila", "surname": "Mušić", "__typename": "ArticleAuthorType" }, { "affiliation": "International Burch University, Sarajevo, Bosnia and Herzegovina", "fullName": "Berina Alić", "givenName": "Berina", "surname": "Alić", "__typename": "ArticleAuthorType" } ], "idPrefix": "icat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2017", "issn": null, "isbn": "978-1-5386-3337-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08171609", "articleId": "12OmNz4SOsN", "__typename": "AdjacentArticleType" }, "next": { "fno": "08171611", "articleId": "12OmNzICEKP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccce/2016/2427/0/2427a272", "title": "Gripping Motion of Artificial Hand Using EMG Signal", "doi": null, "abstractUrl": "/proceedings-article/iccce/2016/2427a272/12OmNrK9q1X", "parentPublication": { "id": "proceedings/iccce/2016/2427/0", "title": "2016 International Conference on Computer and Communication Engineering (ICCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/music/2012/1956/0/4727a225", "title": "The Use of Artificial Neural Network in the Classification of EMG Signals", "doi": null, "abstractUrl": "/proceedings-article/music/2012/4727a225/12OmNwDj1dO", "parentPublication": { "id": "proceedings/music/2012/1956/0", "title": "2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2012/4731/0/06387218", "title": "EMG Pattern Recognition System Based on Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/micai/2012/06387218/12OmNwoPtrz", "parentPublication": { "id": "proceedings/micai/2012/4731/0", "title": "2012 11th Mexican International Conference on Artificial Intelligence (MICAI 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2014/7010/0/07222854", "title": "Establishing a Simplified Functional Relationship between EMG Signals and Actuation Signals Using Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/micai/2014/07222854/12OmNxecRXY", "parentPublication": { "id": "proceedings/micai/2014/7010/0", "title": "2014 13th Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom/2015/7211/0/07518246", "title": "An Adaptive Memetic Algorithm for Designing Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518246/12OmNyqRnoN", "parentPublication": { "id": "proceedings/uic-atc-scalcom/2015/7211/0", "title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2014/4435/0/4435a014", "title": "Social-Spider Optimization-Based Artificial Neural Networks Training and Its Applications for Parkinson's Disease Identification", "doi": null, "abstractUrl": "/proceedings-article/cbms/2014/4435a014/12OmNzXWZLS", "parentPublication": { "id": "proceedings/cbms/2014/4435/0", "title": "2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/act/2009/3915/0/05376690", "title": "Automated Detection of Brain Tumor in EEG Signals Using Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/act/2009/05376690/13bd1tMztYt", "parentPublication": { "id": "proceedings/act/2009/3915/0", "title": "Advances in Computing, Control, and Telecommunication Technologies, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/mc/2016/04/07454719", "title": "Minimization of Number of Neurons in Voronoi Diagram-Based Artificial Neural Networks", "doi": null, "abstractUrl": "/journal/mc/2016/04/07454719/13rRUwdIOWW", "parentPublication": { "id": "trans/mc", "title": "IEEE Transactions on Multi-Scale Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ises/2021/8753/0/875300a153", "title": "Efficient Design of Artificial Neural Networks using Approximate Compressors and Multipliers", "doi": null, "abstractUrl": "/proceedings-article/ises/2021/875300a153/1APpQzhMOas", "parentPublication": { "id": "proceedings/ises/2021/8753/0", "title": "2021 IEEE International Symposium on Smart Electronic Systems (iSES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2022/9084/0/10101500", "title": "Adaptive Chaotic Injection to Reduce Overfitting in Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2022/10101500/1MwEzy9rZsc", "parentPublication": { "id": "proceedings/icci*cc/2022/9084/0", "title": "2022 IEEE 21st International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqdr6T", "title": "2016 IEEE International Conference on Rebooting Computing (ICRC)", "acronym": "icrc", "groupId": "1815544", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNBTs7Fs", "doi": "10.1109/ICRC.2016.7738691", "title": "Conversion of artificial recurrent neural networks to spiking neural networks for low-power neuromorphic hardware", "normalizedTitle": "Conversion of artificial recurrent neural networks to spiking neural networks for low-power neuromorphic hardware", "abstract": "In recent years the field of neuromorphic low-power systems gained significant momentum, spurring brain-inspired hardware systems which operate on principles that are fundamentally different from standard digital computers and thereby consume orders of magnitude less power. However, their wider use is still hindered by the lack of algorithms that can harness the strengths of such architectures. While neuromorphic adaptations of representation learning algorithms are now emerging, the efficient processing of temporal sequences or variable length-inputs remains difficult, partly due to challenges in representing and configuring the dynamics of spiking neural networks. Recurrent neural networks (RNN) are widely used in machine learning to solve a variety of sequence learning tasks. In this work we present a train-and-constrain methodology that enables the mapping of machine learned (Elman) RNNs on a substrate of spiking neurons, while being compatible with the capabilities of current and near-future neuromorphic systems. This “train-and-constrain” method consists of first training RNNs using backpropagation through time, then discretizing the weights and finally converting them to spiking RNNs by matching the responses of artificial neurons with those of the spiking neurons. We demonstrate our approach by mapping a natural language processing task (question classification), where we demonstrate the entire mapping process of the recurrent layer of the network on IBM's Neurosynaptic System TrueNorth, a spike-based digital neuromorphic hardware architecture. TrueNorth imposes specific constraints on connectivity, neural and synaptic parameters. To satisfy these constraints, it was necessary to discretize the synaptic weights to 16 levels, discretize the neural activities to 16 levels, and to limit fan-in to 64 inputs. Surprisingly, we find that short synaptic delays are sufficient to implement the dynamic (temporal) aspect of the RNN in the question classification task. Furthermore we observed that the discretization of the neural activities is beneficial to our train-and-constrain approach. The hardware-constrained model achieved 74% accuracy in question classification while using less than 0.025% of the cores on one TrueNorth chip, resulting in an estimated power consumption of ≈ 17µW.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years the field of neuromorphic low-power systems gained significant momentum, spurring brain-inspired hardware systems which operate on principles that are fundamentally different from standard digital computers and thereby consume orders of magnitude less power. However, their wider use is still hindered by the lack of algorithms that can harness the strengths of such architectures. While neuromorphic adaptations of representation learning algorithms are now emerging, the efficient processing of temporal sequences or variable length-inputs remains difficult, partly due to challenges in representing and configuring the dynamics of spiking neural networks. Recurrent neural networks (RNN) are widely used in machine learning to solve a variety of sequence learning tasks. In this work we present a train-and-constrain methodology that enables the mapping of machine learned (Elman) RNNs on a substrate of spiking neurons, while being compatible with the capabilities of current and near-future neuromorphic systems. This “train-and-constrain” method consists of first training RNNs using backpropagation through time, then discretizing the weights and finally converting them to spiking RNNs by matching the responses of artificial neurons with those of the spiking neurons. We demonstrate our approach by mapping a natural language processing task (question classification), where we demonstrate the entire mapping process of the recurrent layer of the network on IBM's Neurosynaptic System TrueNorth, a spike-based digital neuromorphic hardware architecture. TrueNorth imposes specific constraints on connectivity, neural and synaptic parameters. To satisfy these constraints, it was necessary to discretize the synaptic weights to 16 levels, discretize the neural activities to 16 levels, and to limit fan-in to 64 inputs. Surprisingly, we find that short synaptic delays are sufficient to implement the dynamic (temporal) aspect of the RNN in the question classification task. Furthermore we observed that the discretization of the neural activities is beneficial to our train-and-constrain approach. The hardware-constrained model achieved 74% accuracy in question classification while using less than 0.025% of the cores on one TrueNorth chip, resulting in an estimated power consumption of ≈ 17µW.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years the field of neuromorphic low-power systems gained significant momentum, spurring brain-inspired hardware systems which operate on principles that are fundamentally different from standard digital computers and thereby consume orders of magnitude less power. However, their wider use is still hindered by the lack of algorithms that can harness the strengths of such architectures. While neuromorphic adaptations of representation learning algorithms are now emerging, the efficient processing of temporal sequences or variable length-inputs remains difficult, partly due to challenges in representing and configuring the dynamics of spiking neural networks. Recurrent neural networks (RNN) are widely used in machine learning to solve a variety of sequence learning tasks. In this work we present a train-and-constrain methodology that enables the mapping of machine learned (Elman) RNNs on a substrate of spiking neurons, while being compatible with the capabilities of current and near-future neuromorphic systems. This “train-and-constrain” method consists of first training RNNs using backpropagation through time, then discretizing the weights and finally converting them to spiking RNNs by matching the responses of artificial neurons with those of the spiking neurons. We demonstrate our approach by mapping a natural language processing task (question classification), where we demonstrate the entire mapping process of the recurrent layer of the network on IBM's Neurosynaptic System TrueNorth, a spike-based digital neuromorphic hardware architecture. TrueNorth imposes specific constraints on connectivity, neural and synaptic parameters. To satisfy these constraints, it was necessary to discretize the synaptic weights to 16 levels, discretize the neural activities to 16 levels, and to limit fan-in to 64 inputs. Surprisingly, we find that short synaptic delays are sufficient to implement the dynamic (temporal) aspect of the RNN in the question classification task. Furthermore we observed that the discretization of the neural activities is beneficial to our train-and-constrain approach. The hardware-constrained model achieved 74% accuracy in question classification while using less than 0.025% of the cores on one TrueNorth chip, resulting in an estimated power consumption of ≈ 17µW.", "fno": "07738691", "keywords": [ "Neurons", "Recurrent Neural Networks", "Biological Neural Networks", "Neuromorphics", "Training", "Hardware", "Delays" ], "authors": [ { "affiliation": "Institute of Neuroinformatics, ETH Zurich and University, Switzerland", "fullName": "Peter U. Diehl", "givenName": "Peter U.", "surname": "Diehl", "__typename": "ArticleAuthorType" }, { "affiliation": "The MITRE Corporation, Bedford, MA, USA", "fullName": "Guido Zarrella", "givenName": "Guido", "surname": "Zarrella", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research Almaden, San Jose, CA, USA", "fullName": "Andrew Cassidy", "givenName": "Andrew", "surname": "Cassidy", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Neural Computation, UC San Diego, La Jolla, USA", "fullName": "Bruno U. Pedroni", "givenName": "Bruno U.", "surname": "Pedroni", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Neural Computation, UC San Diego, La Jolla, USA", "fullName": "Emre Neftci", "givenName": "Emre", "surname": "Neftci", "__typename": "ArticleAuthorType" } ], "idPrefix": "icrc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2016", "issn": null, "isbn": "978-1-5090-1370-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07738690", "articleId": "12OmNAle6k8", "__typename": "AdjacentArticleType" }, "next": { "fno": "07738692", "articleId": "12OmNB6UIat", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icrc/2016/1370/0/07738681", "title": "Spiking network algorithms for scientific computing", "doi": null, "abstractUrl": "/proceedings-article/icrc/2016/07738681/12OmNqFJhXg", "parentPublication": { "id": "proceedings/icrc/2016/1370/0", "title": "2016 IEEE International Conference on Rebooting Computing (ICRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/mc/2018/04/08063353", "title": "Parameter Exploration to Improve Performance of Memristor-Based Neuromorphic Architectures", "doi": null, "abstractUrl": "/journal/mc/2018/04/08063353/17D45VsBU2P", "parentPublication": { "id": "trans/mc", "title": "IEEE Transactions on Multi-Scale Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vts/2019/1170/0/08758653", "title": "Special Session: Reliability of Hardware-Implemented Spiking Neural Networks (SNN)", "doi": null, "abstractUrl": "/proceedings-article/vts/2019/08758653/1bzYAB83qjS", "parentPublication": { "id": "proceedings/vts/2019/1170/0", "title": "2019 IEEE 37th VLSI Test Symposium (VTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2019/3510/0/555500a603", "title": "Evaluation of Neuromorphic Hardware using Cellular Neural Networks and Oxide Semiconductors", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2019/555500a603/1c2bEgsJhAI", "parentPublication": { "id": "proceedings/ipdpsw/2019/3510/0", "title": "2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvlsi/2019/3391/0/339100a193", "title": "A Framework for the Analysis of Throughput-Constraints of SNNs on Neuromorphic Hardware", "doi": null, "abstractUrl": "/proceedings-article/isvlsi/2019/339100a193/1dUnNdL7qjC", "parentPublication": { "id": "proceedings/isvlsi/2019/3391/0", "title": "2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2020/01/08913677", "title": "Mapping Spiking Neural Networks to Neuromorphic Hardware", "doi": null, "abstractUrl": "/journal/si/2020/01/08913677/1fh3aafzQeQ", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006383", "title": "Bayesian-based Hyperparameter Optimization for Spiking Neuromorphic Systems", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006383/1hJskcFfvc4", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/igsc/2020/4307/0/09290830", "title": "Compiling Spiking Neural Networks to Mitigate Neuromorphic Hardware Constraints", "doi": null, "abstractUrl": "/proceedings-article/igsc/2020/09290830/1pVH5fYNcnC", "parentPublication": { "id": "proceedings/igsc/2020/4307/0", "title": "2020 11th International Green and Sustainable Computing Workshops (IGSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/02/09380671", "title": "Endurance-Aware Mapping of Spiking Neural Networks to Neuromorphic Hardware", "doi": null, "abstractUrl": "/journal/td/2022/02/09380671/1s2GtSR9vsQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413206", "title": "VOWEL: A Local Online Learning Rule for Recurrent Networks of Probabilistic Spiking Winner- Take-All Circuits", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413206/1tmhQrlPig0", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzn38Kd", "title": "Proceedings. 15th IEEE VLSI Test Symposium (Cat. No.97TB100125)", "acronym": "vts", "groupId": "1000804", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEBz2r", "doi": "10.1109/VTEST.1997.600282", "title": "A new approach for testing artificial neural networks", "normalizedTitle": "A new approach for testing artificial neural networks", "abstract": "This paper presents progress on a new and novel testing approach for detecting interconnection deletion faults in electronic implementations of artificial neural networks (ANNs). The testing approach is based on an unusual transient behavior manifested by faulted ANNs showing better apparent performance than fault-free ANNs, when neurons are operated with low activation function gains. The result presented in this paper improves on prior results by requiring fewer test patterns.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents progress on a new and novel testing approach for detecting interconnection deletion faults in electronic implementations of artificial neural networks (ANNs). The testing approach is based on an unusual transient behavior manifested by faulted ANNs showing better apparent performance than fault-free ANNs, when neurons are operated with low activation function gains. The result presented in this paper improves on prior results by requiring fewer test patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents progress on a new and novel testing approach for detecting interconnection deletion faults in electronic implementations of artificial neural networks (ANNs). The testing approach is based on an unusual transient behavior manifested by faulted ANNs showing better apparent performance than fault-free ANNs, when neurons are operated with low activation function gains. The result presented in this paper improves on prior results by requiring fewer test patterns.", "fno": "78100245", "keywords": [ "Neural Chips Testing Artificial Neural Networks Interconnection Deletion Faults Transient Behavior Faulted ANN Activation Function Gains" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Marquette Univ., Milwaukee, WI, USA", "fullName": "C.A. Fleischer", "givenName": "C.A.", "surname": "Fleischer", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Marquette Univ., Milwaukee, WI, USA", "fullName": "L.A. Belfore, II", "givenName": "L.A.", "surname": "Belfore, II", "__typename": "ArticleAuthorType" } ], "idPrefix": "vts", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-04-01T00:00:00", "pubType": "proceedings", "pages": "245", "year": "1997", "issn": null, "isbn": "0-8186-7810-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "78100238", "articleId": "12OmNAndizu", "__typename": "AdjacentArticleType" }, "next": { "fno": "78100252", "articleId": "12OmNrH1PGu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "1ANLofsLS9i", "title": "2021 4th World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)", "acronym": "wcmeim", "groupId": "1835484", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1ANLrPDilc4", "doi": "10.1109/WCMEIM54377.2021.00133", "title": "Manufacturing heterojunction based on 2D materials for artificial neural network construction", "normalizedTitle": "Manufacturing heterojunction based on 2D materials for artificial neural network construction", "abstract": "Artificial neural network is an abstract and simplified computing structure that simulates the neural system of human brain and reflects some characteristics of human brain. Artificial nerve is favored by researchers because of its high efficiency, memory function and fast calculation. Constructing artificial nerve and synapse to simulate biological nerve and synapse puts forward higher requirements for the structure and properties of the required materials. The development and application of synaptic devices made of traditional block materials are limited due to the defects of strong scattering and relatively large space. Due to the characteristics of high carrier mobility, dangling bonding free surface and nanocrystallization of emerging two-dimensional (2D) materials, heterojunctions are widely used in the functional realization experiments of artificial neurons and synapses. The successful application of 2D heterojunction in artificial neural network also has a far-reaching impact on the development of artificial intelligence and intelligent manufacturing. In this review, firstly, the types of 2D materials and the advantages of 2D materials as new materials for constructing artificial neurons and synapses are summarized. Then, the working principles of biological neurons and synapses, artificial neurons and synapses are briefly described, and the applications of heterojunctions based on 2D materials in artificial synapses (neurons) are summarized. Finally, the prospect of 2D material heterojunction in the field of artificial neural research and the possible challenges are analyzed.", "abstracts": [ { "abstractType": "Regular", "content": "Artificial neural network is an abstract and simplified computing structure that simulates the neural system of human brain and reflects some characteristics of human brain. Artificial nerve is favored by researchers because of its high efficiency, memory function and fast calculation. Constructing artificial nerve and synapse to simulate biological nerve and synapse puts forward higher requirements for the structure and properties of the required materials. The development and application of synaptic devices made of traditional block materials are limited due to the defects of strong scattering and relatively large space. Due to the characteristics of high carrier mobility, dangling bonding free surface and nanocrystallization of emerging two-dimensional (2D) materials, heterojunctions are widely used in the functional realization experiments of artificial neurons and synapses. The successful application of 2D heterojunction in artificial neural network also has a far-reaching impact on the development of artificial intelligence and intelligent manufacturing. In this review, firstly, the types of 2D materials and the advantages of 2D materials as new materials for constructing artificial neurons and synapses are summarized. Then, the working principles of biological neurons and synapses, artificial neurons and synapses are briefly described, and the applications of heterojunctions based on 2D materials in artificial synapses (neurons) are summarized. Finally, the prospect of 2D material heterojunction in the field of artificial neural research and the possible challenges are analyzed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Artificial neural network is an abstract and simplified computing structure that simulates the neural system of human brain and reflects some characteristics of human brain. Artificial nerve is favored by researchers because of its high efficiency, memory function and fast calculation. Constructing artificial nerve and synapse to simulate biological nerve and synapse puts forward higher requirements for the structure and properties of the required materials. The development and application of synaptic devices made of traditional block materials are limited due to the defects of strong scattering and relatively large space. Due to the characteristics of high carrier mobility, dangling bonding free surface and nanocrystallization of emerging two-dimensional (2D) materials, heterojunctions are widely used in the functional realization experiments of artificial neurons and synapses. The successful application of 2D heterojunction in artificial neural network also has a far-reaching impact on the development of artificial intelligence and intelligent manufacturing. In this review, firstly, the types of 2D materials and the advantages of 2D materials as new materials for constructing artificial neurons and synapses are summarized. Then, the working principles of biological neurons and synapses, artificial neurons and synapses are briefly described, and the applications of heterojunctions based on 2D materials in artificial synapses (neurons) are summarized. Finally, the prospect of 2D material heterojunction in the field of artificial neural research and the possible challenges are analyzed.", "fno": "217200a622", "keywords": [ "Neural Nets", "Neurophysiology", "Human Brain", "Artificial Nerve", "Synapse", "Biological Nerve", "Heterojunctions", "Functional Realization Experiments", "Artificial Neurons", "Artificial Intelligence", "Artificial Synapses", "2 D Material Heterojunction", "Artificial Neural Research", "Manufacturing Heterojunction", "Artificial Neural Network Construction", "Simplified Computing Structure", "Neural System", "Performance Evaluation", "Neurons", "Two Dimensional Displays", "Scattering", "Artificial Neural Networks", "Heterojunctions", "Manufacturing", "Two Dimensional Materials", "Biological Neuron", "Artificial Neuron", "Heterostructure", "Synapse" ], "authors": [ { "affiliation": "Southwest University,College of Electronic and Information Engineering,Chongqing,China", "fullName": "En Zhao", "givenName": "En", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Southwest University,College of Electronic and Information Engineering,Chongqing,China", "fullName": "Bao Li", "givenName": "Bao", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Southwest University,College of Electronic and Information Engineering,Chongqing,China", "fullName": "Ling Chen", "givenName": "Ling", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Southwest University,College of Electronic and Information Engineering,Chongqing,China", "fullName": "Zhiyuan Zhu", "givenName": "Zhiyuan", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "wcmeim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "622-625", "year": "2021", "issn": null, "isbn": "978-1-6654-2172-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "217200a618", "articleId": "1ANLw21qc5q", "__typename": "AdjacentArticleType" }, "next": { "fno": "217200a626", "articleId": "1ANLEFbfXqM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ijcnn/2000/0619/6/06196606", "title": "Simulating the Evolution of 2D Pattern Recognition on the CAM-Brain Machine, an Evolvable Hardware Tool for Building a 75 Million Neuron Artificial Brain", "doi": null, "abstractUrl": "/proceedings-article/ijcnn/2000/06196606/12OmNCbU3c1", "parentPublication": { "id": "proceedings/ijcnn/2000/0619/3", "title": "Neural Networks, IEEE - INNS - ENNS International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annes/1993/4260/0/00323065", "title": "GSN neural network in hardware", "doi": null, "abstractUrl": "/proceedings-article/annes/1993/00323065/12OmNCgrD5d", "parentPublication": { "id": "proceedings/annes/1993/4260/0", "title": "1993 First New Zealand International Two-Stream Conference on Artificial Neural Networks and Expert Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2014/5793/0/5793a496", "title": "Efficient STDP Micro-Architecture for Silicon Spiking Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/dsd/2014/5793a496/12OmNzBOhtx", "parentPublication": { "id": "proceedings/dsd/2014/5793/0", "title": "2014 17th Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eh/2002/1718/0/17180266", "title": "Towards an Artificial Neural Network Framework", "doi": null, "abstractUrl": "/proceedings-article/eh/2002/17180266/12OmNzYeAUp", "parentPublication": { "id": "proceedings/eh/2002/1718/0", "title": "2002 NASA/DoD Conference on Evolvable Hardware", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/annes/1995/7174/0/71740059", "title": "A Mechanism for the Development of Feature Detecting Neurons", "doi": null, "abstractUrl": "/proceedings-article/annes/1995/71740059/12OmNzkuKym", "parentPublication": { "id": "proceedings/annes/1995/7174/0", "title": "Proceedings 1995 Second New Zealand International Two-Stream Conference on Artificial Neural Networks and Expert Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08017643", "title": "Abstractocyte: A Visual Tool for Exploring Nanoscale Astroglial Cells", "doi": null, "abstractUrl": "/journal/tg/2018/01/08017643/13rRUwI5U7Y", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539329", "title": "Visualizing the Hidden Activity of Artificial Neural Networks", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539329/13rRUyYjKal", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ises/2022/9922/0/992200a647", "title": "Emerging Two Dimensional Channel Materials for MOSFETs: A Review", "doi": null, "abstractUrl": "/proceedings-article/ises/2022/992200a647/1KrgAhwL9mw", "parentPublication": { "id": "proceedings/ises/2022/9922/0", "title": "2022 IEEE International Symposium on Smart Electronic Systems (iSES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nanoarch/2019/5520/0/09073307", "title": "Graphene Nanoribbon-based Synapses with Versatile Plasticity", "doi": null, "abstractUrl": "/proceedings-article/nanoarch/2019/09073307/1jrW8CAxxJu", "parentPublication": { "id": "proceedings/nanoarch/2019/5520/0", "title": "2019 IEEE/ACM International Symposium on Nanoscale Architectures (NANOARCH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412266", "title": "SPA: Stochastic Probability Adjustment for System Balance of Unsupervised SNNs", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412266/1tmivE8uk1y", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHkEttbVOE", "title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)", "acronym": "bracis", "groupId": "1803430", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHkG5B3gvC", "doi": "10.1109/BRACIS.2019.00148", "title": "Exploring Artificial Neural Networks: A Data Complexity Perspective", "normalizedTitle": "Exploring Artificial Neural Networks: A Data Complexity Perspective", "abstract": "Artificial Neural Networks perform a series of transformations to the input data, combining the outputs of multiple layers of neurons into more complex decision boundaries for separating the classes. This work presents a study on the processing performed at each layer of a Multilayer Perceptron neural network based on a data complexity perspective. The idea is to verify how the complexity of the classification problem evolves layer by layer. We show empirically that the separability of the classes is increased by each layer, as measured by feature overlapping and class separability measures, contributing to make the classification problem simpler for posterior layers.", "abstracts": [ { "abstractType": "Regular", "content": "Artificial Neural Networks perform a series of transformations to the input data, combining the outputs of multiple layers of neurons into more complex decision boundaries for separating the classes. This work presents a study on the processing performed at each layer of a Multilayer Perceptron neural network based on a data complexity perspective. The idea is to verify how the complexity of the classification problem evolves layer by layer. We show empirically that the separability of the classes is increased by each layer, as measured by feature overlapping and class separability measures, contributing to make the classification problem simpler for posterior layers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Artificial Neural Networks perform a series of transformations to the input data, combining the outputs of multiple layers of neurons into more complex decision boundaries for separating the classes. This work presents a study on the processing performed at each layer of a Multilayer Perceptron neural network based on a data complexity perspective. The idea is to verify how the complexity of the classification problem evolves layer by layer. We show empirically that the separability of the classes is increased by each layer, as measured by feature overlapping and class separability measures, contributing to make the classification problem simpler for posterior layers.", "fno": "425300a830", "keywords": [ "Multilayer Perceptrons", "Pattern Classification", "Classification Problem", "Class Separability Measures", "Artificial Neural Networks", "Data Complexity Perspective", "Complex Decision", "Multilayer Perceptron Neural Network", "Neurons", "Complexity Theory", "Training", "Biological Neural Networks", "Multilayer Perceptrons", "Computer Architecture", "Density Measurement", "Multilayer Perceptron Complexity Measures" ], "authors": [ { "affiliation": "Universidade Federal de São Paulo", "fullName": "Lucas P. Zorzi", "givenName": "Lucas P.", "surname": "Zorzi", "__typename": "ArticleAuthorType" }, { "affiliation": "Instituto Tecnológico de Aeronáutica", "fullName": "Ana Carolina Lorena", "givenName": "Ana Carolina", "surname": "Lorena", "__typename": "ArticleAuthorType" } ], "idPrefix": "bracis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "830-835", "year": "2019", "issn": null, "isbn": "978-1-7281-4253-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "425300a824", "articleId": "1fHkHrb4h7q", "__typename": "AdjacentArticleType" }, "next": { "fno": "425300a836", "articleId": "1fHkIqYNrYk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ssst/1992/2665/0/00712262", "title": "On the Structural Requirements of Mutlilayer Perceptronsin Binary Field", "doi": null, "abstractUrl": "/proceedings-article/ssst/1992/00712262/12OmNBqdr9Z", "parentPublication": { "id": "proceedings/ssst/1992/2665/0", "title": "The 24th Southeastern Symposium on System Theory and The 3rd Annual Symposium on Communications, Signal Processing Expert Systems, and ASIC VLSI Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1989/1952/0/00037850", "title": "Object recognition using a neural network and invariant Zernike features", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1989/00037850/12OmNrJAejb", "parentPublication": { "id": "proceedings/cvpr/1989/1952/0", "title": "1989 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2015/8676/0/07176181", "title": "Advance quantum based binary neural network learning algorithm", "doi": null, "abstractUrl": "/proceedings-article/snpd/2015/07176181/12OmNvA1hnP", "parentPublication": { "id": "proceedings/snpd/2015/8676/0", "title": "2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2017/6231/0/6231a686", "title": "Multilayer Perceptron: An Intelligent Model for Classification and Intrusion Detection", "doi": null, "abstractUrl": "/proceedings-article/waina/2017/6231a686/12OmNviHKfi", "parentPublication": { "id": "proceedings/waina/2017/6231/0", "title": "2017 31st International Conference on Advanced Information Networking and Applications: Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1988/9999/0/00197060", "title": "Efficient modeling for multilayer feed-forward neural nets", "doi": null, "abstractUrl": "/proceedings-article/icassp/1988/00197060/12OmNyoSb9S", "parentPublication": { "id": "proceedings/icassp/1988/9999/0", "title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2018/5889/0/08441087", "title": "Branching Artificial Neural Ensemble (BRANE): Supervised Learning For Missing Data", "doi": null, "abstractUrl": "/proceedings-article/snpd/2018/08441087/13bd1AITnaE", "parentPublication": { "id": "proceedings/snpd/2018/5889/0", "title": "2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2017/02/07862745", "title": "A Power-Aware Digital Multilayer Perceptron Accelerator with On-Chip Training Based on Approximate Computing", "doi": null, "abstractUrl": "/journal/ec/2017/02/07862745/13rRUxBa5qO", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd-summer/2022/9637/0/963700a009", "title": "Artificial Neural Network for Processing Fingerprint Image Noise", "doi": null, "abstractUrl": "/proceedings-article/snpd-summer/2022/963700a009/1La4VLy4aD6", "parentPublication": { "id": "proceedings/snpd-summer/2022/9637/0", "title": "2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09429980", "title": "Tweaking Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tp/2022/09/09429980/1txPnvXAkUM", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gi/2021/4466/0/446600a011", "title": "Exploring the Accuracy &#x2013; Energy Trade-off in Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/gi/2021/446600a011/1v2QKLGCS8E", "parentPublication": { "id": "proceedings/gi/2021/4466/0", "title": "2021 IEEE/ACM International Workshop on Genetic Improvement (GI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gysRccRbB6", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gysX6nGzXa", "doi": "10.1109/ASE.2019.00113", "title": "NeuralVis: Visualizing and Interpreting Deep Learning Models", "normalizedTitle": "NeuralVis: Visualizing and Interpreting Deep Learning Models", "abstract": "Deep Neural Network (DNN) techniques have been prevalent in software engineering. They are employed to facilitate various software engineering tasks and embedded into many software applications. However, because DNNs are built upon a rich data-driven programming paradigm that employs plenty of labeled data to train a set of neurons to construct the internal system logic, analyzing and understanding their behaviors becomes a difficult task for software engineers. In this paper, we present an instance-based visualization tool for DNN, namely NeuralVis, to support software engineers in visualizing and interpreting deep learning models. NeuralVis is designed for: 1). visualizing the structure of DNN models, i.e., neurons, layers, as well as connections; 2). visualizing the data transformation process; 3). integrating existing adversarial attack algorithms for test input generation; 4). comparing intermediate layers' outputs of different inputs. To demonstrate the effectiveness of NeuralVis, we design a task-based user study involving ten participants on two classic DNN models, i.e., LeNet and VGG-12. The result shows NeuralVis can assist engineers in identifying critical features that determine the prediction results. Video: https://youtu.be/solkJri4Z44.", "abstracts": [ { "abstractType": "Regular", "content": "Deep Neural Network (DNN) techniques have been prevalent in software engineering. They are employed to facilitate various software engineering tasks and embedded into many software applications. However, because DNNs are built upon a rich data-driven programming paradigm that employs plenty of labeled data to train a set of neurons to construct the internal system logic, analyzing and understanding their behaviors becomes a difficult task for software engineers. In this paper, we present an instance-based visualization tool for DNN, namely NeuralVis, to support software engineers in visualizing and interpreting deep learning models. NeuralVis is designed for: 1). visualizing the structure of DNN models, i.e., neurons, layers, as well as connections; 2). visualizing the data transformation process; 3). integrating existing adversarial attack algorithms for test input generation; 4). comparing intermediate layers' outputs of different inputs. To demonstrate the effectiveness of NeuralVis, we design a task-based user study involving ten participants on two classic DNN models, i.e., LeNet and VGG-12. The result shows NeuralVis can assist engineers in identifying critical features that determine the prediction results. Video: https://youtu.be/solkJri4Z44.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep Neural Network (DNN) techniques have been prevalent in software engineering. They are employed to facilitate various software engineering tasks and embedded into many software applications. However, because DNNs are built upon a rich data-driven programming paradigm that employs plenty of labeled data to train a set of neurons to construct the internal system logic, analyzing and understanding their behaviors becomes a difficult task for software engineers. In this paper, we present an instance-based visualization tool for DNN, namely NeuralVis, to support software engineers in visualizing and interpreting deep learning models. NeuralVis is designed for: 1). visualizing the structure of DNN models, i.e., neurons, layers, as well as connections; 2). visualizing the data transformation process; 3). integrating existing adversarial attack algorithms for test input generation; 4). comparing intermediate layers' outputs of different inputs. To demonstrate the effectiveness of NeuralVis, we design a task-based user study involving ten participants on two classic DNN models, i.e., LeNet and VGG-12. The result shows NeuralVis can assist engineers in identifying critical features that determine the prediction results. Video: https://youtu.be/solkJri4Z44.", "fno": "250800b106", "keywords": [ "Data Visualisation", "Learning Artificial Intelligence", "Neural Nets", "Software Engineering", "Neural Vis", "Deep Neural Network Techniques", "Software Engineering Tasks", "Software Applications", "Rich Data Driven Programming Paradigm", "Neurons", "Internal System Logic", "Software Engineers", "Instance Based Visualization Tool", "Data Transformation Process", "Task Based User Study", "Classic DNN Models", "Deep Learning Model Visualization", "Deep Learning Model Interpretation", "Task Analysis", "Data Visualization", "Visualization", "Software", "Load Modeling", "Tools", "Neural Networks", "Visualization", "Neural Network Visualization", "Program Comprehension" ], "authors": [ { "affiliation": "Nanjing University", "fullName": "Xufan Zhang", "givenName": "Xufan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University", "fullName": "Ziyue Yin", "givenName": "Ziyue", "surname": "Yin", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University", "fullName": "Yang Feng", "givenName": "Yang", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University", "fullName": "Qingkai Shi", "givenName": "Qingkai", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University", "fullName": "Jia Liu", "givenName": "Jia", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanjing University", "fullName": "Zhenyu Chen", "givenName": "Zhenyu", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "1106-1109", "year": "2019", "issn": null, "isbn": "978-1-7281-2508-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250800b102", "articleId": "1gysZWpg0ZG", "__typename": "AdjacentArticleType" }, "next": { "fno": "250800b110", "articleId": "1gysRJz0zja", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2018/1424/0/142401a180", "title": "Visualizing Deep Neural Networks for Text Analytics", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2018/142401a180/12OmNwDACu7", "parentPublication": { "id": "proceedings/pacificvis/2018/1424/0", "title": "2018 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019861", "title": "Visualizing Dataflow Graphs of Deep Learning Models in TensorFlow", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019861/13rRUwbs2gx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539329", "title": "Visualizing the Hidden Activity of Artificial Neural Networks", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539329/13rRUyYjKal", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/06/08617747", "title": "RNNbow: Visualizing Learning Via Backpropagation Gradients in RNNs", "doi": null, "abstractUrl": "/magazine/cg/2018/06/08617747/17D45VsBTUS", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/11/08732351", "title": "Visual Genealogy of Deep Neural Networks", "doi": null, "abstractUrl": "/journal/tg/2020/11/08732351/1aDQt8709So", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2018/1970/0/197000a628", "title": "DeepGraph: A PyCharm Tool for Visualizing and Understanding Deep Learning Models", "doi": null, "abstractUrl": "/proceedings-article/apsec/2018/197000a628/1b66q5r5ZzG", "parentPublication": { "id": "proceedings/apsec/2018/1970/0", "title": "2018 25th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807294", "title": "S<sc>ummit</sc>: Scaling Deep Learning Interpretability by Visualizing Activation and Attribution Summarizations", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807294/1cG6pGxvLOg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800b158", "title": "DeepMutation++: A Mutation Testing Framework for Deep Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800b158/1gysV2EtE3e", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2021/1219/0/121900a021", "title": "Roosterize: Suggesting Lemma Names for Coq Verification Projects Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2021/121900a021/1sET5GxkvPW", "parentPublication": { "id": "proceedings/icse-companion/2021/1219/0/", "title": "2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2021/6836/0/683600a024", "title": "Fail-Safe Execution of Deep Learning based Systems through Uncertainty Monitoring", "doi": null, "abstractUrl": "/proceedings-article/icst/2021/683600a024/1tRP7IcknAc", "parentPublication": { "id": "proceedings/icst/2021/6836/0", "title": "2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pXm2G5LTRS", "title": "2020 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pXm2QUw2ek", "doi": "10.1109/TREX51495.2020.00006", "title": "Beyond Trust Building &#x2014; Calibrating Trust in Visual Analytics", "normalizedTitle": "Beyond Trust Building — Calibrating Trust in Visual Analytics", "abstract": "Trust is a fundamental factor in how users engage in interactions with Visual Analytics (VA) systems. While the importance of building trust to this end has been pointed out in research, the aspect that trust can also be misplaced is largely ignored in VA so far. This position paper addresses this aspect by putting trust calibration in focus - i.e., the process of aligning the user's trust with the actual trustworthiness of the VA system. To this end, we present the trust continuum in the context of VA, dissect important trust issues in both VA systems and users, as well as discuss possible approaches that can build and calibrate trust.", "abstracts": [ { "abstractType": "Regular", "content": "Trust is a fundamental factor in how users engage in interactions with Visual Analytics (VA) systems. While the importance of building trust to this end has been pointed out in research, the aspect that trust can also be misplaced is largely ignored in VA so far. This position paper addresses this aspect by putting trust calibration in focus - i.e., the process of aligning the user's trust with the actual trustworthiness of the VA system. To this end, we present the trust continuum in the context of VA, dissect important trust issues in both VA systems and users, as well as discuss possible approaches that can build and calibrate trust.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Trust is a fundamental factor in how users engage in interactions with Visual Analytics (VA) systems. While the importance of building trust to this end has been pointed out in research, the aspect that trust can also be misplaced is largely ignored in VA so far. This position paper addresses this aspect by putting trust calibration in focus - i.e., the process of aligning the user's trust with the actual trustworthiness of the VA system. To this end, we present the trust continuum in the context of VA, dissect important trust issues in both VA systems and users, as well as discuss possible approaches that can build and calibrate trust.", "fno": "851400a009", "keywords": [ "Calibration", "Data Visualisation", "Security Of Data", "Telecommunication Computing", "Telecommunication Security", "Trusted Computing", "Trust Building", "Important Trust Issues", "Trust Continuum", "VA System", "Trust Calibration", "Visual Analytics Systems", "Buildings", "Calibration", "Visual Analytics", "Uncertainty", "Task Analysis", "Law", "Data Visualization", "Human Centered Computing", "Visualization", "Visualization Theory", "Concepts And Paradigms Human Centered Computing", "HCI Theory", "Concepts And Models", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Aarhus University,Denmark", "fullName": "Wenkai Han", "givenName": "Wenkai", "surname": "Han", "__typename": "ArticleAuthorType" }, { "affiliation": "Aarhus University,Denmark", "fullName": "Hans-Jörg Schulz", "givenName": "Hans-Jörg", "surname": "Schulz", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "9-15", "year": "2020", "issn": null, "isbn": "978-1-7281-8514-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "851400a001", "articleId": "1pXm345rAA0", "__typename": "AdjacentArticleType" }, "next": { "fno": "851400a016", "articleId": "1pXm2UrVXMc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/02/mcg2015020016", "title": "Preparing Undergraduates for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/02/mcg2015020016/13rRUxjQyjN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192716", "title": "The Role of Uncertainty, Awareness, and Trust in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192716/13rRUxlgxTo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/01/09693359", "title": "Visual Analytics for Human-Centered Machine Learning", "doi": null, "abstractUrl": "/magazine/cg/2022/01/09693359/1As7zEHCGn6", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2020/8514/0/851400a016", "title": "Towards Trust-Augmented Visual Analytics for Data-Driven Energy Modeling", "doi": null, "abstractUrl": "/proceedings-article/trex/2020/851400a016/1pXm2UrVXMc", "parentPublication": { "id": "proceedings/trex/2020/8514/0", "title": "2020 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a368", "title": "A Characterization of Data Exchange between Visual Analytics Tools", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a368/1rSRaA2LJBK", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a045", "title": "A Case Study of Using Analytic Provenance to Reconstruct User Trust in a Guided Visual Analytics System", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a045/1yQB6KjO9oI", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a014", "title": "Making and Trusting Decisions in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a014/1yQB6h3HL6o", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qRNrlo577W", "title": "2020 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qROrjfqgSI", "doi": "10.1109/VIS47514.2020.00023", "title": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "normalizedTitle": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "abstract": "Ambiguity, an information state where multiple interpretations are plausible, is a common challenge in visual analytics (VA) systems. We discuss lessons learned from a case study designing VA tools for Canadian avalanche forecasters. Avalanche forecasting is a complex and collaborative risk-based decision-making and analysis domain, demanding experience and knowledge-based interpretation of human reported and uncertain data. Differences in reporting practices, organizational contexts, and the particularities of individual reports result in a variety of potential interpretations that have to be negotiated as part of the forecaster's sensemaking processes. We describe our preliminary research using glyphs to support sensemaking under ambiguity. Ambiguity is not unique to public avalanche forecasting. There are many other domains where the way data are measured and reported vary in ways not accounted explicitly in the data and require analysts to negotiate multiple potential meanings. We argue that ambiguity is under-served by visualization research and would benefit from more explicit VA support.", "abstracts": [ { "abstractType": "Regular", "content": "Ambiguity, an information state where multiple interpretations are plausible, is a common challenge in visual analytics (VA) systems. We discuss lessons learned from a case study designing VA tools for Canadian avalanche forecasters. Avalanche forecasting is a complex and collaborative risk-based decision-making and analysis domain, demanding experience and knowledge-based interpretation of human reported and uncertain data. Differences in reporting practices, organizational contexts, and the particularities of individual reports result in a variety of potential interpretations that have to be negotiated as part of the forecaster's sensemaking processes. We describe our preliminary research using glyphs to support sensemaking under ambiguity. Ambiguity is not unique to public avalanche forecasting. There are many other domains where the way data are measured and reported vary in ways not accounted explicitly in the data and require analysts to negotiate multiple potential meanings. We argue that ambiguity is under-served by visualization research and would benefit from more explicit VA support.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ambiguity, an information state where multiple interpretations are plausible, is a common challenge in visual analytics (VA) systems. We discuss lessons learned from a case study designing VA tools for Canadian avalanche forecasters. Avalanche forecasting is a complex and collaborative risk-based decision-making and analysis domain, demanding experience and knowledge-based interpretation of human reported and uncertain data. Differences in reporting practices, organizational contexts, and the particularities of individual reports result in a variety of potential interpretations that have to be negotiated as part of the forecaster's sensemaking processes. We describe our preliminary research using glyphs to support sensemaking under ambiguity. Ambiguity is not unique to public avalanche forecasting. There are many other domains where the way data are measured and reported vary in ways not accounted explicitly in the data and require analysts to negotiate multiple potential meanings. We argue that ambiguity is under-served by visualization research and would benefit from more explicit VA support.", "fno": "801400a081", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Making", "Knowledge Based Systems", "Risk Management", "VA Tools", "Canadian Avalanche Forecasters", "Complex Risk Based Decision Making", "Collaborative Risk Based Decision Making", "Knowledge Based Interpretation", "Uncertain Data", "Visualization Research", "Visual Analytics Systems", "Navigation", "Visual Analytics", "Knowledge Based Systems", "Data Visualization", "Collaboration", "Tools", "Forecasting", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Visual Analytics" ], "authors": [ { "affiliation": "Simon Fraser University", "fullName": "Stan Nowak", "givenName": "Stan", "surname": "Nowak", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Lyn Bartram", "givenName": "Lyn", "surname": "Bartram", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Pascal Haegeli", "givenName": "Pascal", "surname": "Haegeli", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "81-85", "year": "2020", "issn": null, "isbn": "978-1-7281-8014-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "801400a076", "articleId": "1qRO7PRLI4w", "__typename": "AdjacentArticleType" }, "next": { "fno": "801400a086", "articleId": "1qRO91uGLU4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367b138", "title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031598", "title": "Aeonium: Visual analytics to support collaborative qualitative coding", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031598/12OmNvwTGDl", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040026", "title": "A Graph Algebra for Scalable Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040026/13rRUILLkpN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/12/ttg2013122207", "title": "The Impact of Physical Navigation on Spatial Organization for Sensemaking", "doi": null, "abstractUrl": "/journal/tg/2013/12/ttg2013122207/13rRUwI5TQZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/02/mcg2015020016", "title": "Preparing Undergraduates for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/02/mcg2015020016/13rRUxjQyjN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2020/8514/0/851400a009", "title": "Beyond Trust Building &#x2014; Calibrating Trust in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2020/851400a009/1pXm2QUw2ek", "parentPublication": { "id": "proceedings/trex/2020/8514/0", "title": "2020 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a368", "title": "A Characterization of Data Exchange between Visual Analytics Tools", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a368/1rSRaA2LJBK", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rSR7vfukX6", "title": "2020 24th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rSRaA2LJBK", "doi": "10.1109/IV51561.2020.00066", "title": "A Characterization of Data Exchange between Visual Analytics Tools", "normalizedTitle": "A Characterization of Data Exchange between Visual Analytics Tools", "abstract": "Over the past years, the visualization of large and complex data sets brought up various Visual Analytics (VA) tools in order to solve domain-specific tasks. These VA tools are typically implemented as individual software components in data-flow-oriented models, meaning that data is transferred from one component to the next. While most VA frameworks rely on a monolithic architecture with features for the integration of specialized analysis methods, we consider a loose coupling of independent applications, where autonomous VA tools are used in predefined analysis sequences. To this end, we provide a characterization of the data exchange process among individual VA tools in the form of a taxonomy. This taxonomy can be used as a checklist to identify characteristics and improve the data flow of one's own multi-tool VA setup. For this purpose, we conducted a systematic investigation of the individual aspects of data exchange that are commonly found across different usage scenarios. We apply our taxonomy to three existing multi-tool frameworks, the open-source library ReVize, the toolchain editor AnyProc, and the visualization and monitoring framework Plant@Hand3D.", "abstracts": [ { "abstractType": "Regular", "content": "Over the past years, the visualization of large and complex data sets brought up various Visual Analytics (VA) tools in order to solve domain-specific tasks. These VA tools are typically implemented as individual software components in data-flow-oriented models, meaning that data is transferred from one component to the next. While most VA frameworks rely on a monolithic architecture with features for the integration of specialized analysis methods, we consider a loose coupling of independent applications, where autonomous VA tools are used in predefined analysis sequences. To this end, we provide a characterization of the data exchange process among individual VA tools in the form of a taxonomy. This taxonomy can be used as a checklist to identify characteristics and improve the data flow of one's own multi-tool VA setup. For this purpose, we conducted a systematic investigation of the individual aspects of data exchange that are commonly found across different usage scenarios. We apply our taxonomy to three existing multi-tool frameworks, the open-source library ReVize, the toolchain editor AnyProc, and the visualization and monitoring framework Plant@Hand3D.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Over the past years, the visualization of large and complex data sets brought up various Visual Analytics (VA) tools in order to solve domain-specific tasks. These VA tools are typically implemented as individual software components in data-flow-oriented models, meaning that data is transferred from one component to the next. While most VA frameworks rely on a monolithic architecture with features for the integration of specialized analysis methods, we consider a loose coupling of independent applications, where autonomous VA tools are used in predefined analysis sequences. To this end, we provide a characterization of the data exchange process among individual VA tools in the form of a taxonomy. This taxonomy can be used as a checklist to identify characteristics and improve the data flow of one's own multi-tool VA setup. For this purpose, we conducted a systematic investigation of the individual aspects of data exchange that are commonly found across different usage scenarios. We apply our taxonomy to three existing multi-tool frameworks, the open-source library ReVize, the toolchain editor AnyProc, and the visualization and monitoring framework Plant@Hand3D.", "fno": "913400a368", "keywords": [ "Data Analysis", "Data Flow Analysis", "Data Visualisation", "Electronic Data Interchange", "Interactive Systems", "Object Oriented Programming", "Data Flow", "Multitool VA Setup", "Individual Aspects", "Taxonomy", "Complex Data Sets", "Visual Analytics Tools", "Domain Specific Tasks", "Individual Software Components", "Data Flow Oriented Models", "VA Frameworks", "Monolithic Architecture", "Specialized Analysis Methods", "Autonomous VA Tools", "Predefined Analysis Sequences", "Data Exchange Process", "Individual VA Tools", "Multitool Frameworks", "Large Data Visualization", "Systematics", "Visual Analytics", "Taxonomy", "Data Visualization", "Tools", "Data Models", "Task Analysis", "Data Analysis", "Visual Analytics", "Data Exchange" ], "authors": [ { "affiliation": "University of Rostock,Institute of Visual and Analytic Computing,Rostock,Germany", "fullName": "Lars Nonnemann", "givenName": "Lars", "surname": "Nonnemann", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Rostock,Institute of Visual and Analytic Computing,Rostock,Germany", "fullName": "Heidrun Schumann", "givenName": "Heidrun", "surname": "Schumann", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Rostock,Institute of Visual and Analytic Computing,Rostock,Germany", "fullName": "Bodo Urban", "givenName": "Bodo", "surname": "Urban", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer Institute for Computer Graphics Research,Competence Center for Visual Assistance Technologies,Rostock,Germany", "fullName": "Mario Aehnelt", "givenName": "Mario", "surname": "Aehnelt", "__typename": "ArticleAuthorType" }, { "affiliation": "Aarhus University,Department of Computer Science,Aarhus,Denmark", "fullName": "Hans-Jörg Schulz", "givenName": "Hans-Jörg", "surname": "Schulz", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "368-377", "year": "2020", "issn": null, "isbn": "978-1-7281-9134-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "913400a360", "articleId": "1rSRdbyf9bG", "__typename": "AdjacentArticleType" }, "next": { "fno": "913400a378", "articleId": "1rSRa9dXxDO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367b138", "title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040026", "title": "A Graph Algebra for Scalable Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040026/13rRUILLkpN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534883", "title": "Characterizing Guidance in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534883/13rRUxBa568", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06908006", "title": "Personal Visualization and Personal Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09745848", "title": "A Model for Types and Levels of Automation in Visual Analytics: a Survey, a Taxonomy, and Examples", "doi": null, "abstractUrl": "/journal/tg/5555/01/09745848/1CbVnSejsjK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805439", "title": "The Validity, Generalizability and Feasibility of Summative Evaluation Methods in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805439/1cG4DVd6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a081", "title": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a081/1qROrjfqgSI", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgX9", "title": "2016 IEEE/ACM 1st International Workshop on Metamorphic Testing (MET)", "acronym": "met", "groupId": "1817204", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvRU0nk", "doi": "10.1109/MET.2016.014", "title": "A Cloud-Based Framework for Applying Metamorphic Testing to a Bioinformatics Pipeline", "normalizedTitle": "A Cloud-Based Framework for Applying Metamorphic Testing to a Bioinformatics Pipeline", "abstract": "Testing of bioinformatics software often suffers from the oracle problem, especially when testing software that analyses human genome sequencing data. Metamorphic testing has been proposed to alleviate the oracle problem. Nonetheless, smaller research or clinical centres may be challenged by the complexity and resources required to implement a suitable metamorphic testing framework in practice. This paper presents a case study on how a cloud-based metamorphic testing framework can be applied to a widely used genomic sequencing pipeline, and discusses the future of implementing large-scale on-demand automated metamorphic testing using cloud-based resources.", "abstracts": [ { "abstractType": "Regular", "content": "Testing of bioinformatics software often suffers from the oracle problem, especially when testing software that analyses human genome sequencing data. Metamorphic testing has been proposed to alleviate the oracle problem. Nonetheless, smaller research or clinical centres may be challenged by the complexity and resources required to implement a suitable metamorphic testing framework in practice. This paper presents a case study on how a cloud-based metamorphic testing framework can be applied to a widely used genomic sequencing pipeline, and discusses the future of implementing large-scale on-demand automated metamorphic testing using cloud-based resources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Testing of bioinformatics software often suffers from the oracle problem, especially when testing software that analyses human genome sequencing data. Metamorphic testing has been proposed to alleviate the oracle problem. Nonetheless, smaller research or clinical centres may be challenged by the complexity and resources required to implement a suitable metamorphic testing framework in practice. This paper presents a case study on how a cloud-based metamorphic testing framework can be applied to a widely used genomic sequencing pipeline, and discusses the future of implementing large-scale on-demand automated metamorphic testing using cloud-based resources.", "fno": "4163a033", "keywords": [ "Bioinformatics", "Pipelines", "Genomics", "Testing", "Cloud Computing", "Australia", "Bioinformatics", "Metamorphic Testing", "Cloud Computing" ], "authors": [ { "affiliation": null, "fullName": "Michael Troup", "givenName": "Michael", "surname": "Troup", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrian Yang", "givenName": "Andrian", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Amir Hossein Kamali", "givenName": "Amir Hossein", "surname": "Kamali", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eleni Giannoulatou", "givenName": "Eleni", "surname": "Giannoulatou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tsong Yueh Chen", "givenName": "Tsong Yueh", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Joshua W. K. Ho", "givenName": "Joshua W. K.", "surname": "Ho", "__typename": "ArticleAuthorType" } ], "idPrefix": "met", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "33-36", "year": "2016", "issn": null, "isbn": "978-1-4503-4163-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4163a026", "articleId": "12OmNAoUTrx", "__typename": "AdjacentArticleType" }, "next": { "fno": "4163a037", "articleId": "12OmNrH1PCj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wcse/2013/2882/0/06754266", "title": "Achievements and Challenges of Metamorphic Testing", "doi": null, "abstractUrl": "/proceedings-article/wcse/2013/06754266/12OmNBV9Ieh", "parentPublication": { "id": "proceedings/wcse/2013/2882/0", "title": "2013 Fourth World Congress on Software Engineering (WCSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/step/2003/2218/0/22180094", "title": "Metamorphic Testing and Beyond", "doi": null, "abstractUrl": "/proceedings-article/step/2003/22180094/12OmNBVrjpf", "parentPublication": { "id": "proceedings/step/2003/2218/0", "title": "Proceedings. Eleventh Annual International Workshop on Software Technology and Engineering Practice (STEP 2003)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/met/2016/4163/0/4163a037", "title": "An Application of Metamorphic Testing for Testing Scientific Software", "doi": null, "abstractUrl": "/proceedings-article/met/2016/4163a037/12OmNrH1PCj", "parentPublication": { "id": "proceedings/met/2016/4163/0", "title": "2016 IEEE/ACM 1st International Workshop on Metamorphic Testing (MET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/se4science/2016/4167/0/4167a016", "title": "Experiences of Testing Bioinformatics Programs for Detecting Subtle Faults", "doi": null, "abstractUrl": "/proceedings-article/se4science/2016/4167a016/12OmNvsm6xr", "parentPublication": { "id": "proceedings/se4science/2016/4167/0", "title": "2016 IEEE/ACM International Workshop on Software Engineering for Science (SE4Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2010/4081/0/4081a001", "title": "Metamorphic Testing: A Simple Approach to Alleviate the Oracle Problem", "doi": null, "abstractUrl": "/proceedings-article/sose/2010/4081a001/12OmNzdoN4h", "parentPublication": { "id": "proceedings/sose/2010/4081/0", "title": "2010 Fifth IEEE International Symposium on Service Oriented System Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2014/01/06613484", "title": "How Effectively Does Metamorphic Testing Alleviate the Oracle Problem?", "doi": null, "abstractUrl": "/journal/ts/2014/01/06613484/13rRUNvya2K", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/06/mco2016060048", "title": "Metamorphic Testing for Cybersecurity", "doi": null, "abstractUrl": "/magazine/co/2016/06/mco2016060048/13rRUwbs1VW", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2016/09/07422146", "title": "A Survey on Metamorphic Testing", "doi": null, "abstractUrl": "/journal/ts/2016/09/07422146/13rRUx0gewQ", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/met/2018/5729/0/572901a026", "title": "Quality Assurance of Bioinformatics Software: A Case Study of Testing a Biomedical Text Processing Tool Using Metamorphic Testing", "doi": null, "abstractUrl": "/proceedings-article/met/2018/572901a026/13xI8JoTtXN", "parentPublication": { "id": "proceedings/met/2018/5729/0", "title": "2018 IEEE/ACM 3rd International Workshop on Metamorphic Testing (MET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/met/2021/4464/0/446400a024", "title": "Applying Metamorphic Testing to Homomorphic Cryptography", "doi": null, "abstractUrl": "/proceedings-article/met/2021/446400a024/1vb9yNTNnsk", "parentPublication": { "id": "proceedings/met/2021/4464/0", "title": "2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBC8AAL", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwp74yX", "doi": "10.1109/BIBE.2017.00-70", "title": "Extracting the Co-occurrences of DNA Maximal Repeats in both Human and Viruses", "normalizedTitle": "Extracting the Co-occurrences of DNA Maximal Repeats in both Human and Viruses", "abstract": "This paper aims to extract significant DNA sequences appearing in both the genomes of human and viruses. To extract the co-occurrences of DNA sequences as long as possible, this study adopts a scalable approach that is based on hadoop mapreduce programming model and can extract maximal repeats; meanwhile compute the class frequency distribution of these repeats. The genomes of human and all of 4,388 viruses available in NCBI are downloaded at 2017/1/14. To take the taxonomy of viruses into consideration for further observation, only the 2,712 viruses that had been named with genus are selected from those 4,388 viruses. In this study, the taxonomic level “genus” is as the units (classes) when comparing viruses and human for experiments. Experimental results show that the longest DNA sequence appearing in both human and viruses extracted in this study is 463 base pair (bp), and that sequence, consisting of tandem repeats as “(CTAACC)n”, appears in the 5th human chromosome and virus “Human herpesvirus 6B”. It may be attractive for virologists to have further research why there exists such a long DNA fragment existed in both human and that virus. Indeed, this study may provide a new direction for genomic sequences comparison across classesthat can provide clues to inspect the existence of the relationship between these DNA maximal repeats (genotypes) with biased class frequency distribution and the features of classes (phenotypes).", "abstracts": [ { "abstractType": "Regular", "content": "This paper aims to extract significant DNA sequences appearing in both the genomes of human and viruses. To extract the co-occurrences of DNA sequences as long as possible, this study adopts a scalable approach that is based on hadoop mapreduce programming model and can extract maximal repeats; meanwhile compute the class frequency distribution of these repeats. The genomes of human and all of 4,388 viruses available in NCBI are downloaded at 2017/1/14. To take the taxonomy of viruses into consideration for further observation, only the 2,712 viruses that had been named with genus are selected from those 4,388 viruses. In this study, the taxonomic level “genus” is as the units (classes) when comparing viruses and human for experiments. Experimental results show that the longest DNA sequence appearing in both human and viruses extracted in this study is 463 base pair (bp), and that sequence, consisting of tandem repeats as “(CTAACC)n”, appears in the 5th human chromosome and virus “Human herpesvirus 6B”. It may be attractive for virologists to have further research why there exists such a long DNA fragment existed in both human and that virus. Indeed, this study may provide a new direction for genomic sequences comparison across classesthat can provide clues to inspect the existence of the relationship between these DNA maximal repeats (genotypes) with biased class frequency distribution and the features of classes (phenotypes).