data
dict |
|---|
{
"proceeding": {
"id": "12OmNzWfp8t",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"acronym": "iciev-iscmht",
"groupId": "1802578",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzA6GHa",
"doi": "10.1109/ICIEV.2017.8338517",
"title": "Development of a capacitive force sensor for artificial joint",
"normalizedTitle": "Development of a capacitive force sensor for artificial joint",
"abstract": "Soft tissue tension is thought to have a great effect on the clinical performance of total joint replacement; such as shoulder, hip, knee, or ankle. However, there have been no reports quantifying these soft tissue tensions intraoperatively. For the shoulder, reverse total shoulder arthroplasty has been used in Japan since 2014. So the purpose of this study is to develop an instrument which tells us soft tissue tension intraoperatively. Surgeons would be able to utilize the measured values when assessing stability of the joint intraoperatively. We are developing the instrument using capacitive one-dimensional force sensors to measure the soft tissue tension for reverse shoulder arthroplasty. A capacitive one-dimensional force sensor can be made less than 1mm in thickness. And an electric circuit which measures its amount of capacitances also could be made pretty small. That's because we use capacitive force sensors for measuring the soft tissue tension. The whole instruments have to be sufficiently small enough such that its outer geometry could be same to an existing prosthesis. While a capacitive force sensor is good in its dimensions, however, it is very sensitive to noise. We try to improve signal noise ratio having whole dimensions small enough. Now, we have designed a 5mm diameter capacitive one-dimensional force sensor to operate in the 0–150N force range. This direction hopefully would be one of the promising ways for good clinical outcomes of joint replacement.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Soft tissue tension is thought to have a great effect on the clinical performance of total joint replacement; such as shoulder, hip, knee, or ankle. However, there have been no reports quantifying these soft tissue tensions intraoperatively. For the shoulder, reverse total shoulder arthroplasty has been used in Japan since 2014. So the purpose of this study is to develop an instrument which tells us soft tissue tension intraoperatively. Surgeons would be able to utilize the measured values when assessing stability of the joint intraoperatively. We are developing the instrument using capacitive one-dimensional force sensors to measure the soft tissue tension for reverse shoulder arthroplasty. A capacitive one-dimensional force sensor can be made less than 1mm in thickness. And an electric circuit which measures its amount of capacitances also could be made pretty small. That's because we use capacitive force sensors for measuring the soft tissue tension. The whole instruments have to be sufficiently small enough such that its outer geometry could be same to an existing prosthesis. While a capacitive force sensor is good in its dimensions, however, it is very sensitive to noise. We try to improve signal noise ratio having whole dimensions small enough. Now, we have designed a 5mm diameter capacitive one-dimensional force sensor to operate in the 0–150N force range. This direction hopefully would be one of the promising ways for good clinical outcomes of joint replacement.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Soft tissue tension is thought to have a great effect on the clinical performance of total joint replacement; such as shoulder, hip, knee, or ankle. However, there have been no reports quantifying these soft tissue tensions intraoperatively. For the shoulder, reverse total shoulder arthroplasty has been used in Japan since 2014. So the purpose of this study is to develop an instrument which tells us soft tissue tension intraoperatively. Surgeons would be able to utilize the measured values when assessing stability of the joint intraoperatively. We are developing the instrument using capacitive one-dimensional force sensors to measure the soft tissue tension for reverse shoulder arthroplasty. A capacitive one-dimensional force sensor can be made less than 1mm in thickness. And an electric circuit which measures its amount of capacitances also could be made pretty small. That's because we use capacitive force sensors for measuring the soft tissue tension. The whole instruments have to be sufficiently small enough such that its outer geometry could be same to an existing prosthesis. While a capacitive force sensor is good in its dimensions, however, it is very sensitive to noise. We try to improve signal noise ratio having whole dimensions small enough. Now, we have designed a 5mm diameter capacitive one-dimensional force sensor to operate in the 0–150N force range. This direction hopefully would be one of the promising ways for good clinical outcomes of joint replacement.",
"fno": "08338517",
"keywords": [
"Force Sensors",
"Biological Tissues",
"Shoulder",
"Instruments",
"Force Measurement",
"Informatics",
"Mechanical Engineering"
],
"authors": [
{
"affiliation": "Mechanical Engineering, University of Hyogo, Japan",
"fullName": "Yusuke Hirai",
"givenName": "Yusuke",
"surname": "Hirai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mechanical Engineering, University of Hyogo, Japan",
"fullName": "Takahiro Manabe",
"givenName": "Takahiro",
"surname": "Manabe",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mechanical Engineering, University of Hyogo, Japan",
"fullName": "Naoya Nakabayashi",
"givenName": "Naoya",
"surname": "Nakabayashi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mechanical Engineering, University of Hyogo, Japan",
"fullName": "Masaru Higa",
"givenName": "Masaru",
"surname": "Higa",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciev-iscmht",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-09-01T00:00:00",
"pubType": "proceedings",
"pages": "1-1",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-1023-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08338516",
"articleId": "12OmNBkxsxe",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08338518",
"articleId": "12OmNAY79pf",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/medivis/2006/2603/0/01691273",
"title": "Shoulder Arthroscopy Training System with Force Feedback",
"doi": null,
"abstractUrl": "/proceedings-article/medivis/2006/01691273/12OmNviZlrJ",
"parentPublication": {
"id": "proceedings/medivis/2006/2603/0",
"title": "International Conference on Medical Information Visualisation - BioMedical Visualisation (MedVis'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338541",
"title": "How is biomechanical knowledge useful for understanding shoulder disorders?",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338541/12OmNyfdOOR",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338515",
"title": "Estimation of shoulder muscle-force during arm abduction in the simulated rotator cuff repair",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338515/12OmNzcPAs4",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/memsys/1997/3744/0/00581828",
"title": "Touch mode capacitive pressure sensors for industrial applications",
"doi": null,
"abstractUrl": "/proceedings-article/memsys/1997/00581828/12OmNzd7c1H",
"parentPublication": {
"id": "proceedings/memsys/1997/3744/0",
"title": "Proceedings IEEE The Tenth Annual International Workshop on Micro Electro Mechanical Systems. An Investigation of Micro Structures, Sensors, Actuators, Machines and Robots",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338540",
"title": "Analysis of throwing motion",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338540/12OmNzuIjkp",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-iscmht/2017/1023/0/08338514",
"title": "MRI-based 3D-shape model improves diagnosis of rotator cuff tear",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338514/12OmNzvhvw7",
"parentPublication": {
"id": "proceedings/iciev-iscmht/2017/1023/0",
"title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2017/02/07589098",
"title": "The Role of Direct and Visual Force Feedback in Suturing Using a 7-DOF Dual-Arm Teleoperated System",
"doi": null,
"abstractUrl": "/journal/th/2017/02/07589098/13rRUNvgyWx",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2013/02/tth2013020217",
"title": "Integration of Force Reflection with Tactile Sensing for Minimally Invasive Robotics-Assisted Tumor Localization",
"doi": null,
"abstractUrl": "/journal/th/2013/02/tth2013020217/13rRUy0qnGs",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2013/03/tth2013030309",
"title": "Human Force Discrimination during Active Arm Motion for Force Feedback Design",
"doi": null,
"abstractUrl": "/journal/th/2013/03/tth2013030309/13rRUygT7yj",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitbs/2020/6698/0/669800a215",
"title": "Study on Calculation of Construction Cable Force of Cable-Stayed Bridge Based on Unstressed State Method",
"doi": null,
"abstractUrl": "/proceedings-article/icitbs/2020/669800a215/1kuI0hoAJFu",
"parentPublication": {
"id": "proceedings/icitbs/2020/6698/0",
"title": "2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1B2HjhKQREs",
"title": "2021 International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)",
"acronym": "iceitsa",
"groupId": "1845684",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1B2HpcUZC6s",
"doi": "10.1109/ICEITSA54226.2021.00040",
"title": "Prediction Model of Target Movement in Soft Tissue Under Needle Puncture",
"normalizedTitle": "Prediction Model of Target Movement in Soft Tissue Under Needle Puncture",
"abstract": "In the process of needle puncture, there is a problem of puncture deviation caused by target movement in soft tissue. To solve this problem, a target motion prediction model in soft tissue is proposed based on the finite element method of continuum mechanics, a target motion prediction model in soft tissue is proposed. Build the needle puncture experimental platform, collect the ultrasonic image inside the needle puncture soft tissue, after morphological processing, extract the target centroid coordinates at different times, iteratively solve the elastic coefficient of the model, and establish the target motion prediction model. The evaluation experiment shows that the absolute error of the model is controlled within 0.7mm when predicting the target motion in the horizontal X-axis direction. When predicting the target motion. in the vertical Y-axis direction, the absolute error is controlled within 0.06 mm. Compared with the mass spring model, the prediction accuracy is improved, and the prediction curve basically reflects the target motion law, which shows that the model based on the finite element method of continuum mechanics is feasible in predicting the target motion.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the process of needle puncture, there is a problem of puncture deviation caused by target movement in soft tissue. To solve this problem, a target motion prediction model in soft tissue is proposed based on the finite element method of continuum mechanics, a target motion prediction model in soft tissue is proposed. Build the needle puncture experimental platform, collect the ultrasonic image inside the needle puncture soft tissue, after morphological processing, extract the target centroid coordinates at different times, iteratively solve the elastic coefficient of the model, and establish the target motion prediction model. The evaluation experiment shows that the absolute error of the model is controlled within 0.7mm when predicting the target motion in the horizontal X-axis direction. When predicting the target motion. in the vertical Y-axis direction, the absolute error is controlled within 0.06 mm. Compared with the mass spring model, the prediction accuracy is improved, and the prediction curve basically reflects the target motion law, which shows that the model based on the finite element method of continuum mechanics is feasible in predicting the target motion.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the process of needle puncture, there is a problem of puncture deviation caused by target movement in soft tissue. To solve this problem, a target motion prediction model in soft tissue is proposed based on the finite element method of continuum mechanics, a target motion prediction model in soft tissue is proposed. Build the needle puncture experimental platform, collect the ultrasonic image inside the needle puncture soft tissue, after morphological processing, extract the target centroid coordinates at different times, iteratively solve the elastic coefficient of the model, and establish the target motion prediction model. The evaluation experiment shows that the absolute error of the model is controlled within 0.7mm when predicting the target motion in the horizontal X-axis direction. When predicting the target motion. in the vertical Y-axis direction, the absolute error is controlled within 0.06 mm. Compared with the mass spring model, the prediction accuracy is improved, and the prediction curve basically reflects the target motion law, which shows that the model based on the finite element method of continuum mechanics is feasible in predicting the target motion.",
"fno": "130000a166",
"keywords": [
"Biological Tissues",
"Biomedical Ultrasonics",
"Continuum Mechanics",
"Elasticity",
"Finite Element Analysis",
"Image Motion Analysis",
"Medical Image Processing",
"Needles",
"Physiological Models",
"Springs Mechanical",
"Surgery",
"Target Motion Prediction Model",
"Target Motion Law",
"Finite Element Method",
"Target Movement",
"Puncture Deviation",
"Needle Puncture Experimental Platform",
"Needle Puncture Soft Tissue",
"Target Centroid",
"Vertical Y Axis Direction",
"Morphological Processing",
"Size 0 7 Mm",
"Size 0 06 Mm",
"Training",
"Medical Robotics",
"Error Analysis",
"Biological Tissues",
"Predictive Models",
"Needles",
"Stability Analysis",
"Needle Puncture",
"Ultrasound Guidance",
"Target Motion",
"Prediction Model",
"Ultrasonic Image"
],
"authors": [
{
"affiliation": "School of Computer Science and Engineering, Huaihua University,Huaihua,China",
"fullName": "Hongbo Xiao",
"givenName": "Hongbo",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science and Engineering, Huaihua University,Huaihua,China",
"fullName": "Jianhua Xiao",
"givenName": "Jianhua",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science and Engineering, Huaihua University,Huaihua,China",
"fullName": "Liyun Li",
"givenName": "Liyun",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science and Engineering, Huaihua University,Huaihua,China",
"fullName": "Liping Su",
"givenName": "Liping",
"surname": "Su",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iceitsa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-12-01T00:00:00",
"pubType": "proceedings",
"pages": "166-172",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1300-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "130000a159",
"articleId": "1B2HtuuroeQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "130000a173",
"articleId": "1B2Hr66cKjK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/1997/8076/0/80760010",
"title": "Multi-modal surface/outline projection and simulation of target/critical tissue movement",
"doi": null,
"abstractUrl": "/proceedings-article/iv/1997/80760010/12OmNBoNrsh",
"parentPublication": {
"id": "proceedings/iv/1997/8076/0",
"title": "Proceedings. 1997 IEEE Conference on Information Visualization (Cat. No.97TB100165)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2015/1727/0/07223388",
"title": "Preliminary evaluation of a virtual needle insertion training system",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2015/07223388/12OmNCdk2Jm",
"parentPublication": {
"id": "proceedings/vr/2015/1727/0",
"title": "2015 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2013/1309/0/06732698",
"title": "Investigation on the feasibility of selecting soft tissue elasticity as the objective evaluating indicator of the neck type of cervical spondylosis",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2013/06732698/12OmNxGAKR5",
"parentPublication": {
"id": "proceedings/bibm/2013/1309/0",
"title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/haptics/2008/2005/0/04479920",
"title": "Assessment of Vibrotactile Feedback in a Needle-Insertion Task using a Surgical Robot",
"doi": null,
"abstractUrl": "/proceedings-article/haptics/2008/04479920/12OmNyOq4T4",
"parentPublication": {
"id": "proceedings/haptics/2008/2005/0",
"title": "IEEE Haptics Symposium 2008",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/haptics/2010/6821/0/05444612",
"title": "Haptic system design for MRI-guided needle based prostate brachytherapy",
"doi": null,
"abstractUrl": "/proceedings-article/haptics/2010/05444612/12OmNyQYttN",
"parentPublication": {
"id": "proceedings/haptics/2010/6821/0",
"title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/case/2012/0430/0/06386483",
"title": "Initial experiments toward automated robotic implantation of skew-line needle arrangements for HDR brachytherapy",
"doi": null,
"abstractUrl": "/proceedings-article/case/2012/06386483/12OmNzy7uQS",
"parentPublication": {
"id": "proceedings/case/2012/0430/0",
"title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2011/03/tth2011030188",
"title": "Haptic Simulator for Prostate Brachytherapy with Simulated Needle and Probe Interaction",
"doi": null,
"abstractUrl": "/journal/th/2011/03/tth2011030188/13rRUILtJr3",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2014/04/06909076",
"title": "Teleoperation of Steerable Flexible Needles by Combining Kinesthetic and Vibratory Feedback",
"doi": null,
"abstractUrl": "/journal/th/2014/04/06909076/13rRUxASuhN",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/th/2011/03/tth2011030155",
"title": "Perception and Action in Teleoperated Needle Insertion",
"doi": null,
"abstractUrl": "/journal/th/2011/03/tth2011030155/13rRUyoPSPf",
"parentPublication": {
"id": "trans/th",
"title": "IEEE Transactions on Haptics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2022/6819/0/09995143",
"title": "OCT-guided Robotic Subretinal Needle Injections: A Deep Learning-Based Registration Approach",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2022/09995143/1JC3h3JCZ8s",
"parentPublication": {
"id": "proceedings/bibm/2022/6819/0",
"title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1yeHGyRsuys",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1yeMkzSzpIc",
"doi": "10.1109/CVPR46437.2021.00152",
"title": "ContactOpt: Optimizing Contact to Improve Grasps",
"normalizedTitle": "ContactOpt: Optimizing Contact to Improve Grasps",
"abstract": "Physical contact between hands and objects plays a critical role in human grasps. We show that optimizing the pose of a hand to achieve expected contact with an object can improve hand poses inferred via image-based methods. Given a hand mesh and an object mesh, a deep model trained on ground truth contact data infers desirable contact across the surfaces of the meshes. Then, ContactOpt efficiently optimizes the pose of the hand to achieve desirable contact using a differentiable contact model. Notably, our contact model encourages mesh interpenetration to approximate deformable soft tissue in the hand. In our evaluations, our methods result in grasps that better match ground truth contact, have lower kinematic error, and are significantly preferred by human participants. Code and models are available online<sup>1</sup>.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Physical contact between hands and objects plays a critical role in human grasps. We show that optimizing the pose of a hand to achieve expected contact with an object can improve hand poses inferred via image-based methods. Given a hand mesh and an object mesh, a deep model trained on ground truth contact data infers desirable contact across the surfaces of the meshes. Then, ContactOpt efficiently optimizes the pose of the hand to achieve desirable contact using a differentiable contact model. Notably, our contact model encourages mesh interpenetration to approximate deformable soft tissue in the hand. In our evaluations, our methods result in grasps that better match ground truth contact, have lower kinematic error, and are significantly preferred by human participants. Code and models are available online<sup>1</sup>.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Physical contact between hands and objects plays a critical role in human grasps. We show that optimizing the pose of a hand to achieve expected contact with an object can improve hand poses inferred via image-based methods. Given a hand mesh and an object mesh, a deep model trained on ground truth contact data infers desirable contact across the surfaces of the meshes. Then, ContactOpt efficiently optimizes the pose of the hand to achieve desirable contact using a differentiable contact model. Notably, our contact model encourages mesh interpenetration to approximate deformable soft tissue in the hand. In our evaluations, our methods result in grasps that better match ground truth contact, have lower kinematic error, and are significantly preferred by human participants. Code and models are available online1.",
"fno": "450900b471",
"keywords": [
"Biological Tissues",
"Optimisation",
"Pose Estimation",
"Contact Opt",
"Contact Optimization",
"Physical Contact",
"Human Grasps",
"Hand Poses",
"Image Based Methods",
"Hand Mesh",
"Object Mesh",
"Deep Model",
"Differentiable Contact Model",
"Mesh Interpenetration",
"Soft Tissue",
"Kinematic Error",
"Deformable Models",
"Computer Vision",
"Codes",
"Pose Estimation",
"Biological Tissues",
"Kinematics",
"Data Models"
],
"authors": [
{
"affiliation": "Georgia Institute of Technology",
"fullName": "Patrick Grady",
"givenName": "Patrick",
"surname": "Grady",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Facebook Reality Labs Research",
"fullName": "Chengcheng Tang",
"givenName": "Chengcheng",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Facebook Reality Labs Research",
"fullName": "Christopher D. Twigg",
"givenName": "Christopher D.",
"surname": "Twigg",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Facebook Reality Labs Research",
"fullName": "Minh Vo",
"givenName": "Minh",
"surname": "Vo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Intel Labs",
"fullName": "Samarth Brahmbhatt",
"givenName": "Samarth",
"surname": "Brahmbhatt",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Georgia Institute of Technology",
"fullName": "Charles C. Kemp",
"givenName": "Charles C.",
"surname": "Kemp",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1471-1481",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4509-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1yeMkwfbUqY",
"name": "pcvpr202145090-09578455s1-mm_450900b471.zip",
"size": "2.14 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578455s1-mm_450900b471.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "450900b460",
"articleId": "1yeL1bUOuhq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "450900b482",
"articleId": "1yeM9R03cSQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/crv/2015/1986/0/1986a245",
"title": "On Visual Servoing to Improve Performance of Robotic Grasping",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2015/1986a245/12OmNBr4eEd",
"parentPublication": {
"id": "proceedings/crv/2015/1986/0",
"title": "2015 12th Conference on Computer and Robot Vision (CRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/superc/2003/695/0/01592959",
"title": "Multi-Constraint Mesh Partitioning for Contact/Impact Computations",
"doi": null,
"abstractUrl": "/proceedings-article/superc/2003/01592959/12OmNqzu6JF",
"parentPublication": {
"id": "proceedings/superc/2003/695/0",
"title": "ACM/IEEE SC 2003 Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/robot/1991/2163/0/00131614",
"title": "On computing two-finger force-closure grasps of curved 2D objects",
"doi": null,
"abstractUrl": "/proceedings-article/robot/1991/00131614/12OmNwF0C1T",
"parentPublication": {
"id": "proceedings/robot/1991/2163/0",
"title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isatp/1995/6995/0/69950073",
"title": "Selection of hand configurations for power grasps",
"doi": null,
"abstractUrl": "/proceedings-article/isatp/1995/69950073/12OmNy3Agqk",
"parentPublication": {
"id": "proceedings/isatp/1995/6995/0",
"title": "Assembly and Task Planning, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/03/v0518",
"title": "Efficient Collision Detection within Deforming Spherical Sliding Contact",
"doi": null,
"abstractUrl": "/journal/tg/2007/03/v0518/13rRUwgyOje",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200l1077",
"title": "CPF: Learning a Contact Potential Field to Model the Hand-Object Interaction",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200l1077/1BmF0nZi9ck",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200l1087",
"title": "Hand-Object Contact Consistency Reasoning for Human Grasps Generation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200l1087/1BmH3PjdfWg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2003/2113/0/01592959",
"title": "Multi-Constraint Mesh Partitioning for Contact/Impact Computations",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2003/01592959/1MEX3gVQmac",
"parentPublication": {
"id": "proceedings/sc/2003/2113/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300i701",
"title": "ContactDB: Analyzing and Predicting Grasp Contact via Thermal Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300i701/1gyri9Qw7jG",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2020/8128/0/812800a333",
"title": "Grasping Field: Learning Implicit Representations for Human Grasps",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2020/812800a333/1qyxpobO5cA",
"parentPublication": {
"id": "proceedings/3dv/2020/8128/0",
"title": "2020 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNylsZKi",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "1998",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCbU2XH",
"doi": "10.1109/VISUAL.1998.745295",
"title": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"normalizedTitle": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"abstract": "The success of using streamline technique for visualizing a vector field usually depends largely on the choice of adequate seed points. Turk and Banks developed an elegant technique for automatically placing seed points to achieve a uniform distribution of streamlines on a 2D vector field. Their method uses an energy function calculated from the low-pass filtered streamline image to guide the optimization process of the streamline distribution. This paper proposes a new technique for creating evenly distributed streamlines on 3D parametric surfaces found in curvilinear grids. We make use of Turk and Banks's 2D algorithm by first mapping the vectors on a 3D surface into the computational space of the curvilinear grid. To take into the consideration the mapping distortion caused by the uneven grid density in a curvilinear grid, a new energy function is designed and used for guiding the placement of streamlines in the computational space with desired local densities.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The success of using streamline technique for visualizing a vector field usually depends largely on the choice of adequate seed points. Turk and Banks developed an elegant technique for automatically placing seed points to achieve a uniform distribution of streamlines on a 2D vector field. Their method uses an energy function calculated from the low-pass filtered streamline image to guide the optimization process of the streamline distribution. This paper proposes a new technique for creating evenly distributed streamlines on 3D parametric surfaces found in curvilinear grids. We make use of Turk and Banks's 2D algorithm by first mapping the vectors on a 3D surface into the computational space of the curvilinear grid. To take into the consideration the mapping distortion caused by the uneven grid density in a curvilinear grid, a new energy function is designed and used for guiding the placement of streamlines in the computational space with desired local densities.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The success of using streamline technique for visualizing a vector field usually depends largely on the choice of adequate seed points. Turk and Banks developed an elegant technique for automatically placing seed points to achieve a uniform distribution of streamlines on a 2D vector field. Their method uses an energy function calculated from the low-pass filtered streamline image to guide the optimization process of the streamline distribution. This paper proposes a new technique for creating evenly distributed streamlines on 3D parametric surfaces found in curvilinear grids. We make use of Turk and Banks's 2D algorithm by first mapping the vectors on a 3D surface into the computational space of the curvilinear grid. To take into the consideration the mapping distortion caused by the uneven grid density in a curvilinear grid, a new energy function is designed and used for guiding the placement of streamlines in the computational space with desired local densities.",
"fno": "91760135",
"keywords": [
"Vector Field Visualization",
"Flow Visualization",
"Streamline",
"Curvilinear Grid"
],
"authors": [
{
"affiliation": "Yamanashi University",
"fullName": "Xiaoyang Mao",
"givenName": "Xiaoyang",
"surname": "Mao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yamanashi University",
"fullName": "Yuji Hatanaka",
"givenName": "Yuji",
"surname": "Hatanaka",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yamanashi University",
"fullName": "Hidenori Higashida",
"givenName": "Hidenori",
"surname": "Higashida",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Yamanashi University",
"fullName": "Atsumi Imamiya",
"givenName": "Atsumi",
"surname": "Imamiya",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1998-10-01T00:00:00",
"pubType": "proceedings",
"pages": "135",
"year": "1998",
"issn": null,
"isbn": "0-8186-9176-x",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "91760127",
"articleId": "12OmNvk7JXz",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "91760143",
"articleId": "12OmNvjyxw2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cis/2010/4297/0/4297a238",
"title": "A Streamline Placement Method Highlighting Flow Field Topology",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2010/4297a238/12OmNvF83qx",
"parentPublication": {
"id": "proceedings/cis/2010/4297/0",
"title": "2010 International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b224",
"title": "Streamline-based Visualization of 3D Explosion Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b224/12OmNwtEEJX",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2000/6478/0/64780027",
"title": "A Flow-guided Streamline Seeding Strategy",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2000/64780027/12OmNxI0Kvw",
"parentPublication": {
"id": "proceedings/ieee-vis/2000/6478/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660061",
"title": "Farthest Point Seeding for Efficient Placement of Streamlines",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660061/12OmNyvoX8D",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b174",
"title": "Multiresolution Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b174/12OmNz6iOml",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1448",
"title": "Similarity-Guided Streamline Placement with Error Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1448/13rRUEgs2BN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/06/v1601",
"title": "Streamline Predicates",
"doi": null,
"abstractUrl": "/journal/tg/2006/06/v1601/13rRUwfZC06",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/05/ttg2010050791",
"title": "Topology-Aware Evenly Spaced Streamline Placement",
"doi": null,
"abstractUrl": "/journal/tg/2010/05/ttg2010050791/13rRUwvT9gp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025348",
"title": "Hierarchical Streamline Bundles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025348/13rRUyY28Yt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071185",
"title": "Parallel Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071185/13rRUyfbwqG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvmowSy",
"title": "2010 International Conference on Computational Intelligence and Security",
"acronym": "cis",
"groupId": "1001517",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvF83qx",
"doi": "10.1109/CIS.2010.58",
"title": "A Streamline Placement Method Highlighting Flow Field Topology",
"normalizedTitle": "A Streamline Placement Method Highlighting Flow Field Topology",
"abstract": "Streamline is an important way to visualize flow fields. In this paper, we propose a new streamline placement method. This method seeds streamlines at the centers of sub-fields that are enclosed by existing streamlines or field boundaries. When a streamline is seeded in a sub-field, the sub-field is generally partitioned into one or more small ones. We then continue the placement in the new sub-fields until there are no any empty ones left. The original field is treated as the first unique sub-field. For the efficiency of implementation, a sub-field is modeled as a four-connected empty area in a predefined control grid. When the control grid is properly set, test results show that, our method can generate almost evenly-spaced streamlines everywhere except at the neighborhood of topological components such as critical points and separatrices. Therefore, the topological structure of flow fields is highlighted by the varying density of streamlines without any additional overhead on analyzing the topology. This is the main advantage that is not owned by other placement methods. In addition, the cost of computation in our method is rather low.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Streamline is an important way to visualize flow fields. In this paper, we propose a new streamline placement method. This method seeds streamlines at the centers of sub-fields that are enclosed by existing streamlines or field boundaries. When a streamline is seeded in a sub-field, the sub-field is generally partitioned into one or more small ones. We then continue the placement in the new sub-fields until there are no any empty ones left. The original field is treated as the first unique sub-field. For the efficiency of implementation, a sub-field is modeled as a four-connected empty area in a predefined control grid. When the control grid is properly set, test results show that, our method can generate almost evenly-spaced streamlines everywhere except at the neighborhood of topological components such as critical points and separatrices. Therefore, the topological structure of flow fields is highlighted by the varying density of streamlines without any additional overhead on analyzing the topology. This is the main advantage that is not owned by other placement methods. In addition, the cost of computation in our method is rather low.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Streamline is an important way to visualize flow fields. In this paper, we propose a new streamline placement method. This method seeds streamlines at the centers of sub-fields that are enclosed by existing streamlines or field boundaries. When a streamline is seeded in a sub-field, the sub-field is generally partitioned into one or more small ones. We then continue the placement in the new sub-fields until there are no any empty ones left. The original field is treated as the first unique sub-field. For the efficiency of implementation, a sub-field is modeled as a four-connected empty area in a predefined control grid. When the control grid is properly set, test results show that, our method can generate almost evenly-spaced streamlines everywhere except at the neighborhood of topological components such as critical points and separatrices. Therefore, the topological structure of flow fields is highlighted by the varying density of streamlines without any additional overhead on analyzing the topology. This is the main advantage that is not owned by other placement methods. In addition, the cost of computation in our method is rather low.",
"fno": "4297a238",
"keywords": [
"Streamlines Placement",
"Seeding Strategy",
"Flow Field",
"Visualization",
"Topology"
],
"authors": [
{
"affiliation": null,
"fullName": "Wenyao Zhang",
"givenName": "Wenyao",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bo Sun",
"givenName": "Bo",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yi Wang",
"givenName": "Yi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-12-01T00:00:00",
"pubType": "proceedings",
"pages": "238-242",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4297-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4297a234",
"articleId": "12OmNrFTr8D",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4297a243",
"articleId": "12OmNC17hTy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/1998/9176/0/91760135",
"title": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1998/91760135/12OmNCbU2XH",
"parentPublication": {
"id": "proceedings/ieee-vis/1998/9176/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b224",
"title": "Streamline-based Visualization of 3D Explosion Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b224/12OmNwtEEJX",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660061",
"title": "Farthest Point Seeding for Efficient Placement of Streamlines",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660061/12OmNyvoX8D",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b174",
"title": "Multiresolution Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b174/12OmNz6iOml",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1448",
"title": "Similarity-Guided Streamline Placement with Error Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1448/13rRUEgs2BN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/08/ttg2013081342",
"title": "Similarity Measures for Enhancing Interactive Streamline Seeding",
"doi": null,
"abstractUrl": "/journal/tg/2013/08/ttg2013081342/13rRUwInvB3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/03/v0630",
"title": "Image-Based Streamline Generation and Rendering",
"doi": null,
"abstractUrl": "/journal/tg/2007/03/v0630/13rRUwdIOUC",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/05/ttg2010050791",
"title": "Topology-Aware Evenly Spaced Streamline Placement",
"doi": null,
"abstractUrl": "/journal/tg/2010/05/ttg2010050791/13rRUwvT9gp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025348",
"title": "Hierarchical Streamline Bundles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025348/13rRUyY28Yt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071185",
"title": "Parallel Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071185/13rRUyfbwqG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhWe",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"acronym": "cis",
"groupId": "1001517",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwtEEJX",
"doi": "10.1109/CIS.2011.271",
"title": "Streamline-based Visualization of 3D Explosion Fields",
"normalizedTitle": "Streamline-based Visualization of 3D Explosion Fields",
"abstract": "The visualization of explosion fields is an important issue in explosion science and technology. This paper presents a streamline-based method to visualize 3D explosion fields. Given the velocity data in a 3D explosion field, is surfaces of the magnitude of velocity are firstly extracted. Seeds of streamlines are then uniformly distributed on the is surfaces. And streamlines are generated with the placed seeds. By this way, the density of streamlines is controlled by a predefined value. When the is surfaces and the density value are properly set, the coverage of streamlines can be sufficient. To reduce visual cluttering, a technique of line illumination is used to render streamlines. Moreover, a color coding technique is applied to visualize the magnitude of velocity and distinguish the distribution of media in 3D explosion fields. Test results show that the method proposed in this paper can achieve effective visualization of 3D explosion fields. The visual clarity and the spatial perception are improved in the final visualized images.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The visualization of explosion fields is an important issue in explosion science and technology. This paper presents a streamline-based method to visualize 3D explosion fields. Given the velocity data in a 3D explosion field, is surfaces of the magnitude of velocity are firstly extracted. Seeds of streamlines are then uniformly distributed on the is surfaces. And streamlines are generated with the placed seeds. By this way, the density of streamlines is controlled by a predefined value. When the is surfaces and the density value are properly set, the coverage of streamlines can be sufficient. To reduce visual cluttering, a technique of line illumination is used to render streamlines. Moreover, a color coding technique is applied to visualize the magnitude of velocity and distinguish the distribution of media in 3D explosion fields. Test results show that the method proposed in this paper can achieve effective visualization of 3D explosion fields. The visual clarity and the spatial perception are improved in the final visualized images.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The visualization of explosion fields is an important issue in explosion science and technology. This paper presents a streamline-based method to visualize 3D explosion fields. Given the velocity data in a 3D explosion field, is surfaces of the magnitude of velocity are firstly extracted. Seeds of streamlines are then uniformly distributed on the is surfaces. And streamlines are generated with the placed seeds. By this way, the density of streamlines is controlled by a predefined value. When the is surfaces and the density value are properly set, the coverage of streamlines can be sufficient. To reduce visual cluttering, a technique of line illumination is used to render streamlines. Moreover, a color coding technique is applied to visualize the magnitude of velocity and distinguish the distribution of media in 3D explosion fields. Test results show that the method proposed in this paper can achieve effective visualization of 3D explosion fields. The visual clarity and the spatial perception are improved in the final visualized images.",
"fno": "4584b224",
"keywords": [
"Streamline Placement",
"Visualization",
"3 D Explosion Fields",
"Line Illumination"
],
"authors": [
{
"affiliation": null,
"fullName": "Yi Wang",
"givenName": "Yi",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wenyao Zhang",
"givenName": "Wenyao",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "JianGuo Ning",
"givenName": "JianGuo",
"surname": "Ning",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1224-1228",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4584-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4584b220",
"articleId": "12OmNviZlwR",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4584b229",
"articleId": "12OmNwcUjQK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/1998/9176/0/91760135",
"title": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1998/91760135/12OmNCbU2XH",
"parentPublication": {
"id": "proceedings/ieee-vis/1998/9176/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2010/4297/0/4297a238",
"title": "A Streamline Placement Method Highlighting Flow Field Topology",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2010/4297a238/12OmNvF83qx",
"parentPublication": {
"id": "proceedings/cis/2010/4297/0",
"title": "2010 International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2008/1966/0/04475462",
"title": "Illustrative Streamline Placement and Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2008/04475462/12OmNwoPty5",
"parentPublication": {
"id": "proceedings/pacificvis/2008/1966/0",
"title": "IEEE Pacific Visualization Symposium 2008",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2000/6478/0/64780027",
"title": "A Flow-guided Streamline Seeding Strategy",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2000/64780027/12OmNxI0Kvw",
"parentPublication": {
"id": "proceedings/ieee-vis/2000/6478/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b174",
"title": "Multiresolution Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b174/12OmNz6iOml",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/03/ttg2012030407",
"title": "Streamline Embedding for 3D Vector Field Exploration",
"doi": null,
"abstractUrl": "/journal/tg/2012/03/ttg2012030407/13rRUwInvsM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/03/v0630",
"title": "Image-Based Streamline Generation and Rendering",
"doi": null,
"abstractUrl": "/journal/tg/2007/03/v0630/13rRUwdIOUC",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/05/ttg2010050791",
"title": "Topology-Aware Evenly Spaced Streamline Placement",
"doi": null,
"abstractUrl": "/journal/tg/2010/05/ttg2010050791/13rRUwvT9gp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025348",
"title": "Hierarchical Streamline Bundles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025348/13rRUyY28Yt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071185",
"title": "Parallel Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071185/13rRUyfbwqG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCdk2Yv",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxI0Kvw",
"doi": "10.1109/VISUAL.2000.885690",
"title": "A Flow-guided Streamline Seeding Strategy",
"normalizedTitle": "A Flow-guided Streamline Seeding Strategy",
"abstract": "This paper presents a seed placement strategy for streamlines based on flow features in the dataset. The primary goal of our seeding strategy is to capture flow patterns in the vicinity of critical points in the flow field, even as the density of streamlines is reduced. Secondary goals are to place streamlines such that there is sufficient coverage in non-critical regions, and to vary the streamline placements and lengths so that the overall presentation is aesthetically pleasing (avoid clustering of streamlines, avoid sharp discontinuities across several streamlines, etc.). The procedure is straight forward and non-iterative. First, critical points are identified. Next, the flow field is segmented into regions, each containing a single critical point. The critical point in each region is then seeded with a template depending on the type of critical point. Finally, additional seed points are randomly distributed around the field using a Poisson disk distribution to minimize closely spaced seed points. The main advantage of this approach is that it does not miss the features around critical points. Since the strategy is not image-guided, and hence not view dependent, significant savings are possible when examining flow fields from different viewpoints, especially for 3D flow fields.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a seed placement strategy for streamlines based on flow features in the dataset. The primary goal of our seeding strategy is to capture flow patterns in the vicinity of critical points in the flow field, even as the density of streamlines is reduced. Secondary goals are to place streamlines such that there is sufficient coverage in non-critical regions, and to vary the streamline placements and lengths so that the overall presentation is aesthetically pleasing (avoid clustering of streamlines, avoid sharp discontinuities across several streamlines, etc.). The procedure is straight forward and non-iterative. First, critical points are identified. Next, the flow field is segmented into regions, each containing a single critical point. The critical point in each region is then seeded with a template depending on the type of critical point. Finally, additional seed points are randomly distributed around the field using a Poisson disk distribution to minimize closely spaced seed points. The main advantage of this approach is that it does not miss the features around critical points. Since the strategy is not image-guided, and hence not view dependent, significant savings are possible when examining flow fields from different viewpoints, especially for 3D flow fields.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a seed placement strategy for streamlines based on flow features in the dataset. The primary goal of our seeding strategy is to capture flow patterns in the vicinity of critical points in the flow field, even as the density of streamlines is reduced. Secondary goals are to place streamlines such that there is sufficient coverage in non-critical regions, and to vary the streamline placements and lengths so that the overall presentation is aesthetically pleasing (avoid clustering of streamlines, avoid sharp discontinuities across several streamlines, etc.). The procedure is straight forward and non-iterative. First, critical points are identified. Next, the flow field is segmented into regions, each containing a single critical point. The critical point in each region is then seeded with a template depending on the type of critical point. Finally, additional seed points are randomly distributed around the field using a Poisson disk distribution to minimize closely spaced seed points. The main advantage of this approach is that it does not miss the features around critical points. Since the strategy is not image-guided, and hence not view dependent, significant savings are possible when examining flow fields from different viewpoints, especially for 3D flow fields.",
"fno": "64780027",
"keywords": [
"Seed Placement",
"Streamline",
"Critical Point",
"Voronoi Diagram",
"Poisson Disk Distribution"
],
"authors": [
{
"affiliation": "NASA Ames Research Center",
"fullName": "Vivek Verma",
"givenName": "Vivek",
"surname": "Verma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NASA Ames Research Center",
"fullName": "David Kao",
"givenName": "David",
"surname": "Kao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NASA Ames Research Center",
"fullName": "Alex Pang",
"givenName": "Alex",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-10-01T00:00:00",
"pubType": "proceedings",
"pages": "27",
"year": "2000",
"issn": "1070-2385",
"isbn": "0-7803-6478-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "64780026",
"articleId": "12OmNCbCrWR",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "64780028",
"articleId": "12OmNAtK4q0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/1998/9176/0/91760135",
"title": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1998/91760135/12OmNCbU2XH",
"parentPublication": {
"id": "proceedings/ieee-vis/1998/9176/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2010/4297/0/4297a238",
"title": "A Streamline Placement Method Highlighting Flow Field Topology",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2010/4297a238/12OmNvF83qx",
"parentPublication": {
"id": "proceedings/cis/2010/4297/0",
"title": "2010 International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532831",
"title": "Strategy for seeding 3D streamlines",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532831/12OmNvjyxIM",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b224",
"title": "Streamline-based Visualization of 3D Explosion Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b224/12OmNwtEEJX",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660060",
"title": "Strategy for Seeding 3D Streamlines",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660060/12OmNy50gdh",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b174",
"title": "Multiresolution Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b174/12OmNz6iOml",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1448",
"title": "Similarity-Guided Streamline Placement with Error Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1448/13rRUEgs2BN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/05/ttg2010050791",
"title": "Topology-Aware Evenly Spaced Streamline Placement",
"doi": null,
"abstractUrl": "/journal/tg/2010/05/ttg2010050791/13rRUwvT9gp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025348",
"title": "Hierarchical Streamline Bundles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025348/13rRUyY28Yt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071185",
"title": "Parallel Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071185/13rRUyfbwqG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhWe",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"acronym": "cis",
"groupId": "1001517",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz6iOml",
"doi": "10.1109/CIS.2011.260",
"title": "Multiresolution Streamline Placement for 2D Flow Fields",
"normalizedTitle": "Multiresolution Streamline Placement for 2D Flow Fields",
"abstract": "Streamline is a popular choice to visualize flow fields, but it not easy to determine the number and the distribution of streamlines. In this paper, a multiresolution streamline placement method is presented to visualize 2D flow fields at different levels of detail. Each level has different number of streamlines that are uniformly distributed in the field at different resolutions. This method is implemented by constructing a hierarchy of control grids to manipulate the procedure of placement. The top level of the hierarchy is the coarsest control grid whose cell size is predefined. Using this grid and a centroid-based seeding strategy, a sparse placement is obtained, where streamlines are evenly-spaced. Then, this sparse placement is changed into the next lower level by adding some new streamlines within the gaps of all existing streamlines under the control of a finer control grid. Although the total number of streamlines is increased, the original uniformity is not destroyed. The resolution and the density of streamlines are both improved from one level to its next lower level. This refinement between adjacent levels can be repeated until a suitable placement is obtained. Corresponding to the control grids, a hierarchy of streamline placements with different resolutions is also built up during the multiresolution analysis. It gives an opportunity to select suitable streamline placements with desired resolutions. And it also provides a new way to have an insight into the flow field at different scales. Test results show that this multiresolution streamline placement is valid and efficient.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Streamline is a popular choice to visualize flow fields, but it not easy to determine the number and the distribution of streamlines. In this paper, a multiresolution streamline placement method is presented to visualize 2D flow fields at different levels of detail. Each level has different number of streamlines that are uniformly distributed in the field at different resolutions. This method is implemented by constructing a hierarchy of control grids to manipulate the procedure of placement. The top level of the hierarchy is the coarsest control grid whose cell size is predefined. Using this grid and a centroid-based seeding strategy, a sparse placement is obtained, where streamlines are evenly-spaced. Then, this sparse placement is changed into the next lower level by adding some new streamlines within the gaps of all existing streamlines under the control of a finer control grid. Although the total number of streamlines is increased, the original uniformity is not destroyed. The resolution and the density of streamlines are both improved from one level to its next lower level. This refinement between adjacent levels can be repeated until a suitable placement is obtained. Corresponding to the control grids, a hierarchy of streamline placements with different resolutions is also built up during the multiresolution analysis. It gives an opportunity to select suitable streamline placements with desired resolutions. And it also provides a new way to have an insight into the flow field at different scales. Test results show that this multiresolution streamline placement is valid and efficient.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Streamline is a popular choice to visualize flow fields, but it not easy to determine the number and the distribution of streamlines. In this paper, a multiresolution streamline placement method is presented to visualize 2D flow fields at different levels of detail. Each level has different number of streamlines that are uniformly distributed in the field at different resolutions. This method is implemented by constructing a hierarchy of control grids to manipulate the procedure of placement. The top level of the hierarchy is the coarsest control grid whose cell size is predefined. Using this grid and a centroid-based seeding strategy, a sparse placement is obtained, where streamlines are evenly-spaced. Then, this sparse placement is changed into the next lower level by adding some new streamlines within the gaps of all existing streamlines under the control of a finer control grid. Although the total number of streamlines is increased, the original uniformity is not destroyed. The resolution and the density of streamlines are both improved from one level to its next lower level. This refinement between adjacent levels can be repeated until a suitable placement is obtained. Corresponding to the control grids, a hierarchy of streamline placements with different resolutions is also built up during the multiresolution analysis. It gives an opportunity to select suitable streamline placements with desired resolutions. And it also provides a new way to have an insight into the flow field at different scales. Test results show that this multiresolution streamline placement is valid and efficient.",
"fno": "4584b174",
"keywords": [
"Streamline Placement",
"Multiresolutiont",
"Flow Field",
"Visualization"
],
"authors": [
{
"affiliation": null,
"fullName": "Wenyao Zhang",
"givenName": "Wenyao",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Manrui Zhang",
"givenName": "Manrui",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bo Sun",
"givenName": "Bo",
"surname": "Sun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1174-1178",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4584-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4584b169",
"articleId": "12OmNyFU7bt",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4584b179",
"articleId": "12OmNyRPgGC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cad-graphics/2015/8020/0/07450407",
"title": "Feature-Based Streamline Selection Method for 2D Flow Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2015/07450407/12OmNBEYzMf",
"parentPublication": {
"id": "proceedings/cad-graphics/2015/8020/0",
"title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1998/9176/0/91760135",
"title": "Image-Guided Streamline Placement on Curvilinear Grid Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1998/91760135/12OmNCbU2XH",
"parentPublication": {
"id": "proceedings/ieee-vis/1998/9176/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2010/4297/0/4297a238",
"title": "A Streamline Placement Method Highlighting Flow Field Topology",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2010/4297a238/12OmNvF83qx",
"parentPublication": {
"id": "proceedings/cis/2010/4297/0",
"title": "2010 International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b224",
"title": "Streamline-based Visualization of 3D Explosion Fields",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b224/12OmNwtEEJX",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2000/6478/0/64780027",
"title": "A Flow-guided Streamline Seeding Strategy",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2000/64780027/12OmNxI0Kvw",
"parentPublication": {
"id": "proceedings/ieee-vis/2000/6478/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660061",
"title": "Farthest Point Seeding for Efficient Placement of Streamlines",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660061/12OmNyvoX8D",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1448",
"title": "Similarity-Guided Streamline Placement with Error Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1448/13rRUEgs2BN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2010/05/ttg2010050791",
"title": "Topology-Aware Evenly Spaced Streamline Placement",
"doi": null,
"abstractUrl": "/journal/tg/2010/05/ttg2010050791/13rRUwvT9gp",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025348",
"title": "Hierarchical Streamline Bundles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025348/13rRUyY28Yt",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071185",
"title": "Parallel Streamline Placement for 2D Flow Fields",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071185/13rRUyfbwqG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAZx8TQ",
"title": "Multimedia and Signal Processing, International Conference on",
"acronym": "cmsp",
"groupId": "1800434",
"volume": "1",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBW0vCO",
"doi": "10.1109/CMSP.2011.44",
"title": "Consistent Mesh Segmentation Using Protrusion Function and Graph Cut",
"normalizedTitle": "Consistent Mesh Segmentation Using Protrusion Function and Graph Cut",
"abstract": "Partitioning a given complex 3D mesh model into some meaningful subparts is one of the fundamental problems in digital geometry processing. In this paper, we present an algorithm for decomposing an object represented in triangle meshes into components consistently. The segmentation is based on two key ideas. First, it exploits the discrete protrusion function on triangle mesh, and then it adopt minimal cut on the dual graph of original mesh. The experiments show that it is effective and powerful in decomposing a 3D mesh into its significant components, and is invariant to deformations, and numerically robust to noise.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Partitioning a given complex 3D mesh model into some meaningful subparts is one of the fundamental problems in digital geometry processing. In this paper, we present an algorithm for decomposing an object represented in triangle meshes into components consistently. The segmentation is based on two key ideas. First, it exploits the discrete protrusion function on triangle mesh, and then it adopt minimal cut on the dual graph of original mesh. The experiments show that it is effective and powerful in decomposing a 3D mesh into its significant components, and is invariant to deformations, and numerically robust to noise.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Partitioning a given complex 3D mesh model into some meaningful subparts is one of the fundamental problems in digital geometry processing. In this paper, we present an algorithm for decomposing an object represented in triangle meshes into components consistently. The segmentation is based on two key ideas. First, it exploits the discrete protrusion function on triangle mesh, and then it adopt minimal cut on the dual graph of original mesh. The experiments show that it is effective and powerful in decomposing a 3D mesh into its significant components, and is invariant to deformations, and numerically robust to noise.",
"fno": "4356a184",
"keywords": [
"Mesh Segmentation",
"Protrusion Function",
"Graph Cut",
"Triangle Mesh"
],
"authors": [
{
"affiliation": null,
"fullName": "Huang Ren",
"givenName": "Huang",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Liu Yu",
"givenName": "Liu",
"surname": "Yu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cmsp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-05-01T00:00:00",
"pubType": "proceedings",
"pages": "184-187",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4356-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4356a180",
"articleId": "12OmNvy258L",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4356a188",
"articleId": "12OmNAgY7m2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccsit/2008/3308/0/3308a669",
"title": "A Hybrid Approach to Surface Segmentation of Sparse Triangle Meshes",
"doi": null,
"abstractUrl": "/proceedings-article/iccsit/2008/3308a669/12OmNBp52IP",
"parentPublication": {
"id": "proceedings/iccsit/2008/3308/0",
"title": "2008 International Conference on Computer Science and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398b373",
"title": "Robust Feature Extraction for the Composite Surface Mesh from STL File",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398b373/12OmNCesr9G",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620379",
"title": "Smooth hierarchical surface triangulations",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620379/12OmNqH9hgj",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/1/3843a305",
"title": "Improvements on IPD Algorithm for Triangular Mesh Reconstruction from 3D Point Cloud",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843a305/12OmNrFTr8m",
"parentPublication": {
"id": "proceedings/mines/2009/3843/1",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2012/4899/0/4899a449",
"title": "3D Mesh Segmentation Based on Multiclass Spectral Graph Partition",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a449/12OmNx5piPR",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2012/4899/0/4899a432",
"title": "2D Shape Manipulation Using Equilateral Triangle Mesh",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a432/12OmNxETa4O",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crv/2004/2127/0/21270076",
"title": "Shape from Contours and Multiple Stereo — A Hierarchical, Mesh-Based Approach",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2004/21270076/12OmNxEjXWf",
"parentPublication": {
"id": "proceedings/crv/2004/2127/0",
"title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2009/3813/0/3813a072",
"title": "Surface Reconstruction: An Improved Marching Triangle Algorithm for Scalar and Vector Implicit Field Representations",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2009/3813a072/12OmNy2Jt55",
"parentPublication": {
"id": "proceedings/sibgrapi/2009/3813/0",
"title": "2009 XXII Brazilian Symposium on Computer Graphics and Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/ttg2008061667",
"title": "Visibility-driven Mesh Analysis and Visualization through Graph Cuts",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/ttg2008061667/13rRUwh80H7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1998/02/v0145",
"title": "Constructing Hierarchies for Triangle Meshes",
"doi": null,
"abstractUrl": "/journal/tg/1998/02/v0145/13rRUy0qnGc",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxwnczY",
"title": "2011 24th SIBGRAPI Conference on Graphics, Patterns and Images",
"acronym": "sibgrapi",
"groupId": "1000131",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwDSdfY",
"doi": "10.1109/SIBGRAPI.2011.34",
"title": "Spectral Segmentation Using Cartoon-Texture Decomposition and Inner Product-Based Metric",
"normalizedTitle": "Spectral Segmentation Using Cartoon-Texture Decomposition and Inner Product-Based Metric",
"abstract": "This paper presents a user-assisted image partition technique that combines cartoon-texture decomposition, inner product-based similarity metric, and spectral cut into a unified framework. The cartoon-texture decomposition is used to first split the image into textured and texture-free components, the latter being used to define a gradient-based inner-product function. An affinity graph is then derived and weights are assigned to its edges according to the inner product-based metric. Spectral cut is computed on the affinity graph so as to partition the image. The computational burden of the spectral cut is mitigated by a fine-to-coarse image representation process, which enables moderate size graphs that can be handled more efficiently. The partitioning can be steered by interactively by changing the weights of the graph through user strokes. Weights are updated by combining the texture component computed in the first stage of our pipeline and a recent harmonic analysis technique that captures waving patterns. Finally, a coarse-to-fine interpolation is applied in order to project the partition back onto the original image. The suitable performance of the proposed methodology is attested by comparisons against state-of-art spectral segmentation methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a user-assisted image partition technique that combines cartoon-texture decomposition, inner product-based similarity metric, and spectral cut into a unified framework. The cartoon-texture decomposition is used to first split the image into textured and texture-free components, the latter being used to define a gradient-based inner-product function. An affinity graph is then derived and weights are assigned to its edges according to the inner product-based metric. Spectral cut is computed on the affinity graph so as to partition the image. The computational burden of the spectral cut is mitigated by a fine-to-coarse image representation process, which enables moderate size graphs that can be handled more efficiently. The partitioning can be steered by interactively by changing the weights of the graph through user strokes. Weights are updated by combining the texture component computed in the first stage of our pipeline and a recent harmonic analysis technique that captures waving patterns. Finally, a coarse-to-fine interpolation is applied in order to project the partition back onto the original image. The suitable performance of the proposed methodology is attested by comparisons against state-of-art spectral segmentation methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a user-assisted image partition technique that combines cartoon-texture decomposition, inner product-based similarity metric, and spectral cut into a unified framework. The cartoon-texture decomposition is used to first split the image into textured and texture-free components, the latter being used to define a gradient-based inner-product function. An affinity graph is then derived and weights are assigned to its edges according to the inner product-based metric. Spectral cut is computed on the affinity graph so as to partition the image. The computational burden of the spectral cut is mitigated by a fine-to-coarse image representation process, which enables moderate size graphs that can be handled more efficiently. The partitioning can be steered by interactively by changing the weights of the graph through user strokes. Weights are updated by combining the texture component computed in the first stage of our pipeline and a recent harmonic analysis technique that captures waving patterns. Finally, a coarse-to-fine interpolation is applied in order to project the partition back onto the original image. The suitable performance of the proposed methodology is attested by comparisons against state-of-art spectral segmentation methods.",
"fno": "4548a266",
"keywords": [
"Spectral Cut",
"Image Segmentation",
"Similarity Graph",
"Cartoon Texture Decomposition",
"Harmonic Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Wallace Casaca",
"givenName": "Wallace",
"surname": "Casaca",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Afonso Paiva",
"givenName": "Afonso",
"surname": "Paiva",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Luis Gustavo Nonato",
"givenName": "Luis Gustavo",
"surname": "Nonato",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sibgrapi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-08-01T00:00:00",
"pubType": "proceedings",
"pages": "266-273",
"year": "2011",
"issn": "1530-1834",
"isbn": "978-0-7695-4548-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4548a258",
"articleId": "12OmNyNQSNE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4548a274",
"articleId": "12OmNyQph3F",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iih-msp/2009/3762/0/3762a467",
"title": "A Novel Texture Analysis Method Based on Graph Spectral Theory",
"doi": null,
"abstractUrl": "/proceedings-article/iih-msp/2009/3762a467/12OmNAoDify",
"parentPublication": {
"id": "proceedings/iih-msp/2009/3762/0",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icect/2009/3559/0/3559a349",
"title": "Texture Image Segmentation Using Spectral Histogram and Skeleton Extracting",
"doi": null,
"abstractUrl": "/proceedings-article/icect/2009/3559a349/12OmNAtst9o",
"parentPublication": {
"id": "proceedings/icect/2009/3559/0",
"title": "2009 International Conference on Electronic Computer Technology. ICECT 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dimpvt/2012/4873/0/4873a152",
"title": "3D Facial Surface and Texture Synthesis Using 2D Landmarks from a Single Face Sketch",
"doi": null,
"abstractUrl": "/proceedings-article/3dimpvt/2012/4873a152/12OmNC2xhCk",
"parentPublication": {
"id": "proceedings/3dimpvt/2012/4873/0",
"title": "2012 Second International Conference on 3D Imaging, Modeling, Processing, Visualization & Transmission",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisp/2008/3119/2/3119b834",
"title": "Texture Classification Using Cyclic Spectral Function",
"doi": null,
"abstractUrl": "/proceedings-article/cisp/2008/3119b834/12OmNCmpcEI",
"parentPublication": {
"id": "proceedings/cisp/2008/3119/3",
"title": "Image and Signal Processing, Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2004/2178/0/21780082",
"title": "A Novel Approach to Cartoon Style Rendering of an Image with an Approximated Crayon Texture",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2004/21780082/12OmNviZlC2",