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper aims to extract significant DNA sequences appearing in both the genomes of human and viruses. To extract the co-occurrences of DNA sequences as long as possible, this study adopts a scalable approach that is based on hadoop mapreduce programming model and can extract maximal repeats; meanwhile compute the class frequency distribution of these repeats. The genomes of human and all of 4,388 viruses available in NCBI are downloaded at 2017/1/14. To take the taxonomy of viruses into consideration for further observation, only the 2,712 viruses that had been named with genus are selected from those 4,388 viruses. In this study, the taxonomic level “genus” is as the units (classes) when comparing viruses and human for experiments. Experimental results show that the longest DNA sequence appearing in both human and viruses extracted in this study is 463 base pair (bp), and that sequence, consisting of tandem repeats as “(CTAACC)n”, appears in the 5th human chromosome and virus “Human herpesvirus 6B”. It may be attractive for virologists to have further research why there exists such a long DNA fragment existed in both human and that virus. Indeed, this study may provide a new direction for genomic sequences comparison across classesthat can provide clues to inspect the existence of the relationship between these DNA maximal repeats (genotypes) with biased class frequency distribution and the features of classes (phenotypes).", "fno": "132401a106", "keywords": [ "DNA", "Genomics", "Medical Computing", "Microorganisms", "Molecular Biophysics", "DNA Maximal Repeats", "Human Viruses", "Hadoop Mapreduce Programming Model", "Human Chromosome", "Long DNA Fragment", "DNA Sequences", "Human Genomes", "Genomic Sequences", "DNA Cooccurrences", "Class Frequency Distribution", "Human Herpesvirus 6 B", "Viruses Medical", "DNA", "Genomics", "Bioinformatics", "Biological Cells", "Programming", "Electronic Mail", "Maximal Repeats", "DNA", "Virus", "Hadoop Mapreduce", "Genomic Sequence" ], "authors": [ { "affiliation": null, "fullName": "Jing-Doo Wang Wang", "givenName": "Jing-Doo Wang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi-Chun Wang", "givenName": "Yi-Chun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rouh-Mei Hu", "givenName": "Rouh-Mei", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jeffrey J.P. Tsai", "givenName": "Jeffrey J.P.", "surname": "Tsai", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "106-111", "year": "2017", "issn": "2471-7819", "isbn": "978-1-5386-1324-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "132401a101", "articleId": "12OmNqH9hmc", "__typename": "AdjacentArticleType" }, "next": { "fno": "132401a112", "articleId": "12OmNx19k3Z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2012/4925/0/4925a064", "title": "Clustering Tandem Repeats via Trinucleotides", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a064/12OmNqFa5ph", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/5/01327144", "title": "Techniques for detecting approximate tandem repeats in DNA", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01327144/12OmNwbLVri", "parentPublication": { "id": "proceedings/icassp/2004/8484/5", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999134", "title": "DExTaR: Detection of exact tandem repeats based on the de Bruijn graph", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999134/12OmNx4yvtx", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703942", "title": "System for random access DNA sequence compression", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703942/12OmNy6qfPi", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217700", "title": "Efficient GPU-accelerated extraction of imperfect inverted repeats from DNA sequences", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217700/12OmNylKB51", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2010/02/ttb2010020288", "title": "Reassortment Networks for Investigating the Evolution of Segmented Viruses", "doi": null, "abstractUrl": "/journal/tb/2010/02/ttb2010020288/13rRUNvgz2u", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a010", "title": "Constructing the Relationship Tree of All Viruses via Whole Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a010/17D45Vw15tg", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001825", "title": "Haar wavelet based approach for Short Tandem Repeats(STR) Detection", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001825/1hHMkgECaY0", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a089", "title": "Efficient Search of Circular Repeats and MicroDNA Reintegration in DNA Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a089/1pBMr8kqJBC", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/03/09335267", "title": "Detection of Tandem Repeats in DNA Sequences Using Short-Time Ramanujan Fourier Transform", "doi": null, "abstractUrl": "/journal/tb/2022/03/09335267/1qG68EKEqNq", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDSdOB", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNwvDQrT", "doi": "10.1109/BIBM.2010.5706629", "title": "An automatic procedure to search highly repetitive sequences in genome as fluorescence in situ hybridization probes and its application on Brachypodium distachyon", "normalizedTitle": "An automatic procedure to search highly repetitive sequences in genome as fluorescence in situ hybridization probes and its application on Brachypodium distachyon", "abstract": "Fluorescence in situ hybridization (FISH) is a powerful technique that localizes specific DNA sequences on chromosomes for use in physical and genetic maps assembling, genetic counselling, species identification, etc. Highly repetitive sequences are considered to be suitable FISH probes that can avoid many potential problems of using unique sequences as FISH probes. The distinct chromosomal distributions of these highly repetitive sequences are also ideal for labelling purposes such as karyotyping. In this paper, we present an automatic computational procedure for searching highly repetitive sequences from a whole genome as FISH probes, as well as an experimental protocol to use them in FISH analysis. We successfully applied the method on the newly released genome of Brachypodium distachyon (Brachypodium) and produced satisfactory results of FISH experiment.", "abstracts": [ { "abstractType": "Regular", "content": "Fluorescence in situ hybridization (FISH) is a powerful technique that localizes specific DNA sequences on chromosomes for use in physical and genetic maps assembling, genetic counselling, species identification, etc. Highly repetitive sequences are considered to be suitable FISH probes that can avoid many potential problems of using unique sequences as FISH probes. The distinct chromosomal distributions of these highly repetitive sequences are also ideal for labelling purposes such as karyotyping. In this paper, we present an automatic computational procedure for searching highly repetitive sequences from a whole genome as FISH probes, as well as an experimental protocol to use them in FISH analysis. We successfully applied the method on the newly released genome of Brachypodium distachyon (Brachypodium) and produced satisfactory results of FISH experiment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fluorescence in situ hybridization (FISH) is a powerful technique that localizes specific DNA sequences on chromosomes for use in physical and genetic maps assembling, genetic counselling, species identification, etc. Highly repetitive sequences are considered to be suitable FISH probes that can avoid many potential problems of using unique sequences as FISH probes. The distinct chromosomal distributions of these highly repetitive sequences are also ideal for labelling purposes such as karyotyping. In this paper, we present an automatic computational procedure for searching highly repetitive sequences from a whole genome as FISH probes, as well as an experimental protocol to use them in FISH analysis. We successfully applied the method on the newly released genome of Brachypodium distachyon (Brachypodium) and produced satisfactory results of FISH experiment.", "fno": "05706629", "keywords": [ "Bioinformatics", "DNA", "Fluorescence", "Genetics", "Genomics", "Molecular Biophysics", "Highly Repetitive Sequences", "Genome", "Fluorescence In Situ Hybridization Probes", "Brachypodium Distachyon", "Specific DNA Sequence Localization", "Genetic Maps Assembling", "Genetic Counselling", "Species Identification", "FISH Analysis", "Biological Cells", "Bioinformatics", "Probes", "Marine Animals", "Genomics", "DNA", "Repetitive Sequence", "Fluorescence In Situ Hybridization", "Karyotyping", "Chromosome Painting", "Dot Plots" ], "authors": [ { "affiliation": "Department of Information Engineering, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Qiwei Li", "givenName": "Qiwei", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Information Engineering, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Tong Liang", "givenName": "Tong", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Statistics, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Xiaodan Fan", "givenName": "Xiaodan", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Chunhui Xu", "givenName": "Chunhui", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Biology, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Weichang Yu", "givenName": "Weichang", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Information Engineering, Institute of Plant Molecular Biology and Agricultural Biotechnology, State (China) Key Laboratory for Agrobiotechnology The Chinese University of Hong Kong, Sha Tin, New Territories, Hong Kong", "fullName": "Shuo-Yen Robert Li", "givenName": "Shuo-Yen Robert", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "563-568", "year": "2010", "issn": null, "isbn": "978-1-4244-8306-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05706628", "articleId": "12OmNxd4tt5", "__typename": "AdjacentArticleType" }, "next": { "fno": "05706630", "articleId": "12OmNrJ11Ar", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/biomedcom/2012/4938/0/4938a006", "title": "Affymetrix® Mismatch (MM) Probes: Useful after All", "doi": null, "abstractUrl": "/proceedings-article/biomedcom/2012/4938a006/12OmNCdk2JS", "parentPublication": { "id": "proceedings/biomedcom/2012/4938/0", "title": "ASE/IEEE International Conference on BioMedical Computing (BioMedCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2017/2387/0/2387a009", "title": "Reliable Inspection of an Autonomous System At System Runtime with Built-in Data Probes", "doi": null, "abstractUrl": "/proceedings-article/issrew/2017/2387a009/12OmNwHhoZy", "parentPublication": { "id": "proceedings/issrew/2017/2387/0", "title": "2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2013/3163/0/06701582", "title": "Fast search of locally repetitive elements based on auto-correlation property in genome", "doi": null, "abstractUrl": "/proceedings-article/bibe/2013/06701582/12OmNwJgAJS", "parentPublication": { "id": "proceedings/bibe/2013/3163/0", "title": "2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732763", "title": "Mining repetitive sequences using a big data ecosystem", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732763/12OmNxG1yP6", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biotechno/2008/3191/0/3191a137", "title": "Design of Microarray Probes for Detection of Mutations", "doi": null, "abstractUrl": "/proceedings-article/biotechno/2008/3191a137/12OmNxWcHm2", "parentPublication": { "id": "proceedings/biotechno/2008/3191/0", "title": "International Conference on Biocomputation, Bioinformatics, and Biomedical Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703789", "title": "A hybridization model for tiling array analysis", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703789/12OmNyPQ4Nu", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2007/2875/2/28750253", "title": "A Mutual Information Based Sequence Distance For Vertebrate Phylogeny Using Complete Mitochondrial Genomes", "doi": null, "abstractUrl": "/proceedings-article/icnc/2007/28750253/12OmNzaQo8L", "parentPublication": { "id": "proceedings/icnc/2007/2875/2", "title": "Third International Conference on Natural Computation (ICNC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999201", "title": "MRSMRS: Mining repetitive sequences in a MapReduce setting", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999201/12OmNzsJ7jX", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/06/ttb2011061642", "title": "Selecting Oligonucleotide Probes for Whole-Genome Tiling Arrays with a Cross-Hybridization Potential", "doi": null, "abstractUrl": "/journal/tb/2011/06/ttb2011061642/13rRUyhaIn9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a089", "title": "Efficient Search of Circular Repeats and MicroDNA Reintegration in DNA Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a089/1pBMr8kqJBC", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNy9PrkZ", "doi": "10.1109/BIBM.2017.8217628", "title": "DiCE: Discovery of conserved noncoding sequences efficiently", "normalizedTitle": "DiCE: Discovery of conserved noncoding sequences efficiently", "abstract": "Identification of the conserved non-coding sequences (CNSs) for plants is a challenging problem because the plants have small CNSs compared to animals. The existing alignment based methods are neither efficient nor sensitive to smaller CNSs when the number of species is large. In this paper, we propose an alignment-free approach that can process any number sequences simultaneously. Our approach uses maximal repeats extracted from generalized suffix tree of the sequences and discovers both exactly matched CNSs as well as CNSs with a given mismatch rate. The experimental results with 17, 996 syntenic genes of six grass species shows that our approach is more efficient than existing approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Identification of the conserved non-coding sequences (CNSs) for plants is a challenging problem because the plants have small CNSs compared to animals. The existing alignment based methods are neither efficient nor sensitive to smaller CNSs when the number of species is large. In this paper, we propose an alignment-free approach that can process any number sequences simultaneously. Our approach uses maximal repeats extracted from generalized suffix tree of the sequences and discovers both exactly matched CNSs as well as CNSs with a given mismatch rate. The experimental results with 17, 996 syntenic genes of six grass species shows that our approach is more efficient than existing approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Identification of the conserved non-coding sequences (CNSs) for plants is a challenging problem because the plants have small CNSs compared to animals. The existing alignment based methods are neither efficient nor sensitive to smaller CNSs when the number of species is large. In this paper, we propose an alignment-free approach that can process any number sequences simultaneously. Our approach uses maximal repeats extracted from generalized suffix tree of the sequences and discovers both exactly matched CNSs as well as CNSs with a given mismatch rate. The experimental results with 17, 996 syntenic genes of six grass species shows that our approach is more efficient than existing approaches.", "fno": "08217628", "keywords": [ "Micromechanical Devices", "Vegetation", "Bioinformatics", "Genomics", "Algorithm Design And Analysis", "Animals", "Software Algorithms", "CNS", "Suffix Tree", "DAG", "MEM" ], "authors": [ { "affiliation": "Department of Computer Science, University of Nebraska-Lincoln", "fullName": "Sairam Behera", "givenName": "Sairam", "surname": "Behera", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Agronomy and Horticulture, University of Nebraska-Lincoln", "fullName": "Xianjun Li", "givenName": "Xianjun", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Agronomy and Horticulture, University of Nebraska-Lincoln", "fullName": "James Schnable", "givenName": "James", "surname": "Schnable", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Nebraska-Lincoln", "fullName": "Jitender S. Deogun", "givenName": "Jitender S.", "surname": "Deogun", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "79-82", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217627", "articleId": "12OmNxEBz8E", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217629", "articleId": "12OmNxFsmL3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2007/1509/0/04375677", "title": "An Intelligent System for Searching Genomic Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375677/12OmNqzcvA4", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703803", "title": "CORAL-M: Heuristic coding region alignment method for multiple genome sequences", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703803/12OmNvD8Ryi", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cits/2012/1550/0/06220382", "title": "Evaluating graphical and statistical techniques for measuring similarity in DNA sequences", "doi": null, "abstractUrl": "/proceedings-article/cits/2012/06220382/12OmNvjQ8Kh", "parentPublication": { "id": "proceedings/cits/2012/1550/0", "title": "2012 International Conference on Computer, Information and Telecommunication Systems (CITS 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706629", "title": "An automatic procedure to search highly repetitive sequences in genome as fluorescence in situ hybridization probes and its application on Brachypodium distachyon", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706629/12OmNwvDQrT", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/biotechno/2008/3191/0/3191a159", "title": "Studying the Evolution of Codon Context in Conserved Gene Sequences", "doi": null, "abstractUrl": "/proceedings-article/biotechno/2008/3191a159/12OmNxiKrZr", "parentPublication": { "id": "proceedings/biotechno/2008/3191/0", "title": "International Conference on Biocomputation, Bioinformatics, and Biomedical Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cits/2012/1550/0/06220383", "title": "Evaluating graphical and statistical techniques for measuring similarity in DNA sequences", "doi": null, "abstractUrl": "/proceedings-article/cits/2012/06220383/12OmNzYwbZ0", "parentPublication": { "id": "proceedings/cits/2012/1550/0", "title": "2012 International Conference on Computer, Information and Telecommunication Systems (CITS 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470216", "title": "A novel quasi-alignment-based method for discovering conserved regions in genetic sequences", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470216/12OmNzaQo8A", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999201", "title": "MRSMRS: Mining repetitive sequences in a MapReduce setting", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999201/12OmNzsJ7jX", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539391", "title": "Synteny Explorer: An Interactive Visualization Application for Teaching Genome Evolution", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539391/13rRUxASuAy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09656638", "title": "CD-MAWS: An Alignment-Free Phylogeny Estimation Method Using Cosine Distance on Minimal Absent Word Sets", "doi": null, "abstractUrl": "/journal/tb/2023/01/09656638/1zumjpdd5Zu", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyRg4m8", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "acronym": "bibmw", "groupId": "1001585", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzd7bvk", "doi": "10.1109/BIBMW.2010.5703864", "title": "BindSDb: A binding-information spatial database", "normalizedTitle": "BindSDb: A binding-information spatial database", "abstract": "We have developed a database that stores experimental binding data and predicted transcription factor binding sites. All true and putative binding sites are stored in conjunction with the latest assembly of the human genome in a spatial database that answers user-input queries about topological relationships between the genes, binding sites and transcription factors.", "abstracts": [ { "abstractType": "Regular", "content": "We have developed a database that stores experimental binding data and predicted transcription factor binding sites. All true and putative binding sites are stored in conjunction with the latest assembly of the human genome in a spatial database that answers user-input queries about topological relationships between the genes, binding sites and transcription factors.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have developed a database that stores experimental binding data and predicted transcription factor binding sites. All true and putative binding sites are stored in conjunction with the latest assembly of the human genome in a spatial database that answers user-input queries about topological relationships between the genes, binding sites and transcription factors.", "fno": "05703864", "keywords": [ "Bioinformatics", "Genetics", "Genomics", "Topology", "Visual Databases", "Binding Information Spatial Database", "Binding Data", "Transcription Factor Binding Sites", "Putative Binding Sites", "Human Genome", "User Input Queries", "Topological Relationships", "Genes", "Bind S Db", "Bioinformatics", "Genomics", "Biological Cells", "Spatial Databases", "DNA", "Geometry", "Spatial Database", "Genomic Data", "Binding Data", "Prediction Of Transcription Factor Binding Sites", "Topological Queries" ], "authors": [ { "affiliation": "Department of Bioengineering, University of Illinois at Chicago, USA", "fullName": "Damian Roqueiro", "givenName": "Damian", "surname": "Roqueiro", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Physiology and Biophysics, University of Illinois at Chicago, USA", "fullName": "Jonna Frasor", "givenName": "Jonna", "surname": "Frasor", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Bioengineering, University of Illinois at Chicago, USA", "fullName": "Yang Dai", "givenName": "Yang", "surname": "Dai", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "573-578", "year": "2010", "issn": null, "isbn": "978-1-4244-8303-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05703863", "articleId": "12OmNASraLG", "__typename": "AdjacentArticleType" }, "next": { "fno": "05703865", "articleId": "12OmNqAU6EK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2010/8306/0/05706592", "title": "Cis-regulatory module detection using constraint programming", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706592/12OmNyugyHE", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2009/5121/0/05332139", "title": "A graph algorithm for extracting features from transcription factor binding sites", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2009/05332139/12OmNyv7mlh", "parentPublication": { "id": "proceedings/bibmw/2009/5121/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120507", "title": "Visually Relating Gene Expression and in vivo DNA Binding Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120507/12OmNzCF4ST", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismse/2003/2031/0/01254457", "title": "Searching the regulatory protein binding site by steepest ascent algorithm", "doi": null, "abstractUrl": "/proceedings-article/ismse/2003/01254457/12OmNzahc5J", "parentPublication": { "id": "proceedings/ismse/2003/2031/0", "title": "Multimedia Software Engineering, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/04/07152849", "title": "REPA: Applying Pathway Analysis to Genome-Wide Transcription Factor Binding Data", "doi": null, "abstractUrl": "/journal/tb/2018/04/07152849/13rRUEgs2s1", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/05/ttb2013051340", "title": "Strategy for Naturelike Designer Transcription Factors with Reduced Toxicity", "doi": null, "abstractUrl": "/journal/tb/2013/05/ttb2013051340/13rRUwI5Ujk", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/05/07569028", "title": "Transfer String Kernel for Cross-Context DNA-Protein Binding Prediction", "doi": null, "abstractUrl": "/journal/tb/2019/05/07569028/13rRUwbs1Zk", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/04/07312946", "title": "Discovering Gene Regulatory Elements Using Coverage-Based Heuristics", "doi": null, "abstractUrl": "/journal/tb/2018/04/07312946/13rRUy0HYPN", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994984", "title": "DeepGenBind: a novel deep learning model for predicting transcription factor binding sites", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994984/1JC1NUQYhri", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccia/2021/3933/0/393300a031", "title": "CapBind: Prediction of Transcription Factor Binding Sites Based on Capsule Network", "doi": null, "abstractUrl": "/proceedings-article/iccia/2021/393300a031/1zpzNRUJr9K", "parentPublication": { "id": "proceedings/iccia/2021/3933/0", "title": "2021 6th International Conference on Computational Intelligence and Applications (ICCIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13l5NWGUV7i", "title": "2018 IEEE/ACM International Workshop on Software Engineering in Healthcare Systems (SEHS)", "acronym": "sehs", "groupId": "1817365", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13l5NWM1Hsp", "doi": null, "title": "Toward an Effective Medicine of Precision by Using Conceptual Modelling of the Genome", "normalizedTitle": "Toward an Effective Medicine of Precision by Using Conceptual Modelling of the Genome", "abstract": "The continuous improvement in our understanding of the human genome is leading to an increasing viable and effective Precision Medicine. Its intention is to provide a personalized solution to any individual health problem. Nevertheless, three main issues must be considered to make Precision Medicine a reality: i) the understanding of the huge amount of genomic data, spread out in hundreds of genome data sources, with different formats and contents, whose semantic interoperability is a must; ii) the development of information systems intended to guide the search of relevant genomic repositories related with a disease, the identification of significant information for its prevention, diagnosis and/or treatment and its management in an efficient software platform; iii) the high variability in the quality of the publicly available information. This paper presents a conceptual framework for solving these problems by i) using a precise conceptual schema of the human genome, and ii) introducing a method to search, identify, load and adequately interpret the required data, assuring its quality during the entire process.", "abstracts": [ { "abstractType": "Regular", "content": "The continuous improvement in our understanding of the human genome is leading to an increasing viable and effective Precision Medicine. Its intention is to provide a personalized solution to any individual health problem. Nevertheless, three main issues must be considered to make Precision Medicine a reality: i) the understanding of the huge amount of genomic data, spread out in hundreds of genome data sources, with different formats and contents, whose semantic interoperability is a must; ii) the development of information systems intended to guide the search of relevant genomic repositories related with a disease, the identification of significant information for its prevention, diagnosis and/or treatment and its management in an efficient software platform; iii) the high variability in the quality of the publicly available information. This paper presents a conceptual framework for solving these problems by i) using a precise conceptual schema of the human genome, and ii) introducing a method to search, identify, load and adequately interpret the required data, assuring its quality during the entire process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The continuous improvement in our understanding of the human genome is leading to an increasing viable and effective Precision Medicine. Its intention is to provide a personalized solution to any individual health problem. Nevertheless, three main issues must be considered to make Precision Medicine a reality: i) the understanding of the huge amount of genomic data, spread out in hundreds of genome data sources, with different formats and contents, whose semantic interoperability is a must; ii) the development of information systems intended to guide the search of relevant genomic repositories related with a disease, the identification of significant information for its prevention, diagnosis and/or treatment and its management in an efficient software platform; iii) the high variability in the quality of the publicly available information. This paper presents a conceptual framework for solving these problems by i) using a precise conceptual schema of the human genome, and ii) introducing a method to search, identify, load and adequately interpret the required data, assuring its quality during the entire process.", "fno": "573401a014", "keywords": [ "Biology Computing", "Diseases", "Genomics", "Medical Information Systems", "Open Systems", "Conceptual Modelling", "Individual Health Problem", "Genome Data Sources", "Semantic Interoperability", "Information Systems", "Precision Medicine", "Genomic Repositories", "Software Platform", "Genomics", "Bioinformatics", "Data Integrity", "Databases", "Data Models", "DNA", "Precision Medicine", "Conceptual Modelling", "Data Quality" ], "authors": [ { "affiliation": null, "fullName": "Ana León Palacio", "givenName": "Ana", "surname": "León Palacio", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Óscar Pastor López", "givenName": "Óscar", "surname": "Pastor López", "__typename": "ArticleAuthorType" } ], "idPrefix": "sehs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-05-01T00:00:00", "pubType": "proceedings", "pages": "14-17", "year": "2018", "issn": null, "isbn": "978-1-4503-5734-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "573401a010", "articleId": "13l5NX3CPwu", "__typename": "AdjacentArticleType" }, "next": { "fno": "573401a018", "articleId": "13l5NXF5SGS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2013/5096/0/5096b096", "title": "Towards Mining Frequent Patterns in Genome Wide Association", "doi": null, "abstractUrl": "/proceedings-article/cse/2013/5096b096/12OmNqG0T2w", "parentPublication": { "id": "proceedings/cse/2013/5096/0", "title": "2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2017/5533/0/07958619", "title": "Identifying Personal DNA Methylation Profiles by Genotype Inference", "doi": null, "abstractUrl": "/proceedings-article/sp/2017/07958619/12OmNvDqsBv", "parentPublication": { "id": "proceedings/sp/2017/5533/0", "title": "2017 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08218026", "title": "Enabling precision medicine with CancerKB and KBCommons informatics framework", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08218026/12OmNxQOjAr", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120408", "title": "Prediction of Trans-regulators of Recombination Hotspots in Mouse Genome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120408/12OmNxQOjxz", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmens/2004/2189/0/01509001", "title": "Nano-Biodevice for Genomic Drug Discovery and Genomic Medicine", "doi": null, "abstractUrl": "/proceedings-article/icmens/2004/01509001/12OmNxRWIbD", "parentPublication": { "id": "proceedings/icmens/2004/2189/0", "title": "International Conference on MEMS, NANO and Smart Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2015/3723/0/2807664", "title": "HipMer: an extreme-scale de novo genome assembler", "doi": null, "abstractUrl": "/proceedings-article/sc/2015/2807664/12OmNxymoaT", "parentPublication": { "id": "proceedings/sc/2015/3723/0", "title": "SC15: International Conference for High-Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2007/1509/0/04375743", "title": "GPX: A Tool for the Exploration and Visualization of Genome Evolution", "doi": null, "abstractUrl": "/proceedings-article/bibe/2007/04375743/12OmNy4IEVO", "parentPublication": { "id": "proceedings/bibe/2007/1509/0", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2015/02/mco2015020058", "title": "Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?", "doi": null, "abstractUrl": "/magazine/co/2015/02/mco2015020058/13rRUypp5bz", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2019/01/08410020", "title": "Optimal Binning for Genomics", "doi": null, "abstractUrl": "/journal/tc/2019/01/08410020/17D45VsBU46", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/massw/2019/4121/0/412100a013", "title": "Kin Genomic Data Inference Attacks Through Factor Graph", "doi": null, "abstractUrl": "/proceedings-article/massw/2019/412100a013/1iTvzOd0Leg", "parentPublication": { "id": "proceedings/massw/2019/4121/0", "title": "2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirJ", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "acronym": "e-science", "groupId": "1001511", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XeKgxZ", "doi": "10.1109/eScience.2018.00116", "title": "Nordic Exome Variant Catalogue a Web Resource for Genomic Data Browsing", "normalizedTitle": "Nordic Exome Variant Catalogue a Web Resource for Genomic Data Browsing", "abstract": "Nordic Exome Variant Catalogue is a web tool to browse human genomic aggregation data from Nordic cohorts. This allows viewing, querying, comparison, filtering and sorting the data in graphical user interface. The main end users are researchers and clinicians studying genetic variance in genes of interest.", "abstracts": [ { "abstractType": "Regular", "content": "Nordic Exome Variant Catalogue is a web tool to browse human genomic aggregation data from Nordic cohorts. This allows viewing, querying, comparison, filtering and sorting the data in graphical user interface. The main end users are researchers and clinicians studying genetic variance in genes of interest.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nordic Exome Variant Catalogue is a web tool to browse human genomic aggregation data from Nordic cohorts. This allows viewing, querying, comparison, filtering and sorting the data in graphical user interface. The main end users are researchers and clinicians studying genetic variance in genes of interest.", "fno": "915600a393", "keywords": [ "Bioinformatics", "Genetics", "Genomics", "Graphical User Interfaces", "Molecular Biophysics", "Online Front Ends", "Nordic Exome Variant Catalogue", "Web Resource", "Genomic Data Browsing", "Web Tool", "Browse Human Genomic Aggregation Data", "Nordic Cohorts", "Bioinformatics", "Genomics", "Sequential Analysis", "Databases", "Tools", "Biological Cells", "Gene", "Chromosome", "Cohort", "Snp", "Web Application", "Exon", "Allele Frequency", "Variation", "Population Genetics" ], "authors": [ { "affiliation": "Inst. for Mol. Med. Finland, Univ. of Helsinki, Helsinki, Finland", "fullName": "Timo Petteri Sipilä", "givenName": "Timo Petteri", "surname": "Sipilä", "__typename": "ArticleAuthorType" }, { "affiliation": "Estonian Genome Center, Univ. of Tartu, Tartu, Estonia", "fullName": "Andres Metspalu", "givenName": "Andres", "surname": "Metspalu", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Mol. Med. Finland, Univ. of Helsinki, Helsinki, Finland", "fullName": "Paavo Häppölä", "givenName": "Paavo", "surname": "Häppölä", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Mol. Med. Finland, Univ. of Helsinki, Helsinki, Finland", "fullName": "Priit Palta", "givenName": "Priit", "surname": "Palta", "__typename": "ArticleAuthorType" }, { "affiliation": "Estonian Genome Center, Univ. of Tartu, Tartu, Estonia", "fullName": "Mart Kals", "givenName": "Mart", "surname": "Kals", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. for Mol. Med. Finland, Univ. of Helsinki, Helsinki, Finland", "fullName": "Aarno Palotie", "givenName": "Aarno", "surname": "Palotie", "__typename": "ArticleAuthorType" } ], "idPrefix": "e-science", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "393-393", "year": "2018", "issn": null, "isbn": "978-1-5386-9156-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "915600a392", "articleId": "17D45XvMcbc", "__typename": "AdjacentArticleType" }, "next": { "fno": "915600a394", "articleId": "17D45XDIXSb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2016/3834/0/3834a390", "title": "Establish Reporting Format of Gene Related Rare-Diseases by Exome Sequencing in the Clinical Medical Laboratory", "doi": null, "abstractUrl": "/proceedings-article/bibe/2016/3834a390/12OmNCesr3F", "parentPublication": { "id": "proceedings/bibe/2016/3834/0", "title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2018/4975/0/497501a423", "title": "ParallNormal: An Efficient Variant Calling Pipeline for Unmatched Sequencing Data", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a423/12OmNvzJFUp", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363891", "title": "Genomic analysis with MapReduce", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363891/12OmNxTEiTm", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732619", "title": "Modeling exome sequencing data with generalized Gaussian distribution with application to copy number variation detection", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732619/12OmNy3RRDC", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/greencom-ithingscpscom/2013/5046/0/06682403", "title": "De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications", "doi": null, "abstractUrl": "/proceedings-article/greencom-ithingscpscom/2013/06682403/12OmNy4IEYT", "parentPublication": { "id": "proceedings/greencom-ithingscpscom/2013/5046/0", "title": "2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things(iThings) and IEEE Cyber, Physical and Social Computing(CPSCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2017/03/07555354", "title": "Framework for Supporting Genomic Operations", "doi": null, "abstractUrl": "/journal/tc/2017/03/07555354/13rRUwI5U7o", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08057779", "title": "ERDS-Exome: A Hybrid Approach for Copy Number Variant Detection from Whole-Exome Sequencing Data", "doi": null, "abstractUrl": "/journal/tb/2020/03/08057779/13rRUwcAqoP", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669752", "title": "Evaluation of using WGS/WES to characterize ACMG actionable genes in genetic testing reports", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669752/1A9WmkyH8JO", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/03/08794625", "title": "Detecting Clustered Independent Rare Variant Associations Using Genetic Algorithms", "doi": null, "abstractUrl": "/journal/tb/2021/03/08794625/1cHDY6rMKKQ", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313221", "title": "VCFC: Structural and Semantic Compression and Indexing of Genetic Variant Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313221/1qmgfHPyMrS", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1h0JNwBfDMI", "title": "2019 IEEE Symposium on Computers and Communications (ISCC)", "acronym": "iscc", "groupId": "1000156", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1h0K3Yby48w", "doi": "10.1109/ISCC47284.2019.8969697", "title": "optimizing the Research of DNA Sequences in a NoSQL Document Database: A Preliminary Study", "normalizedTitle": "optimizing the Research of DNA Sequences in a NoSQL Document Database: A Preliminary Study", "abstract": "The study of DNA sequences has become indis-pensable for basic biological research, and in numerous applied fields such as comparative genomics, evolutionary biology, pan genomics, genetics of disease, regulation of gene expression, oncology and many others, all supported by bioinformatics. In the era of Cloud computing, federating the Cloud systems of different genetics research organisations paves the way towards a new era of data sharing and new mashup services and applications. However, due to the huge amount of genomics data (genomics Big Data) that have to be managed, a parallel distributed NoSQL DataBase Management System (DBMS) approach becomes fundamental. Specifically, due to the textual nature of genomics data, a NoSQL DBMS appears to be the most suitable solution. In this paper, by considering the whole human genome, we present a preliminary study comparing this latter using MongoDB with a SQL-like database solution, i.e., MySQL in order to look for DNA sequences. Moreover, in order to optimize the research of genomics codes, we adopt hash functions that allow mapping nucleotides sequences of arbitrary size onto data of a fixed smaller size. Experiments, shows that MongoDB apart simplifying the management of genomics data provides better performances.", "abstracts": [ { "abstractType": "Regular", "content": "The study of DNA sequences has become indis-pensable for basic biological research, and in numerous applied fields such as comparative genomics, evolutionary biology, pan genomics, genetics of disease, regulation of gene expression, oncology and many others, all supported by bioinformatics. In the era of Cloud computing, federating the Cloud systems of different genetics research organisations paves the way towards a new era of data sharing and new mashup services and applications. However, due to the huge amount of genomics data (genomics Big Data) that have to be managed, a parallel distributed NoSQL DataBase Management System (DBMS) approach becomes fundamental. Specifically, due to the textual nature of genomics data, a NoSQL DBMS appears to be the most suitable solution. In this paper, by considering the whole human genome, we present a preliminary study comparing this latter using MongoDB with a SQL-like database solution, i.e., MySQL in order to look for DNA sequences. Moreover, in order to optimize the research of genomics codes, we adopt hash functions that allow mapping nucleotides sequences of arbitrary size onto data of a fixed smaller size. Experiments, shows that MongoDB apart simplifying the management of genomics data provides better performances.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The study of DNA sequences has become indis-pensable for basic biological research, and in numerous applied fields such as comparative genomics, evolutionary biology, pan genomics, genetics of disease, regulation of gene expression, oncology and many others, all supported by bioinformatics. In the era of Cloud computing, federating the Cloud systems of different genetics research organisations paves the way towards a new era of data sharing and new mashup services and applications. However, due to the huge amount of genomics data (genomics Big Data) that have to be managed, a parallel distributed NoSQL DataBase Management System (DBMS) approach becomes fundamental. Specifically, due to the textual nature of genomics data, a NoSQL DBMS appears to be the most suitable solution. In this paper, by considering the whole human genome, we present a preliminary study comparing this latter using MongoDB with a SQL-like database solution, i.e., MySQL in order to look for DNA sequences. Moreover, in order to optimize the research of genomics codes, we adopt hash functions that allow mapping nucleotides sequences of arbitrary size onto data of a fixed smaller size. Experiments, shows that MongoDB apart simplifying the management of genomics data provides better performances.", "fno": "08969697", "keywords": [ "Big Data", "Bioinformatics", "Cloud Computing", "Data Analysis", "DNA", "Genetics", "Genomics", "Molecular Biophysics", "No SQL Databases", "DNA Sequences", "No SQL Document Database", "Basic Biological Research", "Comparative Genomics", "Evolutionary Biology", "Pan Genomics", "Cloud Computing", "Cloud Systems", "Mashup Services", "Genomics Big Data", "Human Genome", "Database Solution", "Genomics Codes", "Nucleotides Sequence Mapping", "No SQL Database Management System Approach", "Genetics Research Organisations", "Disease Genetics", "Gene Expression Regulation", "Oncology", "Bioinformatics", "Data Sharing", "No SQL DBMS Approach", "Mongo DB", "SQL Like Database Solution", "My SQL", "Hash Functions", "Bioinformatics", "Genomics", "DNA", "Databases", "Biological Cells", "Sequential Analysis", "Genomics", "DNA Sequeencing", "No SQL", "Mon Go SB", "Database" ], "authors": [ { "affiliation": "University of Messina,MIFT,Italy", "fullName": "Fabrizio Celesti", "givenName": "Fabrizio", "surname": "Celesti", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Messina,MIFT,Italy", "fullName": "Antonio Celesti", "givenName": "Antonio", "surname": "Celesti", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Messina,MIFT,Italy", "fullName": "Antonino Galletta", "givenName": "Antonino", "surname": "Galletta", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Messina,MIFT,Italy", "fullName": "Maria Fazio", "givenName": "Maria", "surname": "Fazio", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Messina,MIFT,Italy", "fullName": "Massimo Villari", "givenName": "Massimo", "surname": "Villari", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "1153-1158", "year": "2019", "issn": null, "isbn": "978-1-7281-2999-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08969741", "articleId": "1h0JTadX6Vy", "__typename": "AdjacentArticleType" }, "next": { "fno": "08969632", "articleId": "1h0JONfyFj2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822644", "title": "An evaluation of data replication for bioinformatics workflows on NoSQL systems", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822644/12OmNAi6vUM", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024547", "title": "Big data analytics in genomics: The point on Deep Learning solutions", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024547/12OmNCcKQGd", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004392", "title": "Big data in genomics: An overview", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004392/12OmNxH9XfX", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/06/07501834", "title": "A Survey of Software and Hardware Approaches to Performing Read Alignment in Next Generation Sequencing", "doi": null, "abstractUrl": "/journal/tb/2017/06/07501834/13rRUIM2VAj", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/1999/06/x6044", "title": "Gene Discovery in DNA Sequences", "doi": null, "abstractUrl": "/magazine/ex/1999/06/x6044/13rRUwgyOc1", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2018/8520/0/08541953", "title": "MegaPath: Low-Similarity Pathogen Detection from Metagenomic NGS Data (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2018/08541953/17D45VN31gJ", "parentPublication": { "id": "proceedings/iccabs/2018/8520/0", "title": "2018 IEEE 8th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633685", "title": "Smart Laboratory Information System Accelerates Genomics Research", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633685/17D45Xq6dzO", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633632", "title": "Business Management System for Genomics", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633632/17D45XwUAKG", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2020/1054/0/09191644", "title": "Wrapping a NoSQL Datastore for Stream Analytics", "doi": null, "abstractUrl": "/proceedings-article/iri/2020/09191644/1n0IxHKFK7u", "parentPublication": { "id": "proceedings/iri/2020/1054/0", "title": "2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a089", "title": "Efficient Search of Circular Repeats and MicroDNA Reintegration in DNA Sequences", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a089/1pBMr8kqJBC", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cpqjBXCukg", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF6FsJ8zK", "doi": "10.1109/PacificVis.2019.00036", "title": "Designing Narrative Slideshows for Learning Analytics", "normalizedTitle": "Designing Narrative Slideshows for Learning Analytics", "abstract": "The practical power of data visualization is currently attracting much attention in the e-learning domain. A growing number of studies have been conducted in recent years to help instructors better analyze learner behavior and reflect on their teaching. However, current e-learning dashboards and visualization systems usually require a lot of time and effort into the exploration process. Moreover, the lack of communication power of existing systems constrains users from organizing the narrative of information pieces into a compelling data story. In this paper, we have proposed a narrative visualization approach with an interactive slideshow that helps instructors and education experts explore potential learning patterns and convey data stories. This approach contains three key components: guided-tour concept, drill-down path, and dig-in exploration dimension. The use cases further demonstrate the potential of employing this visual narrative approach in the e-learning context.", "abstracts": [ { "abstractType": "Regular", "content": "The practical power of data visualization is currently attracting much attention in the e-learning domain. A growing number of studies have been conducted in recent years to help instructors better analyze learner behavior and reflect on their teaching. However, current e-learning dashboards and visualization systems usually require a lot of time and effort into the exploration process. Moreover, the lack of communication power of existing systems constrains users from organizing the narrative of information pieces into a compelling data story. In this paper, we have proposed a narrative visualization approach with an interactive slideshow that helps instructors and education experts explore potential learning patterns and convey data stories. This approach contains three key components: guided-tour concept, drill-down path, and dig-in exploration dimension. The use cases further demonstrate the potential of employing this visual narrative approach in the e-learning context.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The practical power of data visualization is currently attracting much attention in the e-learning domain. A growing number of studies have been conducted in recent years to help instructors better analyze learner behavior and reflect on their teaching. However, current e-learning dashboards and visualization systems usually require a lot of time and effort into the exploration process. Moreover, the lack of communication power of existing systems constrains users from organizing the narrative of information pieces into a compelling data story. In this paper, we have proposed a narrative visualization approach with an interactive slideshow that helps instructors and education experts explore potential learning patterns and convey data stories. This approach contains three key components: guided-tour concept, drill-down path, and dig-in exploration dimension. The use cases further demonstrate the potential of employing this visual narrative approach in the e-learning context.", "fno": "922600a237", "keywords": [ "Computer Aided Instruction", "Data Visualisation", "Multimedia Computing", "Teaching", "Data Visualization", "E Learning Domain", "Teaching", "Visualization Systems", "Interactive Slideshow", "Data Stories", "Visual Narrative Approach", "Narrative Slideshow Design", "E Learning Dashboards", "Learning Analytics", "Guided Tour Concept", "Drill Down Path", "Dig In Exploration Dimension", "Data Visualization", "Task Analysis", "Education", "Tools", "Visual Analytics", "Interviews", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Information Visualization" ], "authors": [ { "affiliation": "Hong Kong University of Science and Technology", "fullName": "Qing Chen", "givenName": "Qing", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology", "fullName": "Zhen Li", "givenName": "Zhen", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology", "fullName": "Ting-Chuen Pong", "givenName": "Ting-Chuen", "surname": "Pong", "__typename": "ArticleAuthorType" }, { "affiliation": "Hong Kong University of Science and Technology", "fullName": "Huamin Qu", "givenName": "Huamin", "surname": "Qu", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "237-246", "year": "2019", "issn": null, "isbn": "978-1-5386-9226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922600a232", "articleId": "1cMF7xn5Rbq", "__typename": "AdjacentArticleType" }, "next": { "fno": "922600a257", "articleId": "1cMF7iL2fZu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/imis/2015/8873/0/8873a034", "title": "A Visual Analytics Approach for e-Learning Education", "doi": null, "abstractUrl": "/proceedings-article/imis/2015/8873a034/12OmNARRYoT", "parentPublication": { "id": "proceedings/imis/2015/8873/0", "title": "2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031598", "title": "Aeonium: Visual analytics to support collaborative qualitative coding", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031598/12OmNvwTGDl", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2017/0621/0/0621a493", "title": "E-Book-Based Learning Analytics for Improving Learning Materials", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2017/0621a493/12OmNwEJ0N0", "parentPublication": { "id": "proceedings/iiai-aai/2017/0621/0", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156373", "title": "VisMOOC: Visualizing video clickstream data from Massive Open Online Courses", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156373/12OmNxEBzlW", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/06/mcg2015060069", "title": "Visual Analytics for MOOC Data", "doi": null, "abstractUrl": "/magazine/cg/2015/06/mcg2015060069/13rRUwInvMP", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2018/04/mcg2018040084", "title": "Visual Analytics for Explainable Deep Learning", "doi": null, "abstractUrl": "/magazine/cg/2018/04/mcg2018040084/13rRUy3gn2N", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/beliv/2018/6884/0/08634072", "title": "A Micro-Phenomenological Lens for Evaluating Narrative Visualization", "doi": null, "abstractUrl": "/proceedings-article/beliv/2018/08634072/17D45VsBTXI", "parentPublication": { "id": "proceedings/beliv/2018/6884/0", "title": "2018 IEEE Evaluation and Beyond - Methodological Approaches for Visualization (BELIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222251", "title": "Designing Narrative-Focused Role-Playing Games for Visualization Literacy in Young Children", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222251/1nTr15tWhvq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a081", "title": "Designing for Ambiguity: Visual Analytics in Avalanche Forecasting", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a081/1qROrjfqgSI", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a181", "title": "Narrative Sensemaking: Strategies for Narrative Maps Construction", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a181/1yXuj3PJXRm", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC3w", "title": "2014 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwCJOKZ", "doi": "10.1109/BigData.2014.7004487", "title": "Large scale author name disambiguation in digital libraries", "normalizedTitle": "Large scale author name disambiguation in digital libraries", "abstract": "Person name disambiguation is essential to distinguish between persons that share the same name where unique identifiers are not present. In many domains this is a common problem including digital libraries where the same name can refer to multiple unique authors. Correctly attributing work and citations requires the digital library's database to be disambiguated. In this work we describe a large scale framework for disambiguating author names efficiently and effectively. The framework uses a density based clustering algorithm with a random forest based distance function to clusters unique authors. Effective use of blocking functions allows the clustering algorithm to be run in parallel. In our experiments we show that the framework disambiguates authors of more than 4 million papers in 24 hours.", "abstracts": [ { "abstractType": "Regular", "content": "Person name disambiguation is essential to distinguish between persons that share the same name where unique identifiers are not present. In many domains this is a common problem including digital libraries where the same name can refer to multiple unique authors. Correctly attributing work and citations requires the digital library's database to be disambiguated. In this work we describe a large scale framework for disambiguating author names efficiently and effectively. The framework uses a density based clustering algorithm with a random forest based distance function to clusters unique authors. Effective use of blocking functions allows the clustering algorithm to be run in parallel. In our experiments we show that the framework disambiguates authors of more than 4 million papers in 24 hours.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Person name disambiguation is essential to distinguish between persons that share the same name where unique identifiers are not present. In many domains this is a common problem including digital libraries where the same name can refer to multiple unique authors. Correctly attributing work and citations requires the digital library's database to be disambiguated. In this work we describe a large scale framework for disambiguating author names efficiently and effectively. The framework uses a density based clustering algorithm with a random forest based distance function to clusters unique authors. Effective use of blocking functions allows the clustering algorithm to be run in parallel. In our experiments we show that the framework disambiguates authors of more than 4 million papers in 24 hours.", "fno": "07004487", "keywords": [ "Libraries", "Databases", "Clustering Algorithms", "Educational Institutions", "Machine Learning Algorithms", "Noise", "Computer Science", "Clustering", "Disambiguation" ], "authors": [ { "affiliation": "Computer Science and Engineering, The Pennsylvania State University, University Park, PA 16802, USA", "fullName": "Madian Khabsa", "givenName": "Madian", "surname": "Khabsa", "__typename": "ArticleAuthorType" }, { "affiliation": "Science Park Promotion Agency, Ministry of Science and Technology, Bangkok, Thailand", "fullName": "Pucktada Treeratpituk", "givenName": "Pucktada", "surname": "Treeratpituk", "__typename": "ArticleAuthorType" }, { "affiliation": "Information Sciences and Technology, Computer Science and Engineering, The Pennsylvania State University, University Park, PA 16802, USA", "fullName": "C. Lee Giles", "givenName": "C. Lee", "surname": "Giles", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "41-42", "year": "2014", "issn": null, "isbn": "978-1-4799-5666-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07004486", "articleId": "12OmNzZmZso", "__typename": "AdjacentArticleType" }, "next": { "fno": "07004488", "articleId": "12OmNrJAefS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/3/4513c335", "title": "Author Name Disambiguation in Citations", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513c335/12OmNwcCIR8", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897162", "title": "Author name disambiguation using vector space model and hybrid similarity measures", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897162/12OmNxFsmp6", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004345", "title": "Why name ambiguity resolution matters for scholarly big data research", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004345/12OmNyuPKVq", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2014/5726/0/07057985", "title": "A Method of Same Name Disambiguation towards Literature Search", "doi": null, "abstractUrl": "/proceedings-article/wisa/2014/07057985/12OmNz61dIZ", "parentPublication": { "id": "proceedings/wisa/2014/5726/0", "title": "2014 11th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559618", "title": "Inventor name disambiguation for a patent database using a random forest and DBSCAN", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559618/12OmNzCWG69", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2018/7247/0/724701a265", "title": "A Web Service for Author Name Disambiguation in Scholarly Databases", "doi": null, "abstractUrl": "/proceedings-article/icws/2018/724701a265/13rRUxN5euZ", "parentPublication": { "id": "proceedings/icws/2018/7247/0", "title": "2018 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a245", "title": "Author Name Disambiguation via Heterogeneous Network Embedding from Structural and Semantic Perspectives", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a245/1MrG4Xk7ahi", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2021/1681/0/168100a506", "title": "Multiple Features Driven Author Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icws/2021/168100a506/1yrHD5SqC9a", "parentPublication": { "id": "proceedings/icws/2021/1681/0", "title": "2021 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxH9X7E", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "acronym": "wi-iat", "groupId": "1001411", "volume": "3", "displayVolume": "3", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwcCIR8", "doi": "10.1109/WI-IAT.2011.181", "title": "Author Name Disambiguation in Citations", "normalizedTitle": "Author Name Disambiguation in Citations", "abstract": "Members of the academic community have increasingly turned to digital libraries to search for the latest work of their peers. On account of their role in the academic community, it is very important that these digital libraries collect citations in a consistent, accurate, and up-to-date manner, yet they do not correctly compile citations for myriads of authors for various reasons including authors with the same name, a problem known as the \"name ambiguity problem.\" This problem occurs when multiple authors share the same name and particularly when names are simplified as in cases where names merely contain the first initial and the last name. In this paper, we propose an automatic algorithm to disambiguate authors in citations by using their specific attribute on the Web. A binary classifier and a cluster separator are applied to cluster citations. Our experiment results show that the disambiguation accuracy can be improved from 51% to 73% when using Web information.", "abstracts": [ { "abstractType": "Regular", "content": "Members of the academic community have increasingly turned to digital libraries to search for the latest work of their peers. On account of their role in the academic community, it is very important that these digital libraries collect citations in a consistent, accurate, and up-to-date manner, yet they do not correctly compile citations for myriads of authors for various reasons including authors with the same name, a problem known as the \"name ambiguity problem.\" This problem occurs when multiple authors share the same name and particularly when names are simplified as in cases where names merely contain the first initial and the last name. In this paper, we propose an automatic algorithm to disambiguate authors in citations by using their specific attribute on the Web. A binary classifier and a cluster separator are applied to cluster citations. Our experiment results show that the disambiguation accuracy can be improved from 51% to 73% when using Web information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Members of the academic community have increasingly turned to digital libraries to search for the latest work of their peers. On account of their role in the academic community, it is very important that these digital libraries collect citations in a consistent, accurate, and up-to-date manner, yet they do not correctly compile citations for myriads of authors for various reasons including authors with the same name, a problem known as the \"name ambiguity problem.\" This problem occurs when multiple authors share the same name and particularly when names are simplified as in cases where names merely contain the first initial and the last name. In this paper, we propose an automatic algorithm to disambiguate authors in citations by using their specific attribute on the Web. A binary classifier and a cluster separator are applied to cluster citations. Our experiment results show that the disambiguation accuracy can be improved from 51% to 73% when using Web information.", "fno": "4513c335", "keywords": [ "Author Name Disambiguation", "Citation Grouping" ], "authors": [ { "affiliation": null, "fullName": "Kai-Hsiang Yang", "givenName": "Kai-Hsiang", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi-Hsuan Wu", "givenName": "Yi-Hsuan", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iat", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "335-338", "year": "2011", "issn": null, "isbn": "978-0-7695-4513-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4513c330", "articleId": "12OmNx3Zjm5", "__typename": "AdjacentArticleType" }, "next": { "fno": "4513c339", "articleId": "12OmNApLGrC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/skg/2012/4794/0/4794a197", "title": "A Novel Ontology-Based Approach of Chinese Person Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/skg/2012/4794a197/12OmNApcuem", "parentPublication": { "id": "proceedings/skg/2012/4794/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2010/4018/0/4018b263", "title": "Automatic Method for Author Name Disambiguation Using Social Networks", "doi": null, "abstractUrl": "/proceedings-article/aina/2010/4018b263/12OmNBqMDoW", "parentPublication": { "id": "proceedings/aina/2010/4018/0", "title": "2010 24th IEEE International Conference on Advanced Information Networking and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004487", "title": "Large scale author name disambiguation in digital libraries", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004487/12OmNwCJOKZ", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336139", "title": "Two supervised learning approaches for name disambiguation in author citations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336139/12OmNwdtwdd", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccit/2008/3407/2/3407d081", "title": "Social Network Analysis on Name Disambiguation and More", "doi": null, "abstractUrl": "/proceedings-article/iccit/2008/3407d081/12OmNyvGymO", "parentPublication": { "id": "proceedings/iccit/2008/3407/2", "title": "Convergence Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a794", "title": "ADANA: Active Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a794/12OmNz2C1lL", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icebe/2009/3842/0/3842a042", "title": "Name Disambiguation Using Semantic Association Clustering", "doi": null, "abstractUrl": "/proceedings-article/icebe/2009/3842a042/12OmNz61doz", "parentPublication": { "id": "proceedings/icebe/2009/3842/0", "title": "2009 IEEE International Conference on e-Business Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559614", "title": "Using co-authorship networks for author name disambiguation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559614/12OmNzBOhLQ", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBp52yv", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "acronym": "ic3", "groupId": "1803947", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFsmp6", "doi": "10.1109/IC3.2014.6897162", "title": "Author name disambiguation using vector space model and hybrid similarity measures", "normalizedTitle": "Author name disambiguation using vector space model and hybrid similarity measures", "abstract": "Differentiating people on the basis of their names has always been a complex issue and our desire for grouping people, in a particular domain, based on their attributes is growing day by day. Despite years of research and a bunch of proposed techniques, the name ambiguity problem remains largely unsolved and the so far proposed techniques have faced one problem or the other. In case of author name disambiguation in digital citations, additional attributes like e-mail ID and affiliation of author and co-authors, which are normally available in publications, can help a lot in disambiguation process. Vector space model has traditionally been used in information retrieval field with great degree of success and we explore its use in case of author name disambiguation here. In this paper we propose an enhanced vector space model for disambiguating authors and their publications. Experimental results show that additional attributes present in publications can help a lot in disambiguation and solve the name ambiguity problem with a great degree of confidence. From the study we conducted and the experimental results obtained we conclude that both mixed citation and split citations problem can be handled very efficiently. We obtained a great deal of improvement in evaluation metrics obtaining F1 score of 0.97.", "abstracts": [ { "abstractType": "Regular", "content": "Differentiating people on the basis of their names has always been a complex issue and our desire for grouping people, in a particular domain, based on their attributes is growing day by day. Despite years of research and a bunch of proposed techniques, the name ambiguity problem remains largely unsolved and the so far proposed techniques have faced one problem or the other. In case of author name disambiguation in digital citations, additional attributes like e-mail ID and affiliation of author and co-authors, which are normally available in publications, can help a lot in disambiguation process. Vector space model has traditionally been used in information retrieval field with great degree of success and we explore its use in case of author name disambiguation here. In this paper we propose an enhanced vector space model for disambiguating authors and their publications. Experimental results show that additional attributes present in publications can help a lot in disambiguation and solve the name ambiguity problem with a great degree of confidence. From the study we conducted and the experimental results obtained we conclude that both mixed citation and split citations problem can be handled very efficiently. We obtained a great deal of improvement in evaluation metrics obtaining F1 score of 0.97.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Differentiating people on the basis of their names has always been a complex issue and our desire for grouping people, in a particular domain, based on their attributes is growing day by day. Despite years of research and a bunch of proposed techniques, the name ambiguity problem remains largely unsolved and the so far proposed techniques have faced one problem or the other. In case of author name disambiguation in digital citations, additional attributes like e-mail ID and affiliation of author and co-authors, which are normally available in publications, can help a lot in disambiguation process. Vector space model has traditionally been used in information retrieval field with great degree of success and we explore its use in case of author name disambiguation here. In this paper we propose an enhanced vector space model for disambiguating authors and their publications. Experimental results show that additional attributes present in publications can help a lot in disambiguation and solve the name ambiguity problem with a great degree of confidence. From the study we conducted and the experimental results obtained we conclude that both mixed citation and split citations problem can be handled very efficiently. We obtained a great deal of improvement in evaluation metrics obtaining F1 score of 0.97.", "fno": "06897162", "keywords": [ "Atomic Layer Deposition", "Clustering Algorithms", "Educational Institutions", "Vectors", "Electronic Mail", "Libraries", "Measurement", "Hybrid Similarity", "Name Disambiguation", "Vector Space Model", "Hierarchical Clustering" ], "authors": [ { "affiliation": "Deptt. of Information Technology, BGSB University, Rajouri, India", "fullName": "Tasleem Arif", "givenName": "Tasleem", "surname": "Arif", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computers & IT, Taif University, Saudi Arabia", "fullName": "Rashid Ali", "givenName": "Rashid", "surname": "Ali", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mathematical Sc. & Engg., BGSB University, Rajouri, India", "fullName": "M. Asger", "givenName": "M.", "surname": "Asger", "__typename": "ArticleAuthorType" } ], "idPrefix": "ic3", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "135-140", "year": "2014", "issn": null, "isbn": "978-1-4799-5172-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06897161", "articleId": "12OmNAL3B8g", "__typename": "AdjacentArticleType" }, "next": { "fno": "06897163", "articleId": "12OmNzlD9CN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a440", "title": "Evaluation of Features for Author Name Disambiguation Using Linear Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a440/12OmNrkT7AI", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/3/4513c335", "title": "Author Name Disambiguation in Citations", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513c335/12OmNwcCIR8", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336139", "title": "Two supervised learning approaches for name disambiguation in author citations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336139/12OmNwdtwdd", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970165", "title": "Combining domain-specific heuristics for author name disambiguation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970165/12OmNwtn3FJ", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005791", "title": "Name Disambiguation for Chinese Scientific Authors with Multi-Level Clustering", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005791/17D45Vw15tB", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a245", "title": "Author Name Disambiguation via Heterogeneous Network Embedding from Structural and Semantic Perspectives", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a245/1MrG4Xk7ahi", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2021/1681/0/168100a506", "title": "Multiple Features Driven Author Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icws/2021/168100a506/1yrHD5SqC9a", "parentPublication": { "id": "proceedings/icws/2021/1681/0", "title": "2021 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBZYToM", "title": "2017 Second International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "acronym": "icmcce", "groupId": "1824464", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNz2C1AF", "doi": "10.1109/ICMCCE.2017.46", "title": "An Online Name Disambiguation Method Based on Entity and Property Co-occurrence", "normalizedTitle": "An Online Name Disambiguation Method Based on Entity and Property Co-occurrence", "abstract": "Name disambiguation plays an important role in text processing. Names in natural language text are usually ambiguous, as many people share a same name, so do organizations and entities in other domains. The goal of name disambiguation is to identify the different referents of a same name in corpus. Technology of name disambiguation can be applied in web searching, information extraction, translation system, questioning-answer system, and so on. The key part to solving name ambiguity problem is to model context of names and feature of candidates, and then measure similarity. We proposed a representation, Bag of Entity with Property, BoEwP, to model a document, the context of names. Then, we presented an online disambiguation method for person or organization names based on entity and property co-occurrence. We performed experiments on Chinese, Spanish and English corpus. Our approach got nice precision and recall measurements, and required low system resources.", "abstracts": [ { "abstractType": "Regular", "content": "Name disambiguation plays an important role in text processing. Names in natural language text are usually ambiguous, as many people share a same name, so do organizations and entities in other domains. The goal of name disambiguation is to identify the different referents of a same name in corpus. Technology of name disambiguation can be applied in web searching, information extraction, translation system, questioning-answer system, and so on. The key part to solving name ambiguity problem is to model context of names and feature of candidates, and then measure similarity. We proposed a representation, Bag of Entity with Property, BoEwP, to model a document, the context of names. Then, we presented an online disambiguation method for person or organization names based on entity and property co-occurrence. We performed experiments on Chinese, Spanish and English corpus. Our approach got nice precision and recall measurements, and required low system resources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Name disambiguation plays an important role in text processing. Names in natural language text are usually ambiguous, as many people share a same name, so do organizations and entities in other domains. The goal of name disambiguation is to identify the different referents of a same name in corpus. Technology of name disambiguation can be applied in web searching, information extraction, translation system, questioning-answer system, and so on. The key part to solving name ambiguity problem is to model context of names and feature of candidates, and then measure similarity. We proposed a representation, Bag of Entity with Property, BoEwP, to model a document, the context of names. Then, we presented an online disambiguation method for person or organization names based on entity and property co-occurrence. We performed experiments on Chinese, Spanish and English corpus. Our approach got nice precision and recall measurements, and required low system resources.", "fno": "2628a122", "keywords": [ "Natural Language Processing", "Pattern Clustering", "Text Analysis", "Word Processing", "Name Ambiguity Problem", "Entity Clustering", "Bo Ew P", "Bag Of Entity With Property", "Natural Language Text", "Text Processing", "Online Name Disambiguation", "Natural Language Processing", "Organizations", "Context Modeling", "Task Analysis", "Tools", "Information Retrieval", "Internet", "Name Disambiguation", "Online", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Lian Duan", "givenName": "Lian", "surname": "Duan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiuming Huang", "givenName": "Jiuming", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shengdong Zhang", "givenName": "Shengdong", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhichao Wang", "givenName": "Zhichao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi Chen", "givenName": "Yi", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yue Hu", "givenName": "Yue", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhonghe He", "givenName": "Zhonghe", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmcce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "122-125", "year": "2017", "issn": null, "isbn": "978-1-5386-2628-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2628a118", "articleId": "12OmNAXglRW", "__typename": "AdjacentArticleType" }, "next": { "fno": "2628a126", "articleId": "12OmNBWi6MU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a794", "title": "ADANA: Active Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a794/12OmNz2C1lL", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2006/2747/0/274700378", "title": "Name Disambiguation in Person Information Mining", "doi": null, "abstractUrl": "/proceedings-article/wi/2006/274700378/12OmNzaQotb", "parentPublication": { "id": "proceedings/wi/2006/2747/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2006/2497/0/24970606", "title": "Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/itng/2006/24970606/12OmNzn38UN", "parentPublication": { "id": "proceedings/itng/2006/2497/0", "title": "Proceedings. Third International Conference on Information Technology: New Generation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/micai/2016/7735/0/773500a008", "title": "Identification of Rules for Recognition of Named Entity Classes in Mizo Language", "doi": null, "abstractUrl": "/proceedings-article/micai/2016/773500a008/17D45VUZMZx", "parentPublication": { "id": "proceedings/micai/2016/7735/0", "title": "2016 Fifteenth Mexican International Conference on Artificial Intelligence (MICAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09147044", "title": "A Collective Approach to Scholar Name Disambiguation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09147044/1lIYCwlAKLS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400c317", "title": "A Collective Approach to Scholar Name Disambiguation (Extended Abstract)", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400c317/1uGXsnGDirC", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caibda/2021/2490/0/249000a122", "title": "News Article Name Disambiguation Model Based on Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/caibda/2021/249000a122/1xgBqdEChkQ", "parentPublication": { "id": "proceedings/caibda/2021/2490/0", "title": "2021 International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMG", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "acronym": "jcdl", "groupId": "1804605", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzBOhLQ", "doi": "", "title": "Using co-authorship networks for author name disambiguation", "normalizedTitle": "Using co-authorship networks for author name disambiguation", "abstract": "With the increasing size of digital libraries (DLs) it has become a challenge to identify author names correctly and assign publications to them. The situation becomes more critical when different persons share the same name (homonym problem) or when the names of authors are presented in several different ways (synonym problem). This paper focuses on homonym names in the computer science bibliography DBLP. The goal of this study is to implement and evaluate a method which uses co-authorship networks in order to disambiguate homonym names, especially common names. The results show that the implemented method has a good performance and can be used for author name disambiguation of sparse bibliographic records.", "abstracts": [ { "abstractType": "Regular", "content": "With the increasing size of digital libraries (DLs) it has become a challenge to identify author names correctly and assign publications to them. The situation becomes more critical when different persons share the same name (homonym problem) or when the names of authors are presented in several different ways (synonym problem). This paper focuses on homonym names in the computer science bibliography DBLP. The goal of this study is to implement and evaluate a method which uses co-authorship networks in order to disambiguate homonym names, especially common names. The results show that the implemented method has a good performance and can be used for author name disambiguation of sparse bibliographic records.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the increasing size of digital libraries (DLs) it has become a challenge to identify author names correctly and assign publications to them. The situation becomes more critical when different persons share the same name (homonym problem) or when the names of authors are presented in several different ways (synonym problem). This paper focuses on homonym names in the computer science bibliography DBLP. The goal of this study is to implement and evaluate a method which uses co-authorship networks in order to disambiguate homonym names, especially common names. The results show that the implemented method has a good performance and can be used for author name disambiguation of sparse bibliographic records.", "fno": "07559614", "keywords": [ "Gold", "Standards", "Measurement", "Libraries", "Databases", "Semantic Web", "Computer Science", "Gold Standard", "Author Name Homonyms", "Co Authorship Network", "Community Detection", "Louvain Method" ], "authors": [ { "affiliation": "GESIS - Leibniz Institute for the Social Sciences, Cologne, Germany", "fullName": "Fakhri Momeni", "givenName": "Fakhri", "surname": "Momeni", "__typename": "ArticleAuthorType" }, { "affiliation": "GESIS - Leibniz Institute for the Social Sciences, Cologne, Germany", "fullName": "Philipp Mayr", "givenName": "Philipp", "surname": "Mayr", "__typename": "ArticleAuthorType" } ], "idPrefix": "jcdl", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "261-262", "year": "2016", "issn": null, "isbn": "978-1-4503-4229-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07559613", "articleId": "12OmNro0IgD", "__typename": "AdjacentArticleType" }, "next": { "fno": "07559615", "articleId": "12OmNBDQbln", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aina/2010/4018/0/4018b263", "title": "Automatic Method for Author Name Disambiguation Using Social Networks", "doi": null, "abstractUrl": "/proceedings-article/aina/2010/4018b263/12OmNBqMDoW", "parentPublication": { "id": "proceedings/aina/2010/4018/0", "title": "2010 24th IEEE International Conference on Advanced Information Networking and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004487", "title": "Large scale author name disambiguation in digital libraries", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004487/12OmNwCJOKZ", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/3/4513c335", "title": "Author Name Disambiguation in Citations", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513c335/12OmNwcCIR8", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2004/832/0/01336139", "title": "Two supervised learning approaches for name disambiguation in author citations", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2004/01336139/12OmNwdtwdd", "parentPublication": { "id": "proceedings/jcdl/2004/832/0", "title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897162", "title": "Author name disambiguation using vector space model and hybrid similarity measures", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897162/12OmNxFsmp6", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800b580", "title": "Parallel Computing for Large-Scale Author Name Disambiguation in MEDLINE", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800b580/1dPoxsenTKo", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2021/1681/0/168100a506", "title": "Multiple Features Driven Author Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icws/2021/168100a506/1yrHD5SqC9a", "parentPublication": { "id": "proceedings/icws/2021/1681/0", "title": "2021 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwHz03I", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence", "acronym": "wi", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzaQotb", "doi": "10.1109/WI.2006.121", "title": "Name Disambiguation in Person Information Mining", "normalizedTitle": "Name Disambiguation in Person Information Mining", "abstract": "This paper considers five features, personal titles, community chains, terms, temporal expressions, and hostnames for personal name disambiguation. In 9 test data sets covering 3 ambiguous personal names, we address the issues of awareness degree of an entity, the source of materials and web pages in different areas. Two approaches, single-clusterer and cascaded multiple-clusterer, are proposed. In the experiments, the proposed features are quite useful; the multiple-clusterer approach is better than the single-clusterer approach; and expanding community chains using the web has positive effects on personal name disambiguation.", "abstracts": [ { "abstractType": "Regular", "content": "This paper considers five features, personal titles, community chains, terms, temporal expressions, and hostnames for personal name disambiguation. In 9 test data sets covering 3 ambiguous personal names, we address the issues of awareness degree of an entity, the source of materials and web pages in different areas. Two approaches, single-clusterer and cascaded multiple-clusterer, are proposed. In the experiments, the proposed features are quite useful; the multiple-clusterer approach is better than the single-clusterer approach; and expanding community chains using the web has positive effects on personal name disambiguation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper considers five features, personal titles, community chains, terms, temporal expressions, and hostnames for personal name disambiguation. In 9 test data sets covering 3 ambiguous personal names, we address the issues of awareness degree of an entity, the source of materials and web pages in different areas. Two approaches, single-clusterer and cascaded multiple-clusterer, are proposed. In the experiments, the proposed features are quite useful; the multiple-clusterer approach is better than the single-clusterer approach; and expanding community chains using the web has positive effects on personal name disambiguation.", "fno": "274700378", "keywords": [], "authors": [ { "affiliation": "National Taiwan University, Taiwan", "fullName": "Yu-Chuan Wei", "givenName": "Yu-Chuan", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "National Taiwan University, Taiwan", "fullName": "Ming-Shun Lin", "givenName": "Ming-Shun", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "National Taiwan University, Taiwan", "fullName": "Hsin-Hsi Chen", "givenName": "Hsin-Hsi", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "378-381", "year": "2006", "issn": null, "isbn": "0-7695-2747-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "274700374", "articleId": "12OmNqIhG1V", "__typename": "AdjacentArticleType" }, "next": { "fno": "274700382", "articleId": "12OmNAi6vW9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ainaw/2007/2847/1/284710379", "title": "Using Web Directories for Similarity Measurement in Personal Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/ainaw/2007/284710379/12OmNAS9zIV", "parentPublication": { "id": "proceedings/ainaw/2007/2847/1", "title": "Advanced Information Networking and Applications Workshops, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2012/4794/0/4794a197", "title": "A Novel Ontology-Based Approach of Chinese Person Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/skg/2012/4794a197/12OmNApcuem", "parentPublication": { "id": "proceedings/skg/2012/4794/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a440", "title": "Evaluation of Features for Author Name Disambiguation Using Linear Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a440/12OmNrkT7AI", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2013/5145/1/5145a185", "title": "OnPerDis: Ontology-Based Personal Name Disambiguation on the Web", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2013/5145a185/12OmNyLA5yw", "parentPublication": { "id": "proceedings/wi-iat/2013/5145/1", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408a794", "title": "ADANA: Active Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408a794/12OmNz2C1lL", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2008/3279/0/3279a276", "title": "Robust Disambiguation of Web-Based Personal Names", "doi": null, "abstractUrl": "/proceedings-article/icsc/2008/3279a276/12OmNzt0IDn", "parentPublication": { "id": "proceedings/icsc/2008/3279/0", "title": "2008 IEEE International Conference on Semantic Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09147044", "title": "A Collective Approach to Scholar Name Disambiguation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09147044/1lIYCwlAKLS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/07/09184992", "title": "CONNA: Addressing Name Disambiguation on the Fly", "doi": null, "abstractUrl": "/journal/tk/2022/07/09184992/1mNmO2ECo8w", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJsdmMJVoQ", "doi": "10.1109/BigData47090.2019.9005458", "title": "Unsupervised Author Disambiguation using Heterogeneous Graph Convolutional Network Embedding", "normalizedTitle": "Unsupervised Author Disambiguation using Heterogeneous Graph Convolutional Network Embedding", "abstract": "People share same names in real world. When a digital library user searches for an author name, he may see a mixture of publications by different authors who have the same name. Making distinctions between them is an important prerequisite to improve the quality of services and contents in digital libraries. The general task of author disambiguation is to associate publications which belong to an identical name or names with highly similar spellings to different people entities. In recent years, many researches have been conducted to solve this challenging task. However, some works rely heavily on external knowledge bases and manually annotated data. Some unsupervised learning based works require complex feature engineering. In this paper, we propose a novel and efficient author disambiguation framework which needs no labeled data. We first construct a publication heterogeneous network for each ambiguous name. Then, we use our proposed heterogeneous graph convolutional network embedding method that encodes both graph structure and node attribute information to learn publication representations. After that, we propose a graph enhanced clustering method for name disambiguation that can greatly accelerate the clustering process and need not require the number of distinct persons. Our framework can be continually retrained and applied on incremental disambiguation task when new publications are put in. Experimental results on two datasets show that our framework clearly performs better than several state-of-the-art methods for author disambiguation.", "abstracts": [ { "abstractType": "Regular", "content": "People share same names in real world. When a digital library user searches for an author name, he may see a mixture of publications by different authors who have the same name. Making distinctions between them is an important prerequisite to improve the quality of services and contents in digital libraries. The general task of author disambiguation is to associate publications which belong to an identical name or names with highly similar spellings to different people entities. In recent years, many researches have been conducted to solve this challenging task. However, some works rely heavily on external knowledge bases and manually annotated data. Some unsupervised learning based works require complex feature engineering. In this paper, we propose a novel and efficient author disambiguation framework which needs no labeled data. We first construct a publication heterogeneous network for each ambiguous name. Then, we use our proposed heterogeneous graph convolutional network embedding method that encodes both graph structure and node attribute information to learn publication representations. After that, we propose a graph enhanced clustering method for name disambiguation that can greatly accelerate the clustering process and need not require the number of distinct persons. Our framework can be continually retrained and applied on incremental disambiguation task when new publications are put in. Experimental results on two datasets show that our framework clearly performs better than several state-of-the-art methods for author disambiguation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "People share same names in real world. When a digital library user searches for an author name, he may see a mixture of publications by different authors who have the same name. Making distinctions between them is an important prerequisite to improve the quality of services and contents in digital libraries. The general task of author disambiguation is to associate publications which belong to an identical name or names with highly similar spellings to different people entities. In recent years, many researches have been conducted to solve this challenging task. However, some works rely heavily on external knowledge bases and manually annotated data. Some unsupervised learning based works require complex feature engineering. In this paper, we propose a novel and efficient author disambiguation framework which needs no labeled data. We first construct a publication heterogeneous network for each ambiguous name. Then, we use our proposed heterogeneous graph convolutional network embedding method that encodes both graph structure and node attribute information to learn publication representations. After that, we propose a graph enhanced clustering method for name disambiguation that can greatly accelerate the clustering process and need not require the number of distinct persons. Our framework can be continually retrained and applied on incremental disambiguation task when new publications are put in. Experimental results on two datasets show that our framework clearly performs better than several state-of-the-art methods for author disambiguation.", "fno": "09005458", "keywords": [ "Convolutional Neural Nets", "Digital Libraries", "Graph Theory", "Knowledge Based Systems", "Pattern Clustering", "Unsupervised Learning", "Unsupervised Author Disambiguation", "Digital Libraries", "Associate Publications", "External Knowledge Bases", "Unsupervised Learning", "Feature Engineering", "Publication Heterogeneous Network", "Heterogeneous Graph Convolutional Network Embedding Method", "Publication Representations", "Graph Enhanced Clustering Method", "Name Disambiguation", "Heterogeneous Networks", "Libraries", "Task Analysis", "Feature Extraction", "Semantics", "Big Data", "Acceleration", "Name Disambiguation", "Network Embedding", "Clustering", "Graph Convolutional Network", "Meta Path" ], "authors": [ { "affiliation": "Computer Network Information Center, Chinese Academy of Sciences,Beijing,China", "fullName": "Ziyue Qiao", "givenName": "Ziyue", "surname": "Qiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Network Information Center, Chinese Academy of Sciences,Beijing,China", "fullName": "Yi Du", "givenName": "Yi", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida,Department of Computer Science,Orlando,USA", "fullName": "Yanjie Fu", "givenName": "Yanjie", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba DAMO Academy, Alibaba Group,China", "fullName": "Pengfei Wang", "givenName": "Pengfei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Network Information Center, Chinese Academy of Sciences,Beijing,China", "fullName": "Yuanchun Zhou", "givenName": "Yuanchun", "surname": "Zhou", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "910-919", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09006442", "articleId": "1hJrL2BEyL6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09005459", "articleId": "1hJrOK44qSA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897162", "title": "Author name disambiguation using vector space model and hybrid similarity measures", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897162/12OmNxFsmp6", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559614", "title": "Using co-authorship networks for author name disambiguation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559614/12OmNzBOhLQ", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005791", "title": "Name Disambiguation for Chinese Scientific Authors with Multi-Level Clustering", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005791/17D45Vw15tB", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a239", "title": "Deterministic bibliometric disambiguation challenges in company names", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a239/1LFKPMZaq5y", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a245", "title": "Author Name Disambiguation via Heterogeneous Network Embedding from Structural and Semantic Perspectives", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a245/1MrG4Xk7ahi", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09147044", "title": "A Collective Approach to Scholar Name Disambiguation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09147044/1lIYCwlAKLS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a511", "title": "Pairwise Learning for Name Disambiguation in Large-Scale Heterogeneous Academic Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a511/1r54HIyBiLu", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uGXcydptWU", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uGXsnGDirC", "doi": "10.1109/ICDE51399.2021.00244", "title": "A Collective Approach to Scholar Name Disambiguation (Extended Abstract)", "normalizedTitle": "A Collective Approach to Scholar Name Disambiguation (Extended Abstract)", "abstract": "This study investigates name disambiguation for scholarly data. We propose a collective approach, which considers the connections of different ambiguous names, such that it initially treats each author reference as a unique author entity and reformulates the bibliography data as a heterogeneous multipartite network. Disambiguation results of one author name propagate to the others in the network. To further deal with the sparsity problem caused by limited available information, we also introduce word-word and venue-venue similarities and measure author similarities by assembling similarities from multiple perspectives. Using three real-life datasets, we experimentally show that our approach is both effective and efficient.", "abstracts": [ { "abstractType": "Regular", "content": "This study investigates name disambiguation for scholarly data. We propose a collective approach, which considers the connections of different ambiguous names, such that it initially treats each author reference as a unique author entity and reformulates the bibliography data as a heterogeneous multipartite network. Disambiguation results of one author name propagate to the others in the network. To further deal with the sparsity problem caused by limited available information, we also introduce word-word and venue-venue similarities and measure author similarities by assembling similarities from multiple perspectives. Using three real-life datasets, we experimentally show that our approach is both effective and efficient.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study investigates name disambiguation for scholarly data. We propose a collective approach, which considers the connections of different ambiguous names, such that it initially treats each author reference as a unique author entity and reformulates the bibliography data as a heterogeneous multipartite network. Disambiguation results of one author name propagate to the others in the network. To further deal with the sparsity problem caused by limited available information, we also introduce word-word and venue-venue similarities and measure author similarities by assembling similarities from multiple perspectives. Using three real-life datasets, we experimentally show that our approach is both effective and efficient.", "fno": "918400c317", "keywords": [ "Natural Language Processing", "Social Networking Online", "Text Analysis", "Collective Approach", "Scholar Name Disambiguation", "Scholarly Data", "Different Ambiguous Names", "Author Reference", "Unique Author Entity", "Bibliography Data", "Heterogeneous Multipartite Network", "Disambiguation Results", "Author Name Propagate", "Sparsity Problem", "Word Word", "Venue Venue Similarities", "Measure Author Similarities", "Measurement", "Conferences", "Bibliographies", "Data Engineering" ], "authors": [ { "affiliation": "Pennsylvania State University", "fullName": "Dongsheng Luo", "givenName": "Dongsheng", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University,SKLSDE Lab,Beijing,China", "fullName": "Shuai Ma", "givenName": "Shuai", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University", "fullName": "Yaowei Yan", "givenName": "Yaowei", "surname": "Yan", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University,SKLSDE Lab,Beijing,China", "fullName": "Chunmin Hu", "givenName": "Chunmin", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University", "fullName": "Xiang Zhang", "givenName": "Xiang", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University,SKLSDE Lab,Beijing,China", "fullName": "Jinpeng Huai", "givenName": "Jinpeng", "surname": "Huai", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "2317-2318", "year": "2021", "issn": null, "isbn": "978-1-7281-9184-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "918400c315", "articleId": "1uGXhSz5Hu8", "__typename": "AdjacentArticleType" }, "next": { "fno": "918400c319", "articleId": "1uGXETdj2Sc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isme/2010/7669/2/05573917", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/05573917/12OmNCd2rBF", "parentPublication": { "id": "proceedings/isme/2010/7669/2", "title": "2010 International Conference of Information Science and Management Engineering. ISME 2010", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/das/2012/4661/0/4661a440", "title": "Evaluation of Features for Author Name Disambiguation Using Linear Support Vector Machines", "doi": null, "abstractUrl": "/proceedings-article/das/2012/4661a440/12OmNrkT7AI", "parentPublication": { "id": "proceedings/das/2012/4661/0", "title": "Document Analysis Systems, IAPR International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isme/2010/4132/2/4132b155", "title": "Cloud-Based Name Disambiguation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/isme/2010/4132b155/12OmNvSbBnL", "parentPublication": { "id": "proceedings/isme/2010/4132/2", "title": "Information Science and Management Engineering, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2014/5569/0/06970165", "title": "Combining domain-specific heuristics for author name disambiguation", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2014/06970165/12OmNwtn3FJ", "parentPublication": { "id": "proceedings/jcdl/2014/5569/0", "title": "2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897162", "title": "Author name disambiguation using vector space model and hybrid similarity measures", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897162/12OmNxFsmp6", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118563", "title": "Name disambiguation in author citations using a K-way spectral clustering method", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118563/12OmNy2ah16", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005791", "title": "Name Disambiguation for Chinese Scientific Authors with Multi-Level Clustering", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005791/17D45Vw15tB", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09147044", "title": "A Collective Approach to Scholar Name Disambiguation", "doi": null, "abstractUrl": "/journal/tk/2022/05/09147044/1lIYCwlAKLS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caibda/2021/2490/0/249000a122", "title": "News Article Name Disambiguation Model Based on Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/caibda/2021/249000a122/1xgBqdEChkQ", "parentPublication": { "id": "proceedings/caibda/2021/2490/0", "title": "2021 International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2021/1681/0/168100a506", "title": "Multiple Features Driven Author Name Disambiguation", "doi": null, "abstractUrl": "/proceedings-article/icws/2021/168100a506/1yrHD5SqC9a", "parentPublication": { "id": "proceedings/icws/2021/1681/0", "title": "2021 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cJ6WsGCn96", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1cJ6YEzEuQ0", "doi": "10.1109/VAST.2018.8802454", "title": "EmbeddingVis: A Visual Analytics Approach to Comparative Network Embedding Inspection", "normalizedTitle": "EmbeddingVis: A Visual Analytics Approach to Comparative Network Embedding Inspection", "abstract": "Constructing latent vector representation for nodes in a network through embedding models has shown its practicality in many graph analysis applications, such as node classification, clustering, and link prediction. However, despite the high efficiency and accuracy of learning an embedding model, people have little clue of what information about the original network is preserved in the embedding vectors. The abstractness of low-dimensional vector representation, stochastic nature of the construction process, and non-transparent hyper-parameters all obscure understanding of network embedding results. Visualization techniques have been introduced to facilitate embedding vector inspection, usually by projecting the embedding space to a two-dimensional display. Although the existing visualization methods allow simple examination of the structure of embedding space, they cannot support in-depth exploration of the embedding vectors. In this paper, we design an exploratory visual analytics system that supports the comparative visual interpretation of embedding vectors at the cluster, instance, and structural levels. To be more specific, it facilitates comparison of what and how node metrics are preserved across different embedding models and investigation of relationships between node metrics and selected embedding vectors. Several case studies confirm the efficacy of our system. Experts' feedback suggests that our approach indeed helps them better embrace the understanding of network embedding models.", "abstracts": [ { "abstractType": "Regular", "content": "Constructing latent vector representation for nodes in a network through embedding models has shown its practicality in many graph analysis applications, such as node classification, clustering, and link prediction. However, despite the high efficiency and accuracy of learning an embedding model, people have little clue of what information about the original network is preserved in the embedding vectors. The abstractness of low-dimensional vector representation, stochastic nature of the construction process, and non-transparent hyper-parameters all obscure understanding of network embedding results. Visualization techniques have been introduced to facilitate embedding vector inspection, usually by projecting the embedding space to a two-dimensional display. Although the existing visualization methods allow simple examination of the structure of embedding space, they cannot support in-depth exploration of the embedding vectors. In this paper, we design an exploratory visual analytics system that supports the comparative visual interpretation of embedding vectors at the cluster, instance, and structural levels. To be more specific, it facilitates comparison of what and how node metrics are preserved across different embedding models and investigation of relationships between node metrics and selected embedding vectors. Several case studies confirm the efficacy of our system. Experts' feedback suggests that our approach indeed helps them better embrace the understanding of network embedding models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Constructing latent vector representation for nodes in a network through embedding models has shown its practicality in many graph analysis applications, such as node classification, clustering, and link prediction. However, despite the high efficiency and accuracy of learning an embedding model, people have little clue of what information about the original network is preserved in the embedding vectors. The abstractness of low-dimensional vector representation, stochastic nature of the construction process, and non-transparent hyper-parameters all obscure understanding of network embedding results. Visualization techniques have been introduced to facilitate embedding vector inspection, usually by projecting the embedding space to a two-dimensional display. Although the existing visualization methods allow simple examination of the structure of embedding space, they cannot support in-depth exploration of the embedding vectors. In this paper, we design an exploratory visual analytics system that supports the comparative visual interpretation of embedding vectors at the cluster, instance, and structural levels. To be more specific, it facilitates comparison of what and how node metrics are preserved across different embedding models and investigation of relationships between node metrics and selected embedding vectors. Several case studies confirm the efficacy of our system. Experts' feedback suggests that our approach indeed helps them better embrace the understanding of network embedding models.", "fno": "08802454", "keywords": [ "Data Analysis", "Data Visualisation", "Graph Theory", "Learning Artificial Intelligence", "Vectors", "Embedding Vectors", "Embedding Vector Inspection", "Exploratory Visual Analytics System", "Node Metrics", "Network Embedding Models", "Visual Analytics Approach", "Latent Vector Representation", "Vector Representation", "Visual Interpretation", "Measurement", "Task Analysis", "Analytical Models", "Visual Analytics", "Stochastic Processes", "Two Dimensional Displays", "Human Centered Computing", "Visualization", "Visualization Application Domains", "Visual Analytics", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong", "fullName": "Quan Li", "givenName": "Quan", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong", "fullName": "Kristanto Sean Njotoprawiro", "givenName": "Kristanto Sean", "surname": "Njotoprawiro", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong", "fullName": "Hammad Haleem", "givenName": "Hammad", "surname": "Haleem", "__typename": "ArticleAuthorType" }, { "affiliation": "WeChat, Tencent Technology (Shenzhen) Co., Ltd., Shenzhen, China", "fullName": "Qiaoan Chen", "givenName": "Qiaoan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "WeChat, Tencent Technology (Shenzhen) Co., Ltd., Shenzhen, China", "fullName": "Chris Yi", "givenName": "Chris", "surname": "Yi", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong", "fullName": "Xiaojuan Ma", "givenName": "Xiaojuan", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "48-59", "year": "2018", "issn": null, "isbn": "978-1-5386-6861-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08802486", "articleId": "1cJ6YwLGq40", "__typename": "AdjacentArticleType" }, "next": { "fno": "08802509", "articleId": "1cJ6WWAb0wo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a610", "title": "Edge Metrics for Visual Graph Analytics: A Comparative Study", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a610/12OmNAnMuJD", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08023823", "title": "ConceptVector: Text Visual Analytics via Interactive Lexicon Building Using Word Embedding", "doi": null, "abstractUrl": "/journal/tg/2018/01/08023823/13rRUwbaqUU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a384", "title": "Delaunay Triangulation Data Augmentation Guided by Visual Analytics for Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a384/17D45X0yjU7", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08667702", "title": "Visual Exploration of Neural Document Embedding in Information Retrieval: Semantics and Feature Selection", "doi": null, "abstractUrl": "/journal/tg/2019/06/08667702/18q6o0uDSXS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/10/09829321", "title": "Influence Maximization With Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2022/10/09829321/1EYxoEPe9eU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2019/3094/0/309400a145", "title": "TECCD: A Tree Embedding Approach for Code Clone Detection", "doi": null, "abstractUrl": "/proceedings-article/icsme/2019/309400a145/1fHlH4hZlnO", "parentPublication": { "id": "proceedings/icsme/2019/3094/0", "title": "2019 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933677", "title": "SANVis: Visual Analytics for Understanding Self-Attention Networks", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933677/1fTgGfXzSwM", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a727", "title": "Network2Vec: Learning Node Representation Based on Space Mapping in Networks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a727/1gAwVizbAQ0", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006591", "title": "SENSE: Semantically Enhanced Node Sequence Embedding", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006591/1hJsqhaalRC", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2020/8009/0/800900a048", "title": "A Visual Analytics Framework for Contrastive Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/vast/2020/800900a048/1q7jwzRnFM4", "parentPublication": { "id": "proceedings/vast/2020/8009/0", "title": "2020 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKA", "title": "2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud)", "acronym": "bdcloud", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBlXs7O", "doi": "10.1109/BDCloud.2014.117", "title": "A Multi-dimensional Analysis and Data Cube for Unstructured Text and Social Media", "normalizedTitle": "A Multi-dimensional Analysis and Data Cube for Unstructured Text and Social Media", "abstract": "Recently, unstructured data like texts, documents, or SNS messages has been increasingly being used in many applications, rather than structured data consisting of simple numbers or characters. Thus it becomes more important to analysis unstructured text data to extract valuable information for usres decision making. Like OLAP (On-Line Analytical Processing) analysis over structured data, Multi-dimensional analysis for these unstructured data is popularly being required. To facilitate these analysis requirements on the unstructured data, a text cube model on multi-dimensional text database has been proposed. In this paper, we extended the existing text cube model to incorporate TF-IDF (Term Frequency Inverse Document Frequrency) and LM (Language Model) as measurements. Because the proposed text cube model utilizes new measurements which are more popular in information retrieval systems, it is more efficient and effective to analysis text databases. Through experiments, we revealed that the performance and the effectiveness of the proposed text cube outperform the existing one.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, unstructured data like texts, documents, or SNS messages has been increasingly being used in many applications, rather than structured data consisting of simple numbers or characters. Thus it becomes more important to analysis unstructured text data to extract valuable information for usres decision making. Like OLAP (On-Line Analytical Processing) analysis over structured data, Multi-dimensional analysis for these unstructured data is popularly being required. To facilitate these analysis requirements on the unstructured data, a text cube model on multi-dimensional text database has been proposed. In this paper, we extended the existing text cube model to incorporate TF-IDF (Term Frequency Inverse Document Frequrency) and LM (Language Model) as measurements. Because the proposed text cube model utilizes new measurements which are more popular in information retrieval systems, it is more efficient and effective to analysis text databases. Through experiments, we revealed that the performance and the effectiveness of the proposed text cube outperform the existing one.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, unstructured data like texts, documents, or SNS messages has been increasingly being used in many applications, rather than structured data consisting of simple numbers or characters. Thus it becomes more important to analysis unstructured text data to extract valuable information for usres decision making. Like OLAP (On-Line Analytical Processing) analysis over structured data, Multi-dimensional analysis for these unstructured data is popularly being required. To facilitate these analysis requirements on the unstructured data, a text cube model on multi-dimensional text database has been proposed. In this paper, we extended the existing text cube model to incorporate TF-IDF (Term Frequency Inverse Document Frequrency) and LM (Language Model) as measurements. Because the proposed text cube model utilizes new measurements which are more popular in information retrieval systems, it is more efficient and effective to analysis text databases. Through experiments, we revealed that the performance and the effectiveness of the proposed text cube outperform the existing one.", "fno": "6719a761", "keywords": [ "Computational Modeling", "Databases", "Frequency Measurement", "Analytical Models", "Information Retrieval", "Data Models", "Mathematical Model", "Language Model", "OLAP", "Multi Dimensional Analysis", "Text Cube", "Data Cube", "Text Databases", "Information Retrieval", "TF IDF" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Kangwon Nat. Univ., Chuncheon, South Korea", "fullName": "Suan Lee", "givenName": null, "surname": "Suan Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Kangwon Nat. Univ., Chuncheon, South Korea", "fullName": "Namsoo Kim", "givenName": null, "surname": "Namsoo Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Kangwon Nat. Univ., Chuncheon, South Korea", "fullName": "Jinho Kim", "givenName": null, "surname": "Jinho Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "bdcloud", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "761-764", "year": "2014", "issn": null, "isbn": "978-1-4799-6719-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6719a753", "articleId": "12OmNyOHG53", "__typename": "AdjacentArticleType" }, "next": { "fno": "6719a765", "articleId": "12OmNzcPAdN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2010/5445/0/05447838", "title": "TopCells: Keyword-based search of top-k aggregated documents in text cube", "doi": null, "abstractUrl": "/proceedings-article/icde/2010/05447838/12OmNAWYKLt", "parentPublication": { "id": "proceedings/icde/2010/5445/0", "title": "2010 IEEE 26th International Conference on Data Engineering (ICDE 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2008/3502/0/3502a905", "title": "Text Cube: Computing IR Measures for Multidimensional Text Database Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2008/3502a905/12OmNAg7jXD", "parentPublication": { "id": "proceedings/icdm/2008/3502/0", "title": "2008 Eighth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socialinformatics/2012/5015/0/5015a252", "title": "SocialCube: A Text Cube Framework for Analyzing Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/socialinformatics/2012/5015a252/12OmNC8dgbK", "parentPublication": { "id": "proceedings/socialinformatics/2012/5015/0", "title": "International Conference on Social Informatics (SocialInformatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imccc/2016/1195/0/07774734", "title": "Iterative Side-Channel Cube Attack on KeeLoq", "doi": null, "abstractUrl": "/proceedings-article/imccc/2016/07774734/12OmNy3iFtO", "parentPublication": { "id": "proceedings/imccc/2016/1195/0", "title": "2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2012/4467/0/06404474", "title": "Image retrieval in the unstructured data management system AUDR", "doi": null, "abstractUrl": "/proceedings-article/e-science/2012/06404474/12OmNz5apM6", "parentPublication": { "id": "proceedings/e-science/2012/4467/0", "title": "2012 IEEE 8th International Conference on E-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/12/ttk2011121795", "title": "Efficient Keyword-Based Search for Top-K Cells in Text Cube", "doi": null, "abstractUrl": "/journal/tk/2011/12/ttk2011121795/13rRUEgaro8", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594978", "title": "Doc2Cube: Allocating Documents to Text Cube Without Labeled Data", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594978/17D45VVho32", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2019/2542/0/254200a474", "title": "Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2019/254200a474/1gjS01UNU9q", "parentPublication": { "id": "proceedings/cyberc/2019/2542/0", "title": "2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2019/5052/0/09035282", "title": "Unstructured Medical Text Classification using Linguistic Analysis: A Supervised Deep Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2019/09035282/1ifhsgxOACY", "parentPublication": { "id": "proceedings/aiccsa/2019/5052/0", "title": "2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2021/8899/0/889900a118", "title": "On-Device Tag Generation for Unstructured Text", "doi": null, "abstractUrl": "/proceedings-article/icsc/2021/889900a118/1rFzUEWyerK", "parentPublication": { "id": "proceedings/icsc/2021/8899/0", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4ity", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNCgrCW0", "doi": "10.1109/ICSC.2016.57", "title": "Extracting Semantic Knowledge from Unstructured Text Using Embedded Controlled Language", "normalizedTitle": "Extracting Semantic Knowledge from Unstructured Text Using Embedded Controlled Language", "abstract": "Nowadays, most of the data on the Web is still in the form of unstructured text. Knowledge extraction from unstructured text is highly desirable but extremely challenging due to the inherent ambiguity of natural language. In this article, we present an architecture of an information extraction system based on the concept of Embedded Controlled Language that allows for extracting formal semantic knowledge from an unstructured text corpus. Moreover, the presented approach has a potential to support multilingual input and output.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, most of the data on the Web is still in the form of unstructured text. Knowledge extraction from unstructured text is highly desirable but extremely challenging due to the inherent ambiguity of natural language. In this article, we present an architecture of an information extraction system based on the concept of Embedded Controlled Language that allows for extracting formal semantic knowledge from an unstructured text corpus. Moreover, the presented approach has a potential to support multilingual input and output.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, most of the data on the Web is still in the form of unstructured text. Knowledge extraction from unstructured text is highly desirable but extremely challenging due to the inherent ambiguity of natural language. In this article, we present an architecture of an information extraction system based on the concept of Embedded Controlled Language that allows for extracting formal semantic knowledge from an unstructured text corpus. Moreover, the presented approach has a potential to support multilingual input and output.", "fno": "0662a087", "keywords": [ "Grammar", "Syntactics", "Semantics", "Natural Languages", "Data Mining", "Concrete", "Conferences", "Information Extraction", "Natural Language Processing", "Controlled Natural Language", "Text Mining" ], "authors": [ { "affiliation": null, "fullName": "Hazem Safwat", "givenName": "Hazem", "surname": "Safwat", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Normunds Gruzitis", "givenName": "Normunds", "surname": "Gruzitis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Davis", "givenName": "Brian", "surname": "Davis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ramona Enache", "givenName": "Ramona", "surname": "Enache", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-02-01T00:00:00", "pubType": "proceedings", "pages": "87-90", "year": "2016", "issn": null, "isbn": "978-1-5090-0662-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0662a079", "articleId": "12OmNx6Pivg", "__typename": "AdjacentArticleType" }, "next": { "fno": "0662a091", "articleId": "12OmNx8wTtA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scam/2013/5739/0/06648197", "title": "A Hidden Markov Model to detect coded information islands in free text", "doi": null, "abstractUrl": "/proceedings-article/scam/2013/06648197/12OmNAkWvLD", "parentPublication": { "id": "proceedings/scam/2013/5739/0", "title": "2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227070", "title": "Language modularity with the MPS language workbench", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227070/12OmNAo45Gm", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hldvt/2017/3997/0/08167461", "title": "Designing cyber-physical systems from natural language descriptions", "doi": null, "abstractUrl": "/proceedings-article/hldvt/2017/08167461/12OmNxG1yDG", "parentPublication": { "id": "proceedings/hldvt/2017/3997/0", "title": "2017 IEEE International High Level Design Validation and Test Workshop (HLDVT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2012/1066/0/06227119", "title": "Constructing parser for industrial software specifications containing formal and natural language description", "doi": null, "abstractUrl": "/proceedings-article/icse/2012/06227119/12OmNzdoMqS", "parentPublication": { "id": "proceedings/icse/2012/1066/0", "title": "2012 34th International Conference on Software Engineering (ICSE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2018/7325/0/732500a017", "title": "High Accuracy Question Answering via Hybrid Controlled Natural Language", "doi": null, "abstractUrl": "/proceedings-article/wi/2018/732500a017/17D45VTRowq", "parentPublication": { "id": "proceedings/wi/2018/7325/0", "title": "2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2019/6783/0/08665517", "title": "Controlled Natural Language Framework for Generating Assertions from Hardware Specifications", "doi": null, "abstractUrl": "/proceedings-article/icsc/2019/08665517/18qcdZ7PxBe", "parentPublication": { "id": "proceedings/icsc/2019/6783/0", "title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdke/2019/6088/0/608800a025", "title": "Towards a Bidirectional Machine Translator Generator for Multilingual Communication", "doi": null, "abstractUrl": "/proceedings-article/cdke/2019/608800a025/1grOEijVnXO", "parentPublication": { "id": "proceedings/cdke/2019/6088/0", "title": "2019 IEEE International Conference on Conversational Data & Knowledge Engineering (CDKE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2020/5143/0/09054789", "title": "Automatically Extracting Subroutine Summary Descriptions from Unstructured Comments", "doi": null, "abstractUrl": "/proceedings-article/saner/2020/09054789/1iHVceJruIE", "parentPublication": { "id": "proceedings/saner/2020/5143/0", "title": "2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400a433", "title": "Semantic Representations for Multilingual Natural Language Processing", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400a433/1jdE0ge2Ryw", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asew/2020/8128/0/812800a118", "title": "AutoEPRS-20: Extracting Business Process Redesign Suggestions from Natural Language Text", "doi": null, "abstractUrl": "/proceedings-article/asew/2020/812800a118/1qyxNhqoMrS", "parentPublication": { "id": "proceedings/asew/2020/8128/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxA3Z3Z", "title": "20th Annual International Conference on High Performance Computing", "acronym": "hipc", "groupId": "1000322", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwJPMWC", "doi": "10.1109/HiPC.2012.6507486", "title": "OSQR: A framework for ontology-based semantic query routing in unstructured P2P networks", "normalizedTitle": "OSQR: A framework for ontology-based semantic query routing in unstructured P2P networks", "abstract": "Efficient searching for information is an important goal in unstructured peer-to-peer (P2P) networks. While several P2P systems have been proposed for data sharing purposes, many support only semantics-free keyword searches or coarser grained file name searches. In this paper, we present an ontology based semantic query routing algorithm that performs efficient semantic search in unstructured P2P overlay networks. In our proposed system, the queries are routed in the network by forwarding to peers with highly relevant content in their local storages. To aid in this semantic query routing, we propose a scheme where each peer in the network adheres to a global ontology and semantically tags its local document collection with concepts in the ontology. Based on the semantic tags, peer level semantic summaries are generated, exchanged with neighboring peers and propagated along search paths which aid in efficient local query processing and overlay query routing. An extensive set of simulations performed to evaluate the effectiveness of the system on P2P networks show 380% and 717% improvement in average recall rate, and 410% and 725% improvement in average precision over Ontology Index based Query Routing [20] and Random Walk [18], respectively for dynamic networks at comparable message overheads. Thus, our approach represents a significant advance in practical terms.", "abstracts": [ { "abstractType": "Regular", "content": "Efficient searching for information is an important goal in unstructured peer-to-peer (P2P) networks. While several P2P systems have been proposed for data sharing purposes, many support only semantics-free keyword searches or coarser grained file name searches. In this paper, we present an ontology based semantic query routing algorithm that performs efficient semantic search in unstructured P2P overlay networks. In our proposed system, the queries are routed in the network by forwarding to peers with highly relevant content in their local storages. To aid in this semantic query routing, we propose a scheme where each peer in the network adheres to a global ontology and semantically tags its local document collection with concepts in the ontology. Based on the semantic tags, peer level semantic summaries are generated, exchanged with neighboring peers and propagated along search paths which aid in efficient local query processing and overlay query routing. An extensive set of simulations performed to evaluate the effectiveness of the system on P2P networks show 380% and 717% improvement in average recall rate, and 410% and 725% improvement in average precision over Ontology Index based Query Routing [20] and Random Walk [18], respectively for dynamic networks at comparable message overheads. Thus, our approach represents a significant advance in practical terms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Efficient searching for information is an important goal in unstructured peer-to-peer (P2P) networks. While several P2P systems have been proposed for data sharing purposes, many support only semantics-free keyword searches or coarser grained file name searches. In this paper, we present an ontology based semantic query routing algorithm that performs efficient semantic search in unstructured P2P overlay networks. In our proposed system, the queries are routed in the network by forwarding to peers with highly relevant content in their local storages. To aid in this semantic query routing, we propose a scheme where each peer in the network adheres to a global ontology and semantically tags its local document collection with concepts in the ontology. Based on the semantic tags, peer level semantic summaries are generated, exchanged with neighboring peers and propagated along search paths which aid in efficient local query processing and overlay query routing. An extensive set of simulations performed to evaluate the effectiveness of the system on P2P networks show 380% and 717% improvement in average recall rate, and 410% and 725% improvement in average precision over Ontology Index based Query Routing [20] and Random Walk [18], respectively for dynamic networks at comparable message overheads. Thus, our approach represents a significant advance in practical terms.", "fno": "06507486", "keywords": [ "Summarizing Semantic Knowledge Stores", "Peer To Peer Search", "Semantic Searching", "Query Routing", "Ontology Based Search" ], "authors": [ { "affiliation": "Department of Computer Science Georgia State University Atlanta, GA, USA", "fullName": "D M Rasanjalee Himali", "givenName": "D M Rasanjalee", "surname": "Himali", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computing, Georgia Institute of Technology Atlanta, GA, USA", "fullName": "Shamkant B. Navathe", "givenName": "Shamkant B.", "surname": "Navathe", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science Georgia State University Atlanta, GA, USA", "fullName": "Sushil K Prasad", "givenName": "Sushil K", "surname": "Prasad", "__typename": "ArticleAuthorType" } ], "idPrefix": "hipc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-12-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2012", "issn": null, "isbn": "978-1-4673-2372-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06507485", "articleId": "12OmNvlPkDe", "__typename": "AdjacentArticleType" }, "next": { "fno": "06507487", "articleId": "12OmNCga1V0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wism/2009/3817/0/3817a483", "title": "A Ontology-Based Semantic Reputation Evaluation Method in P2P Network", "doi": null, "abstractUrl": "/proceedings-article/wism/2009/3817a483/12OmNAJm0mX", "parentPublication": { "id": "proceedings/wism/2009/3817/0", "title": "Web Information Systems and Mining, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmwa/2009/3646/0/3646a086", "title": "Expansion Model of Semantic Query Based on Ontology", "doi": null, "abstractUrl": "/proceedings-article/wmwa/2009/3646a086/12OmNAYoKga", "parentPublication": { "id": "proceedings/wmwa/2009/3646/0", "title": "Web Mining and Web-based Application, Pacific-Asia Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2009/3745/3/3745c029", "title": "Ontology Driven Semantic Search over Structure P2P Network", "doi": null, "abstractUrl": "/proceedings-article/his/2009/3745c029/12OmNAYoKq5", "parentPublication": { "id": "proceedings/his/2009/3745/3", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2009/3802/0/3802a494", "title": "SEIF: Search Enhanced by Intelligent Feedback in Unstructured P2P Networks", "doi": null, "abstractUrl": "/proceedings-article/icpp/2009/3802a494/12OmNAoDijK", "parentPublication": { "id": "proceedings/icpp/2009/3802/0", "title": "2009 International Conference on Parallel Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2009/3571/1/3571a094", "title": "Semantic Query Based on Context Approximation of Ontology Structure", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571a094/12OmNCd2rOw", "parentPublication": { "id": "gcis/2009/3571/1", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-euc/2013/5088/0/06832020", "title": "S2P2P: Semantic Search in Unstructured Peer-to-Peer Networks", "doi": null, "abstractUrl": "/proceedings-article/hpcc-euc/2013/06832020/12OmNs4S8Ef", "parentPublication": { "id": "proceedings/hpcc-euc/2013/5088/0", "title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2008/3112/0/3112a525", "title": "Semantic CayNET: A New Semantic P2P Network", "doi": null, "abstractUrl": "/proceedings-article/icicse/2008/3112a525/12OmNxVlTDY", "parentPublication": { "id": "proceedings/icicse/2008/3112/0", "title": "2008 International Conference on Internet Computing in Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2010/7543/0/05562882", "title": "A Semantic Web Service Discovery Model Based on Pastry System", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2010/05562882/12OmNzA6GHi", "parentPublication": { "id": "proceedings/chinagrid/2010/7543/0", "title": "2010 Fifth Annual ChinaGrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2008/3136/0/3136a071", "title": "Efficient Semantic Based Search in Unstructured Peer-to-Peer Networks", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a071/12OmNzUPpqr", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cerma/2010/4204/0/4204a249", "title": "A Routing Scheme for Content Localization in Peer-to-Peer Networks", "doi": null, "abstractUrl": "/proceedings-article/cerma/2010/4204a249/12OmNzX6cgk", "parentPublication": { "id": "proceedings/cerma/2010/4204/0", "title": "Electronics, Robotics and Automotive Mechanics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuisc", "title": "2015 28th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxHryln", "doi": "10.1109/SIBGRAPI.2015.18", "title": "Linea: Building Timelines from Unstructured Text", "normalizedTitle": "Linea: Building Timelines from Unstructured Text", "abstract": "Timelines are often used for summarizing complex, time-evolving, sequences of events. In this work, we propose Linea, a tool that helps users build timelines from unstructured text. Besides providing interactive tools for browsing, selecting, editing, and filtering events, Linea includes mechanisms to build smart defaults, thus providing good starting points for users to create their own timelines. The core component is a novel visualization widget called event matrix, a matrix designed to explore events over time and in different time scales. We illustrate the strengths of our tool with a case study showing that important events can be browsed, timelines can be easily built, and show the result of an information user evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "Timelines are often used for summarizing complex, time-evolving, sequences of events. In this work, we propose Linea, a tool that helps users build timelines from unstructured text. Besides providing interactive tools for browsing, selecting, editing, and filtering events, Linea includes mechanisms to build smart defaults, thus providing good starting points for users to create their own timelines. The core component is a novel visualization widget called event matrix, a matrix designed to explore events over time and in different time scales. We illustrate the strengths of our tool with a case study showing that important events can be browsed, timelines can be easily built, and show the result of an information user evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Timelines are often used for summarizing complex, time-evolving, sequences of events. In this work, we propose Linea, a tool that helps users build timelines from unstructured text. Besides providing interactive tools for browsing, selecting, editing, and filtering events, Linea includes mechanisms to build smart defaults, thus providing good starting points for users to create their own timelines. The core component is a novel visualization widget called event matrix, a matrix designed to explore events over time and in different time scales. We illustrate the strengths of our tool with a case study showing that important events can be browsed, timelines can be easily built, and show the result of an information user evaluation.", "fno": "7962a234", "keywords": [ "Histograms", "Data Visualization", "Buildings", "Layout", "History", "Data Mining", "Feature Extraction", "Event Matrix", "Timeline", "Textual Summaries" ], "authors": [ { "affiliation": null, "fullName": "Tiago Etiene", "givenName": "Tiago", "surname": "Etiene", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paulo Pagliosa", "givenName": "Paulo", "surname": "Pagliosa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Luis Gustavo Nonato", "givenName": "Luis Gustavo", "surname": "Nonato", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "234-241", "year": "2015", "issn": "1530-1834", "isbn": "978-1-4673-7962-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7962a226", "articleId": "12OmNy4IF1F", "__typename": "AdjacentArticleType" }, "next": { "fno": "7962a242", "articleId": "12OmNy2rRVA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/empire/2012/4363/0/06347676", "title": "Evidence-based timelines for project retrospectives &#x2014; A method for assessing requirements engineering in context", "doi": null, "abstractUrl": "/proceedings-article/empire/2012/06347676/12OmNBpVPZY", "parentPublication": { "id": "proceedings/empire/2012/4363/0", "title": "2012 IEEE Second International Workshop on Empirical Requirements Engineering (EmpiRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/3/9618c017", "title": "Mining User Experience through Crowdsourcing: A Property Search Behavior Corpus Derived from Microblogging Timelines", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618c017/12OmNs0TL4g", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/3", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2005/876/0/04118551", "title": "A focus-context browser for multiple timelines", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2005/04118551/12OmNxwENyH", "parentPublication": { "id": "proceedings/jcdl/2005/876/0", "title": "Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2014/6227/0/07042513", "title": "Linea: Tailoring timelines by visual exploration of temporal text", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042513/12OmNy5zssl", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2007/2997/0/29970011", "title": "Timelines from Text: Identification of Syntactic Temporal Relations", "doi": null, "abstractUrl": "/proceedings-article/icsc/2007/29970011/12OmNzV70Pe", "parentPublication": { "id": "proceedings/icsc/2007/2997/0", "title": "International Conference on Semantic Computing (ICSC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/09/07581076", "title": "Timelines Revisited: A Design Space and Considerations for Expressive Storytelling", "doi": null, "abstractUrl": "/journal/tg/2017/09/07581076/13rRUxYrbUN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192669", "title": "TimeLineCurator: Interactive Authoring of Visual Timelines from Unstructured Text", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192669/13rRUxjQyvn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506520", "title": "BONNIE: Building Online Narratives from Noteworthy Interaction Events", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506520/17D45XeKgqe", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2022/6495/0/649500a001", "title": "Text2EL: Exploiting Unstructured Text for Event Log Enrichment", "doi": null, "abstractUrl": "/proceedings-article/sitis/2022/649500a001/1MeoFEMATRK", "parentPublication": { "id": "proceedings/sitis/2022/6495/0", "title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a328", "title": "Exploring Time-Series Through Force-Directed Timelines", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a328/1rSR9aLY29W", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONku", "doi": "10.1109/BigData.2017.8258145", "title": "Graph-based information exploration over structured and unstructured data", "normalizedTitle": "Graph-based information exploration over structured and unstructured data", "abstract": "With the rise of the Semantic Web, several public semantic repositories like Knowledge Bases, Ontologies and Taxonomies have been developed in a variety of domains. For specific domains like the biomedical domain they have already formed a huge valuable infrastructure. On the other hand, the development of efficient algorithms for Natural Language Processing gave us access to the massive knowledge hidden in many unstructured resources. Combining and harvesting these two worlds would result into a very productive knowledge fusion applicable in several domains. In this paper, an extensible framework is presented that focuses on accessing and graphically presenting the knowledge coming from all available structured and unstructured resources. An abstraction formalism for representing any type of query based on graphs is the base of this approach. This formalism makes the framework accessible to non-expert users that have no knowledge of constructing queries in any querying language and barely understand what structured and unstructured resources are. The architecture that will allow for the framework to be adaptable to all available resources is described along with a proof of concept implementation in the biomedical domain.", "abstracts": [ { "abstractType": "Regular", "content": "With the rise of the Semantic Web, several public semantic repositories like Knowledge Bases, Ontologies and Taxonomies have been developed in a variety of domains. For specific domains like the biomedical domain they have already formed a huge valuable infrastructure. On the other hand, the development of efficient algorithms for Natural Language Processing gave us access to the massive knowledge hidden in many unstructured resources. Combining and harvesting these two worlds would result into a very productive knowledge fusion applicable in several domains. In this paper, an extensible framework is presented that focuses on accessing and graphically presenting the knowledge coming from all available structured and unstructured resources. An abstraction formalism for representing any type of query based on graphs is the base of this approach. This formalism makes the framework accessible to non-expert users that have no knowledge of constructing queries in any querying language and barely understand what structured and unstructured resources are. The architecture that will allow for the framework to be adaptable to all available resources is described along with a proof of concept implementation in the biomedical domain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rise of the Semantic Web, several public semantic repositories like Knowledge Bases, Ontologies and Taxonomies have been developed in a variety of domains. For specific domains like the biomedical domain they have already formed a huge valuable infrastructure. On the other hand, the development of efficient algorithms for Natural Language Processing gave us access to the massive knowledge hidden in many unstructured resources. Combining and harvesting these two worlds would result into a very productive knowledge fusion applicable in several domains. In this paper, an extensible framework is presented that focuses on accessing and graphically presenting the knowledge coming from all available structured and unstructured resources. An abstraction formalism for representing any type of query based on graphs is the base of this approach. This formalism makes the framework accessible to non-expert users that have no knowledge of constructing queries in any querying language and barely understand what structured and unstructured resources are. The architecture that will allow for the framework to be adaptable to all available resources is described along with a proof of concept implementation in the biomedical domain.", "fno": "08258145", "keywords": [ "Tools", "Semantics", "Ontologies", "Data Visualization", "Databases", "Semantic Web", "Natural Language Processing", "Structured", "Unstructured", "Graph Based", "Exploring Relations", "Biomedical" ], "authors": [ { "affiliation": "School of Computer Science and Electronic Engineering, University of Essex, Essex, UK", "fullName": "Giannis Koumoutsos", "givenName": "Giannis", "surname": "Koumoutsos", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Electronic Engineering, University of Essex, Essex, UK", "fullName": "Maria Fasli", "givenName": "Maria", "surname": "Fasli", "__typename": "ArticleAuthorType" }, { "affiliation": "Linguamatics, Cambridge, UK", "fullName": "Ian Lewin", "givenName": "Ian", "surname": "Lewin", "__typename": "ArticleAuthorType" }, { "affiliation": "Linguamatics, Cambridge, UK", "fullName": "David Milward", "givenName": "David", "surname": "Milward", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "1991-2000", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08258144", "articleId": "17D45XcttlJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08258146", "articleId": "17D45XwUAKl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/uksim/2009/3593/0/3593a640", "title": "Skeletons and Semantic Web Descriptions to Integrate Parallel Programming into Ontology Learning Frameworks", "doi": null, "abstractUrl": "/proceedings-article/uksim/2009/3593a640/12OmNB06l6L", "parentPublication": { "id": "proceedings/uksim/2009/3593/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sutc/2008/3158/0/3158a386", "title": "BioSemantic System: Applications of Structured Natural Language to Biological and Biochemical Research", "doi": null, "abstractUrl": "/proceedings-article/sutc/2008/3158a386/12OmNBQC89G", "parentPublication": { "id": "proceedings/sutc/2008/3158/0", "title": "2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2015/9371/0/07396639", "title": "A Combined Index for Mixed Structured and Unstructured Data", "doi": null, "abstractUrl": "/proceedings-article/wisa/2015/07396639/12OmNqJZgyP", "parentPublication": { "id": "proceedings/wisa/2015/9371/0", "title": "2015 12th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2011/4436/2/4436b080", "title": "Enabling Structured Queries over Unstructured Documents", "doi": null, "abstractUrl": "/proceedings-article/mdm/2011/4436b080/12OmNxT56Cf", "parentPublication": { "id": "proceedings/mdm/2011/4436/2", "title": "2011 IEEE 12th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2012/4891/0/4891a005", "title": "Workshop on Mining Unstructured Data (MUD) ... Because \"Mining Unstructured Data is Like Fishing in Muddy Waters\"!", "doi": null, "abstractUrl": "/proceedings-article/wcre/2012/4891a005/12OmNxYtu7W", "parentPublication": { "id": "proceedings/wcre/2012/4891/0", "title": "2012 19th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2010/8911/0/05645499", "title": "Workshop on Mining Unstructured Data (MUD) because \"Mining Unstructured Data is Like Fishing in Muddy Waters\"!", "doi": null, "abstractUrl": "/proceedings-article/wcre/2010/05645499/12OmNyuPLjx", "parentPublication": { "id": "proceedings/wcre/2010/8911/0", "title": "2010 17th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2018/5892/0/08466406", "title": "Automatic Extraction of Structural Model from Semi Structured Software Requirement Specification", "doi": null, "abstractUrl": "/proceedings-article/icis/2018/08466406/13WBGWbbRFM", "parentPublication": { "id": "proceedings/icis/2018/5892/0", "title": "2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a220", "title": "iASiS Open Data Graph: Automated Semantic Integration of Disease-Specific Knowledge", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a220/1mLMgCXDo7S", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a029", "title": "Model-based Merging of Open-Domain Ontologies", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a029/1pP3CrUJM2c", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378443", "title": "Challenges and Barriers in Applying Natural Language Processing to Medical Examiner Notes from Fatal Opioid Poisoning Cases", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378443/1s64Vgieure", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MeoElmyyEo", "title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "acronym": "sitis", "groupId": "10089803", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1MeoFEMATRK", "doi": "10.1109/SITIS57111.2022.00010", "title": "Text2EL: Exploiting Unstructured Text for Event Log Enrichment", "normalizedTitle": "Text2EL: Exploiting Unstructured Text for Event Log Enrichment", "abstract": "Process mining provides a range of methods and techniques to analyse business processes through information stored in so-called event logs. The richer these event logs and the higher quality they are, the more insights we can obtain. Till now, information in the form of unstructured text, e.g. notes, comments, reviews, and posts, is not fully and systematically exploited for the purposes of log enrichment. In this paper, we introduce Text2EL, a two-phase event log enrichment approach based on unstructured text. In Phase 1, events, case attributes, and event attributes are extracted from unstructured text associated with organisational processes. In Phase 2, the extracted events and attributes are semantically and contextually validated before enriching the event log. Our approach applies techniques from natural language processing, sentence embeddings, and contextual and expression validation. We evaluated the completeness, concordance, and correctness of an enriched event log through experiments with a real-life healthcare data set. The experiments showed the feasibility and applicability of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "Process mining provides a range of methods and techniques to analyse business processes through information stored in so-called event logs. The richer these event logs and the higher quality they are, the more insights we can obtain. Till now, information in the form of unstructured text, e.g. notes, comments, reviews, and posts, is not fully and systematically exploited for the purposes of log enrichment. In this paper, we introduce Text2EL, a two-phase event log enrichment approach based on unstructured text. In Phase 1, events, case attributes, and event attributes are extracted from unstructured text associated with organisational processes. In Phase 2, the extracted events and attributes are semantically and contextually validated before enriching the event log. Our approach applies techniques from natural language processing, sentence embeddings, and contextual and expression validation. We evaluated the completeness, concordance, and correctness of an enriched event log through experiments with a real-life healthcare data set. The experiments showed the feasibility and applicability of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Process mining provides a range of methods and techniques to analyse business processes through information stored in so-called event logs. The richer these event logs and the higher quality they are, the more insights we can obtain. Till now, information in the form of unstructured text, e.g. notes, comments, reviews, and posts, is not fully and systematically exploited for the purposes of log enrichment. In this paper, we introduce Text2EL, a two-phase event log enrichment approach based on unstructured text. In Phase 1, events, case attributes, and event attributes are extracted from unstructured text associated with organisational processes. In Phase 2, the extracted events and attributes are semantically and contextually validated before enriching the event log. Our approach applies techniques from natural language processing, sentence embeddings, and contextual and expression validation. We evaluated the completeness, concordance, and correctness of an enriched event log through experiments with a real-life healthcare data set. The experiments showed the feasibility and applicability of our approach.", "fno": "649500a001", "keywords": [ "Data Mining", "Health Care", "Natural Language Processing", "Text Analysis", "Analyse Business Processes", "Enriched Event", "Event Attributes", "Extracted Events", "Natural Language Processing", "Organisational Processes", "Process Mining", "So Called Event Logs", "Text 2 EL", "Two Phase Event Log Enrichment", "Unstructured Text", "Data Integrity", "Semantics", "Medical Services", "Natural Language Processing", "Data Mining", "Business", "Event Log", "Data Quality", "Unstructured Text", "Natural Language Processing", "Semantic Validation" ], "authors": [ { "affiliation": "Queensland University of Technology,Brisbane,Australia", "fullName": "Dakshi Tharanga Kapugama Geeganage", "givenName": "Dakshi Tharanga Kapugama", "surname": "Geeganage", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology,Brisbane,Australia", "fullName": "Moe Thandar Wynn", "givenName": "Moe Thandar", "surname": "Wynn", "__typename": "ArticleAuthorType" }, { "affiliation": "Queensland University of Technology,Brisbane,Australia", "fullName": "Arthur H.M. ter Hofstede", "givenName": "Arthur H.M.", "surname": "ter Hofstede", "__typename": "ArticleAuthorType" } ], "idPrefix": "sitis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2022", "issn": null, "isbn": "978-1-6654-6495-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "649500z030", "articleId": "1MeoLcjugSI", "__typename": "AdjacentArticleType" }, "next": { "fno": "649500a009", "articleId": "1MeoNIHC92w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pst/2008/3390/0/3390a099", "title": "LogView: Visualizing Event Log Clusters", "doi": null, "abstractUrl": "/proceedings-article/pst/2008/3390a099/12OmNvnwVql", "parentPublication": { "id": "proceedings/pst/2008/3390/0", "title": "2008 Sixth Annual Conference on Privacy, Security and Trust", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a503", "title": "Experiments with Semantic Enrichment for Event Classification in Tweets", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a503/12OmNwvDQs7", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edoc/2014/5470/0/5470a210", "title": "The Deep Data Warehouse: Link-Based Integration and Enrichment of Warehouse Data and Unstructured Content", "doi": null, "abstractUrl": "/proceedings-article/edoc/2014/5470a210/12OmNxwENuq", "parentPublication": { "id": "proceedings/edoc/2014/5470/0", "title": "2014 IEEE 18th International Enterprise Distributed Object Computing Conference (EDOC 2014)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2010/6802/0/05463281", "title": "Abstracting log lines to log event types for mining software system logs", "doi": null, "abstractUrl": "/proceedings-article/msr/2010/05463281/12OmNy1SFNA", "parentPublication": { "id": "proceedings/msr/2010/6802/0", "title": "2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b164", "title": "An Approach to Evaluate the Local Completeness of an Event Log", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b164/12OmNz61dD7", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2016/0990/0/0990a272", "title": "Usable Privacy-Aware Logging for Unstructured Log Entries", "doi": null, "abstractUrl": "/proceedings-article/ares/2016/0990a272/12OmNzdoMVp", "parentPublication": { "id": "proceedings/ares/2016/0990/0", "title": "2016 11th International Conference on Availability, Reliability and Security (ARES )", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascots/2018/6886/0/688600a237", "title": "Improving Performances of Log Mining for Anomaly Prediction Through NLP-Based Log Parsing", "doi": null, "abstractUrl": "/proceedings-article/mascots/2018/688600a237/17D45XvMcez", "parentPublication": { "id": "proceedings/mascots/2018/6886/0", "title": "2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020930", "title": "A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020930/1KfRmnw3WcE", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2018/1390/0/139000a098", "title": "Business Data Enrichment: Issues and Challenges", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2018/139000a098/1dPoLLqe8Ew", "parentPublication": { "id": "proceedings/apwc-on-cse/2018/1390/0", "title": "2018 5th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a516", "title": "A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a516/1rgGkPq4FtS", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1s645BaTzVu", "title": "2020 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1s648IWoE00", "doi": "10.1109/BigData50022.2020.9378259", "title": "SwissFinder: Identifying Swiss Websites from Unstructured Content", "normalizedTitle": "SwissFinder: Identifying Swiss Websites from Unstructured Content", "abstract": "Finding companies' websites is important when building business databases. However, automatically finding a company's website based on its name or its official entry in a registry is challenging, as companies often have similar names, acronyms, or descriptions. In this context, we built a system to evaluate different features and classifiers to automatically identify a company's website from unstructured content.", "abstracts": [ { "abstractType": "Regular", "content": "Finding companies' websites is important when building business databases. However, automatically finding a company's website based on its name or its official entry in a registry is challenging, as companies often have similar names, acronyms, or descriptions. In this context, we built a system to evaluate different features and classifiers to automatically identify a company's website from unstructured content.