"parentPublication": {
"id": "proceedings/cgiv/2004/2178/0",
"title": "Proceedings. International Conference on Computer Graphics, Imaging and Visualization, 2004. CGIV 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itcs/2010/4074/0/4074a064",
"title": "Texture Analysis Using GMRF Model for Image Segmentation on Spectral Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/itcs/2010/4074a064/12OmNwtWfNY",
"parentPublication": {
"id": "proceedings/itcs/2010/4074/0",
"title": "Information Technology and Computer Science, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2012/4899/0/4899a449",
"title": "3D Mesh Segmentation Based on Multiclass Spectral Graph Partition",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a449/12OmNx5piPR",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcc/2002/1477/0/14770043",
"title": "Image Compression using an Efficient Edge Cartoon + Texture Model",
"doi": null,
"abstractUrl": "/proceedings-article/dcc/2002/14770043/12OmNz5s0FR",
"parentPublication": {
"id": "proceedings/dcc/2002/1477/0",
"title": "Data Compression Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2004/2236/0/22360491",
"title": "Image Texture Representation and Retrieval Based on Power Spectral Histograms",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2004/22360491/12OmNzd7buU",
"parentPublication": {
"id": "proceedings/ictai/2004/2236/0",
"title": "16th IEEE International Conference on Tools with Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2018/1737/0/08486436",
"title": "Robust Contrast Enhancement via Graph-Based Cartoon-Texture Decomposition",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486436/14jQfMYohcx",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzzxuxr",
"title": "4th International Conference on Digital Home (ICDH)",
"acronym": "icdh",
"groupId": "1802037",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx5piPR",
"doi": "10.1109/ICDH.2012.80",
"title": "3D Mesh Segmentation Based on Multiclass Spectral Graph Partition",
"normalizedTitle": "3D Mesh Segmentation Based on Multiclass Spectral Graph Partition",
"abstract": "This paper proposes a novel 3D mesh segmentation algorithm. The idea is to transform the mesh segmentation as a spectral graph partition problem. The nodes of the graph represent faces in the mesh, the weights on the edges connecting nodes represent the similarities between faces. We then exact some geometric features for each face in the mesh to build weighted matrix. By performing multi-way spectral cut of the graph, we can find an optimal segmentation for the input mesh and apply the graph cut method to refine the boundaries between the segments. Finally we evaluate our approach on the Princeton shape benchmark and compare to other existing segmentation algorithm.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper proposes a novel 3D mesh segmentation algorithm. The idea is to transform the mesh segmentation as a spectral graph partition problem. The nodes of the graph represent faces in the mesh, the weights on the edges connecting nodes represent the similarities between faces. We then exact some geometric features for each face in the mesh to build weighted matrix. By performing multi-way spectral cut of the graph, we can find an optimal segmentation for the input mesh and apply the graph cut method to refine the boundaries between the segments. Finally we evaluate our approach on the Princeton shape benchmark and compare to other existing segmentation algorithm.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper proposes a novel 3D mesh segmentation algorithm. The idea is to transform the mesh segmentation as a spectral graph partition problem. The nodes of the graph represent faces in the mesh, the weights on the edges connecting nodes represent the similarities between faces. We then exact some geometric features for each face in the mesh to build weighted matrix. By performing multi-way spectral cut of the graph, we can find an optimal segmentation for the input mesh and apply the graph cut method to refine the boundaries between the segments. Finally we evaluate our approach on the Princeton shape benchmark and compare to other existing segmentation algorithm.",
"fno": "4899a449",
"keywords": [
"Cut Refinement",
"Mesh Segmentation",
"Spectral Graph",
"Feature Exaction"
],
"authors": [
{
"affiliation": null,
"fullName": "Haopeng Lei",
"givenName": "Haopeng",
"surname": "Lei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jianqiang Sheng",
"givenName": "Jianqiang",
"surname": "Sheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shujin Lin",
"givenName": "Shujin",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdh",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-11-01T00:00:00",
"pubType": "proceedings",
"pages": "449-455",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-1348-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4899a443",
"articleId": "12OmNs5rkRH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4899a456",
"articleId": "12OmNyNQSHy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cmsp/2011/4356/1/4356a184",
"title": "Consistent Mesh Segmentation Using Protrusion Function and Graph Cut",
"doi": null,
"abstractUrl": "/proceedings-article/cmsp/2011/4356a184/12OmNBW0vCO",
"parentPublication": {
"id": "proceedings/cmsp/2011/4356/1",
"title": "Multimedia and Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/5/3735e330",
"title": "A Novel Graph-Based Image Annotation Refinement Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735e330/12OmNBgQFGO",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/5",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2011/4548/0/4548a266",
"title": "Spectral Segmentation Using Cartoon-Texture Decomposition and Inner Product-Based Metric",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2011/4548a266/12OmNwDSdfY",
"parentPublication": {
"id": "proceedings/sibgrapi/2011/4548/0",
"title": "2011 24th SIBGRAPI Conference on Graphics, Patterns and Images",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2015/9403/0/9403a115",
"title": "Graph Cut Based Mesh Segmentation Using Feature Points and Geodesic Distance",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2015/9403a115/12OmNx965vJ",
"parentPublication": {
"id": "proceedings/cw/2015/9403/0",
"title": "2015 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ias/2009/3744/1/3744a265",
"title": "The Application and Study of Graph Cut in Motion Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/ias/2009/3744a265/12OmNyKJig5",
"parentPublication": {
"id": "proceedings/ias/2009/3744/1",
"title": "Information Assurance and Security, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dicta/2010/4271/0/4271a369",
"title": "Accurate Silhouettes for Surveillance - Improved Motion Segmentation Using Graph Cuts",
"doi": null,
"abstractUrl": "/proceedings-article/dicta/2010/4271a369/12OmNzWx03T",
"parentPublication": {
"id": "proceedings/dicta/2010/4271/0",
"title": "2010 International Conference on Digital Image Computing: Techniques and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/ttg2008061667",
"title": "Visibility-driven Mesh Analysis and Visualization through Graph Cuts",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/ttg2008061667/13rRUwh80H7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2017/02/07437462",
"title": "Unsupervised Spectral Mesh Segmentation Driven by Heterogeneous Graphs",
"doi": null,
"abstractUrl": "/journal/tp/2017/02/07437462/13rRUwjoNyn",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1990/05/t0694",
"title": "Unifying Maximum Cut and Minimum Cut of a Planar Graph",
"doi": null,
"abstractUrl": "/journal/tc/1990/05/t0694/13rRUxCitIo",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2007/12/i2195",
"title": "Three-Dimensional Surface Mesh Segmentation Using Curvedness-Based Region Growing Approach",
"doi": null,
"abstractUrl": "/journal/tp/2007/12/i2195/13rRUxcbnIg",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1m3n9N02qgE",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1m3nMWggsZa",
"doi": "10.1109/CVPR42600.2020.00390",
"title": "Instance Segmentation of Biological Images Using Harmonic Embeddings",
"normalizedTitle": "Instance Segmentation of Biological Images Using Harmonic Embeddings",
"abstract": "We present a new instance segmentation approach tailored to biological images, where instances may correspond to individual cells, organisms or plant parts. Unlike instance segmentation for user photographs or road scenes, in biological data object instances may be particularly densely packed, the appearance variation may be particularly low, the processing power may be restricted, while, on the other hand, the variability of sizes of individual instances may be limited. The proposed approach successfully addresses these peculiarities. Our approach describes each object instance using an expectation of a limited number of sine waves with frequencies and phases adjusted to particular object sizes and densities. At train time, a fully-convolutional network is learned to predict the object embeddings at each pixel using a simple pixelwise regression loss, while at test time the instances are recovered using clustering in the embedding space. In the experiments, we show that our approach outperforms previous embedding-based instance segmentation approaches on a number of biological datasets, achieving state-of-the-art on a popular CVPPP benchmark. This excellent performance is combined with computational efficiency that is needed for deployment to domain specialists. The source code of the approach is available at https://github.com/kulikovv/harmonic .",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a new instance segmentation approach tailored to biological images, where instances may correspond to individual cells, organisms or plant parts. Unlike instance segmentation for user photographs or road scenes, in biological data object instances may be particularly densely packed, the appearance variation may be particularly low, the processing power may be restricted, while, on the other hand, the variability of sizes of individual instances may be limited. The proposed approach successfully addresses these peculiarities. Our approach describes each object instance using an expectation of a limited number of sine waves with frequencies and phases adjusted to particular object sizes and densities. At train time, a fully-convolutional network is learned to predict the object embeddings at each pixel using a simple pixelwise regression loss, while at test time the instances are recovered using clustering in the embedding space. In the experiments, we show that our approach outperforms previous embedding-based instance segmentation approaches on a number of biological datasets, achieving state-of-the-art on a popular CVPPP benchmark. This excellent performance is combined with computational efficiency that is needed for deployment to domain specialists. The source code of the approach is available at https://github.com/kulikovv/harmonic .",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a new instance segmentation approach tailored to biological images, where instances may correspond to individual cells, organisms or plant parts. Unlike instance segmentation for user photographs or road scenes, in biological data object instances may be particularly densely packed, the appearance variation may be particularly low, the processing power may be restricted, while, on the other hand, the variability of sizes of individual instances may be limited. The proposed approach successfully addresses these peculiarities. Our approach describes each object instance using an expectation of a limited number of sine waves with frequencies and phases adjusted to particular object sizes and densities. At train time, a fully-convolutional network is learned to predict the object embeddings at each pixel using a simple pixelwise regression loss, while at test time the instances are recovered using clustering in the embedding space. In the experiments, we show that our approach outperforms previous embedding-based instance segmentation approaches on a number of biological datasets, achieving state-of-the-art on a popular CVPPP benchmark. This excellent performance is combined with computational efficiency that is needed for deployment to domain specialists. The source code of the approach is available at https://github.com/kulikovv/harmonic .",
"fno": "716800d842",
"keywords": [
"Biology Computing",
"Convolutional Neural Nets",
"Image Segmentation",
"Learning Artificial Intelligence",
"Regression Analysis",
"Biological Images",
"Harmonic Embeddings",
"Organisms",
"Plant Parts",
"Biological Data Object Instances",
"Individual Instances",
"Object Instance",
"Object Embeddings",
"Biological Datasets",
"Instance Segmentation",
"Fully Convolutional Network",
"Pixelwise Regression Loss",
"Embedding Space Clustering",
"Training",
"Harmonic Analysis",
"Image Segmentation",
"Biological Information Theory",
"Neural Networks",
"Shape",
"Cells Biology"
],
"authors": [
{
"affiliation": "PicsArt Inc., Moscow, Russian Federation",
"fullName": "Victor Kulikov",
"givenName": "Victor",
"surname": "Kulikov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Samsung AI Center Moscow, Skolkovo Institute of Science and Technology",
"fullName": "Victor Lempitsky",
"givenName": "Victor",
"surname": "Lempitsky",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "3842-3850",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-7168-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "716800d832",
"articleId": "1m3ncnPvcB2",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "716800d851",
"articleId": "1m3o82MvIeA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457a879",
"title": "Pixelwise Instance Segmentation with a Dynamically Instantiated Network",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457a879/12OmNBh8gZu",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457c858",
"title": "Deep Watershed Transform for Instance Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457c858/12OmNx76TBQ",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851d678",
"title": "Instance-Level Video Segmentation from Object Tracks",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851d678/12OmNzTppD3",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851a633",
"title": "Reversible Recursive Instance-Level Object Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851a633/12OmNzhnabT",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2017/0457/0/0457a247",
"title": "Instance-Level Salient Object Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457a247/12OmNzsJ7Dt",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b779",
"title": "Semantic Instance Meets Salient Object: Study on Video Semantic Salient Instance Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b779/18j8F45Tulq",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300c739",
"title": "LIP: Learning Instance Propagation for Video Object Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300c739/1i5mPF5Usus",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800j310",
"title": "CenterMask: Single Shot Instance Segmentation With Point Representation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800j310/1m3o5Zx6EZq",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313305",
"title": "Attention-Based Transformers for Instance Segmentation of Cells in Microstructures",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313305/1qmfNoIklZ6",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900q6831",
"title": "Video Object Segmentation Using Global and Instance Embedding Learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900q6831/1yeKbu6R2pO",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzayN6f",
"title": "Networked Computing and Advanced Information Management, International Conference on",
"acronym": "ncm",
"groupId": "1002435",
"volume": "1",
"displayVolume": "1",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNB1eJxF",
"doi": "10.1109/NCM.2008.187",
"title": "A Survey on Visualization for Wireless Security",
"normalizedTitle": "A Survey on Visualization for Wireless Security",
"abstract": "The Wireless security has been a popular research topic over the past few years with the abruptly growth in the population of WiFi user. The security situation awareness approaches based on visualization were developed due to the problems on wired network such as the amount of the events which are analyzed by the intrusion detection system, the false positives of the intrusion detection system, the convenience of the users, and etc. For that reason, the wireless security systems will be ultimately developed around the technology of the visualization based. Therefore, in this paper, we looked into the visualization technology on wireless network and described about the development direction of the front. The visualization technology of the front for wireless security will be developed as the form which integrates the wireless network visualization technology and wireless network mapping technology.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The Wireless security has been a popular research topic over the past few years with the abruptly growth in the population of WiFi user. The security situation awareness approaches based on visualization were developed due to the problems on wired network such as the amount of the events which are analyzed by the intrusion detection system, the false positives of the intrusion detection system, the convenience of the users, and etc. For that reason, the wireless security systems will be ultimately developed around the technology of the visualization based. Therefore, in this paper, we looked into the visualization technology on wireless network and described about the development direction of the front. The visualization technology of the front for wireless security will be developed as the form which integrates the wireless network visualization technology and wireless network mapping technology.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The Wireless security has been a popular research topic over the past few years with the abruptly growth in the population of WiFi user. The security situation awareness approaches based on visualization were developed due to the problems on wired network such as the amount of the events which are analyzed by the intrusion detection system, the false positives of the intrusion detection system, the convenience of the users, and etc. For that reason, the wireless security systems will be ultimately developed around the technology of the visualization based. Therefore, in this paper, we looked into the visualization technology on wireless network and described about the development direction of the front. The visualization technology of the front for wireless security will be developed as the form which integrates the wireless network visualization technology and wireless network mapping technology.",
"fno": "3322a129",
"keywords": [
"Wireless Securitym Visuzliation",
"Network Situational Awareness"
],
"authors": [
{
"affiliation": null,
"fullName": "Chi Yoon Jeong",
"givenName": "Chi Yoon",
"surname": "Jeong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Beom Hwan Chang",
"givenName": "Beom Hwan",
"surname": "Chang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jung Chan Na",
"givenName": "Jung Chan",
"surname": "Na",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ncm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-09-01T00:00:00",
"pubType": "proceedings",
"pages": "129-132",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3322-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3322a123",
"articleId": "12OmNzR8CwN",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3322a133",
"articleId": "12OmNB1NVNM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/waim/2008/3185/0/3185a598",
"title": "A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM",
"doi": null,
"abstractUrl": "/proceedings-article/waim/2008/3185a598/12OmNBKmXdx",
"parentPublication": {
"id": "proceedings/waim/2008/3185/0",
"title": "Web-Age Information Management, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2011/4559/0/4559a411",
"title": "Network Security Situation Awareness Method Based on Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a411/12OmNBOCWt1",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cimsim/2011/4562/0/4562a308",
"title": "Overview of Security Issues in Wireless Sensor Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cimsim/2011/4562a308/12OmNCga1P8",
"parentPublication": {
"id": "proceedings/cimsim/2011/4562/0",
"title": "Computational Intelligence, Modelling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicse/2008/3112/0/3112a317",
"title": "An Extraction Method of Situational Factors for Network Security Situational Awareness",
"doi": null,
"abstractUrl": "/proceedings-article/icicse/2008/3112a317/12OmNwAt1DY",
"parentPublication": {
"id": "proceedings/icicse/2008/3112/0",
"title": "2008 International Conference on Internet Computing in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fcst/2008/3540/0/3540a003",
"title": "Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks",
"doi": null,
"abstractUrl": "/proceedings-article/fcst/2008/3540a003/12OmNx7XGYC",
"parentPublication": {
"id": "proceedings/fcst/2008/3540/0",
"title": "2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2009/3896/0/3896a993",
"title": "A Quantification Method for Network Security Situational Awareness Based on Conditional Random Fields",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2009/3896a993/12OmNxWLTig",
"parentPublication": {
"id": "proceedings/iccit/2009/3896/0",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicse/2008/3112/0/3112a321",
"title": "The Classification, Design and Placement of Security Sensor for Network Security Situational Awareness System",
"doi": null,
"abstractUrl": "/proceedings-article/icicse/2008/3112a321/12OmNxcMSlG",
"parentPublication": {
"id": "proceedings/icicse/2008/3112/0",
"title": "2008 International Conference on Internet Computing in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2009/3639/0/3639a636",
"title": "Wireless Sensor Networks: A Survey",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2009/3639a636/12OmNyUnELJ",
"parentPublication": {
"id": "proceedings/waina/2009/3639/0",
"title": "2009 International Conference on Advanced Information Networking and Applications Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06007132",
"title": "A Survey of Visualization Systems for Network Security",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ainit/2021/1296/0/129600a616",
"title": "A Bibliometric Analysis and Visualization of Blockchain in Cyberspace Security",
"doi": null,
"abstractUrl": "/proceedings-article/ainit/2021/129600a616/1BzWGp3VRuw",
"parentPublication": {
"id": "proceedings/ainit/2021/1296/0",
"title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCaLEnp",
"title": "Multimedia Information Networking and Security, International Conference on",
"acronym": "mines",
"groupId": "1003021",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBOCWt1",
"doi": "10.1109/MINES.2011.133",
"title": "Network Security Situation Awareness Method Based on Visualization",
"normalizedTitle": "Network Security Situation Awareness Method Based on Visualization",
"abstract": "Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. For the technical issues that the index of security situation is not accurate, and visual effects is not straightforward, the paper designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. For the technical issues that the index of security situation is not accurate, and visual effects is not straightforward, the paper designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Network security visualization is a highlighted topic of network security research in recent years, The existing research situation of network security visualization is analyzed. For the technical issues that the index of security situation is not accurate, and visual effects is not straightforward, the paper designed and implemented the security situation visualization prototype system based on geographic information systems, network topology graph, attack paths. The security situation data show in multiple views, multi-angle, multi-level display to the user by visualization technology, therefore the performance of the security situation will be more accurate and vivid, assessment of network security situation become timely and accurate, laying the foundation for rapid decision-making.",
"fno": "4559a411",
"keywords": [
"Situation Awareness",
"Security Situation",
"Quantification",
"Visualization"
],
"authors": [
{
"affiliation": null,
"fullName": "Xiaoyan Li",
"givenName": "Xiaoyan",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qingxian Wang",
"givenName": "Qingxian",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lin Yang",
"givenName": "Lin",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiangyang Luo",
"givenName": "Xiangyang",
"surname": "Luo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mines",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-11-01T00:00:00",
"pubType": "proceedings",
"pages": "411-415",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4559-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4559a406",
"articleId": "12OmNzxgHsJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4559a416",
"articleId": "12OmNxWuibT",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csie/2009/3507/4/3507d210",
"title": "Research and Implementation of Network Transmission Situation Awareness",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507d210/12OmNAsBFIH",
"parentPublication": {
"id": "proceedings/csie/2009/3507/4",
"title": "Computer Science and Information Engineering, World Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifita/2009/3600/1/3600a472",
"title": "Research on Network Security Situation Awareness Technology Based on Artificial Immunity System",
"doi": null,
"abstractUrl": "/proceedings-article/ifita/2009/3600a472/12OmNBr4eyR",
"parentPublication": {
"id": "proceedings/ifita/2009/3600/3",
"title": "Information Technology and Applications, International Forum on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2015/7599/0/07312766",
"title": "Ensemble visualization for cyber situation awareness of network security data",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2015/07312766/12OmNC4eSCa",
"parentPublication": {
"id": "proceedings/vizsec/2015/7599/0",
"title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2012/4789/0/4789a864",
"title": "Research on Network Security Situation Assessment and Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2012/4789a864/12OmNCdk2CA",
"parentPublication": {
"id": "proceedings/iccis/2012/4789/0",
"title": "2012 Fourth International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kam/2009/3888/2/3888b166",
"title": "Using HMM for Intent Recognition in Cyber Security Situation Awareness",
"doi": null,
"abstractUrl": "/proceedings-article/kam/2009/3888b166/12OmNqIzhdq",
"parentPublication": {
"id": "proceedings/kam/2009/3888/2",
"title": "Knowledge Acquisition and Modeling, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imis/2011/4372/0/4372a376",
"title": "A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/imis/2011/4372a376/12OmNvSbBoT",
"parentPublication": {
"id": "proceedings/imis/2011/4372/0",
"title": "Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ias/2009/3744/2/3744b149",
"title": "Network Security Situation Awareness Using Exponential and Logarithmic Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ias/2009/3744b149/12OmNxWuiyx",
"parentPublication": {
"id": "proceedings/ias/2009/3744/2",
"title": "Information Assurance and Security, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2011/4559/0/4559a420",
"title": "Hierarchical, Multi-perspectives Model for Cyberspace Situation Awareness",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a420/12OmNxwncH8",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2005/2413/1/241310107",
"title": "Situation-Awareness for Adaptive Coordination in Service-Based Systems",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2005/241310107/12OmNy50g7k",
"parentPublication": {
"id": "proceedings/compsac/2005/2413/1",
"title": "29th Annual International Computer Software and Applications Conference (COMPSAC'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fitme/2008/3480/0/3480a192",
"title": "The Active Security Situation Sensor for Network",
"doi": null,
"abstractUrl": "/proceedings-article/fitme/2008/3480a192/12OmNyXMQmL",
"parentPublication": {
"id": "proceedings/fitme/2008/3480/0",
"title": "Future Information Technology and Management Engineering, International Seminar on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCdk2Zr",
"title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"acronym": "vizsec",
"groupId": "1810104",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC4eSCa",
"doi": "10.1109/VIZSEC.2015.7312766",
"title": "Ensemble visualization for cyber situation awareness of network security data",
"normalizedTitle": "Ensemble visualization for cyber situation awareness of network security data",
"abstract": "Network security analysis and ensemble data visualization are two active research areas. Although they are treated as separate domains, they share many common challenges and characteristics. Both focus on scalability, time-dependent data analytics, and exploration of patterns and unusual behaviors in large datasets. These overlaps provide an opportunity to apply ensemble visualization research to improve network security analysis. To study this goal, we propose methods to interpret network security alerts and flow traffic as ensemble members. We can then apply ensemble visualization techniques in a network analysis environment to produce a network ensemble visualization system. Including ensemble representations provide new, in-depth insights into relationships between alerts and flow traffic. Analysts can cluster traffic with similar behavior and identify traffic with unusual patterns, something that is difficult to achieve with high-level overviews of large network datasets. Furthermore, our ensemble approach facilitates analysis of relationships between alerts and flow traffic, improves scalability, maintains accessibility and configurability, and is designed to fit our analysts’ working environment, mental models, and problem solving strategies. ",
"abstracts": [
{
"abstractType": "Regular",
"content": "Network security analysis and ensemble data visualization are two active research areas. Although they are treated as separate domains, they share many common challenges and characteristics. Both focus on scalability, time-dependent data analytics, and exploration of patterns and unusual behaviors in large datasets. These overlaps provide an opportunity to apply ensemble visualization research to improve network security analysis. To study this goal, we propose methods to interpret network security alerts and flow traffic as ensemble members. We can then apply ensemble visualization techniques in a network analysis environment to produce a network ensemble visualization system. Including ensemble representations provide new, in-depth insights into relationships between alerts and flow traffic. Analysts can cluster traffic with similar behavior and identify traffic with unusual patterns, something that is difficult to achieve with high-level overviews of large network datasets. Furthermore, our ensemble approach facilitates analysis of relationships between alerts and flow traffic, improves scalability, maintains accessibility and configurability, and is designed to fit our analysts’ working environment, mental models, and problem solving strategies. ",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Network security analysis and ensemble data visualization are two active research areas. Although they are treated as separate domains, they share many common challenges and characteristics. Both focus on scalability, time-dependent data analytics, and exploration of patterns and unusual behaviors in large datasets. These overlaps provide an opportunity to apply ensemble visualization research to improve network security analysis. To study this goal, we propose methods to interpret network security alerts and flow traffic as ensemble members. We can then apply ensemble visualization techniques in a network analysis environment to produce a network ensemble visualization system. Including ensemble representations provide new, in-depth insights into relationships between alerts and flow traffic. Analysts can cluster traffic with similar behavior and identify traffic with unusual patterns, something that is difficult to achieve with high-level overviews of large network datasets. Furthermore, our ensemble approach facilitates analysis of relationships between alerts and flow traffic, improves scalability, maintains accessibility and configurability, and is designed to fit our analysts’ working environment, mental models, and problem solving strategies. ",
"fno": "07312766",
"keywords": [
"Data Visualization",
"Security",
"Communication Networks",
"IP Networks",
"Image Color Analysis",
"Visualization",
"Ports Computers",
"Visualization",
"Ensemble",
"Security"
],
"authors": [
{
"affiliation": "Department of Computer Science, North Carolina State University",
"fullName": "Lihua Hao",
"givenName": "Lihua",
"surname": "Hao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, North Carolina State University",
"fullName": "Christopher G. Healey",
"givenName": "Christopher G.",
"surname": "Healey",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ICF International, U.S. Army Research Laboratory",
"fullName": "Steve E. Hutchinson",
"givenName": "Steve E.",
"surname": "Hutchinson",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vizsec",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-7599-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07312765",
"articleId": "12OmNC8uRzJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07312767",
"articleId": "12OmNxTEiPj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aina/2015/7905/0/7905a358",
"title": "Traffic Flow Classification and Visualization for Network Forensic Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2015/7905a358/12OmNAYoKjy",
"parentPublication": {
"id": "proceedings/aina/2015/7905/0",
"title": "2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiaiaai/2014/4174/0/06913339",
"title": "3D Panel Visualize: Three Dimensional Panel Approach to Network Traffic Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iiaiaai/2014/06913339/12OmNvnwViV",
"parentPublication": {
"id": "proceedings/iiaiaai/2014/4174/0",
"title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2016/1605/0/07739584",
"title": "CyberPetri at CDX 2016: Real-time network situation awareness",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2016/07739584/12OmNzSQdqs",
"parentPublication": {
"id": "proceedings/vizsec/2016/1605/0",
"title": "2016 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/09/08405549",
"title": "Visualization and Visual Analysis of Ensemble Data: A Survey",
"doi": null,
"abstractUrl": "/journal/tg/2019/09/08405549/13rRUIIVlcV",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2016/03/mcg2016030060",
"title": "Evaluating Shape Alignment via Ensemble Visualization",
"doi": null,
"abstractUrl": "/magazine/cg/2016/03/mcg2016030060/13rRUxASu3j",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/12/06875990",
"title": "Multi-Charts for Comparative 3D Ensemble Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2014/12/06875990/13rRUxYIMUZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/10/07352364",
"title": "Modality-Driven Classification and Visualization of Ensemble Variance",
"doi": null,
"abstractUrl": "/journal/tg/2016/10/07352364/13rRUyp7tWZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/09/07055260",
"title": "Uncertainty-Aware Multidimensional Ensemble Data Visualization and Exploration",
"doi": null,
"abstractUrl": "/journal/tg/2015/09/07055260/13rRUyuegp9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2018/06/08617765",
"title": "A Novel Radial Visualization of Intrusion Detection Alerts",
"doi": null,
"abstractUrl": "/magazine/cg/2018/06/08617765/17D45Vw15tt",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/04/09669058",
"title": "<italic>EnConVis</italic>: A Unified Framework for Ensemble Contour Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2023/04/09669058/1zTfZV1Ocnu",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzuIjec",
"title": "Computational Intelligence, Communication Systems and Networks, International Conference on",
"acronym": "cicsyn",
"groupId": "1002865",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCxbXAF",
"doi": "10.1109/CICSyN.2010.64",
"title": "Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool",
"normalizedTitle": "Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool",
"abstract": "Nowadays, many computers have been infected with the computer anomalies or viruses. The availability of network security visualization tools greatly facilitate to detect, perceive and defend computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security awareness even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we proposed and implemented initial pre-expertise classification system which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users’ expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only on two-dimensional space on a computer but also beyond that space. Systems features, such as system effectiveness and efficiency of data visualization have been improved. Our experiments in a network lab suggest that the tool can be further improved as the tool for distribution to a wide range of computer user.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Nowadays, many computers have been infected with the computer anomalies or viruses. The availability of network security visualization tools greatly facilitate to detect, perceive and defend computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security awareness even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we proposed and implemented initial pre-expertise classification system which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users’ expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only on two-dimensional space on a computer but also beyond that space. Systems features, such as system effectiveness and efficiency of data visualization have been improved. Our experiments in a network lab suggest that the tool can be further improved as the tool for distribution to a wide range of computer user.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Nowadays, many computers have been infected with the computer anomalies or viruses. The availability of network security visualization tools greatly facilitate to detect, perceive and defend computer users from being affected by these anomalies. Many of the network security visualization tools are designed particularly for users with advanced network security awareness even though the tools are indispensable by various types of computer users. We proposed an expert-aware approach to designing a system which formulated with a large amount of network data or high-dimensional data and adaptive for different types of users. In the preliminary phase, we proposed and implemented initial pre-expertise classification system which provides a default setting for the expert-aware network security visualization tool. The tool will learn from continual user feedbacks in order to statistically satisfy the needs of majority tool users. The expert-aware approach looks at the users’ expertise level in network security and adapts the visualization views that are best suitable for the user. Initial results of the implementation of the system show that it is capable of representing several of network security data not only on two-dimensional space on a computer but also beyond that space. Systems features, such as system effectiveness and efficiency of data visualization have been improved. Our experiments in a network lab suggest that the tool can be further improved as the tool for distribution to a wide range of computer user.",
"fno": "4158a227",
"keywords": [
"Network Security Visualization Tool",
"Network Security Awareness",
"Expert Aware Approach",
"High Dimensional Data",
"Two Dimensional",
"Effectiveness",
"Efficiency"
],
"authors": [
{
"affiliation": null,
"fullName": "Doris Hooi-Ten Wong",
"givenName": "Doris Hooi-Ten",
"surname": "Wong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kok-Soon Chai",
"givenName": "Kok-Soon",
"surname": "Chai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sureswaran Ramadass",
"givenName": "Sureswaran",
"surname": "Ramadass",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nicolas Vavasseur",
"givenName": "Nicolas",
"surname": "Vavasseur",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cicsyn",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-07-01T00:00:00",
"pubType": "proceedings",
"pages": "227-231",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4158-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4158a222",
"articleId": "12OmNwGqBmS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4158a232",
"articleId": "12OmNCbCrTx",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/itng/2012/4654/0/4654a048",
"title": "Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network Simulator",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2012/4654a048/12OmNBhpSce",
"parentPublication": {
"id": "proceedings/itng/2012/4654/0",
"title": "Information Technology: New Generations, Third International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscc/2011/0680/0/05983926",
"title": "Real-time graph visualization tool for vehicular ad-hoc networks: (VIVAGr: VIsualization tool of VAnet graphs in real-time)",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2011/05983926/12OmNBrlPEM",
"parentPublication": {
"id": "proceedings/iscc/2011/0680/0",
"title": "2011 IEEE Symposium on Computers and Communications (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/3/4880c367",
"title": "Prototype of New Business Process Visualization Tool",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880c367/12OmNqBtiYi",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2010/3965/0/3965a537",
"title": "Security Modeling and Tool Support Advantages",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2010/3965a537/12OmNx9FhOo",
"parentPublication": {
"id": "proceedings/ares/2010/3965/0",
"title": "2010 International Conference on Availability, Reliability and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/netapps/2010/4177/0/4177a213",
"title": "Expert-Aware Approach Towards Network Security Visualization Tool Services",
"doi": null,
"abstractUrl": "/proceedings-article/netapps/2010/4177a213/12OmNxTVU08",
"parentPublication": {
"id": "proceedings/netapps/2010/4177/0",
"title": "Network Applications, Protocols and Services, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vissoft/2007/0599/0/04290705",
"title": "Visualization Patterns: A Context-Sensitive Tool to Evaluate Visualization Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2007/04290705/12OmNxV4ixg",
"parentPublication": {
"id": "proceedings/vissoft/2007/0599/0",
"title": "2007 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sectech/2008/3486/0/3486a023",
"title": "A Novel Visualization Approach for Efficient Network Scans Detection",
"doi": null,
"abstractUrl": "/proceedings-article/sectech/2008/3486a023/12OmNxxvAGm",
"parentPublication": {
"id": "proceedings/sectech/2008/3486/0",
"title": "Security Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2004/8552/0/01408487",
"title": "Web-based curriculum as a pedagogic tool for e-learning, in network security",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2004/01408487/12OmNyqRnbB",
"parentPublication": {
"id": "proceedings/fie/2004/8552/0",
"title": "34th Annual Frontiers in Education, 2004. FIE 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/so/1991/05/s5019",
"title": "Traceview: A Trace Visualization Tool",
"doi": null,
"abstractUrl": "/magazine/so/1991/05/s5019/13rRUx0gedh",
"parentPublication": {
"id": "mags/so",
"title": "IEEE Software",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06007132",
"title": "A Survey of Visualization Systems for Network Security",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxQOjzH",
"title": "2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing",
"acronym": "pdp",
"groupId": "1000543",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrNh0ss",
"doi": "10.1109/PDP.2013.84",
"title": "Analytical Visualization Techniques for Security Information and Event Management",
"normalizedTitle": "Analytical Visualization Techniques for Security Information and Event Management",
"abstract": "The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems. The suggested architecture of the visualization component allows incorporating different visualization technologies and extending easily the application functionality. To illustrate the approach, we developed the prototype of the SIEM visualization component. The paper demonstrates the graphical user interface of the attack modeling component. To increase the efficiency of the visualization techniques we applied principles of the human information perception and interaction issues when designing graphical components.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems. The suggested architecture of the visualization component allows incorporating different visualization technologies and extending easily the application functionality. To illustrate the approach, we developed the prototype of the SIEM visualization component. The paper demonstrates the graphical user interface of the attack modeling component. To increase the efficiency of the visualization techniques we applied principles of the human information perception and interaction issues when designing graphical components.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems. The suggested architecture of the visualization component allows incorporating different visualization technologies and extending easily the application functionality. To illustrate the approach, we developed the prototype of the SIEM visualization component. The paper demonstrates the graphical user interface of the attack modeling component. To increase the efficiency of the visualization techniques we applied principles of the human information perception and interaction issues when designing graphical components.",
"fno": "4939a519",
"keywords": [
"Attack Graph Visualization",
"Security Information Visualization",
"Visualization Framework"
],
"authors": [
{
"affiliation": null,
"fullName": "Evgenia Novikova",
"givenName": "Evgenia",
"surname": "Novikova",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Igor Kotenko",
"givenName": "Igor",
"surname": "Kotenko",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pdp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-02-01T00:00:00",
"pubType": "proceedings",
"pages": "519-525",
"year": "2013",
"issn": "1066-6192",
"isbn": "978-1-4673-5321-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4939a514",
"articleId": "12OmNAq3hJ5",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4939a526",
"articleId": "12OmNvjQ8YF",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2002/7498/0/7498teoh",
"title": "Case Study: Interactive Visualization for Internet Security",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2002/7498teoh/12OmNAYXWIv",
"parentPublication": {
"id": "proceedings/ieee-vis/2002/7498/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ares/2014/4223/0/4223a506",
"title": "Visualization of Security Metrics for Cyber Situation Awareness",
"doi": null,
"abstractUrl": "/proceedings-article/ares/2014/4223a506/12OmNBaBuUp",
"parentPublication": {
"id": "proceedings/ares/2014/4223/0",
"title": "2014 Ninth International Conference on Availability, Reliability and Security (ARES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2009/3789/0/3789a454",
"title": "Visualization Techniques on the Examination Timetabling Pre-processing Data",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2009/3789a454/12OmNC17hW4",
"parentPublication": {
"id": "proceedings/cgiv/2009/3789/0",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/greencom/2012/4865/0/4865a094",
"title": "Common Framework for Attack Modeling and Security Evaluation in SIEM Systems",
"doi": null,
"abstractUrl": "/proceedings-article/greencom/2012/4865a094/12OmNwbcJ42",
"parentPublication": {
"id": "proceedings/greencom/2012/4865/0",
"title": "2012 IEEE International Conference on Green Computing and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2005/2392/0/23920155",
"title": "Attributed Graph Visualization of Collaborative Workspaces",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2005/23920155/12OmNwtn3Cu",
"parentPublication": {
"id": "proceedings/cgiv/2005/2392/0",
"title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsac/2008/3447/0/3447a205",
"title": "Improving Security Visualization with Exposure Map Filtering",
"doi": null,
"abstractUrl": "/proceedings-article/acsac/2008/3447a205/12OmNzyp62v",
"parentPublication": {
"id": "proceedings/acsac/2008/3447/0",
"title": "2008 Annual Computer Security Applications Conference (ACSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2014/05/msp2014050035",
"title": "The Operational Role of Security Information and Event Management Systems",
"doi": null,
"abstractUrl": "/magazine/sp/2014/05/msp2014050035/13rRUxcbnAP",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06007132",
"title": "A Survey of Visualization Systems for Network Security",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issrew/2018/9443/0/944300a095",
"title": "Challenges and Directions in Security Information and Event Management (SIEM)",
"doi": null,
"abstractUrl": "/proceedings-article/issrew/2018/944300a095/17D45Xtvpa1",
"parentPublication": {
"id": "proceedings/issrew/2018/9443/0",
"title": "2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006073",
"title": "Automated Event Prioritization for Security Operation Center using Deep Learning",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006073/1hJszEopz8c",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqyUUIj",
"title": "Computer Modeling and Simulation, UKSIM European Symposium on",
"acronym": "ems",
"groupId": "1002447",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNscOUdD",
"doi": "10.1109/EMS.2009.24",
"title": "Study on Advanced Visualization Tools In Network Monitoring Platform",
"normalizedTitle": "Study on Advanced Visualization Tools In Network Monitoring Platform",
"abstract": "Visualization tools have emerged as a critical component, especially in medical, education, engineering, military and environmental management. These fields have applied the visualization techniques to improve decision making and organization management performance. In recent times, with the advent of Internet and the explosive growth of networking infrastructure on a global scale demand for an intuitive and wholesome approach to visual the network traffic. Complexity of network architecture and insufficient vendor support are the major issues always that are faced by a user in solving a network monitoring problem. Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user. Currently, there are numerous data visualization tools in network monitoring namely Network Analysis Visualization, Spinning Cube of Potential Doom (SCPD), Visual Information Security Utility for Administration Live (VISUAL), SeeNet, Cichlid, CyberNet and others. These tools provided useful information about network activities, which important for monitoring purpose. Our work entails the development of an advanced visualization framework to intelligently visualize high volume, real-time network traffic data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Visualization tools have emerged as a critical component, especially in medical, education, engineering, military and environmental management. These fields have applied the visualization techniques to improve decision making and organization management performance. In recent times, with the advent of Internet and the explosive growth of networking infrastructure on a global scale demand for an intuitive and wholesome approach to visual the network traffic. Complexity of network architecture and insufficient vendor support are the major issues always that are faced by a user in solving a network monitoring problem. Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user. Currently, there are numerous data visualization tools in network monitoring namely Network Analysis Visualization, Spinning Cube of Potential Doom (SCPD), Visual Information Security Utility for Administration Live (VISUAL), SeeNet, Cichlid, CyberNet and others. These tools provided useful information about network activities, which important for monitoring purpose. Our work entails the development of an advanced visualization framework to intelligently visualize high volume, real-time network traffic data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Visualization tools have emerged as a critical component, especially in medical, education, engineering, military and environmental management. These fields have applied the visualization techniques to improve decision making and organization management performance. In recent times, with the advent of Internet and the explosive growth of networking infrastructure on a global scale demand for an intuitive and wholesome approach to visual the network traffic. Complexity of network architecture and insufficient vendor support are the major issues always that are faced by a user in solving a network monitoring problem. Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user. Currently, there are numerous data visualization tools in network monitoring namely Network Analysis Visualization, Spinning Cube of Potential Doom (SCPD), Visual Information Security Utility for Administration Live (VISUAL), SeeNet, Cichlid, CyberNet and others. These tools provided useful information about network activities, which important for monitoring purpose. Our work entails the development of an advanced visualization framework to intelligently visualize high volume, real-time network traffic data.",
"fno": "3886a445",
"keywords": [
"Data Visualization",
"Network Traffic Visualization",
"Network Monitoring"
],
"authors": [
{
"affiliation": null,
"fullName": "Doris Wong Hooi Ten",
"givenName": "Doris Wong Hooi",
"surname": "Ten",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Selvakumar Manickam",
"givenName": "Selvakumar",
"surname": "Manickam",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sureswaran Ramadass",
"givenName": "Sureswaran",
"surname": "Ramadass",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hussein A. Al Bazar",
"givenName": "Hussein A. Al",
"surname": "Bazar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ems",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "445-449",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3886-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3886a440",
"articleId": "12OmNvjyxTo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3886a450",
"articleId": "12OmNrYCXHY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cybersecurity/2012/5014/0/5014a016",
"title": "Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks",
"doi": null,
"abstractUrl": "/proceedings-article/cybersecurity/2012/5014a016/12OmNBQ2VYY",
"parentPublication": {
"id": "proceedings/cybersecurity/2012/5014/0",
"title": "International Conference on Cyber Security (CyberSecurity)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uksim/2010/4016/0/4016a482",
"title": "Case Study: Visualization Methodology for Analysing Network Data",
"doi": null,
"abstractUrl": "/proceedings-article/uksim/2010/4016a482/12OmNBdJ5j0",
"parentPublication": {
"id": "proceedings/uksim/2010/4016/0",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mascot/1994/5292/0/00284387",
"title": "Visualization of network performance using the AVS visualization system",
"doi": null,
"abstractUrl": "/proceedings-article/mascot/1994/00284387/12OmNBvkdkX",
"parentPublication": {
"id": "proceedings/mascot/1994/5292/0",
"title": "Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2009/5340/0/05380846",
"title": "Enabling Advanced Visualization Tools in a Web-Based Simulation Monitoring System",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2009/05380846/12OmNyQGS1b",
"parentPublication": {
"id": "proceedings/e-science/2009/5340/0",
"title": "2009 5th IEEE International Conference on e-Science (e-Science 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2006/0591/0/04035756",
"title": "Monitoring Network Traffic with Radial Traffic Analyzer",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2006/04035756/12OmNz4SOzs",
"parentPublication": {
"id": "proceedings/vast/2006/0591/0",
"title": "2006 IEEE Symposium On Visual Analytics Science And Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/securware/2010/4095/0/05633664",
"title": "Discovery of Invariant Bot Behavior through Visual Network Monitoring System",
"doi": null,
"abstractUrl": "/proceedings-article/securware/2010/05633664/13bd1eW2l8R",
"parentPublication": {
"id": "proceedings/securware/2010/4095/0",
"title": "2010 Fourth International Conference on Emerging Security Information, Systems and Technologies",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005641",
"title": "Dynamic visualization of large scale tactical network simulations",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005641/1hJsgB0L00o",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatase/2020/1114/0/111400a057",
"title": "Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security Competition",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatase/2020/111400a057/1r3p9af7lD2",
"parentPublication": {
"id": "proceedings/bigdatase/2020/1114/0",
"title": "2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iceccs/2020/8558/0/855800a187",
"title": "ROS-FM: Fast Monitoring for the Robotic Operating System(ROS)",
"doi": null,
"abstractUrl": "/proceedings-article/iceccs/2020/855800a187/1s659d9rqQE",
"parentPublication": {
"id": "proceedings/iceccs/2020/8558/0",
"title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2021/3892/0/389200a235",
"title": "Research on Key Technologies of Power System Visualization Platform",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2021/389200a235/1t2ngCjly92",
"parentPublication": {
"id": "proceedings/icmtma/2021/3892/0",
"title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwogh4C",
"title": "2016 International Computer Symposium (ICS)",
"acronym": "compsym",
"groupId": "1800251",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy68ELH",
"doi": "10.1109/ICS.2016.0135",
"title": "Research on Network Security Visualization under Big Data Environment",
"normalizedTitle": "Research on Network Security Visualization under Big Data Environment",
"abstract": "In the era of big data, the huge amount of data information has brought huge industry value, but the network security problem has become more and more prominent. From the discussion about the definition and characteristics of big data, the article introduces the means of network security data visualization, and make use of the characteristics of big data-5V features are mapped to network security data, and detailed description of data security visualization technology, at last make a summary.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the era of big data, the huge amount of data information has brought huge industry value, but the network security problem has become more and more prominent. From the discussion about the definition and characteristics of big data, the article introduces the means of network security data visualization, and make use of the characteristics of big data-5V features are mapped to network security data, and detailed description of data security visualization technology, at last make a summary.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the era of big data, the huge amount of data information has brought huge industry value, but the network security problem has become more and more prominent. From the discussion about the definition and characteristics of big data, the article introduces the means of network security data visualization, and make use of the characteristics of big data-5V features are mapped to network security data, and detailed description of data security visualization technology, at last make a summary.",
"fno": "07858557",
"keywords": [
"Big Data",
"Data Visualisation",
"Security Of Data",
"Big Data Environment",
"Network Security Problem",
"Network Security Data Visualization",
"Data Visualization",
"Security",
"Big Data",
"Communication Networks",
"Monitoring",
"Real Time Systems",
"Telecommunication Traffic",
"Big Data",
"Network Security Visualization",
"Characteristic Of Big Data"
],
"authors": [
{
"affiliation": null,
"fullName": "Tingting Yang",
"givenName": "Tingting",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shuwen Jia",
"givenName": "Shuwen",
"surname": "Jia",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "compsym",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-12-01T00:00:00",
"pubType": "proceedings",
"pages": "660-662",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-3438-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07858556",
"articleId": "12OmNyqRnn7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07858559",
"articleId": "12OmNyRPgAP",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iscc/2016/0679/0/07543859",
"title": "Big Data Analytics: Security and privacy challenges",
"doi": null,
"abstractUrl": "/proceedings-article/iscc/2016/07543859/12OmNCeK2kr",
"parentPublication": {
"id": "proceedings/iscc/2016/0679/0",
"title": "2016 IEEE Symposium on Computers and Communication (ISCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2015/9926/0/07363960",
"title": "Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2015/07363960/12OmNwe2IC0",
"parentPublication": {
"id": "proceedings/big-data/2015/9926/0",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2013/06/msp2013060074",
"title": "Big Data Analytics for Security",
"doi": null,
"abstractUrl": "/magazine/sp/2013/06/msp2013060074/13rRUB7a0Zu",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ficloudw/2018/7810/0/781000a056",
"title": "Standardization of Ensuring Information Security for Big Data Technologies",
"doi": null,
"abstractUrl": "/proceedings-article/ficloudw/2018/781000a056/14jQfQPXIYO",
"parentPublication": {
"id": "proceedings/ficloudw/2018/7810/0",
"title": "2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0/439900a100",
"title": "Big Data Security in Cloud Environment",
"doi": null,
"abstractUrl": "/proceedings-article/bigdatasecurity-hpsc-ids/2018/439900a100/17D45XERmlp",
"parentPublication": {
"id": "proceedings/bigdatasecurity-hpsc-ids/2018/4399/0",
"title": "2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2021/1790/0/179000a324",
"title": "Research on Enterprise Information Security and Privacy Protection in Big Data Environment",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2021/179000a324/1BQiG9MiFTW",
"parentPublication": {
"id": "proceedings/mlbdbi/2021/1790/0",
"title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icise-ie/2021/3829/0/382900a876",
"title": "Data Security in Enterprise Management Under Big Data Technology",
"doi": null,
"abstractUrl": "/proceedings-article/icise-ie/2021/382900a876/1C8GqzpBZLy",
"parentPublication": {
"id": "proceedings/icise-ie/2021/3829/0",
"title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccea/2020/5904/0/09103885",
"title": "Research on Situation Awareness of Universities’ Network Information Security in the Big Data Environment",
"doi": null,
"abstractUrl": "/proceedings-article/iccea/2020/09103885/1kesA5SZEqY",
"parentPublication": {
"id": "proceedings/iccea/2020/5904/0",
"title": "2020 International Conference on Computer Engineering and Application (ICCEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbase/2020/9619/0/961900a050",
"title": "Network security Mode analysis based on big data environment",
"doi": null,
"abstractUrl": "/proceedings-article/icbase/2020/961900a050/1t2nteaiWkM",
"parentPublication": {
"id": "proceedings/icbase/2020/9619/0",
"title": "2020 International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieit/2021/2563/0/256300a253",
"title": "Dilemma and outlet of Public Security Management in Big Data Environment",
"doi": null,
"abstractUrl": "/proceedings-article/ieit/2021/256300a253/1wHKic3Flw4",
"parentPublication": {
"id": "proceedings/ieit/2021/2563/0",
"title": "2021 International Conference on Internet, Education and Information Technology (IEIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKipH",
"title": "2017 IEEE Trustcom/BigDataSE/ICESS",
"acronym": "trustcom-bigdatase-icess",
"groupId": "1800729",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45WHONmE",
"doi": "10.1109/Trustcom/BigDataSE/ICESS.2017.349",
"title": "Applications of Visualization Technology for Network Security",
"normalizedTitle": "Applications of Visualization Technology for Network Security",
"abstract": "As a new research area in recent years, network security visualization provides a fast and effective way to identify network anomalies. This paper first summarizes several popular data visualization technologies, and analyzes the current research progress in the field of network security visualization. Then it introduces our practical work to visualize the abnormal events on CSTnet, and proposes research directions for next step.",
"abstracts": [
{
"abstractType": "Regular",
"content": "As a new research area in recent years, network security visualization provides a fast and effective way to identify network anomalies. This paper first summarizes several popular data visualization technologies, and analyzes the current research progress in the field of network security visualization. Then it introduces our practical work to visualize the abnormal events on CSTnet, and proposes research directions for next step.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "As a new research area in recent years, network security visualization provides a fast and effective way to identify network anomalies. This paper first summarizes several popular data visualization technologies, and analyzes the current research progress in the field of network security visualization. Then it introduces our practical work to visualize the abnormal events on CSTnet, and proposes research directions for next step.",
"fno": "08029552",
"keywords": [
"Data Visualization",
"Security",
"IP Networks",
"Communication Networks",
"Ports Computers",
"Three Dimensional Displays",
"Bars",
"Visualization",
"Network Security",
"Port Scans",
"Botnet"
],
"authors": [
{
"affiliation": null,
"fullName": "Tang Haina",
"givenName": "Tang",
"surname": "Haina",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Han Chunjing",
"givenName": "Han",
"surname": "Chunjing",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ge Jingguo",
"givenName": "Ge",
"surname": "Jingguo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "trustcom-bigdatase-icess",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1038-1042",
"year": "2017",
"issn": "2324-9013",
"isbn": "978-1-5090-4906-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08029551",
"articleId": "17D45VTRozv",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08029553",
"articleId": "17D45VTRozw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aina/2015/7905/0/7905a358",
"title": "Traffic Flow Classification and Visualization for Network Forensic Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2015/7905a358/12OmNAYoKjy",
"parentPublication": {
"id": "proceedings/aina/2015/7905/0",
"title": "2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ic2ew/2016/3684/0/3684a054",
"title": "SDN Security Plane: An Architecture for Resilient Security Services",
"doi": null,
"abstractUrl": "/proceedings-article/ic2ew/2016/3684a054/12OmNAsk4xU",
"parentPublication": {
"id": "proceedings/ic2ew/2016/3684/0",
"title": "2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2011/4559/0/4559a411",
"title": "Network Security Situation Awareness Method Based on Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a411/12OmNBOCWt1",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2015/7599/0/07312766",
"title": "Ensemble visualization for cyber situation awareness of network security data",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2015/07312766/12OmNC4eSCa",
"parentPublication": {
"id": "proceedings/vizsec/2015/7599/0",
"title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiaiaai/2014/4174/0/06913339",
"title": "3D Panel Visualize: Three Dimensional Panel Approach to Network Traffic Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iiaiaai/2014/06913339/12OmNvnwViV",
"parentPublication": {
"id": "proceedings/iiaiaai/2014/4174/0",
"title": "2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2015/7644/0/7644a309",
"title": "Computer Network Security Virtual Experiment System Design and Implementation",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2015/7644a309/12OmNzZWbMo",
"parentPublication": {
"id": "proceedings/icicta/2015/7644/0",
"title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csf/2016/2607/0/2607a194",
"title": "Localizing Firewall Security Policies",
"doi": null,
"abstractUrl": "/proceedings-article/csf/2016/2607a194/12OmNzsJ7zx",
"parentPublication": {
"id": "proceedings/csf/2016/2607/0",
"title": "2016 IEEE 29th Computer Security Foundations Symposium (CSF)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asiajcis/2018/7380/0/738001a001",
"title": "VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOC",
"doi": null,
"abstractUrl": "/proceedings-article/asiajcis/2018/738001a001/13l5NXo3WT0",
"parentPublication": {
"id": "proceedings/asiajcis/2018/7380/0",
"title": "2018 13th Asia Joint Conference on Information Security (AsiaJCIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06007132",
"title": "A Survey of Visualization Systems for Network Security",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cibda/2020/9837/0/983700a019",
"title": "Research on Network Information Security Protection Technology Based on Big Data",
"doi": null,
"abstractUrl": "/proceedings-article/cibda/2020/983700a019/1lO1LCBFOb6",
"parentPublication": {
"id": "proceedings/cibda/2020/9837/0",
"title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "17D45VtKipY",
"title": "2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)",
"acronym": "trustcom-bigdatase",
"groupId": "1800729",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45X2fUHr",
"doi": "10.1109/TrustCom/BigDataSE.2018.00095",
"title": "A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach",
"normalizedTitle": "A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach",