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Finding companies' websites is important when building business databases. However, automatically finding a company's website based on its name or its official entry in a registry is challenging, as companies often have similar names, acronyms, or descriptions. In this context, we built a system to evaluate different features and classifiers to automatically identify a company's website from unstructured content.", "fno": "09378259", "keywords": [ "Business Data Processing", "Database Management Systems", "Pattern Classification", "Web Sites", "Unstructured Content", "Swiss Finder", "Company Web Site", "Business Databases", "Classifiers", "Swiss Web Sites", "Terminology", "Databases", "Conferences", "Companies", "Big Data", "Web Search", "Business", "Web Searching And Information Discovery" ], "authors": [ { "affiliation": "U. of Fribourg,Switzerland", "fullName": "Zeno Bardelli", "givenName": "Zeno", "surname": "Bardelli", "__typename": "ArticleAuthorType" }, { "affiliation": "U. of Fribourg,Switzerland", "fullName": "Ines Arous", "givenName": "Ines", "surname": "Arous", "__typename": "ArticleAuthorType" }, { "affiliation": "U. of Fribourg,Switzerland", "fullName": "Philippe Cudré-Mauroux", "givenName": "Philippe", "surname": "Cudré-Mauroux", "__typename": "ArticleAuthorType" }, { "affiliation": "armasuisse,Switzerland", "fullName": "Ljiljana Dolamic", "givenName": "Ljiljana", "surname": "Dolamic", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "5630-5632", "year": "2020", "issn": null, "isbn": "978-1-7281-6251-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09377868", "articleId": "1s64iFjdczK", "__typename": "AdjacentArticleType" }, "next": { "fno": "09378135", "articleId": "1s648ETtf0Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bdcloud/2014/6719/0/6719a183", "title": "Multilingual Sentiment Classification on Large Textual Data", "doi": null, "abstractUrl": "/proceedings-article/bdcloud/2014/6719a183/12OmNBscCWS", "parentPublication": { "id": "proceedings/bdcloud/2014/6719/0", "title": "2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a325", "title": "Detecting Phishing Websites Based on the Study of the Financial Industry Webserver Logs", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a325/12OmNqBKU9H", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2017/3035/1/3035a302", "title": "Business Constraints Integration in a Search Engine Optimization Fuzzy Decision Support System", "doi": null, "abstractUrl": "/proceedings-article/cbi/2017/3035a302/12OmNvTk00x", "parentPublication": { "id": "cbi/2017/3035/1", "title": "2017 IEEE 19th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2006/2751/0/04041242", "title": "Empirical Analysis of Company's Performance and Governance Structure of Listed Companies of High-Tech in China", "doi": null, "abstractUrl": "/proceedings-article/apscc/2006/04041242/12OmNxxdZEB", "parentPublication": { "id": "proceedings/apscc/2006/2751/0", "title": "2006 IEEE Asia-Pacific Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004411", "title": "A big data aggregation, analysis and exploitation integrated platform for increasing social management intelligence", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004411/12OmNzgwmOR", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840892", "title": "Leveraging social big data for performance evaluation of E-commerce websites", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840892/12OmNzzfTlO", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/an/2022/01/09707851", "title": "Early AI Applications at Schlumberger", "doi": null, "abstractUrl": "/magazine/an/2022/01/09707851/1APlyB25Z2U", "parentPublication": { "id": "mags/an", "title": "IEEE Annals of the History of Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2022/5537/0/553700a432", "title": "RP2A: Rare Process-Pattern Analysis &#x2013; Identifying Potential Problem Process-Patterns by Analyzing System Execution Data", "doi": null, "abstractUrl": "/proceedings-article/apsec/2022/553700a432/1KOvbH57Eqs", "parentPublication": { "id": "proceedings/apsec/2022/5537/0", "title": "2022 29th Asia-Pacific Software Engineering Conference (APSEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2022/7408/0/740800a097", "title": "Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2022/740800a097/1Lxf3DPZhBu", "parentPublication": { "id": "proceedings/tps-isa/2022/7408/0", "title": "2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2020/7125/0/712500a071", "title": "Debugging Hiring: What Went Right and What Went Wrong in the Technical Interview Process", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2020/712500a071/1pmQasGSAes", "parentPublication": { "id": "proceedings/icse-seis/2020/7125/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wRIq5ih6ms", "title": "2020 13th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "acronym": "icicta", "groupId": "1002487", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1wRIt1mx368", "doi": "10.1109/ICICTA51737.2020.00152", "title": "Visualization fusion method for unstructured data of power grid based on improved clustering", "normalizedTitle": "Visualization fusion method for unstructured data of power grid based on improved clustering", "abstract": "In order to shorten the visualization fusion time of unstructured data and improve the fusion effect, a visualization fusion method of unstructured data based on improved clustering is proposed. The basic situation of unstructured data of power grid is analyzed, and the data acquisition architecture is designed. Based on the collected data, multiple sensors are used to measure the same object. The influence factors are obtained by calculating historical data, historical data fusion results and observation values. The visual fusion objective function is designed, and the influence factor is used to modify the objective function, and the modified unstructured data fusion results are output. The experimental results show that the fusion effect of this method is good, the fusion time is short, and the practical application effect is good.", "abstracts": [ { "abstractType": "Regular", "content": "In order to shorten the visualization fusion time of unstructured data and improve the fusion effect, a visualization fusion method of unstructured data based on improved clustering is proposed. The basic situation of unstructured data of power grid is analyzed, and the data acquisition architecture is designed. Based on the collected data, multiple sensors are used to measure the same object. The influence factors are obtained by calculating historical data, historical data fusion results and observation values. The visual fusion objective function is designed, and the influence factor is used to modify the objective function, and the modified unstructured data fusion results are output. The experimental results show that the fusion effect of this method is good, the fusion time is short, and the practical application effect is good.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to shorten the visualization fusion time of unstructured data and improve the fusion effect, a visualization fusion method of unstructured data based on improved clustering is proposed. The basic situation of unstructured data of power grid is analyzed, and the data acquisition architecture is designed. Based on the collected data, multiple sensors are used to measure the same object. The influence factors are obtained by calculating historical data, historical data fusion results and observation values. The visual fusion objective function is designed, and the influence factor is used to modify the objective function, and the modified unstructured data fusion results are output. The experimental results show that the fusion effect of this method is good, the fusion time is short, and the practical application effect is good.", "fno": "866600a690", "keywords": [ "Data Acquisition", "Data Fusion", "Data Visualisation", "Pattern Clustering", "Power Engineering Computing", "Power Grids", "Visualization Fusion Method", "Power Grid", "Improved Clustering", "Visualization Fusion Time", "Fusion Effect", "Data Acquisition Architecture", "Historical Data Fusion Results", "Visual Fusion Objective Function", "Modified Unstructured Data Fusion Results", "Visualization", "Data Acquisition", "Data Visualization", "Data Integration", "Computer Architecture", "Linear Programming", "Power Grids", "Improved Clustering", "Power Grid", "Unstructured Data", "Visual Fusion" ], "authors": [ { "affiliation": "State Grid Xinjiang Economic Research Institute,Urumqi,Xinjiang,China,830011", "fullName": "Zhiyun Hu", "givenName": "Zhiyun", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Xinjiang Economic Research Institute,Urumqi,Xinjiang,China,830011", "fullName": "Honglian Zhou", "givenName": "Honglian", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Xinjiang Economic Research Institute,Urumqi,Xinjiang,China,830011", "fullName": "Lin Fu", "givenName": "Lin", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Xinjiang Economic Research Institute,Urumqi,Xinjiang,China,830011", "fullName": "Qian Cao", "givenName": "Qian", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "State Grid Xinjiang Economic Research Institute,Urumqi,Xinjiang,China,830011", "fullName": "Jianli Zhu", "givenName": "Jianli", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Engineering, Xi'an University of Technology,Xi'an,China,710048", "fullName": "Xiaofan Wang", "givenName": "Xiaofan", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "690-697", "year": "2020", "issn": null, "isbn": "978-1-7281-8666-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "866600a687", "articleId": "1wRIybsFooU", "__typename": "AdjacentArticleType" }, "next": { "fno": "866600a698", "articleId": "1wRIBKeCcM0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icime/2009/3595/0/3595a461", "title": "fCombMNZ: An Improved Data Fusion Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a461/12OmNyQphfD", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1995/7187/0/71870143", "title": "Sweeping Simplices: A Fast Iso-Surface Extraction Algorithm for Unstructured Grids", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1995/71870143/12OmNywfKKj", "parentPublication": { "id": "proceedings/ieee-vis/1995/7187/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156383", "title": "Advanced lighting for unstructured-grid data visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156383/12OmNz2C1sz", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nbis/2014/4224/0/4224a416", "title": "Applying Fusion Visualization to Unstructured Data", "doi": null, "abstractUrl": "/proceedings-article/nbis/2014/4224a416/12OmNzJbQTP", "parentPublication": { "id": "proceedings/nbis/2014/4224/0", "title": "2014 17th International Conference on Network-Based Information Systems (NBiS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061541", "title": "Fast, Memory-Efficient Cell Location in Unstructured Grids for Visualization", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061541/13rRUB6Sq0w", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b034", "title": "Data Fusion Method of Data News Report Based on Relative Difference Coefficient", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b034/1ByeVzzzmzS", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icftic/2022/2195/0/10075180", "title": "Research on Fault Diagnosis Model Based on the Fusion of Communication Network and Grid Data", "doi": null, "abstractUrl": "/proceedings-article/icftic/2022/10075180/1LRlawwQe9W", "parentPublication": { "id": "proceedings/icftic/2022/2195/0", "title": "2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccnea/2019/3977/0/397700a387", "title": "Multi-Source Large Data Fusion Access Method for Distribution Communication Network", "doi": null, "abstractUrl": "/proceedings-article/iccnea/2019/397700a387/1fw1w032nJu", "parentPublication": { "id": "proceedings/iccnea/2019/3977/0", "title": "2019 International Conference on Computer Network, Electronic and Automation (ICCNEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2021/0232/0/023200a021", "title": "Application of Improved Region Growing Algorithm in WSNs Data Acquisition and Fusion", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2021/023200a021/1yLPETC00Ba", "parentPublication": { "id": "proceedings/icnisc/2021/0232/0", "title": "2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icwcsg/2021/2598/0/259800a574", "title": "Index Method of Unstructured Data in Power System Based on Improved B+ Tree", "doi": null, "abstractUrl": "/proceedings-article/icwcsg/2021/259800a574/1yQBk2lClOM", "parentPublication": { "id": "proceedings/icwcsg/2021/2598/0", "title": "2021 International Conference on Wireless Communications and Smart Grid (ICWCSG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZq8", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNBPtJET", "doi": "10.1109/BIBM.2014.6999353", "title": "The clinical cohort study on prospective efficacy of CHD Therapeutic Regimen of “the regulation of Pi(Spleen) and protection of Xin(Heart)” method treating CHD patients", "normalizedTitle": "The clinical cohort study on prospective efficacy of CHD Therapeutic Regimen of “the regulation of Pi(Spleen) and protection of Xin(Heart)” method treating CHD patients", "abstract": "Objective: Evaluate the prospective efficacy of CHD Therapeutic Regimen of “regulation of Pi(Spleen)” Method. Methods: With the form of prospective cohort study, 572 patients were observed from December, 2007 to August, 2010, in which 35 cases of disqualification were rejected, and 537 cases were accepted for research and statistical analysis. The 537 patients were randomly divided into Exposed Group and Unexposed Group. Exposed Group was treated by CHD Therapeutic Regimen of “The regulation of Pi(Spleen) and Protection of Xin(Heart) (RPRS) Method. Unexposed Group was treated was treated by other therapeutic regimens of TCM except the RPRS Method. Both Exposed Group and Unexposed Group were treated with standard Western Medicine therapies while TCM treatments. The angina pectoris scores, SAQ, death rate, revascularization because of myocardial ischemia events, and end event such as emergency treatments and readmission etc. because of cardiovascular events at the 360th day after treatments were observed. Results: After treatments, there were significant differences on angina pectoris scores, SAQ, revascularization because of myocardial ischemia events, emergency treatments and admission rate between 2 groups (P < 0.05), and Exposed Group was better than Unexposed Group. Conclusion: CHD Therapeutic Regimen of RPRS Method is reliable on improving prospective efficacy of treating CHD.", "abstracts": [ { "abstractType": "Regular", "content": "Objective: Evaluate the prospective efficacy of CHD Therapeutic Regimen of “regulation of Pi(Spleen)” Method. Methods: With the form of prospective cohort study, 572 patients were observed from December, 2007 to August, 2010, in which 35 cases of disqualification were rejected, and 537 cases were accepted for research and statistical analysis. The 537 patients were randomly divided into Exposed Group and Unexposed Group. Exposed Group was treated by CHD Therapeutic Regimen of “The regulation of Pi(Spleen) and Protection of Xin(Heart) (RPRS) Method. Unexposed Group was treated was treated by other therapeutic regimens of TCM except the RPRS Method. Both Exposed Group and Unexposed Group were treated with standard Western Medicine therapies while TCM treatments. The angina pectoris scores, SAQ, death rate, revascularization because of myocardial ischemia events, and end event such as emergency treatments and readmission etc. because of cardiovascular events at the 360th day after treatments were observed. Results: After treatments, there were significant differences on angina pectoris scores, SAQ, revascularization because of myocardial ischemia events, emergency treatments and admission rate between 2 groups (P < 0.05), and Exposed Group was better than Unexposed Group. Conclusion: CHD Therapeutic Regimen of RPRS Method is reliable on improving prospective efficacy of treating CHD.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Objective: Evaluate the prospective efficacy of CHD Therapeutic Regimen of “regulation of Pi(Spleen)” Method. Methods: With the form of prospective cohort study, 572 patients were observed from December, 2007 to August, 2010, in which 35 cases of disqualification were rejected, and 537 cases were accepted for research and statistical analysis. The 537 patients were randomly divided into Exposed Group and Unexposed Group. Exposed Group was treated by CHD Therapeutic Regimen of “The regulation of Pi(Spleen) and Protection of Xin(Heart) (RPRS) Method. Unexposed Group was treated was treated by other therapeutic regimens of TCM except the RPRS Method. Both Exposed Group and Unexposed Group were treated with standard Western Medicine therapies while TCM treatments. The angina pectoris scores, SAQ, death rate, revascularization because of myocardial ischemia events, and end event such as emergency treatments and readmission etc. because of cardiovascular events at the 360th day after treatments were observed. Results: After treatments, there were significant differences on angina pectoris scores, SAQ, revascularization because of myocardial ischemia events, emergency treatments and admission rate between 2 groups (P < 0.05), and Exposed Group was better than Unexposed Group. Conclusion: CHD Therapeutic Regimen of RPRS Method is reliable on improving prospective efficacy of treating CHD.", "fno": "06999353", "keywords": [ "Hospitals", "Myocardium", "Medical Diagnostic Imaging", "Training", "Diseases", "Standards", "End Events", "CHD", "Prospective Efficacy", "Angina Pectoris Scores", "Quality Of Life" ], "authors": [ { "affiliation": "Cardiac Disease Treatment Center, Guangdong Hospital of Traditional Chinese Medicine, Guangdong Provincial ACHDemy of Chinese Medical Sciences, Guangzhou 510006", "fullName": "Danping Xu", "givenName": "Danping", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Cardiac Disease Treatment Center, Guangdong Hospital of Traditional Chinese Medicine, Guangdong Provincial ACHDemy of Chinese Medical Sciences, Guangzhou 510006", "fullName": "Xia Wang", "givenName": "Xia", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Cardiac Disease Treatment Center, Guangdong Hospital of Traditional Chinese Medicine, Guangdong Provincial ACHDemy of Chinese Medical Sciences, Guangzhou 510006", "fullName": "Wenjie Luo", "givenName": "Wenjie", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "Cardiac Disease Treatment Center, Guangdong Hospital of Traditional Chinese Medicine, Guangdong Provincial ACHDemy of Chinese Medical Sciences, Guangzhou 510006", "fullName": "Xiaoqing Li", "givenName": "Xiaoqing", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Cardiac Disease Treatment Center, Guangdong Hospital of Traditional Chinese Medicine, Guangdong Provincial ACHDemy of Chinese Medical Sciences, Guangzhou 510006", "fullName": "Wu Huanlin", "givenName": "Wu", "surname": "Huanlin", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "179-181", "year": "2014", "issn": null, "isbn": "978-1-4799-5669-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06999352", "articleId": "12OmNqIhG7H", "__typename": "AdjacentArticleType" }, "next": { "fno": "06999354", "articleId": "12OmNBSBkht", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2010/8303/0/05703872", "title": "Empirical study on treatment of Coronary Heart Disease with famous doctors' method of regulating spleen and stomach based on simplified point-wise mutual information", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703872/12OmNA0dMJO", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999317", "title": "Clinical research on treatment of insomnia due to deficiency of the heart and spleen treated by acupuncture with ear pricking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999317/12OmNAQrYBd", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999349", "title": "Effect of Chinese bone-seting for chronic low back pain", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999349/12OmNASILXd", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732674", "title": "The effect of Bo's abdominal acupuncture combined with rehabilitation exercise on shoulder pain after stroke", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732674/12OmNBrV1LZ", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2018/4210/0/421001a131", "title": "Neural Network Based Clinical Treatment Decision Support System for Co-existing Medical Conditions", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a131/12OmNqBKUfs", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703903", "title": "Strategies to enhance computer assisted differential diagnosis in Traditional Chinese Medicine for Coronary Heart Disease: Validity and standardisation of a diagnostic instrument", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703903/12OmNrY3Lsx", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999311", "title": "Application of acupuncture on coronary heart disease treatment: A text mining study", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999311/12OmNyz5JTs", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703911", "title": "Symptom selection of inquiry diagnosis data for coronary heart disease in Traditional Chinese Medicine by using social network techniques", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703911/12OmNz61dnT", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a168", "title": "Factor Analysis of Medical Expenses of the Hepatitis a Patients in Guangdong", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a168/12OmNzlD9fq", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2013/01/mcg2013010080", "title": "The Therapeutic Lamp: Treating Small-Animal Phobias", "doi": null, "abstractUrl": "/magazine/cg/2013/01/mcg2013010080/13rRUB6SpUH", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZq8", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqOOrKm", "doi": "10.1109/BIBM.2014.6999338", "title": "The study of the constitution, mucosal inflammation, Chinese medicine syndrome types and clinical pathology in IgA nephropathy", "normalizedTitle": "The study of the constitution, mucosal inflammation, Chinese medicine syndrome types and clinical pathology in IgA nephropathy", "abstract": "Objective: This study is to investigate the constitution, mucosal inflammation, Chinese medicine syndrome types, clinical and pathological characteristics of patients with IgA nephropathy (IgA N)and to analysis their relationships in order to provide the scientfic basis and new ideas for the management of IgAN. Methods: Through the cross sectional and retrospective study, we investigated 262 patients with IgAN in the Hospital of Guangdong provincical TCM hospital and the Third Hospital of Peking Universitiy between January 2011 and January 2014. We collected the Chinese medicine syndrome types, clinical and pathological data, the constitution questionnaire and the mucosal inflammation. Results: The constitution of yin-yang harmony was the most common(40.5%), followed by qideficiency(31.3%). Upper respiratory infection, chronic periodontitis, scytitis were very common in patients with IgAN. Qi deficiency of spleen and kidney were the common type: 69.1%. Asymptomatic abnormal urinalysis(50.4% of the patients)and CKD 1(48.5%)were the most common clinical Presentation. HaasD was the most common pathological presentation(47.3%). Patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony presented with more nonmucosal inflammation, more CKD3-4, higher than the latter in the level of serum creatinine, urea nitrogen, serum CH50 and lower in GFR clinically as compared to those patients with the constitution of qi deficiency. Conclusions: IgAN onsets silently and asymptomatic abnormal urinalysis was the most common clinical type. Frequent upper respiratory infection, chronic periodontitis and recurrent scytitis were common in patients with IgAN. IgAN patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony had higher serum CH50 level, low incidence of mucosal inflammation, increased risk of declined renal function and more sever renal pathlogical changes than that of patients with qi deficiency of spleen and kidney and the constitution of qi deficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Objective: This study is to investigate the constitution, mucosal inflammation, Chinese medicine syndrome types, clinical and pathological characteristics of patients with IgA nephropathy (IgA N)and to analysis their relationships in order to provide the scientfic basis and new ideas for the management of IgAN. Methods: Through the cross sectional and retrospective study, we investigated 262 patients with IgAN in the Hospital of Guangdong provincical TCM hospital and the Third Hospital of Peking Universitiy between January 2011 and January 2014. We collected the Chinese medicine syndrome types, clinical and pathological data, the constitution questionnaire and the mucosal inflammation. Results: The constitution of yin-yang harmony was the most common(40.5%), followed by qideficiency(31.3%). Upper respiratory infection, chronic periodontitis, scytitis were very common in patients with IgAN. Qi deficiency of spleen and kidney were the common type: 69.1%. Asymptomatic abnormal urinalysis(50.4% of the patients)and CKD 1(48.5%)were the most common clinical Presentation. HaasD was the most common pathological presentation(47.3%). Patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony presented with more nonmucosal inflammation, more CKD3-4, higher than the latter in the level of serum creatinine, urea nitrogen, serum CH50 and lower in GFR clinically as compared to those patients with the constitution of qi deficiency. Conclusions: IgAN onsets silently and asymptomatic abnormal urinalysis was the most common clinical type. Frequent upper respiratory infection, chronic periodontitis and recurrent scytitis were common in patients with IgAN. IgAN patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony had higher serum CH50 level, low incidence of mucosal inflammation, increased risk of declined renal function and more sever renal pathlogical changes than that of patients with qi deficiency of spleen and kidney and the constitution of qi deficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Objective: This study is to investigate the constitution, mucosal inflammation, Chinese medicine syndrome types, clinical and pathological characteristics of patients with IgA nephropathy (IgA N)and to analysis their relationships in order to provide the scientfic basis and new ideas for the management of IgAN. Methods: Through the cross sectional and retrospective study, we investigated 262 patients with IgAN in the Hospital of Guangdong provincical TCM hospital and the Third Hospital of Peking Universitiy between January 2011 and January 2014. We collected the Chinese medicine syndrome types, clinical and pathological data, the constitution questionnaire and the mucosal inflammation. Results: The constitution of yin-yang harmony was the most common(40.5%), followed by qideficiency(31.3%). Upper respiratory infection, chronic periodontitis, scytitis were very common in patients with IgAN. Qi deficiency of spleen and kidney were the common type: 69.1%. Asymptomatic abnormal urinalysis(50.4% of the patients)and CKD 1(48.5%)were the most common clinical Presentation. HaasD was the most common pathological presentation(47.3%). Patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony presented with more nonmucosal inflammation, more CKD3-4, higher than the latter in the level of serum creatinine, urea nitrogen, serum CH50 and lower in GFR clinically as compared to those patients with the constitution of qi deficiency. Conclusions: IgAN onsets silently and asymptomatic abnormal urinalysis was the most common clinical type. Frequent upper respiratory infection, chronic periodontitis and recurrent scytitis were common in patients with IgAN. IgAN patients with qi deficiency of spleen and kidney and the constitution of yin-yang harmony had higher serum CH50 level, low incidence of mucosal inflammation, increased risk of declined renal function and more sever renal pathlogical changes than that of patients with qi deficiency of spleen and kidney and the constitution of qi deficiency.", "fno": "06999338", "keywords": [ "Constitution", "Medical Diagnostic Imaging", "Kidney", "Pathology", "Hospitals", "Diseases", "Clinical Pathological Relationship", "Ig A Nephropathy", "Constitution", "Mucosal Inflammation", "Chinese Medicine Syndrome Type" ], "authors": [ { "affiliation": "Renal Division, Guangdong Province Zhuhai Hospital of Chinese Medicine; Zhuhai, Guangdong provincice, China", "fullName": "Li-Chang Liu", "givenName": "Li-Chang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Guangdong Province Hospital of Chinese Medicine; Guangzhou, Guangdong provincice, China", "fullName": "Xu-Sheng Liu", "givenName": "Xu-Sheng", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Third Hospital of Peking Universitiy; Beijing, China", "fullName": "Tao Wang", "givenName": "Tao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Guangdong Province Zhuhai Hospital of Chinese Medicine; Zhuhai, Guangdong provincice, China", "fullName": "Xin Liu", "givenName": "Xin", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Third Hospital of Peking Universitiy; Beijing, China", "fullName": "Hong-Lei Yu", "givenName": "Hong-Lei", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Guangdong Province Hospital of Chinese Medicine; Guangzhou, Guangdong provincice, China", "fullName": "Chuan Zou", "givenName": "Chuan", "surname": "Zou", "__typename": "ArticleAuthorType" }, { "affiliation": "Renal Division, Guangdong Province Hospital of Chinese Medicine; Guangzhou, Guangdong provincice, China", "fullName": "Yi-Fan Wu", "givenName": "Yi-Fan", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "112-115", "year": "2014", "issn": null, "isbn": "978-1-4799-5669-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06999337", "articleId": "12OmNBqv2aT", "__typename": "AdjacentArticleType" }, "next": { "fno": "06999339", "articleId": "12OmNz6iOGm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2010/8303/0/05703912", "title": "Association analysis and distribution of chronic gastritis syndromes based on associated density", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703912/12OmNB1eJCK", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2011/1612/0/06112482", "title": "Analysis of functional status of Meridians in different types of TCM constitution", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2011/06112482/12OmNBUS74F", "parentPublication": { "id": "proceedings/bibmw/2011/1612/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732692", "title": "Analyzing the relationship between traditional Chinese medicine patterns and biochemical parameters in CKD population based on informations sharing system", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732692/12OmNqBtj38", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822727", "title": "Research on traditional Chinese medicine syndrome factors in cognitive disorder after apoplexy based on TCMISS", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822727/12OmNrAdsum", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732630", "title": "Application of clustering analysis to explore syndrome evolution law of peritoneal dialysis patients", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732630/12OmNwErpDc", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999362", "title": "Research on the pattern of TCM and severity for atopic dermatitis: A retrospective study", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999362/12OmNx19k0c", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703892", "title": "Study on intelligent syndrome differentiation in Traditional Chinese Medicine based on information fusion technology", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703892/12OmNz4Bdme", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732624", "title": "Bibliometrics in syndrome distribution of anovulatory dysfunctional uterine bleeding", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732624/12OmNz4Bdv2", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732666", "title": "Study on the extraction method of decoction for Spleen deficiency syndrome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732666/12OmNz61dqo", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999342", "title": "Study on the general law of traditional Chinese medicine syndrome differentiation for the senile patients of post lumbar surgery", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999342/12OmNzYwciY", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAle6y4", "title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "acronym": "vahc", "groupId": "1826204", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdL7ku", "doi": "10.1109/VAHC.2017.8387545", "title": "Visual analytics for radiomics: Combining medical imaging with patient data for clinical research", "normalizedTitle": "Visual analytics for radiomics: Combining medical imaging with patient data for clinical research", "abstract": "The visualization and analysis of electronic health records (EHRs) are becoming increasingly relevant for clinical researchers. While the digitization of medical images is general practice today, many clinics are just starting to build up database with the related patient data, patient histories, and treatment outcomes. This paper reports on a project with a medical group of ear, nose, and throat (ENT) specialists. It combines medical image analysis and Radiomics with visual analytics of patient data to build, analyze, and evaluate patient cohorts. The combined visual interface for both browsing and analyzing patient data was developed in collaboration with the medical researchers. In addition to offering a new way of cohort building, our approach also provides a first comprehensive view on the EHR, including the relevant anatomy of patients. This project triggered a new effort to extend the digitized patient database from around 100 patients to the entire patient population at our partner's clinic.", "abstracts": [ { "abstractType": "Regular", "content": "The visualization and analysis of electronic health records (EHRs) are becoming increasingly relevant for clinical researchers. While the digitization of medical images is general practice today, many clinics are just starting to build up database with the related patient data, patient histories, and treatment outcomes. This paper reports on a project with a medical group of ear, nose, and throat (ENT) specialists. It combines medical image analysis and Radiomics with visual analytics of patient data to build, analyze, and evaluate patient cohorts. The combined visual interface for both browsing and analyzing patient data was developed in collaboration with the medical researchers. In addition to offering a new way of cohort building, our approach also provides a first comprehensive view on the EHR, including the relevant anatomy of patients. This project triggered a new effort to extend the digitized patient database from around 100 patients to the entire patient population at our partner's clinic.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The visualization and analysis of electronic health records (EHRs) are becoming increasingly relevant for clinical researchers. While the digitization of medical images is general practice today, many clinics are just starting to build up database with the related patient data, patient histories, and treatment outcomes. This paper reports on a project with a medical group of ear, nose, and throat (ENT) specialists. It combines medical image analysis and Radiomics with visual analytics of patient data to build, analyze, and evaluate patient cohorts. The combined visual interface for both browsing and analyzing patient data was developed in collaboration with the medical researchers. In addition to offering a new way of cohort building, our approach also provides a first comprehensive view on the EHR, including the relevant anatomy of patients. This project triggered a new effort to extend the digitized patient database from around 100 patients to the entire patient population at our partner's clinic.", "fno": "08387545", "keywords": [ "Biomedical Imaging", "Feature Extraction", "Data Visualization", "Visual Analytics", "Data Mining", "Tumors", "Electronic Mail", "Human Centered Computing Visualization Visual Analytics", "Social And Professional Topics Personal Health Records", "Applied Computing Imaging" ], "authors": [ { "affiliation": "Fraunhofer IGD, Darmstadt", "fullName": "Andreas Bannach", "givenName": "Andreas", "surname": "Bannach", "__typename": "ArticleAuthorType" }, { "affiliation": "GRIS, TU Darmstadt", "fullName": "Jürgen Bernard", "givenName": "Jürgen", "surname": "Bernard", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Darmstadt", "fullName": "Florian Jung", "givenName": "Florian", "surname": "Jung", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Darmstadt", "fullName": "Jörn Kohlhammer", "givenName": "Jörn", "surname": "Kohlhammer", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Darmstadt", "fullName": "Thorsten May", "givenName": "Thorsten", "surname": "May", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Otorhinolaryngology, Head and Neck Surgery, Heinrich Heine University, Dusseldorf", "fullName": "Kathrin Scheckenbach", "givenName": "Kathrin", "surname": "Scheckenbach", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer IGD, Darmstadt", "fullName": "Stefan Wesarg", "givenName": "Stefan", "surname": "Wesarg", "__typename": "ArticleAuthorType" } ], "idPrefix": "vahc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "84-91", "year": "2017", "issn": null, "isbn": "978-1-5386-3187-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08387544", "articleId": "12OmNxwWosJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "08387546", "articleId": "12OmNxWcH4t", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2014/6227/0/07042521", "title": "Visual analytics for the exploration of multiparametric cancer imaging", "doi": null, "abstractUrl": "/proceedings-article/vast/2014/07042521/12OmNAGNCeQ", "parentPublication": { "id": "proceedings/vast/2014/6227/0", "title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2017/3187/0/08387499", "title": "Visual analytics for evaluating clinical pathways", "doi": null, "abstractUrl": "/proceedings-article/vahc/2017/08387499/12OmNAle6wG", "parentPublication": { "id": "proceedings/vahc/2017/3187/0", "title": "2017 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380460", "title": "A schemefor patient study retrieval from 3D brain MR volumes", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380460/12OmNvTk00U", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217614", "title": "Radiomics — Beyond imaging for personalized and precision medicine", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217614/12OmNwDACnn", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a250", "title": "Exploratory Radiomics for Predicting Adaptive Radiotherapy in Non-Small Cell Lung Cancer", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a250/12OmNwswg8H", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07364104", "title": "Patient-like-mine: A real time, visual analytics tool for clinical decision support", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364104/12OmNxwENqi", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a055", "title": "Visualizing Rule-based Classifiers for Clinical Risk Prognosis", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a055/1J6h7XhAuMo", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/03/08949699", "title": "MRI Based Radiomics Approach With Deep Learning for Prediction of Vessel Invasion in Early-Stage Cervical Cancer", "doi": null, "abstractUrl": "/journal/tb/2021/03/08949699/1gi7pFz5Bfy", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2019/2423/0/08945031", "title": "Graphical Mapping of a Data Ontology for Descriptive Patient Data", "doi": null, "abstractUrl": "/proceedings-article/vahc/2019/08945031/1grQjGxye9q", "parentPublication": { "id": "proceedings/vahc/2019/2423/0", "title": "2019 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2021/2594/0/259400a240", "title": "Evidence based on patient&#x2019;s experience data and clinical guidelines-for patient-oriented clinical decision support", "doi": null, "abstractUrl": "/proceedings-article/icphds/2021/259400a240/1ymIPQHPsdi", "parentPublication": { "id": "proceedings/icphds/2021/2594/0", "title": "2021 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwdbUZX", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNz4Bdv2", "doi": "10.1109/BIBM.2013.6732624", "title": "Bibliometrics in syndrome distribution of anovulatory dysfunctional uterine bleeding", "normalizedTitle": "Bibliometrics in syndrome distribution of anovulatory dysfunctional uterine bleeding", "abstract": "The purpose of this work is to discuss distribution of Chinese medical syndrome for anovulatory dysfunctional uterine bleeding (DUB) by modern literature research, in order to provide guilds and methodological references for establishing a series of scientific and rational systems for distribution of Chinese medical syndrome in anovulatory DUB. Bibliometric analysis was used in this study. The modern literatures had been retrieved, and the study subjects were modern literatures involving the classification of distribution of Chinese medical syndrome in DUB, from 1989 to 2013. In the end, totally 16 qualified articles were incorporated. The number of cases was 1249, the frequencies of syndrome occurrence were 55. The general information, the frequency of syndrome occurrence and the number of cases in literatures were analyzed. Finally, syndrome denomination database was established. The result showed that the syndrome differentiations of anovulatory DUB were mainly the intrinsic blood heat, blood stasis obstructing the uterus, kidney-yin deficiency, qi deficiency failing to control blood, kidney-yang deficiency. However, the other syndrome differentiation research gave priority to visceral pattern identification and qi-blood pattern identification. Therefore, we conclude that syndrome distributions of anovulatory DUB are mainly visceral pattern identification and qi-blood pattern identification. Moreover, the disease pathogenesis of traditional Chinese medicine closely related to qi and blood, spleen and kidney disease pathogenesis. So this disease can be treated by the theory of \"invigorating the spleen\". The study attempts to provide the theory for distribution of Chinese medical syndrome in anovulatory DUB, at the same time provide a demonstration for the similar study of other diseases.", "abstracts": [ { "abstractType": "Regular", "content": "The purpose of this work is to discuss distribution of Chinese medical syndrome for anovulatory dysfunctional uterine bleeding (DUB) by modern literature research, in order to provide guilds and methodological references for establishing a series of scientific and rational systems for distribution of Chinese medical syndrome in anovulatory DUB. Bibliometric analysis was used in this study. The modern literatures had been retrieved, and the study subjects were modern literatures involving the classification of distribution of Chinese medical syndrome in DUB, from 1989 to 2013. In the end, totally 16 qualified articles were incorporated. The number of cases was 1249, the frequencies of syndrome occurrence were 55. The general information, the frequency of syndrome occurrence and the number of cases in literatures were analyzed. Finally, syndrome denomination database was established. The result showed that the syndrome differentiations of anovulatory DUB were mainly the intrinsic blood heat, blood stasis obstructing the uterus, kidney-yin deficiency, qi deficiency failing to control blood, kidney-yang deficiency. However, the other syndrome differentiation research gave priority to visceral pattern identification and qi-blood pattern identification. Therefore, we conclude that syndrome distributions of anovulatory DUB are mainly visceral pattern identification and qi-blood pattern identification. Moreover, the disease pathogenesis of traditional Chinese medicine closely related to qi and blood, spleen and kidney disease pathogenesis. So this disease can be treated by the theory of \"invigorating the spleen\". The study attempts to provide the theory for distribution of Chinese medical syndrome in anovulatory DUB, at the same time provide a demonstration for the similar study of other diseases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The purpose of this work is to discuss distribution of Chinese medical syndrome for anovulatory dysfunctional uterine bleeding (DUB) by modern literature research, in order to provide guilds and methodological references for establishing a series of scientific and rational systems for distribution of Chinese medical syndrome in anovulatory DUB. Bibliometric analysis was used in this study. The modern literatures had been retrieved, and the study subjects were modern literatures involving the classification of distribution of Chinese medical syndrome in DUB, from 1989 to 2013. In the end, totally 16 qualified articles were incorporated. The number of cases was 1249, the frequencies of syndrome occurrence were 55. The general information, the frequency of syndrome occurrence and the number of cases in literatures were analyzed. Finally, syndrome denomination database was established. The result showed that the syndrome differentiations of anovulatory DUB were mainly the intrinsic blood heat, blood stasis obstructing the uterus, kidney-yin deficiency, qi deficiency failing to control blood, kidney-yang deficiency. However, the other syndrome differentiation research gave priority to visceral pattern identification and qi-blood pattern identification. Therefore, we conclude that syndrome distributions of anovulatory DUB are mainly visceral pattern identification and qi-blood pattern identification. Moreover, the disease pathogenesis of traditional Chinese medicine closely related to qi and blood, spleen and kidney disease pathogenesis. So this disease can be treated by the theory of \"invigorating the spleen\". The study attempts to provide the theory for distribution of Chinese medical syndrome in anovulatory DUB, at the same time provide a demonstration for the similar study of other diseases.", "fno": "06732624", "keywords": [ "Diseases", "Medical Diagnostic Imaging", "Blood", "Bibliometrics", "Standards", "Hemorrhaging", "Databases", "Syndrome", "Bibliometrics", "Anovulatory Dysfunctional Uterine Bleeding DUB" ], "authors": [ { "affiliation": "Guangdong Hospital of Chinese Medicine, Guangzhou 510120, Guangdong, China", "fullName": "Lixing Cao", "givenName": "Lixing", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Guangdong Hospital of Chinese Medicine, Guangzhou 510120, Guangdong, China", "fullName": "Yuanyuan Ma", "givenName": "Yuanyuan", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "3-6", "year": "2013", "issn": null, "isbn": "978-1-4799-1309-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06732623", "articleId": "12OmNvqEvNP", "__typename": "AdjacentArticleType" }, "next": { "fno": "06732625", "articleId": "12OmNASILPe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2010/8303/0/05703912", "title": "Association analysis and distribution of chronic gastritis syndromes based on associated density", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703912/12OmNB1eJCK", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999310", "title": "Computer assisted regularity analysis the law on medication of treating qi deficiency type coronary heart disease by distinguished veteran traditional Chinese medicine doctors", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999310/12OmNBNM9a6", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999326", "title": "Analysis of TCM syndrome characteristic of 303 patients with stable angina in GuangDong Province", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999326/12OmNqI04XJ", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999338", "title": "The study of the constitution, mucosal inflammation, Chinese medicine syndrome types and clinical pathology in IgA nephropathy", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999338/12OmNqOOrKm", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822727", "title": "Research on traditional Chinese medicine syndrome factors in cognitive disorder after apoplexy based on TCMISS", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822727/12OmNrAdsum", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732630", "title": "Application of clustering analysis to explore syndrome evolution law of peritoneal dialysis patients", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732630/12OmNwErpDc", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999342", "title": "Study on the general law of traditional Chinese medicine syndrome differentiation for the senile patients of post lumbar surgery", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999342/12OmNzYwciY", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995526", "title": "Analysis on Treatment of Brucellosis Based on the Theory of Fuxie Warm Disease and Arthralgia", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995526/1JC1SFrc6Qw", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2019/3918/0/391800a089", "title": "Computer Assisted Regularity Analysis for the Law on Medication of Treating Qi Deficiency Type Coronary Heart Disease by Distinguished Veteran Traditional Chinese Medicine Doctors", "doi": null, "abstractUrl": "/proceedings-article/itme/2019/391800a089/1gRxgW0cbF6", "parentPublication": { "id": "proceedings/itme/2019/3918/0", "title": "2019 10th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2019/3918/0/391800a205", "title": "Study on Classification Model of Traditional Chinese Medicine Syndrome Types of Stroke Patients in Convalescent Stage Based on Support Vector Machine", "doi": null, "abstractUrl": "/proceedings-article/itme/2019/391800a205/1gRxgbnIS88", "parentPublication": { "id": "proceedings/itme/2019/3918/0", "title": "2019 10th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyqRneg", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "1eof2SkO4gw", "doi": "10.1109/VAST.2010.5652689", "title": "Designing visual analytics systems for disease spread and evolution", "normalizedTitle": "Designing visual analytics systems for disease spread and evolution", "abstract": "VAST 2010 mini challenge 2 and 3 award: Good overall design and analysis. Using two of the VAST 2010 mini challenges as a case study, we report on the design decisions and software development process used to create visual analytics software for understanding disease spread and mutation. The software we developed and the analysis conducted attempted to help us understand (a) how a fictitious disease may have spread between selected cities around the globe; and (b) how genetic sequences taken from infected patients may be used to chart the evolution of the disease and changes in its severity, drug resistance and other characteristics.", "abstracts": [ { "abstractType": "Regular", "content": "VAST 2010 mini challenge 2 and 3 award: Good overall design and analysis. Using two of the VAST 2010 mini challenges as a case study, we report on the design decisions and software development process used to create visual analytics software for understanding disease spread and mutation. The software we developed and the analysis conducted attempted to help us understand (a) how a fictitious disease may have spread between selected cities around the globe; and (b) how genetic sequences taken from infected patients may be used to chart the evolution of the disease and changes in its severity, drug resistance and other characteristics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "VAST 2010 mini challenge 2 and 3 award: Good overall design and analysis. Using two of the VAST 2010 mini challenges as a case study, we report on the design decisions and software development process used to create visual analytics software for understanding disease spread and mutation. The software we developed and the analysis conducted attempted to help us understand (a) how a fictitious disease may have spread between selected cities around the globe; and (b) how genetic sequences taken from infected patients may be used to chart the evolution of the disease and changes in its severity, drug resistance and other characteristics.", "fno": "05652689", "keywords": [ "Data Analysis", "Data Visualisation", "Diseases", "Genetic Engineering", "Health Care", "Software Engineering", "Visual Analytics Systems", "Disease Spread", "Disease Evolution", "VAST 2010 Mini Challenges", "Software Development", "Genetic Sequences", "Infected Patients", "Diseases", "Data Visualization", "Urban Areas", "Software", "Visual Analytics", "Tools" ], "authors": [ { "affiliation": "School of Informatics City University London", "fullName": "Jo Wood", "givenName": "Jo", "surname": "Wood", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Informatics City University London", "fullName": "Aidan Slingsby", "givenName": "Aidan", "surname": "Slingsby", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Informatics City University London", "fullName": "Jason Dykes", "givenName": "Jason", "surname": "Dykes", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "285-286", "year": "2010", "issn": null, "isbn": "978-1-4244-9488-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05652661", "articleId": "1iCAmf3w4BG", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2010/9488/0/05653071", "title": "Visual analytics of a pandemic spread: VAST 2010 Mini Challenge 2 award: Thorough description of analytic process", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05653071/12OmNvTjZSX", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2013/4963/0/4963a121", "title": "Seasonal Infectious Disease Spread Prediction Using Matrix Decomposition Method", "doi": null, "abstractUrl": "/proceedings-article/isms/2013/4963a121/12OmNyfdOOh", "parentPublication": { "id": "proceedings/isms/2013/4963/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a442", "title": "BODY -- Buckets of Disease Symptoms for Disease Outbreak Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a442/12OmNyvGymA", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2013/06/mex2013060060", "title": "Tracking Infectious Disease Spread for Global Pandemic Containment", "doi": null, "abstractUrl": "/magazine/ex/2013/06/mex2013060060/13rRUx0Pqx3", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585456", "title": "Visual Analysis for Multi-Spectral Images Comparisons", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585456/17D45XreC5P", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09750868", "title": "EpiMob: Interactive Visual Analytics of Citywide Human Mobility Restrictions for Epidemic Control", "doi": null, "abstractUrl": "/journal/tg/5555/01/09750868/1ClSREG2DeM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/10052720", "title": "Epidemic Spread Modeling for COVID-19 Using Cross-fertilization of Mobility Data", "doi": null, "abstractUrl": "/journal/bd/5555/01/10052720/1L1HTGnZHEs", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05653042", "title": "Data ingestion and evidence marshalling in Jigsaw VAST 2010 Mini Challenge 1 award: Good support for data ingest", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05653042/1eof2WlsGd2", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05652644", "title": "VASTvis &#x2014; Visual analytics with multiple coordinated views", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05652644/1eof30OMMi4", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2010/9488/0/05651204", "title": "VisWorks text and network visual analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2010/05651204/1eof34V7mPS", "parentPublication": { "id": "proceedings/vast/2010/9488/0", "title": "2010 IEEE Symposium on Visual Analytics Science and Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdm4II", "title": "2014 9th Gateway Computing Environments Workshop (GCE)", "acronym": "gce", "groupId": "1002559", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqIQS8u", "doi": "10.1109/GCE.2014.8", "title": "A Cloud-Based Image Analysis Gateway for Traumatic Brain Injury Research", "normalizedTitle": "A Cloud-Based Image Analysis Gateway for Traumatic Brain Injury Research", "abstract": "Diffusion Tensor Imaging (DTI) may soon become the noninvasive tool of choice for diagnosing Traumatic Brain Injury (TBI) due to its ability to examine white matter changes in the living brain. While research has shown the value of DTI in differentiating affected and control populations, further work is required to develop algorithms and tools that enable reliable and reproducible methods for obtaining clinical biomarkers. Current approaches are computationally intensive, collaborative and require orchestrated invocation of many independently developed research tools. Thus, researchers are faced with challenges related to developing such complex analysis pipelines and executing them at scale on high performance compute resources and over large subject cohorts. To alleviate the need for both considerable technical expertise and dedicated local resources to set up and run those analyses, we have developed an always available cloud-based gateway service in which computational resources are provisioned and configured on demand. We build upon the Globus Galaxies platform which allows researchers to assemble and execute complex pipelines through their web browser. Our DTI gateway supports a range of different analyses and implements an execution model in which cloud compute instances are dynamically provisioned and configured.", "abstracts": [ { "abstractType": "Regular", "content": "Diffusion Tensor Imaging (DTI) may soon become the noninvasive tool of choice for diagnosing Traumatic Brain Injury (TBI) due to its ability to examine white matter changes in the living brain. While research has shown the value of DTI in differentiating affected and control populations, further work is required to develop algorithms and tools that enable reliable and reproducible methods for obtaining clinical biomarkers. Current approaches are computationally intensive, collaborative and require orchestrated invocation of many independently developed research tools. Thus, researchers are faced with challenges related to developing such complex analysis pipelines and executing them at scale on high performance compute resources and over large subject cohorts. To alleviate the need for both considerable technical expertise and dedicated local resources to set up and run those analyses, we have developed an always available cloud-based gateway service in which computational resources are provisioned and configured on demand. We build upon the Globus Galaxies platform which allows researchers to assemble and execute complex pipelines through their web browser. Our DTI gateway supports a range of different analyses and implements an execution model in which cloud compute instances are dynamically provisioned and configured.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diffusion Tensor Imaging (DTI) may soon become the noninvasive tool of choice for diagnosing Traumatic Brain Injury (TBI) due to its ability to examine white matter changes in the living brain. While research has shown the value of DTI in differentiating affected and control populations, further work is required to develop algorithms and tools that enable reliable and reproducible methods for obtaining clinical biomarkers. Current approaches are computationally intensive, collaborative and require orchestrated invocation of many independently developed research tools. Thus, researchers are faced with challenges related to developing such complex analysis pipelines and executing them at scale on high performance compute resources and over large subject cohorts. To alleviate the need for both considerable technical expertise and dedicated local resources to set up and run those analyses, we have developed an always available cloud-based gateway service in which computational resources are provisioned and configured on demand. We build upon the Globus Galaxies platform which allows researchers to assemble and execute complex pipelines through their web browser. Our DTI gateway supports a range of different analyses and implements an execution model in which cloud compute instances are dynamically provisioned and configured.", "fno": "7030a013", "keywords": [ "Pipelines", "Diffusion Tensor Imaging", "Logic Gates", "Tensile Stress", "Educational Institutions", "Sociology", "Statistics" ], "authors": [ { "affiliation": null, "fullName": "Kyle Chard", "givenName": "Kyle", "surname": "Chard", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ravi Madduri", "givenName": "Ravi", "surname": "Madduri", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xia Jiang", "givenName": "Xia", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Farid Dahi", "givenName": "Farid", "surname": "Dahi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael W. Vannier", "givenName": "Michael W.", "surname": "Vannier", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ian Foster", "givenName": "Ian", "surname": "Foster", "__typename": "ArticleAuthorType" } ], "idPrefix": "gce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "13-16", "year": "2014", "issn": "2152-1093", "isbn": "978-1-4799-7030-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7030a009", "articleId": "12OmNBtUdOA", "__typename": "AdjacentArticleType" }, "next": { "fno": "7030a017", "articleId": "12OmNy6HQXv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/imvip/2011/0230/0/06167844", "title": "Similarity Measures for Cardiac Diffusion Tensor Imaging Registration", "doi": null, "abstractUrl": "/proceedings-article/imvip/2011/06167844/12OmNBhpSa2", "parentPublication": { "id": "proceedings/imvip/2011/0230/0", "title": "2011 Irish Machine Vision and Image Processing Conference (IMVIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2010/4039/0/4039a733", "title": "Gridifying a Diffusion Tensor Imaging Analysis Pipeline", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2010/4039a733/12OmNBubOV5", "parentPublication": { "id": "proceedings/ccgrid/2010/4039/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2009/3813/0/3813a126", "title": "Segmentation of Brain Structures by Watershed Transform on Tensorial Morphological Gradient of Diffusion Tensor Imaging", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2009/3813a126/12OmNrJRPoU", "parentPublication": { "id": "proceedings/sibgrapi/2009/3813/0", "title": "2009 XXII Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07841086", "title": "Harmonization of methods to facilitate reproducibility in medical data processing: Applications to diffusion tensor magnetic resonance imaging", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07841086/12OmNvjgWE5", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asap/2013/0494/0/06567587", "title": "Accelerating nonlinear diffusion tensor estimation for medical image processing using high performance GPU clusters", "doi": null, "abstractUrl": "/proceedings-article/asap/2013/06567587/12OmNvs4vqi", "parentPublication": { "id": "proceedings/asap/2013/0494/0", "title": "2013 IEEE 24th International Conference on Application-Specific Systems, Architectures and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fbit/2007/2999/0/29990470", "title": "Brain Differences Visualized in the Blind Using Tensor Manifold Statistics and Diffusion Tensor Imaging", "doi": null, "abstractUrl": "/proceedings-article/fbit/2007/29990470/12OmNxFsmBW", "parentPublication": { "id": "proceedings/fbit/2007/2999/0", "title": "2007 Frontiers in the Convergence of Bioscience and Information Technologies (FBIT '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a694", "title": "Using Fourier Descriptor Features in the Classification of White Matter Fiber Tracts in DTI", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a694/12OmNym2c2m", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192722", "title": "Glyph-Based Comparative Visualization for Diffusion Tensor Fields", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192722/13rRUx0gefn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/07/07042344", "title": "Exploration of the Brain’s White Matter Structure through Visual Abstraction and Multi-Scale Local Fiber Tract Contraction", "doi": null, "abstractUrl": "/journal/tg/2015/07/07042344/13rRUxcbnCt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875910", "title": "Visualization of Brain Microstructure Through Spherical Harmonics Illumination of High Fidelity Spatio-Angular Fields", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875910/13rRUxly95C", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzuZUzq", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNxWuifw", "doi": "10.1109/ICDM.2016.0041", "title": "New Probabilistic Multi-graph Decomposition Model to Identify Consistent Human Brain Network Modules", "normalizedTitle": "New Probabilistic Multi-graph Decomposition Model to Identify Consistent Human Brain Network Modules", "abstract": "Many recent scientific efforts have been devoted to constructing the human connectome using Diffusion Tensor Imaging (DTI) data for understanding large-scale brain networks that underlie higher-level cognition in human. However, suitable network analysis computational tools are still lacking in human brain connectivity research. To address this problem, we propose a novel probabilistic multi-graph decomposition model to identify consistent network modules from the brain connectivity networks of the studied subjects. At first, we propose a new probabilistic graph decomposition model to address the high computational complexity issue in existing stochastic block models. After that, we further extend our new probabilistic graph decomposition model for multiple networks/graphs to identify the shared modules cross multiple brain networks by simultaneously incorporating multiple networks and predicting the hidden block state variables. We also derive an efficient optimization algorithm to solve the proposed objective and estimate the model parameters. We validate our method by analyzing both the weighted fiber connectivity networks constructed from DTI images and the standard human face image clustering benchmark data sets. The promising empirical results demonstrate the superior performance of our proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "Many recent scientific efforts have been devoted to constructing the human connectome using Diffusion Tensor Imaging (DTI) data for understanding large-scale brain networks that underlie higher-level cognition in human. However, suitable network analysis computational tools are still lacking in human brain connectivity research. To address this problem, we propose a novel probabilistic multi-graph decomposition model to identify consistent network modules from the brain connectivity networks of the studied subjects. At first, we propose a new probabilistic graph decomposition model to address the high computational complexity issue in existing stochastic block models. After that, we further extend our new probabilistic graph decomposition model for multiple networks/graphs to identify the shared modules cross multiple brain networks by simultaneously incorporating multiple networks and predicting the hidden block state variables. We also derive an efficient optimization algorithm to solve the proposed objective and estimate the model parameters. We validate our method by analyzing both the weighted fiber connectivity networks constructed from DTI images and the standard human face image clustering benchmark data sets. The promising empirical results demonstrate the superior performance of our proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many recent scientific efforts have been devoted to constructing the human connectome using Diffusion Tensor Imaging (DTI) data for understanding large-scale brain networks that underlie higher-level cognition in human. However, suitable network analysis computational tools are still lacking in human brain connectivity research. To address this problem, we propose a novel probabilistic multi-graph decomposition model to identify consistent network modules from the brain connectivity networks of the studied subjects. At first, we propose a new probabilistic graph decomposition model to address the high computational complexity issue in existing stochastic block models. After that, we further extend our new probabilistic graph decomposition model for multiple networks/graphs to identify the shared modules cross multiple brain networks by simultaneously incorporating multiple networks and predicting the hidden block state variables. We also derive an efficient optimization algorithm to solve the proposed objective and estimate the model parameters. We validate our method by analyzing both the weighted fiber connectivity networks constructed from DTI images and the standard human face image clustering benchmark data sets. The promising empirical results demonstrate the superior performance of our proposed method.", "fno": "07837854", "keywords": [ "Biodiffusion", "Biomedical MRI", "Computational Complexity", "Graph Theory", "Medical Image Processing", "Optimisation", "Parameter Estimation", "Pattern Clustering", "Probabilistic Multigraph Decomposition Model", "Consistent Human Brain Network Modules", "Human Connectome", "Diffusion Tensor Imaging Data", "DTI Data", "Large Scale Brain Networks", "Human Cognition", "Network Analysis Computational Tools", "Human Brain Connectivity Research", "Probabilistic Graph Decomposition Model", "Computational Complexity", "Stochastic Block Models", "Multiple Networks", "Multiple Graphs", "Optimization Algorithm", "Parameter Estimation", "Weighted Fiber Connectivity Networks", "DTI Images", "Human Face Image Clustering", "Brain Modeling", "Probabilistic Logic", "Computational Modeling", "Data Models", "Diffusion Tensor Imaging", "Stochastic Processes", "Optimization", "Probabilistic Graph Decomposition", "Multi Graph Decomposition", "Human Connectome" ], "authors": [ { "affiliation": null, "fullName": "Dijun Luo", "givenName": "Dijun", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhouyuan Huo", "givenName": "Zhouyuan", "surname": "Huo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yang Wang", "givenName": "Yang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew J. Saykin", "givenName": "Andrew J.", "surname": "Saykin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li Shen", "givenName": "Li", "surname": "Shen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heng Huang", "givenName": "Heng", "surname": "Huang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "301-310", "year": "2016", "issn": "2374-8486", "isbn": "978-1-5090-5473-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07837853", "articleId": "12OmNC3FG9l", "__typename": "AdjacentArticleType" }, "next": { "fno": "07837855", "articleId": "12OmNzZWbN1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwcdm/2011/4585/0/4585a068", "title": "Discriminative Analysis of Cerebral Motor Function Tissue for Left and Right Handedness Based on DTI", "doi": null, "abstractUrl": "/proceedings-article/iwcdm/2011/4585a068/12OmNBRsVui", "parentPublication": { "id": "proceedings/iwcdm/2011/4585/0", "title": "Complexity and Data Mining, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2012/0226/0/06169646", "title": "Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL", "doi": null, "abstractUrl": "/proceedings-article/pdp/2012/06169646/12OmNCcbE78", "parentPublication": { "id": "proceedings/pdp/2012/0226/0", "title": "2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2009/3813/0/3813a126", "title": "Segmentation of Brain Structures by Watershed Transform on Tensorial Morphological Gradient of Diffusion Tensor Imaging", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2009/3813a126/12OmNrJRPoU", "parentPublication": { "id": "proceedings/sibgrapi/2009/3813/0", "title": "2009 XXII Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2012/4676/0/4676a742", "title": "Probabilistic Brain Fiber Tractography on GPUs", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2012/4676a742/12OmNy3iFhh", "parentPublication": { "id": "proceedings/ipdpsw/2012/4676/0", "title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363843", "title": "A data-driven approach to extract connectivity structures from diffusion tensor imaging data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363843/12OmNzyp616", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875910", "title": "Visualization of Brain Microstructure Through Spherical Harmonics Illumination of High Fidelity Spatio-Angular Fields", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875910/13rRUxly95C", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1496", "title": "Topological Visualization of Brain Diffusion MRI Data", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1496/13rRUyfbwqA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005976", "title": "Using Deep Convolutional Neural Network for Mouse Brain Segmentation in DT-MRI", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005976/1hJrMXfYVJ6", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005586", "title": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005586/1hJs7dKObXq", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09661359", "title": "Estimation of discriminative multimodal brain network connectivity using message-passing-based nonlinear network fusion", "doi": null, "abstractUrl": "/journal/tb/5555/01/09661359/1zzl17RVPMI", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAlvHKJ", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQYtxL", "doi": "10.1109/ICDM.2015.50", "title": "Mining Brain Networks Using Multiple Side Views for Neurological Disorder Identification", "normalizedTitle": "Mining Brain Networks Using Multiple Side Views for Neurological Disorder Identification", "abstract": "Mining discriminative subgraph patterns from graph data has attracted great interest in recent years. It has a wide variety of applications in disease diagnosis, neuroimaging, etc. Most research on subgraph mining focuses on the graph representation alone. However, in many real-world applications, the side information is available along with the graph data. For example, for neurological disorder identification, in addition to the brain networks derived from neuroimaging data, hundreds of clinical, immunologic, serologic and cognitive measures may also be documented for each subject. These measures compose multiple side views encoding a tremendous amount of supplemental information for diagnostic purposes, yet are often ignored. In this paper, we study the problem of discriminative subgraph selection using multiple side views and propose a novel solution to find an optimal set of subgraph features for graph classification by exploring a plurality of side views. We derive a feature evaluation criterion, named gSide, to estimate the usefulness of subgraph patterns based upon side views. Then we develop a branch-and-bound algorithm, called gMSV, to efficiently search for optimal subgraph features by integrating the subgraph mining process and the procedure of discriminative feature selection. Empirical studies on graph classification tasks for neurological disorders using brain networks demonstrate that subgraph patterns selected by the multi-side-view guided subgraph selection approach can effectively boost graph classification performances and are relevant to disease diagnosis.", "abstracts": [ { "abstractType": "Regular", "content": "Mining discriminative subgraph patterns from graph data has attracted great interest in recent years. It has a wide variety of applications in disease diagnosis, neuroimaging, etc. Most research on subgraph mining focuses on the graph representation alone. However, in many real-world applications, the side information is available along with the graph data. For example, for neurological disorder identification, in addition to the brain networks derived from neuroimaging data, hundreds of clinical, immunologic, serologic and cognitive measures may also be documented for each subject. These measures compose multiple side views encoding a tremendous amount of supplemental information for diagnostic purposes, yet are often ignored. In this paper, we study the problem of discriminative subgraph selection using multiple side views and propose a novel solution to find an optimal set of subgraph features for graph classification by exploring a plurality of side views. We derive a feature evaluation criterion, named gSide, to estimate the usefulness of subgraph patterns based upon side views. Then we develop a branch-and-bound algorithm, called gMSV, to efficiently search for optimal subgraph features by integrating the subgraph mining process and the procedure of discriminative feature selection. Empirical studies on graph classification tasks for neurological disorders using brain networks demonstrate that subgraph patterns selected by the multi-side-view guided subgraph selection approach can effectively boost graph classification performances and are relevant to disease diagnosis.