"abstract": "What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber-attacks are critical for decision making - not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement (SvEm) framework by providing a full-scale effectiveness approach for both theoretical and user-centric visualization techniques. Our framework facilitates effectiveness through interactive three-dimensional visualization to enhance both single and multi-user collaboration. We investigated effectiveness metrics including (1) visual clarity, (2) visibility, (3) distortion rates and (4) user response (viewing) times. The SvEm framework key components are: (1) mobile display dimension and resolution factor, (2) security incident entities, (3) user cognition activators and alerts, (4) threat scoring system, (5) working memory load and (6) color usage management. To evaluate our full-scale security visualization effectiveness framework, we developed VisualProgger - a real-time security visualization application (web and mobile) visualizing data provenance changes in SvEm use cases. Finally, the SvEm visualizations aims to gain the users' attention span by ensuring a consistency in the viewer's cognitive load, while increasing the viewer's working memory load. In return, users have high potential to gain security insights in security visualization. Our evaluation shows that viewers perform better with prior knowledge (working memory load) of security events and that circular visualization designs attract and maintain the viewer's attention span. These discoveries revealed research directions for future work relating to measurement of security visualization effectiveness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber-attacks are critical for decision making - not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement (SvEm) framework by providing a full-scale effectiveness approach for both theoretical and user-centric visualization techniques. Our framework facilitates effectiveness through interactive three-dimensional visualization to enhance both single and multi-user collaboration. We investigated effectiveness metrics including (1) visual clarity, (2) visibility, (3) distortion rates and (4) user response (viewing) times. The SvEm framework key components are: (1) mobile display dimension and resolution factor, (2) security incident entities, (3) user cognition activators and alerts, (4) threat scoring system, (5) working memory load and (6) color usage management. To evaluate our full-scale security visualization effectiveness framework, we developed VisualProgger - a real-time security visualization application (web and mobile) visualizing data provenance changes in SvEm use cases. Finally, the SvEm visualizations aims to gain the users' attention span by ensuring a consistency in the viewer's cognitive load, while increasing the viewer's working memory load. In return, users have high potential to gain security insights in security visualization. Our evaluation shows that viewers perform better with prior knowledge (working memory load) of security events and that circular visualization designs attract and maintain the viewer's attention span. These discoveries revealed research directions for future work relating to measurement of security visualization effectiveness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber-attacks are critical for decision making - not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement (SvEm) framework by providing a full-scale effectiveness approach for both theoretical and user-centric visualization techniques. Our framework facilitates effectiveness through interactive three-dimensional visualization to enhance both single and multi-user collaboration. We investigated effectiveness metrics including (1) visual clarity, (2) visibility, (3) distortion rates and (4) user response (viewing) times. The SvEm framework key components are: (1) mobile display dimension and resolution factor, (2) security incident entities, (3) user cognition activators and alerts, (4) threat scoring system, (5) working memory load and (6) color usage management. To evaluate our full-scale security visualization effectiveness framework, we developed VisualProgger - a real-time security visualization application (web and mobile) visualizing data provenance changes in SvEm use cases. Finally, the SvEm visualizations aims to gain the users' attention span by ensuring a consistency in the viewer's cognitive load, while increasing the viewer's working memory load. In return, users have high potential to gain security insights in security visualization. Our evaluation shows that viewers perform better with prior knowledge (working memory load) of security events and that circular visualization designs attract and maintain the viewer's attention span. These discoveries revealed research directions for future work relating to measurement of security visualization effectiveness.",
"fno": "438801a639",
"keywords": [
"Cognition",
"Data Visualisation",
"Decision Making",
"Security Of Data",
"Presentation Approach",
"Understanding Cyber Attacks",
"Security Visualization Effectiveness Measurement Framework",
"User Response Times",
"Mobile Display Dimension",
"Security Incident Entities",
"User Cognition Activators",
"Full Scale Security Visualization Effectiveness Measurement",
"Circular Visualization Designs Attract",
"Security Events",
"Security Insights",
"Sv Em Visualizations",
"Real Time Security Visualization Application",
"Full Scale Security Visualization Effectiveness Framework",
"Alerts",
"Sv Em Framework Key Components",
"Effectiveness Metrics",
"Multiuser Collaboration",
"Three Dimensional Visualization",
"User Centric Visualization Techniques",
"Full Scale Effectiveness Approach",
"Policy Making Levels",
"Visual Clarity",
"Decision Making",
"Data Visualization",
"Visualization",
"Distortion Measurement",
"Correlation",
"Computer Security",
"Cognition",
"Security Visualization Effectiveness Measurement Cyber Attacks Cyber Security Mobile Security Network Security Web Application Security Cognitive Load Attention Span"
],
"authors": [
{
"affiliation": null,
"fullName": "Jeffery Garae",
"givenName": "Jeffery",
"surname": "Garae",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ryan K. L. Ko",
"givenName": "Ryan K. L.",
"surname": "Ko",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mark Apperley",
"givenName": "Mark",
"surname": "Apperley",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "trustcom-bigdatase",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-08-01T00:00:00",
"pubType": "proceedings",
"pages": "639-650",
"year": "2018",
"issn": "2324-9013",
"isbn": "978-1-5386-4388-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "438801a633",
"articleId": "17D45XuDNFs",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "438801a651",
"articleId": "17D45Vw15wY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/mines/2011/4559/0/4559a411",
"title": "Network Security Situation Awareness Method Based on Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a411/12OmNBOCWt1",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3pgcic/2015/9473/0/9473a584",
"title": "Analysis of Techniques for Visualizing Security Risks and Threats",
"doi": null,
"abstractUrl": "/proceedings-article/3pgcic/2015/9473a584/12OmNBhHt5P",
"parentPublication": {
"id": "proceedings/3pgcic/2015/9473/0",
"title": "2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdp/2013/4939/0/4939a519",
"title": "Analytical Visualization Techniques for Security Information and Event Management",
"doi": null,
"abstractUrl": "/proceedings-article/pdp/2013/4939a519/12OmNrNh0ss",
"parentPublication": {
"id": "proceedings/pdp/2013/4939/0",
"title": "2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/07/08354901",
"title": "Task-Based Effectiveness of Basic Visualizations",
"doi": null,
"abstractUrl": "/journal/tg/2019/07/08354901/13rRUwd9CLU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/07/05963660",
"title": "Attention and Visual Memory in Visualization and Computer Graphics",
"doi": null,
"abstractUrl": "/journal/tg/2012/07/05963660/13rRUxBa5xf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2016/01/mcg2016010080",
"title": "Presentation-Oriented Visualization Techniques",
"doi": null,
"abstractUrl": "/magazine/cg/2016/01/mcg2016010080/13rRUygBw24",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06007132",
"title": "A Survey of Visualization Systems for Network Security",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06007132/13rRUygT7y9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2018/06/08617765",
"title": "A Novel Radial Visualization of Intrusion Detection Alerts",
"doi": null,
"abstractUrl": "/magazine/cg/2018/06/08617765/17D45Vw15tt",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/01/08809850",
"title": "Discriminability Tests for Visualization Effectiveness and Scalability",
"doi": null,
"abstractUrl": "/journal/tg/2020/01/08809850/1cHEkrFpU76",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vis/2020/8014/0/801400a141",
"title": "Improving Engagement of Animated Visualization with Visual Foreshadowing",
"doi": null,
"abstractUrl": "/proceedings-article/vis/2020/801400a141/1qRNNrMSIrm",
"parentPublication": {
"id": "proceedings/vis/2020/8014/0",
"title": "2020 IEEE Visualization Conference (VIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx2QUDD",
"title": "2015 International Conference on 3D Vision (3DV)",
"acronym": "3dv",
"groupId": "1800494",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrAMEVf",
"doi": "10.1109/3DV.2015.37",
"title": "3D Surface Reconstruction from Point-and-Line Cloud",
"normalizedTitle": "3D Surface Reconstruction from Point-and-Line Cloud",
"abstract": "We present a method for reconstructing 3D surface as triangular meshes from imagery. The surface reconstruction requires 3D point cloud for composing vertices of triangle meshes. A standard approach uses incremental structure from motion (SfM) to obtain camera poses and sparse 3D point cloud that are given based on 2D key-point matching. As the 3D surface directly reconstructed from the sparse 3D point cloud often lack detail of objects, multiple-view stereo (MVS) is commonly used to generate dense 3D point cloud. A known problem with the densification is that MVS generates many small patches even for planar flat objects that degrade the quality of surface model. Using dense 3D point cloud also requires high memory capacity for visualization. In this work, we propose to reconstruct 3D surface using sparse 3D point cloud generated by SfM and 3D line segments (3D line cloud) computed from multiple views since these two elements can complement well for representing man-made structures. The proposed method extends the tetrahedra-carving method as it can use 3D point-and-line cloud under the global optimization framework. We demonstrate that the proposed method can efficiently produce surface models whose quality are at least as good as the baseline method using dense 3D point cloud.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a method for reconstructing 3D surface as triangular meshes from imagery. The surface reconstruction requires 3D point cloud for composing vertices of triangle meshes. A standard approach uses incremental structure from motion (SfM) to obtain camera poses and sparse 3D point cloud that are given based on 2D key-point matching. As the 3D surface directly reconstructed from the sparse 3D point cloud often lack detail of objects, multiple-view stereo (MVS) is commonly used to generate dense 3D point cloud. A known problem with the densification is that MVS generates many small patches even for planar flat objects that degrade the quality of surface model. Using dense 3D point cloud also requires high memory capacity for visualization. In this work, we propose to reconstruct 3D surface using sparse 3D point cloud generated by SfM and 3D line segments (3D line cloud) computed from multiple views since these two elements can complement well for representing man-made structures. The proposed method extends the tetrahedra-carving method as it can use 3D point-and-line cloud under the global optimization framework. We demonstrate that the proposed method can efficiently produce surface models whose quality are at least as good as the baseline method using dense 3D point cloud.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a method for reconstructing 3D surface as triangular meshes from imagery. The surface reconstruction requires 3D point cloud for composing vertices of triangle meshes. A standard approach uses incremental structure from motion (SfM) to obtain camera poses and sparse 3D point cloud that are given based on 2D key-point matching. As the 3D surface directly reconstructed from the sparse 3D point cloud often lack detail of objects, multiple-view stereo (MVS) is commonly used to generate dense 3D point cloud. A known problem with the densification is that MVS generates many small patches even for planar flat objects that degrade the quality of surface model. Using dense 3D point cloud also requires high memory capacity for visualization. In this work, we propose to reconstruct 3D surface using sparse 3D point cloud generated by SfM and 3D line segments (3D line cloud) computed from multiple views since these two elements can complement well for representing man-made structures. The proposed method extends the tetrahedra-carving method as it can use 3D point-and-line cloud under the global optimization framework. We demonstrate that the proposed method can efficiently produce surface models whose quality are at least as good as the baseline method using dense 3D point cloud.",
"fno": "8332a264",
"keywords": [
"Three Dimensional Displays",
"Surface Reconstruction",
"Image Reconstruction",
"Image Segmentation",
"Cameras",
"Solid Modeling",
"Robustness",
"Multiple View Stereo",
"Surface Reconstruction",
"3 D Line Reconstruction",
"Structure From Motion"
],
"authors": [
{
"affiliation": null,
"fullName": "Takayuki Sugiura",
"givenName": "Takayuki",
"surname": "Sugiura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Akihiko Torii",
"givenName": "Akihiko",
"surname": "Torii",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Masatoshi Okutomi",
"givenName": "Masatoshi",
"surname": "Okutomi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-10-01T00:00:00",
"pubType": "proceedings",
"pages": "264-272",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-8332-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "8332a256",
"articleId": "12OmNyRPgQm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "8332a273",
"articleId": "12OmNxw5BqS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2015/8391/0/8391a846",
"title": "Photogeometric Scene Flow for High-Detail Dynamic 3D Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2015/8391a846/12OmNAtst5T",
"parentPublication": {
"id": "proceedings/iccv/2015/8391/0",
"title": "2015 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvri/2011/0054/0/05759630",
"title": "Over-parameterized method on variational surface for point-based reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/isvri/2011/05759630/12OmNBhpS7O",
"parentPublication": {
"id": "proceedings/isvri/2011/0054/0",
"title": "2011 IEEE International Symposium on VR Innovation (ISVRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2015/9711/0/5720a157",
"title": "Incremental Division of Very Large Point Clouds for Scalable 3D Surface Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2015/5720a157/12OmNvT2p0I",
"parentPublication": {
"id": "proceedings/iccvw/2015/9711/0",
"title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460427",
"title": "Shape reconstruction with globally-optimized surface point selection",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460427/12OmNwtEEGb",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2016/8851/0/8851f479",
"title": "Just Look at the Image: Viewpoint-Specific Surface Normal Prediction for Improved Multi-View Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851f479/12OmNzvQI3W",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600g260",
"title": "Critical Regularizations for Neural Surface Reconstruction in the Wild",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600g260/1H0LoryuKRy",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09992129",
"title": "Line-Based 3D Building Abstraction and Polygonal Surface Reconstruction From Images",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09992129/1JevCrH10vS",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2019/3131/0/313100a553",
"title": "Surface Reconstruction from 3D Line Segments",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2019/313100a553/1ezRDwCMQNO",
"parentPublication": {
"id": "proceedings/3dv/2019/3131/0",
"title": "2019 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmcce/2020/2314/0/231400c102",
"title": "Weld Surface Imperfection Detection by 3D Reconstruction of Laser Displacement Sensing",
"doi": null,
"abstractUrl": "/proceedings-article/icmcce/2020/231400c102/1tzyHQxsPjG",
"parentPublication": {
"id": "proceedings/icmcce/2020/2314/0",
"title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/11/09555381",
"title": "SurRF: Unsupervised Multi-View Stereopsis by Learning Surface Radiance Field",
"doi": null,
"abstractUrl": "/journal/tp/2022/11/09555381/1xjQQdQGABG",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCbCrVT",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrIaems",
"doi": "10.1109/CVPR.2014.293",
"title": "Robust Surface Reconstruction via Triple Sparsity",
"normalizedTitle": "Robust Surface Reconstruction via Triple Sparsity",
"abstract": "Reconstructing a surface/image from corrupted gradient fields is a crucial step in many imaging applications where a gradient field is subject to both noise and unlocalized outliers, resulting typically in a non-integrable field. We present in this paper a new optimization method for robust surface reconstruction. The proposed formulation is based on a triple sparsity prior: a sparse prior on the residual gradient field and a double sparse prior on the surface gradients. We develop an efficient alternate minimization strategy to solve the proposed optimization problem. The method is able to recover a good quality surface from severely corrupted gradients thanks to its ability to handle both noise and outliers. We demonstrate the performance of the proposed method on synthetic and real data. Experiments show that the proposed solution outperforms some existing methods in the three possible cases: noise only, outliers only and mixed noise/outliers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Reconstructing a surface/image from corrupted gradient fields is a crucial step in many imaging applications where a gradient field is subject to both noise and unlocalized outliers, resulting typically in a non-integrable field. We present in this paper a new optimization method for robust surface reconstruction. The proposed formulation is based on a triple sparsity prior: a sparse prior on the residual gradient field and a double sparse prior on the surface gradients. We develop an efficient alternate minimization strategy to solve the proposed optimization problem. The method is able to recover a good quality surface from severely corrupted gradients thanks to its ability to handle both noise and outliers. We demonstrate the performance of the proposed method on synthetic and real data. Experiments show that the proposed solution outperforms some existing methods in the three possible cases: noise only, outliers only and mixed noise/outliers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Reconstructing a surface/image from corrupted gradient fields is a crucial step in many imaging applications where a gradient field is subject to both noise and unlocalized outliers, resulting typically in a non-integrable field. We present in this paper a new optimization method for robust surface reconstruction. The proposed formulation is based on a triple sparsity prior: a sparse prior on the residual gradient field and a double sparse prior on the surface gradients. We develop an efficient alternate minimization strategy to solve the proposed optimization problem. The method is able to recover a good quality surface from severely corrupted gradients thanks to its ability to handle both noise and outliers. We demonstrate the performance of the proposed method on synthetic and real data. Experiments show that the proposed solution outperforms some existing methods in the three possible cases: noise only, outliers only and mixed noise/outliers.",
"fno": "5118c291",
"keywords": [
"Noise",
"Surface Reconstruction",
"Image Reconstruction",
"Robustness",
"Noise Measurement",
"Estimation",
"Optimization",
"Non Convex Regularization",
"Sparsity",
"Surface Reconstruction"
],
"authors": [
{
"affiliation": null,
"fullName": "Hicham Badri",
"givenName": "Hicham",
"surname": "Badri",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hussein Yahia",
"givenName": "Hussein",
"surname": "Yahia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Driss Aboutajdine",
"givenName": "Driss",
"surname": "Aboutajdine",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-06-01T00:00:00",
"pubType": "proceedings",
"pages": "2291-2298",
"year": "2014",
"issn": "1063-6919",
"isbn": "978-1-4799-5118-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5118c283",
"articleId": "12OmNAo45HL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5118c299",
"articleId": "12OmNscOUiy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ccgrid/2014/2784/0/2784a828",
"title": "A Robust and Fast Reconstruction Framework for Noisy and Large Point Cloud Data",
"doi": null,
"abstractUrl": "/proceedings-article/ccgrid/2014/2784a828/12OmNAo45FY",
"parentPublication": {
"id": "proceedings/ccgrid/2014/2784/0",
"title": "2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dpvt/2006/2825/0/04155754",
"title": "Beyond Silhouettes: Surface Reconstruction Using Multi-Flash Photography",
"doi": null,
"abstractUrl": "/proceedings-article/3dpvt/2006/04155754/12OmNBa2iEF",
"parentPublication": {
"id": "proceedings/3dpvt/2006/2825/0",
"title": "Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2009/3992/0/05206603",
"title": "Enforcing integrability by error correction using ℓ<inf>1</inf>-minimization",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206603/12OmNC4eSCE",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2009/4420/0/05459403",
"title": "Template-free monocular reconstruction of deformable surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2009/05459403/12OmNqJHFsI",
"parentPublication": {
"id": "proceedings/iccv/2009/4420/0",
"title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2011/0063/0/06130251",
"title": "Classification and reconstruction of surfaces from point clouds of man-made objects",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2011/06130251/12OmNwErpEP",
"parentPublication": {
"id": "proceedings/iccvw/2011/0063/0",
"title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cad-graphics/2013/2576/0/06814976",
"title": "TV-L1 Optimization for B-Spline Surface Reconstruction with Sharp Features",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2013/06814976/12OmNyrZLDi",
"parentPublication": {
"id": "proceedings/cad-graphics/2013/2576/0",
"title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cad-graphics/2013/2576/0/06814975",
"title": "Robust Surface Consolidation of Scanned Thick Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2013/06814975/12OmNzgNXQG",
"parentPublication": {
"id": "proceedings/cad-graphics/2013/2576/0",
"title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2016/5407/0/5407a118",
"title": "Point Cloud Noise and Outlier Removal for Image-Based 3D Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2016/5407a118/12OmNzsrwoo",
"parentPublication": {
"id": "proceedings/3dv/2016/5407/0",
"title": "2016 Fourth International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1512",
"title": "Efficient Surface Reconstruction using Generalized Coulomb Potentials",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1512/13rRUy3xY84",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2019/3131/0/313100a553",
"title": "Surface Reconstruction from 3D Line Segments",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2019/313100a553/1ezRDwCMQNO",
"parentPublication": {
"id": "proceedings/3dv/2019/3131/0",
"title": "2019 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1BmEezmpGrm",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"acronym": "iccv",
"groupId": "1000149",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1BmLppICsyA",
"doi": "10.1109/ICCV48922.2021.01275",
"title": "Planar Surface Reconstruction from Sparse Views",
"normalizedTitle": "Planar Surface Reconstruction from Sparse Views",
"abstract": "The paper studies planar surface reconstruction of indoor scenes from two views with unknown camera poses. While prior approaches have successfully created object-centric reconstructions of many scenes, they fail to exploit other structures, such as planes, which are typically the dominant components of indoor scenes. In this paper, we re-construct planar surfaces from multiple views, while jointly estimating camera pose. Our experiments demonstrate that our method is able to advance the state of the art of re-construction from sparse views, on challenging scenes from Matterport3D.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper studies planar surface reconstruction of indoor scenes from two views with unknown camera poses. While prior approaches have successfully created object-centric reconstructions of many scenes, they fail to exploit other structures, such as planes, which are typically the dominant components of indoor scenes. In this paper, we re-construct planar surfaces from multiple views, while jointly estimating camera pose. Our experiments demonstrate that our method is able to advance the state of the art of re-construction from sparse views, on challenging scenes from Matterport3D.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper studies planar surface reconstruction of indoor scenes from two views with unknown camera poses. While prior approaches have successfully created object-centric reconstructions of many scenes, they fail to exploit other structures, such as planes, which are typically the dominant components of indoor scenes. In this paper, we re-construct planar surfaces from multiple views, while jointly estimating camera pose. Our experiments demonstrate that our method is able to advance the state of the art of re-construction from sparse views, on challenging scenes from Matterport3D.",
"fno": "281200m2971",
"keywords": [
"Surface Reconstruction",
"Computer Vision",
"Cameras",
"3 D From A Single Image And Shape From X",
"Scene Analysis And Understanding"
],
"authors": [
{
"affiliation": "University of Michigan",
"fullName": "Linyi Jin",
"givenName": "Linyi",
"surname": "Jin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Shengyi Qian",
"givenName": "Shengyi",
"surname": "Qian",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "Andrew Owens",
"givenName": "Andrew",
"surname": "Owens",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Michigan",
"fullName": "David F. Fouhey",
"givenName": "David F.",
"surname": "Fouhey",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "12971-12980",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-2812-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "281200m2961",
"articleId": "1BmLg0pvmeI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "281200m2981",
"articleId": "1BmL8RNtcbu",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2014/5118/0/5118a628",
"title": "Piecewise Planar and Compact Floorplan Reconstruction from Images",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2014/5118a628/12OmNrJ11yx",
"parentPublication": {
"id": "proceedings/cvpr/2014/5118/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2001/1143/1/00937572",
"title": "Projective structure and motion from two views of a piecewise planar scene",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2001/00937572/12OmNvjyxvs",
"parentPublication": {
"id": "proceedings/iccv/2001/1143/1",
"title": "Computer Vision, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2010/6984/0/05539804",
"title": "Piecewise planar and non-planar stereo for urban scene reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2010/05539804/12OmNwlZu1R",
"parentPublication": {
"id": "proceedings/cvpr/2010/6984/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/189P2A39",
"title": "Schematic surface reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/189P2A39/12OmNyNzhy9",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2017/2610/0/261001a667",
"title": "Matterport3D: Learning from RGB-D Data in Indoor Environments",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2017/261001a667/12OmNywxlOg",
"parentPublication": {
"id": "proceedings/3dv/2017/2610/0",
"title": "2017 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2007/01/04016561",
"title": "Variational Surface Interpolation from Sparse Point and Normal Data",
"doi": null,
"abstractUrl": "/journal/tp/2007/01/04016561/13rRUy3xY9a",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2018/8425/0/842500a616",
"title": "Multi-planar Monocular Reconstruction of Manhattan Indoor Scenes",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2018/842500a616/17D45XvMcbo",
"parentPublication": {
"id": "proceedings/3dv/2018/8425/0",
"title": "2018 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600m2882",
"title": "Dense Depth Priors for Neural Radiance Fields from Sparse Input Views",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600m2882/1H0Nhx2wMqQ",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2019/3131/0/313100a553",
"title": "Surface Reconstruction from 3D Line Segments",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2019/313100a553/1ezRDwCMQNO",
"parentPublication": {
"id": "proceedings/3dv/2019/3131/0",
"title": "2019 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800a494",
"title": "Data-Driven 3D Reconstruction of Dressed Humans From Sparse Views",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800a494/1zWE8lvtPIA",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1gyr6w5YIIU",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1gyrJvG8Kt2",
"doi": "10.1109/CVPR.2019.01037",
"title": "Deep Geometric Prior for Surface Reconstruction",
"normalizedTitle": "Deep Geometric Prior for Surface Reconstruction",
"abstract": "The reconstruction of a discrete surface from a point cloud is a fundamental geometry processing problem that has been studied for decades, with many methods developed. We propose the use of a deep neural network as a geometric prior for surface reconstruction. Specifically, we overfit a neural network representing a local chart parameterization to part of an input point cloud using the Wasserstein distance as a measure of approximation. By jointly fitting many such networks to overlapping parts of the point cloud, while enforcing a consistency condition, we compute a manifold atlas. By sampling this atlas, we can produce a dense reconstruction of the surface approximating the input cloud. The entire procedure does not require any training data or explicit regularization, yet, we show that it is able to perform remarkably well: not introducing typical overfitting artifacts, and approximating sharp features closely at the same time. We experimentally show that this geometric prior produces good results for both man-made objects containing sharp features and smoother organic objects, as well as noisy inputs. We compare our method with a number of well-known reconstruction methods on a standard surface reconstruction benchmark.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The reconstruction of a discrete surface from a point cloud is a fundamental geometry processing problem that has been studied for decades, with many methods developed. We propose the use of a deep neural network as a geometric prior for surface reconstruction. Specifically, we overfit a neural network representing a local chart parameterization to part of an input point cloud using the Wasserstein distance as a measure of approximation. By jointly fitting many such networks to overlapping parts of the point cloud, while enforcing a consistency condition, we compute a manifold atlas. By sampling this atlas, we can produce a dense reconstruction of the surface approximating the input cloud. The entire procedure does not require any training data or explicit regularization, yet, we show that it is able to perform remarkably well: not introducing typical overfitting artifacts, and approximating sharp features closely at the same time. We experimentally show that this geometric prior produces good results for both man-made objects containing sharp features and smoother organic objects, as well as noisy inputs. We compare our method with a number of well-known reconstruction methods on a standard surface reconstruction benchmark.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The reconstruction of a discrete surface from a point cloud is a fundamental geometry processing problem that has been studied for decades, with many methods developed. We propose the use of a deep neural network as a geometric prior for surface reconstruction. Specifically, we overfit a neural network representing a local chart parameterization to part of an input point cloud using the Wasserstein distance as a measure of approximation. By jointly fitting many such networks to overlapping parts of the point cloud, while enforcing a consistency condition, we compute a manifold atlas. By sampling this atlas, we can produce a dense reconstruction of the surface approximating the input cloud. The entire procedure does not require any training data or explicit regularization, yet, we show that it is able to perform remarkably well: not introducing typical overfitting artifacts, and approximating sharp features closely at the same time. We experimentally show that this geometric prior produces good results for both man-made objects containing sharp features and smoother organic objects, as well as noisy inputs. We compare our method with a number of well-known reconstruction methods on a standard surface reconstruction benchmark.",
"fno": "329300k0122",
"keywords": [
"Computational Geometry",
"Computer Graphics",
"Image Reconstruction",
"Neural Nets",
"Discrete Surface",
"Geometry Processing Problem",
"Deep Neural Network",
"Local Chart Parameterization",
"Wasserstein Distance",
"Manifold Atlas",
"Sharp Features",
"Noisy Inputs",
"Surface Reconstruction",
"Deep Geometric Prior",
"Point Cloud",
"Point Cloud Compression",
"Surface Reconstruction",
"Neural Networks",
"Training Data",
"Reconstruction Algorithms",
"Surface Fitting",
"Pattern Recognition",
"Vision Graphics",
"Deep Learning",
"RGBD Sensors And Analytics"
],
"authors": [
{
"affiliation": "New York Univ.",
"fullName": "Francis Williams",
"givenName": "Francis",
"surname": "Williams",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU Courant Institute",
"fullName": "Teseo Schneider",
"givenName": "Teseo",
"surname": "Schneider",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU",
"fullName": "Claudio Silva",
"givenName": "Claudio",
"surname": "Silva",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "New York Univ.",
"fullName": "Denis Zorin",
"givenName": "Denis",
"surname": "Zorin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Courant Institute of Mathematical Sciences, NYU",
"fullName": "Joan Bruna",
"givenName": "Joan",
"surname": "Bruna",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NYU",
"fullName": "Daniele Panozzo",
"givenName": "Daniele",
"surname": "Panozzo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-06-01T00:00:00",
"pubType": "proceedings",
"pages": "10122-10131",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-3293-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "329300k0113",
"articleId": "1gyrrnTVbUY",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "329300k0132",
"articleId": "1gyrRYYyxDq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2012/1226/0/189P2A39",
"title": "Schematic surface reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/189P2A39/12OmNyNzhy9",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsa/2009/3701/0/3701a198",
"title": "Shape-Sensitive Surface Reconstruction for Low-Resolution Point-Cloud Models",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2009/3701a198/12OmNyvGyks",
"parentPublication": {
"id": "proceedings/iccsa/2009/3701/0",
"title": "2009 International Conference on Computational Science and Its Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200k0438",
"title": "Temporally-Coherent Surface Reconstruction via Metric-Consistent Atlases",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200k0438/1BmGZjgvrDW",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09839681",
"title": "SSRNet: Scalable 3D Surface Reconstruction Network",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09839681/1FisL8u19du",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600g292",
"title": "POCO: Point Convolution for Surface Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600g292/1H0KAZrauEo",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600g260",
"title": "Critical Regularizations for Neural Surface Reconstruction in the Wild",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600g260/1H0LoryuKRy",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600g316",
"title": "Surface Reconstruction from Point Clouds by Learning Predictive Context Priors",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600g316/1H1i9njU6l2",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956560",
"title": "Deep Surface Reconstruction from Point Clouds with Visibility Information",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956560/1IHoCvW3I8U",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/10093999",
"title": "ANISE: Assembly-based Neural Implicit Surface rEconstruction",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/10093999/1M80HueHnJS",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2021/2688/0/268800b432",
"title": "Efficiently Distributed Watertight Surface Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2021/268800b432/1zWE7llklAA",
"parentPublication": {
"id": "proceedings/3dv/2021/2688/0",
"title": "2021 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1lPGXn8hEiI",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1lPHarhatd6",
"doi": "10.1109/CVPRW50498.2020.00144",
"title": "Geometry to the Rescue: 3D Instance Reconstruction from a Cluttered Scene",
"normalizedTitle": "Geometry to the Rescue: 3D Instance Reconstruction from a Cluttered Scene",
"abstract": "3D object instance reconstruction from a cluttered 2D scene image is an ill-posed problem. The main challenge is posed by the lack of geometric information in color images and heavy occlusions that lead to incomplete shape details. To deal with this problem, existing works on 3D instance reconstruction directly learn the mapping between the intensity image and the corresponding 3D volume model. Different from these works, we propose to explicitly incorporate 2.5D geometric cues, such as the surface normal, relative depth, and height, while generating full 3D shapes from 2D images. With an intermediate step focused on estimating these 2.5D geometric features, we propose a novel convolutional neural network design that progressively moves from 2D to full 3D estimation. Our model automatically generates instance-specific surface normal maps, relative depth, and height that are compactly encoded within our network design and consequently used to improve the 3D instance reconstruction. Our experimental results on the large-scale synthetic SUNCG dataset and the real-world NYU depth v2 dataset demonstrate the effectiveness of the proposed approach where it beats the state-of-the-art Factored3D network [15].",
"abstracts": [
{
"abstractType": "Regular",
"content": "3D object instance reconstruction from a cluttered 2D scene image is an ill-posed problem. The main challenge is posed by the lack of geometric information in color images and heavy occlusions that lead to incomplete shape details. To deal with this problem, existing works on 3D instance reconstruction directly learn the mapping between the intensity image and the corresponding 3D volume model. Different from these works, we propose to explicitly incorporate 2.5D geometric cues, such as the surface normal, relative depth, and height, while generating full 3D shapes from 2D images. With an intermediate step focused on estimating these 2.5D geometric features, we propose a novel convolutional neural network design that progressively moves from 2D to full 3D estimation. Our model automatically generates instance-specific surface normal maps, relative depth, and height that are compactly encoded within our network design and consequently used to improve the 3D instance reconstruction. Our experimental results on the large-scale synthetic SUNCG dataset and the real-world NYU depth v2 dataset demonstrate the effectiveness of the proposed approach where it beats the state-of-the-art Factored3D network [15].",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "3D object instance reconstruction from a cluttered 2D scene image is an ill-posed problem. The main challenge is posed by the lack of geometric information in color images and heavy occlusions that lead to incomplete shape details. To deal with this problem, existing works on 3D instance reconstruction directly learn the mapping between the intensity image and the corresponding 3D volume model. Different from these works, we propose to explicitly incorporate 2.5D geometric cues, such as the surface normal, relative depth, and height, while generating full 3D shapes from 2D images. With an intermediate step focused on estimating these 2.5D geometric features, we propose a novel convolutional neural network design that progressively moves from 2D to full 3D estimation. Our model automatically generates instance-specific surface normal maps, relative depth, and height that are compactly encoded within our network design and consequently used to improve the 3D instance reconstruction. Our experimental results on the large-scale synthetic SUNCG dataset and the real-world NYU depth v2 dataset demonstrate the effectiveness of the proposed approach where it beats the state-of-the-art Factored3D network [15].",
"fno": "09150931",
"keywords": [
"Convolutional Neural Nets",
"Feature Extraction",
"Image Colour Analysis",
"Image Reconstruction",
"Image Representation",
"Image Segmentation",
"Learning Artificial Intelligence",
"Object Detection",
"Object Recognition",
"3 D Instance Reconstruction",
"Cluttered Scene",
"3 D Object Instance Reconstruction",
"Cluttered 2 D Scene Image",
"Color Images",
"Intensity Image",
"3 D Volume Model",
"2 5 D Geometric Cues",
"2 5 D Geometric Features",
"Instance Specific Surface Normal Maps",
"NYU Depth V 2 Dataset",
"Factored 3 D Network",
"Three Dimensional Displays",
"Surface Reconstruction",
"Shape",
"Estimation",
"Image Reconstruction",
"Two Dimensional Displays",
"Training"
],
"authors": [
{
"affiliation": "ANU,Data61-CSIRO",
"fullName": "Lin Li",
"givenName": "Lin",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ANU,IIAI",
"fullName": "Salman Khan",
"givenName": "Salman",
"surname": "Khan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "ANU",
"fullName": "Nick Barnes",
"givenName": "Nick",
"surname": "Barnes",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1098-1104",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9360-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09150798",
"articleId": "1lPHccK5vfG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09150750",
"articleId": "1lPH7Uy2hqw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2017/0457/0/0457f632",
"title": "3D Bounding Box Estimation Using Deep Learning and Geometry",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2017/0457f632/12OmNvHY2HD",
"parentPublication": {
"id": "proceedings/cvpr/2017/0457/0",
"title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2018/03/07889053",
"title": "Single-View 3D Scene Reconstruction and Parsing by Attribute Grammar",
"doi": null,
"abstractUrl": "/journal/tp/2018/03/07889053/13rRUwdrdM2",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2018/8425/0/842500a426",
"title": "Adversarial Semantic Scene Completion from a Single Depth Image",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2018/842500a426/17D45W9KVHL",
"parentPublication": {
"id": "proceedings/3dv/2018/8425/0",
"title": "2018 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000d559",
"title": "3D-RCNN: Instance-Level 3D Object Reconstruction via Render-and-Compare",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000d559/17D45W9KVIT",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000e681",
"title": "Geometry-Aware Network for Non-rigid Shape Prediction from a Single View",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000e681/17D45Xi9rWS",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300d995",
"title": "Multi-View PointNet for 3D Scene Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300d995/1i5mnjNhmYU",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300c080",
"title": "Silhouette-Assisted 3D Object Instance Reconstruction from a Cluttered Scene",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300c080/1i5mva7fXQ4",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800a528",
"title": "Front2Back: Single View 3D Shape Reconstruction via Front to Back Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800a528/1m3ndb0mGI0",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2022/06/09294112",
"title": "Geometry-Aware Generation of Adversarial Point Clouds",
"doi": null,
"abstractUrl": "/journal/tp/2022/06/09294112/1pA8gc6H8dO",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900e606",
"title": "RfD-Net: Point Scene Understanding by Semantic Instance Reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900e606/1yeIJqzXldK",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNC1GueH",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"acronym": "icpr",
"groupId": "1000545",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqFrGAA",
"doi": "",
"title": "A hierarchical approach to high-quality partial shape registration",
"normalizedTitle": "A hierarchical approach to high-quality partial shape registration",
"abstract": "This paper presents a feature-driven, hierarchical shape registration algorithm. The central idea is to generate correspondences in multiple levels in a coarse-to-fine manner, with additional features incrementally inserted in each level. The registration starts from the coarsest resolution. Registration results obtained in one level serve as references for the registration in the next level. We adopt the heat kernel coordinates [3] for local shape parameterization, giving rise to a complete solution capable of registering partial shapes undergoing isometric deformation with higher accuracy. Through experiments, we demonstrate the effectiveness of this multi-resolution method and its advantages over the single-resolution method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a feature-driven, hierarchical shape registration algorithm. The central idea is to generate correspondences in multiple levels in a coarse-to-fine manner, with additional features incrementally inserted in each level. The registration starts from the coarsest resolution. Registration results obtained in one level serve as references for the registration in the next level. We adopt the heat kernel coordinates [3] for local shape parameterization, giving rise to a complete solution capable of registering partial shapes undergoing isometric deformation with higher accuracy. Through experiments, we demonstrate the effectiveness of this multi-resolution method and its advantages over the single-resolution method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a feature-driven, hierarchical shape registration algorithm. The central idea is to generate correspondences in multiple levels in a coarse-to-fine manner, with additional features incrementally inserted in each level. The registration starts from the coarsest resolution. Registration results obtained in one level serve as references for the registration in the next level. We adopt the heat kernel coordinates [3] for local shape parameterization, giving rise to a complete solution capable of registering partial shapes undergoing isometric deformation with higher accuracy. Through experiments, we demonstrate the effectiveness of this multi-resolution method and its advantages over the single-resolution method.",
"fno": "06460085",
"keywords": [
"Image Registration",
"Image Resolution",
"Shape Recognition",
"High Quality Partial Shape Registration",
"Hierarchical Shape Registration Algorithm",
"Coarse To Fine Manner",
"Local Shape Parameterization",
"Isometric Deformation",
"Multi Resolution Method",
"Shape",
"Kernel",
"Feature Extraction",
"Heat Recovery",
"Computer Graphics",
"Educational Institutions"
],
"authors": [
{
"affiliation": "Department of Computer Science, Stony Brook University",
"fullName": "Ming Zhong",
"givenName": "Ming",
"surname": "Zhong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Stony Brook University",
"fullName": "Tingbo Hou",
"givenName": "Tingbo",
"surname": "Hou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Stony Brook University",
"fullName": "Qin Hong",
"givenName": "Qin",
"surname": "Hong",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-11-01T00:00:00",
"pubType": "proceedings",
"pages": "113-116",
"year": "2012",
"issn": "1051-4651",
"isbn": "978-1-4673-2216-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06460083",
"articleId": "12OmNy7yEeZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06460086",
"articleId": "12OmNBLdKGn",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icetet/2009/3884/0/pid984378",
"title": "Application of Steerable Wavelets in Medical Image Registration",
"doi": null,
"abstractUrl": "/proceedings-article/icetet/2009/pid984378/12OmNAOKnP1",
"parentPublication": {
"id": "proceedings/icetet/2009/3884/0",
"title": "Emerging Trends in Engineering & Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2011/9140/0/05771410",
"title": "Sparse shape registration for occluded facial feature localization",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2011/05771410/12OmNAWYKIJ",
"parentPublication": {
"id": "proceedings/fg/2011/9140/0",
"title": "Face and Gesture 2011",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2004/2158/1/01315046",
"title": "Wavelet-based hierarchical surface approximation from height fields",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2004/01315046/12OmNAkWvfd",
"parentPublication": {
"id": "proceedings/cvpr/2004/2158/1",
"title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2016/1437/0/1437a549",
"title": "Population Shape Collapse in Large Deformation Registration of MR Brain Images",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2016/1437a549/12OmNBc1uxU",
"parentPublication": {
"id": "proceedings/cvprw/2016/1437/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2009/4442/0/05457483",
"title": "Complex 3D shape recovery using hybrid geometric shape features in a hierarchical shape segmentation approach",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2009/05457483/12OmNBqv2lG",
"parentPublication": {
"id": "proceedings/iccvw/2009/4442/0",
"title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crv/2011/4362/0/4362a212",
"title": "Elastic Shape Registration Using an Incremental Free Form Deformation Approach with the ICP Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2011/4362a212/12OmNCfSqOt",
"parentPublication": {
"id": "proceedings/crv/2011/4362/0",
"title": "2011 Canadian Conference on Computer and Robot Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2009/3992/0/05206854",
"title": "Shape evolution for rigid and nonrigid shape registration and recovery",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206854/12OmNwx3Qag",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2009/3992/0/05206598",
"title": "Shape comparison using perturbing shape registration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206598/12OmNzaQodu",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06060815",
"title": "Robust Dense Registration of Partial Nonrigid Shapes",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06060815/13rRUxASu0I",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09729524",
"title": "Unsupervised Category-Specific Partial Point Set Registration via Joint Shape Completion and Registration",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09729524/1Bya8dlokw0",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvRU0ld",
"title": "Education Technology and Computer Science, International Workshop on",
"acronym": "etcs",
"groupId": "1002740",
"volume": "2",
"displayVolume": "2",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvSKO2Z",
"doi": "10.1109/ETCS.2010.257",
"title": "A Nonrigid Image Registration Approach Based on Cooperative Game Among Pixels",
"normalizedTitle": "A Nonrigid Image Registration Approach Based on Cooperative Game Among Pixels",
"abstract": "After represent the deformation as a field of discrete displacements, nonrigid image registration problem can be considered as a maximum a posteriori inference problem in Markov random field, which can be optimized using pairwise Gibbs energy minimization technique. To find a minimum, we model the registration problem as a game among pixels, propose a novel approach for nonrigid image registration based on cooperative game theory, and design a deterministic optimization algorithm. During the game, each pixel tries to form a coalition with its neighbors, and choose a displacement to maximize its own payoff and the coalitional payoff. Registration is achieved by an iterative process. The novel approach can register any complicated deformation robust. Experimental results show that the cooperative game-theoretic approach for nonrigid image registration is feasible and effective.",
"abstracts": [
{
"abstractType": "Regular",
"content": "After represent the deformation as a field of discrete displacements, nonrigid image registration problem can be considered as a maximum a posteriori inference problem in Markov random field, which can be optimized using pairwise Gibbs energy minimization technique. To find a minimum, we model the registration problem as a game among pixels, propose a novel approach for nonrigid image registration based on cooperative game theory, and design a deterministic optimization algorithm. During the game, each pixel tries to form a coalition with its neighbors, and choose a displacement to maximize its own payoff and the coalitional payoff. Registration is achieved by an iterative process. The novel approach can register any complicated deformation robust. Experimental results show that the cooperative game-theoretic approach for nonrigid image registration is feasible and effective.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "After represent the deformation as a field of discrete displacements, nonrigid image registration problem can be considered as a maximum a posteriori inference problem in Markov random field, which can be optimized using pairwise Gibbs energy minimization technique. To find a minimum, we model the registration problem as a game among pixels, propose a novel approach for nonrigid image registration based on cooperative game theory, and design a deterministic optimization algorithm. During the game, each pixel tries to form a coalition with its neighbors, and choose a displacement to maximize its own payoff and the coalitional payoff. Registration is achieved by an iterative process. The novel approach can register any complicated deformation robust. Experimental results show that the cooperative game-theoretic approach for nonrigid image registration is feasible and effective.",
"fno": "3987b082",
"keywords": [
"Nonrigid Image Registration",
"Cooperative Game Theory",
"Markov Random Field",
"Maximum A Posteriori",
"Energy Minimization"
],
"authors": [
{
"affiliation": null,
"fullName": "Yuwu Yan",
"givenName": "Yuwu",
"surname": "Yan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jinmang Liu",
"givenName": "Jinmang",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoqiang Yao",
"givenName": "Xiaoqiang",
"surname": "Yao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yajun Sun",
"givenName": "Yajun",
"surname": "Sun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "etcs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-03-01T00:00:00",
"pubType": "proceedings",
"pages": "82-85",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3987-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3987b078",
"articleId": "12OmNBaBuUM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3987b086",
"articleId": "12OmNy6HQOy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/2010/4109/0/4109a185",
"title": "Estimating Nonrigid Shape Deformation Using Moments",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109a185/12OmNBbaH9p",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/180P2A30",
"title": "Structure and motion from scene registration",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/180P2A30/12OmNx7ouTk",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csie/2009/3507/6/3507f239",
"title": "A Hybrid Image Registration for Different Phases of Contrast Enhanced Liver CT Data",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507f239/12OmNxw5Bol",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lssa/2006/0277/0/04015815",
"title": "Fast Automatic Registration Algorithm for Large Microscopy Images",
"doi": null,
"abstractUrl": "/proceedings-article/lssa/2006/04015815/12OmNybfr6k",
"parentPublication": {
"id": "proceedings/lssa/2006/0277/0",
"title": "2006 IEEE/NLM Life Science Systems and Applications Workshop",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/01/ttp2011010158",
"title": "Video Registration Using Dynamic Textures",
"doi": null,
"abstractUrl": "/journal/tp/2011/01/ttp2011010158/13rRUwInvgm",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/2015/12/07010022",
"title": "VLSI-assisted nonrigid registration using modified demons algorithm",
"doi": null,
"abstractUrl": "/journal/si/2015/12/07010022/13rRUwh80Ay",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06060815",
"title": "Robust Dense Registration of Partial Nonrigid Shapes",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06060815/13rRUxASu0I",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2010/01/ttp2010010087",
"title": "Direct Estimation of Nonrigid Registrations with Image-Based Self-Occlusion Reasoning",
"doi": null,
"abstractUrl": "/journal/tp/2010/01/ttp2010010087/13rRUxNW20p",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/08/ttp2011081633",
"title": "Robust Point Set Registration Using Gaussian Mixture Models",
"doi": null,
"abstractUrl": "/journal/tp/2011/08/ttp2011081633/13rRUxjQycY",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2012/03/mcg2012030037",
"title": "Nonrigid-Deformation Recovery for 3D Face Recognition Using Multiscale Registration",
"doi": null,
"abstractUrl": "/magazine/cg/2012/03/mcg2012030037/13rRUy0ZzSd",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwdbV00",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"acronym": "cvpr",
"groupId": "1000147",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx7ouTk",
"doi": "10.1109/CVPR.2012.6247830",
"title": "Structure and motion from scene registration",
"normalizedTitle": "Structure and motion from scene registration",
"abstract": "We propose a method for estimating the 3D structure and the dense 3D motion (scene flow) of a dynamic nonrigid 3D scene, using a camera array. The core idea is to use a dense multi-camera array to construct a novel, dense 3D volumetric representation of the 3D space where each voxel holds an estimated intensity value and a confidence measure of this value. The problem of 3D structure and 3D motion estimation of a scene is thus reduced to a nonrigid registration of two volumes - hence the term ”Scene Registration”. Registering two dense 3D scalar volumes does not require recovering the 3D structure of the scene as a preprocessing step, nor does it require explicit reasoning about occlusions. From this nonrigid registration we accurately extract the 3D scene flow and the 3D structure of the scene, and successfully recover the sharp discontinuities in both time and space. We demonstrate the advantages of our method on a number of challenging synthetic and real data sets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We propose a method for estimating the 3D structure and the dense 3D motion (scene flow) of a dynamic nonrigid 3D scene, using a camera array. The core idea is to use a dense multi-camera array to construct a novel, dense 3D volumetric representation of the 3D space where each voxel holds an estimated intensity value and a confidence measure of this value. The problem of 3D structure and 3D motion estimation of a scene is thus reduced to a nonrigid registration of two volumes - hence the term ”Scene Registration”. Registering two dense 3D scalar volumes does not require recovering the 3D structure of the scene as a preprocessing step, nor does it require explicit reasoning about occlusions. From this nonrigid registration we accurately extract the 3D scene flow and the 3D structure of the scene, and successfully recover the sharp discontinuities in both time and space. We demonstrate the advantages of our method on a number of challenging synthetic and real data sets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We propose a method for estimating the 3D structure and the dense 3D motion (scene flow) of a dynamic nonrigid 3D scene, using a camera array. The core idea is to use a dense multi-camera array to construct a novel, dense 3D volumetric representation of the 3D space where each voxel holds an estimated intensity value and a confidence measure of this value. The problem of 3D structure and 3D motion estimation of a scene is thus reduced to a nonrigid registration of two volumes - hence the term ”Scene Registration”. Registering two dense 3D scalar volumes does not require recovering the 3D structure of the scene as a preprocessing step, nor does it require explicit reasoning about occlusions. From this nonrigid registration we accurately extract the 3D scene flow and the 3D structure of the scene, and successfully recover the sharp discontinuities in both time and space. We demonstrate the advantages of our method on a number of challenging synthetic and real data sets.",
"fno": "180P2A30",
"keywords": [
"Motion Estimation",
"Image Registration",
"3 D Scene Flow",
"Scene Registration",
"3 D Structure",
"Dense 3 D Motion",
"Dynamic Nonrigid 3 D Scene",
"Dense Multicamera Array",
"Dense 3 D Volumetric Representation",
"Intensity Value",
"Confidence Measure",
"3 D Motion Estimation",
"Nonrigid Registration",
"Dense 3 D Scalar Volumes",
"Cameras",
"Arrays",
"Estimation",
"Optical Imaging",
"Robustness",
"Atmospheric Measurements",
"Particle Measurements"
],
"authors": [
{
"affiliation": null,
"fullName": "W. Matusik",
"givenName": "W.",
"surname": "Matusik",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "A. Hornung",
"givenName": "A.",
"surname": "Hornung",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "S. Avidan",
"givenName": "S.",
"surname": "Avidan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "T. Basha",
"givenName": "T.",
"surname": "Basha",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1426-1433",
"year": "2012",
"issn": "1063-6919",
"isbn": "978-1-4673-1226-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "179P2A29",
"articleId": "12OmNzfXauF",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "181P2A31",
"articleId": "12OmNAsk4zp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/etcs/2010/3987/2/3987b082",
"title": "A Nonrigid Image Registration Approach Based on Cooperative Game Among Pixels",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987b082/12OmNvSKO2Z",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/2",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2011/0394/0/05995632",
"title": "Efficient groupwise non-rigid registration of textured surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2011/05995632/12OmNvzJG3q",
"parentPublication": {
"id": "proceedings/cvpr/2011/0394/0",
"title": "CVPR 2011",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dim/2003/1991/0/19910203",
"title": "Adaptive Enhancement of 3D Scenes using Hierarchical Registration of Texture-Mapped 3D models",
"doi": null,
"abstractUrl": "/proceedings-article/3dim/2003/19910203/12OmNwoPtBD",
"parentPublication": {
"id": "proceedings/3dim/2003/1991/0",
"title": "3D Digital Imaging and Modeling, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dicta/2010/4271/0/4271a546",
"title": "Sparse Update for Loopy Belief Propagation: Fast Dense Registration for Large State Spaces",
"doi": null,
"abstractUrl": "/proceedings-article/dicta/2010/4271a546/12OmNxvO07U",
"parentPublication": {
"id": "proceedings/dicta/2010/4271/0",
"title": "2010 International Conference on Digital Image Computing: Techniques and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csie/2009/3507/6/3507f239",
"title": "A Hybrid Image Registration for Different Phases of Contrast Enhanced Liver CT Data",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507f239/12OmNxw5Bol",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/crv/2009/3651/0/3651a252",
"title": "3D Modeling from Multiple Views with Integrated Registration and Data Fusion",
"doi": null,
"abstractUrl": "/proceedings-article/crv/2009/3651a252/12OmNzWx0ae",
"parentPublication": {
"id": "proceedings/crv/2009/3651/0",
"title": "2009 Canadian Conference on Computer and Robot Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/07/ttp2011071442",
"title": "Trajectory Space: A Dual Representation for Nonrigid Structure from Motion",
"doi": null,
"abstractUrl": "/journal/tp/2011/07/ttp2011071442/13rRUwI5U90",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06060815",
"title": "Robust Dense Registration of Partial Nonrigid Shapes",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06060815/13rRUxASu0I",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/08/ttp2011081633",
"title": "Robust Point Set Registration Using Gaussian Mixture Models",
"doi": null,
"abstractUrl": "/journal/tp/2011/08/ttp2011081633/13rRUxjQycY",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2001/11/i1330",
"title": "Tracking Nonrigid Motion and Structure from 2D Satellite Cloud Images without Correspondences",
"doi": null,
"abstractUrl": "/journal/tp/2001/11/i1330/13rRUyYSWm0",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz5JC0v",
"title": "2010 International Conference on Digital Image Computing: Techniques and Applications",
"acronym": "dicta",
"groupId": "1001512",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxvO07U",
"doi": "10.1109/DICTA.2010.97",
"title": "Sparse Update for Loopy Belief Propagation: Fast Dense Registration for Large State Spaces",
"normalizedTitle": "Sparse Update for Loopy Belief Propagation: Fast Dense Registration for Large State Spaces",
"abstract": "A dense point-based registration is an ideal starting point for detailed comparison between two neuroanatomical objects. This paper presents a new algorithm for global dense point-based registration between anatomical objects without assumptions about their shape. We represent mesh models of the surfaces of two similar 3D anatomical objects using a Markov Random Field and seek correspondence pairs between points in each shape. However, for densely sampled objects the set of possible point by point correspondences is very large. We solve the global non-rigid matching problem between the two objects in an efficient manner by applying loopy belief propagation. Typically loopy belief propagation is of order m^3 for each iteration, where m is the number of nodes in a mesh. By avoiding computation of probabilities of configurations that cannot occur in practice, we reduce this to order m^2. We demonstrate the method and its performance by registering hippocampi from a population of individuals aged 60-69. We find a corresponding rigid registration, and compare the results to a state-of-the-art technique and show comparable accuracy. Our method provides a global registration without prior information about alignment, and handles arbitrary shapes of spherical topology.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A dense point-based registration is an ideal starting point for detailed comparison between two neuroanatomical objects. This paper presents a new algorithm for global dense point-based registration between anatomical objects without assumptions about their shape. We represent mesh models of the surfaces of two similar 3D anatomical objects using a Markov Random Field and seek correspondence pairs between points in each shape. However, for densely sampled objects the set of possible point by point correspondences is very large. We solve the global non-rigid matching problem between the two objects in an efficient manner by applying loopy belief propagation. Typically loopy belief propagation is of order m^3 for each iteration, where m is the number of nodes in a mesh. By avoiding computation of probabilities of configurations that cannot occur in practice, we reduce this to order m^2. We demonstrate the method and its performance by registering hippocampi from a population of individuals aged 60-69. We find a corresponding rigid registration, and compare the results to a state-of-the-art technique and show comparable accuracy. Our method provides a global registration without prior information about alignment, and handles arbitrary shapes of spherical topology.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A dense point-based registration is an ideal starting point for detailed comparison between two neuroanatomical objects. This paper presents a new algorithm for global dense point-based registration between anatomical objects without assumptions about their shape. We represent mesh models of the surfaces of two similar 3D anatomical objects using a Markov Random Field and seek correspondence pairs between points in each shape. However, for densely sampled objects the set of possible point by point correspondences is very large. We solve the global non-rigid matching problem between the two objects in an efficient manner by applying loopy belief propagation. Typically loopy belief propagation is of order m^3 for each iteration, where m is the number of nodes in a mesh. By avoiding computation of probabilities of configurations that cannot occur in practice, we reduce this to order m^2. We demonstrate the method and its performance by registering hippocampi from a population of individuals aged 60-69. We find a corresponding rigid registration, and compare the results to a state-of-the-art technique and show comparable accuracy. Our method provides a global registration without prior information about alignment, and handles arbitrary shapes of spherical topology.",
"fno": "4271a546",
"keywords": [
"Registration",
"Loopy Belief Propagation",
"Dense Correspondence",
"3 D Shape Matching",
"Hippocampus"
],
"authors": [
{
"affiliation": null,
"fullName": "Pengdong Xiao",
"givenName": "Pengdong",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nick Barnes",
"givenName": "Nick",
"surname": "Barnes",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Paulette Lieby",
"givenName": "Paulette",
"surname": "Lieby",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tiberio Caetano",
"givenName": "Tiberio",
"surname": "Caetano",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dicta",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-12-01T00:00:00",
"pubType": "proceedings",
"pages": "546-551",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4271-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4271a540",
"articleId": "12OmNyO8tRE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4271a552",
"articleId": "12OmNvRU0sA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2008/2242/0/04587543",
"title": "A Loopy Belief Propagation approach for robust background estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2008/04587543/12OmNAXxWTV",
"parentPublication": {
"id": "proceedings/cvpr/2008/2242/0",
"title": "2008 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csa/2008/3428/0/3428a118",
"title": "Representing and Solving Influence Diagram in Multi-Criteria Decision Making: A Loopy Belief Propagation Method",
"doi": null,
"abstractUrl": "/proceedings-article/csa/2008/3428a118/12OmNC3Xhq2",
"parentPublication": {
"id": "proceedings/csa/2008/3428/0",
"title": "2008 International Symposium on Computer Science and its Applications (CSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2010/7029/0/05543556",
"title": "Robust one-shot 3D scanning using loopy belief propagation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2010/05543556/12OmNqIhFKA",
"parentPublication": {
"id": "proceedings/cvprw/2010/7029/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2015/8332/0/8332a615",
"title": "Ground Segmentation Based on Loopy Belief Propagation for Sparse 3D Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2015/8332a615/12OmNqN6R8z",
"parentPublication": {
"id": "proceedings/3dv/2015/8332/0",
"title": "2015 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sensorcomm/2009/3669/0/3669a617",
"title": "W-LBP: Wavelet-Based Loopy Belief Propagation for Wireless Sensor Networks",
"doi": null,
"abstractUrl": "/proceedings-article/sensorcomm/2009/3669a617/12OmNwp74zL",
"parentPublication": {
"id": "proceedings/sensorcomm/2009/3669/0",
"title": "Sensor Technologies and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2008/3495/0/3495a344",
"title": "Boltzmann Machine Topology Learning for Distributed Sensor Networks Using Loopy Belief Propagation Inference",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2008/3495a344/12OmNx4yvxY",
"parentPublication": {
"id": "proceedings/icmla/2008/3495/0",
"title": "2008 Seventh International Conference on Machine Learning and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmc/2011/312/0/05931250",
"title": "Loopy Belief Propagation Algorithm in Distributed Wireless Cooperative Spectrum Sensing",
"doi": null,
"abstractUrl": "/proceedings-article/cmc/2011/05931250/12OmNyUnECm",
"parentPublication": {
"id": "proceedings/cmc/2011/312/0",
"title": "2011 Third International Conference on Communications and Mobile Computing (CMC 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/07/ttp2011071324",
"title": "Higher-Dimensional Affine Registration and Vision Applications",
"doi": null,
"abstractUrl": "/journal/tp/2011/07/ttp2011071324/13rRUEgs2ur",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2011/05/ttp2011050978",
"title": "SIFT Flow: Dense Correspondence across Scenes and Its Applications",
"doi": null,
"abstractUrl": "/journal/tp/2011/05/ttp2011050978/13rRUwdrdLU",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276883",
"title": "Spectral-Spatial Classification of Hyperspectral Image Using Extreme Learning Machine and Loopy Belief Propagation",
"doi": null,
"abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276883/17D45Xcttnl",
"parentPublication": {
"id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0",
"title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": null,
"article": {
"id": "12OmNxw5Bol",
"doi": "10.1109/CSIE.2009.711",
"title": "A Hybrid Image Registration for Different Phases of Contrast Enhanced Liver CT Data",
"normalizedTitle": "A Hybrid Image Registration for Different Phases of Contrast Enhanced Liver CT Data",
"abstract": "There are three kinds of blood vessel systems in liver and these different kinds of vessels are typically visible in each phase of contrast enhanced liver CT Data. In order to merge the different information into one image, image registration should be applied. In this paper, a hybrid image registration for different phases of contrast enhanced liver CT data was studied. Firstly, a rigid registration method based on joint histogram was proposed. Then, we propose a nonrigid registration method based on thin-plate splines using a set of corresponding point landmarks. All of landmarks are generated by improved SFIT algorithm automatically. Finally, the post-registration images were fused by a wavelets-based scheme and the different information was merged into a new image.The experiment results demonstrated the effectiveness of the registration scheme.",
"abstracts": [
{
"abstractType": "Regular",
"content": "There are three kinds of blood vessel systems in liver and these different kinds of vessels are typically visible in each phase of contrast enhanced liver CT Data. In order to merge the different information into one image, image registration should be applied. In this paper, a hybrid image registration for different phases of contrast enhanced liver CT data was studied. Firstly, a rigid registration method based on joint histogram was proposed. Then, we propose a nonrigid registration method based on thin-plate splines using a set of corresponding point landmarks. All of landmarks are generated by improved SFIT algorithm automatically. Finally, the post-registration images were fused by a wavelets-based scheme and the different information was merged into a new image.The experiment results demonstrated the effectiveness of the registration scheme.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "There are three kinds of blood vessel systems in liver and these different kinds of vessels are typically visible in each phase of contrast enhanced liver CT Data. In order to merge the different information into one image, image registration should be applied. In this paper, a hybrid image registration for different phases of contrast enhanced liver CT data was studied. Firstly, a rigid registration method based on joint histogram was proposed. Then, we propose a nonrigid registration method based on thin-plate splines using a set of corresponding point landmarks. All of landmarks are generated by improved SFIT algorithm automatically. Finally, the post-registration images were fused by a wavelets-based scheme and the different information was merged into a new image.The experiment results demonstrated the effectiveness of the registration scheme.",
"fno": "3507f239",
"keywords": [
"Registration",
"Liver",
"Nonrigid"
],
"authors": [
{
"affiliation": null,
"fullName": "Xiaoyang Huang",
"givenName": "Xiaoyang",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Boliang Wang",
"givenName": "Boliang",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoping Wang",
"givenName": "Xiaoping",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ruhuan Liu",
"givenName": "Ruhuan",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shan Ke",
"givenName": "Shan",
"surname": "Ke",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhijian Wu",
"givenName": "Zhijian",
"surname": "Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "csie",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-03-01T00:00:00",
"pubType": "proceedings",
"pages": "239-243",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3507-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3507f233",
"articleId": "12OmNyoiZfH",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3507f250",
"articleId": "12OmNwe2Io0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iis/1997/8218/0/82180042",
"title": "Intermodality registration and fusion of liver images for medical diagnosis",
"doi": null,
"abstractUrl": "/proceedings-article/iis/1997/82180042/12OmNAPBbg9",
"parentPublication": {
"id": "proceedings/iis/1997/8218/0",
"title": "Intelligent Information Systems, IASTED International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/socpar/2009/3879/0/3879a404",
"title": "3D Volumetric CT Liver Segmentation Using Hybrid Segmentation Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/socpar/2009/3879a404/12OmNB9t6tK",
"parentPublication": {
"id": "proceedings/socpar/2009/3879/0",
"title": "Soft Computing and Pattern Recognition, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2014/5669/0/06999179",
"title": "Liver segmentation based on SKFCM and improved GrowCut for CT images",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2014/06999179/12OmNyL0Tqg",
"parentPublication": {
"id": "proceedings/bibm/2014/5669/0",
"title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsip/2014/5100/0/5100a122",
"title": "Extracting the Liver and Tumor from Abdominal CT Images",
"doi": null,
"abstractUrl": "/proceedings-article/icsip/2014/5100a122/12OmNyqiaX2",
"parentPublication": {
"id": "proceedings/icsip/2014/5100/0",
"title": "2014 Fifth International Conference on Signal and Image Processing (ICSIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbeb/2012/4706/0/4706a654",
"title": "3D Liver Segmentation and Model Reconstruction from CT Images",
"doi": null,
"abstractUrl": "/proceedings-article/icbeb/2012/4706a654/12OmNzBwGBD",
"parentPublication": {
"id": "proceedings/icbeb/2012/4706/0",
"title": "Biomedical Engineering and Biotechnology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2011/4607/2/4607b225",
"title": "Regional Normal Liver Tissue Density Changes in Patients Treated with Stereotactic Body Radiation Therapy for Liver Metastases",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2011/4607b225/12OmNzcPAt2",
"parentPublication": {
"id": "proceedings/icmla/2011/4607/2",
"title": "Machine Learning and Applications, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2014/7000/2/7000b075",
"title": "3D Liver Vessel Reconstruction from CT Images",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2014/7000b075/12OmNzsJ7B3",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/admit/2022/5472/0/547200a007",
"title": "A collaborative attention mechanism Unet for liver tumor CT image segmentation algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/admit/2022/547200a007/1J9B7ziqen6",
"parentPublication": {
"id": "proceedings/admit/2022/5472/0",
"title": "2022 International Conference on Algorithms, Data Mining, and Information Technology (ADMIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icat/2019/4543/0/08938844",
"title": "A review of the image segmentation and registration methods in liver motion correction in C-arm perfusion imaging",
"doi": null,
"abstractUrl": "/proceedings-article/icat/2019/08938844/1fYfx7E286s",
"parentPublication": {
"id": "proceedings/icat/2019/4543/0",
"title": "2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2020/6034/0/603400a169",
"title": "Trainable Multi-contrast Windowing for Liver CT Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2020/603400a169/1jdDvHgOu9a",
"parentPublication": {
"id": "proceedings/bigcomp/2020/6034/0",
"title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1pbe4F6UBwI",
"title": "2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL)",
"acronym": "cvidl",
"groupId": "1839144",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1pbe6YSJZcI",
"doi": "10.1109/CVIDL51233.2020.00012",
"title": "Remote sensing image registration based on fusion of spatial transformation and dense convolution",
"normalizedTitle": "Remote sensing image registration based on fusion of spatial transformation and dense convolution",
"abstract": "In order to achieve high-precision registration of remote sensing images, this paper proposes a remote sensing image registration method based on spatial transformation and dense convolution fusion. First, the dense convolutional network improved by the spatial transformation module is used for feature extraction to improve the robustness of feature points; then use improved Grid-based Motion Statistics (GMS) algorithm for feature matching, and use the homography matrix-based method to eliminate mismatched point pairs to improve matching accuracy; finally, the transformed model is used to solve the transformed model to achieve accurate registration of remote sensing images. Experiments show that the proposed method can effectively improve the correct matching rate of feature points, has higher registration accuracy and stronger robustness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In order to achieve high-precision registration of remote sensing images, this paper proposes a remote sensing image registration method based on spatial transformation and dense convolution fusion. First, the dense convolutional network improved by the spatial transformation module is used for feature extraction to improve the robustness of feature points; then use improved Grid-based Motion Statistics (GMS) algorithm for feature matching, and use the homography matrix-based method to eliminate mismatched point pairs to improve matching accuracy; finally, the transformed model is used to solve the transformed model to achieve accurate registration of remote sensing images. Experiments show that the proposed method can effectively improve the correct matching rate of feature points, has higher registration accuracy and stronger robustness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In order to achieve high-precision registration of remote sensing images, this paper proposes a remote sensing image registration method based on spatial transformation and dense convolution fusion. First, the dense convolutional network improved by the spatial transformation module is used for feature extraction to improve the robustness of feature points; then use improved Grid-based Motion Statistics (GMS) algorithm for feature matching, and use the homography matrix-based method to eliminate mismatched point pairs to improve matching accuracy; finally, the transformed model is used to solve the transformed model to achieve accurate registration of remote sensing images. Experiments show that the proposed method can effectively improve the correct matching rate of feature points, has higher registration accuracy and stronger robustness.",
"fno": "948100a021",
"keywords": [
"Convolutional Neural Nets",
"Feature Extraction",
"Geophysical Image Processing",
"Image Fusion",
"Image Matching",
"Image Motion Analysis",
"Image Registration",
"Remote Sensing",
"Remote Sensing Image Registration Method",
"Dense Convolution Fusion",
"Dense Convolutional Network",
"Spatial Transformation Module",
"Feature Extraction",
"Grid Based Motion Statistics Algorithm",
"Feature Matching",
"Homography Matrix Based Method",
"Feature Extraction",
"Remote Sensing",
"Convolution",
"Robustness",
"Neural Networks",
"Image Registration",
"Training",
"Dense Neural Networks",
"Improved Grid Based Motion Statistics Algorithm",
"Remote Sensing Image Registration"
],
"authors": [
{
"affiliation": "Shanghai Institute of Technology,Department of computer Science and Information Engineering,Shanghai,China,201418",
"fullName": "Guoqing Liu",
"givenName": "Guoqing",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Institute of Technology,Department of computer Science and Information Engineering,Shanghai,China,201418",
"fullName": "Ying Chen",
"givenName": "Ying",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Shanghai Institute of Technology,Department of computer Science and Information Engineering,Shanghai,China,201418",
"fullName": "Hengshi Chen",
"givenName": "Hengshi",
"surname": "Chen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvidl",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-07-01T00:00:00",
"pubType": "proceedings",
"pages": "21-26",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9481-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "948100a016",
"articleId": "1pbebW3h7bi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "948100a027",
"articleId": "1pbe9sPzF28",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cit/2014/6239/0/6239a888",
"title": "Fast Remote Sensing Image Registration Algorithm Using Spatial Masks",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2014/6239a888/12OmNB836Hg",
"parentPublication": {
"id": "proceedings/cit/2014/6239/0",
"title": "2014 IEEE International Conference on Computer and Information Technology (CIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2009/3736/1/3736a547",
"title": "Registration of Remote Sensing Images Based on the Relevance Vector Machine",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2009/3736a547/12OmNBTs7In",
"parentPublication": {
"id": "proceedings/icnc/2009/3736/4",
"title": "2009 Fifth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmip/2017/5954/0/5954a118",
"title": "Automatic Image Registration Based on Shape Features and Multi-scale Image Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/icmip/2017/5954a118/12OmNBTs7x1",
"parentPublication": {
"id": "proceedings/icmip/2017/5954/0",
"title": "2017 2nd International Conference on Multimedia and Image Processing (ICMIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2013/3926/0/06726537",
"title": "Automatic registration of images with simulated rotation and translation estimation using HAIRIS",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2013/06726537/12OmNqAU6xQ",
"parentPublication": {
"id": "proceedings/icccnt/2013/3926/0",
"title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spacomm/2009/3694/0/3694a085",
"title": "Automatic Registration of Satellite Images",
"doi": null,
"abstractUrl": "/proceedings-article/spacomm/2009/3694a085/12OmNs0kyCf",
"parentPublication": {
"id": "proceedings/spacomm/2009/3694/0",
"title": "Advances in Satellite and Space Communications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsee/2012/4647/1/4647a373",
"title": "Multi-source Remote Sensing Image Registration Based on Normalized SURF Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/iccsee/2012/4647a373/12OmNwp74xj",
"parentPublication": {
"id": "proceedings/iccsee/2012/4647/2",
"title": "Computer Science and Electronics Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciip/2015/0148/0/07414737",
"title": "LANDSAT Enhanced Thematic Mapper plus image registration using SIFT",
"doi": null,
"abstractUrl": "/proceedings-article/iciip/2015/07414737/12OmNyxXln4",
"parentPublication": {
"id": "proceedings/iciip/2015/0148/0",
"title": "2015 Third International Conference on Image Information Processing (ICIIP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfcsa/2011/0317/0/05968034",
"title": "SIFT Based Registration of Remotely-Sensed Imagery",
"doi": null,
"abstractUrl": "/proceedings-article/icfcsa/2011/05968034/12OmNzcPAim",
"parentPublication": {
"id": "proceedings/icfcsa/2011/0317/0",
"title": "2011 International Conference on Future Computer Sciences and Application (ICFCSA 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoin/2021/9101/0/09333861",
"title": "Remote Sensing Image Registration Using Equivariance Features",
"doi": null,
"abstractUrl": "/proceedings-article/icoin/2021/09333861/1qTrMoYrLws",
"parentPublication": {
"id": "proceedings/icoin/2021/9101/0",
"title": "2021 International Conference on Information Networking (ICOIN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccea/2021/2616/0/261600a333",
"title": "Multi-temporal remote sensing image registration based on siamese network",
"doi": null,
"abstractUrl": "/proceedings-article/iccea/2021/261600a333/1y4oyukGGru",
"parentPublication": {
"id": "proceedings/iccea/2021/2616/0",
"title": "2021 International Conference on Computer Engineering and Application (ICCEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy314bq",
"title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)",
"acronym": "snpd",
"groupId": "1001811",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAqCtOm",
"doi": "10.1109/SNPD.2016.7515872",
"title": "An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC",
"normalizedTitle": "An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC",
"abstract": "Finite Time Lyapunov Exponent (FTLE) is widely used in Lagrangian Coherent Structure extraction and research on unsteady flow field. FTLE is computationally expensive due to the flow map calculation on dense samples in the field. In order to improve the computation efficiency, we investigate the most time-consuming flow map and propose UIA, a Uniform Integrated Advection algorithm based on piecewise linear hypothesis. FTLE coverts multiple spatiotemporal interpolations and multi-step time advection into single matrix multiplication so as to dramatically reduce computation and be applied to any type of grids. We also design an UIA based FTLE algorithm on GUP and MIC to further reduce computation time, and present corresponding performance optimization strategies. The correctness and accuracy of algorithm are also experimentally verified by applying the algorithm to an analytical 3-dimensional field. The speedup ratio of the proposed algorithm ranges from 6 to 143 compared with FTLE execution time based on traditional RK4 flow map, which demonstrates that UIA has significantly improve the efficiency of FTLE computation and visualization.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Finite Time Lyapunov Exponent (FTLE) is widely used in Lagrangian Coherent Structure extraction and research on unsteady flow field. FTLE is computationally expensive due to the flow map calculation on dense samples in the field. In order to improve the computation efficiency, we investigate the most time-consuming flow map and propose UIA, a Uniform Integrated Advection algorithm based on piecewise linear hypothesis. FTLE coverts multiple spatiotemporal interpolations and multi-step time advection into single matrix multiplication so as to dramatically reduce computation and be applied to any type of grids. We also design an UIA based FTLE algorithm on GUP and MIC to further reduce computation time, and present corresponding performance optimization strategies. The correctness and accuracy of algorithm are also experimentally verified by applying the algorithm to an analytical 3-dimensional field. The speedup ratio of the proposed algorithm ranges from 6 to 143 compared with FTLE execution time based on traditional RK4 flow map, which demonstrates that UIA has significantly improve the efficiency of FTLE computation and visualization.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Finite Time Lyapunov Exponent (FTLE) is widely used in Lagrangian Coherent Structure extraction and research on unsteady flow field. FTLE is computationally expensive due to the flow map calculation on dense samples in the field. In order to improve the computation efficiency, we investigate the most time-consuming flow map and propose UIA, a Uniform Integrated Advection algorithm based on piecewise linear hypothesis. FTLE coverts multiple spatiotemporal interpolations and multi-step time advection into single matrix multiplication so as to dramatically reduce computation and be applied to any type of grids. We also design an UIA based FTLE algorithm on GUP and MIC to further reduce computation time, and present corresponding performance optimization strategies. The correctness and accuracy of algorithm are also experimentally verified by applying the algorithm to an analytical 3-dimensional field. The speedup ratio of the proposed algorithm ranges from 6 to 143 compared with FTLE execution time based on traditional RK4 flow map, which demonstrates that UIA has significantly improve the efficiency of FTLE computation and visualization.",
"fno": "07515872",
"keywords": [
"Flow Visualisation",
"Graphics Processing Units",
"Interpolation",
"Physics Computing",
"Uniform Integrated Advection Algorithm",
"Finite Time Lyapunov Exponent Field Computation",
"GPU",
"Graphics Processing Unit",
"MIC",
"Lagrangian Coherent Structure Extraction",
"Flow Map Calculation",
"Piecewise Linear Hypothesis",
"Spatiotemporal Interpolation",
"Multistep Time Advection",
"Matrix Multiplication",
"RK 4 Flow Map",
"FTLE Computation",
"FTLE Visualization",
"Interpolation",
"Algorithm Design And Analysis",
"Spatiotemporal Phenomena",
"Computational Fluid Dynamics",
"Microwave Integrated Circuits",
"Computers",
"Optimization"
],
"authors": [
{
"affiliation": "College of Computer Scinece, National University of Defense Technology, Changsha, Hunan, China",
"fullName": "Wang Fang",
"givenName": "Wang",
"surname": "Fang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computational Aerodynamics Insititute, China Aerodynamics Research and Development Center, Mianyang, Sichuan, China",
"fullName": "Deng Liang",
"givenName": "Deng",
"surname": "Liang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computational Aerodynamics Insititute, China Aerodynamics Research and Development Center, Mianyang, Sichuan, China",
"fullName": "Zhao Dan",
"givenName": "Zhao",
"surname": "Dan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "College of Computer Scinece, National University of Defense Technology, Changsha, Hunan, China",
"fullName": "Li Sikun",
"givenName": "Li",
"surname": "Sikun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "snpd",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-05-01T00:00:00",
"pubType": "proceedings",
"pages": "19-26",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-2239-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07515871",
"articleId": "12OmNBBzocA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07515873",
"articleId": "12OmNAle6N9",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2012/0806/0/1000a102",
"title": "Parallel particle advection and FTLE computation for time-varying flow fields",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a102/12OmNBp52zQ",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2014/4871/0/06918690",
"title": "Local anomaly detection in crowded scenes using Finite-Time Lyapunov Exponent based clustering",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2014/06918690/12OmNvkYxcr",
"parentPublication": {
"id": "proceedings/avss/2014/4871/0",
"title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipc/2014/5976/0/07116900",
"title": "Particle advection performance over varied architectures and workloads",
"doi": null,
"abstractUrl": "/proceedings-article/hipc/2014/07116900/12OmNwCaCqV",
"parentPublication": {
"id": "proceedings/hipc/2014/5976/0",
"title": "2014 21st International Conference on High Performance Computing (HiPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vv/1996/3708/0/37080063",
"title": "Visualizing Vector Fields Using Line Integral Convolution and Dye Advection",
"doi": null,
"abstractUrl": "/proceedings-article/vv/1996/37080063/12OmNxFsmH1",
"parentPublication": {
"id": "proceedings/vv/1996/3708/0",
"title": "Volume Visualization and Graphics, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/03/v0569",
"title": "Texture-Based Visualization of Unsteady 3D Flow by Real-Time Advection and Volumetric Illumination",
"doi": null,
"abstractUrl": "/journal/tg/2007/03/v0569/13rRUwIF6dF",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1464",
"title": "Efficient Computation and Visualization of Coherent Structures in Fluid Flow Applications",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1464/13rRUwInv4h",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/08/07243356",
"title": "Fast Coherent Particle Advection through Time-Varying Unstructured Flow Datasets",
"doi": null,
"abstractUrl": "/journal/tg/2016/08/07243356/13rRUx0xPIN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/12/ttg2013122733",
"title": "Coupled Ensemble Flow Line Advection and Analysis",
"doi": null,
"abstractUrl": "/journal/tg/2013/12/ttg2013122733/13rRUxAAT0T",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06143942",
"title": "Interactive Computation and Rendering of Finite-Time Lyapunov Exponent Fields",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06143942/13rRUxC0SvQ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2019/2605/0/08944378",
"title": "Parallel Particle Advection and Lagrangian Analysis for 3D-PLI Fiber Orientation Maps",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2019/08944378/1grOF71jiog",
"parentPublication": {
"id": "proceedings/ldav/2019/2605/0",
"title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz5JC19",
"title": "SC Conference",
"acronym": "sc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBp52zQ",
"doi": "10.1109/SC.2012.93",
"title": "Parallel particle advection and FTLE computation for time-varying flow fields",
"normalizedTitle": "Parallel particle advection and FTLE computation for time-varying flow fields",
"abstract": "Flow fields are an important product of scientific simulations. One popular flow visualization technique is particle advection, in which seeds are traced through the flow field. One use of these traces is to compute a powerful analysis tool called the Finite-Time Lyapunov Exponent (FTLE) field, but no existing particle tracing algorithms scale to the particle injection frequency required for high-resolution FTLE analysis. In this paper, a framework to trace the massive number of particles necessary for FTLE computation is presented. A new approach is explored, in which processes are divided into groups, and are responsible for mutually exclusive spans of time. This pipelining over time intervals reduces overall idle time of processes and decreases I/O overhead. Our parallel FTLE framework is capable of advecting hundreds of millions of particles at once, with performance scaling up to tens of thousands of processes.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Flow fields are an important product of scientific simulations. One popular flow visualization technique is particle advection, in which seeds are traced through the flow field. One use of these traces is to compute a powerful analysis tool called the Finite-Time Lyapunov Exponent (FTLE) field, but no existing particle tracing algorithms scale to the particle injection frequency required for high-resolution FTLE analysis. In this paper, a framework to trace the massive number of particles necessary for FTLE computation is presented. A new approach is explored, in which processes are divided into groups, and are responsible for mutually exclusive spans of time. This pipelining over time intervals reduces overall idle time of processes and decreases I/O overhead. Our parallel FTLE framework is capable of advecting hundreds of millions of particles at once, with performance scaling up to tens of thousands of processes.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Flow fields are an important product of scientific simulations. One popular flow visualization technique is particle advection, in which seeds are traced through the flow field. One use of these traces is to compute a powerful analysis tool called the Finite-Time Lyapunov Exponent (FTLE) field, but no existing particle tracing algorithms scale to the particle injection frequency required for high-resolution FTLE analysis. In this paper, a framework to trace the massive number of particles necessary for FTLE computation is presented. A new approach is explored, in which processes are divided into groups, and are responsible for mutually exclusive spans of time. This pipelining over time intervals reduces overall idle time of processes and decreases I/O overhead. Our parallel FTLE framework is capable of advecting hundreds of millions of particles at once, with performance scaling up to tens of thousands of processes.",
"fno": "1000a102",
"keywords": [
"Vectors",
"Pipeline Processing",
"Acceleration",
"Equations",
"Mathematical Model",
"Load Modeling",
"Loading"
],
"authors": [
{
"affiliation": null,
"fullName": "Boonthanome Nouanesengsy",
"givenName": "Boonthanome",
"surname": "Nouanesengsy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Teng-Yok Lee",
"givenName": "Teng-Yok",
"surname": "Lee",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kewei Lu",
"givenName": "Kewei",
"surname": "Lu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Han-Wei Shen",
"givenName": "Han-Wei",
"surname": "Shen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tom Peterka",
"givenName": "Tom",
"surname": "Peterka",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1-11",
"year": "2012",
"issn": "2167-4329",
"isbn": "978-1-4673-0805-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "1000a101",
"articleId": "12OmNyTOsmk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "1000a103",
"articleId": "12OmNvSKNVO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2018/1424/0/142401a086",
"title": "Dynamic Data Repartitioning for Load-Balanced Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2018/142401a086/12OmNANBZoz",
"parentPublication": {
"id": "proceedings/pacificvis/2018/1424/0",
"title": "2018 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/snpd/2016/2239/0/07515872",
"title": "An efficient Uniform Integrated Advection algorithm for Finite Time Lyapunov Exponent field computation on GPU and MIC",
"doi": null,
"abstractUrl": "/proceedings-article/snpd/2016/07515872/12OmNAqCtOm",
"parentPublication": {
"id": "proceedings/snpd/2016/2239/0",
"title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2007/1179/0/04270002",
"title": "A Lagrangian Particle Dynamics Approach for Crowd Flow Segmentation and Stability Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2007/04270002/12OmNroijnT",
"parentPublication": {
"id": "proceedings/cvpr/2007/1179/0",
"title": "2007 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipc/2014/5976/0/07116900",
"title": "Particle advection performance over varied architectures and workloads",
"doi": null,
"abstractUrl": "/proceedings-article/hipc/2014/07116900/12OmNwCaCqV",
"parentPublication": {
"id": "proceedings/hipc/2014/5976/0",
"title": "2014 21st International Conference on High Performance Computing (HiPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2013/1659/0/06675154",
"title": "Graph-based seed scheduling for out-of-core FTLE and pathline computation",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2013/06675154/12OmNxGj9YP",
"parentPublication": {
"id": "proceedings/ldav/2013/1659/0",
"title": "2013 IEEE Symposium on Large-Scale Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2017/3914/0/07967110",
"title": "Large Scale Manycore-Aware PIC Simulation with Efficient Particle Binning",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2017/07967110/12OmNzTYBUh",
"parentPublication": {
"id": "proceedings/ipdps/2017/3914/0",
"title": "2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2014/5500/0/5500b008",
"title": "Scalable Computation of Stream Surfaces on Large Scale Vector Fields",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2014/5500b008/12OmNzXFoId",
"parentPublication": {
"id": "proceedings/sc/2014/5500/0",
"title": "SC14: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/01/08017633",
"title": "Dynamic Load Balancing Based on Constrained K-D Tree Decomposition for Parallel Particle Tracing",
"doi": null,
"abstractUrl": "/journal/tg/2018/01/08017633/13rRUwgQpqN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/08/07243356",
"title": "Fast Coherent Particle Advection through Time-Varying Unstructured Flow Datasets",
"doi": null,
"abstractUrl": "/journal/tg/2016/08/07243356/13rRUx0xPIN",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2019/2605/0/08944378",
"title": "Parallel Particle Advection and Lagrangian Analysis for 3D-PLI Fiber Orientation Maps",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2019/08944378/1grOF71jiog",
"parentPublication": {
"id": "proceedings/ldav/2019/2605/0",
"title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzwpUa6",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"acronym": "icmtma",
"groupId": "1002837",
"volume": "1",
"displayVolume": "1",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCyBXiZ",
"doi": "10.1109/ICMTMA.2010.571",
"title": "A Chaotic System with Constant Lyapunov Exponent Spectrum and its Evolvement",
"normalizedTitle": "A Chaotic System with Constant Lyapunov Exponent Spectrum and its Evolvement",
"abstract": "A chaotic system with constant Lyapunov exponent spectrum is reviewed and its evolvement is investigated. The remarkable particularity of the system is that there exists a constant controller in this system, which can adjust the amplitude of state variables linearly, however, the Lyapunov exponent spectrum of the system is independent and kept on constant. After some basic dynamical properties of this new attractor are proposed, the flow evolvement of the system by adding linear and constant term or changing nonlinear absolute term are studied, and then general conclusions of the chaotic system which only contains nonlinear absolute terms can be achieved.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A chaotic system with constant Lyapunov exponent spectrum is reviewed and its evolvement is investigated. The remarkable particularity of the system is that there exists a constant controller in this system, which can adjust the amplitude of state variables linearly, however, the Lyapunov exponent spectrum of the system is independent and kept on constant. After some basic dynamical properties of this new attractor are proposed, the flow evolvement of the system by adding linear and constant term or changing nonlinear absolute term are studied, and then general conclusions of the chaotic system which only contains nonlinear absolute terms can be achieved.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A chaotic system with constant Lyapunov exponent spectrum is reviewed and its evolvement is investigated. The remarkable particularity of the system is that there exists a constant controller in this system, which can adjust the amplitude of state variables linearly, however, the Lyapunov exponent spectrum of the system is independent and kept on constant. After some basic dynamical properties of this new attractor are proposed, the flow evolvement of the system by adding linear and constant term or changing nonlinear absolute term are studied, and then general conclusions of the chaotic system which only contains nonlinear absolute terms can be achieved.",
"fno": "3962a027",
"keywords": [
"Chaotic System",
"Constant Controller",
"Lyapunov Exponent Spectrum",
"Evolvement"
],
"authors": [
{
"affiliation": null,
"fullName": "Chun-Biao Li",
"givenName": "Chun-Biao",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmtma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-03-01T00:00:00",
"pubType": "proceedings",
"pages": "27-31",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3962-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3962a022",
"articleId": "12OmNxGja35",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3962a032",
"articleId": "12OmNxTmHM8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icycs/2008/3398/0/3398c819",
"title": "The Scroll Control of a New Chaotic System",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c819/12OmNAYGltB",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031c039",
"title": "Study of Lyapunov Exponent of the Chaotic Signal Wave Interception",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c039/12OmNAolGMz",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscid/2011/4500/1/4500a131",
"title": "An Encryption Algorithm of Chaos Based on Sine Square Mapping",
"doi": null,
"abstractUrl": "/proceedings-article/iscid/2011/4500a131/12OmNBOCWzk",
"parentPublication": {
"id": "proceedings/iscid/2011/4500/1",
"title": "Computational Intelligence and Design, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c885",
"title": "Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic Flows",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c885/12OmNrAMEJL",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwcfta/2009/3853/0/3853a404",
"title": "Study on Fault Analysis of Rotor Machinery Using Lyapunov Exponent-Fractal Dimension",
"doi": null,
"abstractUrl": "/proceedings-article/iwcfta/2009/3853a404/12OmNwFicU0",
"parentPublication": {
"id": "proceedings/iwcfta/2009/3853/0",
"title": "Chaos-Fractals Theories and Applications, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacte/2008/3489/0/3489a457",
"title": "Chaos in Orthogonal Frequency Divison Multiplexing Technique",
"doi": null,
"abstractUrl": "/proceedings-article/icacte/2008/3489a457/12OmNwpGgHv",
"parentPublication": {
"id": "proceedings/icacte/2008/3489/0",
"title": "2008 International Conference on Advanced Computer Theory and Engineering (ICACTE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfn/2009/3567/0/3567a122",
"title": "Bifurcation and Lyapunov Exponent in Optical Injected Laser",
"doi": null,
"abstractUrl": "/proceedings-article/icfn/2009/3567a122/12OmNxA3YRT",
"parentPublication": {
"id": "proceedings/icfn/2009/3567/0",
"title": "Future Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c973",
"title": "Video Image Targets Detection Based on the Largest Lyapunov Exponent",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c973/12OmNz61d6K",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2011/4296/1/4296a474",
"title": "Analysis of Non-stationary and Extraction of Chaotic Characteristics about Logging Signals",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2011/4296a474/12OmNz61d7d",
"parentPublication": {
"id": "proceedings/icmtma/2011/4296/1",
"title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398d011",
"title": "On the Chaotic Dynamics Analysis of China Stock Market",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398d011/12OmNzUPpg0",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqBtiEX",
"title": "2014 International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"acronym": "avss",
"groupId": "1001307",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvkYxcr",
"doi": "10.1109/AVSS.2014.6918690",
"title": "Local anomaly detection in crowded scenes using Finite-Time Lyapunov Exponent based clustering",
"normalizedTitle": "Local anomaly detection in crowded scenes using Finite-Time Lyapunov Exponent based clustering",
"abstract": "Surveillance of crowded public spaces and detection of anomalies from the video is important for public safety and security. While anomaly detection is possible by detection and tracking of individuals in low-density areas, such methods are not reliable in high-density crowded scenes. In this work we propose a holistic unsupervised approach to cluster different behaviors in high density crowds and detect the local anomalies using these clusters. Finite-Time Lyapunov Exponents (FTLE) is used for analyzing the crowd flow and this flow data is clustered by agglomerative hierarchical clustering. To detect if there is any anomaly in the video, mean of maximum values for pixels in each cluster is used and skewness value of the clusters are calculated. An adaptive threshold is calculated using equal width thresholding which is subsequently used to determine abnormal clusters which are not coherent with the general flow. The method does not require any user defined thresholds or preset rules. Publicly available datasets and our own dataset (which is also made publicly available) are used for testing and demonstrating the effectiveness of the proposed method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Surveillance of crowded public spaces and detection of anomalies from the video is important for public safety and security. While anomaly detection is possible by detection and tracking of individuals in low-density areas, such methods are not reliable in high-density crowded scenes. In this work we propose a holistic unsupervised approach to cluster different behaviors in high density crowds and detect the local anomalies using these clusters. Finite-Time Lyapunov Exponents (FTLE) is used for analyzing the crowd flow and this flow data is clustered by agglomerative hierarchical clustering. To detect if there is any anomaly in the video, mean of maximum values for pixels in each cluster is used and skewness value of the clusters are calculated. An adaptive threshold is calculated using equal width thresholding which is subsequently used to determine abnormal clusters which are not coherent with the general flow. The method does not require any user defined thresholds or preset rules. Publicly available datasets and our own dataset (which is also made publicly available) are used for testing and demonstrating the effectiveness of the proposed method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Surveillance of crowded public spaces and detection of anomalies from the video is important for public safety and security. While anomaly detection is possible by detection and tracking of individuals in low-density areas, such methods are not reliable in high-density crowded scenes. In this work we propose a holistic unsupervised approach to cluster different behaviors in high density crowds and detect the local anomalies using these clusters. Finite-Time Lyapunov Exponents (FTLE) is used for analyzing the crowd flow and this flow data is clustered by agglomerative hierarchical clustering. To detect if there is any anomaly in the video, mean of maximum values for pixels in each cluster is used and skewness value of the clusters are calculated. An adaptive threshold is calculated using equal width thresholding which is subsequently used to determine abnormal clusters which are not coherent with the general flow. The method does not require any user defined thresholds or preset rules. Publicly available datasets and our own dataset (which is also made publicly available) are used for testing and demonstrating the effectiveness of the proposed method.",
"fno": "06918690",
"keywords": [
"Image Motion Analysis",
"Computer Vision",
"Educational Institutions",
"Feature Extraction",
"Trajectory",
"Clustering Algorithms",
"Flowcharts"
],
"authors": [
{
"affiliation": "Graduate School of Informatics, Middle East Technical University, Ankara, Turkey",
"fullName": "Cihan Ongun",
"givenName": "Cihan",
"surname": "Ongun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graduate School of Informatics, Middle East Technical University, Ankara, Turkey",
"fullName": "Alptekin Temizel",
"givenName": "Alptekin",
"surname": "Temizel",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graduate School of Informatics, Middle East Technical University, Ankara, Turkey",
"fullName": "Tugba Taskaya Temizel",
"givenName": "Tugba Taskaya",
"surname": "Temizel",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "avss",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-08-01T00:00:00",
"pubType": "proceedings",
"pages": "331-336",
"year": "2014",
"issn": null,
"isbn": "978-1-4799-4871-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06918689",
"articleId": "12OmNxvwoYl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06918691",
"articleId": "12OmNxX3uCm",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2009/3992/0/05206771",
"title": "Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2009/05206771/12OmNAZfxJl",
"parentPublication": {
"id": "proceedings/cvpr/2009/3992/0",
"title": "2009 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2015/7632/0/07301787",
"title": "Violence detection in crowded scenes using substantial derivative",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2015/07301787/12OmNB0nWej",
"parentPublication": {
"id": "proceedings/avss/2015/7632/0",
"title": "2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2015/6759/0/07301284",
"title": "Real-time anomaly detection and localization in crowded scenes",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2015/07301284/12OmNrAv3E3",
"parentPublication": {
"id": "proceedings/cvprw/2015/6759/0",
"title": "2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209c543",
"title": "A Belief Based Correlated Topic Model for Trajectory Clustering in Crowded Video Scenes",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209c543/12OmNvjQ8IK",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2010/6984/0/05539882",
"title": "Chaotic invariants of Lagrangian particle trajectories for anomaly detection in crowded scenes",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2010/05539882/12OmNwGZNTZ",
"parentPublication": {
"id": "proceedings/cvpr/2010/6984/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109e064",
"title": "Learning Major Pedestrian Flows in Crowded Scenes",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109e064/12OmNwHz05o",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2010/6984/0/05539872",
"title": "Anomaly detection in crowded scenes",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2010/05539872/12OmNwpoFCv",
"parentPublication": {
"id": "proceedings/cvpr/2010/6984/0",
"title": "2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacc/2013/5033/0/06686337",
"title": "Anomaly Detection Using Motion Patterns Computed from Optical Flow",
"doi": null,
"abstractUrl": "/proceedings-article/icacc/2013/06686337/12OmNx0A7Bd",
"parentPublication": {
"id": "proceedings/icacc/2013/5033/0",
"title": "2013 Third International Conference on Advances in Computing and Communications (ICACC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761183",
"title": "Learning motion patterns in crowded scenes using motion flow field",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761183/12OmNyRPgMY",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2014/01/ttp2014010018",
"title": "Anomaly Detection and Localization in Crowded Scenes",
"doi": null,
"abstractUrl": "/journal/tp/2014/01/ttp2014010018/13rRUwjXZTg",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqGA5i6",
"title": "Chaos-Fractals Theories and Applications, International Workshop on",
"acronym": "iwcfta",
"groupId": "1003012",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwFicU0",
"doi": "10.1109/IWCFTA.2009.91",
"title": "Study on Fault Analysis of Rotor Machinery Using Lyapunov Exponent-Fractal Dimension",
"normalizedTitle": "Study on Fault Analysis of Rotor Machinery Using Lyapunov Exponent-Fractal Dimension",
"abstract": "The time series of rotor system are tested under 3 different working conditions in this paper, which respectively calculates the largest Lyapunov exponent and general dimension, and analyzes and studies these two characteristic quantities. The study results show that: the Lyapunov exponent and general dimension of the time series for rotor system under different working conditions are different. Therefore, \"Lyapunov exponent - general dimension\" is proposed to act as the quantitative characterization of the fault diagnosis for rotor system, which can diagnose and monitor the mechanical faults of rotor system. The study also opens up an effective way for diagnosis.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The time series of rotor system are tested under 3 different working conditions in this paper, which respectively calculates the largest Lyapunov exponent and general dimension, and analyzes and studies these two characteristic quantities. The study results show that: the Lyapunov exponent and general dimension of the time series for rotor system under different working conditions are different. Therefore, \"Lyapunov exponent - general dimension\" is proposed to act as the quantitative characterization of the fault diagnosis for rotor system, which can diagnose and monitor the mechanical faults of rotor system. The study also opens up an effective way for diagnosis.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The time series of rotor system are tested under 3 different working conditions in this paper, which respectively calculates the largest Lyapunov exponent and general dimension, and analyzes and studies these two characteristic quantities. The study results show that: the Lyapunov exponent and general dimension of the time series for rotor system under different working conditions are different. Therefore, \"Lyapunov exponent - general dimension\" is proposed to act as the quantitative characterization of the fault diagnosis for rotor system, which can diagnose and monitor the mechanical faults of rotor system. The study also opens up an effective way for diagnosis.",
"fno": "3853a404",
"keywords": [
"Fault Diagnosi",
"Fractal",
"General Dimension",
"Lyapunov Exponent"
],
"authors": [
{
"affiliation": null,
"fullName": "Bingcheng Wang",
"givenName": "Bingcheng",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhaohui Ren",
"givenName": "Zhaohui",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rongtao Hou",
"givenName": "Rongtao",
"surname": "Hou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iwcfta",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "404-407",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3853-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3853a399",
"articleId": "12OmNyRPgS0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3853a408",
"articleId": "12OmNweTvLj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csie/2009/3507/1/3507a089",
"title": "Study on the Quantitative Analysis of Turbo-Unit Fault Based on Lyapunov Exponent-Correlation Dimension",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507a089/12OmNAnMutx",
"parentPublication": {
"id": "csie/2009/3507/1",
"title": "Computer Science and Information Engineering, World Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisp/2008/3119/5/3119e161",
"title": "Fractal Fault Diagnosis of Rotor System Based on Morphological De-nosing",
"doi": null,
"abstractUrl": "/proceedings-article/cisp/2008/3119e161/12OmNCcKQAM",
"parentPublication": {
"id": "proceedings/cisp/2008/3119/5",
"title": "International Congress on Image and Signal Processing (CISP 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/1/3962a027",
"title": "A Chaotic System with Constant Lyapunov Exponent Spectrum and its Evolvement",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962a027/12OmNCyBXiZ",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/1",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c885",
"title": "Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic Flows",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c885/12OmNrAMEJL",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/2/3962c204",
"title": "Extract and Explore Chaos Characters of an Abnormal Turbo-Unit",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962c204/12OmNvSbBNU",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/2",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmsp/2011/4356/2/4356b017",
"title": "Chaos Characteristics Analysis about Transient Signals of FH Radio with PLL Synthesizer",
"doi": null,
"abstractUrl": "/proceedings-article/cmsp/2011/4356b017/12OmNwFiddi",
"parentPublication": {
"id": "proceedings/cmsp/2011/4356/2",
"title": "Multimedia and Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfn/2009/3567/0/3567a122",
"title": "Bifurcation and Lyapunov Exponent in Optical Injected Laser",
"doi": null,
"abstractUrl": "/proceedings-article/icfn/2009/3567a122/12OmNxA3YRT",
"parentPublication": {
"id": "proceedings/icfn/2009/3567/0",
"title": "Future Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2011/4501/0/4501a637",
"title": "Study on Fractal Characteristics of Cementation Exponent in Porous Media",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2011/4501a637/12OmNyyO8Mb",
"parentPublication": {
"id": "proceedings/iccis/2011/4501/0",
"title": "2011 International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c973",
"title": "Video Image Targets Detection Based on the Largest Lyapunov Exponent",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c973/12OmNz61d6K",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398d011",
"title": "On the Chaotic Dynamics Analysis of China Stock Market",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398d011/12OmNzUPpg0",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy49sJH",
"title": "Future Networks, International Conference on",
"acronym": "icfn",
"groupId": "1002812",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxA3YRT",
"doi": "10.1109/ICFN.2009.23",
"title": "Bifurcation and Lyapunov Exponent in Optical Injected Laser",
"normalizedTitle": "Bifurcation and Lyapunov Exponent in Optical Injected Laser",
"abstract": "The long distance communication today and high data rate transmission or higher bandwidth is feasible because of the optical fiber. The light propagates through fiber with less attenuation compare to electrical cables and not affected by electrical interference. The optical fiber with laser light source from semiconductor with injection locked has an important role in ultrahigh speed modulation in passive optical network. The irregularity pattern that arise in this type of laser are described by a set of deterministic equation which different from random fluctuation based on stochastic process is involved in system stability. In this paper, we study the chaotic property of optical injected lasers from the rate equations. The nonlinear dynamics property of the system can explain by the divergent rate of Lyapunov exponent and corresponding bifurcation diagram of related parameters.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The long distance communication today and high data rate transmission or higher bandwidth is feasible because of the optical fiber. The light propagates through fiber with less attenuation compare to electrical cables and not affected by electrical interference. The optical fiber with laser light source from semiconductor with injection locked has an important role in ultrahigh speed modulation in passive optical network. The irregularity pattern that arise in this type of laser are described by a set of deterministic equation which different from random fluctuation based on stochastic process is involved in system stability. In this paper, we study the chaotic property of optical injected lasers from the rate equations. The nonlinear dynamics property of the system can explain by the divergent rate of Lyapunov exponent and corresponding bifurcation diagram of related parameters.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The long distance communication today and high data rate transmission or higher bandwidth is feasible because of the optical fiber. The light propagates through fiber with less attenuation compare to electrical cables and not affected by electrical interference. The optical fiber with laser light source from semiconductor with injection locked has an important role in ultrahigh speed modulation in passive optical network. The irregularity pattern that arise in this type of laser are described by a set of deterministic equation which different from random fluctuation based on stochastic process is involved in system stability. In this paper, we study the chaotic property of optical injected lasers from the rate equations. The nonlinear dynamics property of the system can explain by the divergent rate of Lyapunov exponent and corresponding bifurcation diagram of related parameters.",
"fno": "3567a122",
"keywords": [
"Lyapunov Exponent",
"Deterministic",
"Stochastic Process",
"Bifurcation Diagram"
],
"authors": [
{
"affiliation": null,
"fullName": "Yoothana Suansook",
"givenName": "Yoothana",
"surname": "Suansook",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kitti Paithoonwattanakij",
"givenName": "Kitti",
"surname": "Paithoonwattanakij",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icfn",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-03-01T00:00:00",
"pubType": "proceedings",
"pages": "122-126",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3567-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3567a117",
"articleId": "12OmNzX6ckg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3567a127",
"articleId": "12OmNzkuKLD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icycs/2008/3398/0/3398c819",
"title": "The Scroll Control of a New Chaotic System",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c819/12OmNAYGltB",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031c039",
"title": "Study of Lyapunov Exponent of the Chaotic Signal Wave Interception",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c039/12OmNAolGMz",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/1/3962a027",
"title": "A Chaotic System with Constant Lyapunov Exponent Spectrum and its Evolvement",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962a027/12OmNCyBXiZ",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/1",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssst/1992/2665/0/00712305",
"title": "Fiber Brillouin Ring Laser for Active Inertial Rotation Sensing",
"doi": null,
"abstractUrl": "/proceedings-article/ssst/1992/00712305/12OmNvDI3Nt",
"parentPublication": {
"id": "proceedings/ssst/1992/2665/0",
"title": "The 24th Southeastern Symposium on System Theory and The 3rd Annual Symposium on Communications, Signal Processing Expert Systems, and ASIC VLSI Design",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwcfta/2009/3853/0/3853a404",
"title": "Study on Fault Analysis of Rotor Machinery Using Lyapunov Exponent-Fractal Dimension",
"doi": null,
"abstractUrl": "/proceedings-article/iwcfta/2009/3853a404/12OmNwFicU0",
"parentPublication": {
"id": "proceedings/iwcfta/2009/3853/0",
"title": "Chaos-Fractals Theories and Applications, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacte/2008/3489/0/3489a457",
"title": "Chaos in Orthogonal Frequency Divison Multiplexing Technique",
"doi": null,
"abstractUrl": "/proceedings-article/icacte/2008/3489a457/12OmNwpGgHv",
"parentPublication": {
"id": "proceedings/icacte/2008/3489/0",
"title": "2008 International Conference on Advanced Computer Theory and Engineering (ICACTE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eqec/2005/8973/0/01567196",
"title": "Bifurcation study of a semiconductor laser with filtered optical feedback",
"doi": null,
"abstractUrl": "/proceedings-article/eqec/2005/01567196/12OmNxYtu94",
"parentPublication": {
"id": "proceedings/eqec/2005/8973/0",
"title": "2005 European Quantum Electronics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mwp/2006/0203/0/04153804",
"title": "UWB system based on Gain-Switched Laser",
"doi": null,
"abstractUrl": "/proceedings-article/mwp/2006/04153804/12OmNy5R3Ef",
"parentPublication": {
"id": "proceedings/mwp/2006/0203/0",
"title": "2006 International Topical Meeting on Microwave Photonics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c973",
"title": "Video Image Targets Detection Based on the Largest Lyapunov Exponent",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c973/12OmNz61d6K",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsgea/2020/8278/0/827800a145",
"title": "Research On Polarization Characteristics Of a Semiconductor Optical Amplifier Fiber Ring Laser",
"doi": null,
"abstractUrl": "/proceedings-article/icsgea/2020/827800a145/1p4AGl8DS48",
"parentPublication": {
"id": "proceedings/icsgea/2020/8278/0",
"title": "2020 5th International Conference on Smart Grid and Electrical Automation (ICSGEA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwbcJ4L",
"title": "2008 9th International Conference for Young Computer Scientists",
"acronym": "icycs",
"groupId": "1002545",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz61d6K",
"doi": "10.1109/ICYCS.2008.45",
"title": "Video Image Targets Detection Based on the Largest Lyapunov Exponent",
"normalizedTitle": "Video Image Targets Detection Based on the Largest Lyapunov Exponent",
"abstract": "This paper analyses the characteristic of chaotic sea background and proposes a new approach of detecting sea targets. Based on the principle of phase space reconstruction and the largest Lyapunov exponent calculating, we develops a new algorithm which can estimate the largest Lyapunov exponent of chaotic two dimensional image signals. Experimental results show that the proposed method can detect ship targets form complicated sea background effectively. It is proved that the image largest Lyapunov exponent is an efficient characteristic of sea target.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper analyses the characteristic of chaotic sea background and proposes a new approach of detecting sea targets. Based on the principle of phase space reconstruction and the largest Lyapunov exponent calculating, we develops a new algorithm which can estimate the largest Lyapunov exponent of chaotic two dimensional image signals. Experimental results show that the proposed method can detect ship targets form complicated sea background effectively. It is proved that the image largest Lyapunov exponent is an efficient characteristic of sea target.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper analyses the characteristic of chaotic sea background and proposes a new approach of detecting sea targets. Based on the principle of phase space reconstruction and the largest Lyapunov exponent calculating, we develops a new algorithm which can estimate the largest Lyapunov exponent of chaotic two dimensional image signals. Experimental results show that the proposed method can detect ship targets form complicated sea background effectively. It is proved that the image largest Lyapunov exponent is an efficient characteristic of sea target.",
"fno": "3398c973",
"keywords": [
"Chaos",
"Image",
"Target Detect",
"The Largest Lyapunov Exponent"
],
"authors": [
{
"affiliation": null,
"fullName": "Shaoqing Yang",
"givenName": "Shaoqing",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sihua He",
"givenName": "Sihua",
"surname": "He",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hongwen Lin",
"givenName": "Hongwen",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icycs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-11-01T00:00:00",
"pubType": "proceedings",
"pages": "2973-2977",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3398-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3398c968",
"articleId": "12OmNASrb0x",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3398d082",
"articleId": "12OmNBUS76b",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icece/2010/4031/0/4031c039",
"title": "Study of Lyapunov Exponent of the Chaotic Signal Wave Interception",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c039/12OmNAolGMz",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/1/3962a027",
"title": "A Chaotic System with Constant Lyapunov Exponent Spectrum and its Evolvement",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962a027/12OmNCyBXiZ",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/1",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c885",
"title": "Numeration and Comparison of Two Kinds of Lyapunov Dimensions in Autonomous Chaotic Flows",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c885/12OmNrAMEJL",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/2/3962c204",
"title": "Extract and Explore Chaos Characters of an Abnormal Turbo-Unit",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962c204/12OmNvSbBNU",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/2",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwcfta/2009/3853/0/3853a404",
"title": "Study on Fault Analysis of Rotor Machinery Using Lyapunov Exponent-Fractal Dimension",
"doi": null,
"abstractUrl": "/proceedings-article/iwcfta/2009/3853a404/12OmNwFicU0",
"parentPublication": {
"id": "proceedings/iwcfta/2009/3853/0",
"title": "Chaos-Fractals Theories and Applications, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iwcfta/2009/3853/0/3853a226",
"title": "Complex Dynamics of 4D Hopfield-Type Neural Network with Two Parameters",
"doi": null,
"abstractUrl": "/proceedings-article/iwcfta/2009/3853a226/12OmNwJPMXH",
"parentPublication": {
"id": "proceedings/iwcfta/2009/3853/0",
"title": "Chaos-Fractals Theories and Applications, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacte/2008/3489/0/3489a457",
"title": "Chaos in Orthogonal Frequency Divison Multiplexing Technique",
"doi": null,
"abstractUrl": "/proceedings-article/icacte/2008/3489a457/12OmNwpGgHv",
"parentPublication": {
"id": "proceedings/icacte/2008/3489/0",
"title": "2008 International Conference on Advanced Computer Theory and Engineering (ICACTE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfn/2009/3567/0/3567a122",
"title": "Bifurcation and Lyapunov Exponent in Optical Injected Laser",
"doi": null,
"abstractUrl": "/proceedings-article/icfn/2009/3567a122/12OmNxA3YRT",
"parentPublication": {
"id": "proceedings/icfn/2009/3567/0",
"title": "Future Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2011/4296/1/4296a474",
"title": "Analysis of Non-stationary and Extraction of Chaotic Characteristics about Logging Signals",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2011/4296a474/12OmNz61d7d",
"parentPublication": {
"id": "proceedings/icmtma/2011/4296/1",
"title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2009/3804/2/3804b189",
"title": "Short-Term Load Prediction Based on Chaos Time Series Theory",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2009/3804b189/12OmNzwpU15",
"parentPublication": {
"id": "proceedings/icicta/2009/3804/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzTH0GB",
"title": "Proceedings 17th IEEE Annual Conference on Computational Complexity",
"acronym": "ccc",
"groupId": "1000112",
"volume": "0",
"displayVolume": "0",
"year": "2002",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAolGLQ",
"doi": "10.1109/CCC.2002.1004333",
"title": "3-MANIFOLD KNOT GENUS is NP-complete",
"normalizedTitle": "3-MANIFOLD KNOT GENUS is NP-complete",
"abstract": "One of the central questions in topology is determining whether a given curve is knotted or unknotted. An algorithm to decide this question was given by Haken in 1961, using the technique of normal surfaces. These surfaces are rigid, discretized surfaces, well suited for algorithmic analysis.Any oriented surface without boundary can be obtained from a sphere by adding \"handles\". The number of handles is called the genus of the surface, and the smallest genus of a spanning surface for a curve is called the genus of the curve. A curve has genus zero if and only if it is unknotted. Schubert extended Haken's work, giving an algorithm to determine the genus of a curve in any 3-manifold.We examine the problem of deciding whether a polygonal knot in a closed triangulated three-dimensional manifold bounds a surface of genus at most g, 3-MANIFOLD KNOT GENUS. Previous work of Hass, Lagarias and Pippenger had shown that this problem is in {\\bf PSPACE}. No lower bounds on the running time were previously known. We show that this problem is NP-complete.",
"abstracts": [
{
"abstractType": "Regular",
"content": "One of the central questions in topology is determining whether a given curve is knotted or unknotted. An algorithm to decide this question was given by Haken in 1961, using the technique of normal surfaces. These surfaces are rigid, discretized surfaces, well suited for algorithmic analysis.Any oriented surface without boundary can be obtained from a sphere by adding \"handles\". The number of handles is called the genus of the surface, and the smallest genus of a spanning surface for a curve is called the genus of the curve. A curve has genus zero if and only if it is unknotted. Schubert extended Haken's work, giving an algorithm to determine the genus of a curve in any 3-manifold.We examine the problem of deciding whether a polygonal knot in a closed triangulated three-dimensional manifold bounds a surface of genus at most g, 3-MANIFOLD KNOT GENUS. Previous work of Hass, Lagarias and Pippenger had shown that this problem is in {\\bf PSPACE}. No lower bounds on the running time were previously known. We show that this problem is NP-complete.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "One of the central questions in topology is determining whether a given curve is knotted or unknotted. An algorithm to decide this question was given by Haken in 1961, using the technique of normal surfaces. These surfaces are rigid, discretized surfaces, well suited for algorithmic analysis.Any oriented surface without boundary can be obtained from a sphere by adding \"handles\". The number of handles is called the genus of the surface, and the smallest genus of a spanning surface for a curve is called the genus of the curve. A curve has genus zero if and only if it is unknotted. Schubert extended Haken's work, giving an algorithm to determine the genus of a curve in any 3-manifold.We examine the problem of deciding whether a polygonal knot in a closed triangulated three-dimensional manifold bounds a surface of genus at most g, 3-MANIFOLD KNOT GENUS. Previous work of Hass, Lagarias and Pippenger had shown that this problem is in {\\bf PSPACE}. No lower bounds on the running time were previously known. We show that this problem is NP-complete.",
"fno": "14680024",
"keywords": [
"Computational Complexity",
"Knot",
"3 Manifold",
"NP Complete",
"Normal Surface",
"Genus"
],
"authors": [
{
"affiliation": "University of Illinois at Chicago",
"fullName": "Ian Agol",
"givenName": "Ian",
"surname": "Agol",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California at Davis",
"fullName": "Joel Hass",
"givenName": "Joel",
"surname": "Hass",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California at Davis",
"fullName": "William Thurston",
"givenName": "William",
"surname": "Thurston",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ccc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2002-05-01T00:00:00",
"pubType": "proceedings",
"pages": "0024",
"year": "2002",
"issn": null,
"isbn": "0-7695-1468-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "14680023",
"articleId": "12OmNvlxJzj",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "14680025",
"articleId": "12OmNviZli7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2005/2766/0/01532843",
"title": "Visualization of the genus of knots",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532843/12OmNCdBDZg",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmai/2007/2901/0/29010085",
"title": "Capturing Outlines of Planar Images by Fuzzy Randomized Knot Insertion to Cubic Spline",
"doi": null,
"abstractUrl": "/proceedings-article/gmai/2007/29010085/12OmNrJiCHB",
"parentPublication": {
"id": "proceedings/gmai/2007/2901/0",
"title": "2007 Geometric Modeling and Imaging: New Advances",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dpvt/2002/1521/0/15210372",
"title": "Surface Reconstruction from Multiple Views using Rational B-Splines and Knot Insertion",
"doi": null,
"abstractUrl": "/proceedings-article/3dpvt/2002/15210372/12OmNwG90iZ",
"parentPublication": {
"id": "proceedings/3dpvt/2002/1521/0",
"title": "3D Data Processing Visualization and Transmission, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660053",
"title": "Reconstructing Manifold and Non-Manifold Surfaces from Point Clouds",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660053/12OmNxbmSzt",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660072",
"title": "Visualization of the Genus of Knots",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660072/12OmNySosMr",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smi/2005/2379/0/23790082",
"title": "Rational Spherical Splines for Genus Zero Shape Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/smi/2005/23790082/12OmNzcPA7G",
"parentPublication": {
"id": "proceedings/smi/2005/2379/0",
"title": "Proceedings. International Conference on Shape Modeling and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025349",
"title": "Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025349/13rRUB7a110",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2014/03/ttp2014030466",
"title": "Automatic Alignment of Genus-Zero Surfaces",
"doi": null,
"abstractUrl": "/journal/tp/2014/03/ttp2014030466/13rRUIIVllF",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/04/v0485",
"title": "Visualization of Seifert Surfaces",
"doi": null,
"abstractUrl": "/journal/tg/2006/04/v0485/13rRUxYIN40",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2020/9638/0/963800a231",
"title": "Knot and its invariants",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2020/963800a231/1rxhv7ORTOM",
"parentPublication": {
"id": "proceedings/mlbdbi/2020/9638/0",
"title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy5hRda",
"title": "Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT'06)",
"acronym": "3dpvt",
"groupId": "1000000",
"volume": "0",
"displayVolume": "0",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBqdr22",
"doi": "10.1109/3DPVT.2006.63",
"title": "Fast safe spline surrogates for large point clouds",
"normalizedTitle": "Fast safe spline surrogates for large point clouds",
"abstract": "To support real-time computation with large, possibly evolving point clouds and range data, we fit a trimmed uniform tensor-product spline function from one direction. The graph of this spline serves as a surrogate for the cloud, closely following the data safely in that, according to user choice, the data are always 'below' or 'above' when viewed in the fitting direction. That is, the point cloud is guaranteed to be completely covered from that direction and can be sandwiched between two matching spline surfaces if required. This yields both a data reduction since only the spline control points need to be further processed and defines a continuous surface in lieu of the isolated measurement points. For example, using a 20 times 20 spline, clouds of 300 K points are safely approximated in less than 1/2 second.",