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mining discriminative subgraph patterns from graph data has attracted great interest in recent years. It has a wide variety of applications in disease diagnosis, neuroimaging, etc. Most research on subgraph mining focuses on the graph representation alone. However, in many real-world applications, the side information is available along with the graph data. For example, for neurological disorder identification, in addition to the brain networks derived from neuroimaging data, hundreds of clinical, immunologic, serologic and cognitive measures may also be documented for each subject. These measures compose multiple side views encoding a tremendous amount of supplemental information for diagnostic purposes, yet are often ignored. In this paper, we study the problem of discriminative subgraph selection using multiple side views and propose a novel solution to find an optimal set of subgraph features for graph classification by exploring a plurality of side views. We derive a feature evaluation criterion, named gSide, to estimate the usefulness of subgraph patterns based upon side views. Then we develop a branch-and-bound algorithm, called gMSV, to efficiently search for optimal subgraph features by integrating the subgraph mining process and the procedure of discriminative feature selection. Empirical studies on graph classification tasks for neurological disorders using brain networks demonstrate that subgraph patterns selected by the multi-side-view guided subgraph selection approach can effectively boost graph classification performances and are relevant to disease diagnosis.", "fno": "9504a709", "keywords": [ "Data Mining", "Diffusion Tensor Imaging", "Kernel", "Neuroimaging", "Testing", "Computer Science", "Diseases", "Brain Network", "Subgraph Pattern", "Graph Mining", "Side Information" ], "authors": [ { "affiliation": null, "fullName": "Bokai Cao", "givenName": "Bokai", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiangnan Kong", "givenName": "Xiangnan", "surname": "Kong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jingyuan Zhang", "givenName": "Jingyuan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Philip S. Yu", "givenName": "Philip S.", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ann B. Ragin", "givenName": "Ann B.", "surname": "Ragin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "709-714", "year": "2015", "issn": "1550-4786", "isbn": "978-1-4673-9504-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9504a703", "articleId": "12OmNxR5ULz", "__typename": "AdjacentArticleType" }, "next": { "fno": "9504a715", "articleId": "12OmNyOq4UH", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ism/2017/2937/0/2937a292", "title": "Adaptive Sparse Learning for Neurodegenerative Disease Classification", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a292/12OmNvAAtxr", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a967", "title": "Multi-view Graph Embedding with Hub Detection for Brain Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a967/12OmNzTH0T0", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534826", "title": "Blockwise Human Brain Network Visual Comparison Using NodeTrix Representation", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534826/13rRUwwJWFQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546091", "title": "Multi-classification of Parkinson's Disease via Sparse Low-Rank Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546091/17D45WK5Aqt", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669613", "title": "Temporal Graph Representation Learning for Autism spectrum disorder Brain Networks", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669613/1A9VR7N4Ydq", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09723567", "title": "Predicting Drug-target Interaction Via Self-supervised Learning", "doi": null, "abstractUrl": "/journal/tb/5555/01/09723567/1BocEeQyVfa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09882129", "title": "Predicting Drug-Target Interactions via Dual-Stream Graph Neural Network", "doi": null, "abstractUrl": "/journal/tb/5555/01/09882129/1Gv8QcgpMTS", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005586", "title": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005586/1hJs7dKObXq", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a046", "title": "PRAGMA: Interactively Constructing Functional Brain Parcellations", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a046/1qROcmsxnYA", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09661359", "title": "Estimation of discriminative multimodal brain network connectivity using message-passing-based nonlinear network fusion", "doi": null, "abstractUrl": "/journal/tb/5555/01/09661359/1zzl17RVPMI", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwHz03N", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzTH0T0", "doi": "10.1109/ICDM.2017.123", "title": "Multi-view Graph Embedding with Hub Detection for Brain Network Analysis", "normalizedTitle": "Multi-view Graph Embedding with Hub Detection for Brain Network Analysis", "abstract": "Multi-view graph embedding and hub detection have both become widely studied problems in the area of graph learning. Both graph embedding and hub detection relate to the node clustering structure of graphs. The multi-view graph embedding usually implies the node clustering structure of the graph based on the multiple views, while hubs are the boundary-spanning nodes across different node clusters in the graph and thus may potentially influence the clustering structure of the graph. However, none of the existing works considered joint learning the multi-view embeddings and the hubs from multi-view graph data. In this paper, we propose to incorporate the hub detection task into the multi-view graph embedding framework so that the two tasks could benefit from each other. Specifically, we propose an auto-weighted framework of Multi-view Graph Embedding with Hub Detection (MVGE-HD) for brain network analysis. The MVGE-HD framework learns a unified graph embedding across all the views while reducing the potential influence of the hubs on blurring the boundaries between node clusters in the graph, thus leading to a clear and discriminative node clustering structure for the graph. We apply MVGE-HD on two real multi-view brain network datasets (i.e., HIV and Bipolar). The experimental results demonstrate the superior performance of the proposed framework in brain network analysis for clinical investigation and application.", "abstracts": [ { "abstractType": "Regular", "content": "Multi-view graph embedding and hub detection have both become widely studied problems in the area of graph learning. Both graph embedding and hub detection relate to the node clustering structure of graphs. The multi-view graph embedding usually implies the node clustering structure of the graph based on the multiple views, while hubs are the boundary-spanning nodes across different node clusters in the graph and thus may potentially influence the clustering structure of the graph. However, none of the existing works considered joint learning the multi-view embeddings and the hubs from multi-view graph data. In this paper, we propose to incorporate the hub detection task into the multi-view graph embedding framework so that the two tasks could benefit from each other. Specifically, we propose an auto-weighted framework of Multi-view Graph Embedding with Hub Detection (MVGE-HD) for brain network analysis. The MVGE-HD framework learns a unified graph embedding across all the views while reducing the potential influence of the hubs on blurring the boundaries between node clusters in the graph, thus leading to a clear and discriminative node clustering structure for the graph. We apply MVGE-HD on two real multi-view brain network datasets (i.e., HIV and Bipolar). The experimental results demonstrate the superior performance of the proposed framework in brain network analysis for clinical investigation and application.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multi-view graph embedding and hub detection have both become widely studied problems in the area of graph learning. Both graph embedding and hub detection relate to the node clustering structure of graphs. The multi-view graph embedding usually implies the node clustering structure of the graph based on the multiple views, while hubs are the boundary-spanning nodes across different node clusters in the graph and thus may potentially influence the clustering structure of the graph. However, none of the existing works considered joint learning the multi-view embeddings and the hubs from multi-view graph data. In this paper, we propose to incorporate the hub detection task into the multi-view graph embedding framework so that the two tasks could benefit from each other. Specifically, we propose an auto-weighted framework of Multi-view Graph Embedding with Hub Detection (MVGE-HD) for brain network analysis. The MVGE-HD framework learns a unified graph embedding across all the views while reducing the potential influence of the hubs on blurring the boundaries between node clusters in the graph, thus leading to a clear and discriminative node clustering structure for the graph. We apply MVGE-HD on two real multi-view brain network datasets (i.e., HIV and Bipolar). The experimental results demonstrate the superior performance of the proposed framework in brain network analysis for clinical investigation and application.", "fno": "3835a967", "keywords": [ "Brain", "Graph Theory", "Learning Artificial Intelligence", "Medical Computing", "Pattern Clustering", "Hub Detection", "Brain Network Analysis", "Multiview Graph Embedding", "Graph Learning", "Node Clustering Structure", "Multiview Graph Data", "Multiview Brain Network Datasets", "Clinical Investigation", "Clinical Application", "MVGE HD", "Autoweighted Framework", "Joint Learning", "Boundary Spanning Nodes", "Linear Programming", "Neuroscience", "Diffusion Tensor Imaging", "Correlation" ], "authors": [ { "affiliation": null, "fullName": "Guixiang Ma", "givenName": "Guixiang", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chun-Ta Lu", "givenName": "Chun-Ta", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lifang He", "givenName": "Lifang", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Philip S. Yu", "givenName": "Philip S.", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ann B. Ragin", "givenName": "Ann B.", "surname": "Ragin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "967-972", "year": "2017", "issn": "2374-8486", "isbn": "978-1-5386-3835-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3835a961", "articleId": "12OmNzEmFI7", "__typename": "AdjacentArticleType" }, "next": { "fno": "3835a973", "articleId": "12OmNyTOsrh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iita/2009/3859/3/3859c031", "title": "Supervised Locally Linear Embedding in Tensor Space", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859c031/12OmNARRYpM", "parentPublication": { "id": "proceedings/iita/2009/3859/3", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2015/8006/0/8006a789", "title": "HAGP: A Hub-Centric Asynchronous Graph Processing Framework for Scale-Free Graph", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2015/8006a789/12OmNxE2n0z", "parentPublication": { "id": "proceedings/ccgrid/2015/8006/0", "title": "2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837854", "title": "New Probabilistic Multi-graph Decomposition Model to Identify Consistent Human Brain Network Modules", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837854/12OmNxWuifw", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a709", "title": "Mining Brain Networks Using Multiple Side Views for Neurological Disorder Identification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a709/12OmNyQYtxL", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2014/12/06807798", "title": "SlashBurn: Graph Compression and Mining beyond Caveman Communities", "doi": null, "abstractUrl": "/journal/tk/2014/12/06807798/13rRUygBwi3", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b006", "title": "Multi-view Network Embedding via Graph Factorization Clustering and Co-regularized Multi-view Agreement", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b006/18jXIBdGQEw", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005586", "title": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005586/1hJs7dKObXq", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/02/08778709", "title": "Knowledge Graph Embedding Based on Multi-View Clustering Framework", "doi": null, "abstractUrl": "/journal/tk/2021/02/08778709/1qkwsNZ12GA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09436028", "title": "Group-Wise Hub Identification by Learning Common Graph Embeddings on Grassmannian Manifold", "doi": null, "abstractUrl": "/journal/tp/2022/11/09436028/1tJs0zjfcmA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428430", "title": "Multiple Hub-Driven Attention Graph Network for Scene Graph Generation", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428430/1uim0MQ8S4M", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "14dcDXj0I36", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "acronym": "icci*cc", "groupId": "1000097", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "14dcEdLb3x6", "doi": "10.1109/ICCI-CC.2018.8482006", "title": "The Future of the Human Brain", "normalizedTitle": "The Future of the Human Brain", "abstract": "Neuroscience has come a long way since Santiago Ramón y Cajal's drawings of brain cells in 1891, however we still use these drawings today and research still has a long way to go both in terms of theory and application. I turn to the fields of neuroinformatics and connectomics for part of the answer. They have made great strides in functional and structural brain mapping, however little has actually been applied clinically, and it largely remains a mystery how rich functionality emerges from the invariant structural architecture of the brain.", "abstracts": [ { "abstractType": "Regular", "content": "Neuroscience has come a long way since Santiago Ramón y Cajal's drawings of brain cells in 1891, however we still use these drawings today and research still has a long way to go both in terms of theory and application. I turn to the fields of neuroinformatics and connectomics for part of the answer. They have made great strides in functional and structural brain mapping, however little has actually been applied clinically, and it largely remains a mystery how rich functionality emerges from the invariant structural architecture of the brain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Neuroscience has come a long way since Santiago Ramón y Cajal's drawings of brain cells in 1891, however we still use these drawings today and research still has a long way to go both in terms of theory and application. I turn to the fields of neuroinformatics and connectomics for part of the answer. They have made great strides in functional and structural brain mapping, however little has actually been applied clinically, and it largely remains a mystery how rich functionality emerges from the invariant structural architecture of the brain.", "fno": "08482006", "keywords": [ "Handheld Computers", "Cognitive Informatics", "Cognitive Systems" ], "authors": [ { "affiliation": null, "fullName": "Newton Howard", "givenName": "Newton", "surname": "Howard", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci*cc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "3-3", "year": "2018", "issn": null, "isbn": "978-1-5386-3360-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08482074", "articleId": "14dcDXDJqyb", "__typename": "AdjacentArticleType" }, "next": { "fno": "08482063", "articleId": "14dcDYt6P5y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icci/2002/1724/0/17240259", "title": "Cognitive Models of the Brain", "doi": null, "abstractUrl": "/proceedings-article/icci/2002/17240259/12OmNBp52IJ", "parentPublication": { "id": "proceedings/icci/2002/1724/0", "title": "Cognitive Informatics, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2017/0771/0/08109802", "title": "Cognitive foundations of knowledge science and deep knowledge learning by cognitive robots", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2017/08109802/12OmNxaNGik", "parentPublication": { "id": "proceedings/icci*cc/2017/0771/0", "title": "2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci-cc/2012/2795/0/06311158", "title": "On abstract intelligence and brain informatics: Mapping the cognitive functions onto the neural architectures", "doi": null, "abstractUrl": "/proceedings-article/icci-cc/2012/06311158/12OmNzl3WTP", "parentPublication": { "id": "proceedings/icci-cc/2012/2795/0", "title": "2012 11th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482039", "title": "Is the Mind Still a Mystery?", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482039/14dcDXDrPpQ", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482034", "title": "Design and Implementation of a Knowledge Base for Machine Knowledge Learning", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482034/14dcDXF9qcg", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482063", "title": "An Integrated Decision Support System Based on the Human OODA Loop", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482063/14dcDYt6P5y", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482065", "title": "The Arrangement of Sentiment Lexica in the Space of Distributed Word Representations", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482065/14dcEdLb3wZ", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482072", "title": "Neurological Foundations of the Brain in the Automatic Emotion Regulation of Anger and Fear", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482072/14dcEdidYgz", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2018/3360/0/08482092", "title": "Cognitive Foundations and Formal Theories of Human and Robot Visions", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2018/08482092/14dcEfU1kpj", "parentPublication": { "id": "proceedings/icci*cc/2018/3360/0", "title": "2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2019/1419/0/09146078", "title": "The Future of the Brain and Beyond", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2019/09146078/1lFJdYK7kfC", "parentPublication": { "id": "proceedings/icci*cc/2019/1419/0", "title": "2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hJrHq07uw0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hJs7dKObXq", "doi": "10.1109/BigData47090.2019.9005586", "title": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "normalizedTitle": "Community-preserving Graph Convolutions for Structural and Functional Joint Embedding of Brain Networks", "abstract": "We propose a framework of Siamese community-preserving graph convolutional network (SCP-GCN) to learn the structural and functional joint embedding of brain networks. Specifically, we use graph convolutions to learn the structural and functional joint embedding, where the graph structure is defined with structural connectivity and node features are from the functional connectivity. Moreover, we propose to preserve the community structure of brain networks in the graph convolutions by considering the intra-community and inter-community properties in the learning process. Furthermore, we use Siamese architecture which models the pair-wise similarity learning to guide the learning process. To evaluate the proposed approach, we conduct extensive experiments on two real brain network datasets. The experimental results demonstrate the superior performance of the proposed approach in structural and functional joint embedding for neurological disorder analysis, indicating its promising value for clinical applications.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a framework of Siamese community-preserving graph convolutional network (SCP-GCN) to learn the structural and functional joint embedding of brain networks. Specifically, we use graph convolutions to learn the structural and functional joint embedding, where the graph structure is defined with structural connectivity and node features are from the functional connectivity. Moreover, we propose to preserve the community structure of brain networks in the graph convolutions by considering the intra-community and inter-community properties in the learning process. Furthermore, we use Siamese architecture which models the pair-wise similarity learning to guide the learning process. To evaluate the proposed approach, we conduct extensive experiments on two real brain network datasets. The experimental results demonstrate the superior performance of the proposed approach in structural and functional joint embedding for neurological disorder analysis, indicating its promising value for clinical applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a framework of Siamese community-preserving graph convolutional network (SCP-GCN) to learn the structural and functional joint embedding of brain networks. Specifically, we use graph convolutions to learn the structural and functional joint embedding, where the graph structure is defined with structural connectivity and node features are from the functional connectivity. Moreover, we propose to preserve the community structure of brain networks in the graph convolutions by considering the intra-community and inter-community properties in the learning process. Furthermore, we use Siamese architecture which models the pair-wise similarity learning to guide the learning process. To evaluate the proposed approach, we conduct extensive experiments on two real brain network datasets. The experimental results demonstrate the superior performance of the proposed approach in structural and functional joint embedding for neurological disorder analysis, indicating its promising value for clinical applications.", "fno": "09005586", "keywords": [ "Brain", "Convolutional Neural Nets", "Graph Theory", "Learning Artificial Intelligence", "Network Theory Graphs", "Neurophysiology", "Brain Networks", "Inter Community Properties", "Learning Process", "Brain Network Datasets", "Functional Joint Embedding", "Community Preserving Graph Convolutions", "Siamese Community Preserving Graph Convolutional Network", "Structural Embedding", "Graph Structure", "Structural Connectivity", "Functional Connectivity", "Intra Community Properties", "Neurological Disorder Analysis", "Functional Magnetic Resonance Imaging", "Diffusion Tensor Imaging", "Brain", "Neurological Diseases", "Correlation", "Convolution", "Big Data", "Graph Neural Networks", "Community Preserving Graph Convolutions", "Siamese Network", "Brain Network Analysis" ], "authors": [ { "affiliation": "Tongji University", "fullName": "Jiahao Liu", "givenName": "Jiahao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Intel Labs", "fullName": "Guixiang Ma", "givenName": "Guixiang", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Chicago", "fullName": "Fei Jiang", "givenName": "Fei", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Google Research", "fullName": "Chun-Ta Lu", "givenName": "Chun-Ta", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois at Chicago", "fullName": "Philip S. Yu", "givenName": "Philip S.", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Ann B. Ragin", "givenName": "Ann B.", "surname": "Ragin", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "1163-1168", "year": "2019", "issn": null, "isbn": "978-1-7281-0858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09005526", "articleId": "1hJrUabGPra", "__typename": "AdjacentArticleType" }, "next": { "fno": "09006488", "articleId": "1hJsC2tUGt2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsc/2018/4210/0/421001a161", "title": "Structural Brain Network Mining Based on Core Theory", "doi": null, "abstractUrl": "/proceedings-article/dsc/2018/421001a161/12OmNCcKQRg", "parentPublication": { "id": "proceedings/dsc/2018/4210/0", "title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2012/0226/0/06169646", "title": "Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL", "doi": null, "abstractUrl": "/proceedings-article/pdp/2012/06169646/12OmNCcbE78", "parentPublication": { "id": "proceedings/pdp/2012/0226/0", "title": "2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2014/5701/0/5701a374", "title": "Diffusion MRI Compartmental Model Analysis of DSI Data", "doi": null, "abstractUrl": "/proceedings-article/ichi/2014/5701a374/12OmNCmGNPk", "parentPublication": { "id": "proceedings/ichi/2014/5701/0", "title": "2014 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837854", "title": "New Probabilistic Multi-graph Decomposition Model to Identify Consistent Human Brain Network Modules", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837854/12OmNxWuifw", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2017/3835/0/3835a967", "title": "Multi-view Graph Embedding with Hub Detection for Brain Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a967/12OmNzTH0T0", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534826", "title": "Blockwise Human Brain Network Visual Comparison Using NodeTrix Representation", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534826/13rRUwwJWFQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a139", "title": "Brain Structural and Functional Representation Based on the Local Global Graph Methodology", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a139/17D45XfSEUh", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021060", "title": "BraceNet: Graph-Embedded Neural Network For Brain Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021060/1KfS2MzX4gU", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/04/08823988", "title": "oComm: Overlapping Community Detection in Multi-View Brain Network", "doi": null, "abstractUrl": "/journal/tb/2021/04/08823988/1d3dMKYETss", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/09661359", "title": "Estimation of discriminative multimodal brain network connectivity using message-passing-based nonlinear network fusion", "doi": null, "abstractUrl": "/journal/tb/5555/01/09661359/1zzl17RVPMI", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvlxJwR", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "acronym": "cbms", "groupId": "1000153", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNANTAsy", "doi": "10.1109/CBMS.2017.163", "title": "Extracting Disease-Phenotype Relations from Text with Disease-Phenotype Concept Recognisers and Association Rule Mining", "normalizedTitle": "Extracting Disease-Phenotype Relations from Text with Disease-Phenotype Concept Recognisers and Association Rule Mining", "abstract": "Automatically extracting phenotypes (i.e., the composite of ones observable characteristics/traits) from free text such as scientific literature or clinical notes and associating phenotypes with diseases is an important task. Such associations can be used in, for example, recommending candidate genes for diseases, investigating drug targets, or performing differential diagnosis. In this paper, we focus on extracting disease-phenotype relations with association rule mining techniques and compare results with two other methods. We show that association rule mining offers promising alternative method for detecting disease-phenotype relations.", "abstracts": [ { "abstractType": "Regular", "content": "Automatically extracting phenotypes (i.e., the composite of ones observable characteristics/traits) from free text such as scientific literature or clinical notes and associating phenotypes with diseases is an important task. Such associations can be used in, for example, recommending candidate genes for diseases, investigating drug targets, or performing differential diagnosis. In this paper, we focus on extracting disease-phenotype relations with association rule mining techniques and compare results with two other methods. We show that association rule mining offers promising alternative method for detecting disease-phenotype relations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automatically extracting phenotypes (i.e., the composite of ones observable characteristics/traits) from free text such as scientific literature or clinical notes and associating phenotypes with diseases is an important task. Such associations can be used in, for example, recommending candidate genes for diseases, investigating drug targets, or performing differential diagnosis. In this paper, we focus on extracting disease-phenotype relations with association rule mining techniques and compare results with two other methods. We show that association rule mining offers promising alternative method for detecting disease-phenotype relations.", "fno": "1710a358", "keywords": [ "Data Mining", "Diseases", "Drugs", "Medical Computing", "Text Analysis", "Disease Phenotype Relations", "Drug Targets", "Clinical Notes", "Free Text", "Disease Phenotype Concept Recognisers", "Association Rule Mining", "Diseases", "Data Mining", "Standards", "Gold", "Sensitivity", "Prediction Algorithms", "Itemsets", "Phenotype", "Disease", "Association Rule Mining", "Text Mining" ], "authors": [ { "affiliation": null, "fullName": "Simon Kocbek", "givenName": "Simon", "surname": "Kocbek", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tudor Groza", "givenName": "Tudor", "surname": "Groza", "__typename": "ArticleAuthorType" } ], "idPrefix": "cbms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-06-01T00:00:00", "pubType": "proceedings", "pages": "358-363", "year": "2017", "issn": "2372-9198", "isbn": "978-1-5386-1710-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1710a356", "articleId": "12OmNylbowk", "__typename": "AdjacentArticleType" }, "next": { "fno": "1710a364", "articleId": "12OmNzYeAN5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2014/7502/0/7502a191", "title": "Disease-Gene Association Using a Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a191/12OmNAH5dk4", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024647", "title": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024647/12OmNCesram", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822619", "title": "Predicting disease-microbe association by random walking on the heterogeneous network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822619/12OmNqG0SX4", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703822", "title": "Discovery of multivariate phenotypes using association rule mining and their application to genome-wide association studies", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703822/12OmNrkBwxy", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a222", "title": "Towards Identification of Human Disease Phenotype-Genotype Association via a Network-Module Based Method", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a222/12OmNscOUim", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217911/12OmNxdVgQc", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019821", "title": "PhenoLines: Phenotype Comparison Visualizations for Disease Subtyping via Topic Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019821/13rRUwI5U2P", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534774", "title": "PhenoStacks: Cross-Sectional Cohort Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534774/13rRUy2YLYB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a348", "title": "Prediction of Plant-Disease Relations Based on Unani Formulas by Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a348/17D45XeKgxa", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09611018", "title": "Predicting miRNA-Disease Association Based on Improved Graph Regression", "doi": null, "abstractUrl": "/journal/tb/2022/06/09611018/1ypYa4gi7eg", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAXxWQv", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvex", "doi": "10.1109/BIBM.2016.7822617", "title": "Measuring phenotype semantic similarity using Human Phenotype Ontology", "normalizedTitle": "Measuring phenotype semantic similarity using Human Phenotype Ontology", "abstract": "It is critical yet remains to be challenging to make right disease diagnosis based on complex clinical characteristic and heterogeneous genetic background. Recently, Human Phenotype Ontology (HPO)-based phenotype similarity has been widely used to aid disease diagnosis. However, the existing measurements are revised based on the Gene Ontology-based term similarity models, which are not optimized for human phenotype ontologies. We propose a new similarity measure called PhenoSim. Our model includes a noise reduction component to model the noisy patient phenotype data, and a path-constrained Information Content-based method for measuring phenotype semantics similarity. Evaluation tests showed that PhenoSim could improve the performance of HPO-based phenotype similarity measurement.", "abstracts": [ { "abstractType": "Regular", "content": "It is critical yet remains to be challenging to make right disease diagnosis based on complex clinical characteristic and heterogeneous genetic background. Recently, Human Phenotype Ontology (HPO)-based phenotype similarity has been widely used to aid disease diagnosis. However, the existing measurements are revised based on the Gene Ontology-based term similarity models, which are not optimized for human phenotype ontologies. We propose a new similarity measure called PhenoSim. Our model includes a noise reduction component to model the noisy patient phenotype data, and a path-constrained Information Content-based method for measuring phenotype semantics similarity. Evaluation tests showed that PhenoSim could improve the performance of HPO-based phenotype similarity measurement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "It is critical yet remains to be challenging to make right disease diagnosis based on complex clinical characteristic and heterogeneous genetic background. Recently, Human Phenotype Ontology (HPO)-based phenotype similarity has been widely used to aid disease diagnosis. However, the existing measurements are revised based on the Gene Ontology-based term similarity models, which are not optimized for human phenotype ontologies. We propose a new similarity measure called PhenoSim. Our model includes a noise reduction component to model the noisy patient phenotype data, and a path-constrained Information Content-based method for measuring phenotype semantics similarity. Evaluation tests showed that PhenoSim could improve the performance of HPO-based phenotype similarity measurement.", "fno": "07822617", "keywords": [ "Diseases", "Semantics", "Ontologies", "Noise Measurement", "Biomedical Measurement", "Electronic Mail", "Computer Science" ], "authors": [ { "affiliation": "School of Computer Science, Northwestern Polytechnical University, Xi'an, China", "fullName": "Jiajie Peng", "givenName": "Jiajie", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China", "fullName": "Hansheng Xue", "givenName": null, "surname": "Hansheng Xue", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China", "fullName": "Yukai Shao", "givenName": null, "surname": "Yukai Shao", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Northwestern Polytechnical University, Xi'an, China", "fullName": "Xuequn Shang", "givenName": null, "surname": "Xuequn Shang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Technology, Harbin Institute of Technology, China", "fullName": "Yadong Wang", "givenName": "Yadong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Biomedical Informatics, College of Medicine, University of Kentucky, Lexington, 40536, USA", "fullName": "Jin Chen", "givenName": "Jin", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-12-01T00:00:00", "pubType": "proceedings", "pages": "763-766", "year": "2016", "issn": null, "isbn": "978-1-5090-1611-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07822616", "articleId": "12OmNCgJe6x", "__typename": "AdjacentArticleType" }, "next": { "fno": "07822618", "articleId": "12OmNqJ8thv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2017/3050/0/08217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217911/12OmNxdVgQc", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822766", "title": "Analyzing factors involved in the HPO-based semantic similarity calculation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822766/12OmNyKJizC", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217917", "title": "Mining cross-ontology weighted association rules between GO and HPO", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217917/12OmNyfdOYj", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi-w/2018/6777/0/677701a029", "title": "Constructing Node Embeddings for Human Phenotype Ontology to Assist Phenotypic Similarity Measurement", "doi": null, "abstractUrl": "/proceedings-article/ichi-w/2018/677701a029/12OmNz2C1B9", "parentPublication": { "id": "proceedings/ichi-w/2018/6777/0", "title": "2018 IEEE International Conference on Healthcare Informatics Workshop (ICHI-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359849", "title": "Predicting disease genes based on normalized protein modules and phenotype ontology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359849/12OmNzdoMBX", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217764", "title": "Generating abstraction networks using semantic similarity measure of ontology concepts", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217764/12OmNzuZUuV", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/03/08320963", "title": "Constructing Disease Similarity Networks Based on Disease Module Theory", "doi": null, "abstractUrl": "/journal/tb/2020/03/08320963/13rRUx0xPgM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a169", "title": "Subgrouping Rare Disease Patients Leveraging the Human Phenotype Ontology Embeddings", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a169/1mLMilRB3kk", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/08839064", "title": "An Ontology-Independent Representation Learning for Similar Disease Detection Based on Multi-Layer Similarity Network", "doi": null, "abstractUrl": "/journal/tb/2021/01/08839064/1qV2FklJpF6", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313181", "title": "NCRR: A novel method for measuring disease similarity based on non-coding RNA regulation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313181/1qmfOWGrUzu", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzJh", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNB8CiYZ", "doi": "10.1109/BIBM.2009.78", "title": "An Algorithm for the Discovery of Phenotype Related Metabolic Pathways", "normalizedTitle": "An Algorithm for the Discovery of Phenotype Related Metabolic Pathways", "abstract": "Microorganisms are being increasingly used in industrial processes due to certain beneficial phenotypes they exhibit. Improving the ability of microorganisms to exhibit these phenotypes has driven interest in identifying the genes that are responsible for a given phenotype. Some of these phenotypes are the result of various chemical compounds being modified by a series of metabolic reactions, or metabolic pathways, catalyzed by specific enzymes. Recently, comprehensive, generic metabolic networks have been defined, which describe possible ways in which certain chemical compounds may be modified by known metabolic reactions. In this paper, we aim to discover phenotype related metabolic pathways by identifying subnetworks of a generic metabolic network that are highly conserved in phenotype expressing organisms and rarely conserved in non-phenotype expressing organisms. To do this, we introduce a graph search algorithm that finds and expands highly conserved seed networks based on their evolutionary bias towards phenotype expressing organisms. We hypothesize that the evolutionarily conservation of these subnetworks in phenotype expressing organisms is likely due to the fact that they represent metabolic pathways responsible for the expression of the phenotype. We test our approach using aerobic and anaerobic organisms to identify pathways related to aerobic respiration. We find that the pathways identified by our algorithm are found primarily in aerobic organisms and that metabolic pathways known to be related to aerobic respiration are covered by the pathways identified by our algorithm. We finish by discussing the ongoing and future work related to this methodology.", "abstracts": [ { "abstractType": "Regular", "content": "Microorganisms are being increasingly used in industrial processes due to certain beneficial phenotypes they exhibit. Improving the ability of microorganisms to exhibit these phenotypes has driven interest in identifying the genes that are responsible for a given phenotype. Some of these phenotypes are the result of various chemical compounds being modified by a series of metabolic reactions, or metabolic pathways, catalyzed by specific enzymes. Recently, comprehensive, generic metabolic networks have been defined, which describe possible ways in which certain chemical compounds may be modified by known metabolic reactions. In this paper, we aim to discover phenotype related metabolic pathways by identifying subnetworks of a generic metabolic network that are highly conserved in phenotype expressing organisms and rarely conserved in non-phenotype expressing organisms. To do this, we introduce a graph search algorithm that finds and expands highly conserved seed networks based on their evolutionary bias towards phenotype expressing organisms. We hypothesize that the evolutionarily conservation of these subnetworks in phenotype expressing organisms is likely due to the fact that they represent metabolic pathways responsible for the expression of the phenotype. We test our approach using aerobic and anaerobic organisms to identify pathways related to aerobic respiration. We find that the pathways identified by our algorithm are found primarily in aerobic organisms and that metabolic pathways known to be related to aerobic respiration are covered by the pathways identified by our algorithm. We finish by discussing the ongoing and future work related to this methodology.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Microorganisms are being increasingly used in industrial processes due to certain beneficial phenotypes they exhibit. Improving the ability of microorganisms to exhibit these phenotypes has driven interest in identifying the genes that are responsible for a given phenotype. Some of these phenotypes are the result of various chemical compounds being modified by a series of metabolic reactions, or metabolic pathways, catalyzed by specific enzymes. Recently, comprehensive, generic metabolic networks have been defined, which describe possible ways in which certain chemical compounds may be modified by known metabolic reactions. In this paper, we aim to discover phenotype related metabolic pathways by identifying subnetworks of a generic metabolic network that are highly conserved in phenotype expressing organisms and rarely conserved in non-phenotype expressing organisms. To do this, we introduce a graph search algorithm that finds and expands highly conserved seed networks based on their evolutionary bias towards phenotype expressing organisms. We hypothesize that the evolutionarily conservation of these subnetworks in phenotype expressing organisms is likely due to the fact that they represent metabolic pathways responsible for the expression of the phenotype. We test our approach using aerobic and anaerobic organisms to identify pathways related to aerobic respiration. We find that the pathways identified by our algorithm are found primarily in aerobic organisms and that metabolic pathways known to be related to aerobic respiration are covered by the pathways identified by our algorithm. We finish by discussing the ongoing and future work related to this methodology.", "fno": "3885a060", "keywords": [ "Phenotype Related Pathways", "Phylogenetic Profile", "Metabolic Pathways", "Comparative Genomics" ], "authors": [ { "affiliation": null, "fullName": "Matthew C. Schmidt", "givenName": "Matthew C.", "surname": "Schmidt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nagiza F. Samatova", "givenName": "Nagiza F.", "surname": "Samatova", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "60-65", "year": "2009", "issn": null, "isbn": "978-0-7695-3885-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3885a054", "articleId": "12OmNz61d4v", "__typename": "AdjacentArticleType" }, "next": { "fno": "3885a066", "articleId": "12OmNA0dMFP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cso/2011/4335/0/4335a587", "title": "An Iterative Strategy for Bi-objective Optimization of Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/cso/2011/4335a587/12OmNAle6Bn", "parentPublication": { "id": "proceedings/cso/2011/4335/0", "title": "2011 Fourth International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2010/4030/2/4030b268", "title": "An Iterative Strategy for Yield Optimization of Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/cso/2010/4030b268/12OmNrFTraP", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2006/2602/0/01648304", "title": "Metabolic network visualization using constraint planar graph drawing algorithm", "doi": null, "abstractUrl": "/proceedings-article/iv/2006/01648304/12OmNvFHfIw", "parentPublication": { "id": "proceedings/iv/2006/2602/0", "title": "Tenth International Conference on Information Visualisation (IV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssdbm/2007/2868/0/28680033", "title": "Gene Ontology-Based Annotation Analysis and Categorization of Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/ssdbm/2007/28680033/12OmNwDSdNW", "parentPublication": { "id": "proceedings/ssdbm/2007/2868/0", "title": "Scientific and Statistical Database Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a687", "title": "Efficient Alignments of Metabolic Networks with Bounded Treewidth", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a687/12OmNwEJ0YE", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2000/0862/0/08620214", "title": "Knowledge Discovery of Gene Functions and Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/bibe/2000/08620214/12OmNxQOjHW", "parentPublication": { "id": "proceedings/bibe/2000/0862/0", "title": "13th IEEE International Conference on BioInformatics and BioEngineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icseng/2005/2359/0/23590307", "title": "Consistency, Feasibility and Multiplicity of Fluxes in Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/icseng/2005/23590307/12OmNy87Qu5", "parentPublication": { "id": "proceedings/icseng/2005/2359/0", "title": "Proceedings. 18th International Conference on Systems Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a669", "title": "The Multiple Alignment Algorithm for Metabolic Pathways without Abstraction", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a669/12OmNzC5SCe", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/03/ttb2011030732", "title": "Manipulating the Steady State of Metabolic Pathways", "doi": null, "abstractUrl": "/journal/tb/2011/03/ttb2011030732/13rRUEgarrs", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2003/04/k0883", "title": "Applying Automatically Derived Gene-Groups to Automatically Predict and Refine Metabolic Pathways", "doi": null, "abstractUrl": "/journal/tk/2003/04/k0883/13rRUwbs215", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyRg4m8", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "acronym": "bibmw", "groupId": "1001585", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCdk2L4", "doi": "10.1109/BIBMW.2010.5703808", "title": "Clustering-based methodology with minimal user supervision for displaying cell-phenotype signatures in image-based screening", "normalizedTitle": "Clustering-based methodology with minimal user supervision for displaying cell-phenotype signatures in image-based screening", "abstract": "Most quantitative cell image-based screening analyses are dependent on thorough user supervision based on assay-specific knowledge. To minimize human bias in analysis, we introduce an automated methodology of displaying screen phenotypes using clustering that provides intuitive visuals to guide user supervision when required. Our premise is to automatically present to users an overview of screen phenotype-contents to assist in planning assay and analysis of a new screen. Our methodology starts from numerical features of cell-images, removes outliers through the density-based clustering OPTICS, identifies significant phenotypes by the Hierarchical Agglomerative Clustering and Dynamic Tree Cut techniques, and displays representative cell images as phenotype-signatures. User supervision needed to detect outliers and adjust the desired heterogeneity-level of identified phenotypes is facilitated respectively by an intuitive density plot and a systematic phenotype display. The methodology was tested on various phenotypes of the Golgi apparatus, an intracellular structure essential for cell physiology and protein secretion. The Golgi apparatus was targeted by various drug treatments. This test demonstrates the methodology's potentials by providing a comprehensive categorization of Golgi phenotypes.", "abstracts": [ { "abstractType": "Regular", "content": "Most quantitative cell image-based screening analyses are dependent on thorough user supervision based on assay-specific knowledge. To minimize human bias in analysis, we introduce an automated methodology of displaying screen phenotypes using clustering that provides intuitive visuals to guide user supervision when required. Our premise is to automatically present to users an overview of screen phenotype-contents to assist in planning assay and analysis of a new screen. Our methodology starts from numerical features of cell-images, removes outliers through the density-based clustering OPTICS, identifies significant phenotypes by the Hierarchical Agglomerative Clustering and Dynamic Tree Cut techniques, and displays representative cell images as phenotype-signatures. User supervision needed to detect outliers and adjust the desired heterogeneity-level of identified phenotypes is facilitated respectively by an intuitive density plot and a systematic phenotype display. The methodology was tested on various phenotypes of the Golgi apparatus, an intracellular structure essential for cell physiology and protein secretion. The Golgi apparatus was targeted by various drug treatments. This test demonstrates the methodology's potentials by providing a comprehensive categorization of Golgi phenotypes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most quantitative cell image-based screening analyses are dependent on thorough user supervision based on assay-specific knowledge. To minimize human bias in analysis, we introduce an automated methodology of displaying screen phenotypes using clustering that provides intuitive visuals to guide user supervision when required. Our premise is to automatically present to users an overview of screen phenotype-contents to assist in planning assay and analysis of a new screen. Our methodology starts from numerical features of cell-images, removes outliers through the density-based clustering OPTICS, identifies significant phenotypes by the Hierarchical Agglomerative Clustering and Dynamic Tree Cut techniques, and displays representative cell images as phenotype-signatures. User supervision needed to detect outliers and adjust the desired heterogeneity-level of identified phenotypes is facilitated respectively by an intuitive density plot and a systematic phenotype display. The methodology was tested on various phenotypes of the Golgi apparatus, an intracellular structure essential for cell physiology and protein secretion. The Golgi apparatus was targeted by various drug treatments. This test demonstrates the methodology's potentials by providing a comprehensive categorization of Golgi phenotypes.", "fno": "05703808", "keywords": [ "Biomedical Optical Imaging", "Cellular Biophysics", "Drugs", "Fluorescence", "Pattern Clustering", "Proteins", "Clustering", "User Supervision", "Cell Phenotype Signatures", "Image Based Screening", "OPTICS", "Hierarchical Agglomerative Clustering And Dynamic Tree Cut", "Golgi Apparatus", "Intracellular Structure", "Protein Secretion", "Fluorescence Images", "Optics", "Couplings", "Drugs", "Visualization", "Accuracy", "Feature Extraction", "Systematics", "High Content Screening", "Drug Analysis", "Cell Image Analysis", "Phenotype Clustering" ], "authors": [ { "affiliation": "Institute of High Performance Computing, Republic of Singapore", "fullName": "William-Chandra Tjhi", "givenName": "William-Chandra", "surname": "Tjhi", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of High Performance Computing, Republic of Singapore", "fullName": "Kee Khoon Lee", "givenName": "Kee Khoon", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of High Performance Computing, Republic of Singapore", "fullName": "Terence Hung", "givenName": "Terence", "surname": "Hung", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University, Republic of Singapore", "fullName": "Yew Soon Ong", "givenName": "Yew Soon", "surname": "Ong", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University, Republic of Singapore", "fullName": "Ivor Tsang Wai Hung", "givenName": "Ivor", "surname": "Tsang Wai Hung", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Molecular and Cell Biology, Republic of Singapore", "fullName": "Victor Racine", "givenName": "Victor", "surname": "Racine", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Molecular and Cell Biology, Republic of Singapore", "fullName": "Frederic Bard", "givenName": "Frederic", "surname": "Bard", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "252-257", "year": "2010", "issn": null, "isbn": "978-1-4244-8303-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05703807", "articleId": "12OmNyUWR4V", "__typename": "AdjacentArticleType" }, "next": { "fno": "05703809", "articleId": "12OmNyTfgb5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/lssa/2006/0277/0/04015805", "title": "Classify cellular phenotype in high-throughput fluorescence microcopy images for RNAi genome-wide screening", "doi": null, "abstractUrl": "/proceedings-article/lssa/2006/04015805/12OmNwcUjW3", "parentPublication": { "id": "proceedings/lssa/2006/0277/0", "title": "2006 IEEE/NLM Life Science Systems and Applications Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csbw/2005/2442/0/24420374", "title": "Cell Phenotype Classification Based on 3D Cell Image Analysis", "doi": null, "abstractUrl": "/proceedings-article/csbw/2005/24420374/12OmNxisQZg", "parentPublication": { "id": "proceedings/csbw/2005/2442/0", "title": "2005 IEEE Computational Systems Bioinformatics Conference Workshops and Poster Abstracts", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/05/08585043", "title": "Causal Reasoning on Boolean Control Networks Based on Abduction: Theory and Application to Cancer Drug Discovery", "doi": null, "abstractUrl": "/journal/tb/2019/05/08585043/17D45Xh13ty", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669303", "title": "NeuroPredictome: A Data-Driven Predictome Linking Neuroimaging to Phenotype", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669303/1A9VhLkOhxK", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09726867", "title": "Computational Prediction of Drug Phenotypic Effects Based on Substructure-Phenotype Associations", "doi": null, "abstractUrl": "/journal/tb/2023/01/09726867/1BrwiS97ums", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08827951", "title": "Facetto: Combining Unsupervised and Supervised Learning for Hierarchical Phenotype Analysis in Multi-Channel Image Data", "doi": null, "abstractUrl": "/journal/tg/2020/01/08827951/1ddbk50fzNK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAXxWQw", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "acronym": "iscc", "groupId": "1000156", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNCesram", "doi": "10.1109/ISCC.2017.8024647", "title": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "normalizedTitle": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "abstract": "Gene-phenotype association prediction can be applied to reveal the inherited basis of human diseases and help drug development. Gene-phenotype associations are related to complex biological process and influenced by various factors, such as relationship between phenotypes and that among genes. While due to sparseness of curated gene-phenotype associations, existing approaches are limited to prediction accuracy. In this paper, we propose a novel method by exploiting weighted graph constraint learned from hierarchical structures of phenotype data and group prior information among genes by inheriting advantages of Non-negative Matrix Factorization (NMF), called Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization (GC2NMF). Specifically, firstly we introduce the depth of parent-child relationships between two adjacent phenotypes in hierarchal phenotypic data as weighted graph constraint for a better phenotype understanding. Secondly, we utilize intra-group correlation among genes in a gene group as group constraint for gene understanding. Such information provides us an intuitive priori that genes in a group probably result in similar phenotypes. The model allows not only to achieve a high prediction performance but also jointly to learn interpretable representation of genes and phenotypes to handle future biological analysis. Experimental results on biological gene-phenotype association datasets of mouse and human demonstrate that GC2NMF can obtain superior prediction accuracy and good understandability for biological explanation over other state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Gene-phenotype association prediction can be applied to reveal the inherited basis of human diseases and help drug development. Gene-phenotype associations are related to complex biological process and influenced by various factors, such as relationship between phenotypes and that among genes. While due to sparseness of curated gene-phenotype associations, existing approaches are limited to prediction accuracy. In this paper, we propose a novel method by exploiting weighted graph constraint learned from hierarchical structures of phenotype data and group prior information among genes by inheriting advantages of Non-negative Matrix Factorization (NMF), called Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization (GC2NMF). Specifically, firstly we introduce the depth of parent-child relationships between two adjacent phenotypes in hierarchal phenotypic data as weighted graph constraint for a better phenotype understanding. Secondly, we utilize intra-group correlation among genes in a gene group as group constraint for gene understanding. Such information provides us an intuitive priori that genes in a group probably result in similar phenotypes. The model allows not only to achieve a high prediction performance but also jointly to learn interpretable representation of genes and phenotypes to handle future biological analysis. Experimental results on biological gene-phenotype association datasets of mouse and human demonstrate that GC2NMF can obtain superior prediction accuracy and good understandability for biological explanation over other state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Gene-phenotype association prediction can be applied to reveal the inherited basis of human diseases and help drug development. Gene-phenotype associations are related to complex biological process and influenced by various factors, such as relationship between phenotypes and that among genes. While due to sparseness of curated gene-phenotype associations, existing approaches are limited to prediction accuracy. In this paper, we propose a novel method by exploiting weighted graph constraint learned from hierarchical structures of phenotype data and group prior information among genes by inheriting advantages of Non-negative Matrix Factorization (NMF), called Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization (GC2NMF). Specifically, firstly we introduce the depth of parent-child relationships between two adjacent phenotypes in hierarchal phenotypic data as weighted graph constraint for a better phenotype understanding. Secondly, we utilize intra-group correlation among genes in a gene group as group constraint for gene understanding. Such information provides us an intuitive priori that genes in a group probably result in similar phenotypes. The model allows not only to achieve a high prediction performance but also jointly to learn interpretable representation of genes and phenotypes to handle future biological analysis. Experimental results on biological gene-phenotype association datasets of mouse and human demonstrate that GC2NMF can obtain superior prediction accuracy and good understandability for biological explanation over other state-of-the-art methods.", "fno": "08024647", "keywords": [ "Ontologies", "Mice", "Laplace Equations", "Computers", "Diseases", "Prediction Algorithms" ], "authors": [ { "affiliation": "College of Software, NanKai University, TianJin, China, 300071", "fullName": "Yaogong Zhang", "givenName": null, "surname": "Yaogong Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science and Information Engineering, Tianjin University of Science and Technology, 300222, China", "fullName": "Yuan Wang", "givenName": null, "surname": "Yuan Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Software, NanKai University, TianJin, China, 300071", "fullName": "Jiahui Liu", "givenName": null, "surname": "Jiahui Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Software, NanKai University, TianJin, China, 300071", "fullName": "Yalou Huang", "givenName": null, "surname": "Yalou Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Software, NanKai University, TianJin, China, 300071", "fullName": "Maoqiang Xie", "givenName": null, "surname": "Maoqiang Xie", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "943-950", "year": "2017", "issn": null, "isbn": "978-1-5386-1629-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08024646", "articleId": "12OmNwc3wxd", "__typename": "AdjacentArticleType" }, "next": { "fno": "08024648", "articleId": "12OmNzYNNf4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2017/1710/0/1710a358", "title": "Extracting Disease-Phenotype Relations from Text with Disease-Phenotype Concept Recognisers and Association Rule Mining", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a358/12OmNANTAsy", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217911/12OmNxdVgQc", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2018/4975/0/497501a406", "title": "Computing Empirical P-Values for Estimating Gene-Gene Interactions in Genome-Wide Association Studies: A Parallel Computing Approach", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a406/12OmNxj23et", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2009/3656/0/3656a030", "title": "Constructing Yeast Phenotypic Gene Network Using Morphological Inclusion Relations", "doi": null, "abstractUrl": "/proceedings-article/bibe/2009/3656a030/12OmNzcPAJB", "parentPublication": { "id": "proceedings/bibe/2009/3656/0", "title": "2009 Ninth IEEE International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359849", "title": "Predicting disease genes based on normalized protein modules and phenotype ontology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359849/12OmNzdoMBX", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534774", "title": "PhenoStacks: Cross-Sectional Cohort Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534774/13rRUy2YLYB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669459", "title": "Prioritizing Disease Genes via Multi-View Nonnegative Matrix Factorization with Layer-Wise Explicit Hierarchical Constraint", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669459/1A9W1q9O6Na", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995585", "title": "A Gene Similarity Algorithm Based on Autocorrelation of Diseases and Phenotypes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995585/1JC3hmhepVK", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800a239", "title": "Research on Adoption of Gene-Disease Identification and Recognition Phenotype Process in High-Performance Computing and Applications (HPCA) Research", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800a239/1dPoleRbG3C", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09491997", "title": "PhenoGeneRanker: Gene and Phenotype Prioritization Using Multiplex Heterogeneous Networks", "doi": null, "abstractUrl": "/journal/tb/2022/05/09491997/1volIuJ05uo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxdVgQc", "doi": "10.1109/BIBM.2017.8217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "normalizedTitle": "Measuring phenotype-phenotype similarity through the interactome", "abstract": "Recently, measuring phenotype similarity began to play an important role in disease diagnosis. Researchers have begun to pay attention to develop phenotype similarity measurement. However, existing methods ignore the interactions between phenotype-associated proteins, which may lead to inaccurate phenotype similarity. We proposed a network-based method PhenoNet to calculate the similarity between phenotypes. We localized phenotypes in the network and calculated the similarity between phenotype-associated modules by modeling both the inter- and intra-similarity. PhenoNet was evaluated on two independent evaluation datasets: gene ontology and gene expression data. The result shows that PhenoNet performs better than the state-of-art methods on all evaluation tests.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, measuring phenotype similarity began to play an important role in disease diagnosis. Researchers have begun to pay attention to develop phenotype similarity measurement. However, existing methods ignore the interactions between phenotype-associated proteins, which may lead to inaccurate phenotype similarity. We proposed a network-based method PhenoNet to calculate the similarity between phenotypes. We localized phenotypes in the network and calculated the similarity between phenotype-associated modules by modeling both the inter- and intra-similarity. PhenoNet was evaluated on two independent evaluation datasets: gene ontology and gene expression data. The result shows that PhenoNet performs better than the state-of-art methods on all evaluation tests.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, measuring phenotype similarity began to play an important role in disease diagnosis. Researchers have begun to pay attention to develop phenotype similarity measurement. However, existing methods ignore the interactions between phenotype-associated proteins, which may lead to inaccurate phenotype similarity. We proposed a network-based method PhenoNet to calculate the similarity between phenotypes. We localized phenotypes in the network and calculated the similarity between phenotype-associated modules by modeling both the inter- and intra-similarity. PhenoNet was evaluated on two independent evaluation datasets: gene ontology and gene expression data. The result shows that PhenoNet performs better than the state-of-art methods on all evaluation tests.", "fno": "08217911", "keywords": [ "Proteins", "Niobium", "Diseases", "Mathematical Model", "Correlation", "Medical Diagnosis", "Ontologies", "Phenotype Relationships", "Interactome", "Human Phenotype Ontology" ], "authors": [ { "affiliation": "School of Computer Science, Northwestern Polytechnical University, Xi'an, China", "fullName": "Jiajie Peng", "givenName": "Jiajie", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Northwestern Polytechnical University, Xi'an, China", "fullName": "Weiwei Hui", "givenName": "Weiwei", "surname": "Hui", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Northwestern Polytechnical University, Xi'an, China", "fullName": "Xuequn Shang", "givenName": "Xuequn", "surname": "Shang", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "1674-1677", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217910", "articleId": "12OmNB0nW93", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217912", "articleId": "12OmNyugyD5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822617", "title": "Measuring phenotype semantic similarity using Human Phenotype Ontology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822617/12OmNAkWvex", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024647", "title": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024647/12OmNCesram", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822487", "title": "InfDisSim: A novel method for measuring disease similarity based on information flow", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822487/12OmNvSKNFD", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2015/6799/0/07359849", "title": "Predicting disease genes based on normalized protein modules and phenotype ontology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2015/07359849/12OmNzdoMBX", "parentPublication": { "id": "proceedings/bibm/2015/6799/0", "title": "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534774", "title": "PhenoStacks: Cross-Sectional Cohort Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534774/13rRUy2YLYB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192670", "title": "PhenoBlocks: Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192670/13rRUyYSWt0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669459", "title": "Prioritizing Disease Genes via Multi-View Nonnegative Matrix Factorization with Layer-Wise Explicit Hierarchical Constraint", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669459/1A9W1q9O6Na", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995585", "title": "A Gene Similarity Algorithm Based on Autocorrelation of Diseases and Phenotypes", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995585/1JC3hmhepVK", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0/205800a239", "title": "Research on Adoption of Gene-Disease Identification and Recognition Phenotype Process in High-Performance Computing and Applications (HPCA) Research", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2019/205800a239/1dPoleRbG3C", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2019/2058/0", "title": "2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09491997", "title": "PhenoGeneRanker: Gene and Phenotype Prioritization Using Multiplex Heterogeneous Networks", "doi": null, "abstractUrl": "/journal/tb/2022/05/09491997/1volIuJ05uo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9VchbY4Mw", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9W1q9O6Na", "doi": "10.1109/BIBM52615.2021.9669459", "title": "Prioritizing Disease Genes via Multi-View Nonnegative Matrix Factorization with Layer-Wise Explicit Hierarchical Constraint", "normalizedTitle": "Prioritizing Disease Genes via Multi-View Nonnegative Matrix Factorization with Layer-Wise Explicit Hierarchical Constraint", "abstract": "Prioritizing casual genes for disease phenotypes can reveal the inherent basis of human diseases and facilitate drug developments. It is widely believed that the full utilization of hierarchical structure of phenotype ontologies in HPO can improve the performance of gene prioritization significantly. However, previous works mostly utilize the hierarchical structure as graph constraint or implicit hierarchical relation, thus unable to fully depict the underlying correlations among adjacent levels of phenotype ontologies.To tackle the issue, we proposed a Multi-View Nonnegative Matrix Factorization method with Layer-Wise Explicit Hierarchical Constraint (HMNMF), which fully explores the &#x201C;is-a&#x201D; relationship between adjacent levels of phenotypes in HPO. Experimental results demonstrate the outstanding performance of HMNMF not only in the extraordinary global gene prioritization performance but also in the strong ability to prioritize candidate genes for totally new phenotypes.", "abstracts": [ { "abstractType": "Regular", "content": "Prioritizing casual genes for disease phenotypes can reveal the inherent basis of human diseases and facilitate drug developments. It is widely believed that the full utilization of hierarchical structure of phenotype ontologies in HPO can improve the performance of gene prioritization significantly. However, previous works mostly utilize the hierarchical structure as graph constraint or implicit hierarchical relation, thus unable to fully depict the underlying correlations among adjacent levels of phenotype ontologies.To tackle the issue, we proposed a Multi-View Nonnegative Matrix Factorization method with Layer-Wise Explicit Hierarchical Constraint (HMNMF), which fully explores the &#x201C;is-a&#x201D; relationship between adjacent levels of phenotypes in HPO. Experimental results demonstrate the outstanding performance of HMNMF not only in the extraordinary global gene prioritization performance but also in the strong ability to prioritize candidate genes for totally new phenotypes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Prioritizing casual genes for disease phenotypes can reveal the inherent basis of human diseases and facilitate drug developments. It is widely believed that the full utilization of hierarchical structure of phenotype ontologies in HPO can improve the performance of gene prioritization significantly. However, previous works mostly utilize the hierarchical structure as graph constraint or implicit hierarchical relation, thus unable to fully depict the underlying correlations among adjacent levels of phenotype ontologies.To tackle the issue, we proposed a Multi-View Nonnegative Matrix Factorization method with Layer-Wise Explicit Hierarchical Constraint (HMNMF), which fully explores the “is-a” relationship between adjacent levels of phenotypes in HPO. Experimental results demonstrate the outstanding performance of HMNMF not only in the extraordinary global gene prioritization performance but also in the strong ability to prioritize candidate genes for totally new phenotypes.", "fno": "09669459", "keywords": [ "Bioinformatics", "Diseases", "Genetics", "Matrix Decomposition", "Ontologies Artificial Intelligence", "Disease Genes", "Layer Wise Explicit Hierarchical Constraint", "Casual Genes", "Disease Phenotypes", "Human Diseases", "Hierarchical Structure", "Phenotype Ontologies", "HPO", "Graph Constraint", "Implicit Hierarchical Relation", "Multiview Nonnegative Matrix Factorization", "HMNMF", "Global Gene Prioritization Performance", "Drugs", "Correlation", "Conferences", "Ontologies", "Robustness", "Bioinformatics", "Diseases", "Nonnegative Matrix Factorization", "Gene Prioritization", "Hierarchical Constraint" ], "authors": [ { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "Xu Jin", "givenName": "Xu", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "MingMing Liu", "givenName": "MingMing", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "WenQian He", "givenName": "WenQian", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "Lin Wang", "givenName": "Lin", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "Ling Ma", "givenName": "Ling", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "TianJin International Joint Academy of Biomedicine,TianJin,China", "fullName": "YaLou Huang", "givenName": "YaLou", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Nankai University,Collage of Software,TianJin,China", "fullName": "MaoQiang Xie", "givenName": "MaoQiang", "surname": "Xie", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "424-429", "year": "2021", "issn": null, "isbn": "978-1-6654-0126-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09669357", "articleId": "1A9VgLCbT20", "__typename": "AdjacentArticleType" }, "next": { "fno": "09669657", "articleId": "1A9W7oyURkQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2016/1611/0/07822617", "title": "Measuring phenotype semantic similarity using Human Phenotype Ontology", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822617/12OmNAkWvex", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024647", "title": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024647/12OmNCesram", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2014/5669/0/06999162", "title": "Prioritizing disease-causing genes based on network diffusion and rank concordance", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999162/12OmNvEQsfo", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217911/12OmNxdVgQc", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2016/1611/0/07822766", "title": "Analyzing factors involved in the HPO-based semantic similarity calculation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2016/07822766/12OmNyKJizC", "parentPublication": { "id": "proceedings/bibm/2016/1611/0", "title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi-w/2018/6777/0/677701a029", "title": "Constructing Node Embeddings for Human Phenotype Ontology to Assist Phenotypic Similarity Measurement", "doi": null, "abstractUrl": "/proceedings-article/ichi-w/2018/677701a029/12OmNz2C1B9", "parentPublication": { "id": "proceedings/ichi-w/2018/6777/0", "title": "2018 IEEE International Conference on Healthcare Informatics Workshop (ICHI-W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/01/ttb2012010294", "title": "Transactional Database Transformation and Its Application in Prioritizing Human Disease Genes", "doi": null, "abstractUrl": "/journal/tb/2012/01/ttb2012010294/13rRUwgQpBB", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534774", "title": "PhenoStacks: Cross-Sectional Cohort Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534774/13rRUy2YLYB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192670", "title": "PhenoBlocks: Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192670/13rRUyYSWt0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/05/09491997", "title": "PhenoGeneRanker: Gene and Phenotype Prioritization Using Multiplex Heterogeneous Networks", "doi": null, "abstractUrl": "/journal/tb/2022/05/09491997/1volIuJ05uo", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JC1F8KcINO", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "9994793", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JC2DOPYJiw", "doi": "10.1109/BIBM55620.2022.9995118", "title": "Phenotype Prediction by Heterogeneous Molecular Network Embedding", "normalizedTitle": "Phenotype Prediction by Heterogeneous Molecular Network Embedding", "abstract": "Phenotype prediction aims to infer the traits of living organisms based on genomics data, which has important applications in biology such as cancer subtype diagnosis and crop breedings. Traditional phenotype prediction approaches only learn the low-dimensional representation of samples, but ignore the interaction between biomolecules and cannot use the topology structure of heterogeneous molecular networks. Furthermore, most of them lack interpretability and do not effectively identify key biomolecules associated with phenotypes. In this paper, we propose a heterogeneous network embedding based solution (PhenoHNE) to predict phenotype by fusing topology information of molecules. PhenoHNE firstly utilizes variational graph autoencode (VGAE) to obtain the embedding representation of molecules in the heterogeneous network. Secondly, PhenoHNE adopts multilayer perceptron (MLP) with attention mechanism to learn sample representation. Finally, it fuses molecular embedding representation and sample representation to predict the phenotype of samples. In this way, the genetics information of heterogeneous molecular network can further guide the feature learning of samples and improve the prediction performance. Experimental results on human and maize datasets confirm that PhenoHNE outperforms competitive methods by a large margin under different evaluation protocols, and it also can effectively identify the key molecules associated with phenotypes of interests.", "abstracts": [ { "abstractType": "Regular", "content": "Phenotype prediction aims to infer the traits of living organisms based on genomics data, which has important applications in biology such as cancer subtype diagnosis and crop breedings. Traditional phenotype prediction approaches only learn the low-dimensional representation of samples, but ignore the interaction between biomolecules and cannot use the topology structure of heterogeneous molecular networks. Furthermore, most of them lack interpretability and do not effectively identify key biomolecules associated with phenotypes. In this paper, we propose a heterogeneous network embedding based solution (PhenoHNE) to predict phenotype by fusing topology information of molecules. PhenoHNE firstly utilizes variational graph autoencode (VGAE) to obtain the embedding representation of molecules in the heterogeneous network. Secondly, PhenoHNE adopts multilayer perceptron (MLP) with attention mechanism to learn sample representation. Finally, it fuses molecular embedding representation and sample representation to predict the phenotype of samples. In this way, the genetics information of heterogeneous molecular network can further guide the feature learning of samples and improve the prediction performance. Experimental results on human and maize datasets confirm that PhenoHNE outperforms competitive methods by a large margin under different evaluation protocols, and it also can effectively identify the key molecules associated with phenotypes of interests.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Phenotype prediction aims to infer the traits of living organisms based on genomics data, which has important applications in biology such as cancer subtype diagnosis and crop breedings. Traditional phenotype prediction approaches only learn the low-dimensional representation of samples, but ignore the interaction between biomolecules and cannot use the topology structure of heterogeneous molecular networks. Furthermore, most of them lack interpretability and do not effectively identify key biomolecules associated with phenotypes. In this paper, we propose a heterogeneous network embedding based solution (PhenoHNE) to predict phenotype by fusing topology information of molecules. PhenoHNE firstly utilizes variational graph autoencode (VGAE) to obtain the embedding representation of molecules in the heterogeneous network. Secondly, PhenoHNE adopts multilayer perceptron (MLP) with attention mechanism to learn sample representation. Finally, it fuses molecular embedding representation and sample representation to predict the phenotype of samples. In this way, the genetics information of heterogeneous molecular network can further guide the feature learning of samples and improve the prediction performance. Experimental results on human and maize datasets confirm that PhenoHNE outperforms competitive methods by a large margin under different evaluation protocols, and it also can effectively identify the key molecules associated with phenotypes of interests.", "fno": "09995118", "keywords": [ "Bioinformatics", "Cancer", "Feature Extraction", "Genetics", "Genomics", "Graph Theory", "Learning Artificial Intelligence", "Molecular Biophysics", "Multilayer Perceptrons", "Cancer Subtype Diagnosis", "Crop Breedings", "Heterogeneous Molecular Network", "Heterogeneous Network", "Molecular Embedding Representation", "Pheno HNE", "Phenotype Prediction", "Sample Representation", "Representation Learning", "Protocols", "Network Topology", "Fuses", "Molecular Biophysics", "Heterogeneous Networks", "Organisms", "Phenotype Prediction", "Heterogeneous Molecular Network", "Multi Omics Data Fusion", "Variational Graph Auto Encode", "Multilayer Perceptron" ], "authors": [ { "affiliation": "Shandong University,School of Software,Jinan,China", "fullName": "Haojiang Tan", "givenName": "Haojiang", "surname": "Tan", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,SDU-NTU Joint Centre For AI Research (C-FAIR),Jinan,China", "fullName": "Jun Wang", "givenName": "Jun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,SDU-NTU Joint Centre For AI Research (C-FAIR),Jinan,China", "fullName": "Guoxian Yu", "givenName": "Guoxian", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,SDU-NTU Joint Centre For AI Research (C-FAIR),Jinan,China", "fullName": "Wei Guo", "givenName": "Wei", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Elec. & Inf. Eng. BUCEA,Beijing,China", "fullName": "Maozu Guo", "givenName": "Maozu", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "116-121", "year": "2022", "issn": null, "isbn": "978-1-6654-6819-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09994888", "articleId": "1JC2xFU0zAs", "__typename": "AdjacentArticleType" }, "next": { "fno": "09995207", "articleId": "1JC225NSydi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498schmidte", "title": "Visualizing Dynamic Molecular Conformations", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498schmidte/12OmNBTawrZ", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/glsvlsid/1999/0104/0/01040392", "title": "Advances Toward Molecular-Scale Electronic Digital Logic Circuits: A Review and Prospectus", "doi": null, "abstractUrl": "/proceedings-article/glsvlsid/1999/01040392/12OmNs59JFF", "parentPublication": { "id": "proceedings/glsvlsid/1999/0104/0", "title": "Great Lakes Symposium on VLSI", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2006/0226/0/02260034", "title": "Energy-Field Optimization and Haptic-Based Molecular Docking and Assembly Search System for Computer-Aided Molecular Design (CAMD)", "doi": null, "abstractUrl": "/proceedings-article/haptics/2006/02260034/12OmNvJXeyZ", "parentPublication": { "id": "proceedings/haptics/2006/0226/0", "title": "2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2017/0604/0/0604a152", "title": "Reliability Analysis of Molecular Communication Based on Drift Diffusion", "doi": null, "abstractUrl": "/proceedings-article/nana/2017/0604a152/12OmNwJgAIM", "parentPublication": { "id": "proceedings/nana/2017/0604/0", "title": "2017 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsa/2009/3701/0/3701a145", "title": "Triangulation of Molecular Surfaces Using an Isosurface Continuation Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iccsa/2009/3701a145/12OmNzb7Zqw", "parentPublication": { "id": "proceedings/iccsa/2009/3701/0", "title": "2009 International Conference on Computational Science and Its Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2016/1451/0/07465257", "title": "An integrated geometric and topological approach to connecting cavities in biomolecules", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2016/07465257/12OmNzgwmKm", "parentPublication": { "id": "proceedings/pacificvis/2016/1451/0", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669792", "title": "Genome-Phenome Association Prediction by Deep Factorizing Heterogeneous Molecular Network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669792/1A9W3gRaEvu", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995707", "title": "Effective Subject Representation based on Multi-omics Disease Networks using Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995707/1JC2PJxl9q8", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2006/2520/0/01599044", "title": "Molecular communication for health care applications", "doi": null, "abstractUrl": "/proceedings-article/percomw/2006/01599044/1fHGJvKAsXC", "parentPublication": { "id": "proceedings/percomw/2006/2520/0", "title": "Proceedings. Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshop-PerCom Workshop 2006", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/06/08994100", "title": "Learning Representation of Molecules in Association Network for Predicting Intermolecular Associations", "doi": null, "abstractUrl": "/journal/tb/2021/06/08994100/1hkQFHPK9y0", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJivY", "title": "2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNAkWvHS", "doi": "10.1109/ASE.2011.6100069", "title": "Finding relevant answers in software forums", "normalizedTitle": "Finding relevant answers in software forums", "abstract": "Online software forums provide a huge amount of valuable content. Developers and users often ask questions and receive answers from such forums. The availability of a vast amount of thread discussions in forums provides ample opportunities for knowledge acquisition and summarization. For a given search query, current search engines use traditional information retrieval approach to extract webpages containing relevant keywords. However, in software forums, often there are many threads containing similar keywords where each thread could contain a lot of posts as many as 1,000 or more. Manually finding relevant answers from these long threads is a painstaking task to the users. Finding relevant answers is particularly hard in software forums as: complexities of software systems cause a huge variety of issues often expressed in similar technical jargons, and software forum users are often expert internet users who often posts answers in multiple venues creating many duplicate posts, often without satisfying answers, in the world wide web. To address this problem, this paper provides a semantic search engine framework to process software threads and recover relevant answers according to user queries. Different from standard information retrieval engine, our framework infer semantic tags of posts in the software forum threads and utilize these tags to recover relevant answer posts. In our case study, we analyze 6,068 posts from three software forums. In terms of accuracy of our inferred tags, we could achieve on average an overall precision, recall and F-measure of 67%, 71%, and 69% respectively. To empirically study the benefit of our overall framework, we also conduct a user-assisted study which shows that as compared to a standard information retrieval approach, our proposed framework could increase mean average precision from 17% to 71% in retrieving relevant answers to various queries and achieve a Normalized Discounted Cumulative Gain (nDCG) @1 score of 91.2% and nDCG@2 score of 71.6%.", "abstracts": [ { "abstractType": "Regular", "content": "Online software forums provide a huge amount of valuable content. Developers and users often ask questions and receive answers from such forums. The availability of a vast amount of thread discussions in forums provides ample opportunities for knowledge acquisition and summarization. For a given search query, current search engines use traditional information retrieval approach to extract webpages containing relevant keywords. However, in software forums, often there are many threads containing similar keywords where each thread could contain a lot of posts as many as 1,000 or more. Manually finding relevant answers from these long threads is a painstaking task to the users. Finding relevant answers is particularly hard in software forums as: complexities of software systems cause a huge variety of issues often expressed in similar technical jargons, and software forum users are often expert internet users who often posts answers in multiple venues creating many duplicate posts, often without satisfying answers, in the world wide web. To address this problem, this paper provides a semantic search engine framework to process software threads and recover relevant answers according to user queries. Different from standard information retrieval engine, our framework infer semantic tags of posts in the software forum threads and utilize these tags to recover relevant answer posts. In our case study, we analyze 6,068 posts from three software forums. In terms of accuracy of our inferred tags, we could achieve on average an overall precision, recall and F-measure of 67%, 71%, and 69% respectively. To empirically study the benefit of our overall framework, we also conduct a user-assisted study which shows that as compared to a standard information retrieval approach, our proposed framework could increase mean average precision from 17% to 71% in retrieving relevant answers to various queries and achieve a Normalized Discounted Cumulative Gain (nDCG) @1 score of 91.2% and nDCG@2 score of 71.6%.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Online software forums provide a huge amount of valuable content. Developers and users often ask questions and receive answers from such forums. The availability of a vast amount of thread discussions in forums provides ample opportunities for knowledge acquisition and summarization. For a given search query, current search engines use traditional information retrieval approach to extract webpages containing relevant keywords. However, in software forums, often there are many threads containing similar keywords where each thread could contain a lot of posts as many as 1,000 or more. Manually finding relevant answers from these long threads is a painstaking task to the users. Finding relevant answers is particularly hard in software forums as: complexities of software systems cause a huge variety of issues often expressed in similar technical jargons, and software forum users are often expert internet users who often posts answers in multiple venues creating many duplicate posts, often without satisfying answers, in the world wide web. To address this problem, this paper provides a semantic search engine framework to process software threads and recover relevant answers according to user queries. Different from standard information retrieval engine, our framework infer semantic tags of posts in the software forum threads and utilize these tags to recover relevant answer posts. In our case study, we analyze 6,068 posts from three software forums. In terms of accuracy of our inferred tags, we could achieve on average an overall precision, recall and F-measure of 67%, 71%, and 69% respectively. To empirically study the benefit of our overall framework, we also conduct a user-assisted study which shows that as compared to a standard information retrieval approach, our proposed framework could increase mean average precision from 17% to 71% in retrieving relevant answers to various queries and achieve a Normalized Discounted Cumulative Gain (nDCG) @1 score of 91.2% and nDCG@2 score of 71.6%.", "fno": "06100069", "keywords": [], "authors": [ { "affiliation": "School of Information Systems, Singapore Management University, Singapore", "fullName": "Swapna Gottipati", "givenName": "Swapna", "surname": "Gottipati", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Systems, Singapore Management University, Singapore", "fullName": "David Lo", "givenName": "David", "surname": "Lo", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Systems, Singapore Management University, Singapore", "fullName": "Jing Jiang", "givenName": null, "surname": "Jing Jiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "323-332", "year": "2011", "issn": null, "isbn": "978-1-4577-1638-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06100068", "articleId": "12OmNxHryg6", "__typename": "AdjacentArticleType" }, "next": { "fno": "06100070", "articleId": "12OmNxymo6l", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi/2004/2100/0/21000384", "title": "Mining Online Deal Forums for Hot Deals", "doi": null, "abstractUrl": "/proceedings-article/wi/2004/21000384/12OmNx4Q6Ge", "parentPublication": { "id": "proceedings/wi/2004/2100/0", "title": "Web Intelligence, IEEE / WIC / ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/27550079b", "title": "Using Foreign Forums", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/27550079b/12OmNx6g6gU", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624010", "title": "Exploring activeness of users in QA forums", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624010/12OmNzZmZs9", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icais/2009/3827/0/3827a175", "title": "Overlapping Communities Generation for Online Support Forums", "doi": null, "abstractUrl": "/proceedings-article/icais/2009/3827a175/12OmNzcxZ6a", "parentPublication": { "id": "proceedings/icais/2009/3827/0", "title": "2009 International Conference on Adaptive and Intelligent Systems. ICAIS 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mark/2010/8784/0/05623811", "title": "A hybrid recommender system for finding relevant users in open source forums", "doi": null, "abstractUrl": "/proceedings-article/mark/2010/05623811/12OmNzwZ6wV", "parentPublication": { "id": "proceedings/mark/2010/8784/0", "title": "2010 Third International Workshop on Managing Requirements Knowledge (MARK 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534878", "title": "Visual Analysis of MOOC Forums with iForum", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534878/13rRUzp02ou", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2022/9342/0/934200a046", "title": "Characterizing User Behaviors in Open-Source Software User Forums: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/934200a046/1Eo5Ks3BLrO", "parentPublication": { "id": "proceedings/chase/2022/9342/0", "title": "2022 IEEE/ACM 15th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a428", "title": "Requirement Mining in Software Product Forums", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a428/1fHluAtLaJq", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381312", "title": "RThread: A thread-centric analysis of security forums", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381312/1semF86hCGA", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2021/1898/0/189800a293", "title": "The Use of Sub-forums in Software Product Forums", "doi": null, "abstractUrl": "/proceedings-article/rew/2021/189800a293/1y2JSrjtQ9q", "parentPublication": { "id": "proceedings/rew/2021/1898/0", "title": "2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNySXF3W", "title": "2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNAolGNq", "doi": "10.1109/VLHCC.2015.7357204", "title": "Toward a domain-specific visual discussion forum for learning computer programming: An empirical study of a popular MOOC forum", "normalizedTitle": "Toward a domain-specific visual discussion forum for learning computer programming: An empirical study of a popular MOOC forum", "abstract": "Online discussion forums are one of the most ubiquitous kinds of resources for people who are learning computer programming. However, their user interface - a hierarchy of textual threads - has not changed much in the past four decades. We argue that generic forum interfaces are cumbersome for learning programming and that there is a need for a domain-specific visual discussion forum for programming. We support this argument with an empirical study of all 5,377 forum threads in Introduction to Computer Science and Programming Using Python, a popular edX MOOC. Specifically, we investigated how forum participants were hampered by its text-based format. Most notably, people often wanted to discuss questions about dynamic execution state - what happens “under the hood” as the computer runs code. We propose that a better forum for learning programming should be visual and domain-specific, integrating automatically-generated visualizations of execution state and enabling inline annotations of source code and output.", "abstracts": [ { "abstractType": "Regular", "content": "Online discussion forums are one of the most ubiquitous kinds of resources for people who are learning computer programming. However, their user interface - a hierarchy of textual threads - has not changed much in the past four decades. We argue that generic forum interfaces are cumbersome for learning programming and that there is a need for a domain-specific visual discussion forum for programming. We support this argument with an empirical study of all 5,377 forum threads in Introduction to Computer Science and Programming Using Python, a popular edX MOOC. Specifically, we investigated how forum participants were hampered by its text-based format. Most notably, people often wanted to discuss questions about dynamic execution state - what happens “under the hood” as the computer runs code. We propose that a better forum for learning programming should be visual and domain-specific, integrating automatically-generated visualizations of execution state and enabling inline annotations of source code and output.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Online discussion forums are one of the most ubiquitous kinds of resources for people who are learning computer programming. However, their user interface - a hierarchy of textual threads - has not changed much in the past four decades. We argue that generic forum interfaces are cumbersome for learning programming and that there is a need for a domain-specific visual discussion forum for programming. We support this argument with an empirical study of all 5,377 forum threads in Introduction to Computer Science and Programming Using Python, a popular edX MOOC. Specifically, we investigated how forum participants were hampered by its text-based format. Most notably, people often wanted to discuss questions about dynamic execution state - what happens “under the hood” as the computer runs code. We propose that a better forum for learning programming should be visual and domain-specific, integrating automatically-generated visualizations of execution state and enabling inline annotations of source code and output.", "fno": "07357204", "keywords": [ "Reliability Engineering", "Programming", "CS Education", "Discussion Forums", "MOOC" ], "authors": [ { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Joyce Zhu", "givenName": "Joyce", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Jeremy Warner", "givenName": "Jeremy", "surname": "Warner", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Mitchell Gordon", "givenName": "Mitchell", "surname": "Gordon", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Jeffery White", "givenName": "Jeffery", "surname": "White", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Renan Zanelatto", "givenName": "Renan", "surname": "Zanelatto", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Rochester, NY 14627, USA", "fullName": "Philip J. Guo", "givenName": "Philip J.", "surname": "Guo", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "101-109", "year": "2015", "issn": null, "isbn": "978-1-4673-7457-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07357203", "articleId": "12OmNApcubK", "__typename": "AdjacentArticleType" }, "next": { "fno": "07357205", "articleId": "12OmNxeut83", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2015/7334/0/7334a223", "title": "Exploring Constructive Learning Activity in Online Programming Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a223/12OmNAMtAOa", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051952", "title": "Language independent analysis and classification of discussion threads in Coursera MOOC forums", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051952/12OmNAXxXcT", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2006/2632/0/263200601", "title": "Improving the Quality of Discussion Forum discourses by Using an Internal Market", "doi": null, "abstractUrl": "/proceedings-article/icalt/2006/263200601/12OmNvTTcaE", "parentPublication": { "id": "proceedings/icalt/2006/2632/0", "title": "Sixth International Conference on Advanced Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403767", "title": "Uncovering the structure of knowledge exchange in a MOOC discussion forum", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403767/12OmNwHhoSe", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2006/0256/0/04117225", "title": "Students' Perspective on the Impact of a Web-based Discussion Forum on Student Learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2006/04117225/12OmNx9FhM3", "parentPublication": { "id": "proceedings/fie/2006/0256/0", "title": "Proceedings. Frontiers in Education. 36th Annual Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2005/9077/0/01611921", "title": "Evaluating threaded discussion forum activity: faculty and student perspectives on categories of activity", "doi": null, "abstractUrl": "/proceedings-article/fie/2005/01611921/12OmNz6iO8S", "parentPublication": { "id": "proceedings/fie/2005/9077/0", "title": "35th Annual Frontiers in Education", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344105", "title": "Identifying learning-inductive content in programming discussion forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344105/12OmNzVXNLT", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2012/1213/0/06240509", "title": "Evaluating forum discussions to inform the design of an API critic", "doi": null, "abstractUrl": "/proceedings-article/icpc/2012/06240509/12OmNzlD9pQ", "parentPublication": { "id": "proceedings/icpc/2012/1213/0", "title": "International Conference on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a114", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a114/12OmNzmLxTC", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a069", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a069/17D45XzbnJV", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBOll8c", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwHhoSe", "doi": "10.1145/2808797.2809359", "title": "Uncovering the structure of knowledge exchange in a MOOC discussion forum", "normalizedTitle": "Uncovering the structure of knowledge exchange in a MOOC discussion forum", "abstract": "This work explores methods to investigate the structure of knowledge exchange in discussion forums in massive open online courses (MOOCs) explicitly taking into account changing patterns over time. Various aspects of forum analysis combining different approaches are exemplified with a case of forum discussions from a Coursera MOOC.", "abstracts": [ { "abstractType": "Regular", "content": "This work explores methods to investigate the structure of knowledge exchange in discussion forums in massive open online courses (MOOCs) explicitly taking into account changing patterns over time. Various aspects of forum analysis combining different approaches are exemplified with a case of forum discussions from a Coursera MOOC.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work explores methods to investigate the structure of knowledge exchange in discussion forums in massive open online courses (MOOCs) explicitly taking into account changing patterns over time. Various aspects of forum analysis combining different approaches are exemplified with a case of forum discussions from a Coursera MOOC.", "fno": "07403767", "keywords": [ "Discussion Forums", "Message Systems", "Analytical Models", "Trajectory", "Social Network Services", "Knowledge Engineering", "Tensile Stress", "Discussion Forums", "Expertise Networks", "Role Analysis" ], "authors": [ { "affiliation": "University of Duisburg-Essen, Dept. of Computer Science and Applied Cognitive Science, Duisburg, Germany", "fullName": "Tobias Hecking", "givenName": "Tobias", "surname": "Hecking", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Duisburg-Essen, Dept. of Computer Science and Applied Cognitive Science, Duisburg, Germany", "fullName": "H. Ulrich Hoppe", "givenName": "H. Ulrich", "surname": "Hoppe", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Clausthal, Institute of Computer Science, Clausthal, Germany", "fullName": "Andreas Harrer", "givenName": "Andreas", "surname": "Harrer", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "1614-1615", "year": "2015", "issn": null, "isbn": "978-1-4503-3854-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07403766", "articleId": "12OmNwwd2PH", "__typename": "AdjacentArticleType" }, "next": { "fno": "07403768", "articleId": "12OmNARAnbJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2014/5880/0/07051952", "title": "Language independent analysis and classification of discussion threads in Coursera MOOC forums", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051952/12OmNAXxXcT", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a114", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a114/12OmNzmLxTC", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/06/mcg2015060069", "title": "Visual Analytics for MOOC Data", "doi": null, "abstractUrl": "/magazine/cg/2015/06/mcg2015060069/13rRUwInvMP", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/04/07762189", "title": "How Learners’ Interactions Sustain Engagement: A MOOC Case Study", "doi": null, "abstractUrl": "/journal/lt/2017/04/07762189/13rRUxNW1VS", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a085", "title": "Learning and Reflection of Technology Based Collaborative MOOC Design and Its Evaluation, Validation and Results", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a085/17D45W1Oa3O", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a073", "title": "LCM: A Model for Planning, Designing and Conducting Learner-Centric MOOCs", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a073/17D45W1Oa4D", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a077", "title": "Learner-Centric MOOC for Teachers on Effective ICT Integration: Perceptions and Experiences", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a077/17D45XwUAMq", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a069", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a069/17D45XzbnJV", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658570", "title": "Promoting Student Completion in a MOOC on Information Theory", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658570/18j8YCKPy80", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a400", "title": "Learning Student Interest Trajectory for MOOC Thread Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a400/1rgGhWcWpUs", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBtl1zK", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNx6g6gU", "doi": "10.1109/HICSS.2007.594", "title": "Using Foreign Forums", "normalizedTitle": "Using Foreign Forums", "abstract": "The paper considers the use of online technical discussions by software developers in Rio de Janeiro, Brazil, drawing on the results of a 5 month interview study. In the course of their daily work, Brazilian software developers routinely rely on online resources, which include as a key component foreign forums dedicated to technical questions. In rare cases, they actively participate in those forums; somewhat more often they \"lurk.\" Even more often, however, forum posts are simply found while searching for a specific topic. Forums are thus experienced not as intertwining threads of conversations, but rather as a searchable collection of questions and answers free from conversational context, which is appreciated in a detached, asocial way.", "abstracts": [ { "abstractType": "Regular", "content": "The paper considers the use of online technical discussions by software developers in Rio de Janeiro, Brazil, drawing on the results of a 5 month interview study. In the course of their daily work, Brazilian software developers routinely rely on online resources, which include as a key component foreign forums dedicated to technical questions. In rare cases, they actively participate in those forums; somewhat more often they \"lurk.\" Even more often, however, forum posts are simply found while searching for a specific topic. Forums are thus experienced not as intertwining threads of conversations, but rather as a searchable collection of questions and answers free from conversational context, which is appreciated in a detached, asocial way.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The paper considers the use of online technical discussions by software developers in Rio de Janeiro, Brazil, drawing on the results of a 5 month interview study. In the course of their daily work, Brazilian software developers routinely rely on online resources, which include as a key component foreign forums dedicated to technical questions. In rare cases, they actively participate in those forums; somewhat more often they \"lurk.\" Even more often, however, forum posts are simply found while searching for a specific topic. Forums are thus experienced not as intertwining threads of conversations, but rather as a searchable collection of questions and answers free from conversational context, which is appreciated in a detached, asocial way.", "fno": "27550079b", "keywords": [], "authors": [ { "affiliation": "UC Berkeley School of Information", "fullName": "Yuri Takhteyev", "givenName": "Yuri", "surname": "Takhteyev", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2007-01-01T00:00:00", "pubType": "proceedings", "pages": "79b", "year": "2007", "issn": "1530-1605", "isbn": "0-7695-2755-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27550079a", "articleId": "12OmNCcbEej", "__typename": "AdjacentArticleType" }, "next": { "fno": "27550079c", "articleId": "12OmNwIHosW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2011/1638/0/06100069", "title": "Finding relevant answers in software forums", "doi": null, "abstractUrl": "/proceedings-article/ase/2011/06100069/12OmNAkWvHS", "parentPublication": { "id": "proceedings/ase/2011/1638/0", "title": "2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsea/2010/4144/0/4144a259", "title": "A FAQ Finding Process in Open Source Project Forums", "doi": null, "abstractUrl": "/proceedings-article/icsea/2010/4144a259/12OmNxV4iAD", "parentPublication": { "id": "proceedings/icsea/2010/4144/0", "title": "Software Engineering Advances, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1999/0001/2/00012026", "title": "Conversation as Publishing: The Role of News Forums on the Web", "doi": null, "abstractUrl": "/proceedings-article/hicss/1999/00012026/12OmNyKJiz5", "parentPublication": { "id": "proceedings/hicss/1999/0001/2", "title": "Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a517", "title": "Retrieval of Semantically Similar Healthcare Questions in Healthcare Forums", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a517/12OmNyTfgbH", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2015/7457/0/07357216", "title": "Understanding triggers for clarification requests in community-based software help forums", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2015/07357216/12OmNyywxDe", "parentPublication": { "id": "proceedings/vlhcc/2015/7457/0", "title": "2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2013/0345/0/06624010", "title": "Exploring activeness of users in QA forums", "doi": null, "abstractUrl": "/proceedings-article/msr/2013/06624010/12OmNzZmZs9", "parentPublication": { "id": "proceedings/msr/2013/0345/0", "title": "2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a017", "title": "Can a Conversation Paint a Picture? Mining Requirements In Software Forums", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a017/1fHltDtKvu0", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/12/08999583", "title": "ConfigMiner: Identifying the Appropriate Configuration Options for Config-Related User Questions by Mining Online Forums", "doi": null, "abstractUrl": "/journal/ts/2021/12/08999583/1hpPFHzKXks", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2020/7122/0/712200a318", "title": "An Empirical Study on the Characteristics of Question-Answering Process on Developer Forums", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2020/712200a318/1pcSIbTDW5a", "parentPublication": { "id": "proceedings/icse-companion/2020/7122/0", "title": "2020 IEEE/ACM 42nd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2021/1898/0/189800a293", "title": "The Use of Sub-forums in Software Product Forums", "doi": null, "abstractUrl": "/proceedings-article/rew/2021/189800a293/1y2JSrjtQ9q", "parentPublication": { "id": "proceedings/rew/2021/1898/0", "title": "2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQYteX", "title": "2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)", "acronym": "aiccsa", "groupId": "1000146", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdGnqi", "doi": "10.1109/AICCSA.2016.7945821", "title": "Some commericial concerns of Amazon's community forums: The case of the Kindle", "normalizedTitle": "Some commericial concerns of Amazon's community forums: The case of the Kindle", "abstract": "Ecommerce consumers have many platforms for discussing products, one of which is the online product forum. These forums exist across the web on a variety of ecommerce shopping sites, including Amazon.com. However, the value of an online product forum for consumers, ecommerce, or the shopping site business is unclear. In this research, we examine 1,027 threads and 12,467 posts from the Amazon Kindle Forum, which is Amazon's most active product forum. We use text analytics techniques to categorize the social media posts according to phases of buying decision process, simplified into pre-purchase and post-purchase activity. We use the metric of post helpfulness rating to measure the post value to the customer. Our analysis shows that customers primarily use the Kindle Forum for post-purchase activity. In addition, customers appear to find embedded links particularly helpful in the forum. Activity in the forum is related to the release dates of different Kindle models. Finally, results show that the forum can be used to identify customer complaints and product issues, so online discussion forums are a valuable tool for customer relationship management. The implications of the findings are that ecommerce companies could benefit from providing greater post-purchase customer support in their product forums.", "abstracts": [ { "abstractType": "Regular", "content": "Ecommerce consumers have many platforms for discussing products, one of which is the online product forum. These forums exist across the web on a variety of ecommerce shopping sites, including Amazon.com. However, the value of an online product forum for consumers, ecommerce, or the shopping site business is unclear. In this research, we examine 1,027 threads and 12,467 posts from the Amazon Kindle Forum, which is Amazon's most active product forum. We use text analytics techniques to categorize the social media posts according to phases of buying decision process, simplified into pre-purchase and post-purchase activity. We use the metric of post helpfulness rating to measure the post value to the customer. Our analysis shows that customers primarily use the Kindle Forum for post-purchase activity. In addition, customers appear to find embedded links particularly helpful in the forum. Activity in the forum is related to the release dates of different Kindle models. Finally, results show that the forum can be used to identify customer complaints and product issues, so online discussion forums are a valuable tool for customer relationship management. The implications of the findings are that ecommerce companies could benefit from providing greater post-purchase customer support in their product forums.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ecommerce consumers have many platforms for discussing products, one of which is the online product forum. These forums exist across the web on a variety of ecommerce shopping sites, including Amazon.com. However, the value of an online product forum for consumers, ecommerce, or the shopping site business is unclear. In this research, we examine 1,027 threads and 12,467 posts from the Amazon Kindle Forum, which is Amazon's most active product forum. We use text analytics techniques to categorize the social media posts according to phases of buying decision process, simplified into pre-purchase and post-purchase activity. We use the metric of post helpfulness rating to measure the post value to the customer. Our analysis shows that customers primarily use the Kindle Forum for post-purchase activity. In addition, customers appear to find embedded links particularly helpful in the forum. Activity in the forum is related to the release dates of different Kindle models. Finally, results show that the forum can be used to identify customer complaints and product issues, so online discussion forums are a valuable tool for customer relationship management. The implications of the findings are that ecommerce companies could benefit from providing greater post-purchase customer support in their product forums.", "fno": "07945821", "keywords": [ "Consumer Behaviour", "Customer Relationship Management", "Electronic Commerce", "Internet", "Retail Data Processing", "Social Networking Online", "Text Analysis", "Amazon", "E Commerce Consumers", "Online Product Forum", "Shopping Site Business", "Ecommerce Shopping Sites", "Social Media Posts", "Text Analysis", "Post Purchase Activity", "Pre Purchase Activity", "Kindle Forum", "Kindle Models", "Customer Relationship Management", "Ecommerce Companies", "Electronic Publishing", "Consumer Electronics", "Message Systems", "Electronic Commerce", "Companies", "Discussion Forums", "Text Mining", "Communities Of Practice", "Buying Funnel", "Sales Funnel", "Ecommerce Hsopping" ], "authors": [ { "affiliation": "Marketing Department, The Pennsylvania State University, University Park, PA, USA", "fullName": "Allie Whitman", "givenName": "Allie", "surname": "Whitman", "__typename": "ArticleAuthorType" }, { "affiliation": "Qatar Computing Research Institute, Hamad bin Khalifa University, Doha, Qatar", "fullName": "Bernard J. Jansen", "givenName": "Bernard J.", "surname": "Jansen", "__typename": "ArticleAuthorType" } ], "idPrefix": "aiccsa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-11-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2016", "issn": "2161-5330", "isbn": "978-1-5090-4320-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07945820", "articleId": "12OmNyeWdLb", "__typename": "AdjacentArticleType" }, "next": { "fno": "07945822", "articleId": "12OmNyGbIa6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2015/7334/0/7334a223", "title": "Exploring Constructive Learning Activity in Online Programming Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a223/12OmNAMtAOa", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06143025", "title": "Improving cooperation in Virtual Learning Environments using multi-agent systems and AIML", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06143025/12OmNAYXWzb", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2014/5880/0/07051947", "title": "Peer review in online forums: Classifying feedback-sentiment", "doi": null, "abstractUrl": "/proceedings-article/iri/2014/07051947/12OmNrkjVic", "parentPublication": { "id": "proceedings/iri/2014/5880/0", "title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a026", "title": "A Framework of E-Learning Analytics for Asynchronous Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a026/12OmNvStcML", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a541", "title": "A Topic Extraction Process for Online Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a541/12OmNvjyy4o", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2015/8657/0/8657a001", "title": "Authorship Analysis on Dark Marketplace Forums", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a001/12OmNvqEvKx", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344105", "title": "Identifying learning-inductive content in programming discussion forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344105/12OmNzVXNLT", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a114", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a114/12OmNzmLxTC", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2018/9603/0/960300a174", "title": "Tracking the Dynamics of SPOC Discussion Forums: A Temporal Emotion-Topic Modeling Approach", "doi": null, "abstractUrl": "/proceedings-article/eitt/2018/960300a174/1ap5koBXHyw", "parentPublication": { "id": "proceedings/eitt/2018/9603/0", "title": "2018 Seventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2020/8961/0/09273996", "title": "Exploring the Relationship between SPOC Forum Behaviors and Learning Outcomes Based on Social Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/fie/2020/09273996/1phRSW3yaoE", "parentPublication": { "id": "proceedings/fie/2020/8961/0", "title": "2020 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqIhFQ1", "title": "2015 Second European Network Intelligence Conference (ENIC)", "acronym": "enic", "groupId": "1804885", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzmLxTC", "doi": "10.1109/ENIC.2015.24", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "normalizedTitle": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "abstract": "This work explores network analysis methods for the analysis of emergent themes as well as types of users in discussion forums. The paper provides both, a description of the analysis approach and its application as a case study. To that end, keywords are extracted from forum threads and then linked to the forum users resulting in a bipartite network based on their activity in discussion threads. Applying bipartite clustering on those networks, groups of users with common interest in themes can be identified as well as groups of related keywords based on their common relations to users. As a case study, the approach is applied to a discussion forum of a Courser a MOOC. The results reveal some interesting patterns and phenomena of thematic development that take place in such large scale learning courses.", "abstracts": [ { "abstractType": "Regular", "content": "This work explores network analysis methods for the analysis of emergent themes as well as types of users in discussion forums. The paper provides both, a description of the analysis approach and its application as a case study. To that end, keywords are extracted from forum threads and then linked to the forum users resulting in a bipartite network based on their activity in discussion threads. Applying bipartite clustering on those networks, groups of users with common interest in themes can be identified as well as groups of related keywords based on their common relations to users. As a case study, the approach is applied to a discussion forum of a Courser a MOOC. The results reveal some interesting patterns and phenomena of thematic development that take place in such large scale learning courses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work explores network analysis methods for the analysis of emergent themes as well as types of users in discussion forums. The paper provides both, a description of the analysis approach and its application as a case study. To that end, keywords are extracted from forum threads and then linked to the forum users resulting in a bipartite network based on their activity in discussion threads. Applying bipartite clustering on those networks, groups of users with common interest in themes can be identified as well as groups of related keywords based on their common relations to users. As a case study, the approach is applied to a discussion forum of a Courser a MOOC. The results reveal some interesting patterns and phenomena of thematic development that take place in such large scale learning courses.", "fno": "7592a114", "keywords": [ "Message Systems", "Discussion Forums", "Probabilistic Logic", "Meteorology", "Analytical Models", "Context", "Merging", "MOO Cs", "Bipartite Networks", "Community Detection", "Thematic Development", "Discussion Forums" ], "authors": [ { "affiliation": null, "fullName": "Tobias Hecking", "givenName": "Tobias", "surname": "Hecking", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Irene-Angelica Chounta", "givenName": "Irene-Angelica", "surname": "Chounta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "H. Ulrich Hoppe", "givenName": "H. Ulrich", "surname": "Hoppe", "__typename": "ArticleAuthorType" } ], "idPrefix": "enic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "114-121", "year": "2015", "issn": null, "isbn": "978-1-4673-7592-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7592a106", "articleId": "12OmNqJHFpP", "__typename": "AdjacentArticleType" }, "next": { "fno": "7592a122", "articleId": "12OmNx3q6Yx", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2015/7334/0/7334a223", "title": "Exploring Constructive Learning Activity in Online Programming Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a223/12OmNAMtAOa", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a026", "title": "A Framework of E-Learning Analytics for Asynchronous Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a026/12OmNvStcML", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a541", "title": "A Topic Extraction Process for Online Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a541/12OmNvjyy4o", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2015/8657/0/8657a001", "title": "Authorship Analysis on Dark Marketplace Forums", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a001/12OmNvqEvKx", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344105", "title": "Identifying learning-inductive content in programming discussion forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344105/12OmNzVXNLT", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a069", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a069/17D45XzbnJV", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658487", "title": "Using Awareness Information to Enhance Online Discussion Forums: A Systematic Mapping Study", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658487/18j8ZvpsSWc", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028526", "title": "TopicSummary: A Tool for Analyzing Class Discussion Forums using Topic Based Summarizations", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028526/1iff95xsDNS", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028485", "title": "Cognitive and Social Interaction Analysis in Graduate Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028485/1iffkavR0mA", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378373", "title": "The Applicability of Authorship Verification to Swedish Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378373/1s64Xx86ZJS", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirU", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "acronym": "t4e", "groupId": "1002941", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XzbnJV", "doi": "10.1109/T4E.2018.00021", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "normalizedTitle": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "abstract": "Discussion forum is an important component of Massive Open Online Courses (MOOCs). Many MOOC researchers have reported that learners do not use the discussion forum to its fullest potential. As MOOCs are evolving from being instructor-centric to learner-centric, the role played by discussion forums in driving learner engagement and completion rate is becoming evident. The Learner-Centric MOOC (LCM) model has been developed to increase learner centricity in MOOCs. Learner Experience Interaction (LxI) is one such element of the LCM model, which leverages peer learning via focused discussions. In this research, we have analyzed the impact of LxIs on a skill development MOOC, particularly the discussion forum participation, and compared it with the non-LxI version of the same MOOC. Results indicate that by adding the LxI element to a MOOC, peer learning can be leveraged for effective engagement.", "abstracts": [ { "abstractType": "Regular", "content": "Discussion forum is an important component of Massive Open Online Courses (MOOCs). Many MOOC researchers have reported that learners do not use the discussion forum to its fullest potential. As MOOCs are evolving from being instructor-centric to learner-centric, the role played by discussion forums in driving learner engagement and completion rate is becoming evident. The Learner-Centric MOOC (LCM) model has been developed to increase learner centricity in MOOCs. Learner Experience Interaction (LxI) is one such element of the LCM model, which leverages peer learning via focused discussions. In this research, we have analyzed the impact of LxIs on a skill development MOOC, particularly the discussion forum participation, and compared it with the non-LxI version of the same MOOC. Results indicate that by adding the LxI element to a MOOC, peer learning can be leveraged for effective engagement.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Discussion forum is an important component of Massive Open Online Courses (MOOCs). Many MOOC researchers have reported that learners do not use the discussion forum to its fullest potential. As MOOCs are evolving from being instructor-centric to learner-centric, the role played by discussion forums in driving learner engagement and completion rate is becoming evident. The Learner-Centric MOOC (LCM) model has been developed to increase learner centricity in MOOCs. Learner Experience Interaction (LxI) is one such element of the LCM model, which leverages peer learning via focused discussions. In this research, we have analyzed the impact of LxIs on a skill development MOOC, particularly the discussion forum participation, and compared it with the non-LxI version of the same MOOC. Results indicate that by adding the LxI element to a MOOC, peer learning can be leveraged for effective engagement.", "fno": "114300a069", "keywords": [ "Discussion Forums", "Videos", "Three Dimensional Displays", "Animation", "Message Systems", "Education", "Collaborative Work", "MOOC Skill MOO Cs Discussion Forum Learner Centric MOOC Learner Experience Interaction Lx I" ], "authors": [ { "affiliation": null, "fullName": "Nitin Ayer", "givenName": "Nitin", "surname": "Ayer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heramb Sukhathankar", "givenName": "Heramb", "surname": "Sukhathankar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Urmila Deshmukh", "givenName": "Urmila", "surname": "Deshmukh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sameer Sahasrabudhe", "givenName": "Sameer", "surname": "Sahasrabudhe", "__typename": "ArticleAuthorType" } ], "idPrefix": "t4e", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "69-72", "year": "2018", "issn": null, "isbn": "978-1-7281-1143-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "114300a065", "articleId": "17D45XDIXSS", "__typename": "AdjacentArticleType" }, "next": { "fno": "114300a073", "articleId": "17D45W1Oa4D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/t4e/2016/6115/0/6115a100", "title": "Decoding Engagement in MOOCs: An Indian Learner Perspective", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a100/12OmNA14Aav", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403767", "title": "Uncovering the structure of knowledge exchange in a MOOC discussion forum", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403767/12OmNwHhoSe", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a006", "title": "MOOC for Skill Development in 3D Animation: Comparing Learning Perceptions of First Time and Experienced Online Learner", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a006/12OmNzahc9g", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a114", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a114/12OmNzmLxTC", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/lt/2017/04/07762189", "title": "How Learners’ Interactions Sustain Engagement: A MOOC Case Study", "doi": null, "abstractUrl": "/journal/lt/2017/04/07762189/13rRUxNW1VS", "parentPublication": { "id": "trans/lt", "title": "IEEE Transactions on Learning Technologies", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a085", "title": "Learning and Reflection of Technology Based Collaborative MOOC Design and Its Evaluation, Validation and Results", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a085/17D45W1Oa3O", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a073", "title": "LCM: A Model for Planning, Designing and Conducting Learner-Centric MOOCs", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a073/17D45W1Oa4D", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a077", "title": "Learner-Centric MOOC for Teachers on Effective ICT Integration: Perceptions and Experiences", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a077/17D45XwUAMq", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658570", "title": "Promoting Student Completion in a MOOC on Information Theory", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658570/18j8YCKPy80", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658884", "title": "Comparison of Live, Late and Archived Mode Learner Behavior in an Advanced Engineering MOOC", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658884/18j947SpUJ2", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iff6Mv34Wc", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "acronym": "fie", "groupId": "1000297", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1iffkavR0mA", "doi": "10.1109/FIE43999.2019.9028485", "title": "Cognitive and Social Interaction Analysis in Graduate Discussion Forums", "normalizedTitle": "Cognitive and Social Interaction Analysis in Graduate Discussion Forums", "abstract": "Discussion forums play a key role in building knowledge repositories in an education institute. Asynchronous discussion forums enable part-time graduate professionals to have a better learning experience. This paper reports how a carefully curated discussion forum enhances the cognitive and social interactions among students in a graduate information systems course. In particular, we analyse the cognitive and social interactions and their impact on the student grades. To our surprise, the graduate students with their limited time resources, have higher order cognitive contributions and reasonable amount of social posts. We present the discussion forum design, cognitive and social behaviour analysis, grade analysis, and social network analysis. We use statistical methods and qualitative analysis to present our findings. Our findings provide useful insights that can be used in designing and implementing discussion forums in graduate business-technical courses.", "abstracts": [ { "abstractType": "Regular", "content": "Discussion forums play a key role in building knowledge repositories in an education institute. Asynchronous discussion forums enable part-time graduate professionals to have a better learning experience. This paper reports how a carefully curated discussion forum enhances the cognitive and social interactions among students in a graduate information systems course. In particular, we analyse the cognitive and social interactions and their impact on the student grades. To our surprise, the graduate students with their limited time resources, have higher order cognitive contributions and reasonable amount of social posts. We present the discussion forum design, cognitive and social behaviour analysis, grade analysis, and social network analysis. We use statistical methods and qualitative analysis to present our findings. Our findings provide useful insights that can be used in designing and implementing discussion forums in graduate business-technical courses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Discussion forums play a key role in building knowledge repositories in an education institute. Asynchronous discussion forums enable part-time graduate professionals to have a better learning experience. This paper reports how a carefully curated discussion forum enhances the cognitive and social interactions among students in a graduate information systems course. In particular, we analyse the cognitive and social interactions and their impact on the student grades. To our surprise, the graduate students with their limited time resources, have higher order cognitive contributions and reasonable amount of social posts. We present the discussion forum design, cognitive and social behaviour analysis, grade analysis, and social network analysis. We use statistical methods and qualitative analysis to present our findings. Our findings provide useful insights that can be used in designing and implementing discussion forums in graduate business-technical courses.", "fno": "09028485", "keywords": [ "Cognition", "Computer Aided Instruction", "Data Mining", "Educational Courses", "Educational Institutions", "Groupware", "Information Systems", "Social Networking Online", "Social Interaction Analysis", "Knowledge Repositories", "Education Institute", "Part Time Graduate Professionals", "Learning Experience", "Discussion Forum", "Social Interactions", "Graduate Information Systems Course", "Student Grades", "Graduate Students", "Social Posts", "Social Behaviour Analysis", "Social Network Analysis", "Qualitative Analysis", "Graduate Business Technical Courses", "Discussion Forums", "Message Systems", "Text Categorization", "Education", "Social Network Services", "Layout", "Medical Services", "Interaction Analysis", "Online Discussion Forums", "Cognitive Analysis", "Social Network Analysis" ], "authors": [ { "affiliation": "Singapore Management University,School of Information Systems", "fullName": "Mallika Nitin GOKARN", "givenName": "Mallika Nitin", "surname": "GOKARN", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University,School of Information Systems", "fullName": "Swapna GOTTIPATI", "givenName": "Swapna", "surname": "GOTTIPATI", "__typename": "ArticleAuthorType" }, { "affiliation": "Singapore Management University,School of Information Systems", "fullName": "Venky SHANKARARAMAN", "givenName": "Venky", "surname": "SHANKARARAMAN", "__typename": "ArticleAuthorType" } ], "idPrefix": "fie", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2019", "issn": null, "isbn": "978-1-7281-1746-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09028697", "articleId": "1ifflnQmQA8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09028526", "articleId": "1iff95xsDNS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2013/5009/0/5009a026", "title": "A Framework of E-Learning Analytics for Asynchronous Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a026/12OmNvStcML", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06684854", "title": "Towards an understanding of ECE students' Use of online homework help forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06684854/12OmNxGSmm1", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344105", "title": "Identifying learning-inductive content in programming discussion forums", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344105/12OmNzVXNLT", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2015/7592/0/7592a114", "title": "Analysis of User Roles and the Emergence of Themes in Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/enic/2015/7592a114/12OmNzmLxTC", "parentPublication": { "id": "proceedings/enic/2015/7592/0", "title": "2015 Second European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/t4e/2018/1143/0/114300a069", "title": "Impact of Learner-Centric Discussion Forums on Learner Engagement in Skill Development MOOC", "doi": null, "abstractUrl": "/proceedings-article/t4e/2018/114300a069/17D45XzbnJV", "parentPublication": { "id": "proceedings/t4e/2018/1143/0", "title": "2018 IEEE Ninth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658487", "title": "Using Awareness Information to Enhance Online Discussion Forums: A Systematic Mapping Study", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658487/18j8ZvpsSWc", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2019/2519/0/251900b931", "title": "Predicting the Timing and Quality of Responses in Online Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2019/251900b931/1ezRLW2uNFu", "parentPublication": { "id": "proceedings/icdcs/2019/2519/0", "title": "2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028512", "title": "Interactions in online discussion forums - an underutilized resource for learning?", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028512/1iffgqzS8Sc", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378373", "title": "The Applicability of Authorship Verification to Swedish Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378373/1s64Xx86ZJS", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428382", "title": "On Forecasting Dynamics In Online Discussion Forums", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428382/1uilS938sMw", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rgGgDpN7vW", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rgGhWcWpUs", "doi": "10.1109/ICDMW51313.2020.00062", "title": "Learning Student Interest Trajectory for MOOC Thread Recommendation", "normalizedTitle": "Learning Student Interest Trajectory for MOOC Thread Recommendation", "abstract": "In recent years, Massive Open Online Courses (MOOCs) have witnessed immense growth in popularity. Now, due to the recent Covid19 pandemic situation, it is important to push the limits of online education. Discussion forums are primary means of interaction among learners and instructors. However, with growing class size, students face the challenge of finding useful and informative discussion forums. This problem can be solved by matching the interest of students with thread contents. The fundamental challenge is that the student interests drift as they progress through the course, and forum contents evolve as students or instructors update them. In our paper, we propose to predict future interest trajectories of students. Our model consists of two key operations: 1) Update operation and 2) Projection operation. Update operation models the inter-dependency between the evolution of student and thread using coupled Recurrent Neural Networks when the student posts on the thread. The projection operation learns to estimate future embedding of students and threads. For students, the projection operation learns the drift in their interests caused by the change in the course topic they study. The projection operation for threads exploits how different posts induce varying interest levels in a student according to the thread structure. Extensive experimentation on three real-world MOOC datasets shows that our model significantly outperforms other baselines for thread recommendation.