"abstracts": [
{
"abstractType": "Regular",
"content": "To support real-time computation with large, possibly evolving point clouds and range data, we fit a trimmed uniform tensor-product spline function from one direction. The graph of this spline serves as a surrogate for the cloud, closely following the data safely in that, according to user choice, the data are always 'below' or 'above' when viewed in the fitting direction. That is, the point cloud is guaranteed to be completely covered from that direction and can be sandwiched between two matching spline surfaces if required. This yields both a data reduction since only the spline control points need to be further processed and defines a continuous surface in lieu of the isolated measurement points. For example, using a 20 times 20 spline, clouds of 300 K points are safely approximated in less than 1/2 second.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "To support real-time computation with large, possibly evolving point clouds and range data, we fit a trimmed uniform tensor-product spline function from one direction. The graph of this spline serves as a surrogate for the cloud, closely following the data safely in that, according to user choice, the data are always 'below' or 'above' when viewed in the fitting direction. That is, the point cloud is guaranteed to be completely covered from that direction and can be sandwiched between two matching spline surfaces if required. This yields both a data reduction since only the spline control points need to be further processed and defines a continuous surface in lieu of the isolated measurement points. For example, using a 20 times 20 spline, clouds of 300 K points are safely approximated in less than 1/2 second.",
"fno": "04155783",
"keywords": [
"Spline",
"Surface Fitting",
"Surface Reconstruction",
"Computer Science",
"Least Squares Approximation",
"Three Dimensional Displays",
"Least Squares Methods"
],
"authors": [
{
"affiliation": "Comput. Sci., Univ. of Florida, Gainesville, FL",
"fullName": "A. Myles",
"givenName": "A.",
"surname": "Myles",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "J. Peters",
"givenName": "J.",
"surname": "Peters",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dpvt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-06-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2006",
"issn": null,
"isbn": "0-7695-2825-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "282500623",
"articleId": "12OmNCgJe82",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "282500639",
"articleId": "12OmNvq5jsp",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cadcg/2005/2473/0/01604613",
"title": "A fitting approach with dynamic algebraic spline curves",
"doi": null,
"abstractUrl": "/proceedings-article/cadcg/2005/01604613/12OmNAoUSZM",
"parentPublication": {
"id": "proceedings/cadcg/2005/2473/0",
"title": "Proceedings. Ninth International Conference on Computer Aided Design and Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1994/6952/1/00413402",
"title": "Fast least-squares curve fitting using quasi-orthogonal splines",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1994/00413402/12OmNBkxspM",
"parentPublication": {
"id": "proceedings/icip/1994/6952/3",
"title": "Proceedings of 1st International Conference on Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmap/2000/0562/0/00838259",
"title": "Catmull-Clark surface fitting for reverse engineering applications",
"doi": null,
"abstractUrl": "/proceedings-article/gmap/2000/00838259/12OmNCxL9Tg",
"parentPublication": {
"id": "proceedings/gmap/2000/0562/0",
"title": "Proceedings Geometric Modeling and Processing 2000. Theory and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acssc/1990/2180/1/00523370",
"title": "Automatic Data Visulization Using Spline Functions",
"doi": null,
"abstractUrl": "/proceedings-article/acssc/1990/00523370/12OmNvAAtE9",
"parentPublication": {
"id": "proceedings/acssc/1990/2180/2",
"title": "1990 Conference Record Twenty-Fourth Asilomar Conference on Signals, Systems and Computers, 1990.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1994/5825/0/00323871",
"title": "Affine-invariant B-spline moments for curve matching",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1994/00323871/12OmNxGSme0",
"parentPublication": {
"id": "proceedings/cvpr/1994/5825/0",
"title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2011/688/0/05954508",
"title": "An Improved Algorithm for Surface Fitting Based on B Spline Function",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2011/05954508/12OmNxXCGLN",
"parentPublication": {
"id": "proceedings/icic/2011/688/0",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2011/0868/0/06004092",
"title": "Growing B-spline Model for Efficient Approximation of Complex Curves",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2011/06004092/12OmNzIUfXm",
"parentPublication": {
"id": "proceedings/iv/2011/0868/0",
"title": "2011 15th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iptc/2010/4196/0/4196a021",
"title": "Tension Spline Fitting with Bezier Curve",
"doi": null,
"abstractUrl": "/proceedings-article/iptc/2010/4196a021/12OmNzZEAGt",
"parentPublication": {
"id": "proceedings/iptc/2010/4196/0",
"title": "Intelligence Information Processing and Trusted Computing, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1992/01/i0036",
"title": "A Two-Stage Algorithm for Discontinuity-Preserving Surface Reconstruction",
"doi": null,
"abstractUrl": "/journal/tp/1992/01/i0036/13rRUxAAT20",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2000/06/i0642",
"title": "Ordering and Parameterizing Scattered 3D Data for B-Spline Surface Approximation",
"doi": null,
"abstractUrl": "/journal/tp/2000/06/i0642/13rRUxOdD99",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBSBk5H",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"acronym": "cadgraphics",
"groupId": "1001488",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCvLY0n",
"doi": "10.1109/CAD/Graphics.2011.35",
"title": "The Spherical Images of Triangular Mesh Surfaces",
"normalizedTitle": "The Spherical Images of Triangular Mesh Surfaces",
"abstract": "The representation of triangular mesh surface is proposed using spherical image. Surface signals like normals and curvatures are stored in spherical images using spherical parameterization and partition of the sphere. The generation depends on several geometric signals, not one single geometric signal. So its color reflects the properties of the triangular mesh surface more clearly. With simple arrays similar to 2D image, the spherical image can be post-processed easily using sophisticated image processing algorithms. Applications include segmentation, editing and model retrieval.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The representation of triangular mesh surface is proposed using spherical image. Surface signals like normals and curvatures are stored in spherical images using spherical parameterization and partition of the sphere. The generation depends on several geometric signals, not one single geometric signal. So its color reflects the properties of the triangular mesh surface more clearly. With simple arrays similar to 2D image, the spherical image can be post-processed easily using sophisticated image processing algorithms. Applications include segmentation, editing and model retrieval.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The representation of triangular mesh surface is proposed using spherical image. Surface signals like normals and curvatures are stored in spherical images using spherical parameterization and partition of the sphere. The generation depends on several geometric signals, not one single geometric signal. So its color reflects the properties of the triangular mesh surface more clearly. With simple arrays similar to 2D image, the spherical image can be post-processed easily using sophisticated image processing algorithms. Applications include segmentation, editing and model retrieval.",
"fno": "4497a119",
"keywords": [
"Reverse Engineering",
"Triangular Mesh Surface",
"Spherical Image",
"Spherical Parameterization"
],
"authors": [
{
"affiliation": null,
"fullName": "Yuankui Ma",
"givenName": "Yuankui",
"surname": "Ma",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shusheng Zhang",
"givenName": "Shusheng",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoliang Bai",
"givenName": "Xiaoliang",
"surname": "Bai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Haitao Fan",
"givenName": "Haitao",
"surname": "Fan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cadgraphics",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-09-01T00:00:00",
"pubType": "proceedings",
"pages": "119-123",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4497-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4497a111",
"articleId": "12OmNxymo5Q",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4497a124",
"articleId": "12OmNzn38YO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmtma/2010/3962/3/3962e702",
"title": "Survey on Planar Parameterization of Triangular Meshes",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962e702/12OmNA1mbfa",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/3",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/1/3843a309",
"title": "Morphing 3D Mesh Models Based on Spherical Parameterization",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843a309/12OmNBOUxiR",
"parentPublication": {
"id": "proceedings/mines/2009/3843/1",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dmdcm/2011/4413/0/4413a266",
"title": "Direct Spherical Parameterization Based on Surface Curvature",
"doi": null,
"abstractUrl": "/proceedings-article/dmdcm/2011/4413a266/12OmNCeaPV9",
"parentPublication": {
"id": "proceedings/dmdcm/2011/4413/0",
"title": "Digital Media and Digital Content Management, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2009/3791/0/3791a132",
"title": "On Spherical Product Surfaces in E3",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2009/3791a132/12OmNrFkeRT",
"parentPublication": {
"id": "proceedings/cw/2009/3791/0",
"title": "2009 International Conference on CyberWorlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmp/2004/2078/0/20780079",
"title": "Some Estimates of the Height of Rational Bernstein-Bezier Triangular Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/gmp/2004/20780079/12OmNxFaLD6",
"parentPublication": {
"id": "proceedings/gmp/2004/2078/0",
"title": "Geometric Modeling and Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2009/3789/0/3789a245",
"title": "A New Model of Triangular DP Surfaces and Its Properties",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2009/3789a245/12OmNxvwoYm",
"parentPublication": {
"id": "proceedings/cgiv/2009/3789/0",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a111",
"title": "Spherical Projective Displacement Mesh",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a111/12OmNxymo5Q",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmai/2008/3270/0/3270a053",
"title": "Chapter 9: Shape Analysis of Left Ventricle Using Invariant 3-D Spherical Harmonics Shape Descriptors",
"doi": null,
"abstractUrl": "/proceedings-article/gmai/2008/3270a053/12OmNyen1x6",
"parentPublication": {
"id": "proceedings/gmai/2008/3270/0",
"title": "Geometric Modeling and Imaging--New Trends",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccee/2009/3925/2/3925b258",
"title": "Feature-Preserving Smoothing Algorithm for Triangular Mesh Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/iccee/2009/3925b258/12OmNyv7miu",
"parentPublication": {
"id": "proceedings/iccee/2009/3925/2",
"title": "Computer and Electrical Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2003/01/v0056",
"title": "Approximating Digital 3D Shapes by Rational Gaussian Surfaces",
"doi": null,
"abstractUrl": "/journal/tg/2003/01/v0056/13rRUxOve9z",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAYoKlK",
"title": "2009 International Conference on CyberWorlds",
"acronym": "cw",
"groupId": "1000175",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrFkeRT",
"doi": "10.1109/CW.2009.64",
"title": "On Spherical Product Surfaces in E3",
"normalizedTitle": "On Spherical Product Surfaces in E3",
"abstract": "In the present study we consider spherical product surfaces X = axb of two 2D curves in E3. We prove that if a spherical product surface patch X = axb has vanishing Gaussian curvature K (i.e. a flat surface) then either a or b is a straight line. Further, we prove that if a(u) is a straight line and b(v) is a 2D curve then the spherical product is a non-minimal and flat surface. We also prove that if b(v) is a straight line passing through origin and a(u) is any 2D curve (which is not a line) then the spherical product is both minimal and flat. We also give some examples of spherical product surface patches with potential applications to visual cyberworlds.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the present study we consider spherical product surfaces X = axb of two 2D curves in E3. We prove that if a spherical product surface patch X = axb has vanishing Gaussian curvature K (i.e. a flat surface) then either a or b is a straight line. Further, we prove that if a(u) is a straight line and b(v) is a 2D curve then the spherical product is a non-minimal and flat surface. We also prove that if b(v) is a straight line passing through origin and a(u) is any 2D curve (which is not a line) then the spherical product is both minimal and flat. We also give some examples of spherical product surface patches with potential applications to visual cyberworlds.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the present study we consider spherical product surfaces X = axb of two 2D curves in E3. We prove that if a spherical product surface patch X = axb has vanishing Gaussian curvature K (i.e. a flat surface) then either a or b is a straight line. Further, we prove that if a(u) is a straight line and b(v) is a 2D curve then the spherical product is a non-minimal and flat surface. We also prove that if b(v) is a straight line passing through origin and a(u) is any 2D curve (which is not a line) then the spherical product is both minimal and flat. We also give some examples of spherical product surface patches with potential applications to visual cyberworlds.",
"fno": "3791a132",
"keywords": [
"Spherical Product Surface",
"Minimal Surfaces",
"Function Based Geometry Modelling"
],
"authors": [
{
"affiliation": null,
"fullName": "Kadri Arslan",
"givenName": "Kadri",
"surname": "Arslan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Betül Bulca",
"givenName": "Betül",
"surname": "Bulca",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bengü Bayram",
"givenName": "Bengü",
"surname": "Bayram",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Günay Öztürk",
"givenName": "Günay",
"surname": "Öztürk",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hassan Ugail",
"givenName": "Hassan",
"surname": "Ugail",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-09-01T00:00:00",
"pubType": "proceedings",
"pages": "132-137",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3791-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3791a126",
"articleId": "12OmNwseEXj",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3791a138",
"articleId": "12OmNxGAL71",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cw/2009/3791/0/3791a096",
"title": "Distortion Correction for Immersive Navigation in Spherical Image Environment",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2009/3791a096/12OmNAJVcFM",
"parentPublication": {
"id": "proceedings/cw/2009/3791/0",
"title": "2009 International Conference on CyberWorlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031c991",
"title": "Retrieval of 3D Models Based on Spherical Harmonics",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c991/12OmNAObbI2",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dmdcm/2011/4413/0/4413a266",
"title": "Direct Spherical Parameterization Based on Surface Curvature",
"doi": null,
"abstractUrl": "/proceedings-article/dmdcm/2011/4413a266/12OmNCeaPV9",
"parentPublication": {
"id": "proceedings/dmdcm/2011/4413/0",
"title": "Digital Media and Digital Content Management, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a119",
"title": "The Spherical Images of Triangular Mesh Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a119/12OmNCvLY0n",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mediacom/2010/4136/0/4136a094",
"title": "The Difference of Electrostatic Energy between Uniformly Charged Spherical Surface and Sphere",
"doi": null,
"abstractUrl": "/proceedings-article/mediacom/2010/4136a094/12OmNyRPgGp",
"parentPublication": {
"id": "proceedings/mediacom/2010/4136/0",
"title": "2010 International Conference on Multimedia Communications (Mediacom 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2009/3583/1/3583a514",
"title": "Research on Frequency Characteristics of Spherical-Cymbal Transducers",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583a514/12OmNyY4rtA",
"parentPublication": {
"id": "proceedings/icmtma/2009/3583/3",
"title": "2009 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025349",
"title": "Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025349/13rRUB7a110",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2006/01/mcg2006010064",
"title": "Hierarchical Spherical Distance Fields for Collision Detection",
"doi": null,
"abstractUrl": "/magazine/cg/2006/01/mcg2006010064/13rRUxBJhoR",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/1988/04/mcg1988040042",
"title": "Spherical Harmonic Molecular Surfaces",
"doi": null,
"abstractUrl": "/magazine/cg/1988/04/mcg1988040042/13rRUxBa5zF",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1995/07/i0681",
"title": "A Spherical Representation for Recognition of Free-Form Surfaces",
"doi": null,
"abstractUrl": "/journal/tp/1995/07/i0681/13rRUxcbnDp",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyxXltb",
"title": "2007 Geometric Modeling and Imaging: New Advances",
"acronym": "gmai",
"groupId": "1001947",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrJiCHB",
"doi": "10.1109/GMAI.2007.13",
"title": "Capturing Outlines of Planar Images by Fuzzy Randomized Knot Insertion to Cubic Spline",
"normalizedTitle": "Capturing Outlines of Planar Images by Fuzzy Randomized Knot Insertion to Cubic Spline",
"abstract": "The proposed work, in this paper, is concerned with an efficient technique of curve fitting using cubic splines. The technique has various phases including extracting outlines of images, detecting corner points from the detected outline, addition of extra knot points if needed. The last phase makes a significant contribution by making the technique automated. It uses the idea of knot insertion in a fuzzy randomized manner. The proposed algorithm is an iterative one. The algorithm proposed is computationally efficient as compared to least square approach.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The proposed work, in this paper, is concerned with an efficient technique of curve fitting using cubic splines. The technique has various phases including extracting outlines of images, detecting corner points from the detected outline, addition of extra knot points if needed. The last phase makes a significant contribution by making the technique automated. It uses the idea of knot insertion in a fuzzy randomized manner. The proposed algorithm is an iterative one. The algorithm proposed is computationally efficient as compared to least square approach.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The proposed work, in this paper, is concerned with an efficient technique of curve fitting using cubic splines. The technique has various phases including extracting outlines of images, detecting corner points from the detected outline, addition of extra knot points if needed. The last phase makes a significant contribution by making the technique automated. It uses the idea of knot insertion in a fuzzy randomized manner. The proposed algorithm is an iterative one. The algorithm proposed is computationally efficient as compared to least square approach.",
"fno": "29010085",
"keywords": [
"Planar Image",
"Outline",
"Curve Fitting",
"Cubic Spline",
"Knot Insertion"
],
"authors": [
{
"affiliation": "King Fahd University of Petroleum and Minerals",
"fullName": "Muhammad Sarfraz",
"givenName": "Muhammad",
"surname": "Sarfraz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "King Fahd University of Petroleum and Minerals",
"fullName": "Aiman Rasheed",
"givenName": "Aiman",
"surname": "Rasheed",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "gmai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-06-01T00:00:00",
"pubType": "proceedings",
"pages": "85-90",
"year": "2007",
"issn": null,
"isbn": "0-7695-2901-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "29010079",
"articleId": "12OmNz6iOqt",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "29010091",
"articleId": "12OmNButq0m",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fskd/2009/3735/5/3735e080",
"title": "The Study of Interpolation Algorithm Based on Cubic Spline in Marching Cubes Method",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735e080/12OmNBscCUk",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/5",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sitis/2008/3493/0/3493a443",
"title": "Simulated Annealing on Cubic Splines for Vectorizing Outlines of Generic Shapes",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2008/3493a443/12OmNqBtj0H",
"parentPublication": {
"id": "proceedings/sitis/2008/3493/0",
"title": "2008 IEEE International Conference on Signal Image Technology and Internet Based Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccet/2009/3521/1/3521a243",
"title": "A Bivariate C1 Cubic Spline Space on Wang's Refinement",
"doi": null,
"abstractUrl": "/proceedings-article/iccet/2009/3521a243/12OmNqGRG89",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/1990/2057/0/00139624",
"title": "Interpolating cubic spline contours by minimizing second derivative discontinuity",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/1990/00139624/12OmNwCsdAT",
"parentPublication": {
"id": "proceedings/iccv/1990/2057/0",
"title": "Proceedings Third International Conference on Computer Vision",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmp/2004/2078/0/20780115",
"title": "Bivariate Cubic Spline Space and Bivariate Cubic NURBS Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/gmp/2004/20780115/12OmNxUMHo1",
"parentPublication": {
"id": "proceedings/gmp/2004/2078/0",
"title": "Geometric Modeling and Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2007/2928/0/29280255",
"title": "Capturing Outlines of Planar Images by Cubic Spline using Stochastic Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2007/29280255/12OmNyS6RxH",
"parentPublication": {
"id": "proceedings/cgiv/2007/2928/0",
"title": "Computer Graphics, Imaging and Visualisation (CGIV 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgi/1999/0185/0/01850188",
"title": "Monotonic Cubic Spline Interpolation",
"doi": null,
"abstractUrl": "/proceedings-article/cgi/1999/01850188/12OmNynsbvs",
"parentPublication": {
"id": "proceedings/cgi/1999/0185/0",
"title": "Computer Graphics International Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/1999/0210/0/02100232",
"title": "Conic Representation of a Rational Cubic Spline",
"doi": null,
"abstractUrl": "/proceedings-article/iv/1999/02100232/12OmNzuIjlv",
"parentPublication": {
"id": "proceedings/iv/1999/0210/0",
"title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2001/1195/0/11950063",
"title": "Shape Control of Cubic B-spline and NURBS Curves by Knot Modifications",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2001/11950063/12OmNzwpUe5",
"parentPublication": {
"id": "proceedings/iv/2001/1195/0",
"title": "Proceedings Fifth International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06025349",
"title": "Spherical DCB-Spline Surfaces with Hierarchical and Adaptive Knot Insertion",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06025349/13rRUB7a110",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyYm2vK",
"title": "Computer Graphics International Conference",
"acronym": "cgi",
"groupId": "1000132",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwnH4Ua",
"doi": "10.1109/CGI.2000.852331",
"title": "Reconstruction of B-Spline Surfaces from Scattered Data Points",
"normalizedTitle": "Reconstruction of B-Spline Surfaces from Scattered Data Points",
"abstract": "We present a new approach for reconstructing a smooth surface from a set of scattered points in three-dimensional (3D) space. Our algorithm first decomposes a given point set into a quadtree-like data structure known as a strip tree. The strip tree is used to fit a set of least squares quadratic surfaces to the data points. These quadratic surfaces are then degree-elevated to bi-cubic surfaces and blended together to form a set of B-spline surfaces that approximates the given point set.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a new approach for reconstructing a smooth surface from a set of scattered points in three-dimensional (3D) space. Our algorithm first decomposes a given point set into a quadtree-like data structure known as a strip tree. The strip tree is used to fit a set of least squares quadratic surfaces to the data points. These quadratic surfaces are then degree-elevated to bi-cubic surfaces and blended together to form a set of B-spline surfaces that approximates the given point set.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a new approach for reconstructing a smooth surface from a set of scattered points in three-dimensional (3D) space. Our algorithm first decomposes a given point set into a quadtree-like data structure known as a strip tree. The strip tree is used to fit a set of least squares quadratic surfaces to the data points. These quadratic surfaces are then degree-elevated to bi-cubic surfaces and blended together to form a set of B-spline surfaces that approximates the given point set.",
"fno": "06430163",
"keywords": [
"B Splines",
"Reverse Engineering",
"Surface Reconstruction",
"Scattered Data",
"Surface Fitting"
],
"authors": [
{
"affiliation": "University of California at Davis",
"fullName": "Benjamin Gregorski",
"givenName": "Benjamin",
"surname": "Gregorski",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California at Davis",
"fullName": "Bernd Hamann at Kenneth I. Joy",
"givenName": "Bernd Hamann at Kenneth I.",
"surname": "Joy",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cgi",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-06-01T00:00:00",
"pubType": "proceedings",
"pages": "163",
"year": "2000",
"issn": "1530-1052",
"isbn": "0-7695-0643-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06430153",
"articleId": "12OmNASraxa",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06430173",
"articleId": "12OmNx3q6YH",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwekjuM",
"title": "9th International Conference on Pattern Recognition",
"acronym": "icpr",
"groupId": "1000545",
"volume": "0",
"displayVolume": "0",
"year": "1988",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxWuiip",
"doi": "10.1109/ICPR.1988.28227",
"title": "Calculation method of surface representation using B spline mask",
"normalizedTitle": "Calculation method of surface representation using B spline mask",
"abstract": "A series of masks is derived on the basis of spline function theory and used to fit a 3-D object surface. The multiple-order derivative and curvature are also calculated. Results are compared with those given by other methods. It is found that the present fitting masks provide higher precision than that reported by other researchers and are somewhat better than the Gauss filter.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "A series of masks is derived on the basis of spline function theory and used to fit a 3-D object surface. The multiple-order derivative and curvature are also calculated. Results are compared with those given by other methods. It is found that the present fitting masks provide higher precision than that reported by other researchers and are somewhat better than the Gauss filter.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A series of masks is derived on the basis of spline function theory and used to fit a 3-D object surface. The multiple-order derivative and curvature are also calculated. Results are compared with those given by other methods. It is found that the present fitting masks provide higher precision than that reported by other researchers and are somewhat better than the Gauss filter.",
"fno": "00028227",
"keywords": [
"Computer Vision",
"Splines Mathematics",
"Computer Vision",
"Surface Representation",
"B Spline Mask",
"3 D Object Surface",
"Multiple Order Derivative",
"Curvature",
"Spline",
"Surface Fitting",
"Polynomials",
"Surface Treatment",
"Smoothing Methods",
"Computer Vision",
"Geometry",
"Wiener Filter"
],
"authors": [
{
"affiliation": "Electron. Dept., East China Normal Univ., Shanghai, China",
"fullName": "Lou Meng",
"givenName": null,
"surname": "Lou Meng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Electron. Dept., East China Normal Univ., Shanghai, China",
"fullName": "Kang-Hong Cheng",
"givenName": null,
"surname": "Kang-Hong Cheng",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1988-01-01T00:00:00",
"pubType": "proceedings",
"pages": "300,301,302",
"year": "1988",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00028226",
"articleId": "12OmNyKJimL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00028228",
"articleId": "12OmNx7G62d",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icpr/1994/6265/1/00576274",
"title": "Fusion of 3D B-spline surface patches reconstructed from image sequences",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/1994/00576274/12OmNB7LvBZ",
"parentPublication": {
"id": "proceedings/icpr/1994/6265/1",
"title": "Proceedings of 12th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/2/3336c975",
"title": "Uniform B-Spline Curve and Surface with Shape Parameters",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336c975/12OmNqBbI2O",
"parentPublication": {
"id": "proceedings/csse/2008/3336/6",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1988/0862/0/00196244",
"title": "Spline-based surface fitting on range images for CAD applications",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1988/00196244/12OmNrF2DHn",
"parentPublication": {
"id": "proceedings/cvpr/1988/0862/0",
"title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1994/5825/0/00323871",
"title": "Affine-invariant B-spline moments for curve matching",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1994/00323871/12OmNxGSme0",
"parentPublication": {
"id": "proceedings/cvpr/1994/5825/0",
"title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2011/688/0/05954508",
"title": "An Improved Algorithm for Surface Fitting Based on B Spline Function",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2011/05954508/12OmNxXCGLN",
"parentPublication": {
"id": "proceedings/icic/2011/688/0",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2000/0868/0/08680202",
"title": "Subdivision Surface Fitting Using QEM-Based Mesh Simplification and Reconstruction of Approximated B-Spline Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2000/08680202/12OmNy49sFt",
"parentPublication": {
"id": "proceedings/pg/2000/0868/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1989/1952/0/00037854",
"title": "Discontinuity preserving surface reconstruction",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1989/00037854/12OmNyPQ4Q6",
"parentPublication": {
"id": "proceedings/cvpr/1989/1952/0",
"title": "1989 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2007/10/i1853",
"title": "2D Affine-Invariant Contour Matching Using B-Spline Model",
"doi": null,
"abstractUrl": "/journal/tp/2007/10/i1853/13rRUIIVldN",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/1986/02/mcg1986020041",
"title": "Ray Tracing Free-Form B-Spline Surfaces",
"doi": null,
"abstractUrl": "/magazine/cg/1986/02/mcg1986020041/13rRUxNmPKT",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2000/06/i0642",
"title": "Ordering and Parameterizing Scattered 3D Data for B-Spline Surface Approximation",
"doi": null,
"abstractUrl": "/journal/tp/2000/06/i0642/13rRUxOdD99",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz4BdvM",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"acronym": "icic",
"groupId": "1002818",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxXCGLN",
"doi": "10.1109/ICIC.2011.35",
"title": "An Improved Algorithm for Surface Fitting Based on B Spline Function",
"normalizedTitle": "An Improved Algorithm for Surface Fitting Based on B Spline Function",
"abstract": "The B spline function is widely applied for the data processing, such as computer graphics, artificial intelligence and other enginging. In this paper, by using the B spline basic function, an explicit form of 3-order C-B spline basic function is presented based on integral recurrence formula of the C-B spline basic. And an improved algorithm is given for surface fitting combined with least squares theory. The numerical examples indicated that in the case of consistently accuracy, the improved C-B spline fitting algorithm can save as 70% computing time as the B spline fit algorithm at least.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The B spline function is widely applied for the data processing, such as computer graphics, artificial intelligence and other enginging. In this paper, by using the B spline basic function, an explicit form of 3-order C-B spline basic function is presented based on integral recurrence formula of the C-B spline basic. And an improved algorithm is given for surface fitting combined with least squares theory. The numerical examples indicated that in the case of consistently accuracy, the improved C-B spline fitting algorithm can save as 70% computing time as the B spline fit algorithm at least.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The B spline function is widely applied for the data processing, such as computer graphics, artificial intelligence and other enginging. In this paper, by using the B spline basic function, an explicit form of 3-order C-B spline basic function is presented based on integral recurrence formula of the C-B spline basic. And an improved algorithm is given for surface fitting combined with least squares theory. The numerical examples indicated that in the case of consistently accuracy, the improved C-B spline fitting algorithm can save as 70% computing time as the B spline fit algorithm at least.",
"fno": "05954508",
"keywords": [
"Least Squares Approximations",
"Splines Mathematics",
"Surface Fitting",
"Surface Fitting Algorithm",
"B Spline Function",
"3 Order C B Spline Basic Function",
"Least Squares Theory",
"Spline",
"Surface Fitting",
"Fitting",
"Manganese",
"Bismuth",
"Equations",
"Accuracy",
"B Spline Function",
"C B Spline Function",
"Surface Fitting",
"Numerical Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Zhan Wang",
"givenName": "Zhan",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jun Yu",
"givenName": "Jun",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bida Su",
"givenName": "Bida",
"surname": "Su",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaodan Xie",
"givenName": "Xiaodan",
"surname": "Xie",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icic",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-04-01T00:00:00",
"pubType": "proceedings",
"pages": "80-82",
"year": "2011",
"issn": "2160-7443",
"isbn": "978-1-61284-688-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05954507",
"articleId": "12OmNy5R3tw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05954509",
"articleId": "12OmNqJHFBS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/1992/2630/0/00236697",
"title": "Vectorized algorithm for B-spline curve fitting on CRAY X-MP EA/16se",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1992/00236697/12OmNASILS5",
"parentPublication": {
"id": "proceedings/sc/1992/2630/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadcg/2005/2473/0/01604613",
"title": "A fitting approach with dynamic algebraic spline curves",
"doi": null,
"abstractUrl": "/proceedings-article/cadcg/2005/01604613/12OmNAoUSZM",
"parentPublication": {
"id": "proceedings/cadcg/2005/2473/0",
"title": "Proceedings. Ninth International Conference on Computer Aided Design and Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a251",
"title": "Multi-resolution Mesh Fitting by B-spline Surfaces for Reverse Engineering",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a251/12OmNBlFQY1",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bmei/2008/3118/1/3118a765",
"title": "3-D Representation and Volumetric Measurement of Human Heart from a Cylindrical B-Spline Surface Model",
"doi": null,
"abstractUrl": "/proceedings-article/bmei/2008/3118a765/12OmNx1qV0Z",
"parentPublication": {
"id": "proceedings/bmei/2008/3118/1",
"title": "2008 International Conference on Biomedical Engineering and Informatics (BMEI 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/1988/0878/0/00028227",
"title": "Calculation method of surface representation using B spline mask",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/1988/00028227/12OmNxWuiip",
"parentPublication": {
"id": "proceedings/icpr/1988/0878/0",
"title": "9th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kam/2009/3888/1/3888a220",
"title": "Transformer Winding Vibration Enveloping for Empirical Mode Decomposition Based on Non-uniform B-Spline Fitting",
"doi": null,
"abstractUrl": "/proceedings-article/kam/2009/3888a220/12OmNy2rRVm",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2000/0868/0/08680202",
"title": "Subdivision Surface Fitting Using QEM-Based Mesh Simplification and Reconstruction of Approximated B-Spline Surfaces",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2000/08680202/12OmNy49sFt",
"parentPublication": {
"id": "proceedings/pg/2000/0868/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2012/1985/0/06258063",
"title": "A BP Training Fitting Method about Multivariate BRDF Based on B-spline Function",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2012/06258063/12OmNybfqXd",
"parentPublication": {
"id": "proceedings/icic/2012/1985/0",
"title": "2012 Fifth International Conference on Information and Computing Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/1986/02/mcg1986020041",
"title": "Ray Tracing Free-Form B-Spline Surfaces",
"doi": null,
"abstractUrl": "/magazine/cg/1986/02/mcg1986020041/13rRUxNmPKT",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2000/06/i0642",
"title": "Ordering and Parameterizing Scattered 3D Data for B-Spline Surface Approximation",
"doi": null,
"abstractUrl": "/journal/tp/2000/06/i0642/13rRUxOdD99",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNqG0SXH",
"title": "Computer Graphics and Applications, Pacific Conference on",
"acronym": "pg",
"groupId": "1000130",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy49sFt",
"doi": "10.1109/PCCGA.2000.883942",
"title": "Subdivision Surface Fitting Using QEM-Based Mesh Simplification and Reconstruction of Approximated B-Spline Surfaces",
"normalizedTitle": "Subdivision Surface Fitting Using QEM-Based Mesh Simplification and Reconstruction of Approximated B-Spline Surfaces",
"abstract": "We present a general method for automatically reconstructing a network of B-spline patches based on the Doo-Sabin subdivision surface. This method consists of two parts, surface fitting and surface construction. In surface fitting, mesh simplification based on QEM (Quadric Error Metrics) is used and a control mesh that approximates a Doo-Sabin subdivision surface is constructed. In surface construction, we define a B-spline surface using a surface spline method; and a constructed network of B-spline patches is guaranteed G 1 continuous. In addition, this method has the advantage of enabling the user to select detail levels of the control mesh by utilizing a mesh simplification process.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a general method for automatically reconstructing a network of B-spline patches based on the Doo-Sabin subdivision surface. This method consists of two parts, surface fitting and surface construction. In surface fitting, mesh simplification based on QEM (Quadric Error Metrics) is used and a control mesh that approximates a Doo-Sabin subdivision surface is constructed. In surface construction, we define a B-spline surface using a surface spline method; and a constructed network of B-spline patches is guaranteed G 1 continuous. In addition, this method has the advantage of enabling the user to select detail levels of the control mesh by utilizing a mesh simplification process.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a general method for automatically reconstructing a network of B-spline patches based on the Doo-Sabin subdivision surface. This method consists of two parts, surface fitting and surface construction. In surface fitting, mesh simplification based on QEM (Quadric Error Metrics) is used and a control mesh that approximates a Doo-Sabin subdivision surface is constructed. In surface construction, we define a B-spline surface using a surface spline method; and a constructed network of B-spline patches is guaranteed G 1 continuous. In addition, this method has the advantage of enabling the user to select detail levels of the control mesh by utilizing a mesh simplification process.",
"fno": "08680202",
"keywords": [
"Computer Graphics",
"Geometric Modeling",
"Subdivision Surface",
"Surface Fitting",
"Mesh Simplification"
],
"authors": [
{
"affiliation": "University of Tokyo",
"fullName": "Shingo Takeuchi",
"givenName": "Shingo",
"surname": "Takeuchi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Tokyo",
"fullName": "Hiromasa Suzuki",
"givenName": "Hiromasa",
"surname": "Suzuki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Tokyo",
"fullName": "Fumihiko Kimura",
"givenName": "Fumihiko",
"surname": "Kimura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Keio University",
"fullName": "Takashi Kanai",
"givenName": "Takashi",
"surname": "Kanai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Carnegie Mellon University",
"fullName": "Kenji Shimada",
"givenName": "Kenji",
"surname": "Shimada",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pg",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-10-01T00:00:00",
"pubType": "proceedings",
"pages": "202",
"year": "2000",
"issn": null,
"isbn": "0-7695-0868-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08680192",
"articleId": "12OmNxHryeB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08680213",
"articleId": "12OmNBkxspv",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBSBk5H",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"acronym": "cadgraphics",
"groupId": "1001488",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBEGYGs",
"doi": "10.1109/CAD/Graphics.2011.41",
"title": "Lattice-Based Skinning and Deformation for Real-Time Skeleton-Driven Animation",
"normalizedTitle": "Lattice-Based Skinning and Deformation for Real-Time Skeleton-Driven Animation",
"abstract": "In this paper, we present an efficient framework to deform polygonal models for skeleton-driven animation. Standard solutions of skeleton-driven animation, such as linear blend skinning, require intensive artist intervention and focus on primary deformations. The proposed approach can generate both low- and high-frequency surface motions such as muscle deformation and vibrations with little user intervention. Given a surface mesh, we construct a lattice of cubic cells embracing the mesh and we apply lattice-based smooth skinning to drive the surface primary deformation with volume preservation. Lattice shape matching with dynamic particles, in the meantime, is utilized for secondary deformations. Due to the highly parallel lattice structure, the proposed method is liable to GPU computation. Our results show that it is adequate to vividly real-time animation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present an efficient framework to deform polygonal models for skeleton-driven animation. Standard solutions of skeleton-driven animation, such as linear blend skinning, require intensive artist intervention and focus on primary deformations. The proposed approach can generate both low- and high-frequency surface motions such as muscle deformation and vibrations with little user intervention. Given a surface mesh, we construct a lattice of cubic cells embracing the mesh and we apply lattice-based smooth skinning to drive the surface primary deformation with volume preservation. Lattice shape matching with dynamic particles, in the meantime, is utilized for secondary deformations. Due to the highly parallel lattice structure, the proposed method is liable to GPU computation. Our results show that it is adequate to vividly real-time animation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present an efficient framework to deform polygonal models for skeleton-driven animation. Standard solutions of skeleton-driven animation, such as linear blend skinning, require intensive artist intervention and focus on primary deformations. The proposed approach can generate both low- and high-frequency surface motions such as muscle deformation and vibrations with little user intervention. Given a surface mesh, we construct a lattice of cubic cells embracing the mesh and we apply lattice-based smooth skinning to drive the surface primary deformation with volume preservation. Lattice shape matching with dynamic particles, in the meantime, is utilized for secondary deformations. Due to the highly parallel lattice structure, the proposed method is liable to GPU computation. Our results show that it is adequate to vividly real-time animation.",
"fno": "4497a306",
"keywords": [
"Skeleton Driven Animation",
"Secondary Deformation",
"Skinning"
],
"authors": [
{
"affiliation": null,
"fullName": "Cheng-Hao Chen",
"givenName": "Cheng-Hao",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "I-Chen Lin",
"givenName": "I-Chen",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ming-Han Tsai",
"givenName": "Ming-Han",
"surname": "Tsai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Pin-Hua Lu",
"givenName": "Pin-Hua",
"surname": "Lu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cadgraphics",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-09-01T00:00:00",
"pubType": "proceedings",
"pages": "306-312",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4497-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4497a302",
"articleId": "12OmNwDj0Xk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4497a313",
"articleId": "12OmNxEBzlJ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cgiv/2009/3789/0/3789a032",
"title": "Particle Based Skinning",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2009/3789a032/12OmNAObbJ7",
"parentPublication": {
"id": "proceedings/cgiv/2009/3789/0",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvmp/2009/3893/0/3893a061",
"title": "Skeleton Driven Laplacian Volumetric Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/cvmp/2009/3893a061/12OmNAle6xC",
"parentPublication": {
"id": "proceedings/cvmp/2009/3893/0",
"title": "2009 Conference for Visual Media Production",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/2000/0683/0/06830002",
"title": "Integrated System for Skin Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/2000/06830002/12OmNAtaRXK",
"parentPublication": {
"id": "proceedings/ca/2000/0683/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2003/2028/0/20280102",
"title": "Skinning Catmull-Clark Subdivision Surfaces with Incompatible Cross-Sectional Curves",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2003/20280102/12OmNvCzFdj",
"parentPublication": {
"id": "proceedings/pg/2003/2028/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/1996/7588/0/75880098",
"title": "Facial Animation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2",
"parentPublication": {
"id": "proceedings/ca/1996/7588/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cso/2010/4030/2/4030b447",
"title": "2D Cartoon Character Deformation by Sketch Skeleton",
"doi": null,
"abstractUrl": "/proceedings-article/cso/2010/4030b447/12OmNxWLTkO",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vv/1998/9180/0/91800047",
"title": "Volume Animation Using the Skeleton Tree",
"doi": null,
"abstractUrl": "/proceedings-article/vv/1998/91800047/12OmNyLiuwI",
"parentPublication": {
"id": "proceedings/vv/1998/9180/0",
"title": "Volume Visualization and Graphics, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvri/2011/0054/0/05759655",
"title": "Automatic skeleton generation and character skinning",
"doi": null,
"abstractUrl": "/proceedings-article/isvri/2011/05759655/12OmNyqzM1p",
"parentPublication": {
"id": "proceedings/isvri/2011/0054/0",
"title": "2011 IEEE International Symposium on VR Innovation (ISVRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2014/4677/0/4677a130",
"title": "Automatic Generation of Skeleton Animation from 3D Human Mesh Model",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2014/4677a130/12OmNzayNus",
"parentPublication": {
"id": "proceedings/cw/2014/4677/0",
"title": "2014 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/03/ttg2011030368",
"title": "Scan-Based Volume Animation Driven by Locally Adaptive Articulated Registrations",
"doi": null,
"abstractUrl": "/journal/tg/2011/03/ttg2011030368/13rRUwInvB0",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx8wTfK",
"title": "Proceedings. Computer Graphics International",
"acronym": "cgi",
"groupId": "1000132",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCzb9zV",
"doi": "10.1109/CGI.2004.1309228",
"title": "Animated Sweepers: Keyframed Swept Deformations",
"normalizedTitle": "Animated Sweepers: Keyframed Swept Deformations",
"abstract": "This paper presents animated sweepers, a method for animating the space deformations called sweepers. This technique allows a user to animate the modeling of a shape, and to edit the animation until it satisfies the user?s requirements. To place this method in the more general framework of animation with space deformation, we propose an overview of the possible relations between time and the deformation parameter. We formulate sweepers to take into account a varying time parameter, and present the data structure that allows the user to efficiently edit the modeling of a shape. This data structure has been implemented as a Maya plugin. Its implementation in the Maya API is described.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents animated sweepers, a method for animating the space deformations called sweepers. This technique allows a user to animate the modeling of a shape, and to edit the animation until it satisfies the user?s requirements. To place this method in the more general framework of animation with space deformation, we propose an overview of the possible relations between time and the deformation parameter. We formulate sweepers to take into account a varying time parameter, and present the data structure that allows the user to efficiently edit the modeling of a shape. This data structure has been implemented as a Maya plugin. Its implementation in the Maya API is described.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents animated sweepers, a method for animating the space deformations called sweepers. This technique allows a user to animate the modeling of a shape, and to edit the animation until it satisfies the user?s requirements. To place this method in the more general framework of animation with space deformation, we propose an overview of the possible relations between time and the deformation parameter. We formulate sweepers to take into account a varying time parameter, and present the data structure that allows the user to efficiently edit the modeling of a shape. This data structure has been implemented as a Maya plugin. Its implementation in the Maya API is described.",
"fno": "21710320",
"keywords": [
"Free Form Deformation",
"Shape Animation",
"Nonlinear Transformations"
],
"authors": [
{
"affiliation": "University of Otago",
"fullName": "Alexis Angelidis",
"givenName": "Alexis",
"surname": "Angelidis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Otago",
"fullName": "Geoff Wyvill",
"givenName": "Geoff",
"surname": "Wyvill",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cgi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-06-01T00:00:00",
"pubType": "proceedings",
"pages": "320-326",
"year": "2004",
"issn": "1530-1052",
"isbn": "0-7695-2171-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21710312",
"articleId": "12OmNwB2dT6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21710327",
"articleId": "12OmNASILTV",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pg/1998/8620/0/86200115",
"title": "General Constrained Deformations based on Generalized Metaballs",
"doi": null,
"abstractUrl": "/proceedings-article/pg/1998/86200115/12OmNA14A5u",
"parentPublication": {
"id": "proceedings/pg/1998/8620/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isuvr/2010/4124/0/4124a024",
"title": "Deformation and Simulation of 3D Contents for the Digilog Book",
"doi": null,
"abstractUrl": "/proceedings-article/isuvr/2010/4124a024/12OmNBBhN7i",
"parentPublication": {
"id": "proceedings/isuvr/2010/4124/0",
"title": "International Symposium on Ubiquitous Virtual Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/1999/0210/0/02100238",
"title": "Direct Manipulation of Surfaces using NURBS-Based Free-Form Deformations",
"doi": null,
"abstractUrl": "/proceedings-article/iv/1999/02100238/12OmNBBzoct",
"parentPublication": {
"id": "proceedings/iv/1999/0210/0",
"title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a306",
"title": "Lattice-Based Skinning and Deformation for Real-Time Skeleton-Driven Animation",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a306/12OmNBEGYGs",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/1996/7588/0/75880098",
"title": "Facial Animation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2",
"parentPublication": {
"id": "proceedings/ca/1996/7588/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gmp/2000/0562/0/05620408",
"title": "B-Spline Free-Form Deformation of Polygonal Objects through Fast Functional Composition",
"doi": null,
"abstractUrl": "/proceedings-article/gmp/2000/05620408/12OmNvjgWlR",
"parentPublication": {
"id": "proceedings/gmp/2000/0562/0",
"title": "Geometric Modeling and Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cad-cg/2005/2473/0/24730149",
"title": "Fast Mesh-Free Deformations",
"doi": null,
"abstractUrl": "/proceedings-article/cad-cg/2005/24730149/12OmNxcMSlq",
"parentPublication": {
"id": "proceedings/cad-cg/2005/2473/0",
"title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/1997/7984/0/79840093",
"title": "Dirichlet Free-Form Deformations and their Application to Hand Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/1997/79840093/12OmNz5JChG",
"parentPublication": {
"id": "proceedings/ca/1997/7984/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2002/1784/0/17840471",
"title": "A Simple Approach to Interactive Free-Form Shape Deformations",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2002/17840471/12OmNz6iO7g",
"parentPublication": {
"id": "proceedings/pg/2002/1784/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1997/03/v0201",
"title": "Dynamic Free-Form Deformations for Animation Synthesis",
"doi": null,
"abstractUrl": "/journal/tg/1997/03/v0201/13rRUxASuhl",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzvQI1T",
"title": "Proceedings of 3rd International Conference on Document Analysis and Recognition",
"acronym": "icdar",
"groupId": "1000219",
"volume": "1",
"displayVolume": "1",
"year": "1995",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvD8RF6",
"doi": "10.1109/ICDAR.1995.598957",
"title": "Segmentation and recognition of handwritten characters using subspace method",
"normalizedTitle": "Segmentation and recognition of handwritten characters using subspace method",
"abstract": "Segmentation of characters freely written on papers is a difficult problem for a computer system. Conventionally this problem has been dealt with by image processing such os horizontal or vertical projection. But it sometimes splits and merges the character images and fails to correctly segment them, due to its lack of character recognition ability in the segmentation process. We propose in this paper a method to solve this problem by performing character recognition in segmentation process based on a subspace method. At first, a binary image on which characters are written, is scanned by a fixed sale of a window. At every scanning location, 196(7/spl times/7/spl times/4) features are obtained and projected to each character subspace. The character recognition using subspace method is carried out and character name (or group name) and its confidence are obtained. Since this character segmentation based on the subspace method performs the character recognition simultaneously, it can be applied to isolatedly or cursively written characters.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Segmentation of characters freely written on papers is a difficult problem for a computer system. Conventionally this problem has been dealt with by image processing such os horizontal or vertical projection. But it sometimes splits and merges the character images and fails to correctly segment them, due to its lack of character recognition ability in the segmentation process. We propose in this paper a method to solve this problem by performing character recognition in segmentation process based on a subspace method. At first, a binary image on which characters are written, is scanned by a fixed sale of a window. At every scanning location, 196(7/spl times/7/spl times/4) features are obtained and projected to each character subspace. The character recognition using subspace method is carried out and character name (or group name) and its confidence are obtained. Since this character segmentation based on the subspace method performs the character recognition simultaneously, it can be applied to isolatedly or cursively written characters.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Segmentation of characters freely written on papers is a difficult problem for a computer system. Conventionally this problem has been dealt with by image processing such os horizontal or vertical projection. But it sometimes splits and merges the character images and fails to correctly segment them, due to its lack of character recognition ability in the segmentation process. We propose in this paper a method to solve this problem by performing character recognition in segmentation process based on a subspace method. At first, a binary image on which characters are written, is scanned by a fixed sale of a window. At every scanning location, 196(7/spl times/7/spl times/4) features are obtained and projected to each character subspace. The character recognition using subspace method is carried out and character name (or group name) and its confidence are obtained. Since this character segmentation based on the subspace method performs the character recognition simultaneously, it can be applied to isolatedly or cursively written characters.",
"fno": "71280120",
"keywords": [
"Character Recognition Image Segmentation Handwriting Recognition Handwritten Characters Recognition Handwritten Characters Segmentation Subspace Method Image Processing Binary Image"
],
"authors": [
{
"affiliation": "Ryukoku Univ., Ohtsu, Japan",
"fullName": "Y. Ariki",
"givenName": "Y.",
"surname": "Ariki",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ryukoku Univ., Ohtsu, Japan",
"fullName": "Y. Motegi",
"givenName": "Y.",
"surname": "Motegi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdar",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1995-08-01T00:00:00",
"pubType": "proceedings",
"pages": "120",
"year": "1995",
"issn": null,
"isbn": "0-8186-7128-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "71280116",
"articleId": "12OmNBU1jFE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "71280124",
"articleId": "12OmNqNG3g4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": null,
"article": {
"id": "12OmNxWLTkO",
"doi": "10.1109/CSO.2010.32",
"title": "2D Cartoon Character Deformation by Sketch Skeleton",
"normalizedTitle": "2D Cartoon Character Deformation by Sketch Skeleton",
"abstract": "Because setting character key poses in animation is time-consuming, most work today are done in solving this problem. Representing the character pose by skeleton that has the joints and bone information is very intuitive, the sketch operation is very simple in interface and interactive mode. So, we present a novel 2D Cartoon character deformation method combining skeleton with sketch: First user sketch several key poses using of skeleton that indicate the moving sequence. Then sketch the object character’s skeleton corresponding to the origin skeleton that means they are topological isomorphism. Finally, we get the characters animation sequence by using deformation algorithm in terms of the least squares. Most important thing is deformation algorithm, the algorithm aims to preserve shape properties, that is deformations should be as rigid as possible. We use least squares to solve the deformation function. From the laboratory experiment, the system is not only easy to operate but also can implement character exaggerative deformations, which can be performed in real-time. Specially, the key pose implying from skeleton can retarget different objects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Because setting character key poses in animation is time-consuming, most work today are done in solving this problem. Representing the character pose by skeleton that has the joints and bone information is very intuitive, the sketch operation is very simple in interface and interactive mode. So, we present a novel 2D Cartoon character deformation method combining skeleton with sketch: First user sketch several key poses using of skeleton that indicate the moving sequence. Then sketch the object character’s skeleton corresponding to the origin skeleton that means they are topological isomorphism. Finally, we get the characters animation sequence by using deformation algorithm in terms of the least squares. Most important thing is deformation algorithm, the algorithm aims to preserve shape properties, that is deformations should be as rigid as possible. We use least squares to solve the deformation function. From the laboratory experiment, the system is not only easy to operate but also can implement character exaggerative deformations, which can be performed in real-time. Specially, the key pose implying from skeleton can retarget different objects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Because setting character key poses in animation is time-consuming, most work today are done in solving this problem. Representing the character pose by skeleton that has the joints and bone information is very intuitive, the sketch operation is very simple in interface and interactive mode. So, we present a novel 2D Cartoon character deformation method combining skeleton with sketch: First user sketch several key poses using of skeleton that indicate the moving sequence. Then sketch the object character’s skeleton corresponding to the origin skeleton that means they are topological isomorphism. Finally, we get the characters animation sequence by using deformation algorithm in terms of the least squares. Most important thing is deformation algorithm, the algorithm aims to preserve shape properties, that is deformations should be as rigid as possible. We use least squares to solve the deformation function. From the laboratory experiment, the system is not only easy to operate but also can implement character exaggerative deformations, which can be performed in real-time. Specially, the key pose implying from skeleton can retarget different objects.",
"fno": "4030b447",
"keywords": [
"Animation",
"Character Pose",
"Deformation Algorithm",
"Least Squares"
],
"authors": [
{
"affiliation": null,
"fullName": "Xin Feng",
"givenName": "Xin",
"surname": "Feng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Minyong Shi",
"givenName": "Minyong",
"surname": "Shi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cso",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-05-01T00:00:00",
"pubType": "proceedings",
"pages": "447-451",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4030-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4030b444",
"articleId": "12OmNBkfRmx",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4030b452",
"articleId": "12OmNvnwVic",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvmp/2009/3893/0/3893a061",
"title": "Skeleton Driven Laplacian Volumetric Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/cvmp/2009/3893a061/12OmNAle6xC",
"parentPublication": {
"id": "proceedings/cvmp/2009/3893/0",
"title": "2009 Conference for Visual Media Production",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2010/4166/0/4166a041",
"title": "Character Skin Deformation: A Survey",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2010/4166a041/12OmNApu5fG",
"parentPublication": {
"id": "proceedings/cgiv/2010/4166/0",
"title": "2010 Seventh International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/2000/0683/0/06830002",
"title": "Integrated System for Skin Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/2000/06830002/12OmNAtaRXK",
"parentPublication": {
"id": "proceedings/ca/2000/0683/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a306",
"title": "Lattice-Based Skinning and Deformation for Real-Time Skeleton-Driven Animation",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a306/12OmNBEGYGs",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2004/2234/0/22340077",
"title": "NeuroEnveloping: A Transferable Character Skin Deformation Technique",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2004/22340077/12OmNqGRGoL",
"parentPublication": {
"id": "proceedings/pg/2004/2234/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a313",
"title": "A Rapid Method of 3D Character Models' Diversity Used Micro-deformation",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a313/12OmNxEBzlJ",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/2/3336c842",
"title": "A Scheme for Skeleton-Based Shape Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336c842/12OmNyUFg3c",
"parentPublication": {
"id": "proceedings/csse/2008/3336/6",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2003/1960/1/196010163",
"title": "Handwritten character recognition using elastic matching based on a class-dependent deformation model",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2003/196010163/12OmNzd7bTq",
"parentPublication": {
"id": "proceedings/icdar/2003/1960/1",
"title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2012/4829/0/4829a198",
"title": "Representing and Manipulating Mesh-Based Character Animations",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2012/4829a198/12OmNznkKdG",
"parentPublication": {
"id": "proceedings/sibgrapi/2012/4829/0",
"title": "2012 25th SIBGRAPI Conference on Graphics, Patterns and Images",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/03/ttg2008030693",
"title": "Shape Deformation Using a Skeleton to Drive Simplex Transformations",
"doi": null,
"abstractUrl": "/journal/tg/2008/03/ttg2008030693/13rRUxjQyp7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAXxWQv",
"title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAle6ia",
"doi": "10.1109/BIBM.2016.7822588",
"title": "Numerical assessment of airflow and inhaled particles attributes in obstructed pulmonary system",
"normalizedTitle": "Numerical assessment of airflow and inhaled particles attributes in obstructed pulmonary system",
"abstract": "Geometry contraction algorithms are introduced in this work to implement the diverse respiratory configurations of lung related diseases associated with airways obstructions. In addition, computational fluid dynamics (CFD) techniques along with fluid particle tracing (FPT) methods are utilized to efficiently evaluate the behavior of the airflow during the inhalation period, as well as to clarify the features of the inhaled particles in terms of regional deposition. Useful deductions are drawn regarding personalized medication in obstructed conditions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Geometry contraction algorithms are introduced in this work to implement the diverse respiratory configurations of lung related diseases associated with airways obstructions. In addition, computational fluid dynamics (CFD) techniques along with fluid particle tracing (FPT) methods are utilized to efficiently evaluate the behavior of the airflow during the inhalation period, as well as to clarify the features of the inhaled particles in terms of regional deposition. Useful deductions are drawn regarding personalized medication in obstructed conditions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Geometry contraction algorithms are introduced in this work to implement the diverse respiratory configurations of lung related diseases associated with airways obstructions. In addition, computational fluid dynamics (CFD) techniques along with fluid particle tracing (FPT) methods are utilized to efficiently evaluate the behavior of the airflow during the inhalation period, as well as to clarify the features of the inhaled particles in terms of regional deposition. Useful deductions are drawn regarding personalized medication in obstructed conditions.",
"fno": "07822588",
"keywords": [
"Lungs",
"Atmospheric Modeling",
"Geometry",
"Computational Modeling",
"Mathematical Model",
"Diseases",
"Computational Fluid Dynamics",
"Human Airways",
"Computational Fluid Dynamics",
"Fluid Particle Tracing",
"Obstructive Lung Diseases",
"Aerosol Deposition"
],
"authors": [
{
"affiliation": "Information Technologies Institute, Centre for Research and Technology - Hellas (CERTH), Thessaloniki, Greece",
"fullName": "A. Lalas",
"givenName": "A.",
"surname": "Lalas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute, Centre for Research and Technology - Hellas (CERTH), Thessaloniki, Greece",
"fullName": "D. Kikidis",
"givenName": "D.",
"surname": "Kikidis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute, Centre for Research and Technology - Hellas (CERTH), Thessaloniki, Greece",
"fullName": "K. Votis",
"givenName": "K.",
"surname": "Votis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Information Technologies Institute, Centre for Research and Technology - Hellas (CERTH), Thessaloniki, Greece",
"fullName": "D. Tzovaras",
"givenName": "D.",
"surname": "Tzovaras",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Respiratory Division, University Hospital UZ Brussel, Vrije Universiteit Brussel, Brussels, Belgium",
"fullName": "S. Verbanck",
"givenName": "S.",
"surname": "Verbanck",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Electrical and Computer Engineering, University of Patras, Patra, Greece",
"fullName": "S. Nousias",
"givenName": "S.",
"surname": "Nousias",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Electrical and Computer Engineering, University of Patras, Patra, Greece",
"fullName": "A. Lalos",
"givenName": "A.",
"surname": "Lalos",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Electrical and Computer Engineering, University of Patras, Patra, Greece",
"fullName": "K. Moustakas",
"givenName": "K.",
"surname": "Moustakas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "National Heart and Lung Institute (NHLI), Imperial College London and Royal Brompton Hospital, United Kingdom",
"fullName": "O. Usmani",
"givenName": "O.",
"surname": "Usmani",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-12-01T00:00:00",
"pubType": "proceedings",
"pages": "606-612",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-1611-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07822587",
"articleId": "12OmNvUaNk7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07822589",
"articleId": "12OmNCbCrZM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ems/2010/4308/0/4308a102",
"title": "Simulation of Lung Respiration Function Using Soft Body Model",
"doi": null,
"abstractUrl": "/proceedings-article/ems/2010/4308a102/12OmNAnuTvi",
"parentPublication": {
"id": "proceedings/ems/2010/4308/0",
"title": "Computer Modeling and Simulation, UKSIM European Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2015/7644/0/7644a275",
"title": "CFD Numerical Analysis of the Interaction Between Wave and Pier",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2015/7644a275/12OmNrAdsx1",
"parentPublication": {
"id": "proceedings/icicta/2015/7644/0",
"title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2009/3634/4/3634d358",
"title": "Study on Numerical Simulation of Single-Phase Injection Device Flow Flied",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2009/3634d358/12OmNy4IEY3",