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years, Massive Open Online Courses (MOOCs) have witnessed immense growth in popularity. Now, due to the recent Covid19 pandemic situation, it is important to push the limits of online education. Discussion forums are primary means of interaction among learners and instructors. However, with growing class size, students face the challenge of finding useful and informative discussion forums. This problem can be solved by matching the interest of students with thread contents. The fundamental challenge is that the student interests drift as they progress through the course, and forum contents evolve as students or instructors update them. In our paper, we propose to predict future interest trajectories of students. Our model consists of two key operations: 1) Update operation and 2) Projection operation. Update operation models the inter-dependency between the evolution of student and thread using coupled Recurrent Neural Networks when the student posts on the thread. The projection operation learns to estimate future embedding of students and threads. For students, the projection operation learns the drift in their interests caused by the change in the course topic they study. The projection operation for threads exploits how different posts induce varying interest levels in a student according to the thread structure. Extensive experimentation on three real-world MOOC datasets shows that our model significantly outperforms other baselines for thread recommendation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years, Massive Open Online Courses (MOOCs) have witnessed immense growth in popularity. Now, due to the recent Covid19 pandemic situation, it is important to push the limits of online education. Discussion forums are primary means of interaction among learners and instructors. However, with growing class size, students face the challenge of finding useful and informative discussion forums. This problem can be solved by matching the interest of students with thread contents. The fundamental challenge is that the student interests drift as they progress through the course, and forum contents evolve as students or instructors update them. In our paper, we propose to predict future interest trajectories of students. Our model consists of two key operations: 1) Update operation and 2) Projection operation. Update operation models the inter-dependency between the evolution of student and thread using coupled Recurrent Neural Networks when the student posts on the thread. The projection operation learns to estimate future embedding of students and threads. For students, the projection operation learns the drift in their interests caused by the change in the course topic they study. The projection operation for threads exploits how different posts induce varying interest levels in a student according to the thread structure. Extensive experimentation on three real-world MOOC datasets shows that our model significantly outperforms other baselines for thread recommendation.", "fno": "901200a400", "keywords": [ "Computer Aided Instruction", "Distance Learning", "Educational Courses", "Further Education", "Recommender Systems", "Recurrent Neural Nets", "Coupled Recurrent Neural Networks", "Student Posts", "Projection Operation", "Course Topic", "Thread Structure", "Real World MOOC Datasets", "Learning Student Interest Trajectory", "MOOC Thread Recommendation", "Massive Open Online Courses", "Online Education", "Class Size", "Informative Discussion Forums", "Thread Contents", "Student Interests", "Forum Contents", "Update Operation Models", "Covid 19 Pandemic Situation", "Computer Aided Instruction", "Electronic Learning", "Discussion Forums", "Recurrent Neural Networks", "Pandemics", "Trajectory", "Message Systems", "Recommender Systems", "Personalized Learning", "MOO Cs" ], "authors": [ { "affiliation": "University of Minnesota,Twin Cities,Minnesota,USA,55455", "fullName": "Shalini Pandey", "givenName": "Shalini", "surname": "Pandey", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Massachusetts Amherst,Amherst,MA,01003", "fullName": "Andrew Lan", "givenName": "Andrew", "surname": "Lan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Minnesota,Twin Cities,Minnesota,USA,55455", "fullName": "George Karypis", "givenName": "George", "surname": "Karypis", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Minnesota,Twin Cities,Minnesota,USA,55455", "fullName": "Jaideep Srivastava", "givenName": "Jaideep", "surname": "Srivastava", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "400-407", "year": "2020", "issn": null, "isbn": "978-1-7281-9012-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "901200a392", "articleId": "1rgGob6uiYw", "__typename": "AdjacentArticleType" }, "next": { "fno": "901200a408", "articleId": "1rgGju7EMW4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/siie/2012/7/0/06403160", "title": "Discovery of interest topics in web-based educational communities", "doi": null, "abstractUrl": "/proceedings-article/siie/2012/06403160/12OmNAPjA6I", "parentPublication": { "id": "proceedings/siie/2012/7/0", "title": "2012 International Symposium on Computers in Education (SIIE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658570", "title": "Promoting Student Completion in a MOOC on Information Theory", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658570/18j8YCKPy80", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962567", "title": "Modeling Student Collaboration Network to Enhance Student Interactions", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962567/1IHoffS6XNC", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2018/9603/0/960300a184", "title": "A Cluster Study on MOOC Students' Participation Patterns: A Case Study of a Chinese MOOC", "doi": null, "abstractUrl": "/proceedings-article/eitt/2018/960300a184/1ap5kyALf7a", "parentPublication": { "id": "proceedings/eitt/2018/9603/0", "title": "2018 Seventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a568", "title": "Improving Student Understanding of Programming Concepts: The Case of a Scenario Based Approach to Teaching Programming Online", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a568/1gjRr2HEGRi", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028526", "title": "TopicSummary: A Tool for Analyzing Class Discussion Forums using Topic Based Summarizations", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028526/1iff95xsDNS", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028629", "title": "Analyzing Link Dynamics in Student Collaboration Networks using Canvas-A Student-Centered Learning Perspective", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028629/1iffdpM6XDO", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028574", "title": "Netspeak in asynchronous student-student discussion among different faculty, gender and language groups", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028574/1iffikRMcz6", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2019/1746/0/09028715", "title": "Weekly Live Revision Sessions to Scaffold Student Learning in a Blended Learning Course", "doi": null, "abstractUrl": "/proceedings-article/fie/2019/09028715/1iffnNgbDDG", "parentPublication": { "id": "proceedings/fie/2019/1746/0", "title": "2019 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2021/3851/0/09637469", "title": "FAQ as a tool in Asynchronous Mode of Delivery in Blended Learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2021/09637469/1zuw6VQWjAI", "parentPublication": { "id": "proceedings/fie/2021/3851/0", "title": "2021 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1y2JKAEdkxq", "title": "2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)", "acronym": "rew", "groupId": "1815725", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1y2JSrjtQ9q", "doi": "10.1109/REW53955.2021.00052", "title": "The Use of Sub-forums in Software Product Forums", "normalizedTitle": "The Use of Sub-forums in Software Product Forums", "abstract": "Software product forums is a platform filled with user feedback that utilises the sub-forum feature to categorise user discussion into themes. These sub-forums are very similar to classification labels that have been used to automatically classify user feedback on other platforms such as Troubleshooting and Feature Request. It would be very beneficial to the CrowdRE community if these sub-forum categories can be utilised in a research setting as it would reduce the effort required to label content for classification manually. However, no research has been done on the accuracy of these sub-forum categorisations in software product forums. In this exploratory study, we examined the accuracy of user categorised posts in two software product forums and discovered that users incorrectly categorise more than 20&#x0025; of the posts during submission. Our discovery suggests that at the current stage, sub-forum categories should not be trusted as a label to classify feedback automatically.", "abstracts": [ { "abstractType": "Regular", "content": "Software product forums is a platform filled with user feedback that utilises the sub-forum feature to categorise user discussion into themes. These sub-forums are very similar to classification labels that have been used to automatically classify user feedback on other platforms such as Troubleshooting and Feature Request. It would be very beneficial to the CrowdRE community if these sub-forum categories can be utilised in a research setting as it would reduce the effort required to label content for classification manually. However, no research has been done on the accuracy of these sub-forum categorisations in software product forums. In this exploratory study, we examined the accuracy of user categorised posts in two software product forums and discovered that users incorrectly categorise more than 20&#x0025; of the posts during submission. Our discovery suggests that at the current stage, sub-forum categories should not be trusted as a label to classify feedback automatically.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Software product forums is a platform filled with user feedback that utilises the sub-forum feature to categorise user discussion into themes. These sub-forums are very similar to classification labels that have been used to automatically classify user feedback on other platforms such as Troubleshooting and Feature Request. It would be very beneficial to the CrowdRE community if these sub-forum categories can be utilised in a research setting as it would reduce the effort required to label content for classification manually. However, no research has been done on the accuracy of these sub-forum categorisations in software product forums. In this exploratory study, we examined the accuracy of user categorised posts in two software product forums and discovered that users incorrectly categorise more than 20% of the posts during submission. Our discovery suggests that at the current stage, sub-forum categories should not be trusted as a label to classify feedback automatically.", "fno": "189800a293", "keywords": [ "Data Mining", "Internet", "Pattern Classification", "Software Product Lines", "Software Product Forums", "User Feedback", "Sub Forum Feature", "Sub Forum Categories", "User Categorised Posts", "Crowd RE Community", "Conferences", "Manuals", "Software", "Requirements Engineering", "Software Product Forum", "User Feedback", "Requirements Engineering", "Crowd RE" ], "authors": [ { "affiliation": "University of Auckland,Human Aspects of Software Engineering Lab,New Zealand", "fullName": "Hechen Wang", "givenName": "Hechen", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Auckland,Human Aspects of Software Engineering Lab,New Zealand", "fullName": "Peter Devine", "givenName": "Peter", "surname": "Devine", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Auckland,Human Aspects of Software Engineering Lab,New Zealand", "fullName": "James Tizard", "givenName": "James", "surname": "Tizard", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Auckland,Human Aspects of Software Engineering Lab,New Zealand", "fullName": "Seyed Reza Shahamiri", "givenName": "Seyed Reza", "surname": "Shahamiri", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Auckland,Human Aspects of Software Engineering Lab,New Zealand", "fullName": "Kelly Blincoe", "givenName": "Kelly", "surname": "Blincoe", "__typename": "ArticleAuthorType" } ], "idPrefix": "rew", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "293-297", "year": "2021", "issn": null, "isbn": "978-1-6654-1898-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "189800a291", "articleId": "1y2JRj99wEE", "__typename": "AdjacentArticleType" }, "next": { "fno": "189800a298", "articleId": "1y2JROu7O0g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ase/2011/1638/0/06100069", "title": "Finding relevant answers in software forums", "doi": null, "abstractUrl": "/proceedings-article/ase/2011/06100069/12OmNAkWvHS", "parentPublication": { "id": "proceedings/ase/2011/1638/0", "title": "2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/27550079b", "title": "Using Foreign Forums", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/27550079b/12OmNx6g6gU", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a521", "title": "Similarity in Patient Support Forums Using TF-IDF and Cosine Similarity Metrics", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a521/12OmNyKa5YC", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2015/7457/0/07357216", "title": "Understanding triggers for clarification requests in community-based software help forums", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2015/07357216/12OmNyywxDe", "parentPublication": { "id": "proceedings/vlhcc/2015/7457/0", "title": "2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icais/2009/3827/0/3827a175", "title": "Overlapping Communities Generation for Online Support Forums", "doi": null, "abstractUrl": "/proceedings-article/icais/2009/3827a175/12OmNzcxZ6a", "parentPublication": { "id": "proceedings/icais/2009/3827/0", "title": "2009 International Conference on Adaptive and Intelligent Systems. ICAIS 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2016/4320/0/07945821", "title": "Some commericial concerns of Amazon's community forums: The case of the Kindle", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2016/07945821/12OmNzdGnqi", "parentPublication": { "id": "proceedings/aiccsa/2016/4320/0", "title": "2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2022/9342/0/934200a046", "title": "Characterizing User Behaviors in Open-Source Software User Forums: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/934200a046/1Eo5Ks3BLrO", "parentPublication": { "id": "proceedings/chase/2022/9342/0", "title": "2022 IEEE/ACM 15th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a017", "title": "Can a Conversation Paint a Picture? Mining Requirements In Software Forums", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a017/1fHltDtKvu0", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a428", "title": "Requirement Mining in Software Product Forums", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a428/1fHluAtLaJq", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2020/1924/0/192400a438", "title": "Harvest - An Open Source Toolkit for Extracting Posts and Post Metadata from Web Forums", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2020/192400a438/1uHhfe95d3G", "parentPublication": { "id": "proceedings/wi-iat/2020/1924/0", "title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdVh2r", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAAtzN", "doi": "10.1109/PACIFICVIS.2017.8031576", "title": "A visual analytics approach for understanding egocentric intimacy network evolution and impact propagation in MMORPGs", "normalizedTitle": "A visual analytics approach for understanding egocentric intimacy network evolution and impact propagation in MMORPGs", "abstract": "Massively Multiplayer Online Role-playing Games (MMORPGs) feature a large number of players socially interacting with one another in an immersive gaming environment. A successful MMORPG should engage players and meet their needs to achieve different categories of gratifications. Research on the evolution of player social interaction network and the dynamics of inter-player intimacy could provide insights into players' gratification-oriented behaviors in MMORPGs. Such understanding could in turn guide game designs for better engaging existing players and marketing strategies for attracting newcomers. Conventional dynamic network analysis may help investigate game-based social interactions at the macroscopic level. However, current dynamic network visualization techniques mainly focus on illustrating topological changes of the entire network, which are unsuitable for analyzing player-specific social interactions in the virtual world from an egocentric perspective. In general, game designers and operators find it difficult to analyze the way players with different gratification needs may interact with one another and the consequences on their relationships with direct ties, using a decentralized social graph with complicated time-varying structures. In this paper, we present MMOSeer, a visual analytics system for exploring the evolution of egocentric player intimacy network. MMOSeer focuses on the relationship between a player (ego) and his/her directly-linked friends (alters). We follow a user-centered design process to develop the system with game analysts and apply novel visualization techniques in conjunction with well-established algorithms to depict the evolution of intimacy egocentric network. We also derive a centrality change metric to infer how the impact of changes in an ego's interactive behaviors may propagate through the intimacy network, reshaping the structure of the alters' social circles at both micro and macro levels. Finally, we validate the usability of MMOSeer by discovering different user interaction patterns and the corresponding ego-network structural changes in a real-world gameplay dataset from a commercial MMORPG.", "abstracts": [ { "abstractType": "Regular", "content": "Massively Multiplayer Online Role-playing Games (MMORPGs) feature a large number of players socially interacting with one another in an immersive gaming environment. A successful MMORPG should engage players and meet their needs to achieve different categories of gratifications. Research on the evolution of player social interaction network and the dynamics of inter-player intimacy could provide insights into players' gratification-oriented behaviors in MMORPGs. Such understanding could in turn guide game designs for better engaging existing players and marketing strategies for attracting newcomers. Conventional dynamic network analysis may help investigate game-based social interactions at the macroscopic level. However, current dynamic network visualization techniques mainly focus on illustrating topological changes of the entire network, which are unsuitable for analyzing player-specific social interactions in the virtual world from an egocentric perspective. In general, game designers and operators find it difficult to analyze the way players with different gratification needs may interact with one another and the consequences on their relationships with direct ties, using a decentralized social graph with complicated time-varying structures. In this paper, we present MMOSeer, a visual analytics system for exploring the evolution of egocentric player intimacy network. MMOSeer focuses on the relationship between a player (ego) and his/her directly-linked friends (alters). We follow a user-centered design process to develop the system with game analysts and apply novel visualization techniques in conjunction with well-established algorithms to depict the evolution of intimacy egocentric network. We also derive a centrality change metric to infer how the impact of changes in an ego's interactive behaviors may propagate through the intimacy network, reshaping the structure of the alters' social circles at both micro and macro levels. Finally, we validate the usability of MMOSeer by discovering different user interaction patterns and the corresponding ego-network structural changes in a real-world gameplay dataset from a commercial MMORPG.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Massively Multiplayer Online Role-playing Games (MMORPGs) feature a large number of players socially interacting with one another in an immersive gaming environment. A successful MMORPG should engage players and meet their needs to achieve different categories of gratifications. Research on the evolution of player social interaction network and the dynamics of inter-player intimacy could provide insights into players' gratification-oriented behaviors in MMORPGs. Such understanding could in turn guide game designs for better engaging existing players and marketing strategies for attracting newcomers. Conventional dynamic network analysis may help investigate game-based social interactions at the macroscopic level. However, current dynamic network visualization techniques mainly focus on illustrating topological changes of the entire network, which are unsuitable for analyzing player-specific social interactions in the virtual world from an egocentric perspective. In general, game designers and operators find it difficult to analyze the way players with different gratification needs may interact with one another and the consequences on their relationships with direct ties, using a decentralized social graph with complicated time-varying structures. In this paper, we present MMOSeer, a visual analytics system for exploring the evolution of egocentric player intimacy network. MMOSeer focuses on the relationship between a player (ego) and his/her directly-linked friends (alters). We follow a user-centered design process to develop the system with game analysts and apply novel visualization techniques in conjunction with well-established algorithms to depict the evolution of intimacy egocentric network. We also derive a centrality change metric to infer how the impact of changes in an ego's interactive behaviors may propagate through the intimacy network, reshaping the structure of the alters' social circles at both micro and macro levels. Finally, we validate the usability of MMOSeer by discovering different user interaction patterns and the corresponding ego-network structural changes in a real-world gameplay dataset from a commercial MMORPG.", "fno": "08031576", "keywords": [ "Games", "Social Network Services", "Electronic Mail", "Visual Analytics", "Measurement", "Teamwork", "H 5 2 INFORMATION INTERFACES AND PRESENTATION User Interfaces Graphical User Interfaces GUI" ], "authors": [ { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Quan Li", "givenName": null, "surname": "Quan Li", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Qiaomu Shen", "givenName": null, "surname": "Qiaomu Shen", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Yao Ming", "givenName": null, "surname": "Yao Ming", "__typename": "ArticleAuthorType" }, { "affiliation": "NetEase, Inc., China", "fullName": "Peng Xu", "givenName": null, "surname": "Peng Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Yun Wang", "givenName": null, "surname": "Yun Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Xiaojuan Ma", "givenName": null, "surname": "Xiaojuan Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong University of Science and Technology, China", "fullName": "Huamin Qu", "givenName": null, "surname": "Huamin Qu", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "31-40", "year": "2017", "issn": "2165-8773", "isbn": "978-1-5090-5738-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08031575", "articleId": "12OmNyOHG3r", "__typename": "AdjacentArticleType" }, "next": { "fno": "08031577", "articleId": "12OmNx2QUJk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2010/4257/0/4257a997", "title": "Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs)", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a997/12OmNweBUQD", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2011/4375/0/4375a561", "title": "Effects of Mentoring on Player Performance in Massively Multiplayer Online Role-Playing Games (MMORPGs)", "doi": null, "abstractUrl": "/proceedings-article/asonam/2011/4375a561/12OmNylsZNk", "parentPublication": { "id": "proceedings/asonam/2011/4375/0", "title": "2011 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534855", "title": "A Visual Analytics Approach for Understanding Reasons behind Snowballing and Comeback in MOBA Games", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534855/13rRUxjQybV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b830", "title": "Soccer: Who Has the Ball? Generating Visual Analytics and Player Statistics", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b830/17D45VObpOM", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546119", "title": "Shot Level Egocentric Video Co-summarization", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546119/17D45WKWnJe", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807264", "title": "Tac-Simur: Tactic-based Simulative Visual Analytics of Table Tennis", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807264/1cG6vo24hRC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a112", "title": "Visual Analytics of Dynamic Interplay Between Behaviors in MMORPGs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a112/1cMF76J4q9W", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08795584", "title": "CourtTime: Generating Actionable Insights into Tennis Matches Using Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08795584/1csHUeq7TB6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600b006", "title": "PlayerNetVis: A Visual Analytics System for Evaluating NBA Player Performance Based on Network Topology", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600b006/1x3kIcRTgQg", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a054", "title": "VisuaLeague: Visual Analytics of Multiple Games", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a054/1y4oI1vKfmg", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzV70Jm", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "acronym": "dsaa", "groupId": "1806384", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdbUZh", "doi": "10.1109/DSAA.2016.75", "title": "What Did I Do Wrong in My MOBA Game? Mining Patterns Discriminating Deviant Behaviours", "normalizedTitle": "What Did I Do Wrong in My MOBA Game? Mining Patterns Discriminating Deviant Behaviours", "abstract": "The success of electronic sports (eSports), where professional gamers participate in competitive leagues and tournaments, brings new challenges for the video game industry. Other than fun, games must be difficult and challenging for eSports professionals but still easy and enjoyable for amateurs. In this article, we consider Multi-player Online Battle Arena games (MOBA) and particularly, \"Defense of the Ancients 2\", commonly known simply as DOTA2. In this context, a challenge is to propose data analysis methods and metrics that help players to improve their skills. We design a data mining-based method that discovers strategic patterns from historical behavioral traces: Given a model encoding an expected way of playing (the norm), we are interested in patterns deviating from the norm that may explain a game outcome from which player can learn more efficient ways of playing. The method is formally introduced and shown to be adaptable to different scenarios. Finally, we provide an experimental evaluation over a dataset of 10 000 behavioral game traces.", "abstracts": [ { "abstractType": "Regular", "content": "The success of electronic sports (eSports), where professional gamers participate in competitive leagues and tournaments, brings new challenges for the video game industry. Other than fun, games must be difficult and challenging for eSports professionals but still easy and enjoyable for amateurs. In this article, we consider Multi-player Online Battle Arena games (MOBA) and particularly, \"Defense of the Ancients 2\", commonly known simply as DOTA2. In this context, a challenge is to propose data analysis methods and metrics that help players to improve their skills. We design a data mining-based method that discovers strategic patterns from historical behavioral traces: Given a model encoding an expected way of playing (the norm), we are interested in patterns deviating from the norm that may explain a game outcome from which player can learn more efficient ways of playing. The method is formally introduced and shown to be adaptable to different scenarios. Finally, we provide an experimental evaluation over a dataset of 10 000 behavioral game traces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The success of electronic sports (eSports), where professional gamers participate in competitive leagues and tournaments, brings new challenges for the video game industry. Other than fun, games must be difficult and challenging for eSports professionals but still easy and enjoyable for amateurs. In this article, we consider Multi-player Online Battle Arena games (MOBA) and particularly, \"Defense of the Ancients 2\", commonly known simply as DOTA2. In this context, a challenge is to propose data analysis methods and metrics that help players to improve their skills. We design a data mining-based method that discovers strategic patterns from historical behavioral traces: Given a model encoding an expected way of playing (the norm), we are interested in patterns deviating from the norm that may explain a game outcome from which player can learn more efficient ways of playing. The method is formally introduced and shown to be adaptable to different scenarios. Finally, we provide an experimental evaluation over a dataset of 10 000 behavioral game traces.", "fno": "07796953", "keywords": [ "Computer Games", "Data Analysis", "Data Mining", "Internet", "Sport", "Electronic Sports", "Professional Gamers", "Video Game Industry", "MOBA Game", "Multiplayer Online Battle Arena Games", "Defense Of The Ancients 2", "DOTA 2", "Data Analysis", "Data Mining", "Strategic Patterns", "Historical Behavioral Traces", "Behavioral Game Traces", "Discriminative Pattern Mining", "Deviant Behaviours", "Games", "Itemsets", "Data Mining", "Gold", "Industries", "Context", "Video Game", "Moba Game", "Contextualized Trajectory", "Expert Model", "Discriminative Pattern Mining" ], "authors": [ { "affiliation": null, "fullName": "Olivier Cavadenti", "givenName": "Olivier", "surname": "Cavadenti", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Victor Codocedo", "givenName": "Victor", "surname": "Codocedo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jean-François Boulicaut", "givenName": "Jean-François", "surname": "Boulicaut", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mehdi Kaytoue", "givenName": "Mehdi", "surname": "Kaytoue", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsaa", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "662-671", "year": "2016", "issn": null, "isbn": "978-1-5090-5206-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07796952", "articleId": "12OmNzsrwht", "__typename": "AdjacentArticleType" }, "next": { "fno": "07796954", "articleId": "12OmNyTOsmG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsaa/2016/5206/0/07796943", "title": "Churn Prediction in Mobile Social Games: Towards a Complete Assessment Using Survival Ensembles", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796943/12OmNAH5dnm", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2011/1451/0/06000328", "title": "Sensing game play. Exploring computer game play in a game café and a mass LAN party", "doi": null, "abstractUrl": "/proceedings-article/cgames/2011/06000328/12OmNqGiu6J", "parentPublication": { "id": "proceedings/cgames/2011/1451/0", "title": "2011 16th International Conference on Computer Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/digitel/2008/3409/0/3409a090", "title": "Games as Skins for Online Tests", "doi": null, "abstractUrl": "/proceedings-article/digitel/2008/3409a090/12OmNwc3wya", "parentPublication": { "id": "proceedings/digitel/2008/3409/0", "title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2015/04/06863627", "title": "Temporal Game Challenge Tailoring", "doi": null, "abstractUrl": "/journal/ci/2015/04/06863627/13rRUyXKxUc", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2010/04/05604665", "title": "Combining UCT and nested Monte Carlo search for single-player general game playing", "doi": null, "abstractUrl": "/journal/ci/2010/04/05604665/13rRUyuvRrm", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2018/6857/0/685700a247", "title": "Player Types in Mobile Learning Games – Playing Patterns and Motivation", "doi": null, "abstractUrl": "/proceedings-article/ism/2018/685700a247/17D45WK5Ala", "parentPublication": { "id": "proceedings/ism/2018/6857/0", "title": "2018 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a118", "title": "Comparison of Visualization Tools for Matches Analysis of a MOBA Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a118/1cMF9MduQU0", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2019/6739/0/673900a191", "title": "Collaborative Online Educational Games for Children with Learning Disabilities: Lessons Learned", "doi": null, "abstractUrl": "/proceedings-article/cic/2019/673900a191/1hrMdYW903K", "parentPublication": { "id": "proceedings/cic/2019/6739/0", "title": "2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2019/6303/0/09162377", "title": "Usage and Spending on Mobile Games: A Comparison Between Australian Single-Player Gamers and Multi-Player Gamers", "doi": null, "abstractUrl": "/proceedings-article/csde/2019/09162377/1m6hOd2M6c0", "parentPublication": { "id": "proceedings/csde/2019/6303/0", "title": "2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a617", "title": "The Construction and Impact of Mobile Game Players Community: A Study on &#x201C;Honor of Kings&#x201D;", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a617/1ziPlfIPSla", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWcH18", "title": "2014 International Conference on Cyberworlds (CW)", "acronym": "cw", "groupId": "1000175", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxFaLol", "doi": "10.1109/CW.2014.48", "title": "The Effects of Gameplay on Leadership Behaviors: An Empirical Study on Leadership Behaviors and Roles in Multiplayer Online Battle Arena Games", "normalizedTitle": "The Effects of Gameplay on Leadership Behaviors: An Empirical Study on Leadership Behaviors and Roles in Multiplayer Online Battle Arena Games", "abstract": "This paper seeks to establish how games can be used as a didactic tool for leadership development. Two multiplayer online battle arena games (MOBA) known as Defense of the Ancients (DotA) and Heroes of Newerth (HoN) are studied together with the leadership models of Fred E. Fiedler (1967) and Kurt Lewin (1939). A close-ended survey was conducted to determine the game player's game role (carry, support or ganker) and his leadership style (authoritarian, democratic, laissez-faire). A positive correlation was established between the game player's game role and leadership style. Furthermore the causal relationship behind this dynamic was explored through propensity score matching and logistic regression. The study concludes that exercising specific roles in MOBA games lead to the development of certain leadership styles.", "abstracts": [ { "abstractType": "Regular", "content": "This paper seeks to establish how games can be used as a didactic tool for leadership development. Two multiplayer online battle arena games (MOBA) known as Defense of the Ancients (DotA) and Heroes of Newerth (HoN) are studied together with the leadership models of Fred E. Fiedler (1967) and Kurt Lewin (1939). A close-ended survey was conducted to determine the game player's game role (carry, support or ganker) and his leadership style (authoritarian, democratic, laissez-faire). A positive correlation was established between the game player's game role and leadership style. Furthermore the causal relationship behind this dynamic was explored through propensity score matching and logistic regression. The study concludes that exercising specific roles in MOBA games lead to the development of certain leadership styles.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper seeks to establish how games can be used as a didactic tool for leadership development. Two multiplayer online battle arena games (MOBA) known as Defense of the Ancients (DotA) and Heroes of Newerth (HoN) are studied together with the leadership models of Fred E. Fiedler (1967) and Kurt Lewin (1939). A close-ended survey was conducted to determine the game player's game role (carry, support or ganker) and his leadership style (authoritarian, democratic, laissez-faire). A positive correlation was established between the game player's game role and leadership style. Furthermore the causal relationship behind this dynamic was explored through propensity score matching and logistic regression. The study concludes that exercising specific roles in MOBA games lead to the development of certain leadership styles.", "fno": "4677a300", "keywords": [ "Games", "Lead", "Decision Making", "Educational Institutions", "Communities", "Statistical Analysis", "Gold", "Moba", "Leadership Style", "Behavior", "Online Game", "Game Role", "Multiplayer Online Battle Arena" ], "authors": [ { "affiliation": null, "fullName": "Tinnawat Nuangjumnong", "givenName": "Tinnawat", "surname": "Nuangjumnong", "__typename": "ArticleAuthorType" } ], "idPrefix": "cw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "300-307", "year": "2014", "issn": null, "isbn": "978-1-4799-4677-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4677a293", "articleId": "12OmNAL3BbB", "__typename": "AdjacentArticleType" }, "next": { "fno": "4677a308", "articleId": "12OmNBcShUN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718945", "title": "Leadership Behaviors in Information Technology Project Management: An Exploratory Study", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718945/12OmNAq3hQT", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2012/4750/0/4750a506", "title": "County Magistrate Leadership Behaviors and County Government Performance: Mediating Effect of Subordinate Trust", "doi": null, "abstractUrl": "/proceedings-article/bife/2012/4750a506/12OmNqC2v0A", "parentPublication": { "id": "proceedings/bife/2012/4750/0", "title": "2012 Fifth International Conference on Business Intelligence and Financial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796953", "title": "What Did I Do Wrong in My MOBA Game? Mining Patterns Discriminating Deviant Behaviours", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796953/12OmNwdbUZh", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504a230", "title": "Introduction to decision, negotiation, leadership, social communities, and technology minitrack", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504a230/12OmNx7XH7Q", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2009/3588/0/3588a178", "title": "Exploring Game Leadership and Online Game Community", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2009/3588a178/12OmNyxXlkY", "parentPublication": { "id": "proceedings/vs-games/2009/3588/0", "title": "Games and Virtual Worlds for Serious Applications, Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a902", "title": "Performance Dynamics and Success in Online Games", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a902/12OmNzdoMAw", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2015/03/06987353", "title": "Postprocessing Gameplay Metrics for Gameplay Performance Segmentation Based on Audiovisual Analysis", "doi": null, "abstractUrl": "/journal/ci/2015/03/06987353/13rRUy3gmZU", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a118", "title": "Comparison of Visualization Tools for Matches Analysis of a MOBA Game", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a118/1cMF9MduQU0", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbgames/2019/4637/0/463700a072", "title": "Analysis of Gameplay in MOBA Games Under Different Network Conditions", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2019/463700a072/1fHHq5Bw8BW", "parentPublication": { "id": "proceedings/sbgames/2019/4637/0", "title": "2019 18th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a767", "title": "A Computational Model of Suspense for Non-Narrative Gameplay", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a767/1rSRdvZVI5O", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwGIcBY", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzdoMAw", "doi": "10.1109/ICDMW.2017.124", "title": "Performance Dynamics and Success in Online Games", "normalizedTitle": "Performance Dynamics and Success in Online Games", "abstract": "Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with high skill level and that distinguish them from other players. To this aim, we study Defense of the ancient 2 (Dota 2), a popular MOBA game. Our findings highlight three main aspects to be successful in the game: (i) players need to have a warm-up period to enhance their performance in the game; (ii) having a long in-game experience does not necessarily translate in achieving better skills; but rather, (iii) players that reach high skill levels differentiate from others because of their aggressive playing strategy, which implies to kill opponents more often than cooperating with teammates, and trying to give an early end to the match.", "abstracts": [ { "abstractType": "Regular", "content": "Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with high skill level and that distinguish them from other players. To this aim, we study Defense of the ancient 2 (Dota 2), a popular MOBA game. Our findings highlight three main aspects to be successful in the game: (i) players need to have a warm-up period to enhance their performance in the game; (ii) having a long in-game experience does not necessarily translate in achieving better skills; but rather, (iii) players that reach high skill levels differentiate from others because of their aggressive playing strategy, which implies to kill opponents more often than cooperating with teammates, and trying to give an early end to the match.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with high skill level and that distinguish them from other players. To this aim, we study Defense of the ancient 2 (Dota 2), a popular MOBA game. Our findings highlight three main aspects to be successful in the game: (i) players need to have a warm-up period to enhance their performance in the game; (ii) having a long in-game experience does not necessarily translate in achieving better skills; but rather, (iii) players that reach high skill levels differentiate from others because of their aggressive playing strategy, which implies to kill opponents more often than cooperating with teammates, and trying to give an early end to the match.", "fno": "3800a902", "keywords": [ "Computer Games", "Data Analysis", "Social Networking Online", "Playing Styles", "High Skill Level", "In Game Experience", "Online Games", "Social Systems", "Social Networks", "Individual Performance", "Multiplayer Online Battle Arena Games", "Online Data", "MOBA Games", "Performance Dynamics", "Games", "Monitoring", "Conferences", "Social Network Services", "Gold", "Data Mining" ], "authors": [ { "affiliation": null, "fullName": "Anna Sapienza", "givenName": "Anna", "surname": "Sapienza", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hao Peng", "givenName": "Hao", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Emilio Ferrara", "givenName": "Emilio", "surname": "Ferrara", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "902-909", "year": "2017", "issn": "2375-9259", "isbn": "978-1-5386-3800-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3800a894", "articleId": "12OmNzV70CJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "3800a910", "articleId": "12OmNxzMnRb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2014/4143/3/4143c286", "title": "A Profitable Online No-Limit Poker Playing Agent", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2014/4143c286/12OmNCbU2Ym", "parentPublication": { "id": "proceedings/wi-iat/2014/4143/3", "title": "2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2010/4215/0/4215a254", "title": "CAPTCHA Challenges for Massively Multiplayer Online Games: Mini-game CAPTCHAs", "doi": null, "abstractUrl": "/proceedings-article/cw/2010/4215a254/12OmNCgJe86", "parentPublication": { "id": "proceedings/cw/2010/4215/0", "title": "2010 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796953", "title": "What Did I Do Wrong in My MOBA Game? Mining Patterns Discriminating Deviant Behaviours", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796953/12OmNwdbUZh", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2010/4257/0/4257a997", "title": "Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs)", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2010/4257a997/12OmNweBUQD", "parentPublication": { "id": "proceedings/icdmw/2010/4257/0", "title": "2010 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgames/2013/0820/0/06632639", "title": "A players clustering method to enhance the players' experience in multi-player games", "doi": null, "abstractUrl": "/proceedings-article/cgames/2013/06632639/12OmNwtWfKJ", "parentPublication": { "id": "proceedings/cgames/2013/0820/0", "title": "2013 18th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games (CGAMES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e326", "title": "The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing Games", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e326/12OmNzWx034", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2014/03/mic2014030036", "title": "Analyzing Implicit Social Networks in Multiplayer Online Games", "doi": null, "abstractUrl": "/magazine/ic/2014/03/mic2014030036/13rRUwhpBRZ", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006031", "title": "Purchase Prediction in Free Online Games via Survival Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006031/1hJsuBfJvxu", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2017/4993/0/09069137", "title": "An Empirical Study on Team Formation in Online Games", "doi": null, "abstractUrl": "/proceedings-article/asonam/2017/09069137/1j9xWWY5lOU", "parentPublication": { "id": "proceedings/asonam/2017/4993/0", "title": "2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a292", "title": "Individualized Context-Aware Tensor Factorization for Online Games Predictions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a292/1rgGjAYiHwA", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHHpVzB0CA", "title": "2019 18th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "acronym": "sbgames", "groupId": "1800056", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHHq5Bw8BW", "doi": "10.1109/SBGames.2019.00020", "title": "Analysis of Gameplay in MOBA Games Under Different Network Conditions", "normalizedTitle": "Analysis of Gameplay in MOBA Games Under Different Network Conditions", "abstract": "This work aims to analyze the influence that different network conditions can have on the performance of a player in a multiplayer game of the MOBA genre, according to scenarios where transmission rate, latency and packet loss are used as factors. The scoring data of the players is collected at the end of each scenario and a quantitative analysis is performed. For this purpose, the DOTA 2 game was chosen and the evaluation metrics were KDA (Kills, Deaths and Assists), along with the farm and the gold collected. This allowed the analysis of how the factors influenced the defined metrics. To create the scenarios, the Clumsy 0.2 network condition emulation tool was used, thus controlling how the network would behave in each scenario. Finally, it can be concluded that for games of the MOBA genre the players have a significant decrease in their performance when submitted to networks of lower quality. The latency has the greatest influence on the player's performance, whereas packet losses of up 5% are almost insignificant if not associated with high latency and the transmission rate is insignificant for the DOTA 2 game since it uses a very low transmission rate, which is typical of this game genre.", "abstracts": [ { "abstractType": "Regular", "content": "This work aims to analyze the influence that different network conditions can have on the performance of a player in a multiplayer game of the MOBA genre, according to scenarios where transmission rate, latency and packet loss are used as factors. The scoring data of the players is collected at the end of each scenario and a quantitative analysis is performed. For this purpose, the DOTA 2 game was chosen and the evaluation metrics were KDA (Kills, Deaths and Assists), along with the farm and the gold collected. This allowed the analysis of how the factors influenced the defined metrics. To create the scenarios, the Clumsy 0.2 network condition emulation tool was used, thus controlling how the network would behave in each scenario. Finally, it can be concluded that for games of the MOBA genre the players have a significant decrease in their performance when submitted to networks of lower quality. The latency has the greatest influence on the player's performance, whereas packet losses of up 5% are almost insignificant if not associated with high latency and the transmission rate is insignificant for the DOTA 2 game since it uses a very low transmission rate, which is typical of this game genre.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work aims to analyze the influence that different network conditions can have on the performance of a player in a multiplayer game of the MOBA genre, according to scenarios where transmission rate, latency and packet loss are used as factors. The scoring data of the players is collected at the end of each scenario and a quantitative analysis is performed. For this purpose, the DOTA 2 game was chosen and the evaluation metrics were KDA (Kills, Deaths and Assists), along with the farm and the gold collected. This allowed the analysis of how the factors influenced the defined metrics. To create the scenarios, the Clumsy 0.2 network condition emulation tool was used, thus controlling how the network would behave in each scenario. Finally, it can be concluded that for games of the MOBA genre the players have a significant decrease in their performance when submitted to networks of lower quality. The latency has the greatest influence on the player's performance, whereas packet losses of up 5% are almost insignificant if not associated with high latency and the transmission rate is insignificant for the DOTA 2 game since it uses a very low transmission rate, which is typical of this game genre.", "fno": "463700a072", "keywords": [ "Computer Games", "MOBA Genre", "Packet Loss", "DOTA 2 Game", "Low Transmission Rate", "Game Genre", "MOBA Games", "Multiplayer Game", "Scoring Data", "Quantitative Analysis", "Clumsy 0 2 Network Condition Emulation Tool", "Kills Deaths And Assists", "KDA", "Games", "Packet Loss", "Throughput", "Delays", "Servers", "MOBA", "Games", "Network", "Multiplayer", "DOTA 2" ], "authors": [ { "affiliation": "Universidade Federal do Ceará", "fullName": "Marcos Paulo de Moura", "givenName": "Marcos Paulo", "surname": "de Moura", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Ceará", "fullName": "Francisca Luzia Araújo", "givenName": "Francisca Luzia", "surname": "Araújo", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Ceará", "fullName": "Arthur Callado", "givenName": "Arthur", "surname": "Callado", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Ceará", "fullName": "Paulyne Jucá", "givenName": "Paulyne", "surname": "Jucá", "__typename": "ArticleAuthorType" } ], "idPrefix": "sbgames", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "72-80", "year": "2019", "issn": null, "isbn": "978-1-7281-4637-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "463700a062", "articleId": "1fHHqqRa6pq", "__typename": "AdjacentArticleType" }, "next": { "fno": "463700a081", "articleId": "1fHHrsQhWj6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sbgames/2015/8843/0/8843a142", "title": "On the Development of Intelligent Agents for MOBA Games", "doi": null, "abstractUrl": "/proceedings-article/sbgames/2015/8843a142/12OmNCcKQqX", "parentPublication": { "id": "proceedings/sbgames/2015/8843/0", "title": "2015 14th Brazilian Symposium on Computer Games and Digital Entertainment (SBGames)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796953", "title": "What Did I Do Wrong in My MOBA Game? Mining Patterns Discriminating Deviant Behaviours", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796953/12OmNwdbUZh", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2014/4677/0/4677a300", "title": "The Effects of Gameplay on Leadership Behaviors: An Empirical Study on Leadership Behaviors and Roles in Multiplayer Online Battle Arena Games", "doi": null, "abstractUrl": "/proceedings-article/cw/2014/4677a300/12OmNxFaLol", "parentPublication": { "id": "proceedings/cw/2014/4677/0", "title": "2014 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a902", "title": "Performance Dynamics and Success in Online Games", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a902/12OmNzdoMAw", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2013/02/06518141", "title": "Games, gameplay, and BCI: The state of the art", "doi": null, "abstractUrl": "/journal/ci/2013/02/06518141/13rRUy2YLNu", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100a338", "title": "Hierarchical Attention Based Recurrent Neural Network Framework for Mobile MOBA Game Recommender Systems", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100a338/18AuQg3Xs0U", "parentPublication": { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0", "title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a010", "title": "Sequential Item Recommendation in the MOBA Game Dota 2", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a010/1AjSCQd4nJe", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a292", "title": "Individualized Context-Aware Tensor Factorization for Online Games Predictions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a292/1rgGjAYiHwA", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccns/2021/2711/0/271100a029", "title": "Research on Influencing Factors of MOBA Mobile Games Based on Factor Analysis", "doi": null, "abstractUrl": "/proceedings-article/ccns/2021/271100a029/1xIOGRdIOAM", "parentPublication": { "id": "proceedings/ccns/2021/2711/0", "title": "2021 2nd International Conference on Computer Communication and Network Security (CCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a054", "title": "VisuaLeague: Visual Analytics of Multiple Games", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a054/1y4oI1vKfmg", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1xIOD0kzgwo", "title": "2021 2nd International Conference on Computer Communication and Network Security (CCNS)", "acronym": "ccns", "groupId": "1838564", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1xIOGRdIOAM", "doi": "10.1109/CCNS53852.2021.00014", "title": "Research on Influencing Factors of MOBA Mobile Games Based on Factor Analysis", "normalizedTitle": "Research on Influencing Factors of MOBA Mobile Games Based on Factor Analysis", "abstract": "The objective of this study is to identify the attractive quality factors affecting MOBA game design, thus meeting consumers&#x2019; requirements and effectively improving their satisfaction. The factor analysis was carried out based on the results of 116 subjects&#x2019; evaluation of various quality attributes. According to the principal components analysis, the coefficient values of gameplay factor, usability factor, sociability factor, and sensuality factor were 0.302, 0.347, 0.442, and 0.345 respectively, and had a positive effect on satisfaction. Among these factors, sociability factor had slightly higher satisfaction evaluation than other factors. With Arena of Valor as the object of research, the application feasibility of the study was explored and verified by case study.", "abstracts": [ { "abstractType": "Regular", "content": "The objective of this study is to identify the attractive quality factors affecting MOBA game design, thus meeting consumers&#x2019; requirements and effectively improving their satisfaction. The factor analysis was carried out based on the results of 116 subjects&#x2019; evaluation of various quality attributes. According to the principal components analysis, the coefficient values of gameplay factor, usability factor, sociability factor, and sensuality factor were 0.302, 0.347, 0.442, and 0.345 respectively, and had a positive effect on satisfaction. Among these factors, sociability factor had slightly higher satisfaction evaluation than other factors. With Arena of Valor as the object of research, the application feasibility of the study was explored and verified by case study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The objective of this study is to identify the attractive quality factors affecting MOBA game design, thus meeting consumers’ requirements and effectively improving their satisfaction. The factor analysis was carried out based on the results of 116 subjects’ evaluation of various quality attributes. According to the principal components analysis, the coefficient values of gameplay factor, usability factor, sociability factor, and sensuality factor were 0.302, 0.347, 0.442, and 0.345 respectively, and had a positive effect on satisfaction. Among these factors, sociability factor had slightly higher satisfaction evaluation than other factors. With Arena of Valor as the object of research, the application feasibility of the study was explored and verified by case study.", "fno": "271100a029", "keywords": [ "Computer Games", "Principal Component Analysis", "MOBA Mobile Games", "Factor Analysis", "Attractive Quality Factors", "MOBA Game Design", "Quality Attributes", "Principal Components Analysis", "Gameplay Factor", "Usability Factor", "Sociability Factor", "Sensuality Factor", "Satisfaction Evaluation", "Coefficient Values", "Q Factor", "Games", "Network Security", "Object Recognition", "Usability", "Computer Security", "Land Mobile Radio", "Factor Analysis Approach", "MOBA Mobile Game", "Arena Of Valor" ], "authors": [ { "affiliation": "Jiangsu Maritime Institute,Nanjing,China", "fullName": "Shen Qi", "givenName": "Shen", "surname": "Qi", "__typename": "ArticleAuthorType" }, { "affiliation": "Tungfang Design University,Kaohsiung,Taiwan", "fullName": "Wu Shu-Ming", "givenName": "Wu", "surname": "Shu-Ming", "__typename": "ArticleAuthorType" }, { "affiliation": "National Kaohsiung Normal University,Kaohsiung,Taiwan", "fullName": "Chen Chun-Chih", "givenName": "Chen", "surname": "Chun-Chih", "__typename": "ArticleAuthorType" }, { "affiliation": "Tungfang Design University,Kaohsiung,Taiwan", "fullName": "Huang Chia-Hui", "givenName": "Huang", "surname": "Chia-Hui", "__typename": "ArticleAuthorType" } ], "idPrefix": "ccns", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "29-33", "year": "2021", "issn": null, "isbn": "978-1-6654-2711-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "271100a025", "articleId": "1xIOE2PczRe", "__typename": "AdjacentArticleType" }, "next": { "fno": "271100a034", "articleId": "1xIODhjntXG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iciii/2009/3876/4/3876d131", "title": "Empirical Research on the Influencing Factors of Employee Turnover of Private Auto Parts Enterprises", "doi": null, "abstractUrl": "/proceedings-article/iciii/2009/3876d131/12OmNAoUT4e", "parentPublication": { "id": "proceedings/iciii/2009/3876/4", "title": "International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isecs/2008/3258/0/3258a086", "title": "The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era", "doi": null, "abstractUrl": "/proceedings-article/isecs/2008/3258a086/12OmNB7Lvxp", "parentPublication": { "id": "proceedings/isecs/2008/3258/0", "title": "Electronic Commerce and Security, International Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b179", "title": "Exploring the Effect of Experiential Marketing on Movie-Watching Intention -- The Example of Mobile Movie Theme Games", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b179/12OmNBQTJkC", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2013/5005/0/5005a659", "title": "A Study on Comparison on the Technical Factors of Korea and China Shopping Mall Website", "doi": null, "abstractUrl": "/proceedings-article/snpd/2013/5005a659/12OmNvAAtAc", "parentPublication": { "id": "proceedings/snpd/2013/5005/0", "title": "2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/3/3682c113", "title": "Study on Regional Expansion Differences of Construction Land and Its Influencing Factors: The Case of Xinjiang", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682c113/12OmNvAAtMX", "parentPublication": { "id": "proceedings/esiat/2009/3682/3", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icce/2002/1509/0/15091023", "title": "When Technology is Mandatory — Factors Influencing Users Satisfaction", "doi": null, "abstractUrl": "/proceedings-article/icce/2002/15091023/12OmNz5s0Hf", "parentPublication": { "id": "proceedings/icce/2002/1509/0", "title": "Computers in Education, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997c545", "title": "Statistical Analysis of the New Rural Cooperative Medical Care System of the Factors Affecting Satisfaction", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997c545/12OmNzGDsGB", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2022/7000/0/700000a274", "title": "A Live Extensible Ontology of Quality Factors for Textual Requirements", "doi": null, "abstractUrl": "/proceedings-article/re/2022/700000a274/1HBKtGgeFwc", "parentPublication": { "id": "proceedings/re/2022/7000/0", "title": "2022 IEEE 30th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a734", "title": "Research on Influencing Factors of University Campus Sports Competition Management Based on Factor Analysis Method", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a734/1KpBtE4ncqY", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2019/2165/0/216500a775", "title": "Modeling and Analysis of Influencing Factors on Diversification of Online Tourism Services from the Perspective of Internet", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2019/216500a775/1dUnSc8AEDe", "parentPublication": { "id": "proceedings/icmtma/2019/2165/0", "title": "2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrNh0vw", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2agT9", "doi": "10.1109/ICPR.2014.278", "title": "Nonlinear Supervised Locality Preserving Projections for Visual Pattern Discrimination", "normalizedTitle": "Nonlinear Supervised Locality Preserving Projections for Visual Pattern Discrimination", "abstract": "Learning representations that disentangle hidden explanatory factors in data has proven beneficial for effective pattern classification. Slow feature analysis (SFA) is a nonlinear dimensionality reduction technique that provides a useful representation for classification if the training data is sequential and transitions between classes are rare. The pattern discrimination ability of SFA has been attributed to the equivalence of linear SFA and linear discriminant analysis (LDA) under certain conditions. LDA, however, is often outperformed by locality preserving projections (LPP) when the data lies on or near a low-dimensional manifold. Here, we take a unified manifold learning perspective on LPP, LDA and SFA. We suggest that the discrimination ability of SFA is better explained by its relation to LPP than to LDA, and give an example of a situation where linear SFA outperforms LDA. We then propose a novel supervised manifold learning architecture that combines hierarchical nonlinear expansions, as commonly used for SFA, with supervised LPP. It learns a nonlinear parametric data representation that explicitly takes both the class labels and the manifold structure of the data into account. As an experimental validation, we show that this approach outperforms previously proposed models on the NORB object recognition dataset.", "abstracts": [ { "abstractType": "Regular", "content": "Learning representations that disentangle hidden explanatory factors in data has proven beneficial for effective pattern classification. Slow feature analysis (SFA) is a nonlinear dimensionality reduction technique that provides a useful representation for classification if the training data is sequential and transitions between classes are rare. The pattern discrimination ability of SFA has been attributed to the equivalence of linear SFA and linear discriminant analysis (LDA) under certain conditions. LDA, however, is often outperformed by locality preserving projections (LPP) when the data lies on or near a low-dimensional manifold. Here, we take a unified manifold learning perspective on LPP, LDA and SFA. We suggest that the discrimination ability of SFA is better explained by its relation to LPP than to LDA, and give an example of a situation where linear SFA outperforms LDA. We then propose a novel supervised manifold learning architecture that combines hierarchical nonlinear expansions, as commonly used for SFA, with supervised LPP. It learns a nonlinear parametric data representation that explicitly takes both the class labels and the manifold structure of the data into account. As an experimental validation, we show that this approach outperforms previously proposed models on the NORB object recognition dataset.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Learning representations that disentangle hidden explanatory factors in data has proven beneficial for effective pattern classification. Slow feature analysis (SFA) is a nonlinear dimensionality reduction technique that provides a useful representation for classification if the training data is sequential and transitions between classes are rare. The pattern discrimination ability of SFA has been attributed to the equivalence of linear SFA and linear discriminant analysis (LDA) under certain conditions. LDA, however, is often outperformed by locality preserving projections (LPP) when the data lies on or near a low-dimensional manifold. Here, we take a unified manifold learning perspective on LPP, LDA and SFA. We suggest that the discrimination ability of SFA is better explained by its relation to LPP than to LDA, and give an example of a situation where linear SFA outperforms LDA. We then propose a novel supervised manifold learning architecture that combines hierarchical nonlinear expansions, as commonly used for SFA, with supervised LPP. It learns a nonlinear parametric data representation that explicitly takes both the class labels and the manifold structure of the data into account. As an experimental validation, we show that this approach outperforms previously proposed models on the NORB object recognition dataset.", "fno": "5209b568", "keywords": [ "Manifolds", "Training", "Lighting", "Training Data", "Accuracy", "Computer Architecture", "Feature Extraction", "Classification", "Manifold Learning", "Slow Feature Analysis", "Locality Perservingprojections", "Object Recognition" ], "authors": [ { "affiliation": null, "fullName": "Erik M. Rehn", "givenName": "Erik M.", "surname": "Rehn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Henning Sprekeler", "givenName": "Henning", "surname": "Sprekeler", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "1568-1573", "year": "2014", "issn": "1051-4651", "isbn": "978-1-4799-5209-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5209b562", "articleId": "12OmNqyUUAf", "__typename": "AdjacentArticleType" }, "next": { "fno": "5209b574", "articleId": "12OmNBOllhF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2014/4308/0/4308a015", "title": "Globality-Locality Preserving Projections for Biometric Data Dimensionality Reduction", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2014/4308a015/12OmNARRYAc", "parentPublication": { "id": "proceedings/cvprw/2014/4308/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2011/688/0/05954516", "title": "A Novel Regularized Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/icic/2011/05954516/12OmNB8TU6k", "parentPublication": { "id": "proceedings/icic/2011/688/0", "title": "2011 Fourth International Conference on Information and Computing (ICIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2011/4391/0/4391a066", "title": "Gene Expression Data Classification Using Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/bibe/2011/4391a066/12OmNBhZ4kV", "parentPublication": { "id": "proceedings/bibe/2011/4391/0", "title": "2011 IEEE 11th International Conference on Bioinformatics and Bioengineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2009/3931/1/3931a320", "title": "Face Recognition Using Modular Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/cis/2009/3931a320/12OmNwdL7rk", "parentPublication": { "id": "proceedings/cis/2009/3931/1", "title": "2009 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/1/3336a985", "title": "Enhanced Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336a985/12OmNxXCGFC", "parentPublication": { "id": "proceedings/csse/2008/3336/1", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnc/2007/2875/2/28750616", "title": "Application of Radial Basis Function Network and Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/icnc/2007/28750616/12OmNz6iOwb", "parentPublication": { "id": "proceedings/icnc/2007/2875/2", "title": "Third International Conference on Natural Computation (ICNC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithingscpscom/2011/4580/0/4580a252", "title": "Supervised Gabor-Based Kernel Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/ithingscpscom/2011/4580a252/12OmNzTH0KO", "parentPublication": { "id": "proceedings/ithingscpscom/2011/4580/0", "title": "International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2010/4297/0/4297a288", "title": "DST Feature Based Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/cis/2010/4297a288/12OmNzgeLKe", "parentPublication": { "id": "proceedings/cis/2010/4297/0", "title": "2010 International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsps/2009/3654/0/3654a718", "title": "Identification of Human Faces Using Orthogonal Locality Preserving Projections", "doi": null, "abstractUrl": "/proceedings-article/icsps/2009/3654a718/12OmNzl3WVz", "parentPublication": { "id": "proceedings/icsps/2009/3654/0", "title": "2009 International Conference on Signal Processing Systems (ICSPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a594", "title": "Enhanced Adaptive Locality Preserving Projections for Face Recognition", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a594/17D45WaTkeq", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JC1F8KcINO", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "9994793", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JC2CG2LmYU", "doi": "10.1109/BIBM55620.2022.9994962", "title": "AccSleepNet: An Axis-Aware Hybrid Deep Fusion Model for Sleep Stage Classification Using Wrist-Worn Accelerometer Data", "normalizedTitle": "AccSleepNet: An Axis-Aware Hybrid Deep Fusion Model for Sleep Stage Classification Using Wrist-Worn Accelerometer Data", "abstract": "Numerous people are suffering from sleep-related problems. To diagnose them, a prerequisite is to divide the polysomnography (PSG) data into different sleep stages. Thus, sleep stage classification is an essential step, but collecting PSG data is expensive, time-consuming, and even belated. To address this issue, using accelerometers that are widely used in smartwatches is treated as an alternative way to monitor people&#x2019;s sleep conditions. However, the flexibility of deep learning models by purely using wrist-worn accelerometer data for sleep stage classification has not been investigated by researchers. To explore the answer, in this paper, we design a novel axis-aware hybrid fusion-based deep learning model, named AccSleepNet, which takes the three axes&#x2019; accelerometer data as the input simultaneously. The designed axis-aware hybrid fusion mechanism prompts the model to learn the deep features from three axes collaboratively. Finally, a classification module takes the fused feature representations from three axes as input and outputs the predicted sleep stage. Experimental results on two public datasets demonstrate the effectiveness of the proposed AccSleepNet for the sleep stage classification task compared with state-of-the-art baselines. Moreover, an ablation study validates the necessity of leveraging three axes&#x2019; accelerometer data and the superiority of the designed axis-aware hybrid fusion mechanism <sup>1</sup>.", "abstracts": [ { "abstractType": "Regular", "content": "Numerous people are suffering from sleep-related problems. To diagnose them, a prerequisite is to divide the polysomnography (PSG) data into different sleep stages. Thus, sleep stage classification is an essential step, but collecting PSG data is expensive, time-consuming, and even belated. To address this issue, using accelerometers that are widely used in smartwatches is treated as an alternative way to monitor people&#x2019;s sleep conditions. However, the flexibility of deep learning models by purely using wrist-worn accelerometer data for sleep stage classification has not been investigated by researchers. To explore the answer, in this paper, we design a novel axis-aware hybrid fusion-based deep learning model, named AccSleepNet, which takes the three axes&#x2019; accelerometer data as the input simultaneously. The designed axis-aware hybrid fusion mechanism prompts the model to learn the deep features from three axes collaboratively. Finally, a classification module takes the fused feature representations from three axes as input and outputs the predicted sleep stage. Experimental results on two public datasets demonstrate the effectiveness of the proposed AccSleepNet for the sleep stage classification task compared with state-of-the-art baselines. Moreover, an ablation study validates the necessity of leveraging three axes&#x2019; accelerometer data and the superiority of the designed axis-aware hybrid fusion mechanism <sup>1</sup>.