"parentPublication": {
"id": "proceedings/icic/2009/3634/4",
"title": "2009 Second International Conference on Information and Computing Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2017/1710/0/1710a025",
"title": "Dynamical Modelling of Pulmonary Compartment Response Using Differential Approach",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2017/1710a025/12OmNzaQoAR",
"parentPublication": {
"id": "proceedings/cbms/2017/1710/0",
"title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcmp-ugc/2009/3946/0/3946a025",
"title": "Airflow Simulation over a Vegetated Soil Surface",
"doi": null,
"abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a025/12OmNzvQHPZ",
"parentPublication": {
"id": "proceedings/hpcmp-ugc/2009/3946/0",
"title": "HPCMP Users Group Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171182",
"title": "Preserving Fluid Sheets with Adaptively Sampled Anisotropic Particles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171182/13rRUxC0SvR",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/04/v0711",
"title": "Derivative Particles for Simulating Detailed Movements of Fluids",
"doi": null,
"abstractUrl": "/journal/tg/2007/04/v0711/13rRUxYIMUQ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2018/05/08006238",
"title": "Influence of Airway Secretion on Airflow Dynamics of Mechanical Ventilated Respiratory System",
"doi": null,
"abstractUrl": "/journal/tb/2018/05/08006238/14dcEibWLrw",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccbb/2018/1277/0/08756454",
"title": "Application of CFD in building performance simulation for airflow analysis and architectural design: a cast study",
"doi": null,
"abstractUrl": "/proceedings-article/iccbb/2018/08756454/1bzYmlAru5a",
"parentPublication": {
"id": "proceedings/iccbb/2018/1277/0",
"title": "2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icctec/2017/5784/0/578400a041",
"title": "Numerical Simulation and Analysis of Different Airflow Velocities in Tunnel Fire under Freeway",
"doi": null,
"abstractUrl": "/proceedings-article/icctec/2017/578400a041/1cks1oRQ8c8",
"parentPublication": {
"id": "proceedings/icctec/2017/5784/0",
"title": "2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzzxuxr",
"title": "4th International Conference on Digital Home (ICDH)",
"acronym": "icdh",
"groupId": "1802037",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAo45RW",
"doi": "10.1109/ICDH.2012.40",
"title": "Adaptive Particle Size Setting and Normal Calculation Methods in Fluid Rendering",
"normalizedTitle": "Adaptive Particle Size Setting and Normal Calculation Methods in Fluid Rendering",
"abstract": "In this paper, we present an adaptive particle size setting method in Lagrangian-approach based screen space splatting algorithm in real-time fluid rendering. The particle radius will be adjusted according to its Weber number and local density in the rendering process so that a large radius of peaceful fluid particle can help to eliminate a bumpy surface artifact, and a small radius can prevent obviously spherical shapes of particles in splash. We also propose an adaptive normal calculation method to avoid the numerical calculation errors in normal computation process. An adaptive sampling interval is set in accordance with the viewing distance from camera to the fluid so that fuzzy edges or double image effect in a fixed sampling interval normal computation process could be prevented. Both of the two approaches introduced in this paper take only small amount of computing time and will have little impact on the time consuming property of a real-time fluid rendering application.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present an adaptive particle size setting method in Lagrangian-approach based screen space splatting algorithm in real-time fluid rendering. The particle radius will be adjusted according to its Weber number and local density in the rendering process so that a large radius of peaceful fluid particle can help to eliminate a bumpy surface artifact, and a small radius can prevent obviously spherical shapes of particles in splash. We also propose an adaptive normal calculation method to avoid the numerical calculation errors in normal computation process. An adaptive sampling interval is set in accordance with the viewing distance from camera to the fluid so that fuzzy edges or double image effect in a fixed sampling interval normal computation process could be prevented. Both of the two approaches introduced in this paper take only small amount of computing time and will have little impact on the time consuming property of a real-time fluid rendering application.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present an adaptive particle size setting method in Lagrangian-approach based screen space splatting algorithm in real-time fluid rendering. The particle radius will be adjusted according to its Weber number and local density in the rendering process so that a large radius of peaceful fluid particle can help to eliminate a bumpy surface artifact, and a small radius can prevent obviously spherical shapes of particles in splash. We also propose an adaptive normal calculation method to avoid the numerical calculation errors in normal computation process. An adaptive sampling interval is set in accordance with the viewing distance from camera to the fluid so that fuzzy edges or double image effect in a fixed sampling interval normal computation process could be prevented. Both of the two approaches introduced in this paper take only small amount of computing time and will have little impact on the time consuming property of a real-time fluid rendering application.",
"fno": "4899a074",
"keywords": [
"Normal Calculation",
"Fluid Rendering",
"Splatting",
"Particle Radius"
],
"authors": [
{
"affiliation": null,
"fullName": "Pengcheng Wang",
"givenName": "Pengcheng",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dehui Kong",
"givenName": "Dehui",
"surname": "Kong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yong Zhang",
"givenName": "Yong",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Baocai Yin",
"givenName": "Baocai",
"surname": "Yin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdh",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-11-01T00:00:00",
"pubType": "proceedings",
"pages": "74-79",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-1348-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4899a069",
"articleId": "12OmNwCJOVz",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4899a080",
"articleId": "12OmNwE9OzK",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cgiv/2009/3789/0/3789a038",
"title": "Particle Importance Based Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2009/3789a038/12OmNAolHa9",
"parentPublication": {
"id": "proceedings/cgiv/2009/3789/0",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/3/3962f039",
"title": "Track Calculation and Numerical Simulation on Particles in High Pressure Abrasive Water Jet Nozzle",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962f039/12OmNB8kHRU",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/3",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2010/4047/3/4047c017",
"title": "Approximate Calculation about Standard Normal Distribution with Genetic Programming",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2010/4047c017/12OmNBghtsh",
"parentPublication": {
"id": "proceedings/icic/2010/4047/3",
"title": "2010 Third International Conference on Information and Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvrv/2013/2322/0/2322a221",
"title": "Dynamic Chinese Ink Rendering Based on Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icvrv/2013/2322a221/12OmNqOOrKs",
"parentPublication": {
"id": "proceedings/icvrv/2013/2322/0",
"title": "2013 International Conference on Virtual Reality and Visualization (ICVRV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscid/2011/4500/2/4500b186",
"title": "Research on Real-Time Multi-Dimensional Rendering Method of Fluid Phenomenon in Large-Scale Virtual Scene",
"doi": null,
"abstractUrl": "/proceedings-article/iscid/2011/4500b186/12OmNwMob6w",
"parentPublication": {
"id": "proceedings/iscid/2011/4500/2",
"title": "Computational Intelligence and Design, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1994/6627/0/00346314",
"title": "Volume rendering methods for computational fluid dynamics visualization",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1994/00346314/12OmNyuy9NX",
"parentPublication": {
"id": "proceedings/visual/1994/6627/0",
"title": "Proceedings Visualization '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pnpm/1995/7210/0/72100214",
"title": "The fluid stochastic Petri net simulator",
"doi": null,
"abstractUrl": "/proceedings-article/pnpm/1995/72100214/12OmNzIUfTI",
"parentPublication": {
"id": "proceedings/pnpm/1995/7210/0",
"title": "Petri Nets and Performance Models, IEEE International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccms/2010/3941/1/3941a290",
"title": "A Particle-Based Unified Model for Non-Newtonian Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccms/2010/3941a290/12OmNzzfToR",
"parentPublication": {
"id": "proceedings/iccms/2010/3941/3",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171182",
"title": "Preserving Fluid Sheets with Adaptively Sampled Anisotropic Particles",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171182/13rRUxC0SvR",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/co/1993/06/r6098",
"title": "Visualizing Fluid Flow",
"doi": null,
"abstractUrl": "/magazine/co/1993/06/r6098/13rRUy0HYMS",
"parentPublication": {
"id": "mags/co",
"title": "Computer",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyQ7FQU",
"title": "Proceedings Visualization '93",
"acronym": "visual",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "1993",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAolGVS",
"doi": "10.1109/VISUAL.1993.398850",
"title": "Visualization of turbulent flow with particles",
"normalizedTitle": "Visualization of turbulent flow with particles",
"abstract": "In this work a new method for visualization of three-dimensional turbulent flow using particle motion animation is presented. The method is based on Reynolds decomposition of a turbulent flow field into a convective and a turbulent motion. At each step of particle path generation a stochastic perturbation is added, resulting in random-walk motions of particles. A physical relation is established between the perturbations and the eddy-diffusivity, which is calculated in a turbulent flow simulation. The flow data used is a mean velocity field, and an eddy-diffusivity field. The erratic particle motions are more than just a visual effect, but represent a real physical phenomenon. An implementation of the method is described, and an example of a turbulent channel flow is given, which clearly shows the random particle motions in their context of general fluid motion patterns.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this work a new method for visualization of three-dimensional turbulent flow using particle motion animation is presented. The method is based on Reynolds decomposition of a turbulent flow field into a convective and a turbulent motion. At each step of particle path generation a stochastic perturbation is added, resulting in random-walk motions of particles. A physical relation is established between the perturbations and the eddy-diffusivity, which is calculated in a turbulent flow simulation. The flow data used is a mean velocity field, and an eddy-diffusivity field. The erratic particle motions are more than just a visual effect, but represent a real physical phenomenon. An implementation of the method is described, and an example of a turbulent channel flow is given, which clearly shows the random particle motions in their context of general fluid motion patterns.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this work a new method for visualization of three-dimensional turbulent flow using particle motion animation is presented. The method is based on Reynolds decomposition of a turbulent flow field into a convective and a turbulent motion. At each step of particle path generation a stochastic perturbation is added, resulting in random-walk motions of particles. A physical relation is established between the perturbations and the eddy-diffusivity, which is calculated in a turbulent flow simulation. The flow data used is a mean velocity field, and an eddy-diffusivity field. The erratic particle motions are more than just a visual effect, but represent a real physical phenomenon. An implementation of the method is described, and an example of a turbulent channel flow is given, which clearly shows the random particle motions in their context of general fluid motion patterns.",
"fno": "00398850",
"keywords": [
"Flow Visualisation",
"Data Visualisation",
"Physics Computing",
"Turbulence",
"Channel Flow",
"Computer Animation",
"Stochastic Processes",
"Random Processes",
"Flow Simulation",
"Digital Simulation",
"Convective Motion",
"Visualization",
"Three Dimensional Turbulent Flow",
"Particle Motion Animation",
"Reynolds Decomposition",
"Turbulent Motion",
"Particle Path Generation",
"Stochastic Perturbation",
"Random Walk Motions",
"Eddy Diffusivity",
"Flow Simulation",
"Flow Data",
"Mean Velocity Field",
"Eddy Diffusivity Field",
"Erratic Particle Motions",
"Real Physical Phenomenon",
"Turbulent Channel Flow",
"General Fluid Motion Patterns",
"Fluid Dynamics",
"Data Visualization",
"Aerodynamics",
"Clouds",
"Temperature",
"Rendering Computer Graphics",
"Animation",
"Mathematics",
"Informatics",
"Stochastic Processes"
],
"authors": [
{
"affiliation": "Fac. of Tech. Math. & Inf., Delft Univ. of Technol., Netherlands",
"fullName": "A.J.S. Hin",
"givenName": "A.J.S.",
"surname": "Hin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fac. of Tech. Math. & Inf., Delft Univ. of Technol., Netherlands",
"fullName": "F.H. Post",
"givenName": "F.H.",
"surname": "Post",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "visual",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1993-01-01T00:00:00",
"pubType": "proceedings",
"pages": "46,47,48,49,50,51,52",
"year": "1993",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00398849",
"articleId": "12OmNscxj73",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00398851",
"articleId": "12OmNylKAQI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vv/2004/8781/0/01374291",
"title": "Visualization of the energy-containing turbulent scales",
"doi": null,
"abstractUrl": "/proceedings-article/vv/2004/01374291/12OmNrH1PHb",
"parentPublication": {
"id": "proceedings/vv/2004/8781/0",
"title": "Volume Visualization and Graphics, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2001/1195/0/11950317",
"title": "Animated Illuminated Lines for Flow Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2001/11950317/12OmNwBT1mq",
"parentPublication": {
"id": "proceedings/iv/2001/1195/0",
"title": "Proceedings Fifth International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2000/0743/0/07430434",
"title": "Animated Texture Alpha-Masks for Flow Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2000/07430434/12OmNwp74Bm",
"parentPublication": {
"id": "proceedings/iv/2000/0743/0",
"title": "2000 IEEE Conference on Information Visualization. An International Conference on Computer Visualization and Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2011/0771/0/06114489",
"title": "Adaptive simulation of turbulent flow past a full car model",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2011/06114489/12OmNxV4iyV",
"parentPublication": {
"id": "proceedings/sc/2011/0771/0",
"title": "2011 International Conference for High Performance Computing, Networking, Storage and Analysis (SC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1995/7187/0/71870388",
"title": "Turbulent Flow Visualization in Computational and Experimental Hydraulics",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1995/71870388/12OmNy50giX",
"parentPublication": {
"id": "proceedings/ieee-vis/1995/7187/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/05/v1055",
"title": "Visualization of Vorticity and Vortices in Wall-Bounded Turbulent Flows",
"doi": null,
"abstractUrl": "/journal/tg/2007/05/v1055/13rRUILLkvi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/04658158",
"title": "Interactive Visualization and Analysis of Transitional Flow",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/04658158/13rRUNvyaeU",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/09/06042858",
"title": "Baroclinic Turbulence with Varying Density and Temperature",
"doi": null,
"abstractUrl": "/journal/tg/2012/09/06042858/13rRUwdIOUH",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/5555/01/09999502",
"title": "Spatio-Temporal Visual Analysis of Turbulent Superstructures in Unsteady Flow",
"doi": null,
"abstractUrl": "/journal/tg/5555/01/09999502/1JrMCoX7Xpe",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2021/4261/0/09635360",
"title": "Calculation of blood flow in carotid artery bifurcation by turbulent finite element method",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2021/09635360/1zmvlDo5JJK",
"parentPublication": {
"id": "proceedings/bibe/2021/4261/0",
"title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzSh1bn",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"acronym": "cgiv",
"groupId": "1001775",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAolHa9",
"doi": "10.1109/CGIV.2009.40",
"title": "Particle Importance Based Fluid Simulation",
"normalizedTitle": "Particle Importance Based Fluid Simulation",
"abstract": "We present a novel method using particle importance to accelerate the traditional Smoothed Particle Hydrodynamics based fluid simulation. Reynolds number and vorticity are exploited as the new criteria to evaluate the importance for each particle. If a particle is unimportant, its current acceleration and velocity are used to update values in the next time step with the complex state updating step removed, in this way the computation time is saved. We also propose an improved surface tension model. The experiments demonstrate that this new method is not only easy to implement, but also greatly improves the simulation speed without visual quality sacrifice.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a novel method using particle importance to accelerate the traditional Smoothed Particle Hydrodynamics based fluid simulation. Reynolds number and vorticity are exploited as the new criteria to evaluate the importance for each particle. If a particle is unimportant, its current acceleration and velocity are used to update values in the next time step with the complex state updating step removed, in this way the computation time is saved. We also propose an improved surface tension model. The experiments demonstrate that this new method is not only easy to implement, but also greatly improves the simulation speed without visual quality sacrifice.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a novel method using particle importance to accelerate the traditional Smoothed Particle Hydrodynamics based fluid simulation. Reynolds number and vorticity are exploited as the new criteria to evaluate the importance for each particle. If a particle is unimportant, its current acceleration and velocity are used to update values in the next time step with the complex state updating step removed, in this way the computation time is saved. We also propose an improved surface tension model. The experiments demonstrate that this new method is not only easy to implement, but also greatly improves the simulation speed without visual quality sacrifice.",
"fno": "3789a038",
"keywords": [
"Fluid Simulation",
"Reynolds Number",
"Smoothed Particle Hydrodynamics",
"Vorticity",
"Surface Tension"
],
"authors": [
{
"affiliation": null,
"fullName": "Yuanzhang Chang",
"givenName": "Yuanzhang",
"surname": "Chang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kai Bao",
"givenName": "Kai",
"surname": "Bao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Youquan Liu",
"givenName": "Youquan",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jian Zhu",
"givenName": "Jian",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Enhua Wu",
"givenName": "Enhua",
"surname": "Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cgiv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-08-01T00:00:00",
"pubType": "proceedings",
"pages": "38-43",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3789-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3789a032",
"articleId": "12OmNAObbJ7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3789a044",
"articleId": "12OmNxEBz8F",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cad-graphics/2015/8020/0/07450421",
"title": "A New Surface Tension Formulation for SPH",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2015/07450421/12OmNButq4h",
"parentPublication": {
"id": "proceedings/cad-graphics/2015/8020/0",
"title": "2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a317",
"title": "An Efficient Adaptive Vortex Particle Method for Real-Time Smoke Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a317/12OmNCbU3cQ",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/paciia/2008/3490/2/3490c634",
"title": "Smoothed Particle Hydrodynamics for Numerical Simulation of Duct Conveying",
"doi": null,
"abstractUrl": "/proceedings-article/paciia/2008/3490c634/12OmNyQ7FEy",
"parentPublication": {
"id": "paciia/2008/3490/2",
"title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2012/4899/0/4899a374",
"title": "SPH-Based Real-Time Wall-Fountain Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a374/12OmNzuZUoG",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccms/2010/3941/1/3941a290",
"title": "A Particle-Based Unified Model for Non-Newtonian Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/iccms/2010/3941a290/12OmNzzfToR",
"parentPublication": {
"id": "proceedings/iccms/2010/3941/3",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2009/06/ttg2009061243",
"title": "Predictor-Corrector Schemes for Visualization ofSmoothed Particle Hydrodynamics Data",
"doi": null,
"abstractUrl": "/journal/tg/2009/06/ttg2009061243/13rRUxZ0o1s",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2005/03/c3039",
"title": "A Seamless Approach to Multiscale Complex Fluid Simulation",
"doi": null,
"abstractUrl": "/magazine/cs/2005/03/c3039/13rRUxbTMt3",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cluster/2018/8319/0/831900a607",
"title": "Towards a Mini-App for Smoothed Particle Hydrodynamics at Exascale",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2018/831900a607/17D45VsBTZL",
"parentPublication": {
"id": "proceedings/cluster/2018/8319/0",
"title": "2018 IEEE International Conference on Cluster Computing (CLUSTER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08798224",
"title": "Viscosity-based Vorticity Correction for Turbulent SPH Fluids",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08798224/1cJ1aEpf4wo",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2020/6532/0/09090460",
"title": "Robust turbulence simulation for particle-based fluids using the Rankine vortex model",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2020/09090460/1jIxpVaNpEQ",
"parentPublication": {
"id": "proceedings/vrw/2020/6532/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzy7uNY",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"acronym": "icmtma",
"groupId": "1002837",
"volume": "3",
"displayVolume": "3",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNB8kHRU",
"doi": "10.1109/ICMTMA.2010.292",
"title": "Track Calculation and Numerical Simulation on Particles in High Pressure Abrasive Water Jet Nozzle",
"normalizedTitle": "Track Calculation and Numerical Simulation on Particles in High Pressure Abrasive Water Jet Nozzle",
"abstract": "The high pressure water jet nozzle is a key part to accelerating abrasive particles. The geometrical model of fluid control volume in front and back nozzle and physical model of particle were established by object oriented fluid flow flied and particle of submerged jet. The results showed that the outlet average velocity of fluid and particle falls down sharply with the particle concentration increasing. The speed sliding ratio of particle is 0.9-0.93. Because the particles in nozzle had not been completely accelerated, the velocity was accelerated continuously until the two phase velocities are equal. The best particle concentration was 3%-8% in cutting material. The cutting capacity was affected remarkably by particle size, but the outlet velocity descends with increasing of particle’s diameter. The best particle diameter is 1/3-1/4 of nozzle’s exit diameter.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The high pressure water jet nozzle is a key part to accelerating abrasive particles. The geometrical model of fluid control volume in front and back nozzle and physical model of particle were established by object oriented fluid flow flied and particle of submerged jet. The results showed that the outlet average velocity of fluid and particle falls down sharply with the particle concentration increasing. The speed sliding ratio of particle is 0.9-0.93. Because the particles in nozzle had not been completely accelerated, the velocity was accelerated continuously until the two phase velocities are equal. The best particle concentration was 3%-8% in cutting material. The cutting capacity was affected remarkably by particle size, but the outlet velocity descends with increasing of particle’s diameter. The best particle diameter is 1/3-1/4 of nozzle’s exit diameter.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The high pressure water jet nozzle is a key part to accelerating abrasive particles. The geometrical model of fluid control volume in front and back nozzle and physical model of particle were established by object oriented fluid flow flied and particle of submerged jet. The results showed that the outlet average velocity of fluid and particle falls down sharply with the particle concentration increasing. The speed sliding ratio of particle is 0.9-0.93. Because the particles in nozzle had not been completely accelerated, the velocity was accelerated continuously until the two phase velocities are equal. The best particle concentration was 3%-8% in cutting material. The cutting capacity was affected remarkably by particle size, but the outlet velocity descends with increasing of particle’s diameter. The best particle diameter is 1/3-1/4 of nozzle’s exit diameter.",
"fno": "3962f039",
"keywords": [
"Two Phase Fluid",
"Particle",
"Force Analysis",
"Numerical Simulation"
],
"authors": [
{
"affiliation": null,
"fullName": "Shangxian Zhang",
"givenName": "Shangxian",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yan Liu",
"givenName": "Yan",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Quan Wang",
"givenName": "Quan",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmtma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-03-01T00:00:00",
"pubType": "proceedings",
"pages": "1039-1042",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3962-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3962f035",
"articleId": "12OmNB8kHV6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3962f043",
"articleId": "12OmNwtEEE4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hpcmp-ugc/2009/3946/0/3946a027",
"title": "Comparison of Empirical and Theoretical Computations of Velocity for a Cold Spray Nozzle",
"doi": null,
"abstractUrl": "/proceedings-article/hpcmp-ugc/2009/3946a027/12OmNAle6IW",
"parentPublication": {
"id": "proceedings/hpcmp-ugc/2009/3946/0",
"title": "HPCMP Users Group Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdma/2012/4772/0/4772a222",
"title": "Analysis and Determination of the Optimum Oil-Supply Pressure for Jet-Lubricated High Speed Aviation Spur Gears",
"doi": null,
"abstractUrl": "/proceedings-article/icdma/2012/4772a222/12OmNBhpS2o",
"parentPublication": {
"id": "proceedings/icdma/2012/4772/0",
"title": "2012 Third International Conference on Digital Manufacturing & Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2010/7081/4/05514003",
"title": "Numerical Simulation of the Flow Characteristic with Different Geometrical Jet",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2010/05514003/12OmNqyDjpQ",
"parentPublication": {
"id": "proceedings/icic/2010/7081/4",
"title": "2010 Third International Conference on Information and Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2011/688/0/05954558",
"title": "Numerical Study of the Turbulent Characteristic in a Novel Circulating Jet Mixer",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2011/05954558/12OmNwDj17J",
"parentPublication": {
"id": "proceedings/icic/2011/688/0",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2014/6636/0/6636a423",
"title": "Polymetallic Sulfide Particle Hydraulic Lifting Performance Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2014/6636a423/12OmNx6PiDq",
"parentPublication": {
"id": "proceedings/icicta/2014/6636/0",
"title": "2014 7th International Conference on Intelligent Computation Technology and Automation (ICICTA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icic/2011/688/0/05954569",
"title": "A Numerical Investigation of Effects of Different Nozzle Spacing on Turbulent Flow in a Novel Circular Jet Mixer",
"doi": null,
"abstractUrl": "/proceedings-article/icic/2011/05954569/12OmNxXUhO9",
"parentPublication": {
"id": "proceedings/icic/2011/688/0",
"title": "2011 Fourth International Conference on Information and Computing (ICIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iceet/2009/3819/3/3819c323",
"title": "Experimental Investigation on Spray Characteristics of Aerodynamic Cooling Nozzle for Metal Cutting",
"doi": null,
"abstractUrl": "/proceedings-article/iceet/2009/3819c323/12OmNzayNBm",
"parentPublication": {
"id": "proceedings/iceet/2009/3819/3",
"title": "Energy and Environment Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaice/2021/2186/0/218600a872",
"title": "Numerical Simulation of Spray Pressure on Atomization Characteristics of Water Mist Nozzle",
"doi": null,
"abstractUrl": "/proceedings-article/icaice/2021/218600a872/1Et4x2CqVDq",
"parentPublication": {
"id": "proceedings/icaice/2021/2186/0",
"title": "2021 2nd International Conference on Artificial Intelligence and Computer Engineering (ICAICE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcmeim/2019/5045/0/504500a027",
"title": "Numerical Analysis of Energy Separation in Vortex Tube with Various Nozzles",
"doi": null,
"abstractUrl": "/proceedings-article/wcmeim/2019/504500a027/1hHLoRNlHxe",
"parentPublication": {
"id": "proceedings/wcmeim/2019/5045/0",
"title": "2019 2nd World Conference on Mechanical Engineering and Intelligent Manufacturing (WCMEIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ecie/2021/1869/0/186900a165",
"title": "Influence of nozzle structure on steam ejector performance",
"doi": null,
"abstractUrl": "/proceedings-article/ecie/2021/186900a165/1sXnUrJLr8I",
"parentPublication": {
"id": "proceedings/ecie/2021/1869/0",
"title": "2021 International Conference on Electronics, Circuits and Information Engineering (ECIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwLOYSu",
"title": "2017 International Conference on Cyberworlds (CW)",
"acronym": "cw",
"groupId": "1000175",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCmpcVe",
"doi": "10.1109/CW.2017.30",
"title": "Anisotropic Surface Reconstruction for Multiphase Fluids",
"normalizedTitle": "Anisotropic Surface Reconstruction for Multiphase Fluids",
"abstract": "Under particle-based framework, level set is generally defined for fluid surfaces and is integrated with marching cubes algorithm to extract fluid surfaces. In these methods, anisotropic kernels method has proven successful for reconstructing fluid surfaces with high quality. It can perfectly represent smooth surfaces, thin stream and sharp features of fluids compare to other methods. In this paper, we propose a novel approach to extend it to the simulation of multiphase fluids simulation. In order to ensure fine effects for both fluid surface and multiphase interface, we modify the calculation of original anisotropic kernels and address a binary tree strategy for reconstruction. Our method can extract fluid surfaces simply and effectively for particle-based multiphase simulation. It solved the problem of overlaps and gaps at multiphase interface that exist in traditional methods. The experimental results demonstrate that our method keep a good fluid surface and interface effects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Under particle-based framework, level set is generally defined for fluid surfaces and is integrated with marching cubes algorithm to extract fluid surfaces. In these methods, anisotropic kernels method has proven successful for reconstructing fluid surfaces with high quality. It can perfectly represent smooth surfaces, thin stream and sharp features of fluids compare to other methods. In this paper, we propose a novel approach to extend it to the simulation of multiphase fluids simulation. In order to ensure fine effects for both fluid surface and multiphase interface, we modify the calculation of original anisotropic kernels and address a binary tree strategy for reconstruction. Our method can extract fluid surfaces simply and effectively for particle-based multiphase simulation. It solved the problem of overlaps and gaps at multiphase interface that exist in traditional methods. The experimental results demonstrate that our method keep a good fluid surface and interface effects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Under particle-based framework, level set is generally defined for fluid surfaces and is integrated with marching cubes algorithm to extract fluid surfaces. In these methods, anisotropic kernels method has proven successful for reconstructing fluid surfaces with high quality. It can perfectly represent smooth surfaces, thin stream and sharp features of fluids compare to other methods. In this paper, we propose a novel approach to extend it to the simulation of multiphase fluids simulation. In order to ensure fine effects for both fluid surface and multiphase interface, we modify the calculation of original anisotropic kernels and address a binary tree strategy for reconstruction. Our method can extract fluid surfaces simply and effectively for particle-based multiphase simulation. It solved the problem of overlaps and gaps at multiphase interface that exist in traditional methods. The experimental results demonstrate that our method keep a good fluid surface and interface effects.",
"fno": "2089a118",
"keywords": [
"Flow Simulation",
"Surface Reconstruction",
"Two Phase Flow",
"Anisotropic Kernel Method",
"Marching Cube Algorithm",
"Multiphase Fluid Simulation",
"Particle Based Multiphase Simulation",
"Multiphase Interface",
"Anisotropic Surface Reconstruction",
"Surface Reconstruction",
"Kernel",
"Fluids",
"Surface Treatment",
"Level Set",
"Mathematical Model",
"Covariance Matrices",
"Computer Animation",
"Fluid Simulation",
"Surface Reconstruction",
"Multiphase Interface"
],
"authors": [
{
"affiliation": null,
"fullName": "Xiaokun Wang",
"givenName": "Xiaokun",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaojuan Ban",
"givenName": "Xiaojuan",
"surname": "Ban",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yalan Zhang",
"givenName": "Yalan",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhigeng Pan",
"givenName": "Zhigeng",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sinuo Liu",
"givenName": "Sinuo",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-09-01T00:00:00",
"pubType": "proceedings",
"pages": "118-125",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2089-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2089a111",
"articleId": "12OmNzA6GHk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2089a126",
"articleId": "12OmNCga1Qh",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccsa/2010/3999/0/3999a118",
"title": "A CUDA-Based Implementation of Stable Fluids in 3D with Internal and Moving Boundaries",
"doi": null,
"abstractUrl": "/proceedings-article/iccsa/2010/3999a118/12OmNvnwVim",
"parentPublication": {
"id": "proceedings/iccsa/2010/3999/0",
"title": "2010 International Conference on Computational Science and Its Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2017/3588/0/3588a309",
"title": "Screen Space Rendering Solution for Multiphase SPH Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2017/3588a309/12OmNvs4vmP",
"parentPublication": {
"id": "proceedings/svr/2017/3588/0",
"title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2012/4789/0/4789a223",
"title": "Single Component, Multiphase Fluids Flow Simulation in Porous Media with Lattice Boltzmann Method",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2012/4789a223/12OmNy5R3yS",
"parentPublication": {
"id": "proceedings/iccis/2012/4789/0",
"title": "2012 Fourth International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/10/08428445",
"title": "A Semi-Explicit Surface Tracking Mechanism for Multi-Phase Immiscible Liquids",
"doi": null,
"abstractUrl": "/journal/tg/2019/10/08428445/13rRUB7a1g4",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/07/ttg2013071143",
"title": "Generalized Anisotropic Stratified Surface Sampling",
"doi": null,
"abstractUrl": "/journal/tg/2013/07/ttg2013071143/13rRUILc8fc",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/08/07239614",
"title": "Multiphase Interface Tracking with Fast Semi-Lagrangian Contouring",
"doi": null,
"abstractUrl": "/journal/tg/2016/08/07239614/13rRUwInvfd",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/06/08353115",
"title": "Turbulent Micropolar SPH Fluids with Foam",
"doi": null,
"abstractUrl": "/journal/tg/2019/06/08353115/13rRUxNW1Zu",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/01/ttg2014010004",
"title": "Multiphase Flow of Immiscible Fluids on Unstructured Moving Meshes",
"doi": null,
"abstractUrl": "/journal/tg/2014/01/ttg2014010004/13rRUxcbnCr",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/06/v1751",
"title": "Virtual Rheoscopic Fluids for Flow Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2007/06/v1751/13rRUxjQyvb",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdidm/2021/2699/0/269900a164",
"title": "Sample Statistics and Industry Analysis of Organic Heat Transfer Fluids Type Test for Boiler",
"doi": null,
"abstractUrl": "/proceedings-article/bdidm/2021/269900a164/1xFvmuVuZ8Y",
"parentPublication": {
"id": "proceedings/bdidm/2021/2699/0",
"title": "2021 International Conference on Big Data and Intelligent Decision Making (BDIDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAsk4yw",
"title": "2008 38th Annual Frontiers in Education Conference",
"acronym": "fie",
"groupId": "1000297",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNz6Apb6",
"doi": "10.1109/FIE.2008.4720465",
"title": "Engaging students via student-unique Weekly Assessed Tutorial Sheets: A four year review",
"normalizedTitle": "Engaging students via student-unique Weekly Assessed Tutorial Sheets: A four year review",
"abstract": "Following unacceptable examination performance in a core engineering module, (fluid mechanics and thermodynamics), an alternative and innovative approach to assessment was developed. The new approach centered on the use of student unique weekly assessed tutorial sheets (WATS). The emphasis on assessment arises because of (i) the overwhelming evidence that assessment plays a significant part in student learning - good assessment guides the studentspsila effort towards the intended learning outcomes and helps distribute their effort across both the curriculum topics and the semester, and (ii) the previous assessment programme did little to promote learning nor support teaching. This paper outlines the new development and presents findings from its use across four years. Since its implementation all performance indicators have improved. Students are now more actively engaged with the module, teachers are now provided with information on the studentspsila current (mis)-conceptions and examination scores have improved. Feedback from the students on the various features of the assessment programme is encouraging as is their feedback relating their perception of the assessment programme to scaffold their learning. Many students, however, still note the importance of grades, however, in driving their effort.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Following unacceptable examination performance in a core engineering module, (fluid mechanics and thermodynamics), an alternative and innovative approach to assessment was developed. The new approach centered on the use of student unique weekly assessed tutorial sheets (WATS). The emphasis on assessment arises because of (i) the overwhelming evidence that assessment plays a significant part in student learning - good assessment guides the studentspsila effort towards the intended learning outcomes and helps distribute their effort across both the curriculum topics and the semester, and (ii) the previous assessment programme did little to promote learning nor support teaching. This paper outlines the new development and presents findings from its use across four years. Since its implementation all performance indicators have improved. Students are now more actively engaged with the module, teachers are now provided with information on the studentspsila current (mis)-conceptions and examination scores have improved. Feedback from the students on the various features of the assessment programme is encouraging as is their feedback relating their perception of the assessment programme to scaffold their learning. Many students, however, still note the importance of grades, however, in driving their effort.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Following unacceptable examination performance in a core engineering module, (fluid mechanics and thermodynamics), an alternative and innovative approach to assessment was developed. The new approach centered on the use of student unique weekly assessed tutorial sheets (WATS). The emphasis on assessment arises because of (i) the overwhelming evidence that assessment plays a significant part in student learning - good assessment guides the studentspsila effort towards the intended learning outcomes and helps distribute their effort across both the curriculum topics and the semester, and (ii) the previous assessment programme did little to promote learning nor support teaching. This paper outlines the new development and presents findings from its use across four years. Since its implementation all performance indicators have improved. Students are now more actively engaged with the module, teachers are now provided with information on the studentspsila current (mis)-conceptions and examination scores have improved. Feedback from the students on the various features of the assessment programme is encouraging as is their feedback relating their perception of the assessment programme to scaffold their learning. Many students, however, still note the importance of grades, however, in driving their effort.",
"fno": "04720465",
"keywords": [
"Teaching",
"Unique Weekly Assessed Tutorial Sheet",
"Fluid Mechanics And Thermodynamics Engineering",
"Student Assessment"
],
"authors": [
{
"affiliation": "Univ. of Hertfordshire, Hatfield",
"fullName": "M. Russell",
"givenName": "M.",
"surname": "Russell",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "fie",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-10-01T00:00:00",
"pubType": "proceedings",
"pages": "S2B-7-S2B-12",
"year": "2008",
"issn": null,
"isbn": "978-1-4244-1969-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04720464",
"articleId": "12OmNz5JBVa",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04720466",
"articleId": "12OmNB7cjip",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fie/2004/8552/0/01408578",
"title": "Work in progress: analysis of reliability of the fluid mechanics concept inventory",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2004/01408578/12OmNARRYhQ",
"parentPublication": {
"id": "proceedings/fie/2004/8552/0",
"title": "34th Annual Frontiers in Education, 2004. FIE 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2005/9077/0/01612207",
"title": "A unique thermal-fluid science course for non-mechanical programs",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2005/01612207/12OmNASraUA",
"parentPublication": {
"id": "proceedings/fie/2005/9077/0",
"title": "35th Annual Frontiers in Education",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2003/7961/1/01263321",
"title": "Personalized examinations in large on-campus classes",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2003/01263321/12OmNBBQZr3",
"parentPublication": {
"id": "proceedings/fie/2003/7961/1",
"title": "33rd Annual Frontiers in Education, 2003. FIE 2003.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2012/1353/0/06462443",
"title": "Work in progress: Engaging faculty for program improvement via EvalTools®: A new software model",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2012/06462443/12OmNC4eSn7",
"parentPublication": {
"id": "proceedings/fie/2012/1353/0",
"title": "2012 Frontiers in Education Conference Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2008/1969/0/04720675",
"title": "Preliminary results on the implementation of outcome-based education on the non-examinable computer engineering modules",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2008/04720675/12OmNxTEiT7",
"parentPublication": {
"id": "proceedings/fie/2008/1969/0",
"title": "2008 38th Annual Frontiers in Education Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2007/1083/0/04417862",
"title": "Multi-disciplinary applications in an introductory thermo-fluids course",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2007/04417862/12OmNxiKrX4",
"parentPublication": {
"id": "proceedings/fie/2007/1083/0",
"title": "2007 37th Annual Frontiers in Education Conference - Global Engineering: Knowledge Without Borders, Opportunities Without Passports",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/re/1997/7740/0/00566853",
"title": "Requirement metrics-value added",
"doi": null,
"abstractUrl": "/proceedings-article/re/1997/00566853/1dIKuqo1ILS",
"parentPublication": {
"id": "proceedings/re/1997/7740/0",
"title": "Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy6qfNZ",
"title": "Computer Modeling and Simulation, International Conference on",
"acronym": "iccms",
"groupId": "1002645",
"volume": "1",
"displayVolume": "1",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzzfToR",
"doi": "10.1109/ICCMS.2010.17",
"title": "A Particle-Based Unified Model for Non-Newtonian Fluid Simulation",
"normalizedTitle": "A Particle-Based Unified Model for Non-Newtonian Fluid Simulation",
"abstract": "Through adding stress tensors into the Navier-Stokes equations, in this paper a non-Newtonian fluid simulation model is presented, it profits from the essential method of smoothed particle hydrodynamics, and can exhibit concurrently viscosity, elasticity and plasticity of non-Newtonian fluid, thereby a unified model for simulating non-Newtonian fluid is established. The proposed model are tested under various elastic and plastic parameter values, the experimental results show that non-Newtonian fluid with various elastic and plastic characteristic can be simulated realistically by using this model.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Through adding stress tensors into the Navier-Stokes equations, in this paper a non-Newtonian fluid simulation model is presented, it profits from the essential method of smoothed particle hydrodynamics, and can exhibit concurrently viscosity, elasticity and plasticity of non-Newtonian fluid, thereby a unified model for simulating non-Newtonian fluid is established. The proposed model are tested under various elastic and plastic parameter values, the experimental results show that non-Newtonian fluid with various elastic and plastic characteristic can be simulated realistically by using this model.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Through adding stress tensors into the Navier-Stokes equations, in this paper a non-Newtonian fluid simulation model is presented, it profits from the essential method of smoothed particle hydrodynamics, and can exhibit concurrently viscosity, elasticity and plasticity of non-Newtonian fluid, thereby a unified model for simulating non-Newtonian fluid is established. The proposed model are tested under various elastic and plastic parameter values, the experimental results show that non-Newtonian fluid with various elastic and plastic characteristic can be simulated realistically by using this model.",
"fno": "3941a290",
"keywords": [
"Smoothed Particle Hydrodynamics",
"Non Newtonian Fluid",
"Fluid Simulation"
],
"authors": [
{
"affiliation": null,
"fullName": "Hongquan Sun",
"givenName": "Hongquan",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jiqing Han",
"givenName": "Jiqing",
"surname": "Han",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccms",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-01-01T00:00:00",
"pubType": "proceedings",
"pages": "290-294",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3941-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3941a286",
"articleId": "12OmNqJq4t6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3941a295",
"articleId": "12OmNwE9OLM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdh/2012/4899/0/4899a074",
"title": "Adaptive Particle Size Setting and Normal Calculation Methods in Fluid Rendering",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a074/12OmNAo45RW",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2009/3789/0/3789a038",
"title": "Particle Importance Based Fluid Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2009/3789a038/12OmNAolHa9",
"parentPublication": {
"id": "proceedings/cgiv/2009/3789/0",
"title": "2009 Sixth International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icetet/2008/3267/0/3267b077",
"title": "MHD Flow and Heat Transfer in the Flow of a Power Law Fluid Over a Non-ISO Thermal Stretching Sheet",
"doi": null,
"abstractUrl": "/proceedings-article/icetet/2008/3267b077/12OmNBVIUyd",
"parentPublication": {
"id": "proceedings/icetet/2008/3267/0",
"title": "Emerging Trends in Engineering & Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sbgames/2010/4359/0/4359a156",
"title": "Fluid Simulation with Two-Way Interaction Rigid Body Using a Heterogeneous GPU and CPU Environment",
"doi": null,
"abstractUrl": "/proceedings-article/sbgames/2010/4359a156/12OmNyQYtk2",
"parentPublication": {
"id": "proceedings/sbgames/2010/4359/0",
"title": "2010 Brazilian Symposium on Games and Digital Entertainment",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2012/4899/0/4899a374",
"title": "SPH-Based Real-Time Wall-Fountain Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2012/4899a374/12OmNzuZUoG",
"parentPublication": {
"id": "proceedings/icdh/2012/4899/0",
"title": "4th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/11/ttg2011111714",
"title": "Six Degrees-of-Freedom Haptic Interaction with Fluids",
"doi": null,
"abstractUrl": "/journal/tg/2011/11/ttg2011111714/13rRUxNW1Zj",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2004/03/c3038",
"title": "Simulation of Swimming Organisms: Coupling Internal Mechanics with External Fluid Dynamics",
"doi": null,
"abstractUrl": "/magazine/cs/2004/03/c3038/13rRUy3gmVR",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2006/2686/0/04027054",
"title": "Particle-based non-Newtonian fluid animation for melting objects",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2006/04027054/17QjJcBGChj",
"parentPublication": {
"id": "proceedings/sibgrapi/2006/2686/0",
"title": "2006 19th Brazilian Symposium on Computer Graphics and Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2022/6814/0/681400a134",
"title": "Visual Simulation of Spaghetti Using Vellum and Fluid-Implicit-Particle Method",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2022/681400a134/1I6RMN3iuY0",
"parentPublication": {
"id": "proceedings/cw/2022/6814/0",
"title": "2022 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cscc/2020/6503/0/650300a112",
"title": "Numerical simulation of blood pulsatile flow in stenotic coronary arteries: The effect of turbulence modeling and non-Newtonian assumptions",
"doi": null,
"abstractUrl": "/proceedings-article/cscc/2020/650300a112/1t2mVnhHBdK",
"parentPublication": {
"id": "proceedings/cscc/2020/6503/0",
"title": "2020 24th International Conference on Circuits, Systems, Communications and Computers (CSCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyKJiwF",
"title": "SC Conference",
"acronym": "sc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "1999",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAQJzUV",
"doi": "10.1109/SC.1999.10033",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"normalizedTitle": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"abstract": "Multigrid is a popular solution method for the system of linear algebraic equations that arise from PDEs discretized with the finite element method. The application of multigrid to unstructured grid problems, however, is not well developed. We discuss a method, that uses many of the same techniques as the finite element method itself, to apply standard multigrid algorithms to unstructured finite element problems. We use maximal independent sets (MISs) as a mechanism to automatically coarsen unstructured grids; the inherent flexibility in the selection of an MIS allows for the use of heuristics to improve their effectiveness for a multigrid solver. We present parallel algorithms, based on geometric heuristics, to optimize the quality of MISs and the meshes constructed from them, for use in multigrid solvers for 3D unstructured problems. We conduct scalability studies that demonstrate the effectiveness of our methods on a problem in large deformation elasticity and plasticity of up to 40 million degrees of freedom on 960 processor IBM PowerPC 4-way SMP cluster with about 60% parallel efficiency.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Multigrid is a popular solution method for the system of linear algebraic equations that arise from PDEs discretized with the finite element method. The application of multigrid to unstructured grid problems, however, is not well developed. We discuss a method, that uses many of the same techniques as the finite element method itself, to apply standard multigrid algorithms to unstructured finite element problems. We use maximal independent sets (MISs) as a mechanism to automatically coarsen unstructured grids; the inherent flexibility in the selection of an MIS allows for the use of heuristics to improve their effectiveness for a multigrid solver. We present parallel algorithms, based on geometric heuristics, to optimize the quality of MISs and the meshes constructed from them, for use in multigrid solvers for 3D unstructured problems. We conduct scalability studies that demonstrate the effectiveness of our methods on a problem in large deformation elasticity and plasticity of up to 40 million degrees of freedom on 960 processor IBM PowerPC 4-way SMP cluster with about 60% parallel efficiency.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Multigrid is a popular solution method for the system of linear algebraic equations that arise from PDEs discretized with the finite element method. The application of multigrid to unstructured grid problems, however, is not well developed. We discuss a method, that uses many of the same techniques as the finite element method itself, to apply standard multigrid algorithms to unstructured finite element problems. We use maximal independent sets (MISs) as a mechanism to automatically coarsen unstructured grids; the inherent flexibility in the selection of an MIS allows for the use of heuristics to improve their effectiveness for a multigrid solver. We present parallel algorithms, based on geometric heuristics, to optimize the quality of MISs and the meshes constructed from them, for use in multigrid solvers for 3D unstructured problems. We conduct scalability studies that demonstrate the effectiveness of our methods on a problem in large deformation elasticity and plasticity of up to 40 million degrees of freedom on 960 processor IBM PowerPC 4-way SMP cluster with about 60% parallel efficiency.",
"fno": "19660027",
"keywords": [
"Unstructured Multigrid",
"Parallel Sparse Solvers",
"Parallel Maximal Independent Sets"
],
"authors": [
{
"affiliation": "University of California, Berkeley",
"fullName": "Mark Adams",
"givenName": "Mark",
"surname": "Adams",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, Berkeley",
"fullName": "Jim Demmel",
"givenName": "Jim",
"surname": "Demmel",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1999-11-01T00:00:00",
"pubType": "proceedings",
"pages": "27",
"year": "1999",
"issn": null,
"isbn": "1-58113-091-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01592670",
"articleId": "1D85NPKIl7q",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01592671",
"articleId": "1D85ReVqjJe",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2001/1990/0/19900014",
"title": "A Distributed Memory Unstructured Gauss-Seidel Algorithm for Multigrid Smoothers",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2001/19900014/12OmNAHmOtc",
"parentPublication": {
"id": "proceedings/sc/2001/1990/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipcw/2016/5773/0/07837056",
"title": "An Object Oriented Parallel Finite Element Scheme for Computations of PDEs: Design and Implementation",
"doi": null,
"abstractUrl": "/proceedings-article/hipcw/2016/07837056/12OmNAkWvvg",
"parentPublication": {
"id": "proceedings/hipcw/2016/5773/0",
"title": "2016 IEEE 23rd International Conference on High-Performance Computing: Workshops (HiPCW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/3/3336e299",
"title": "Parallel Finite Element Computation Based on Coarse-Fine Mesh Formulation",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336e299/12OmNroij0A",
"parentPublication": {
"id": "proceedings/csse/2008/3336/3",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2003/2113/0/21130026",
"title": "Applications of Algebraic Multigrid to Large-Scale Finite Element Analysis of Whole Bone Micro-Mechanics on the IBM SP",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2003/21130026/12OmNs4S8Am",
"parentPublication": {
"id": "proceedings/sc/2003/2113/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2012/0806/0/1000a045",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a045/12OmNy7Qfuf",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2011/01/ttd2011010022",
"title": "Cyclic Reduction Tridiagonal Solvers on GPUs Applied to Mixed-Precision Multigrid",
"doi": null,
"abstractUrl": "/journal/td/2011/01/ttd2011010022/13rRUwd9CFF",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6056",
"title": "A Massively Parallel Multigrid Method for Finite Elements",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6056/13rRUxC0SLp",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/11/ttg2011111663",
"title": "A Hexahedral Multigrid Approach for Simulating Cuts in Deformable Objects",
"doi": null,
"abstractUrl": "/journal/tg/2011/11/ttg2011111663/13rRUy0qnGi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/01592670",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/01592670/1D85NPKIl7q",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1997/1982/0/01592640",
"title": "High Performance MP Unstructured Finite Element Simulation of Chemically Reacting Flows",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1997/01592640/1D86l8PlBM4",
"parentPublication": {
"id": "proceedings/sc/1997/1982/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyFCvPg",
"title": "SC Conference",
"acronym": "sc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "1995",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC3Xhj8",
"doi": "10.1109/SUPERC.1995.5",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"normalizedTitle": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"abstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"fno": "25680066",
"keywords": [],
"authors": [
{
"affiliation": "California Institute of Technology",
"fullName": "John Z. Lou",
"givenName": "John Z.",
"surname": "Lou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "California Institute of Technology",
"fullName": "Robert D. Ferraro",
"givenName": "Robert D.",
"surname": "Ferraro",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1995-12-01T00:00:00",
"pubType": "proceedings",
"pages": "66",
"year": "1995",
"issn": null,
"isbn": "0-89791-816-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "25680065",
"articleId": "12OmNrIrPme",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "25680067",
"articleId": "12OmNASraUl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/1999/1966/0/19660027",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/19660027/12OmNAQJzUV",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpp/2001/1257/0/12570580",
"title": "A Multigrid Solver for the Incompressible Navier-Stokes Equations on a Beowulf-Class System",
"doi": null,
"abstractUrl": "/proceedings-article/icpp/2001/12570580/12OmNAnMusl",
"parentPublication": {
"id": "proceedings/icpp/2001/1257/0",
"title": "International Conference on Parallel Processing, 2001.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipc/2014/5976/0/07116899",
"title": "Parallel AMG solver for three dimensional unstructured grids using GPU",
"doi": null,
"abstractUrl": "/proceedings-article/hipc/2014/07116899/12OmNwBT1mj",
"parentPublication": {
"id": "proceedings/hipc/2014/5976/0",
"title": "2014 21st International Conference on High Performance Computing (HiPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/superc/1995/816/0/01383203",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/superc/1995/01383203/12OmNwFid6P",
"parentPublication": {
"id": "proceedings/superc/1995/816/0",
"title": "IEEE/ACM SC95 Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940794",
"title": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940794/12OmNx8Oune",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2012/0806/0/1000a045",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a045/12OmNy7Qfuf",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2013/01/mcs2013010026",
"title": "Large-Eddy Simulations of Turbulent Incompressible Flows on GPU Clusters",
"doi": null,
"abstractUrl": "/magazine/cs/2013/01/mcs2013010026/13rRUEgs2x4",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/01592670",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/01592670/1D85NPKIl7q",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1995/2568/0/01383203",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1995/01383203/1D8837kEXOo",
"parentPublication": {
"id": "proceedings/sc/1995/2568/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scala/2019/5989/0/598900a052",
"title": "Parallel Multigrid Methods on Manycore Clusters with IHK/McKernel",
"doi": null,
"abstractUrl": "/proceedings-article/scala/2019/598900a052/1grNUbiovsY",
"parentPublication": {
"id": "proceedings/scala/2019/5989/0",
"title": "2019 IEEE/ACM 10th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems (ScalA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCdk2Y0",
"title": "Computer Modeling and Simulation, International Conference on",
"acronym": "iccms",
"groupId": "1002645",
"volume": "4",
"displayVolume": "4",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNviHKgf",
"doi": "10.1109/ICCMS.2010.168",
"title": "A Cascadic Multigrid Algorithm for the Double Obstacle Problem",
"normalizedTitle": "A Cascadic Multigrid Algorithm for the Double Obstacle Problem",
"abstract": "The purpose of this paper is to extend the Multi-grid algorithm to variational inequalities with the two-sided restrictions. When classical multigrid methods are applied to discretizations of variational inequalities, several complications are frequently encountered mainly due to the lack of simple feasible restriction operators. These difficulties vanish in the application of the cascadic version of the multigrid method which in this sense yields greater advantages than in the linear case. Furthermore, a cg-method is proposed as smoother and as solver on coarse meshes.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The purpose of this paper is to extend the Multi-grid algorithm to variational inequalities with the two-sided restrictions. When classical multigrid methods are applied to discretizations of variational inequalities, several complications are frequently encountered mainly due to the lack of simple feasible restriction operators. These difficulties vanish in the application of the cascadic version of the multigrid method which in this sense yields greater advantages than in the linear case. Furthermore, a cg-method is proposed as smoother and as solver on coarse meshes.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The purpose of this paper is to extend the Multi-grid algorithm to variational inequalities with the two-sided restrictions. When classical multigrid methods are applied to discretizations of variational inequalities, several complications are frequently encountered mainly due to the lack of simple feasible restriction operators. These difficulties vanish in the application of the cascadic version of the multigrid method which in this sense yields greater advantages than in the linear case. Furthermore, a cg-method is proposed as smoother and as solver on coarse meshes.",
"fno": "3941d242",
"keywords": [
"Cascadic Multigrid Algorithm",
"Obstacle Problem",
"Variational Inequality"
],
"authors": [
{
"affiliation": null,
"fullName": "Jiantao Gu",
"givenName": "Jiantao",
"surname": "Gu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Caixia Liu",
"givenName": "Caixia",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Liping Du",
"givenName": "Liping",
"surname": "Du",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccms",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-01-01T00:00:00",
"pubType": "proceedings",
"pages": "242-244",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3941-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3941d308",
"articleId": "12OmNyqiaXj",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3941d245",
"articleId": "12OmNx7XH0u",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2001/1990/0/19900014",
"title": "A Distributed Memory Unstructured Gauss-Seidel Algorithm for Multigrid Smoothers",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2001/19900014/12OmNAHmOtc",
"parentPublication": {
"id": "proceedings/sc/2001/1990/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1995/7310/1/73100049",
"title": "Multigrid adaptive image processing",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1995/73100049/12OmNB9bvjg",
"parentPublication": {
"id": "proceedings/icip/1995/7310/1",
"title": "Image Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aswec/2010/4006/0/4006a224",
"title": "Modeling Multigrid Algorithms for Variational Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/aswec/2010/4006a224/12OmNBqv2pv",
"parentPublication": {
"id": "proceedings/aswec/2010/4006/0",
"title": "Software Engineering Conference, Australian",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2009/3557/3/3557e955",
"title": "Solvability of Set-Valued Vector Optimization Problem",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2009/3557e955/12OmNyU63to",
"parentPublication": {
"id": "proceedings/etcs/2009/3557/3",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pas/1995/7038/0/70380107",
"title": "Implementing a 3D multigrid algorithm on Fujitsu's vector parallel supercomputer",
"doi": null,
"abstractUrl": "/proceedings-article/pas/1995/70380107/12OmNzDehev",
"parentPublication": {
"id": "proceedings/pas/1995/7038/0",
"title": "Parallel Algorithms / Architecture Synthesis, AIZU International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2008/2835/0/05218558",
"title": "Dendro: Parallel algorithms for multigrid and AMR methods on 2:1 balanced octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2008/05218558/12OmNzGlRBd",
"parentPublication": {
"id": "proceedings/sc/2008/2835/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/11/07364293",
"title": "Solving the Fluid Pressure Poisson Equation Using Multigrid—Evaluation and Improvements",
"doi": null,
"abstractUrl": "/journal/tg/2016/11/07364293/13rRUwvBy8Y",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6034",
"title": "Multigrid Methods for the Stokes System",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6034/13rRUyg2jRz",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/05/c5096",
"title": "Multigrid Methods: Managing Massive Meshes",
"doi": null,
"abstractUrl": "/magazine/cs/2006/05/c5096/13rRUygBw9Z",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2017/5114/0/09926262",
"title": "Optimizing Geometric Multigrid Method Computation using a DSL Approach",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2017/09926262/1HOxCiJdaE0",
"parentPublication": {
"id": "proceedings/sc/2017/5114/0",
"title": "SC17: International Conference for High Performance Computing, Networking, Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNC3Xhhs",
"title": "10th Euromicro Workshop on Parallel, Distributed and Network-based Processing (EUROMICRO-PDP 2002)",
"acronym": "pdp",
"groupId": "1000543",
"volume": "0",
"displayVolume": "0",
"year": "2002",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwErpNM",
"doi": "10.1109/EMPDP.2002.994206",
"title": "Beowulf Performance in CFD Multigrid Applications",
"normalizedTitle": "Beowulf Performance in CFD Multigrid Applications",
"abstract": "Computational Fluid Dynamics is probably one of the most computationally demanding disciplines, a driving force behind the development of new computer architectures. In fact, the design and evaluation of high-performance parallel systems is commonly based on CFD workloads. One of the most remarkable examples of such workloads is the NAS parallel benchmark, which aims to mimic the computation and data-movement characteristics of large scale CFD applications. We have paid specific attention to the NAS-MG (multigrid) kernel, since these methods represent one of the most promising solvers in the field of CFD. Nevertheless, practical flow computations demand robust multigrid algorithms which differ from the NAS-MG kernel. This paper presents a performance evaluation of a Beowulf system using both a state-of-the-art multigrid solver and the NAS-MG benchmark. These two codes have been used to compare several of its design choices, namely, the interconnection network (GigaNet versus Fast-Ethernet) as well as the node configuration (dual nodes versus single nodes). The results highlight that the optimal combination strongly depends on the target application.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Computational Fluid Dynamics is probably one of the most computationally demanding disciplines, a driving force behind the development of new computer architectures. In fact, the design and evaluation of high-performance parallel systems is commonly based on CFD workloads. One of the most remarkable examples of such workloads is the NAS parallel benchmark, which aims to mimic the computation and data-movement characteristics of large scale CFD applications. We have paid specific attention to the NAS-MG (multigrid) kernel, since these methods represent one of the most promising solvers in the field of CFD. Nevertheless, practical flow computations demand robust multigrid algorithms which differ from the NAS-MG kernel. This paper presents a performance evaluation of a Beowulf system using both a state-of-the-art multigrid solver and the NAS-MG benchmark. These two codes have been used to compare several of its design choices, namely, the interconnection network (GigaNet versus Fast-Ethernet) as well as the node configuration (dual nodes versus single nodes). The results highlight that the optimal combination strongly depends on the target application.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Computational Fluid Dynamics is probably one of the most computationally demanding disciplines, a driving force behind the development of new computer architectures. In fact, the design and evaluation of high-performance parallel systems is commonly based on CFD workloads. One of the most remarkable examples of such workloads is the NAS parallel benchmark, which aims to mimic the computation and data-movement characteristics of large scale CFD applications. We have paid specific attention to the NAS-MG (multigrid) kernel, since these methods represent one of the most promising solvers in the field of CFD. Nevertheless, practical flow computations demand robust multigrid algorithms which differ from the NAS-MG kernel. This paper presents a performance evaluation of a Beowulf system using both a state-of-the-art multigrid solver and the NAS-MG benchmark. These two codes have been used to compare several of its design choices, namely, the interconnection network (GigaNet versus Fast-Ethernet) as well as the node configuration (dual nodes versus single nodes). The results highlight that the optimal combination strongly depends on the target application.",
"fno": "14440007",
"keywords": [
"Parallel Multigrid",
"Robust Multigrid",
"NAS Parallel Benchmark",
"PC Clusters"
],
"authors": [
{
"affiliation": "Universidad Complutense",
"fullName": "C. Garcia",
"givenName": "C.",
"surname": "Garcia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Complutense",
"fullName": "R. S. Montero",
"givenName": "R. S.",
"surname": "Montero",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Complutense",
"fullName": "M. Prieto",
"givenName": "M.",
"surname": "Prieto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Complutense",
"fullName": "I. M. Llorente",
"givenName": "I. M.",
"surname": "Llorente",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Complutense",
"fullName": "F. Tirado",
"givenName": "F.",
"surname": "Tirado",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pdp",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2002-01-01T00:00:00",
"pubType": "proceedings",
"pages": "0007",
"year": "2002",
"issn": "1066-6192",
"isbn": "0-7695-1444-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "14440005",
"articleId": "12OmNxE2mLF",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "14440015",
"articleId": "12OmNxXCGG1",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNB836KQ",
"title": "IEEE/ACM SC95 Conference",
"acronym": "superc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "1995",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwFid6P",
"doi": "10.1109/SUPERC.1995.241963",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"normalizedTitle": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"abstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"fno": "01383203",
"keywords": [
"Packaging",
"Kernel",
"Finite Difference Methods",
"Robustness",
"Physics Computing",
"Propulsion",
"Laboratories",
"Testing",
"Concurrent Computing",
"Astrophysics"
],
"authors": [
{
"affiliation": "California Institute of Technology",
"fullName": "J.Z. Lou",
"givenName": "J.Z.",
"surname": "Lou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "R.D. Ferraro",
"givenName": "R.D.",
"surname": "Ferraro",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "superc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1995-01-01T00:00:00",
"pubType": "proceedings",
"pages": "66-66",
"year": "1995",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01383202",
"articleId": "12OmNzxyiJr",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01383204",
"articleId": "12OmNASraMH",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/1999/1966/0/19660027",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/19660027/12OmNAQJzUV",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpp/2001/1257/0/12570580",
"title": "A Multigrid Solver for the Incompressible Navier-Stokes Equations on a Beowulf-Class System",
"doi": null,
"abstractUrl": "/proceedings-article/icpp/2001/12570580/12OmNAnMusl",
"parentPublication": {
"id": "proceedings/icpp/2001/1257/0",
"title": "International Conference on Parallel Processing, 2001.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1995/2568/0/25680066",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1995/25680066/12OmNC3Xhj8",
"parentPublication": {
"id": "proceedings/sc/1995/2568/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipc/2014/5976/0/07116899",
"title": "Parallel AMG solver for three dimensional unstructured grids using GPU",
"doi": null,
"abstractUrl": "/proceedings-article/hipc/2014/07116899/12OmNwBT1mj",
"parentPublication": {
"id": "proceedings/hipc/2014/5976/0",
"title": "2014 21st International Conference on High Performance Computing (HiPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940794",
"title": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940794/12OmNx8Oune",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2012/0806/0/1000a045",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a045/12OmNy7Qfuf",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2013/01/mcs2013010026",
"title": "Large-Eddy Simulations of Turbulent Incompressible Flows on GPU Clusters",
"doi": null,
"abstractUrl": "/magazine/cs/2013/01/mcs2013010026/13rRUEgs2x4",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171181",
"title": "A Multigrid Fluid Pressure Solver Handling Separating Solid Boundary Conditions",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171181/13rRUxlgxTi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/01592670",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/01592670/1D85NPKIl7q",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1995/2568/0/01383203",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1995/01383203/1D8837kEXOo",
"parentPublication": {
"id": "proceedings/sc/1995/2568/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBTawmj",
"title": "Design Automation Conference",
"acronym": "dac",
"groupId": "1000196",
"volume": "0",
"displayVolume": "0",
"year": "2003",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx8Oune",
"doi": "10.1109/DAC.2003.1219127",
"title": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"normalizedTitle": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"abstract": "An efficient matrix solver is critical to the analytical placement. As the size of the matrix becomes huge, the multilevel methods turn out to be more efficient and more scalable. Algebraic Multigrid (AMG) is a multilevel technique to speedup the iterative matrix solver. We apply the algebraic multigrid method to solve the linear equations that arise from the analytical placement. A layout based clustering scheme is put forward to generate coarsening levels for the multigrid method. The experimental results show that the algebraic multigrid solver is promising for analytical placement.",
"abstracts": [
{
"abstractType": "Regular",
"content": "An efficient matrix solver is critical to the analytical placement. As the size of the matrix becomes huge, the multilevel methods turn out to be more efficient and more scalable. Algebraic Multigrid (AMG) is a multilevel technique to speedup the iterative matrix solver. We apply the algebraic multigrid method to solve the linear equations that arise from the analytical placement. A layout based clustering scheme is put forward to generate coarsening levels for the multigrid method. The experimental results show that the algebraic multigrid solver is promising for analytical placement.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "An efficient matrix solver is critical to the analytical placement. As the size of the matrix becomes huge, the multilevel methods turn out to be more efficient and more scalable. Algebraic Multigrid (AMG) is a multilevel technique to speedup the iterative matrix solver. We apply the algebraic multigrid method to solve the linear equations that arise from the analytical placement. A layout based clustering scheme is put forward to generate coarsening levels for the multigrid method. The experimental results show that the algebraic multigrid solver is promising for analytical placement.",
"fno": "23940794",
"keywords": [
"Analytical Placement",
"Algebraic Multigrid Method",
"Layout Based Clustering"
],
"authors": [
{
"affiliation": "University of California, San Diego",
"fullName": "Hongyu Chen",
"givenName": "Hongyu",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego",
"fullName": "Chung-Kuan Cheng",
"givenName": "Chung-Kuan",
"surname": "Cheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mentor Graphics Corporation, San Jose, CA",
"fullName": "Nan-Chi Chou",
"givenName": "Nan-Chi",
"surname": "Chou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego",
"fullName": "Andrew B. Kahng",
"givenName": "Andrew B.",
"surname": "Kahng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mentor Graphics Corporation, San Diego, CA",
"fullName": "John F. MacDonald",
"givenName": "John F.",
"surname": "MacDonald",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Mentor Graphics Corporation, Wilsonville, OR",
"fullName": "Peter Suaris",
"givenName": "Peter",
"surname": "Suaris",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego",
"fullName": "Bo Yao",
"givenName": "Bo",
"surname": "Yao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego",
"fullName": "Zhengyong Zhu",
"givenName": "Zhengyong",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "dac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2003-06-01T00:00:00",
"pubType": "proceedings",
"pages": "794",
"year": "2003",
"issn": null,
"isbn": "1-58113-688-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "23940788",
"articleId": "12OmNym2c4s",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01219146",
"articleId": "12OmNCga1TW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/1999/1966/0/19660027",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/19660027/12OmNAQJzUV",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940105",
"title": "Power Network Analysis Using an Adaptive Algebraic Multigrid Approach",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940105/12OmNCyTyoi",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2004/8788/0/87880035",
"title": "Flow Field Clustering via Algebraic Multigrid",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880035/12OmNs0C9Cx",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pci/2012/4825/0/4825a211",
"title": "On the Algebraic Multigrid Method Based on Generic Approximate Banded Inverses",
"doi": null,
"abstractUrl": "/proceedings-article/pci/2012/4825a211/12OmNxeuta3",
"parentPublication": {
"id": "proceedings/pci/2012/4825/0",
"title": "2012 16th Panhellenic Conference on Informatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2012/0806/0/1000a045",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a045/12OmNy7Qfuf",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2006/0054/0/01639295",
"title": "Accelerating shape optimizing load balancing for parallel FEM simulations by algebraic multigrid",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2006/01639295/12OmNyfdOUI",
"parentPublication": {
"id": "proceedings/ipdps/2006/0054/0",
"title": "Proceedings 20th IEEE International Parallel & Distributed Processing Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940109",
"title": "Power Grid Reduction Based on Algebraic Multigrid Principles",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940109/12OmNzYNNnc",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6024",
"title": "An Introduction to Algebraic Multigrid",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6024/13rRUwkxc1e",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6056",
"title": "A Massively Parallel Multigrid Method for Finite Elements",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6056/13rRUxC0SLp",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171181",
"title": "A Multigrid Fluid Pressure Solver Handling Separating Solid Boundary Conditions",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171181/13rRUxlgxTi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz5JC19",
"title": "SC Conference",
"acronym": "sc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy7Qfuf",
"doi": "10.1109/SC.2012.91",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"normalizedTitle": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"abstract": "We present a parallel multigrid method for solving variable-coefficient elliptic partial differential equations on arbitrary geometries using highly adapted meshes. Our method is designed for meshes that are built from an unstructured hexa-hedral macro mesh, in which each macro element is adaptively refined as an octree. This forest-of-octrees approach enables us to generate meshes for complex geometries with arbitrary levels of local refinement. We use geometric multigrid (GMG) for each of the octrees and algebraic multigrid (AMG) as the coarse grid solver. We designed our GMG sweeps to entirely avoid collectives, thus minimizing communication cost. We present weak and strong scaling results for the 3D variable-coefficient Poisson problem that demonstrate high parallel scalability. As a highlight, the largest problem we solve is on a non-uniform mesh with 100 billion unknowns on 262,144 cores of NCCS's Cray XK6 \"Jaguar\" in this solve we sustain 272 TFlops/s.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present a parallel multigrid method for solving variable-coefficient elliptic partial differential equations on arbitrary geometries using highly adapted meshes. Our method is designed for meshes that are built from an unstructured hexa-hedral macro mesh, in which each macro element is adaptively refined as an octree. This forest-of-octrees approach enables us to generate meshes for complex geometries with arbitrary levels of local refinement. We use geometric multigrid (GMG) for each of the octrees and algebraic multigrid (AMG) as the coarse grid solver. We designed our GMG sweeps to entirely avoid collectives, thus minimizing communication cost. We present weak and strong scaling results for the 3D variable-coefficient Poisson problem that demonstrate high parallel scalability. As a highlight, the largest problem we solve is on a non-uniform mesh with 100 billion unknowns on 262,144 cores of NCCS's Cray XK6 \"Jaguar\" in this solve we sustain 272 TFlops/s.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present a parallel multigrid method for solving variable-coefficient elliptic partial differential equations on arbitrary geometries using highly adapted meshes. Our method is designed for meshes that are built from an unstructured hexa-hedral macro mesh, in which each macro element is adaptively refined as an octree. This forest-of-octrees approach enables us to generate meshes for complex geometries with arbitrary levels of local refinement. We use geometric multigrid (GMG) for each of the octrees and algebraic multigrid (AMG) as the coarse grid solver. We designed our GMG sweeps to entirely avoid collectives, thus minimizing communication cost. We present weak and strong scaling results for the 3D variable-coefficient Poisson problem that demonstrate high parallel scalability. As a highlight, the largest problem we solve is on a non-uniform mesh with 100 billion unknowns on 262,144 cores of NCCS's Cray XK6 \"Jaguar\" in this solve we sustain 272 TFlops/s.",
"fno": "1000a045",
"keywords": [
"Octrees",
"Scalability",
"Multigrid Methods",
"Geometry",
"Shape",
"Educational Institutions",
"Boundary Conditions"
],
"authors": [
{
"affiliation": null,
"fullName": "Hari Sundar",
"givenName": "Hari",
"surname": "Sundar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "George Biros",
"givenName": "George",
"surname": "Biros",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Carsten Burstedde",
"givenName": "Carsten",
"surname": "Burstedde",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Johann Rudi",
"givenName": "Johann",
"surname": "Rudi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Omar Ghattas",
"givenName": "Omar",
"surname": "Ghattas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Georg Stadler",
"givenName": "Georg",
"surname": "Stadler",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1-11",
"year": "2012",
"issn": "2167-4329",
"isbn": "978-1-4673-0805-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "1000a044",
"articleId": "12OmNvkpkV8",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "1000a046",
"articleId": "12OmNy7yEcA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/2001/1990/0/19900014",
"title": "A Distributed Memory Unstructured Gauss-Seidel Algorithm for Multigrid Smoothers",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2001/19900014/12OmNAHmOtc",
"parentPublication": {
"id": "proceedings/sc/2001/1990/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/19660027",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/19660027/12OmNAQJzUV",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2004/8788/0/87880035",
"title": "Flow Field Clustering via Algebraic Multigrid",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880035/12OmNs0C9Cx",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccms/2010/3941/4/3941d242",
"title": "A Cascadic Multigrid Algorithm for the Double Obstacle Problem",
"doi": null,
"abstractUrl": "/proceedings-article/iccms/2010/3941d242/12OmNviHKgf",
"parentPublication": {
"id": "proceedings/iccms/2010/3941/4",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940794",
"title": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940794/12OmNx8Oune",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2008/2835/0/28350018",
"title": "Dendro: parallel algorithms for multigrid and AMR methods on 2:1 balanced octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2008/28350018/12OmNz6iOOi",
"parentPublication": {
"id": "proceedings/sc/2008/2835/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2008/2835/0/05218558",
"title": "Dendro: Parallel algorithms for multigrid and AMR methods on 2:1 balanced octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2008/05218558/12OmNzGlRBd",
"parentPublication": {
"id": "proceedings/sc/2008/2835/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6024",
"title": "An Introduction to Algebraic Multigrid",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6024/13rRUwkxc1e",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2006/06/c6056",
"title": "A Massively Parallel Multigrid Method for Finite Elements",
"doi": null,
"abstractUrl": "/magazine/cs/2006/06/c6056/13rRUxC0SLp",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171181",
"title": "A Multigrid Fluid Pressure Solver Handling Separating Solid Boundary Conditions",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171181/13rRUxlgxTi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyFCvPg",
"title": "SC Conference",
"acronym": "sc",
"groupId": "1000729",
"volume": "0",
"displayVolume": "0",
"year": "1995",
"__typename": "ProceedingType"
},
"article": {
"id": "1D8837kEXOo",
"doi": "10.1145/224170.224406",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"normalizedTitle": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"abstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A parallel time-dependent incompressible flow solver and a parallel multigrid elliptic kernel are described. The flow solver is based on a second-order projection method applied to a staggered finite-difference grid. The multigrid algorithms implemented in the elliptic kernel, which is needed by the flow solver, are V-cycle and full V-cycle schemes. A grid-partition strategy is used in the parallel implementations of both the flow solver and the multigrid elliptic kernel on all fine and coarse grids. Numerical experiments and parallel performance tests show the parallel solver package is numerically stable, physically robust and computationally efficient. Both the multigrid elliptic kernel and the flow solver scale very well to a large number of processors on the Intel Paragon and the Cray T3D for computations with moderate granularity. The solver package has been carefully designed and coded so that it can be easily adapted to solving a variety of interesting two and three-dimensional flow problems. The solver package is portable to parallel systems that support MPI, PVM and Intel NX for interprocessor communications.",
"fno": "01383203",
"keywords": [
"Packaging",
"Kernel",
"Finite Difference Methods",
"Robustness",
"Physics Computing",
"Propulsion",
"Laboratories",
"Testing",
"Concurrent Computing",
"Astrophysics"
],
"authors": [
{
"affiliation": "California Institute of Technology",
"fullName": "J.Z. Lou",
"givenName": "J.Z.",
"surname": "Lou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "R.D. Ferraro",
"givenName": "R.D.",
"surname": "Ferraro",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": false,
"pubDate": "1995-01-01T00:00:00",
"pubType": "proceedings",
"pages": "66-66",
"year": "1995",
"issn": null,
"isbn": "0-89791-816-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "25680043",
"articleId": "12OmNB9KHta",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "25680044",
"articleId": "12OmNyaoDvO",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sc/1999/1966/0/19660027",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/19660027/12OmNAQJzUV",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpp/2001/1257/0/12570580",
"title": "A Multigrid Solver for the Incompressible Navier-Stokes Equations on a Beowulf-Class System",
"doi": null,
"abstractUrl": "/proceedings-article/icpp/2001/12570580/12OmNAnMusl",
"parentPublication": {
"id": "proceedings/icpp/2001/1257/0",
"title": "International Conference on Parallel Processing, 2001.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1995/2568/0/25680066",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1995/25680066/12OmNC3Xhj8",
"parentPublication": {
"id": "proceedings/sc/1995/2568/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipc/2014/5976/0/07116899",
"title": "Parallel AMG solver for three dimensional unstructured grids using GPU",
"doi": null,
"abstractUrl": "/proceedings-article/hipc/2014/07116899/12OmNwBT1mj",
"parentPublication": {
"id": "proceedings/hipc/2014/5976/0",
"title": "2014 21st International Conference on High Performance Computing (HiPC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/superc/1995/816/0/01383203",
"title": "A Parallel Incompressible Flow Solver Package with a Parallel Multigrid Elliptic Kernel",
"doi": null,
"abstractUrl": "/proceedings-article/superc/1995/01383203/12OmNwFid6P",
"parentPublication": {
"id": "proceedings/superc/1995/816/0",
"title": "IEEE/ACM SC95 Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dac/2003/2394/0/23940794",
"title": "An Algebraic Multigrid Solver for Analytical Placement with Layout Based Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2003/23940794/12OmNx8Oune",
"parentPublication": {
"id": "proceedings/dac/2003/2394/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/2012/0806/0/1000a045",
"title": "Parallel geometric-algebraic multigrid on unstructured forests of octrees",
"doi": null,
"abstractUrl": "/proceedings-article/sc/2012/1000a045/12OmNy7Qfuf",
"parentPublication": {
"id": "proceedings/sc/2012/0806/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2013/01/mcs2013010026",
"title": "Large-Eddy Simulations of Turbulent Incompressible Flows on GPU Clusters",
"doi": null,
"abstractUrl": "/magazine/cs/2013/01/mcs2013010026/13rRUEgs2x4",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/08/06171181",
"title": "A Multigrid Fluid Pressure Solver Handling Separating Solid Boundary Conditions",
"doi": null,
"abstractUrl": "/journal/tg/2012/08/06171181/13rRUxlgxTi",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sc/1999/1966/0/01592670",
"title": "Parallel Multigrid Solver for 3D Unstructured Finite Element Problems",
"doi": null,
"abstractUrl": "/proceedings-article/sc/1999/01592670/1D85NPKIl7q",
"parentPublication": {
"id": "proceedings/sc/1999/1966/0",
"title": "SC Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNBQ2VPd",
"title": "Computer Animation",
"acronym": "ca",
"groupId": "1000121",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAtaRXK",
"doi": "10.1109/CA.2000.889016",
"title": "Integrated System for Skin Deformation",
"normalizedTitle": "Integrated System for Skin Deformation",
"abstract": "In this paper, we present an integrated system for skin deformation that is able to handle deformations due to both the skeleton animation and collisions. This method is based on a physically based deformation of a skin surface linked to a reference shape; the reference shape is animated with a geometric deformation. Collision detection has been implemented to avoid penetration. Our method for collision response consists of a kinematical correction of positions and forces during the simulation. The resulting model of the skin deformation enables an efficient simulation and interaction of the skin with deformable objects. Results are presented at the end of the paper as examples.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present an integrated system for skin deformation that is able to handle deformations due to both the skeleton animation and collisions. This method is based on a physically based deformation of a skin surface linked to a reference shape; the reference shape is animated with a geometric deformation. Collision detection has been implemented to avoid penetration. Our method for collision response consists of a kinematical correction of positions and forces during the simulation. The resulting model of the skin deformation enables an efficient simulation and interaction of the skin with deformable objects. Results are presented at the end of the paper as examples.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present an integrated system for skin deformation that is able to handle deformations due to both the skeleton animation and collisions. This method is based on a physically based deformation of a skin surface linked to a reference shape; the reference shape is animated with a geometric deformation. Collision detection has been implemented to avoid penetration. Our method for collision response consists of a kinematical correction of positions and forces during the simulation. The resulting model of the skin deformation enables an efficient simulation and interaction of the skin with deformable objects. Results are presented at the end of the paper as examples.",
"fno": "06830002",
"keywords": [
"Skin Deformation",
"Collision Response",
"Skeleton Animation",
"Grasping Objects",
"Physically Based Deformation"
],
"authors": [
{
"affiliation": "University of Geneva",
"fullName": "Frederic Cordier",
"givenName": "Frederic",
"surname": "Cordier",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Geneva",
"fullName": "Nadia Magnenat-Thalmann",
"givenName": "Nadia",
"surname": "Magnenat-Thalmann",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ca",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-05-01T00:00:00",
"pubType": "proceedings",
"pages": "2",
"year": "2000",
"issn": null,
"isbn": "0-7695-0683-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "0683ix",
"articleId": "12OmNxZBSD0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06830009",
"articleId": "12OmNrH1PGN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxuXcDr",
"title": "2010 IEEE International Symposium on Multimedia",
"acronym": "ism",
"groupId": "1001094",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBdru9U",
"doi": "10.1109/ISM.2010.41",
"title": "A Hybrid Deformation Model for Virtual Cutting",
"normalizedTitle": "A Hybrid Deformation Model for Virtual Cutting",
"abstract": "In this paper, we present a novel hybrid deformation model, which can simulate large deformations and non-linear behaviors of soft tissues in real time. The model partitions a soft tissue into operational and non-operational regions, and simulates the large deformations by coupling the geometry constrained mesh less method FLSM (fast lattice shape matching) with finite element algorithm TLED (total Lagrangian explicit dynamics). With the virtual node cutting method, the soft tissues can be cut realistically and robustly. The virtual cutting simulation features real time performance with the GPU-based acceleration. In combination with our multi-camera based real-time modeling framework, the deformable model and its interaction of virtual cutting can be extended to support remote virtual surgery.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present a novel hybrid deformation model, which can simulate large deformations and non-linear behaviors of soft tissues in real time. The model partitions a soft tissue into operational and non-operational regions, and simulates the large deformations by coupling the geometry constrained mesh less method FLSM (fast lattice shape matching) with finite element algorithm TLED (total Lagrangian explicit dynamics). With the virtual node cutting method, the soft tissues can be cut realistically and robustly. The virtual cutting simulation features real time performance with the GPU-based acceleration. In combination with our multi-camera based real-time modeling framework, the deformable model and its interaction of virtual cutting can be extended to support remote virtual surgery.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present a novel hybrid deformation model, which can simulate large deformations and non-linear behaviors of soft tissues in real time. The model partitions a soft tissue into operational and non-operational regions, and simulates the large deformations by coupling the geometry constrained mesh less method FLSM (fast lattice shape matching) with finite element algorithm TLED (total Lagrangian explicit dynamics). With the virtual node cutting method, the soft tissues can be cut realistically and robustly. The virtual cutting simulation features real time performance with the GPU-based acceleration. In combination with our multi-camera based real-time modeling framework, the deformable model and its interaction of virtual cutting can be extended to support remote virtual surgery.",
"fno": "4217a236",
"keywords": [
"Hybrid Deformation Model",
"Virtual Cutting",
"Real Time Simulation",
"Virtual Surgery"
],
"authors": [
{
"affiliation": null,
"fullName": "Xuqiang Shao",
"givenName": "Xuqiang",
"surname": "Shao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhong Zhou",
"givenName": "Zhong",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wei Wu",
"givenName": "Wei",
"surname": "Wu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ism",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-12-01T00:00:00",
"pubType": "proceedings",
"pages": "236-241",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4217-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4217a228",
"articleId": "12OmNB9t6wX",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4217a242",
"articleId": "12OmNwNwzDJ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2006/0224/0/02240035",
"title": "Hybrid Cutting of Deformable Solids",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2006/02240035/12OmNA0MYXQ",
"parentPublication": {
"id": "proceedings/vr/2006/0224/0",
"title": "IEEE Virtual Reality Conference (VR 2006)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/miar/2001/1113/0/11130298",
"title": "Hybrid FEM for Deformation of Soft Tissues in Surgery Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/miar/2001/11130298/12OmNAqCtLY",
"parentPublication": {
"id": "proceedings/miar/2001/1113/0",
"title": "Medical Imaging and Augmented Reality, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icacte/2008/3489/0/3489a576",
"title": "Interactive Mesh Cutting Algorithm Based on Prism for Virtual Craniofacial Osteotomy of Orthognathic Surgery",
"doi": null,
"abstractUrl": "/proceedings-article/icacte/2008/3489a576/12OmNBUS76w",
"parentPublication": {
"id": "proceedings/icacte/2008/3489/0",
"title": "2008 International Conference on Advanced Computer Theory and Engineering (ICACTE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2013/4932/0/4932b084",
"title": "Study on Settlement Deformation Laws of High-Speed Railway Cutting under Excavation Unloading Effect",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2013/4932b084/12OmNBsLPde",
"parentPublication": {
"id": "proceedings/icmtma/2013/4932/0",
"title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itcs/2009/3688/2/3688b242",
"title": "Predicting Soft Tissue Deformation Based on an Improved Biomechanical Model",
"doi": null,
"abstractUrl": "/proceedings-article/itcs/2009/3688b242/12OmNCmGO1k",
"parentPublication": {
"id": "proceedings/itcs/2009/3688/2",
"title": "Information Technology and Computer Science, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/4/252140762",
"title": "An Algorithm for Cutting 3D Surface Meshes",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/252140762/12OmNrHB1ST",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/4",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/haptics/2002/1489/0/14890080",
"title": "On the Display of Haptic Recordings for Cutting Biological Tissues",
"doi": null,
"abstractUrl": "/proceedings-article/haptics/2002/14890080/12OmNwHQB8p",
"parentPublication": {
"id": "proceedings/haptics/2002/1489/0",
"title": "Haptic Interfaces for Virtual Environment and Teleoperator Systems, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031a948",
"title": "Experimental Study of Adiabatic Shear Critical Conditions in Orthogonal Cutting of AISI 1045 Steel",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031a948/12OmNwswg0K",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/miar/2001/1113/0/11130095",
"title": "Deformation and Cutting in Virtual Surgery",
"doi": null,
"abstractUrl": "/proceedings-article/miar/2001/11130095/12OmNxYtu2N",
"parentPublication": {
"id": "proceedings/miar/2001/1113/0",
"title": "Medical Imaging and Augmented Reality, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/1999/0093/0/00930077",
"title": "Representation of Force in Cutting Operation",
"doi": null,
"abstractUrl": "/proceedings-article/vr/1999/00930077/12OmNy3iFmE",
"parentPublication": {
"id": "proceedings/vr/1999/0093/0",
"title": "Proceedings of Virtual Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxETa76",
"title": "Computer Animation",
"acronym": "ca",
"groupId": "1000121",
"volume": "0",
"displayVolume": "0",
"year": "1996",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNviHKlH",
"doi": "10.1109/CA.1996.540498",
"title": "Efficient And Accurate Interference Detection For Polynomial Deformation",
"normalizedTitle": "Efficient And Accurate Interference Detection For Polynomial Deformation",
"abstract": "We present efficient and accurate algorithms for interference detection among objects undergoing polynomial deformation. The scope of our algorithms include physically-based models undergoing dynamic simulation subject to non-penetration constraints, variational models, deformable models used in soft object animation, geometric models including polygonal meshes, parametric surfaces such as Bezier patches and B-splines, and solid models defined by such surfaces. Our algorithms use axis aligned bounding boxes and convex hulls of the objects to identify the object pairs in close vicinity. They use subdivision, convex hull properties and linear programming to perform surface intersection tests and loop intersection tests. Frame-to-frame coherence is utilized to achieve incremental computations. The resulting algorithms have been implemented and work well in practice. In particular we are able to compute all contacts accurately and at interactive speeds for flexible bodies undergoing second-order polynomial deformations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present efficient and accurate algorithms for interference detection among objects undergoing polynomial deformation. The scope of our algorithms include physically-based models undergoing dynamic simulation subject to non-penetration constraints, variational models, deformable models used in soft object animation, geometric models including polygonal meshes, parametric surfaces such as Bezier patches and B-splines, and solid models defined by such surfaces. Our algorithms use axis aligned bounding boxes and convex hulls of the objects to identify the object pairs in close vicinity. They use subdivision, convex hull properties and linear programming to perform surface intersection tests and loop intersection tests. Frame-to-frame coherence is utilized to achieve incremental computations. The resulting algorithms have been implemented and work well in practice. In particular we are able to compute all contacts accurately and at interactive speeds for flexible bodies undergoing second-order polynomial deformations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present efficient and accurate algorithms for interference detection among objects undergoing polynomial deformation. The scope of our algorithms include physically-based models undergoing dynamic simulation subject to non-penetration constraints, variational models, deformable models used in soft object animation, geometric models including polygonal meshes, parametric surfaces such as Bezier patches and B-splines, and solid models defined by such surfaces. Our algorithms use axis aligned bounding boxes and convex hulls of the objects to identify the object pairs in close vicinity. They use subdivision, convex hull properties and linear programming to perform surface intersection tests and loop intersection tests. Frame-to-frame coherence is utilized to achieve incremental computations. The resulting algorithms have been implemented and work well in practice. In particular we are able to compute all contacts accurately and at interactive speeds for flexible bodies undergoing second-order polynomial deformations.",
"fno": "75880155",
"keywords": [
"Computational Geometry Solid Modelling Computer Animation Splines Mathematics Linear Programming Interference Detection Polynomial Deformation Dynamic Simulation Variational Models Deformable Models Soft Object Animation Geometric Models Polygonal Meshes Parametric Surfaces Bezier Patches B Splines Solid Models Axis Aligned Bounding Boxes Convex Hulls Subdivision Linear Programming Surface Intersection Tests Loop Intersection Tests Frame To Frame Coherence Animation"
],
"authors": [
{
"affiliation": "Dept. of Comput. Sci., North Carolina Univ., Chapel Hill, NC, USA",
"fullName": "M. Hughes",
"givenName": "M.",
"surname": "Hughes",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Comput. Sci., North Carolina Univ., Chapel Hill, NC, USA",
"fullName": "C. DiMattia",
"givenName": "C.",
"surname": "DiMattia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Comput. Sci., North Carolina Univ., Chapel Hill, NC, USA",
"fullName": "M.C. Lin",
"givenName": "M.C.",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Comput. Sci., North Carolina Univ., Chapel Hill, NC, USA",
"fullName": "D. Manocha",
"givenName": "D.",
"surname": "Manocha",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ca",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1996-06-01T00:00:00",
"pubType": "proceedings",
"pages": "155",
"year": "1996",
"issn": "1087-4844",
"isbn": "0-8186-7588-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "75880144",
"articleId": "12OmNApu5lx",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "75880167",
"articleId": "12OmNx2zjxf",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyfdOIP",
"title": "Visualisation, International Conference on",
"acronym": "iv-vis",
"groupId": "1001944",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwoPttf",
"doi": "10.1109/VIS.2008.19",
"title": "Talking Head - Visualizations & Level of Detail",
"normalizedTitle": "Talking Head - Visualizations & Level of Detail",
"abstract": "Embodied conversational agents are fast growing area of research interest. These agents allow interacting with computers in a natural way. The usage of agents is closely associated with the problem of facial animation. Realistic real-time facial animation is very computational expensive. This work is dedicated to the problem of deformation visualization of pseudo-muscles and head model mesh during the speech using the extended Waters pseudo-muscle head model for animation. These visualizations help us to find out a new way of dynamic level of detail. By reducing activity of particular groups of muscles we can achieve better animation speeds. Running the experiments based on three scenarios proved that these speed-ups are noticeable.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Embodied conversational agents are fast growing area of research interest. These agents allow interacting with computers in a natural way. The usage of agents is closely associated with the problem of facial animation. Realistic real-time facial animation is very computational expensive. This work is dedicated to the problem of deformation visualization of pseudo-muscles and head model mesh during the speech using the extended Waters pseudo-muscle head model for animation. These visualizations help us to find out a new way of dynamic level of detail. By reducing activity of particular groups of muscles we can achieve better animation speeds. Running the experiments based on three scenarios proved that these speed-ups are noticeable.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Embodied conversational agents are fast growing area of research interest. These agents allow interacting with computers in a natural way. The usage of agents is closely associated with the problem of facial animation. Realistic real-time facial animation is very computational expensive. This work is dedicated to the problem of deformation visualization of pseudo-muscles and head model mesh during the speech using the extended Waters pseudo-muscle head model for animation. These visualizations help us to find out a new way of dynamic level of detail. By reducing activity of particular groups of muscles we can achieve better animation speeds. Running the experiments based on three scenarios proved that these speed-ups are noticeable.",
"fno": "3271a129",
"keywords": [
"ECA",
"Talking Head",
"Facial Animation",
"Level Of Detail",
"Visualization Of Deformation"
],
"authors": [
{
"affiliation": null,
"fullName": "Ladislav Kunc",
"givenName": "Ladislav",
"surname": "Kunc",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Pavel Slavík",
"givenName": "Pavel",
"surname": "Slavík",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "129-134",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3271-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3271a123",
"articleId": "12OmNxZTtHn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3271a135",
"articleId": "12OmNvRU0qD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccsee/2012/4647/3/4647c434",
"title": "A Survey of Computer Facial Animation Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/iccsee/2012/4647c434/12OmNAXxXhU",
"parentPublication": {
"id": "proceedings/iccsee/2012/4647/3",
"title": "Computer Science and Electronics Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smi/2002/1546/0/15460219",
"title": "Statistical Generation of 3D Facial Animable Models",
"doi": null,
"abstractUrl": "/proceedings-article/smi/2002/15460219/12OmNAle6uJ",
"parentPublication": {
"id": "proceedings/smi/2002/1546/0",
"title": "Proceedings SMI. Shape Modeling International 2002",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgi/2004/2171/0/21710284",
"title": "Combination of Facial Movements on a 3D Talking Head",
"doi": null,
"abstractUrl": "/proceedings-article/cgi/2004/21710284/12OmNBOllne",
"parentPublication": {
"id": "proceedings/cgi/2004/2171/0",
"title": "Proceedings. Computer Graphics International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pg/2007/3009/0/30090009",
"title": "Multilinear Motion Synthesis with Level-of-Detail Controls",
"doi": null,
"abstractUrl": "/proceedings-article/pg/2007/30090009/12OmNBTawlq",
"parentPublication": {
"id": "proceedings/pg/2007/3009/0",
"title": "Computer Graphics and Applications, Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2010/4215/0/4215a414",
"title": "On the Development of an Interactive Talking Head System",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2010/4215a414/12OmNBr4eGH",
"parentPublication": {
"id": "proceedings/cw/2010/4215/0",
"title": "2010 International Conference on Cyberworlds",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kse/2009/3846/0/3846a081",
"title": "Fast and Realistic 2D Facial Animation Based on Image Warping",
"doi": null,
"abstractUrl": "/proceedings-article/kse/2009/3846a081/12OmNqGA59e",
"parentPublication": {
"id": "proceedings/kse/2009/3846/0",
"title": "Knowledge and Systems Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/1996/7588/0/75880098",
"title": "Facial Animation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2",
"parentPublication": {
"id": "proceedings/ca/1996/7588/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2010/4166/0/4166a009",
"title": "Expressive MPEG-4 Facial Animation Using Quadratic Deformation Models",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2010/4166a009/12OmNxH9Xgx",
"parentPublication": {
"id": "proceedings/cgiv/2010/4166/0",
"title": "2010 Seventh International Conference on Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/2001/7237/0/00982374",
"title": "A physically-based model with adaptive refinement for facial animation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/2001/00982374/12OmNxRWI7R",
"parentPublication": {
"id": "proceedings/ca/2001/7237/0",
"title": "Proceedings Computer Animation 2001. Fourteenth Conference on Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisis/2008/3109/0/3109a709",
"title": "A Java3D Talking Head for a Chatbot",
"doi": null,
"abstractUrl": "/proceedings-article/cisis/2008/3109a709/12OmNzzP5DI",
"parentPublication": {
"id": "proceedings/cisis/2008/3109/0",
"title": "2008 International Conference on Complex, Intelligent and Software Intensive Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvDI3MN",
"title": "Plant Growth Modeling and Applications, International Symposium on",
"acronym": "pma",
"groupId": "1001757",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxE2mNM",
"doi": "10.1109/PMA.2009.32",
"title": "Efficient Simulating Interactive Deformation of Virtual Plant",
"normalizedTitle": "Efficient Simulating Interactive Deformation of Virtual Plant",
"abstract": "3D plant models would be physically deformable. This paper proposes a simulation framework, which integrated tetrahedral mesh with skin triangular mesh to physically simulate interactive deformation of 3D the plant models. This approach firstly creates a tetrahedral mesh representation around the initial triangular plant model. The tetrahedral mesh is then used for dynamic response calculation of collision or interaction, the original triangular mesh is deformed along with the tetrahedral mesh. We use two phase policies for efficient and accurate collision detection: capsule-based and spatial hashing based detection respectively. Experimental results demonstrate that the proposed approach can handle efficiently collisions and deformations inside the canopy and between plants or organs, with real-time and smooth effects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "3D plant models would be physically deformable. This paper proposes a simulation framework, which integrated tetrahedral mesh with skin triangular mesh to physically simulate interactive deformation of 3D the plant models. This approach firstly creates a tetrahedral mesh representation around the initial triangular plant model. The tetrahedral mesh is then used for dynamic response calculation of collision or interaction, the original triangular mesh is deformed along with the tetrahedral mesh. We use two phase policies for efficient and accurate collision detection: capsule-based and spatial hashing based detection respectively. Experimental results demonstrate that the proposed approach can handle efficiently collisions and deformations inside the canopy and between plants or organs, with real-time and smooth effects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "3D plant models would be physically deformable. This paper proposes a simulation framework, which integrated tetrahedral mesh with skin triangular mesh to physically simulate interactive deformation of 3D the plant models. This approach firstly creates a tetrahedral mesh representation around the initial triangular plant model. The tetrahedral mesh is then used for dynamic response calculation of collision or interaction, the original triangular mesh is deformed along with the tetrahedral mesh. We use two phase policies for efficient and accurate collision detection: capsule-based and spatial hashing based detection respectively. Experimental results demonstrate that the proposed approach can handle efficiently collisions and deformations inside the canopy and between plants or organs, with real-time and smooth effects.",
"fno": "3988a395",
"keywords": [
"Physically Based Simulation",
"Deformation",
"Real Time Simulation",
"Virtual Plant"
],
"authors": [
{
"affiliation": null,
"fullName": "Shenglian Lu",
"givenName": "Shenglian",
"surname": "Lu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chunjiang Zhao",
"givenName": "Chunjiang",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xinyu Guo",
"givenName": "Xinyu",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chengfeng Li",
"givenName": "Chengfeng",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Weiliang Wen",
"givenName": "Weiliang",
"surname": "Wen",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "395-398",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3988-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3988a391",
"articleId": "12OmNyxXlnO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3988a401",
"articleId": "12OmNB1wkJt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ca/2000/0683/0/06830002",
"title": "Integrated System for Skin Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/2000/06830002/12OmNAtaRXK",
"parentPublication": {
"id": "proceedings/ca/2000/0683/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2010/4217/0/4217a236",
"title": "A Hybrid Deformation Model for Virtual Cutting",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2010/4217a236/12OmNBdru9U",
"parentPublication": {
"id": "proceedings/ism/2010/4217/0",
"title": "2010 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgi/2004/2171/0/21710026",
"title": "Physically-Based Simulation of Objects Represented by Surface Meshes",
"doi": null,
"abstractUrl": "/proceedings-article/cgi/2004/21710026/12OmNCzb9z0",
"parentPublication": {
"id": "proceedings/cgi/2004/2171/0",
"title": "Proceedings. Computer Graphics International",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2006/0224/0/02240027",
"title": "Interactive Simulation of Fibrin Fibers in Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2006/02240027/12OmNrJAebm",
"parentPublication": {
"id": "proceedings/vr/2006/0224/0",
"title": "IEEE Virtual Reality Conference (VR 2006)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031c625",
"title": "A Remote Training System of Hydropower Plant Based on Interactive Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c625/12OmNvSbBHf",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isise/2008/3494/2/3494b216",
"title": "A Flower Growth Simulation based on Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/isise/2008/3494b216/12OmNvTTceb",
"parentPublication": {
"id": "proceedings/isise/2008/3494/2",
"title": "2008 International Symposium on Information Science and Engineering (ISISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aici/2010/4225/3/4225c432",
"title": "Study on Modeling Virtual Plant Development Process Based on Growth Model",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2010/4225c432/12OmNx7G67V",
"parentPublication": {
"id": "proceedings/aici/2010/4225/3",
"title": "Artificial Intelligence and Computational Intelligence, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2011/4484/0/4484a160",
"title": "A Visualization System for Tomato Plant Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2011/4484a160/12OmNyxFKcU",
"parentPublication": {
"id": "proceedings/cgiv/2011/4484/0",
"title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aici/2009/3816/2/3816b003",
"title": "Research on Visualization of Virtual Plant Based on Information Fusion",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2009/3816b003/12OmNzTH0X3",
"parentPublication": {
"id": "proceedings/aici/2009/3816/2",
"title": "2009 International Conference on Artificial Intelligence and Computational Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2008/3304/4/3304d644",
"title": "Interactive Plant Modeling Based on Fractal",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2008/3304d644/12OmNzTYBQp",
"parentPublication": {
"id": "proceedings/icnc/2008/3304/4",
"title": "2008 Fourth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx8wTfz",
"title": "2011 International Conference on Virtual Reality and Visualization",
"acronym": "icvrv",
"groupId": "1800579",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxbW4Tv",
"doi": "10.1109/ICVRV.2011.13",
"title": "Deformation-Aided Virtual Assembly System for Mechanical Structure",
"normalizedTitle": "Deformation-Aided Virtual Assembly System for Mechanical Structure",
"abstract": "Generally, mechanical parts in Virtual Assembly systems are donated by rigid bodies. In this paper, we introduce a deformation technique called Lattice Shape Matching algorithm to animate deformable objects in virtual environment. Plenty of experiments have indicated the deformation algorithm can perform well on real-time operation, simulation authenticity and interactive stability. By changing the lattice width value we can animate many objects with different stiffness. With the deformation algorithm, the Virtual Assembly system can be used to the assembly/disassembly of aircraft/vehicle engine, bicycle repair and many other mechanical structure applications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Generally, mechanical parts in Virtual Assembly systems are donated by rigid bodies. In this paper, we introduce a deformation technique called Lattice Shape Matching algorithm to animate deformable objects in virtual environment. Plenty of experiments have indicated the deformation algorithm can perform well on real-time operation, simulation authenticity and interactive stability. By changing the lattice width value we can animate many objects with different stiffness. With the deformation algorithm, the Virtual Assembly system can be used to the assembly/disassembly of aircraft/vehicle engine, bicycle repair and many other mechanical structure applications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Generally, mechanical parts in Virtual Assembly systems are donated by rigid bodies. In this paper, we introduce a deformation technique called Lattice Shape Matching algorithm to animate deformable objects in virtual environment. Plenty of experiments have indicated the deformation algorithm can perform well on real-time operation, simulation authenticity and interactive stability. By changing the lattice width value we can animate many objects with different stiffness. With the deformation algorithm, the Virtual Assembly system can be used to the assembly/disassembly of aircraft/vehicle engine, bicycle repair and many other mechanical structure applications.",
"fno": "4602a063",
"keywords": [
"Virtual Assembly",
"Deformation",
"Lattice",
"Shape Matching",
"Animation"
],
"authors": [
{
"affiliation": null,
"fullName": "Tian Zhou",
"givenName": "Tian",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yue Qi",
"givenName": "Yue",
"surname": "Qi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icvrv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-11-01T00:00:00",
"pubType": "proceedings",
"pages": "63-69",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4602-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4602a057",
"articleId": "12OmNxcMSnp",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4602a070",
"articleId": "12OmNBA9oAc",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvmp/2009/3893/0/3893a061",
"title": "Skeleton Driven Laplacian Volumetric Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/cvmp/2009/3893a061/12OmNAle6xC",
"parentPublication": {
"id": "proceedings/cvmp/2009/3893/0",
"title": "2009 Conference for Visual Media Production",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ca/2000/0683/0/06830002",
"title": "Integrated System for Skin Deformation",
"doi": null,
"abstractUrl": "/proceedings-article/ca/2000/06830002/12OmNAtaRXK",
"parentPublication": {
"id": "proceedings/ca/2000/0683/0",
"title": "Computer Animation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isuvr/2010/4124/0/4124a024",
"title": "Deformation and Simulation of 3D Contents for the Digilog Book",
"doi": null,
"abstractUrl": "/proceedings-article/isuvr/2010/4124a024/12OmNBBhN7i",
"parentPublication": {
"id": "proceedings/isuvr/2010/4124/0",
"title": "International Symposium on Ubiquitous Virtual Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cadgraphics/2011/4497/0/4497a306",
"title": "Lattice-Based Skinning and Deformation for Real-Time Skeleton-Driven Animation",
"doi": null,
"abstractUrl": "/proceedings-article/cadgraphics/2011/4497a306/12OmNBEGYGs",
"parentPublication": {
"id": "proceedings/cadgraphics/2011/4497/0",
"title": "Computer-Aided Design and Computer Graphics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2010/4217/0/4217a236",
"title": "A Hybrid Deformation Model for Virtual Cutting",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2010/4217a236/12OmNBdru9U",
"parentPublication": {
"id": "proceedings/ism/2010/4217/0",
"title": "2010 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icvgip/2008/3476/0/3476a055",
"title": "Multi-scale Method for Adaptive Mesh Editing Based on Rigidity Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/icvgip/2008/3476a055/12OmNwx3Qao",
"parentPublication": {
"id": "proceedings/icvgip/2008/3476/0",
"title": "Computer Vision, Graphics & Image Processing, Indian Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cso/2010/4030/2/4030b447",
"title": "2D Cartoon Character Deformation by Sketch Skeleton",
"doi": null,
"abstractUrl": "/proceedings-article/cso/2010/4030b447/12OmNxWLTkO",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cira/1997/8138/0/81380362",
"title": "Measurement of Parts Deformation and Misalignment by Using a Visual Sensing System",
"doi": null,
"abstractUrl": "/proceedings-article/cira/1997/81380362/12OmNxwENnM",
"parentPublication": {
"id": "proceedings/cira/1997/8138/0",
"title": "Computational Intelligence in Robotics and Automation, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/04/ttg2011040515",
"title": "Real-Time Resolution of Self-Intersection in Dynamic Cylindrical Free-Form Deformation",
"doi": null,
"abstractUrl": "/journal/tg/2011/04/ttg2011040515/13rRUIJuxps",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciddt/2020/0367/0/036700a567",
"title": "A Study of Differences of Resource Deformation Tools and Modules in Animate throughout the Motion Graphics Creation",
"doi": null,
"abstractUrl": "/proceedings-article/iciddt/2020/036700a567/1wutLUhleWk",
"parentPublication": {
"id": "proceedings/iciddt/2020/0367/0",
"title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1yNiQykK7hS",
"title": "2021 IEEE Workshop on Visualization for Social Good (VIS4Good)",
"acronym": "vis4good",
"groupId": "1844125",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1yNiRDWGgcE",
"doi": "10.1109/VIS4Good54225.2021.00005",
"title": "VIS4Good 2021 [Workshop Description and Committees]",
"normalizedTitle": "VIS4Good 2021 [Workshop Description and Committees]",
"abstract": "We are proud to announce the first Workshop on Visualization for Social Good to be held as part of IEEE VIS 2021. The goal of this workshop is to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Visualization, like all fields connected with how we collect, interpret, and communicate data, has an immense potential impact on society, for good or for ill. It is up to us to make sure our work affects positive change in the world. The Visualization for Social Good Workshop (Vis4Good) aims to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Through a blend of paper sessions, invited presentations, and break-out groups, we hope that the inaugural Vis4Good 2021 Workshop encourages attendees to harness visualization research to tackle critical challenges in responsible AI, clean energy, human health and well-being, and other domain areas with critical societal impact.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We are proud to announce the first Workshop on Visualization for Social Good to be held as part of IEEE VIS 2021. The goal of this workshop is to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Visualization, like all fields connected with how we collect, interpret, and communicate data, has an immense potential impact on society, for good or for ill. It is up to us to make sure our work affects positive change in the world. The Visualization for Social Good Workshop (Vis4Good) aims to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Through a blend of paper sessions, invited presentations, and break-out groups, we hope that the inaugural Vis4Good 2021 Workshop encourages attendees to harness visualization research to tackle critical challenges in responsible AI, clean energy, human health and well-being, and other domain areas with critical societal impact.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We are proud to announce the first Workshop on Visualization for Social Good to be held as part of IEEE VIS 2021. The goal of this workshop is to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Visualization, like all fields connected with how we collect, interpret, and communicate data, has an immense potential impact on society, for good or for ill. It is up to us to make sure our work affects positive change in the world. The Visualization for Social Good Workshop (Vis4Good) aims to provide a central venue within the IEEE VIS community for surfacing work that critiques, defines, or explores the impact of data visualization on society. Through a blend of paper sessions, invited presentations, and break-out groups, we hope that the inaugural Vis4Good 2021 Workshop encourages attendees to harness visualization research to tackle critical challenges in responsible AI, clean energy, human health and well-being, and other domain areas with critical societal impact.",
"fno": "136600z006",
"keywords": [],
"authors": [],
"idPrefix": "vis4good",
"isOpenAccess": true,
"showRecommendedArticles": false,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "6-6",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1366-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "136600z005",
"articleId": "1yNiRhRWuZy",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "136600a001",
"articleId": "1yNiR2p5vBC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1zmvjlvd5Ek",
"title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)",
"acronym": "bibe",
"groupId": "1000075",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1zmvltGBJ72",
"doi": "10.1109/BIBE52308.2021.9635338",
"title": "Preface",
"normalizedTitle": "Preface",
"abstract": "On behalf of the Organizing Committee, it is our great pleasure to invite you to the 21st International Conference on BioInformatics and BioEngineering (IEEE BIBE 2021) which will take place in Kragujevac, Serbia, on October 25th-27th, 2021.",
"abstracts": [
{
"abstractType": "Regular",
"content": "On behalf of the Organizing Committee, it is our great pleasure to invite you to the 21st International Conference on BioInformatics and BioEngineering (IEEE BIBE 2021) which will take place in Kragujevac, Serbia, on October 25th-27th, 2021.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "On behalf of the Organizing Committee, it is our great pleasure to invite you to the 21st International Conference on BioInformatics and BioEngineering (IEEE BIBE 2021) which will take place in Kragujevac, Serbia, on October 25th-27th, 2021.",
"fno": "09635338",
"keywords": [],
"authors": [],
"idPrefix": "bibe",
"isOpenAccess": true,
"showRecommendedArticles": true,
"showBuyMe": false,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "i-ii",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4261-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09635260",
"articleId": "1zmvtpYJfAk",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09635353",
"articleId": "1zmvwAB4pH2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csf/2012/4718/0/4718z008",
"title": "Preface - CSF 2012",
"doi": null,
"abstractUrl": "/proceedings-article/csf/2012/4718z008/12OmNvm6VFu",
"parentPublication": {
"id": "proceedings/csf/2012/4718/0",
"title": "2012 IEEE 25th Computer Security Foundations Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdew/2011/9195/0/05767664",
"title": "Preface",
"doi": null,
"abstractUrl": "/proceedings-article/icdew/2011/05767664/12OmNyYDDCM",
"parentPublication": {
"id": "proceedings/icdew/2011/9195/0",
"title": "2011 IEEE 27th International Conference on Data Engineering Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpads/2021/0878/0/087800z022",
"title": "Message from the Technical Program Chairs ICPADS 2021",
"doi": null,
"abstractUrl": "/proceedings-article/icpads/2021/087800z022/1D4LEfQxCDu",
"parentPublication": {
"id": "proceedings/icpads/2021/0878/0",
"title": "2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/pc/2022/02/09817040",
"title": "The 25th Edition of the International Symposium on Wearable Computers",
"doi": null,
"abstractUrl": "/magazine/pc/2022/02/09817040/1EMV0yMOrwA",
"parentPublication": {
"id": "mags/pc",
"title": "IEEE Pervasive Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/05/09052630",
"title": "Preface",
"doi": null,
"abstractUrl": "/journal/tg/2020/05/09052630/1iFLLHpsBfW",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acctcs/2021/1538/0/153800z013",
"title": "Preface",
"doi": null,
"abstractUrl": "/proceedings-article/acctcs/2021/153800z013/1t90h1kips4",
"parentPublication": {
"id": "proceedings/acctcs/2021/1538/0",
"title": "2021 Asia-Pacific Conference on Communications Technology and Computer Science (ACCTCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/rew/2021/1898/0/189800a336",
"title": "Requirements for Online User Feedback Management in RE Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/rew/2021/189800a336/1y2JM5hYvyU",
"parentPublication": {
"id": "proceedings/rew/2021/1898/0",
"title": "2021 IEEE 29th International Requirements Engineering Conference Workshops (REW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ds-rt/2021/3326/0/09576151",
"title": "A message from chairs",
"doi": null,
"abstractUrl": "/proceedings-article/ds-rt/2021/09576151/1y63Gvc3ZKw",
"parentPublication": {
"id": "proceedings/ds-rt/2021/3326/0",
"title": "2021 IEEE/ACM 25th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isctis/2021/1441/0/144100z016",
"title": "Preface",
"doi": null,
"abstractUrl": "/proceedings-article/isctis/2021/144100z016/1yEZzVCPRKw",
"parentPublication": {
"id": "proceedings/isctis/2021/1441/0",
"title": "2021 International Symposium on Computer Technology and Information Science (ISCTIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnisc/2021/0232/0/023200z024",
"title": "Preface",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2021/023200z024/1yLPjDO6fyU",
"parentPublication": {
"id": "proceedings/icnisc/2021/0232/0",
"title": "2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxG1yTy",
"title": "2008 IEEE International Performance Computing and Communications Conference (IPCCC)",
"acronym": "ipccc",
"groupId": "1000548",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAHmOt8",
"doi": "10.1109/PCCC.2008.4745108",
"title": "Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets",
"normalizedTitle": "Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets",
"abstract": "While network worms carry various payloads and may utilize any available exploits, they all have one common component - the propagation engine. Moreover, it is important to note that the number of conceptually distinct propagation engines employed by existing network worms is quite limited. This paper presents a novel signature-based approach for detecting attacks perpetrated by network worms as a manifestation of a semantic functionality performed by one of the few known propagation engines. We propose a novel methodology to recognize any semantic functionality in the system call domain through utilizing colored Petri Nets. In this application, Petri Nets embody behavior-based signatures of the propagation engine functionalities. These signatures are indicative of the shell code activity in the first stage of the worm proliferation. We developed, tested and evaluated a propagation engine detector (PED) system that detects activity of the worm shell code executed by a process during an attack. Moreover, PED is able to recognize the type of propagation engine employed by the attacking worm.",
"abstracts": [
{
"abstractType": "Regular",
"content": "While network worms carry various payloads and may utilize any available exploits, they all have one common component - the propagation engine. Moreover, it is important to note that the number of conceptually distinct propagation engines employed by existing network worms is quite limited. This paper presents a novel signature-based approach for detecting attacks perpetrated by network worms as a manifestation of a semantic functionality performed by one of the few known propagation engines. We propose a novel methodology to recognize any semantic functionality in the system call domain through utilizing colored Petri Nets. In this application, Petri Nets embody behavior-based signatures of the propagation engine functionalities. These signatures are indicative of the shell code activity in the first stage of the worm proliferation. We developed, tested and evaluated a propagation engine detector (PED) system that detects activity of the worm shell code executed by a process during an attack. Moreover, PED is able to recognize the type of propagation engine employed by the attacking worm.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "While network worms carry various payloads and may utilize any available exploits, they all have one common component - the propagation engine. Moreover, it is important to note that the number of conceptually distinct propagation engines employed by existing network worms is quite limited. This paper presents a novel signature-based approach for detecting attacks perpetrated by network worms as a manifestation of a semantic functionality performed by one of the few known propagation engines. We propose a novel methodology to recognize any semantic functionality in the system call domain through utilizing colored Petri Nets. In this application, Petri Nets embody behavior-based signatures of the propagation engine functionalities. These signatures are indicative of the shell code activity in the first stage of the worm proliferation. We developed, tested and evaluated a propagation engine detector (PED) system that detects activity of the worm shell code executed by a process during an attack. Moreover, PED is able to recognize the type of propagation engine employed by the attacking worm.",
"fno": "04745108",
"keywords": [
"Digital Signatures",
"Graph Colouring",
"Invasive Software",
"Petri Nets",
"Worm Propagation Engines",
"System Call Domain",
"Colored Petri Nets",
"Network Worms",
"Signature Based Approach",
"Behavior Based Signatures",
"Worm Proliferation",
"Propagation Engine Detector System",
"Worm Shell Code",
"Engines",
"Petri Nets",
"Capacitive Sensors",
"Detectors",
"Payloads",
"Information Technology",
"System Testing",
"Code Standards",
"Image Databases",
"Functional Programming",
"IDS",
"Colored Petri Nets",
"Propagation Engine",
"System Calls"
],
"authors": [
{
"affiliation": "Center for Advanced Information Technologies, Binghamton University, atokhta1@binghmaton.edu",
"fullName": "Arnur G. Tokhtabayev",
"givenName": "Arnur G.",
"surname": "Tokhtabayev",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Advanced Information Technologies, Binghamton University, vskormin@binghmaton.edu",
"fullName": "Victor A. Skormin",
"givenName": "Victor A.",
"surname": "Skormin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Advanced Information Technologies, Binghamton University, adolgik1@binghmaton.edu",
"fullName": "Andrey M. Dolgikh",
"givenName": "Andrey M.",
"surname": "Dolgikh",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipccc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-12-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": "1097-2641",
"isbn": "978-1-4244-3368-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04745107",
"articleId": "12OmNvmG80c",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04745109",
"articleId": "12OmNvmG7ZS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmtma/2009/3583/1/3583a779",
"title": "Bifurcation Dynamics of a Worm Model with Impulsive Control",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583a779/12OmNARiM3q",
"parentPublication": {
"id": "proceedings/icmtma/2009/3583/3",
"title": "2009 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/3/3336e863",
"title": "Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336e863/12OmNBSjITk",
"parentPublication": {
"id": "proceedings/csse/2008/3336/3",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acsac/2006/2716/0/27160235",
"title": "On Detecting Camouflaging Worm",
"doi": null,
"abstractUrl": "/proceedings-article/acsac/2006/27160235/12OmNC8dgft",
"parentPublication": {
"id": "proceedings/acsac/2006/2716/0",
"title": "2006 22nd Computer Security Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/1/3843a388",
"title": "Modeling Email Worm Propagation Using Game Theory",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843a388/12OmNwHhoR8",
"parentPublication": {
"id": "proceedings/mines/2009/3843/1",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccgi/2007/2798/0/27980032",
"title": "Passive Worm Propagation Modeling and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iccgi/2007/27980032/12OmNwI8c94",
"parentPublication": {
"id": "proceedings/iccgi/2007/2798/0",
"title": "Computing in the Global Information Technology, International Multi-Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2011/4559/0/4559a457",
"title": "Analysis of the Impact of Heterogeneous Network Environment on Worm Propagation",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2011/4559a457/12OmNyr8YeT",
"parentPublication": {
"id": "proceedings/mines/2011/4559/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ias/2009/3744/2/3744b158",
"title": "W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks",
"doi": null,
"abstractUrl": "/proceedings-article/ias/2009/3744b158/12OmNz61cWf",
"parentPublication": {
"id": "proceedings/ias/2009/3744/2",
"title": "Information Assurance and Security, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdcat/2011/4564/0/4564a381",
"title": "Modeling and Analysis of Email Worm Propagation Based on Stochastic Game Nets",
"doi": null,
"abstractUrl": "/proceedings-article/pdcat/2011/4564a381/12OmNzWx057",
"parentPublication": {
"id": "proceedings/pdcat/2011/4564/0",
"title": "Parallel and Distributed Computing Applications and Technologies, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2009/3843/2/3843b378",
"title": "Propagation Model of Non-scanning Active Worm in Unstructured P2P Network",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2009/3843b378/12OmNzaQoHJ",
"parentPublication": {
"id": "proceedings/mines/2009/3843/2",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2011/03/ttq2011030377",
"title": "Modeling and Detection of Camouflaging Worm",
"doi": null,
"abstractUrl": "/journal/tq/2011/03/ttq2011030377/13rRUzp02px",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNx0A7Jg",
"title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation",
"acronym": "icmtma",
"groupId": "1002837",
"volume": "3",
"displayVolume": "3",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCfjeuL",
"doi": "10.1109/ICMTMA.2011.742",
"title": "The Application of Correlation Dimensions of Vibration Signals in Analysis of the Technological State of Diesel Engines",
"normalizedTitle": "The Application of Correlation Dimensions of Vibration Signals in Analysis of the Technological State of Diesel Engines",
"abstract": "The fault-free operation of diesel engine in a normal state is a kind of self-excited vibration, but with the change of its technological states in the operation, the vibration will become much more like a random vibration. All the variable information of these technological states is included in the vibration signals of diesel engines, which can be used to judge the different technological states. However, the existence of a lot of noise signals at the same time may affect the accuracy of the judgment. Aiming at this problem, this article puts forward that an ameliorated wavelet packet algorithm can be used to decompose and reconstruct the measured signals before using the fractal theory to make analysis and judgment on them. The experiment shows that, such a method can effectively improve the signal-to-noise ratio, and as a result, can accurately judge the technological states and fault signatures of diesel operation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The fault-free operation of diesel engine in a normal state is a kind of self-excited vibration, but with the change of its technological states in the operation, the vibration will become much more like a random vibration. All the variable information of these technological states is included in the vibration signals of diesel engines, which can be used to judge the different technological states. However, the existence of a lot of noise signals at the same time may affect the accuracy of the judgment. Aiming at this problem, this article puts forward that an ameliorated wavelet packet algorithm can be used to decompose and reconstruct the measured signals before using the fractal theory to make analysis and judgment on them. The experiment shows that, such a method can effectively improve the signal-to-noise ratio, and as a result, can accurately judge the technological states and fault signatures of diesel operation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The fault-free operation of diesel engine in a normal state is a kind of self-excited vibration, but with the change of its technological states in the operation, the vibration will become much more like a random vibration. All the variable information of these technological states is included in the vibration signals of diesel engines, which can be used to judge the different technological states. However, the existence of a lot of noise signals at the same time may affect the accuracy of the judgment. Aiming at this problem, this article puts forward that an ameliorated wavelet packet algorithm can be used to decompose and reconstruct the measured signals before using the fractal theory to make analysis and judgment on them. The experiment shows that, such a method can effectively improve the signal-to-noise ratio, and as a result, can accurately judge the technological states and fault signatures of diesel operation.",
"fno": "4296e683",
"keywords": [
"Vibration Signal",
"Characteristic Parameter",
"Wavelet Packet Transformation",
"Correlation Dimension"
],
"authors": [
{
"affiliation": null,
"fullName": "Wang Jing",
"givenName": "Wang",
"surname": "Jing",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Deng Jun",
"givenName": "Deng",
"surname": "Jun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wang Bin",
"givenName": "Wang",
"surname": "Bin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmtma",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-01-01T00:00:00",
"pubType": "proceedings",
"pages": "683-685",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4296-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4296e680",
"articleId": "12OmNzlUKL0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4296e686",
"articleId": "12OmNzcPAcC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icia/2006/0528/0/04097891",
"title": "Analysis of Noise Characteristics for Diesel Engine",
"doi": null,
"abstractUrl": "/proceedings-article/icia/2006/04097891/12OmNAlNiyc",
"parentPublication": {
"id": "proceedings/icia/2006/0528/0",
"title": "2006 International Conference on Information Acquisition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icoip/2010/4252/1/4252a075",
"title": "A New Vector Method to Diagnose Individual Misfiring Cylinder Based on Crankshaft Angular Vibration",
"doi": null,
"abstractUrl": "/proceedings-article/icoip/2010/4252a075/12OmNBKW9Ap",
"parentPublication": {
"id": "proceedings/icoip/2010/4252/2",
"title": "Optoelectronics and Image Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/3/4077e285",
"title": "Shock Response Spectrum of a Diesel Engine",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077e285/12OmNBQTJgg",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcse/2009/3570/3/3570c043",
"title": "Experimental Study of Engine Mount System's Vibration Characteristics",
"doi": null,
"abstractUrl": "/proceedings-article/wcse/2009/3570c043/12OmNvRU0kd",
"parentPublication": {
"id": "proceedings/wcse/2009/3570/2",
"title": "2009 WRI World Congress on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icycs/2008/3398/0/3398c948",
"title": "Application of Image Recognition Technology based on Fractal Dimension for Diesel Engine Fault Diagnosis",
"doi": null,
"abstractUrl": "/proceedings-article/icycs/2008/3398c948/12OmNwNeYxY",
"parentPublication": {
"id": "proceedings/icycs/2008/3398/0",
"title": "2008 9th International Conference for Young Computer Scientists",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2010/3962/3/3962f011",
"title": "The Torsional Vibration Test and Analysis of the New Diesel Engine in the Idle Condition",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2010/3962f011/12OmNwtEEBD",
"parentPublication": {
"id": "proceedings/icmtma/2010/3962/3",
"title": "2010 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2009/3583/1/3583a626",
"title": "Efficient Scheme for Scaleless Band Identification of Vibration Signal",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2009/3583a626/12OmNwwuDT9",
"parentPublication": {
"id": "proceedings/icmtma/2009/3583/3",
"title": "2009 International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/1/4077a408",
"title": "Acoustic-Vibratory Characteristics of SF480 Diesel Engine Block",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077a408/12OmNy2rS5U",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/1",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icie/2010/4080/4/05572697",
"title": "Torsional Vibration Analysis of 16V240ZJ Diesel Engine Based on Virtual Prototype Technology",
"doi": null,
"abstractUrl": "/proceedings-article/icie/2010/05572697/12OmNyjLoQ1",
"parentPublication": {
"id": "proceedings/icie/2010/4080/3",
"title": "Information Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2009/3804/2/3804b513",
"title": "Fault Diagnosis for Diesel Engines Based on Discrete Hidden Markov Model",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2009/3804b513/12OmNym2bV0",
"parentPublication": {
"id": "proceedings/icicta/2009/3804/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvA1hvq",
"title": "Internet Monitoring and Protection, International Conference on",
"acronym": "icimp",
"groupId": "1001797",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNs59K35",
"doi": "10.1109/ICIMP.2008.9",
"title": "An Evaluation of Major Image Search Engines on Various Query Topics",
"normalizedTitle": "An Evaluation of Major Image Search Engines on Various Query Topics",
"abstract": "This paper investigates the information retrieval effectiveness of major image search engines based on various query topics. Initially, major image search engines, namely, Google, Yahoo, Ask and MSN are selected. Then, seven appropriate topics are determined from the categories of the top search terms used on the web and five queries per topic are chosen. Each query is run on the selected image search engines separately and first forty images retrieved in each retrieval output are classified as being \"relevant\" or \"non-relevant\" to calculate precision ratios at various cut-off points for each pair of query and search engine. The results indicated that Google has the best overall retrieval effectiveness in topics \"Automotive Manufacturers\", \"Broadcast Media\", \"Pharmaceutical and Medical Product\" and \"Movies\" and was followed by MSN in topics \"Food and Beverage Brands\", \"IT and Internet\" and Ask in topic \"Travel Destinations and Accommodations\". All image search engines seem to have the lowest effectiveness for the topic \"Food and Beverage Brands\". The precision ratio of any one of the image search engines was not the same and changed for every topic.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper investigates the information retrieval effectiveness of major image search engines based on various query topics. Initially, major image search engines, namely, Google, Yahoo, Ask and MSN are selected. Then, seven appropriate topics are determined from the categories of the top search terms used on the web and five queries per topic are chosen. Each query is run on the selected image search engines separately and first forty images retrieved in each retrieval output are classified as being \"relevant\" or \"non-relevant\" to calculate precision ratios at various cut-off points for each pair of query and search engine. The results indicated that Google has the best overall retrieval effectiveness in topics \"Automotive Manufacturers\", \"Broadcast Media\", \"Pharmaceutical and Medical Product\" and \"Movies\" and was followed by MSN in topics \"Food and Beverage Brands\", \"IT and Internet\" and Ask in topic \"Travel Destinations and Accommodations\". All image search engines seem to have the lowest effectiveness for the topic \"Food and Beverage Brands\". The precision ratio of any one of the image search engines was not the same and changed for every topic.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper investigates the information retrieval effectiveness of major image search engines based on various query topics. Initially, major image search engines, namely, Google, Yahoo, Ask and MSN are selected. Then, seven appropriate topics are determined from the categories of the top search terms used on the web and five queries per topic are chosen. Each query is run on the selected image search engines separately and first forty images retrieved in each retrieval output are classified as being \"relevant\" or \"non-relevant\" to calculate precision ratios at various cut-off points for each pair of query and search engine. The results indicated that Google has the best overall retrieval effectiveness in topics \"Automotive Manufacturers\", \"Broadcast Media\", \"Pharmaceutical and Medical Product\" and \"Movies\" and was followed by MSN in topics \"Food and Beverage Brands\", \"IT and Internet\" and Ask in topic \"Travel Destinations and Accommodations\". All image search engines seem to have the lowest effectiveness for the topic \"Food and Beverage Brands\". The precision ratio of any one of the image search engines was not the same and changed for every topic.",
"fno": "3189a161",
"keywords": [
"Image Retrieval",
"Query Processing",
"Search Engines",
"Image Search Engines",
"Query Topics",
"Google",
"Yahoo",
"Ask",
"MSN",
"Image Retrieval",
"Image Classification",
"Automotive Manufacturers",
"Broadcast Media",
"Movies",
"IT",
"Internet",
"Search Engines",
"Image Retrieval",
"Information Retrieval",
"Automotive Engineering",
"Food Manufacturing",
"Broadcasting",
"Pharmaceuticals",
"Biomedical Imaging",
"Motion Pictures",
"Internet",
"Information Retrieval",
"Image Search Engine",
"Query Topic",
"Precision",
"Cut Off"
],
"authors": [
{
"affiliation": "Dept. of Comput. Eng., Eastern Mediterranean Univ., Ankara",
"fullName": "Ece Çakir",
"givenName": "Ece",
"surname": "Çakir",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Engineering Department, Eastern Mediterranean UniversityFamagusta / T.R.N.C.",
"fullName": "Huseyin Bahceci",
"givenName": "Huseyin",
"surname": "Bahceci",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Engineering Department, Eastern Mediterranean UniversityFamagusta / T.R.N.C.",
"fullName": "Yiltan Bitirim",
"givenName": "Yiltan",
"surname": "Bitirim",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icimp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-06-01T00:00:00",
"pubType": "proceedings",
"pages": "161-165",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3189-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3189a047",
"articleId": "12OmNro0I4z",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3189a059",
"articleId": "12OmNzayNl2",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icnisc/2015/1843/0/1843a426",
"title": "A User Model Based Ranking Method of Query Results of Meta-Search Engines",
"doi": null,
"abstractUrl": "/proceedings-article/icnisc/2015/1843a426/12OmNAPjA6y",
"parentPublication": {
"id": "proceedings/icnisc/2015/1843/0",
"title": "2015 International Conference on Network and Information Systems for Computers (ICNISC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciw/2007/2844/0/04222963",
"title": "An Evaluation of Popular Search Engines on Finding Turkish Documents",
"doi": null,
"abstractUrl": "/proceedings-article/iciw/2007/04222963/12OmNrIJqzr",
"parentPublication": {
"id": "proceedings/iciw/2007/2844/0",
"title": "Internet and Web Applications and Services, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itng/2006/2497/0/24970370",
"title": "Overlap Among Major Web Search Engines",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2006/24970370/12OmNwDACng",
"parentPublication": {
"id": "proceedings/itng/2006/2497/0",
"title": "Proceedings. Third International Conference on Information Technology: New Generation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciw/2007/2844/0/28440050",
"title": "The Impact of Number of Query Words on Image Search Engines",
"doi": null,
"abstractUrl": "/proceedings-article/iciw/2007/28440050/12OmNwwd2Jz",
"parentPublication": {
"id": "proceedings/iciw/2007/2844/0",
"title": "Internet and Web Applications and Services, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2004/832/0/01336140",
"title": "Finding authoritative people from the Web",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2004/01336140/12OmNyRxFih",
"parentPublication": {
"id": "proceedings/jcdl/2004/832/0",
"title": "Proceedings of the Fourth ACM/IEEE Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2003/2020/0/20200584",
"title": "Intelligent Web Topics Search Using Early Detection and Data Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2003/20200584/12OmNyVerZa",
"parentPublication": {
"id": "proceedings/compsac/2003/2020/0",
"title": "Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icimp/2009/3612/0/3612a051",
"title": "An Empirical Evaluation on Semantic Search Performance of Keyword-Based and Semantic Search Engines: Google, Yahoo, Msn and Hakia",
"doi": null,
"abstractUrl": "/proceedings-article/icimp/2009/3612a051/12OmNzmLxAz",
"parentPublication": {
"id": "proceedings/icimp/2009/3612/0",
"title": "Internet Monitoring and Protection, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/msr/2009/3493/0/05069489",
"title": "Mining search topics from a code search engine usage log",
"doi": null,
"abstractUrl": "/proceedings-article/msr/2009/05069489/12OmNznkJZr",
"parentPublication": {
"id": "proceedings/msr/2009/3493/0",
"title": "2009 6th IEEE International Working Conference on Mining Software Repositories",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2007/04/c4007",
"title": "Building Better Search Engines",
"doi": null,
"abstractUrl": "/magazine/cs/2007/04/c4007/13rRUwbs24l",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyKJiaq",
"title": "Autonomic Computing, International Conference on",
"acronym": "icac",
"groupId": "1001178",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy4IF7v",
"doi": "10.1109/ICAC.2004.1301388",
"title": "Ontology-based correlation engines",
"normalizedTitle": "Ontology-based correlation engines",
"abstract": "Correlation engines are autonomic computing systems that perform the automated, continuous analysis of enterprise-wide event data based on user-defined, configurable rules in order to detect threats and protect a system from them. In this paper, we discuss the run-time advantages of using ontologies as a conceptual backbone for describing knowledge processed by correlation engines.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Correlation engines are autonomic computing systems that perform the automated, continuous analysis of enterprise-wide event data based on user-defined, configurable rules in order to detect threats and protect a system from them. In this paper, we discuss the run-time advantages of using ontologies as a conceptual backbone for describing knowledge processed by correlation engines.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Correlation engines are autonomic computing systems that perform the automated, continuous analysis of enterprise-wide event data based on user-defined, configurable rules in order to detect threats and protect a system from them. In this paper, we discuss the run-time advantages of using ontologies as a conceptual backbone for describing knowledge processed by correlation engines.",
"fno": "01301388",
"keywords": [
"System Monitoring",
"Knowledge Representation",
"Computer Crime",
"Data Analysis",
"Correlation Engines",
"Autonomic Computing Systems",
"Enterprise Wide Event Data",
"User Defined Rules",
"Run Time Advantages",
"Data Analysis",
"Ontologies",
"Engines",
"Performance Analysis",
"Runtime",
"Software Agents",
"Information Technology",
"Information Analysis",
"Event Detection",
"Protection",
"Spine"
],
"authors": [
{
"affiliation": "Res. Center for Inf. Technol., Karlsruhe Univ., Germany",
"fullName": "L. Stojanovic",
"givenName": "L.",
"surname": "Stojanovic",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Res. Center for Inf. Technol., Karlsruhe Univ., Germany",
"fullName": "A. Abecker",
"givenName": "A.",
"surname": "Abecker",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "N. Stojanovic",
"givenName": "N.",
"surname": "Stojanovic",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "R. Studer",
"givenName": "R.",
"surname": "Studer",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icac",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-01-01T00:00:00",
"pubType": "proceedings",
"pages": "304-305",
"year": "2004",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21140278",
"articleId": "12OmNqC2v0V",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21140280",
"articleId": "12OmNvAiSkm",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/skg/2005/2534/0/04125854",
"title": "B2B Integration: An Ontology-Based Framework",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2005/04125854/12OmNA0vnOW",
"parentPublication": {
"id": "proceedings/skg/2005/2534/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssiri/2009/3758/0/3758a047",
"title": "Scheduling and Controlling Semantics for Distributed Resource Based Computing Engines",
"doi": null,
"abstractUrl": "/proceedings-article/ssiri/2009/3758a047/12OmNC2xhA8",
"parentPublication": {
"id": "proceedings/ssiri/2009/3758/0",
"title": "Secure System Integration and Reliability Improvement",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kam/2009/3888/3/3888c087",
"title": "An Ontology-Based Semantic Search Approach for Geosciences",
"doi": null,
"abstractUrl": "/proceedings-article/kam/2009/3888c087/12OmNwfKjcu",
"parentPublication": {
"id": "proceedings/kam/2009/3888/1",
"title": "Knowledge Acquisition and Modeling, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iita/2008/3497/1/3497a894",
"title": "Intrusion Alerts Correlation Model Based on XSWRL Ontology",
"doi": null,
"abstractUrl": "/proceedings-article/iita/2008/3497a894/12OmNx1Iw9H",
"parentPublication": {
"id": "proceedings/iita/2008/3497/3",
"title": "2008 Second International Symposium on Intelligent Information Technology Application",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icac/2004/2114/0/21140304",
"title": "Ontology-Based Correlation Engines",
"doi": null,
"abstractUrl": "/proceedings-article/icac/2004/21140304/12OmNx9nGFA",
"parentPublication": {
"id": "proceedings/icac/2004/2114/0",
"title": "Autonomic Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micai/2011/4605/0/4605a023",
"title": "CreaDO -- A Methodology to Create Domain Ontologies Using Parameter-Based Ontology Merging Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/micai/2011/4605a023/12OmNxwncGK",
"parentPublication": {
"id": "proceedings/micai/2011/4605/0",
"title": "2011 10th Mexican International Conference on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cec-eee/2006/2511/0/25110003",
"title": "Complex Event Processing using Simple Rule-based Event Correlation Engines for Business Performance Management",
"doi": null,
"abstractUrl": "/proceedings-article/cec-eee/2006/25110003/12OmNzGlRAG",
"parentPublication": {
"id": "proceedings/cec-eee/2006/2511/0",
"title": "Proceedings. Joint Conference 8th IEEE International Conference on e-Commerce and Technology/3rd IEEE International Conference on Enterprise Computing, e-Commerce and e-Services/3rd IEEE International Workshop on Mobile Commerce and Wireless Services/Joint Workshop 2nd International Workshop on Business Service Networks/2nd International Workshop On Service Oriented Solutions for Cooperative Organizations",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/artcom/2009/3845/0/3845a482",
"title": "Ontology Based Semantic Measures in Document Similarity Ranking",
"doi": null,
"abstractUrl": "/proceedings-article/artcom/2009/3845a482/12OmNzTH0YA",
"parentPublication": {
"id": "proceedings/artcom/2009/3845/0",
"title": "Advances in Recent Technologies in Communication and Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2018/03/07903601",
"title": "Investigating Correlation between Protein Sequence Similarity and Semantic Similarity Using Gene Ontology Annotations",
"doi": null,
"abstractUrl": "/journal/tb/2018/03/07903601/13rRUxDqS6V",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100b056",
"title": "An Ontology Based Context-Aware Architecture for Smart Campus Applications",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100b056/18AuTe407DO",
"parentPublication": {
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0",
"title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzBOhX1",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"acronym": "acii",
"groupId": "1002992",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyUFfW4",
"doi": "10.1109/ACII.2013.81",
"title": "Parameter Optimization Issues for Cross-corpora Emotion Classification",
"normalizedTitle": "Parameter Optimization Issues for Cross-corpora Emotion Classification",
"abstract": "As speech based emotion recognition has matured to a degree where it becomes applicable within real-life conditions, it is time for a realistic view on obtainable performances. Most state-of-the-art emotion recognition methods are based on turn- and frame-level analysis independent of phonetic transcription. True speaker disjoint partitioning of training and test sets is still less common than simple cross-validation. Even speaker disjoint experiments can give only little insight into the generalization ability of modern emotion recognition engines since training and test sets used for system development usually tend to be similar as far as acoustic channel, noise overlay, and language are concerned. A considerably more realistic impression can be gathered by cross-corpora evaluation. Tuning of the emotion classification engine (feature set optimization and normalization, selection of a classification technique and corresponding parameter configuration) is an important issue of realistic evaluations. In the ideal case, an optimal classifier configuration estimated on training data should provide an outstanding recognition performance on unseen data. We therefore compare cross-corpora classification performances of optimized and non-optimized general and phonetic-pattern dependent classifiers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "As speech based emotion recognition has matured to a degree where it becomes applicable within real-life conditions, it is time for a realistic view on obtainable performances. Most state-of-the-art emotion recognition methods are based on turn- and frame-level analysis independent of phonetic transcription. True speaker disjoint partitioning of training and test sets is still less common than simple cross-validation. Even speaker disjoint experiments can give only little insight into the generalization ability of modern emotion recognition engines since training and test sets used for system development usually tend to be similar as far as acoustic channel, noise overlay, and language are concerned. A considerably more realistic impression can be gathered by cross-corpora evaluation. Tuning of the emotion classification engine (feature set optimization and normalization, selection of a classification technique and corresponding parameter configuration) is an important issue of realistic evaluations. In the ideal case, an optimal classifier configuration estimated on training data should provide an outstanding recognition performance on unseen data. We therefore compare cross-corpora classification performances of optimized and non-optimized general and phonetic-pattern dependent classifiers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "As speech based emotion recognition has matured to a degree where it becomes applicable within real-life conditions, it is time for a realistic view on obtainable performances. Most state-of-the-art emotion recognition methods are based on turn- and frame-level analysis independent of phonetic transcription. True speaker disjoint partitioning of training and test sets is still less common than simple cross-validation. Even speaker disjoint experiments can give only little insight into the generalization ability of modern emotion recognition engines since training and test sets used for system development usually tend to be similar as far as acoustic channel, noise overlay, and language are concerned. A considerably more realistic impression can be gathered by cross-corpora evaluation. Tuning of the emotion classification engine (feature set optimization and normalization, selection of a classification technique and corresponding parameter configuration) is an important issue of realistic evaluations. In the ideal case, an optimal classifier configuration estimated on training data should provide an outstanding recognition performance on unseen data. We therefore compare cross-corpora classification performances of optimized and non-optimized general and phonetic-pattern dependent classifiers.",
"fno": "5048a454",
"keywords": [
"Hidden Markov Models",
"Speech",
"Acoustics",
"Emotion Recognition",
"Training",
"Engines",
"Speech Recognition",
"Level Of Arousal",
"Emotion Recognition",
"Emotional Unit",
"Cross Corpora",
"Parameter Optimization",
"Emotion Perception",
"EMO DB",
"VAM"
],
"authors": [
{
"affiliation": "Center for Behavioral Brain Sci., Otto von Guericke Univ., Magdeburg, Germany",
"fullName": "Bogdan Vlasenko",
"givenName": "Bogdan",
"surname": "Vlasenko",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Behavioral Brain Sci., Otto von Guericke Univ., Magdeburg, Germany",
"fullName": "David Philippou-Hubner",
"givenName": "David",
"surname": "Philippou-Hubner",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Center for Behavioral Brain Sci., Otto von Guericke Univ., Magdeburg, Germany",
"fullName": "Andreas Wendemuth",
"givenName": "Andreas",
"surname": "Wendemuth",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "acii",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-09-01T00:00:00",
"pubType": "proceedings",
"pages": "454-459",
"year": "2013",
"issn": "2156-8103",
"isbn": "978-0-7695-5048-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5048a448",
"articleId": "12OmNxGja8r",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5048a460",
"articleId": "12OmNzWx07H",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmew/2012/2027/0/06266271",
"title": "The Performance of the Speaking Rate Parameter in Emotion Recognition from Speech",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2012/06266271/12OmNBVIUzZ",
"parentPublication": {
"id": "proceedings/icmew/2012/2027/0",
"title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2008/2570/0/04607689",
"title": "Combining speech recognition and acoustic word emotion models for robust text-independent emotion recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2008/04607689/12OmNqBKU7e",
"parentPublication": {
"id": "proceedings/icme/2008/2570/0",
"title": "2008 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2013/5048/0/5048a734",
"title": "Determining the Smallest Emotional Unit for Level of Arousal Classification",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2013/5048a734/12OmNrAdsAW",
"parentPublication": {
"id": "proceedings/acii/2013/5048/0",
"title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2015/9953/0/07344612",
"title": "Cross-corpus acoustic emotion recognition: Variances and strategies (Extended abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2015/07344612/12OmNxETa66",
"parentPublication": {
"id": "proceedings/acii/2015/9953/0",
"title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2014/4761/0/06890208",
"title": "Location of an emotionally neutral region in valence-arousal space: Two-class vs. three-class cross corpora emotion recognition evaluations",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2014/06890208/12OmNxVlTEM",
"parentPublication": {
"id": "proceedings/icme/2014/4761/0",
"title": "2014 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2017/4662/0/08388672",
"title": "Cross-corpus Arabic and English emotion recognition",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2017/08388672/12OmNy50g92",
"parentPublication": {
"id": "proceedings/isspit/2017/4662/0",
"title": "2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2012/4711/0/4711a248",
"title": "The Performance of the Speaking Rate Parameter in Emotion Recognition from Speech",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2012/4711a248/12OmNzahc4W",
"parentPublication": {
"id": "proceedings/icme/2012/4711/0",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2010/02/tta2010020119",
"title": "Cross-Corpus Acoustic Emotion Recognition: Variances and Strategies",
"doi": null,
"abstractUrl": "/journal/ta/2010/02/tta2010020119/13rRUxBa5ab",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2019/01/07882650",
"title": "Cross-Corpus Acoustic Emotion Recognition with Multi-Task Learning: Seeking Common Ground While Preserving Differences",
"doi": null,
"abstractUrl": "/journal/ta/2019/01/07882650/13rRUy3gn5Q",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/5555/01/09609567",
"title": "Learning Enhanced Acoustic Latent Representation for Small Scale Affective Corpus with Adversarial Cross Corpora Integration",
"doi": null,
"abstractUrl": "/journal/ta/5555/01/09609567/1yoxvTf5wdO",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1KfQshha0dW",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "10020192",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KfR5ALNwEE",
"doi": "10.1109/BigData55660.2022.10020869",
"title": "Comparison of Teenagers’ Writing Using Word Clouds and Analyzing Engines",
"normalizedTitle": "Comparison of Teenagers’ Writing Using Word Clouds and Analyzing Engines",
"abstract": "Worldwide, there are writing competitions for teenagers. However, usually, it is only the winning articles that are presented and remarked off. In order to understand the gap between winning and unselected articles, we compare the selected-winning articles and unselected articles to find the writing quality difference. We do this by using word clouds and various analyzing engines. On Write the World (WtW), while selected-winning pieces are published on WtW Reviews, the users (teenagers between the age of 13-18) can also self-share their articles with the public on the WtW platform. Our finding shows that to get unbiased results, the analyzing engines require the raw text to be inputted, rather than using only the 50 most frequently appeared words from the word cloud. Additionally, there is a notable difference in writing quality between selected-winning articles and self-shared articles.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Worldwide, there are writing competitions for teenagers. However, usually, it is only the winning articles that are presented and remarked off. In order to understand the gap between winning and unselected articles, we compare the selected-winning articles and unselected articles to find the writing quality difference. We do this by using word clouds and various analyzing engines. On Write the World (WtW), while selected-winning pieces are published on WtW Reviews, the users (teenagers between the age of 13-18) can also self-share their articles with the public on the WtW platform. Our finding shows that to get unbiased results, the analyzing engines require the raw text to be inputted, rather than using only the 50 most frequently appeared words from the word cloud. Additionally, there is a notable difference in writing quality between selected-winning articles and self-shared articles.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Worldwide, there are writing competitions for teenagers. However, usually, it is only the winning articles that are presented and remarked off. In order to understand the gap between winning and unselected articles, we compare the selected-winning articles and unselected articles to find the writing quality difference. We do this by using word clouds and various analyzing engines. On Write the World (WtW), while selected-winning pieces are published on WtW Reviews, the users (teenagers between the age of 13-18) can also self-share their articles with the public on the WtW platform. Our finding shows that to get unbiased results, the analyzing engines require the raw text to be inputted, rather than using only the 50 most frequently appeared words from the word cloud. Additionally, there is a notable difference in writing quality between selected-winning articles and self-shared articles.",
"fno": "10020869",
"keywords": [
"Literature",
"Text Analysis",
"Analyzing Engines",
"Teenager Writing",
"Word Cloud",
"Word Clouds",
"Write The World",
"Writing Competitions",
"Writing Quality Difference",
"Wt W Platform",
"Wt W Reviews",
"Writing",
"Big Data",
"Tag Clouds",
"Grammar",
"Engines",
"Teenagers",
"Word Cloud",
"Analyzing Engines",
"Frequency",
"Writing Quality",
"Acquisition Skills"
],
"authors": [
{
"affiliation": "Osaka YMCA International School,Japan",
"fullName": "Allison Hsu",
"givenName": "Allison",
"surname": "Hsu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Osaka University,Cybermedia Center,Japan",
"fullName": "Ying-Feng Hsu",
"givenName": "Ying-Feng",
"surname": "Hsu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "6653-6655",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "10020558",
"articleId": "1KfS0654SUE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "10020826",
"articleId": "1KfTidYzQli",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/collaboratecom/2009/9999/0/05364933",
"title": "Comparing visualization techniques to structure collaborative concepts",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2009/05364933/12OmNvzJGeV",
"parentPublication": {
"id": "proceedings/collaboratecom/2009/9999/0",
"title": "2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipcc/2005/9027/0/01494246",
"title": "Conceptual development in technical and textbook writing: a challenge for L1 and L2 student readers",
"doi": null,
"abstractUrl": "/proceedings-article/ipcc/2005/01494246/12OmNwDACwm",
"parentPublication": {
"id": "proceedings/ipcc/2005/9027/0",
"title": "2005 IEEE International Professional Communication Conference (IPCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc/2016/4297/0/07828545",
"title": "Utilising Semantically Rich Big Data to Enhance Book Recommendation Engines",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc/2016/07828545/12OmNzA6GSH",
"parentPublication": {
"id": "proceedings/hpcc/2016/4297/0",
"title": "2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/01/07192633",
"title": "Visual Analysis and Dissemination of Scientific Literature Collections with SurVis",
"doi": null,
"abstractUrl": "/journal/tg/2016/01/07192633/13rRUwwJWFP",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2022/6244/0/09962678",
"title": "An Approach to Research Teams Teaching \"as you go\" for High-Quality Grant Proposals Writing Based on the Experience of ITMO University",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2022/09962678/1IHnYA7Re8g",
"parentPublication": {
"id": "proceedings/fie/2022/6244/0",
"title": "2022 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fie/2019/1746/0/09028674",
"title": "Training Writing Tutors to Improve Their Support for Engineering Students’ Technical Reports",
"doi": null,
"abstractUrl": "/proceedings-article/fie/2019/09028674/1iffuRXOmBO",
"parentPublication": {
"id": "proceedings/fie/2019/1746/0",
"title": "2019 IEEE Frontiers in Education Conference (FIE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isaiee/2020/5668/0/566800a281",
"title": "Designing a Two-Phase Quantitative Writing Course Using Bloom’s Taxonomy",
"doi": null,
"abstractUrl": "/proceedings-article/isaiee/2020/566800a281/1sQKfJITO0g",
"parentPublication": {
"id": "proceedings/isaiee/2020/5668/0",
"title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2021/4106/0/410600a263",
"title": "Mindmap-Supported Writing Model: The Effect of Mind map as a Prewriting Activities on Elementary Students’ Writing Performances through Private Social Network Learning Sites",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2021/410600a263/1vK09peKpxe",
"parentPublication": {
"id": "proceedings/icalt/2021/4106/0",
"title": "2021 International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieit/2021/2563/0/256300a583",
"title": "A Study of the Effectiveness of Teaching English Writing for Chinese College Students from the Perspective of Engagement System in Appraisal Theory Based on SPSS 25.0",
"doi": null,
"abstractUrl": "/proceedings-article/ieit/2021/256300a583/1wHKkfxxWow",
"parentPublication": {
"id": "proceedings/ieit/2021/2563/0",
"title": "2021 International Conference on Internet, Education and Information Technology (IEIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieit/2021/2563/0/256300a367",
"title": "The current situation of English Writing Teaching in China Under the background of Internet",
"doi": null,
"abstractUrl": "/proceedings-article/ieit/2021/256300a367/1wHKqBPepoI",
"parentPublication": {
"id": "proceedings/ieit/2021/2563/0",
"title": "2021 International Conference on Internet, Education and Information Technology (IEIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1hHMfoL4WPK",
"title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"acronym": "isspit",
"groupId": "1001026",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1hHMiJl5fYQ",
"doi": "10.1109/ISSPIT47144.2019.9001855",
"title": "Detecting Sarcastic and Complimentary Exclamations in English with Intonation patterns and Acoustic Features: A Case Study",
"normalizedTitle": "Detecting Sarcastic and Complimentary Exclamations in English with Intonation patterns and Acoustic Features: A Case Study",
"abstract": "Sentiment analysis has been a significant topic in Natural Language Processing, human-computer interaction as well as emotion recognition technology. Exclamation, either complimentary or sarcastic, is a very typical sentence type to express strong emotions in everyday communication, social medias, customers' responses to products and services, cross-cultural communications as well as in security and forensics. Moreover, both types of exclamation can share the identical literal form but express distinctively opposite emotions or attitudes by means of linguistic contexts and intonation devices. However, there are very few studies on their subtle but unique speech features. To shed light on this demanding issue for sentiment analysis and human-computer reaction, the present study explores the two facets of exclamation in English in order to probe into the intonation patterns (tonality, tonicity and tone) and acoustic features (duration, pitch, and intensity) of sarcastic exclamation (SE) and complimentary exclamations (CE) in English. The findings reveal that both SE and CE share the similar tonality and tonicity patterns, but hugely differ in their tone patterns, and that they significantly distinguish from each other in three parameters of duration, two magnitudes of pitch and one scale of intensity.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Sentiment analysis has been a significant topic in Natural Language Processing, human-computer interaction as well as emotion recognition technology. Exclamation, either complimentary or sarcastic, is a very typical sentence type to express strong emotions in everyday communication, social medias, customers' responses to products and services, cross-cultural communications as well as in security and forensics. Moreover, both types of exclamation can share the identical literal form but express distinctively opposite emotions or attitudes by means of linguistic contexts and intonation devices. However, there are very few studies on their subtle but unique speech features. To shed light on this demanding issue for sentiment analysis and human-computer reaction, the present study explores the two facets of exclamation in English in order to probe into the intonation patterns (tonality, tonicity and tone) and acoustic features (duration, pitch, and intensity) of sarcastic exclamation (SE) and complimentary exclamations (CE) in English. The findings reveal that both SE and CE share the similar tonality and tonicity patterns, but hugely differ in their tone patterns, and that they significantly distinguish from each other in three parameters of duration, two magnitudes of pitch and one scale of intensity.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Sentiment analysis has been a significant topic in Natural Language Processing, human-computer interaction as well as emotion recognition technology. Exclamation, either complimentary or sarcastic, is a very typical sentence type to express strong emotions in everyday communication, social medias, customers' responses to products and services, cross-cultural communications as well as in security and forensics. Moreover, both types of exclamation can share the identical literal form but express distinctively opposite emotions or attitudes by means of linguistic contexts and intonation devices. However, there are very few studies on their subtle but unique speech features. To shed light on this demanding issue for sentiment analysis and human-computer reaction, the present study explores the two facets of exclamation in English in order to probe into the intonation patterns (tonality, tonicity and tone) and acoustic features (duration, pitch, and intensity) of sarcastic exclamation (SE) and complimentary exclamations (CE) in English. The findings reveal that both SE and CE share the similar tonality and tonicity patterns, but hugely differ in their tone patterns, and that they significantly distinguish from each other in three parameters of duration, two magnitudes of pitch and one scale of intensity.",
"fno": "09001855",
"keywords": [
"Emotion Recognition",
"Human Computer Interaction",
"Natural Language Processing",
"Sentiment Analysis",
"Social Networking Online",
"Sarcastic Exclamations",
"Complimentary Exclamations",
"Intonation Patterns",
"Acoustic Features",
"Sentiment Analysis",
"Natural Language Processing",
"Human Computer Interaction",
"Emotion Recognition Technology",
"Exclamation",
"Sentence Type",
"Social Medias",
"Customers",
"Cross Cultural Communications",
"Security",
"Forensics",
"Identical Literal Form",
"Opposite Emotions",
"Linguistic Contexts",
"Intonation Devices",
"Speech Features",
"Human Computer Reaction",
"English",
"Similar Tonality",
"Tonicity Patterns",
"Tone Patterns",
"Acoustics",
"Emotion Recognition",
"Phonetics",
"Sentiment Analysis",
"Speech Recognition",
"Labeling",
"Complimentary Exclamation",
"Sarcastic Exclamation",
"Intonation Patterns",
"Acoustic Features"
],
"authors": [
{
"affiliation": "Research Centre for Phonetics, Hearing & Cognitive Science, Yangzhou University,Yangzhou,China",
"fullName": "Weijing Zhou",
"givenName": "Weijing",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Faculty of Theoretical and Applied Linguistics, University of Cambridge,Cambridge,UK",
"fullName": "Francis Nolan",
"givenName": "Francis",
"surname": "Nolan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Institute of Linguisitics, Chinese Academy of Social Science,Beijing,China",
"fullName": "Aijun Li",
"givenName": "Aijun",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Foreign Languages, Jiangsu University of Science & Technology,Zhenjiang,China",
"fullName": "Jian Gong",
"givenName": "Jian",
"surname": "Gong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Research Centre for Phonetics, Hearing & Cognitive Science, Yangzhou University,Yangzhou,China",
"fullName": "Xiaojiao Xue",
"givenName": "Xiaojiao",
"surname": "Xue",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Foreign Languages, Jiangsu University of Science & Technology,Zhenjiang,China",
"fullName": "Xiaoli Ji",
"givenName": "Xiaoli",
"surname": "Ji",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isspit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-5341-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09001883",
"articleId": "1hHMhgoURlm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09001818",
"articleId": "1hHMixhHquY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/acii/2015/9953/0/07344651",
"title": "Recognizing emotions in dialogues with acoustic and lexical features",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2015/07344651/12OmNwI8ceQ",
"parentPublication": {
"id": "proceedings/acii/2015/9953/0",
"title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2015/9953/0/07344562",
"title": "Cross-corpus analysis for acoustic recognition of negative interactions",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2015/07344562/12OmNx8wToT",
"parentPublication": {
"id": "proceedings/acii/2015/9953/0",
"title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acii/2015/9953/0/07344612",
"title": "Cross-corpus acoustic emotion recognition: Variances and strategies (Extended abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/acii/2015/07344612/12OmNxETa66",
"parentPublication": {
"id": "proceedings/acii/2015/9953/0",
"title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2017/4662/0/08388672",
"title": "Cross-corpus Arabic and English emotion recognition",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2017/08388672/12OmNy50g92",
"parentPublication": {
"id": "proceedings/isspit/2017/4662/0",
"title": "2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ta/2020/04/08331122",
"title": "An Investigation of Partition-Based and Phonetically-Aware Acoustic Features for Continuous Emotion Prediction from Speech",
"doi": null,
"abstractUrl": "/journal/ta/2020/04/08331122/13rRUx0xPgB",
"parentPublication": {
"id": "trans/ta",
"title": "IEEE Transactions on Affective Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2018/1737/0/08486462",
"title": "Integrating Articulatory Features into Acoustic-Phonemic Model for Mispronunciation Detection and Diagnosis in L2 English Speech",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486462/14jQfSC65rT",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icaml/2021/2125/0/212500a186",
"title": "Research on Tone Perception of Tibetan Native Speakers in Mandarin Based on Acoustic Features",
"doi": null,
"abstractUrl": "/proceedings-article/icaml/2021/212500a186/1B60UoyfEUE",
"parentPublication": {
"id": "proceedings/icaml/2021/2125/0",
"title": "2021 3rd International Conference on Applied Machine Learning (ICAML)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cibda/2020/9837/0/983700a107",
"title": "Analysis on the Strategies of Cultivating Students' Pronunciation and Intonation Awareness in English Teaching in Higher Vocational Colleges in the Era of Big Data",
"doi": null,
"abstractUrl": "/proceedings-article/cibda/2020/983700a107/1lO1LpcgIc8",
"parentPublication": {
"id": "proceedings/cibda/2020/9837/0",
"title": "2020 International Conference on Computer Information and Big Data Applications (CIBDA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isaiee/2020/5668/0/566800a015",
"title": "An Acoustic Study on the Acquisition of English Front Vowels by Tibetan Students",
"doi": null,
"abstractUrl": "/proceedings-article/isaiee/2020/566800a015/1sQKiXUVGHm",
"parentPublication": {
"id": "proceedings/isaiee/2020/5668/0",
"title": "2020 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icekim/2021/6834/0/683400a602",
"title": "Acoustic Analysis of tone in Renbu Tibetan Based on the T-value Method",
"doi": null,
"abstractUrl": "/proceedings-article/icekim/2021/683400a602/1vmLBi3hXNe",
"parentPublication": {
"id": "proceedings/icekim/2021/6834/0",
"title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1ziOqPmGuOY",
"title": "2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS)",
"acronym": "mass",
"groupId": "1001499",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1ziOyp19B5e",
"doi": "10.1109/MASS52906.2021.00091",
"title": "Pyrenote: a Web-based, Manual Annotation Tool for Passive Acoustic Monitoring",
"normalizedTitle": "Pyrenote: a Web-based, Manual Annotation Tool for Passive Acoustic Monitoring",
"abstract": "Passive acoustic monitoring (PAM) involves deploying audio recorders across a natural environment over a long period of time to collect large quantities of audio data. To parse through this data, researchers have worked with automated annotation techniques stemming from Digital Signal Processing and Machine Learning to identify key species calls and judge a region’s biodiversity. To apply and evaluate those techniques, one must acquire strongly labeled data that marks the exact temporal location of audio events in the data, as opposed to weakly labeled data which only labels the presence of an audio event across a clip.Pyrenote was designed to fit the demand for strong manual labels in PAM data. Based on Audino, an open-source, web-based, and easy-to-deploy audio annotation tool, Pyrenote displays a spectrogram for audio annotation, stores labels in a database, and optimizes the labeling process through simplifying the user interface to produce high-quality annotations in a short time frame. This paper documents Pyrenote’s functionality, how the challenge informed the design of the system, and how it compares to other labeling systems.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Passive acoustic monitoring (PAM) involves deploying audio recorders across a natural environment over a long period of time to collect large quantities of audio data. To parse through this data, researchers have worked with automated annotation techniques stemming from Digital Signal Processing and Machine Learning to identify key species calls and judge a region’s biodiversity. To apply and evaluate those techniques, one must acquire strongly labeled data that marks the exact temporal location of audio events in the data, as opposed to weakly labeled data which only labels the presence of an audio event across a clip.Pyrenote was designed to fit the demand for strong manual labels in PAM data. Based on Audino, an open-source, web-based, and easy-to-deploy audio annotation tool, Pyrenote displays a spectrogram for audio annotation, stores labels in a database, and optimizes the labeling process through simplifying the user interface to produce high-quality annotations in a short time frame. This paper documents Pyrenote’s functionality, how the challenge informed the design of the system, and how it compares to other labeling systems.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Passive acoustic monitoring (PAM) involves deploying audio recorders across a natural environment over a long period of time to collect large quantities of audio data. To parse through this data, researchers have worked with automated annotation techniques stemming from Digital Signal Processing and Machine Learning to identify key species calls and judge a region’s biodiversity. To apply and evaluate those techniques, one must acquire strongly labeled data that marks the exact temporal location of audio events in the data, as opposed to weakly labeled data which only labels the presence of an audio event across a clip.Pyrenote was designed to fit the demand for strong manual labels in PAM data. Based on Audino, an open-source, web-based, and easy-to-deploy audio annotation tool, Pyrenote displays a spectrogram for audio annotation, stores labels in a database, and optimizes the labeling process through simplifying the user interface to produce high-quality annotations in a short time frame. This paper documents Pyrenote’s functionality, how the challenge informed the design of the system, and how it compares to other labeling systems.",
"fno": "493500a633",
"keywords": [
"Audio Recording",
"Audio Signal Processing",
"Biology Computing",
"Learning Artificial Intelligence",
"User Interfaces",
"Manual Annotation Tool",
"Passive Acoustic Monitoring",
"Audio Recorders",
"Natural Environment",
"Audio Data",
"Automated Annotation Techniques",
"Digital Signal Processing",
"Machine Learning",
"Strongly Labeled Data",
"Exact Temporal Location",
"Audio Event",
"Weakly Labeled Data",
"Strong Manual Labels",
"PAM Data",
"Stores Labels",
"Labeling Process",
"High Quality Annotations",
"Labeling Systems",
"Pyrenote Functionality",
"Audio Annotation Tool",
"Biodiversity",
"Annotations",
"Machine Learning",
"Manuals",
"Tools",
"User Interfaces",
"Acoustics",
"Labeling",
"Passive Acoustic Monitoring",
"Audio Annotation Tool",
"Annotation",
"Strong Labels",
"Open Source"
],
"authors": [
{
"affiliation": "University of California, San Diego,dept. of Mathematics,San Diego,United States of America",
"fullName": "Sean Perry",
"givenName": "Sean",
"surname": "Perry",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Computer Science and Engineering,San Diego,United States of America",
"fullName": "Vaibhav Tiwari",
"givenName": "Vaibhav",
"surname": "Tiwari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Electrical and Computer Engineering,San Diego,United States of America",
"fullName": "Nishant Balaji",
"givenName": "Nishant",
"surname": "Balaji",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Cognitive Science,San Diego,United States of America",
"fullName": "Erika Joun",
"givenName": "Erika",
"surname": "Joun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Electrical and Computer Engineering,San Diego,United States of America",
"fullName": "Jacob Ayers",
"givenName": "Jacob",
"surname": "Ayers",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "San Diego Zoo Wildlife Alliance,Conservation Science and Wildlife Health,San Diego,United States of America",
"fullName": "Mathias Tobler",
"givenName": "Mathias",
"surname": "Tobler",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "San Diego Zoo Wildlife Alliance,Conservation Science and Wildlife Health,San Diego,United States of America",
"fullName": "Ian Ingram",
"givenName": "Ian",
"surname": "Ingram",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Computer Science and Engineering,San Diego,United States of America",
"fullName": "Ryan Kastner",
"givenName": "Ryan",
"surname": "Kastner",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, San Diego,dept. of Electrical and Computer Engineering,San Diego,United States of America",
"fullName": "Curt Schurgers",
"givenName": "Curt",
"surname": "Schurgers",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mass",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-10-01T00:00:00",
"pubType": "proceedings",
"pages": "633-638",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-4935-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "493500a627",
"articleId": "1ziOuIoXUTC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "493500a639",
"articleId": "1ziOtT8nKla",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccv/2021/2812/0/281200p5344",
"title": "Scaling up instance annotation via label propagation",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200p5344/1BmFAQmevn2",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300a674",
"title": "COCA: Cost-Effective Collaborative Annotation System by Combining Experts and Amateurs",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300a674/1FwFwDl550A",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2022/6845/0/684500a530",
"title": "MedTator: A Serverless Web-based Tool for Corpus Annotation",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2022/684500a530/1Gvdr8p8x3O",
"parentPublication": {
"id": "proceedings/ichi/2022/6845/0",
"title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600u0634",
"title": "BoostMIS: Boosting Medical Image Semi-supervised Learning with Adaptive Pseudo Labeling and Informative Active Annotation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600u0634/1H0LFQ8NQsM",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2022/7172/0/717200a245",
"title": "HSD: A hierarchical singing annotation dataset",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2022/717200a245/1KaHHPwcdGw",
"parentPublication": {
"id": "proceedings/ism/2022/7172/0",
"title": "2022 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2020/9360/0/09150584",
"title": "Auto-Annotation Quality Prediction for Semi-Supervised Learning with Ensembles",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2020/09150584/1lPHrGvz44w",
"parentPublication": {
"id": "proceedings/cvprw/2020/9360/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313302",
"title": "Cost-Quality Adaptive Active Learning for Chinese Clinical Named Entity Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313302/1qmgdfy35XW",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiai-aai/2020/7397/0/739700a552",
"title": "Preliminary Annotation Results: Bargaining Roles for Bilateral Dialogues",
"doi": null,
"abstractUrl": "/proceedings-article/iiai-aai/2020/739700a552/1tGcrZrlRJu",
"parentPublication": {
"id": "proceedings/iiai-aai/2020/7397/0",
"title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900e348",
"title": "Towards Good Practices for Efficiently Annotating Large-Scale Image Classification Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900e348/1yeL7tMRDTq",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2021/2354/0/235400a192",
"title": "Iterative Pseudo-Labeling with Deep Feature Annotation and Confidence-Based Sampling",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2021/235400a192/1zurqOgUL16",
"parentPublication": {
"id": "proceedings/sibgrapi/2021/2354/0",
"title": "2021 34th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNwvVrMe",
"title": "International Conference on the Digital Society",
"acronym": "icds",
"groupId": "1001547",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNqG0SL8",
"doi": "10.1109/ICDS.2010.67",
"title": "Visualizing Plot in 3D",
"normalizedTitle": "Visualizing Plot in 3D",
"abstract": "We describe the design of several new forms of interactive 3D visualizations, to be used in teaching the concept of plot in fiction. Conventional approaches to teaching plot tend to rely on a Victorian visualization known as Freytag’s Pyramid, which is well suited to a certain range of material but is not appropriate for all fiction currently being taught. Our new visualizations have the potential to allow teachers and students to explore different approaches to understanding plot. We focus in particular on three visual strategies, each of which describes significant features such as characters, objects, events, and transitions in space and time, while respectively emphasizing recurring elements in a primarily sequential structure, complexity of structure, and centrality of some designated feature or features. The technical aspects of the visualizations emerge from the availability of digital text that can be encoded for plot elements using XML.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We describe the design of several new forms of interactive 3D visualizations, to be used in teaching the concept of plot in fiction. Conventional approaches to teaching plot tend to rely on a Victorian visualization known as Freytag’s Pyramid, which is well suited to a certain range of material but is not appropriate for all fiction currently being taught. Our new visualizations have the potential to allow teachers and students to explore different approaches to understanding plot. We focus in particular on three visual strategies, each of which describes significant features such as characters, objects, events, and transitions in space and time, while respectively emphasizing recurring elements in a primarily sequential structure, complexity of structure, and centrality of some designated feature or features. The technical aspects of the visualizations emerge from the availability of digital text that can be encoded for plot elements using XML.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We describe the design of several new forms of interactive 3D visualizations, to be used in teaching the concept of plot in fiction. Conventional approaches to teaching plot tend to rely on a Victorian visualization known as Freytag’s Pyramid, which is well suited to a certain range of material but is not appropriate for all fiction currently being taught. Our new visualizations have the potential to allow teachers and students to explore different approaches to understanding plot. We focus in particular on three visual strategies, each of which describes significant features such as characters, objects, events, and transitions in space and time, while respectively emphasizing recurring elements in a primarily sequential structure, complexity of structure, and centrality of some designated feature or features. The technical aspects of the visualizations emerge from the availability of digital text that can be encoded for plot elements using XML.",
"fno": "3953a285",
"keywords": [
"Narrative Plot Visualization Literary Education"
],
"authors": [
{
"affiliation": null,
"fullName": "Teresa Dobson",
"givenName": "Teresa",
"surname": "Dobson",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Piotr Michura",
"givenName": "Piotr",
"surname": "Michura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Stan Ruecker",
"givenName": "Stan",
"surname": "Ruecker",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icds",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-02-01T00:00:00",
"pubType": "proceedings",
"pages": "285-289",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-3953-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3953a279",
"articleId": "12OmNrFkeVq",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3953a290",
"articleId": "12OmNzwZ6p5",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2011/0868/0/06004006",
"title": "Development of an Interactive Ramachandran Plot in Weave",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2011/06004006/12OmNARiM0N",
"parentPublication": {
"id": "proceedings/iv/2011/0868/0",
"title": "2011 15th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifcsta/2009/3930/2/3930b384",
"title": "The Research for College Electronic Commerce Specialized Knowledge System, Innovative Experimental Plot in Jiangxi Province of China",
"doi": null,
"abstractUrl": "/proceedings-article/ifcsta/2009/3930b384/12OmNqFJhKM",
"parentPublication": {
"id": "proceedings/ifcsta/2009/3930/2",
"title": "Computer Science-Technology and Applications, International Forum on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cicsyn/2011/4482/0/4482a253",
"title": "Adaptive Tracking of Overlapping Vehicles Via Markov Chain Monte Carlo with CUSUM Path Plot Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/cicsyn/2011/4482a253/12OmNqFJhVv",
"parentPublication": {
"id": "proceedings/cicsyn/2011/4482/0",
"title": "Computational Intelligence, Communication Systems and Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2003/2032/0/20320117",
"title": "Frequency Plot and Relevance Plot to Enhance Visual Data Exploration",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2003/20320117/12OmNqGiu9x",
"parentPublication": {
"id": "proceedings/sibgrapi/2003/2032/0",
"title": "16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2001/1342/0/13420131",
"title": "A Comparison of 2-D Visualizations of Hierarchies",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2001/13420131/12OmNxGALae",
"parentPublication": {
"id": "proceedings/ieee-infovis/2001/1342/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2000/0478/0/04780071",
"title": "The Thing Growing: Autonomous Characters in Virtual Reality Interactive Fiction",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2000/04780071/12OmNxRF79s",
"parentPublication": {
"id": "proceedings/vr/2000/0478/0",
"title": "Virtual Reality Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbake/2009/3692/0/3692a189",
"title": "Computer Users Activity Analysis Using Recurrence Plot",
"doi": null,
"abstractUrl": "/proceedings-article/icbake/2009/3692a189/12OmNxdVgT8",
"parentPublication": {
"id": "proceedings/icbake/2009/3692/0",
"title": "Biometrics and Kansei Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cdciem/2011/4350/0/4350c027",
"title": "County Level Prime Farmland Plot Evaluating and Planning in China: A Case Study in Shunyi District, Beijing",
"doi": null,
"abstractUrl": "/proceedings-article/cdciem/2011/4350c027/12OmNy49sId",
"parentPublication": {
"id": "proceedings/cdciem/2011/4350/0",
"title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isms/2010/3973/0/3973a396",
"title": "Modelling of NPN Bipolar Junction Transistor Characteristics Using Gummel Plot Technique",
"doi": null,
"abstractUrl": "/proceedings-article/isms/2010/3973a396/12OmNyNQSMz",
"parentPublication": {
"id": "proceedings/isms/2010/3973/0",
"title": "Intelligent Systems, Modelling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122310",
"title": "Flexible Linked Axes for Multivariate Data Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122310/13rRUxD9h54",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyS6RMB",
"title": "2009 13th International Conference Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwGZNMM",
"doi": "10.1109/IV.2009.25",
"title": "Visual Perception of Parallel Coordinate Visualizations",
"normalizedTitle": "Visual Perception of Parallel Coordinate Visualizations",
"abstract": "Parallel coordinates is a visualization technique that provides an unbiased representation of high-dimensional data. The parallel configuration of axes treats data dimensions uniformly and is well suited for exploratory visualization. However, first-time users of parallel coordinate visualizations can find the representation confusing and difficult to understand.We used eye tracking to study how parallel coordinate visualizations are perceived, and compared the results to the optimal visual scan path required to complete the tasks. The results indicate that even first-time users quickly learn how to use parallel coordinate visualizations, pay attention to the correct task-specific areas in the visualization, and become rapidly proficient with it.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Parallel coordinates is a visualization technique that provides an unbiased representation of high-dimensional data. The parallel configuration of axes treats data dimensions uniformly and is well suited for exploratory visualization. However, first-time users of parallel coordinate visualizations can find the representation confusing and difficult to understand.We used eye tracking to study how parallel coordinate visualizations are perceived, and compared the results to the optimal visual scan path required to complete the tasks. The results indicate that even first-time users quickly learn how to use parallel coordinate visualizations, pay attention to the correct task-specific areas in the visualization, and become rapidly proficient with it.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Parallel coordinates is a visualization technique that provides an unbiased representation of high-dimensional data. The parallel configuration of axes treats data dimensions uniformly and is well suited for exploratory visualization. However, first-time users of parallel coordinate visualizations can find the representation confusing and difficult to understand.We used eye tracking to study how parallel coordinate visualizations are perceived, and compared the results to the optimal visual scan path required to complete the tasks. The results indicate that even first-time users quickly learn how to use parallel coordinate visualizations, pay attention to the correct task-specific areas in the visualization, and become rapidly proficient with it.",
"fno": "3733a003",
"keywords": [
"Parallal Coordinate Visualizations",
"Eye Tracking",
"Perception Of Visualization"
],
"authors": [
{
"affiliation": null,
"fullName": "Harri Siirtola",
"givenName": "Harri",
"surname": "Siirtola",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tuuli Laivo",
"givenName": "Tuuli",
"surname": "Laivo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tomi Heimonen",
"givenName": "Tomi",
"surname": "Heimonen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kari-Jouko Räihä",
"givenName": "Kari-Jouko",
"surname": "Räihä",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-07-01T00:00:00",
"pubType": "proceedings",
"pages": "3-9",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3733-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3733z017",
"articleId": "12OmNzb7Zjl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3733a010",
"articleId": "12OmNAsTgOl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2004/8788/0/87880305",
"title": "On the Role of Color in the Perception of Motion in Animated Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880305/12OmNAFWONQ",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ozchi/1996/7525/0/75250012",
"title": "Automated General Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/ozchi/1996/75250012/12OmNBZYTnu",
"parentPublication": {
"id": "proceedings/ozchi/1996/7525/0",
"title": "Proceedings Sixth Australian Conference on Computer-Human Interaction",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/es/2016/3790/0/07880487",
"title": "Recommendations for Data Visualizations Based on Gestalt Patterns",
"doi": null,
"abstractUrl": "/proceedings-article/es/2016/07880487/12OmNCb3ftz",
"parentPublication": {
"id": "proceedings/es/2016/3790/0",
"title": "2016 4th International Conference on Enterprise Systems (ES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660012",
"title": "On the Optimization of Visualizations of Complex Phenomena",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660012/12OmNCfSqN3",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dui/2