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Numerous people are suffering from sleep-related problems. To diagnose them, a prerequisite is to divide the polysomnography (PSG) data into different sleep stages. Thus, sleep stage classification is an essential step, but collecting PSG data is expensive, time-consuming, and even belated. To address this issue, using accelerometers that are widely used in smartwatches is treated as an alternative way to monitor people’s sleep conditions. However, the flexibility of deep learning models by purely using wrist-worn accelerometer data for sleep stage classification has not been investigated by researchers. To explore the answer, in this paper, we design a novel axis-aware hybrid fusion-based deep learning model, named AccSleepNet, which takes the three axes’ accelerometer data as the input simultaneously. The designed axis-aware hybrid fusion mechanism prompts the model to learn the deep features from three axes collaboratively. Finally, a classification module takes the fused feature representations from three axes as input and outputs the predicted sleep stage. Experimental results on two public datasets demonstrate the effectiveness of the proposed AccSleepNet for the sleep stage classification task compared with state-of-the-art baselines. Moreover, an ablation study validates the necessity of leveraging three axes’ accelerometer data and the superiority of the designed axis-aware hybrid fusion mechanism 1.", "fno": "09994962", "keywords": [ "Accelerometers", "Feature Extraction", "Image Classification", "Learning Artificial Intelligence", "Medical Signal Processing", "Patient Monitoring", "Pattern Classification", "Signal Classification", "Sleep", "Axes", "Axis Aware Hybrid Deep Fusion Model", "Collecting PSG Data", "Deep Learning Models", "Designed Axis Aware", "Different Sleep Stages", "Novel Axis Aware Hybrid Fusion Based Deep Learning Model", "People", "Polysomnography Data", "Predicted Sleep Stage", "Sleep Stage Classification Task", "Sleep Related Problems", "Wrist Worn Accelerometer Data", "Accelerometers", "Deep Learning", "Analytical Models", "Biological System Modeling", "Data Models", "Hybrid Power Systems", "Task Analysis", "Sleep Stage Classification", "Deep Learning", "Cross Attention", "Accelerometer" ], "authors": [ { "affiliation": "Pennsylvania State University,United States", "fullName": "Guanjie Huang", "givenName": "Guanjie", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "JD Intelligent Cities Research,China", "fullName": "Ye Yuan", "givenName": "Ye", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University,United States", "fullName": "Guohong Cao", "givenName": "Guohong", "surname": "Cao", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University,United States", "fullName": "Fenglong Ma", "givenName": "Fenglong", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1005-1012", "year": "2022", "issn": null, "isbn": "978-1-6654-6819-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09994968", "articleId": "1JC2041j8AM", "__typename": "AdjacentArticleType" }, "next": { "fno": "09995669", "articleId": "1JC2qbJ1ITm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cse/2014/7981/0/7981a808", "title": "An Effective Way to Improve Actigraphic Algorithm by Using Tri-axial Accelerometer in Sleep Detection", "doi": null, "abstractUrl": "/proceedings-article/cse/2014/7981a808/12OmNAXglVV", "parentPublication": { "id": "proceedings/cse/2014/7981/0", "title": "2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imis/2012/4684/0/4684a886", "title": "A Feasibility Study of Wrist-Worn Accelerometer Based Detection of Smoking Habits", "doi": null, "abstractUrl": "/proceedings-article/imis/2012/4684a886/12OmNBiygxH", "parentPublication": { "id": "proceedings/imis/2012/4684/0", "title": "Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0/07847220", "title": "The Survey of Low-Power Sleep Monitoring Algorithm Based on the Wrist Movement Signal", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2016/07847220/12OmNvjgWVW", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2016/3205/0", "title": "2016 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/3/3507c122", "title": "Tilt-Induced-Error Compensation for 2-Axis Magnetic Compass with 2-Axis Accelerometer", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507c122/12OmNy5zssw", "parentPublication": { "id": "proceedings/csie/2009/3507/3", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isms/2011/4336/0/4336a395", "title": "Three-axis Piezoresistive Accelerometer with Uniform Axial Sensitivities", "doi": null, "abstractUrl": "/proceedings-article/isms/2011/4336a395/12OmNyKJiBq", "parentPublication": { "id": "proceedings/isms/2011/4336/0", "title": "Intelligent Systems, Modelling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2014/5701/0/5701a125", "title": "Towards Benchmarked Sleep Detection with Wrist-Worn Sensing Units", "doi": null, "abstractUrl": "/proceedings-article/ichi/2014/5701a125/12OmNyQGSjf", "parentPublication": { "id": "proceedings/ichi/2014/5701/0", "title": "2014 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmens/2004/2189/0/01508936", "title": "Design & Fabrication of Piezoresistive Six Degree of Freedom Accelerometer for Biomechanical Applications", "doi": null, "abstractUrl": "/proceedings-article/icmens/2004/01508936/12OmNzaQofU", "parentPublication": { "id": "proceedings/icmens/2004/2189/0", "title": "International Conference on MEMS, NANO and Smart Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percomw/2018/3227/0/08480345", "title": "Firearm Detection Using Wrist Worn Tri-Axis Accelerometer Signals", "doi": null, "abstractUrl": "/proceedings-article/percomw/2018/08480345/17D45Wc1IKs", "parentPublication": { "id": "proceedings/percomw/2018/3227/0", "title": "2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374318", "title": "Device agnostic sleep-wake segment classification from wrist-worn accelerometry", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374318/1rUJ0f5L8GY", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icecem/2021/1025/0/102500a001", "title": "Sleep Signal Data Analysis Based on SVM and Markov Process", "doi": null, "abstractUrl": "/proceedings-article/icecem/2021/102500a001/1zpEUwODgMU", "parentPublication": { "id": "proceedings/icecem/2021/1025/0", "title": "2021 International Conference on E-Commerce and E-Management (ICECEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKJiaV", "title": "Pattern Recognition, International Conference on", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNAObbzn", "doi": "10.1109/ICPR.2010.601", "title": "Cell Tracking in Video Microscopy Using Bipartite Graph Matching", "normalizedTitle": "Cell Tracking in Video Microscopy Using Bipartite Graph Matching", "abstract": "Automated visual tracking of cells from video microscopy has many important biomedical applications. In this paper, we model the problem of cell tracking over pairs of video microscopy image frames as a minimum weight matching problem in bipartite graphs. The bipartite matching essentially establishes one-to-one correspondences between the cells in different frames. A key advantage of using bipartite matching is the inherent scalability, which arises from its polynomial time-complexity. We propose two different tracking methods based on bipartite graph matching and properties of Gaussian distributions. In both the methods, i) the centers of the cells appearing in two frames are treated as vertices of a bipartite graph and ii) the weight matrix contains information about distance between the cells (in two frames) and cell velocity. In the first method, we identify fast-moving cells based on distance and filter them out using Gaussian distributions before the matching is applied. In the second method, we remove false matches using Gaussian distributions after the bipartite graph matching is employed. Experimental results indicate that both the methods are promising while the second method has higher accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Automated visual tracking of cells from video microscopy has many important biomedical applications. In this paper, we model the problem of cell tracking over pairs of video microscopy image frames as a minimum weight matching problem in bipartite graphs. The bipartite matching essentially establishes one-to-one correspondences between the cells in different frames. A key advantage of using bipartite matching is the inherent scalability, which arises from its polynomial time-complexity. We propose two different tracking methods based on bipartite graph matching and properties of Gaussian distributions. In both the methods, i) the centers of the cells appearing in two frames are treated as vertices of a bipartite graph and ii) the weight matrix contains information about distance between the cells (in two frames) and cell velocity. In the first method, we identify fast-moving cells based on distance and filter them out using Gaussian distributions before the matching is applied. In the second method, we remove false matches using Gaussian distributions after the bipartite graph matching is employed. Experimental results indicate that both the methods are promising while the second method has higher accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automated visual tracking of cells from video microscopy has many important biomedical applications. In this paper, we model the problem of cell tracking over pairs of video microscopy image frames as a minimum weight matching problem in bipartite graphs. The bipartite matching essentially establishes one-to-one correspondences between the cells in different frames. A key advantage of using bipartite matching is the inherent scalability, which arises from its polynomial time-complexity. We propose two different tracking methods based on bipartite graph matching and properties of Gaussian distributions. In both the methods, i) the centers of the cells appearing in two frames are treated as vertices of a bipartite graph and ii) the weight matrix contains information about distance between the cells (in two frames) and cell velocity. In the first method, we identify fast-moving cells based on distance and filter them out using Gaussian distributions before the matching is applied. In the second method, we remove false matches using Gaussian distributions after the bipartite graph matching is employed. Experimental results indicate that both the methods are promising while the second method has higher accuracy.", "fno": "4109c456", "keywords": [ "Video Microscopy", "Cell Tracking", "Bipartite Graph", "Minimum Weight Matching" ], "authors": [ { "affiliation": null, "fullName": "Ananda S. Chowdhury", "givenName": "Ananda S.", "surname": "Chowdhury", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rohit Chatterjee", "givenName": "Rohit", "surname": "Chatterjee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mayukh Ghosh", "givenName": "Mayukh", "surname": "Ghosh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nilanjan Ray", "givenName": "Nilanjan", "surname": "Ray", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "2456-2459", "year": "2010", "issn": "1051-4651", "isbn": "978-0-7695-4109-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4109c452", "articleId": "12OmNylboBP", "__typename": "AdjacentArticleType" }, "next": { "fno": "4109c460", "articleId": "12OmNrJ11Gf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/is3c/2012/4655/0/4655a064", "title": "An Algorithm for Determining Critical Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a064/12OmNqzcvJt", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2012/4675/0/4675a860", "title": "Multithreaded Algorithms for Maximum Matching in Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2012/4675a860/12OmNvo67DD", "parentPublication": { "id": "proceedings/ipdps/2012/4675/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761142", "title": "An approach for video cut detection using bipartite graph matching as dissimilarity distance", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761142/12OmNwDSdt6", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2016/3682/0/3682a480", "title": "Stable Matching Beyond Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2016/3682a480/12OmNzC5T5q", "parentPublication": { "id": "proceedings/ipdpsw/2016/3682/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/4/3816d141", "title": "A Method of Fuzzy Reasoning Based on Semantic Similarity and Bipartite Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816d141/12OmNzC5T6t", "parentPublication": { "id": "proceedings/aici/2009/3816/4", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2007/2996/0/29960129", "title": "Bipartite graph matching for video clip localization", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2007/29960129/12OmNzTH0Kx", "parentPublication": { "id": "proceedings/sibgrapi/2007/2996/0", "title": "XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2008/3136/0/3136a928", "title": "Bipartite Graph for Protein Structure Matching", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a928/12OmNzUgd7x", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b478", "title": "Adaptive Dynamic Bipartite Graph Matching: A Reinforcement Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b478/1aDT44qHZYY", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100a412", "title": "Edge-Weighted Online Bipartite Matching", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100a412/1qyxvL8VZcc", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/06/09547224", "title": "A Deep Local Patch Matching Network for Cell Tracking in Microscopy Image Sequences Without Registration", "doi": null, "abstractUrl": "/journal/tb/2022/06/09547224/1x9TpMciRWM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTjZWK", "title": "1993 The Twenty-sixth Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "2", "displayVolume": "2", "year": "1993", "__typename": "ProceedingType" }, "article": { "id": "12OmNBJw9QV", "doi": "10.1109/HICSS.1993.284099", "title": "Parallel approximate matching", "normalizedTitle": "Parallel approximate matching", "abstract": "The author solves the maximum cardinality matching problem approximately. Determining the parallel complexity of maximum cardinality matching in bipartite graphs is a famous open problem in parallel algorithm design. The problem is known to be in RNC, but all known fast parallel algorithms that find maximum cardinality matchings require the use of random numbers. They are based on matrix algebra, and are inherently efficient for sparse graphs. Therefore, the problem of finding an approximate maximum cardinality matching is considered. The parallel matching algorithm of A. Goldberg et al. (1988) can be modified so that it runs in O(a/sup 2/ log/sup 3/ n) time on an exclusive read exclusive write (EREW) parallel random access machine (PRAM) with n+m processors and finds a matching of size (1-1/a)p when given a graph with n vertices, m edges and a maximum cardinality matching of size p. The resulting algorithm is deterministic.<>", "abstracts": [ { "abstractType": "Regular", "content": "The author solves the maximum cardinality matching problem approximately. Determining the parallel complexity of maximum cardinality matching in bipartite graphs is a famous open problem in parallel algorithm design. The problem is known to be in RNC, but all known fast parallel algorithms that find maximum cardinality matchings require the use of random numbers. They are based on matrix algebra, and are inherently efficient for sparse graphs. Therefore, the problem of finding an approximate maximum cardinality matching is considered. The parallel matching algorithm of A. Goldberg et al. (1988) can be modified so that it runs in O(a/sup 2/ log/sup 3/ n) time on an exclusive read exclusive write (EREW) parallel random access machine (PRAM) with n+m processors and finds a matching of size (1-1/a)p when given a graph with n vertices, m edges and a maximum cardinality matching of size p. The resulting algorithm is deterministic.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The author solves the maximum cardinality matching problem approximately. Determining the parallel complexity of maximum cardinality matching in bipartite graphs is a famous open problem in parallel algorithm design. The problem is known to be in RNC, but all known fast parallel algorithms that find maximum cardinality matchings require the use of random numbers. They are based on matrix algebra, and are inherently efficient for sparse graphs. Therefore, the problem of finding an approximate maximum cardinality matching is considered. The parallel matching algorithm of A. Goldberg et al. (1988) can be modified so that it runs in O(a/sup 2/ log/sup 3/ n) time on an exclusive read exclusive write (EREW) parallel random access machine (PRAM) with n+m processors and finds a matching of size (1-1/a)p when given a graph with n vertices, m edges and a maximum cardinality matching of size p. The resulting algorithm is deterministic.", "fno": "00284099", "keywords": [ "Computational Complexity", "Parallel Algorithms", "Parallel Approximate Matching", "Maximum Cardinality Matching Problem", "Parallel Complexity", "Bipartite Graphs", "Parallel Algorithm", "Random Numbers", "Matrix Algebra", "Approximate Maximum Cardinality Matching", "Exclusive Read Exclusive Write", "EREW", "Parallel Random Access Machine", "PRAM", "Parallel Algorithms", "Bipartite Graph", "Phase Change Random Access Memory", "Algorithm Design And Analysis", "Mathematics", "Computer Science", "Algebra", "Costs", "Graph Theory", "Process Design" ], "authors": [ { "affiliation": "Dept. of Math. & Comput. Sci., Nebraska Univ., Omaha, NE, USA", "fullName": "T.H. Spencer", "givenName": "T.H.", "surname": "Spencer", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "1993-01-01T00:00:00", "pubType": "proceedings", "pages": "293,294,295,296,297", "year": "1993", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00284098", "articleId": "12OmNxveNEf", "__typename": "AdjacentArticleType" }, "next": { "fno": "00284100", "articleId": "12OmNwe2IBV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/spdp/1991/2310/0/0218242", "title": "On a fast deterministic parallel approximate matching algorithm", "doi": null, "abstractUrl": "/proceedings-article/spdp/1991/0218242/12OmNARAnbj", "parentPublication": { "id": "proceedings/spdp/1991/2310/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2012/0806/0/1000a054", "title": "A multithreaded algorithm for network alignment via approximate matching", "doi": null, "abstractUrl": "/proceedings-article/sc/2012/1000a054/12OmNBrDqFR", "parentPublication": { "id": "proceedings/sc/2012/0806/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2013/5117/0/5117a021", "title": "A Push-Relabel-Based Maximum Cardinality Bipartite Matching Algorithm on GPUs", "doi": null, "abstractUrl": "/proceedings-article/icpp/2013/5117a021/12OmNBrV1S9", "parentPublication": { "id": "proceedings/icpp/2013/5117/0", "title": "2013 42nd International Conference on Parallel Processing (ICPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2015/6598/0/6598a398", "title": "Distributed-Memory Algorithms for Maximal Cardinality Matching Using Matrix Algebra", "doi": null, "abstractUrl": "/proceedings-article/cluster/2015/6598a398/12OmNC1Y5oe", "parentPublication": { "id": "proceedings/cluster/2015/6598/0", "title": "2015 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2012/4675/0/4675a860", "title": "Multithreaded Algorithms for Maximum Matching in Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2012/4675a860/12OmNvo67DD", "parentPublication": { "id": "proceedings/ipdps/2012/4675/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761142", "title": "An approach for video cut detection using bipartite graph matching as dissimilarity distance", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761142/12OmNwDSdt6", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spdp/1991/2310/0/0218187", "title": "Parallel matching on expanders", "doi": null, "abstractUrl": "/proceedings-article/spdp/1991/0218187/12OmNxbmSBF", "parentPublication": { "id": "proceedings/spdp/1991/2310/0", "title": "Parallel and Distributed Processing, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2015/8649/0/8649b075", "title": "A Parallel Tree Grafting Algorithm for Maximum Cardinality Matching in Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2015/8649b075/12OmNyQYtiN", "parentPublication": { "id": "proceedings/ipdps/2015/8649/0", "title": "2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2012/4676/0/4676c494", "title": "Multithreaded Algorithms for Matching in Graphs with Application to Data Analysis in Flow Cytometry", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2012/4676c494/12OmNylboND", "parentPublication": { "id": "proceedings/ipdpsw/2012/4676/0", "title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740084", "title": "Parallel algorithms for maximum matching in interval graphs", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740084/12OmNz2TCE2", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwvVrM8", "title": "Computer and Information Technology, International Conference on", "acronym": "cit", "groupId": "1001306", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCesr2t", "doi": "10.1109/CIT.2010.248", "title": "Disparity Adjustment for Local Stereo Matching", "normalizedTitle": "Disparity Adjustment for Local Stereo Matching", "abstract": "Local stereo matching methods still play an important part as they are simple and fast. Some local methods perform well and even better than most global methods. But they usually achieve accuracy at the expense of speed. Simple local methods are fast, but exhibit systematic errors. In this paper, we focus on the invalid regions of traditional window-based matching and present a new solution to improve the initial matching result according to the identification of invalid regions and weight-based disparity adjustment. Our solution provides an easy way to increase the accuracy with little additional computation. The experimental results are evaluated using the Middlebury stereo test bed, showing that our method achieves competitively performance. Moreover our algorithm modules could be easily expanded into other matching algorithms as post-processing.", "abstracts": [ { "abstractType": "Regular", "content": "Local stereo matching methods still play an important part as they are simple and fast. Some local methods perform well and even better than most global methods. But they usually achieve accuracy at the expense of speed. Simple local methods are fast, but exhibit systematic errors. In this paper, we focus on the invalid regions of traditional window-based matching and present a new solution to improve the initial matching result according to the identification of invalid regions and weight-based disparity adjustment. Our solution provides an easy way to increase the accuracy with little additional computation. The experimental results are evaluated using the Middlebury stereo test bed, showing that our method achieves competitively performance. Moreover our algorithm modules could be easily expanded into other matching algorithms as post-processing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Local stereo matching methods still play an important part as they are simple and fast. Some local methods perform well and even better than most global methods. But they usually achieve accuracy at the expense of speed. Simple local methods are fast, but exhibit systematic errors. In this paper, we focus on the invalid regions of traditional window-based matching and present a new solution to improve the initial matching result according to the identification of invalid regions and weight-based disparity adjustment. Our solution provides an easy way to increase the accuracy with little additional computation. The experimental results are evaluated using the Middlebury stereo test bed, showing that our method achieves competitively performance. Moreover our algorithm modules could be easily expanded into other matching algorithms as post-processing.", "fno": "4108b388", "keywords": [ "Bincular Vision", "Stereo Matching", "Local Method", "Disparity Adjustment" ], "authors": [ { "affiliation": null, "fullName": "Xia Hu", "givenName": "Xia", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Caiming Zhang", "givenName": "Caiming", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Wang", "givenName": "Wei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xifeng Gao", "givenName": "Xifeng", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "cit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "1388-1392", "year": "2010", "issn": null, "isbn": "978-0-7695-4108-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4108b384", "articleId": "12OmNzBwGBw", "__typename": "AdjacentArticleType" }, "next": { "fno": "4108b393", "articleId": "12OmNrJAe3c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/gcis/2009/3571/4/3571d219", "title": "3D Line Segment Detection Based on Disparity Data of Area-Based Stereo", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571d219/12OmNAKuoRK", "parentPublication": { "id": "proceedings/gcis/2009/3571/4", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/177P2A27", "title": "A non-local cost aggregation method for stereo matching", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/177P2A27/12OmNBBQZr1", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/1995/7190/0/71900188", "title": "Stereo disparity from multiscale processing of local image phase", "doi": null, "abstractUrl": "/proceedings-article/iscv/1995/71900188/12OmNqGitZk", "parentPublication": { "id": "proceedings/iscv/1995/7190/0", "title": "Computer Vision, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socpar/2009/3879/0/3879a575", "title": "Disparity Mapping for Navigation of Stereo Vision Autonomous Guided Vehicle", "doi": null, "abstractUrl": "/proceedings-article/socpar/2009/3879a575/12OmNvSbByB", "parentPublication": { "id": "proceedings/socpar/2009/3879/0", "title": "Soft Computing and Pattern Recognition, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdt/2010/4071/0/4071a153", "title": "Stereo Correspondence Matching Using Multiwavelets", "doi": null, "abstractUrl": "/proceedings-article/icdt/2010/4071a153/12OmNvqmULx", "parentPublication": { "id": "proceedings/icdt/2010/4071/0", "title": "2010 Fifth International Conference on Digital Telecommunications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsct/2008/3498/2/3498b690", "title": "Stereo Matching Based on Local Invariant Region Identification", "doi": null, "abstractUrl": "/proceedings-article/iscsct/2008/3498b690/12OmNxHJ9t0", "parentPublication": { "id": "proceedings/iscsct/2008/3498/1", "title": "2008 International Symposium on Computer Science and Computational Technology (ISCSCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dimpvt/2011/4369/0/4369a132", "title": "Stereo Matching with Reliable Disparity Propagation", "doi": null, "abstractUrl": "/proceedings-article/3dimpvt/2011/4369a132/12OmNyRPgr3", "parentPublication": { "id": "proceedings/3dimpvt/2011/4369/0", "title": "2011 International Conference on 3D Imaging, Modeling, Processing, Visualization and Transmission", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1998/03/i0333", "title": "Stereo Matching as a Nearest-Neighbor Problem", "doi": null, "abstractUrl": "/journal/tp/1998/03/i0333/13rRUwjoNy5", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/07/i0719", "title": "Stereo Matching in the Presence of Narrow Occluding Objects Using Dynamic Disparity Search", "doi": null, "abstractUrl": "/journal/tp/1995/07/i0719/13rRUxBa5cS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2014/04/mmu2014040016", "title": "Local Stereo Matching with Improved Matching Cost and Disparity Refinement", "doi": null, "abstractUrl": "/magazine/mu/2014/04/mmu2014040016/13rRUxNW1Wr", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwCJOY5", "title": "2015 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNCvcLHG", "doi": "10.1109/BigData.2015.7363856", "title": "Efficient distributed maximum matching for solving the container exchange problem in the maritime industry", "normalizedTitle": "Efficient distributed maximum matching for solving the container exchange problem in the maritime industry", "abstract": "To reduce container management costs, ocean carrier companies rent containers from container leasing companies. Two carrier companies can exchange their empty containers between each other at various ports to eliminate the transportation cost of empty containers. To minimize costs, a container leasing company has to find the maximum number of pairs of carrier companies that can exchange containers. We formulate this problem as maximum matching in a large general graph, and propose a distributed matching algorithm to solve this problem. We also propose several optimization techniques to improve the efficiency of our algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "To reduce container management costs, ocean carrier companies rent containers from container leasing companies. Two carrier companies can exchange their empty containers between each other at various ports to eliminate the transportation cost of empty containers. To minimize costs, a container leasing company has to find the maximum number of pairs of carrier companies that can exchange containers. We formulate this problem as maximum matching in a large general graph, and propose a distributed matching algorithm to solve this problem. We also propose several optimization techniques to improve the efficiency of our algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To reduce container management costs, ocean carrier companies rent containers from container leasing companies. Two carrier companies can exchange their empty containers between each other at various ports to eliminate the transportation cost of empty containers. To minimize costs, a container leasing company has to find the maximum number of pairs of carrier companies that can exchange containers. We formulate this problem as maximum matching in a large general graph, and propose a distributed matching algorithm to solve this problem. We also propose several optimization techniques to improve the efficiency of our algorithm.", "fno": "07363856", "keywords": [ "Containers", "Companies", "Servers", "Ports Computers", "Transportation", "Bipartite Graph", "Oceans", "Maritime Industry", "Distributed Maximum Matching", "Reachability", "Iterative Multiple BSP", "Cargo Transportation" ], "authors": [ { "affiliation": "Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan", "fullName": "Fei Shao", "givenName": "Fei", "surname": "Shao", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan", "fullName": "Li-Yung Ho", "givenName": "Li-Yung", "surname": "Ho", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Information Science, Research Center for Information, Technology Innovation Academia Sinica, Taipei, Taiwan", "fullName": "Jan-Jan Wu", "givenName": "Jan-Jan", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science and Information Engineering, Graduate Intitute of Networking and Multimedia, National Taiwan University Taipei, Taiwan", "fullName": "Pangfeng Liu", "givenName": "Pangfeng", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "1031-1036", "year": "2015", "issn": null, "isbn": "978-1-4799-9926-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07363855", "articleId": "12OmNvA1hdJ", "__typename": "AdjacentArticleType" }, "next": { "fno": "07363857", "articleId": "12OmNwGZNO1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2012/4782/0/4782a076", "title": "Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a076/12OmNBgQFO3", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2012/2310/0/06468698", "title": "Application of attribute theory for container throughput forecast", "doi": null, "abstractUrl": "/proceedings-article/grc/2012/06468698/12OmNwoghcz", "parentPublication": { "id": "proceedings/grc/2012/2310/0", "title": "2012 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icss/2015/9947/0/9947a032", "title": "Research on Scheduling the Containers between Container Storage Station and Container Terminal", "doi": null, "abstractUrl": "/proceedings-article/icss/2015/9947a032/12OmNx5piZZ", "parentPublication": { "id": "proceedings/icss/2015/9947/0", "title": "2015 International Conference on Service Science (ICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bife/2013/4777/0/4777a130", "title": "Ocean Carrier's Free-Time Pricing Scheme for Inbound Container Storage", "doi": null, "abstractUrl": "/proceedings-article/bife/2013/4777a130/12OmNyKa6bZ", "parentPublication": { "id": "proceedings/bife/2013/4777/0", "title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sose/2018/5207/0/520701a240", "title": "Comparing Container-Based Microservices and Workspace as a Service: Which One to Choose?", "doi": null, "abstractUrl": "/proceedings-article/sose/2018/520701a240/12OmNyoiYXE", "parentPublication": { "id": "proceedings/sose/2018/5207/0", "title": "2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cd/2017/05/mcd2017050042", "title": "Key Characteristics of a Container Orchestration Platform to Enable a Modern Application", "doi": null, "abstractUrl": "/magazine/cd/2017/05/mcd2017050042/13rRUILtJBZ", "parentPublication": { "id": "mags/cd", "title": "IEEE Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2022/3154/0/315400a252", "title": "Security hardening solution for docker container", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2022/315400a252/1M66gMPjCQU", "parentPublication": { "id": "proceedings/cyberc/2022/3154/0", "title": "2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase/2019/2777/0/277700a001", "title": "Building Trust in Container Environment", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase/2019/277700a001/1ezRuqJcXZu", "parentPublication": { "id": "proceedings/trustcom-bigdatase/2019/2777/0", "title": "2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139776", "title": "Solving the Container Explosion Problem for Distributed High Throughput Computing", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139776/1lss1kKaZnG", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2020/6547/0/654700a001", "title": "Blockchain-based Automated Container Cloud Security Enhancement System", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2020/654700a001/1p6f4bdrD5m", "parentPublication": { "id": "proceedings/smartcloud/2020/6547/0", "title": "2020 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBk6A", "title": "2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)", "acronym": "3pgcic", "groupId": "1800224", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwdtwi4", "doi": "10.1109/3PGCIC.2014.59", "title": "The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment", "normalizedTitle": "The Chinese Conceptual Graph Matching Algorithm Based on Conceptual Sub-graph Weight Self-Adjustment", "abstract": "Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation method of E-A-V structures similarity, the algorithm computed the similarity of conceptual graphs. When using this algorithm to compute the Conceptual Graph similarity, it can give the homologous weight to the sub graph based on the proportion of how much information the sub graph contains in the whole Conceptual Graph. The experiment results show that this new algorithm achieve better results.", "abstracts": [ { "abstractType": "Regular", "content": "Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation method of E-A-V structures similarity, the algorithm computed the similarity of conceptual graphs. When using this algorithm to compute the Conceptual Graph similarity, it can give the homologous weight to the sub graph based on the proportion of how much information the sub graph contains in the whole Conceptual Graph. The experiment results show that this new algorithm achieve better results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation method of E-A-V structures similarity, the algorithm computed the similarity of conceptual graphs. When using this algorithm to compute the Conceptual Graph similarity, it can give the homologous weight to the sub graph based on the proportion of how much information the sub graph contains in the whole Conceptual Graph. The experiment results show that this new algorithm achieve better results.", "fno": "4171a197", "keywords": [ "Semantics", "Equations", "Mathematical Model", "Educational Institutions", "Algorithm Design And Analysis", "Computational Modeling", "Computers", "Conceptual Sub Graph Weight Self Adjustment", "Chinese Semantic Analysis", "Conceptual Graph", "E A V Concept Structures Similarity" ], "authors": [ { "affiliation": null, "fullName": "Hui Zeng", "givenName": "Hui", "surname": "Zeng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Liyan Xiong", "givenName": "Liyan", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianjun Chen", "givenName": "Jianjun", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "3pgcic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "197-200", "year": "2014", "issn": null, "isbn": "978-1-4799-4171-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4171a189", "articleId": "12OmNwBBqbr", "__typename": "AdjacentArticleType" }, "next": { "fno": "4171a201", "articleId": "12OmNvkpkRv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209c673", "title": "Spatial Face Context with Gender Information for Group Photo Similarity Assessment", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c673/12OmNApu5gO", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2013/5072/0/5072a250", "title": "A Framework for Fast Graph-Based Pattern Matching in Conceptual Models", "doi": null, "abstractUrl": "/proceedings-article/cbi/2013/5072a250/12OmNBsuea0", "parentPublication": { "id": "proceedings/cbi/2013/5072/0", "title": "2013 IEEE 15th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685135", "title": "Assessing conceptual understanding in mathematics", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685135/12OmNqFrGBx", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2012/4959/0/06516352", "title": "Semantic Similarity Measure with Conceptual Graph-Based Image Annotations", "doi": null, "abstractUrl": "/proceedings-article/acsat/2012/06516352/12OmNrYlmJ7", "parentPublication": { "id": "proceedings/acsat/2012/4959/0", "title": "2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wiiatw/2006/2749/0/04053255", "title": "Semantics Recognition in Service Composition Using Conceptual Graph", "doi": null, "abstractUrl": "/proceedings-article/wiiatw/2006/04053255/12OmNvSKNMf", "parentPublication": { "id": "proceedings/wiiatw/2006/2749/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence International Intelligence Agent Technology Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ibica/2012/2838/0/06337686", "title": "Use Critical Sub-graph to Optimize the In-building Shortest Path Algorithm", "doi": null, "abstractUrl": "/proceedings-article/ibica/2012/06337686/12OmNwE9OE0", "parentPublication": { "id": "proceedings/ibica/2012/2838/0", "title": "2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgc/2013/5114/0/5114a566", "title": "An Efficient Method for Computing Similarity Between Frequent Subgraphs", "doi": null, "abstractUrl": "/proceedings-article/cgc/2013/5114a566/12OmNy4r3X4", "parentPublication": { "id": "proceedings/cgc/2013/5114/0", "title": "2013 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2008/1969/0/04720418", "title": "Conceptual graph based learning material producing strategy for cooperative learning", "doi": null, "abstractUrl": "/proceedings-article/fie/2008/04720418/12OmNyUnEKH", "parentPublication": { "id": "proceedings/fie/2008/1969/0", "title": "2008 38th Annual Frontiers in Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a827", "title": "Multi-instance Multi-graph Dual Embedding Learning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a827/12OmNzBOhw2", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a590", "title": "Multi-graph-view Learning for Graph Classification", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a590/12OmNzkuKJl", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFul", "title": "2014 18th International Conference on Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwx3Qbs", "doi": "10.1109/IV.2014.41", "title": "Visual Comparison of Multilingual Documents and Lexical Matching", "normalizedTitle": "Visual Comparison of Multilingual Documents and Lexical Matching", "abstract": "In this paper, we propose a new approach for the comparison and matching of documents written in different languages. Our approach is devoted to situations where documents can be conceptually represented by abstract graphs. Our approach builds on previous work yet it addresses some limitations left open by previous work. The benefits of our approach is twofold. First, our approach makes it possible to compare original multi-lingual documents without requiring a translation in a pivot language contrary to other approaches. Second, we propose a highly visual and interactive environment so that human experts can perform both comparison of documents and lexical matching in a seamless way contrary to other approaches where matching and comparison are often considered separately.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a new approach for the comparison and matching of documents written in different languages. Our approach is devoted to situations where documents can be conceptually represented by abstract graphs. Our approach builds on previous work yet it addresses some limitations left open by previous work. The benefits of our approach is twofold. First, our approach makes it possible to compare original multi-lingual documents without requiring a translation in a pivot language contrary to other approaches. Second, we propose a highly visual and interactive environment so that human experts can perform both comparison of documents and lexical matching in a seamless way contrary to other approaches where matching and comparison are often considered separately.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a new approach for the comparison and matching of documents written in different languages. Our approach is devoted to situations where documents can be conceptually represented by abstract graphs. Our approach builds on previous work yet it addresses some limitations left open by previous work. The benefits of our approach is twofold. First, our approach makes it possible to compare original multi-lingual documents without requiring a translation in a pivot language contrary to other approaches. Second, we propose a highly visual and interactive environment so that human experts can perform both comparison of documents and lexical matching in a seamless way contrary to other approaches where matching and comparison are often considered separately.", "fno": "4103a151", "keywords": [ "Layout", "Heating", "Visualization", "Bipartite Graph", "Abstracts", "Dictionaries", "Text Analysis", "Multi Lingual Documents", "Multi Layer Graph Matching And Comparison", "Heat Map Based Visual Comparison" ], "authors": [ { "affiliation": null, "fullName": "Minoru Nakayam", "givenName": "Minoru", "surname": "Nakayam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mountaz Hascoet", "givenName": "Mountaz", "surname": "Hascoet", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "151-156", "year": "2014", "issn": "1550-6037", "isbn": "978-1-4799-4103-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4103a145", "articleId": "12OmNwp74Jt", "__typename": "AdjacentArticleType" }, "next": { "fno": "4103a157", "articleId": "12OmNwkzulU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2003/2105/3/210530025", "title": "Information Retrieval Based on OCR Errors in Scanned Documents", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2003/210530025/12OmNwO5LZt", "parentPublication": { "id": "proceedings/cvprw/2003/2105/3", "title": "2003 Conference on Computer Vision and Pattern Recognition Workshop - Volume 3", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tai/1993/4200/0/00633991", "title": "A tool for classifying office documents", "doi": null, "abstractUrl": "/proceedings-article/tai/1993/00633991/12OmNy6qfKI", "parentPublication": { "id": "proceedings/tai/1993/4200/0", "title": "Proceedings of 1993 IEEE Conference on Tools with Al (TAI-93)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a121", "title": "Lexical Characteristics Analysis of Chinese Clinical Documents", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a121/12OmNyFU7bE", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/relaw/2015/0104/0/07330206", "title": "Terminology matching of requirements specification documents and regulations for compliance checking", "doi": null, "abstractUrl": "/proceedings-article/relaw/2015/07330206/12OmNyq0zJI", "parentPublication": { "id": "proceedings/relaw/2015/0104/0", "title": "2015 IEEE Eighth International Workshop on Requirements Engineering and Law (RELAW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628734", "title": "Segmentation-Free Keyword Spotting for Handwritten Documents Based on Heat Kernel Signature", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628734/12OmNyvoX8v", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iih-msp/2009/3762/0/3762a612", "title": "A Multilingual Patent Text-Mining Approach for Computing Relatedness Evaluation of Patent Documents", "doi": null, "abstractUrl": "/proceedings-article/iih-msp/2009/3762a612/12OmNzVoBMS", "parentPublication": { "id": "proceedings/iih-msp/2009/3762/0", "title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2015/1805/0/07333868", "title": "Handwritten word spotting by inexact matching of grapheme graphs", "doi": null, "abstractUrl": "/proceedings-article/icdar/2015/07333868/12OmNzYNN9O", "parentPublication": { "id": "proceedings/icdar/2015/1805/0", "title": "2015 13th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2006/03/k0334", "title": "Learning Object Models from Semistructured Web Documents", "doi": null, "abstractUrl": "/journal/tk/2006/03/k0334/13rRUygBwhZ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/01/09035407", "title": "Subgraph Matching With Effective Matching Order and Indexing", "doi": null, "abstractUrl": "/journal/tk/2022/01/09035407/1iaerGC3MuQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412437", "title": "ID documents matching and localization with multi-hypothesis constraints", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412437/1tmiN71TX1u", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynJMVy", "title": "2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "acronym": "ipdpsw", "groupId": "1800044", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzC5T5q", "doi": "10.1109/IPDPSW.2016.207", "title": "Stable Matching Beyond Bipartite Graphs", "normalizedTitle": "Stable Matching Beyond Bipartite Graphs", "abstract": "Binary matching in bipartite graphs and its extensions have been well studied over the decades. A stable matching (or marriage) seeks to establish a stable binary pairing of two genders, where each member in a gender has a preference list for the other gender. In addition, all members are paired (also called perfect matching), with one selection made from each gender. Gale and Shapley showed that a stable marriage exists for any set of preferences in any complete and balanced bipartite graphs. However, stable matching may not exist in a non-bipartite graph represented by a complete graph (i.e. single gender), as shown in the stable roommates problem. In this paper, we study binary matching in complete and balanced k-partite graphs with an even number of members, and show that except when k = 2, preference lists always exist under which a stable binary matching does not exist. We use a solution for the stable roommates problem to illustrate the matching identification process if one exists. Under a natural extension of pairwise stability for binary matching to k-ary matching, we show that stable k-ary matching exists for any preference lists in any complete and balanced k-partite graphs. Here, we assume that there is a strict preference order of the members over all individual members from different genders, as opposed to preference order over a combination of members from different genders used in existing multi-dimensional extensions. An extended Gale-Shapley algorithm is introduced, together with various implementations, to determine such a stable k-ary matching. A parallel implementation is also proposed to speed up the matching process. In the extension, we further propose a weakened unstable condition for k-ary matching and show the existence of stable k-ary matching.", "abstracts": [ { "abstractType": "Regular", "content": "Binary matching in bipartite graphs and its extensions have been well studied over the decades. A stable matching (or marriage) seeks to establish a stable binary pairing of two genders, where each member in a gender has a preference list for the other gender. In addition, all members are paired (also called perfect matching), with one selection made from each gender. Gale and Shapley showed that a stable marriage exists for any set of preferences in any complete and balanced bipartite graphs. However, stable matching may not exist in a non-bipartite graph represented by a complete graph (i.e. single gender), as shown in the stable roommates problem. In this paper, we study binary matching in complete and balanced k-partite graphs with an even number of members, and show that except when k = 2, preference lists always exist under which a stable binary matching does not exist. We use a solution for the stable roommates problem to illustrate the matching identification process if one exists. Under a natural extension of pairwise stability for binary matching to k-ary matching, we show that stable k-ary matching exists for any preference lists in any complete and balanced k-partite graphs. Here, we assume that there is a strict preference order of the members over all individual members from different genders, as opposed to preference order over a combination of members from different genders used in existing multi-dimensional extensions. An extended Gale-Shapley algorithm is introduced, together with various implementations, to determine such a stable k-ary matching. A parallel implementation is also proposed to speed up the matching process. In the extension, we further propose a weakened unstable condition for k-ary matching and show the existence of stable k-ary matching.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Binary matching in bipartite graphs and its extensions have been well studied over the decades. A stable matching (or marriage) seeks to establish a stable binary pairing of two genders, where each member in a gender has a preference list for the other gender. In addition, all members are paired (also called perfect matching), with one selection made from each gender. Gale and Shapley showed that a stable marriage exists for any set of preferences in any complete and balanced bipartite graphs. However, stable matching may not exist in a non-bipartite graph represented by a complete graph (i.e. single gender), as shown in the stable roommates problem. In this paper, we study binary matching in complete and balanced k-partite graphs with an even number of members, and show that except when k = 2, preference lists always exist under which a stable binary matching does not exist. We use a solution for the stable roommates problem to illustrate the matching identification process if one exists. Under a natural extension of pairwise stability for binary matching to k-ary matching, we show that stable k-ary matching exists for any preference lists in any complete and balanced k-partite graphs. Here, we assume that there is a strict preference order of the members over all individual members from different genders, as opposed to preference order over a combination of members from different genders used in existing multi-dimensional extensions. An extended Gale-Shapley algorithm is introduced, together with various implementations, to determine such a stable k-ary matching. A parallel implementation is also proposed to speed up the matching process. In the extension, we further propose a weakened unstable condition for k-ary matching and show the existence of stable k-ary matching.", "fno": "3682a480", "keywords": [ "Bipartite Graph", "Switched Mode Power Supply", "Stability Criteria", "Proposals", "Lead", "Distributed Processing", "Conferences", "Stable Roommates Problem", "Binary Matching", "Bipartite Graphs", "Equivalence Relation", "K Ary Matching", "K Partite Graphs", "Parallel Implementation", "Stable Marriage Problem" ], "authors": [ { "affiliation": null, "fullName": "Jie Wu", "givenName": "Jie", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ipdpsw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "480-488", "year": "2016", "issn": null, "isbn": "978-1-5090-3682-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3682a479", "articleId": "12OmNqJ8tww", "__typename": "AdjacentArticleType" }, "next": { "fno": "3682a489", "articleId": "12OmNylKATs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isise/2008/3494/2/3494b797", "title": "Dynamic Pareto Optimal Matching", "doi": null, "abstractUrl": "/proceedings-article/isise/2008/3494b797/12OmNBDQblF", "parentPublication": { "id": "proceedings/isise/2008/3494/2", "title": "2008 International Symposium on Information Science and Engineering (ISISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiki/2016/5952/0/5952a351", "title": "Content Replication Scheme Using Stable Matching in Vehicular Networks", "doi": null, "abstractUrl": "/proceedings-article/iiki/2016/5952a351/12OmNBa2izy", "parentPublication": { "id": "proceedings/iiki/2016/5952/0", "title": "2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2012/4655/0/4655a064", "title": "An Algorithm for Determining Critical Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a064/12OmNqzcvJt", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2012/4675/0/4675a860", "title": "Multithreaded Algorithms for Maximum Matching in Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2012/4675a860/12OmNvo67DD", "parentPublication": { "id": "proceedings/ipdps/2012/4675/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sfcs/1975/9999/0/04567865", "title": "An O (N2.5) algorithm for maximum matching in general graphs", "doi": null, "abstractUrl": "/proceedings-article/sfcs/1975/04567865/12OmNwdtw6V", "parentPublication": { "id": "proceedings/sfcs/1975/9999/0", "title": "16th Annual Symposium on Foundations of Computer Science (sfcs 1975)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a197", "title": "Maximum Matching in a Partially Matched Bipartite Graph and Its Applications", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a197/12OmNywxlTW", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2008/3136/0/3136a928", "title": "Bipartite Graph for Protein Structure Matching", "doi": null, "abstractUrl": "/proceedings-article/ams/2008/3136a928/12OmNzUgd7x", "parentPublication": { "id": "proceedings/ams/2008/3136/0", "title": "Asia International Conference on Modelling &amp; Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a133", "title": "Fractional Matching Preclusion for (Burnt) Pancake Graphs", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a133/17D45WLdYRr", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139795", "title": "NC Algorithms for Popular Matchings in One-Sided Preference Systems and Related Problems", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139795/1lss258smpq", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100a412", "title": "Edge-Weighted Online Bipartite Matching", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100a412/1qyxvL8VZcc", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBEGYFq", "title": "Asia International Conference on Modelling & Simulation", "acronym": "ams", "groupId": "1001723", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUgd7x", "doi": "10.1109/AMS.2008.89", "title": "Bipartite Graph for Protein Structure Matching", "normalizedTitle": "Bipartite Graph for Protein Structure Matching", "abstract": "Bipartite graph-based matching technique has a powerful ability to give a global and optimized matching result. At the same time, we can take the advantage of graph-based data representation used with the technique. Graph-based representation has the ability to encapsulate the attribute of the objects and also the relationship details among the elements of the compared objects. The combination of graph-based matching technique and graph-based data structure are best applied in protein tertiary structure matching because protein structure has rich information that needs to be handled with care. The main contribution of the paper is (1) to design bipartite graph matching for protein matching and also (2) to incorporate graph-based data structure called ‘reference frame’ originally used in computer vision into bipartite graph matching. The matching result is measured using exponential similarity function.", "abstracts": [ { "abstractType": "Regular", "content": "Bipartite graph-based matching technique has a powerful ability to give a global and optimized matching result. At the same time, we can take the advantage of graph-based data representation used with the technique. Graph-based representation has the ability to encapsulate the attribute of the objects and also the relationship details among the elements of the compared objects. The combination of graph-based matching technique and graph-based data structure are best applied in protein tertiary structure matching because protein structure has rich information that needs to be handled with care. The main contribution of the paper is (1) to design bipartite graph matching for protein matching and also (2) to incorporate graph-based data structure called ‘reference frame’ originally used in computer vision into bipartite graph matching. The matching result is measured using exponential similarity function.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Bipartite graph-based matching technique has a powerful ability to give a global and optimized matching result. At the same time, we can take the advantage of graph-based data representation used with the technique. Graph-based representation has the ability to encapsulate the attribute of the objects and also the relationship details among the elements of the compared objects. The combination of graph-based matching technique and graph-based data structure are best applied in protein tertiary structure matching because protein structure has rich information that needs to be handled with care. The main contribution of the paper is (1) to design bipartite graph matching for protein matching and also (2) to incorporate graph-based data structure called ‘reference frame’ originally used in computer vision into bipartite graph matching. The matching result is measured using exponential similarity function.", "fno": "3136a928", "keywords": [ "Bipartite Graph Matching", "Protein Structure Matching", "Reference Frame" ], "authors": [ { "affiliation": null, "fullName": "Fazilah Othman", "givenName": "Fazilah", "surname": "Othman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rosni Abdullah", "givenName": "Rosni", "surname": "Abdullah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rosalina Abdul Salam", "givenName": "Rosalina Abdul", "surname": "Salam", "__typename": "ArticleAuthorType" } ], "idPrefix": "ams", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-05-01T00:00:00", "pubType": "proceedings", "pages": "928-933", "year": "2008", "issn": null, "isbn": "978-0-7695-3136-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3136a923", "articleId": "12OmNwnH4SR", "__typename": "AdjacentArticleType" }, "next": { "fno": "3136b012", "articleId": "12OmNrkBwCC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2010/4109/0/4109c456", "title": "Cell Tracking in Video Microscopy Using Bipartite Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c456/12OmNAObbzn", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edtc/1995/7039/0/70390042", "title": "Exact scheduling strategies based on bipartite graph matching", "doi": null, "abstractUrl": "/proceedings-article/edtc/1995/70390042/12OmNASraB6", "parentPublication": { "id": "proceedings/edtc/1995/7039/0", "title": "European Design and Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit-csi/2015/9642/0/9642a282", "title": "Bipartite Matching Based Speculative Execution to Improve Cloud MapReduce Performance", "doi": null, "abstractUrl": "/proceedings-article/acit-csi/2015/9642a282/12OmNAXglKr", "parentPublication": { "id": "proceedings/acit-csi/2015/9642/0", "title": "2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence (ACIT-CSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2012/4655/0/4655a064", "title": "An Algorithm for Determining Critical Bipartite Graphs", "doi": null, "abstractUrl": "/proceedings-article/is3c/2012/4655a064/12OmNqzcvJt", "parentPublication": { "id": "proceedings/is3c/2012/4655/0", "title": "Computer, Consumer and Control, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccrd/2010/4043/0/4043a025", "title": "Parallel Bipartite Graph Algorithm for Protein Structure Matching Using OpenMP", "doi": null, "abstractUrl": "/proceedings-article/iccrd/2010/4043a025/12OmNx19jRn", "parentPublication": { "id": "proceedings/iccrd/2010/4043/0", "title": "Computer Research and Development, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2010/4158/0/4158a197", "title": "Maximum Matching in a Partially Matched Bipartite Graph and Its Applications", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2010/4158a197/12OmNywxlTW", "parentPublication": { "id": "proceedings/cicsyn/2010/4158/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2009/3816/4/3816d141", "title": "A Method of Fuzzy Reasoning Based on Semantic Similarity and Bipartite Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/aici/2009/3816d141/12OmNzC5T6t", "parentPublication": { "id": "proceedings/aici/2009/3816/4", "title": "2009 International Conference on Artificial Intelligence and Computational Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/05/ttb2011051330", "title": "SEGA: Semiglobal Graph Alignment for Structure-Based Protein Comparison", "doi": null, "abstractUrl": "/journal/tb/2011/05/ttb2011051330/13rRUyfKIG7", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b478", "title": "Adaptive Dynamic Bipartite Graph Matching: A Reinforcement Learning Approach", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b478/1aDT44qHZYY", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a146", "title": "Learning Bipartite Graph Matching for Robust Visual Localization", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a146/1pysy3NAjaU", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qyxsFaq4YU", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "acronym": "focs", "groupId": "1000292", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qyxxNFcOL6", "doi": "10.1109/FOCS46700.2020.00130", "title": "Fully Online Matching II: Beating Ranking and Water-filling", "normalizedTitle": "Fully Online Matching II: Beating Ranking and Water-filling", "abstract": "Karp, Vazirani, and Vazirani (STOC 1990) initiated the study of online bipartite matching, which has held a central role in online algorithms ever since. Of particular importance are the Ranking algorithm for integral matching and the Water-filling algorithm for fractional matching. Most algorithms in the literature can be viewed as adaptations of these two in the corresponding models. Recently, Huang et al. (SODA 2019, JACM 2020) introduced a more general model called fully online matching, which considers general graphs and allows all vertices to arrive online. They also generalized Ranking and Water-filling to fully online matching and gave some tight analysis: Ranking is &#x03A9; &#x2248; 0.567-competitive on bipartite graphs where the &#x03A9;-constant satisfies &#x03A9;e<sup>&#x03A9;</sup>=1, and Water-filling is 2-&#x221A;2 &#x2248; 0.585-competitive on general graphs. We propose fully online matching algorithms strictly better than Ranking and Water-filling. For integral matching on bipartite graphs, we build on the online primal dual analysis of Ranking and Water-filling to design a 0.569-competitive hybrid algorithm called Balanced Ranking. To our knowledge, it is the first integral algorithm in the online matching literature that successfully integrates ideas from Water-filling. For fractional matching on general graphs, we give a 0.592-competitive algorithm called Eager Water-filling, which may match a vertex on its arrival. By contrast, the original Water-filling algorithm always matches vertices at their deadlines. Our result for fractional matching further shows a separation between fully online matching and the general vertex arrival model by Wang and Wong (ICALP 2015), due to an upper bound of 0.5914 in the latter model by Buchbinder, Segev, and Tkach (ESA 2017).", "abstracts": [ { "abstractType": "Regular", "content": "Karp, Vazirani, and Vazirani (STOC 1990) initiated the study of online bipartite matching, which has held a central role in online algorithms ever since. Of particular importance are the Ranking algorithm for integral matching and the Water-filling algorithm for fractional matching. Most algorithms in the literature can be viewed as adaptations of these two in the corresponding models. Recently, Huang et al. (SODA 2019, JACM 2020) introduced a more general model called fully online matching, which considers general graphs and allows all vertices to arrive online. They also generalized Ranking and Water-filling to fully online matching and gave some tight analysis: Ranking is &#x03A9; &#x2248; 0.567-competitive on bipartite graphs where the &#x03A9;-constant satisfies &#x03A9;e<sup>&#x03A9;</sup>=1, and Water-filling is 2-&#x221A;2 &#x2248; 0.585-competitive on general graphs. We propose fully online matching algorithms strictly better than Ranking and Water-filling. For integral matching on bipartite graphs, we build on the online primal dual analysis of Ranking and Water-filling to design a 0.569-competitive hybrid algorithm called Balanced Ranking. To our knowledge, it is the first integral algorithm in the online matching literature that successfully integrates ideas from Water-filling. For fractional matching on general graphs, we give a 0.592-competitive algorithm called Eager Water-filling, which may match a vertex on its arrival. By contrast, the original Water-filling algorithm always matches vertices at their deadlines. Our result for fractional matching further shows a separation between fully online matching and the general vertex arrival model by Wang and Wong (ICALP 2015), due to an upper bound of 0.5914 in the latter model by Buchbinder, Segev, and Tkach (ESA 2017).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Karp, Vazirani, and Vazirani (STOC 1990) initiated the study of online bipartite matching, which has held a central role in online algorithms ever since. Of particular importance are the Ranking algorithm for integral matching and the Water-filling algorithm for fractional matching. Most algorithms in the literature can be viewed as adaptations of these two in the corresponding models. Recently, Huang et al. (SODA 2019, JACM 2020) introduced a more general model called fully online matching, which considers general graphs and allows all vertices to arrive online. They also generalized Ranking and Water-filling to fully online matching and gave some tight analysis: Ranking is Ω ≈ 0.567-competitive on bipartite graphs where the Ω-constant satisfies ΩeΩ=1, and Water-filling is 2-√2 ≈ 0.585-competitive on general graphs. We propose fully online matching algorithms strictly better than Ranking and Water-filling. For integral matching on bipartite graphs, we build on the online primal dual analysis of Ranking and Water-filling to design a 0.569-competitive hybrid algorithm called Balanced Ranking. To our knowledge, it is the first integral algorithm in the online matching literature that successfully integrates ideas from Water-filling. For fractional matching on general graphs, we give a 0.592-competitive algorithm called Eager Water-filling, which may match a vertex on its arrival. By contrast, the original Water-filling algorithm always matches vertices at their deadlines. Our result for fractional matching further shows a separation between fully online matching and the general vertex arrival model by Wang and Wong (ICALP 2015), due to an upper bound of 0.5914 in the latter model by Buchbinder, Segev, and Tkach (ESA 2017).", "fno": "962100b380", "keywords": [ "Competitive Algorithms", "Computational Complexity", "Graph Theory", "Integral Equations", "Online Bipartite Matching", "Online Algorithms", "Integral Matching", "Fractional Matching", "Fully Online Matching", "Bipartite Graphs", "Online Primal Dual Analysis", "Integral Algorithm", "Competitive Algorithm", "General Vertex Arrival Model", "Competitive Hybrid Algorithm", "Eager Water Filling", "Balanced Ranking", "Bipartite Graph", "Adaptation Models", "Advertising", "Upper Bound", "Differential Equations", "Biological System Modeling", "Stochastic Processes", "Online Matching", "Ranking", "Water Filling" ], "authors": [ { "affiliation": "The University of Hong Kong", "fullName": "Zhiyi Huang", "givenName": "Zhiyi", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai University of Finance and Economics", "fullName": "Zhihao Gavin Tang", "givenName": "Zhihao Gavin", "surname": "Tang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Macau", "fullName": "Xiaowei Wu", "givenName": "Xiaowei", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Hong Kong", "fullName": "Yuhao Zhang", "givenName": "Yuhao", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "focs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "1380-1391", "year": "2020", "issn": null, "isbn": "978-1-7281-9621-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "962100b368", "articleId": "1qyxuKr0eAw", "__typename": "AdjacentArticleType" }, "next": { "fno": "962100b392", "articleId": "1qyxx54LoYM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pccc/2005/8991/0/01460638", "title": "Simplifying the power allocation for OFDM-MIMO: a partial curve fitting approach", "doi": null, "abstractUrl": "/proceedings-article/pccc/2005/01460638/12OmNApcuwS", "parentPublication": { "id": "proceedings/pccc/2005/8991/0", "title": "Conference Proceedings of the 2005 IEEE International Performance, Computing and Communications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2009/5116/0/05438641", "title": "Online Stochastic Matching: Beating 1-1/e", "doi": null, "abstractUrl": "/proceedings-article/focs/2009/05438641/12OmNrJiCYE", "parentPublication": { "id": "proceedings/focs/2009/5116/0", "title": "2009 50th Annual IEEE Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2012/4675/0/4675b295", "title": "A Lower Bound on Proximity Preservation by Space Filling Curves", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2012/4675b295/12OmNrkT7LE", "parentPublication": { "id": "proceedings/ipdps/2012/4675/0", "title": "Parallel and Distributed Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iacc/2017/1560/0/07976864", "title": "The Fastest Possible Solution to the Weighted Water-Filling Problems", "doi": null, "abstractUrl": "/proceedings-article/iacc/2017/07976864/12OmNyY4rtb", "parentPublication": { "id": "proceedings/iacc/2017/1560/0", "title": "2017 IEEE 7th International Advance Computing Conference (IACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/nt/2016/03/07150433", "title": "Online Load Balancing Under Graph Constraints", "doi": null, "abstractUrl": "/journal/nt/2016/03/07150433/13rRUxlgxQA", "parentPublication": { "id": "trans/nt", "title": "IEEE/ACM Transactions on Networking", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a386", "title": "MF-Join: Efficient Fuzzy String Similarity Join with Multi-level Filtering", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a386/1aDT1W94bEQ", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2019/4952/0/495200a038", "title": "Polylogarithmic Guarantees for Generalized Reordering Buffer Management", "doi": null, "abstractUrl": "/proceedings-article/focs/2019/495200a038/1grNDp1VYzK", "parentPublication": { "id": "proceedings/focs/2019/4952/0", "title": "2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2019/4952/0/495200a026", "title": "Online Matching with General Arrivals", "doi": null, "abstractUrl": "/proceedings-article/focs/2019/495200a026/1grNEXYNGZW", "parentPublication": { "id": "proceedings/focs/2019/4952/0", "title": "2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100b416", "title": "AdWords in a Panorama", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100b416/1qyxumdZoLm", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2020/9621/0/962100a412", "title": "Edge-Weighted Online Bipartite Matching", "doi": null, "abstractUrl": "/proceedings-article/focs/2020/962100a412/1qyxvL8VZcc", "parentPublication": { "id": "proceedings/focs/2020/9621/0", "title": "2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxcMSdH", "title": "1992 Proceedings Computer Systems and Software Engineering", "acronym": "cmpeur", "groupId": "1000110", "volume": "0", "displayVolume": "0", "year": "1992", "__typename": "ProceedingType" }, "article": { "id": "12OmNBpVPUW", "doi": "10.1109/CMPEUR.1992.218426", "title": "Exploiting the data parallelism of subset equational languages", "normalizedTitle": "Exploiting the data parallelism of subset equational languages", "abstract": "The authors propose an alternative approach to the parallel implementation of declarative languages, the data parallel approach. The focus is on large collections of data and the core idea is to parallelize the execution of elementwise operations. The target language is SEL, a subset equational language. An abstract machine for the language, the SAM (subset abstract machine) is outlined, which from a certain point of view belongs to the WAM family. The data parallel structure of the SAM and of its instruction set is discussed, and some examples are given.<>", "abstracts": [ { "abstractType": "Regular", "content": "The authors propose an alternative approach to the parallel implementation of declarative languages, the data parallel approach. The focus is on large collections of data and the core idea is to parallelize the execution of elementwise operations. The target language is SEL, a subset equational language. An abstract machine for the language, the SAM (subset abstract machine) is outlined, which from a certain point of view belongs to the WAM family. The data parallel structure of the SAM and of its instruction set is discussed, and some examples are given.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The authors propose an alternative approach to the parallel implementation of declarative languages, the data parallel approach. The focus is on large collections of data and the core idea is to parallelize the execution of elementwise operations. The target language is SEL, a subset equational language. An abstract machine for the language, the SAM (subset abstract machine) is outlined, which from a certain point of view belongs to the WAM family. The data parallel structure of the SAM and of its instruction set is discussed, and some examples are given.", "fno": "00218426", "keywords": [ "Data Structures", "Instruction Sets", "Parallel Languages", "Parallel Programming", "Program Compilers", "Declarative Languages", "Data Parallel Approach", "SEL", "Subset Equational Language", "SAM", "Subset Abstract Machine", "WAM", "Instruction Set", "Equations", "Large Hadron Collider", "Joining Processes", "Process Design" ], "authors": [ { "affiliation": "DIST, Genova Univ., Italy", "fullName": "G. Succi", "givenName": "G.", "surname": "Succi", "__typename": "ArticleAuthorType" }, { "affiliation": "DIST, Genova Univ., Italy", "fullName": "G.A. Marino", "givenName": "G.A.", "surname": "Marino", "__typename": "ArticleAuthorType" } ], "idPrefix": "cmpeur", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1992-01-01T00:00:00", "pubType": "proceedings", "pages": "538,539,540,541,542,543", "year": "1992", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00218425", "articleId": "12OmNyshmIl", "__typename": "AdjacentArticleType" }, "next": { "fno": "00218427", "articleId": "12OmNzlUKBb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccl/1990/2036/0/00063783", "title": "Parallelism in object-oriented programming languages", "doi": null, "abstractUrl": "/proceedings-article/iccl/1990/00063783/12OmNvq5jzf", "parentPublication": { "id": "proceedings/iccl/1990/2036/0", "title": "Proceedings. 1990 International Conference on Computer Languages", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvd/1991/2125/0/00185131", "title": "A neural network for channel routing", "doi": null, "abstractUrl": "/proceedings-article/isvd/1991/00185131/12OmNwJPMZc", "parentPublication": { "id": "proceedings/isvd/1991/2125/0", "title": "Proceedings. Fourth CSI/IEEE International Symposium on VLSI Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139495", "title": "Accurate corner detection: an analytical study", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139495/12OmNxwWoI8", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/emwrt/1989/1956/0/00043461", "title": "Real-time reconfiguration of two-dimensional VLSI arrays", "doi": null, "abstractUrl": "/proceedings-article/emwrt/1989/00043461/12OmNxwWoLN", "parentPublication": { "id": "proceedings/emwrt/1989/1956/0", "title": "Proceedings EUROMICRO Workshop on Real Time", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/frontiers/1995/6965/0/69650203", "title": "An object-oriented approach to nested data parallelism", "doi": null, "abstractUrl": "/proceedings-article/frontiers/1995/69650203/12OmNyYDDy6", "parentPublication": { "id": "proceedings/frontiers/1995/6965/0", "title": "Frontiers of Massively Parallel Processing, Symposium on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2013/5096/0/5096b271", "title": "Using MapReduce for High Energy Physics Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/cse/2013/5096b271/12OmNyeWdKw", "parentPublication": { "id": "proceedings/cse/2013/5096/0", "title": "2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmpc/1990/2053/0/00089463", "title": "Parallel relational operations based on clustered surrogate files", "doi": null, "abstractUrl": "/proceedings-article/fmpc/1990/00089463/12OmNyqRng2", "parentPublication": { "id": "proceedings/fmpc/1990/2053/0", "title": "Third Symposium on the Frontiers of Massively Parallel Computation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2018/4975/0/497501a651", "title": "Storage for Advanced Scientific Use-Cases and Beyond", "doi": null, "abstractUrl": "/proceedings-article/pdp/2018/497501a651/12OmNzTYBWy", "parentPublication": { "id": "proceedings/pdp/2018/4975/0", "title": "2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2018/9156/0/915600a339", "title": "Implementation of the ATLAS Trigger Within the ATLAS Multi-threaded Software Framework AthenaMT", "doi": null, "abstractUrl": "/proceedings-article/e-science/2018/915600a339/17D45Wuc39L", "parentPublication": { "id": "proceedings/e-science/2018/9156/0", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1993/4340/0/01263424", "title": "A parallel adaptive fast multipole method", "doi": null, "abstractUrl": "/proceedings-article/sc/1993/01263424/1D85AMy1hSg", "parentPublication": { "id": "proceedings/sc/1993/4340/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }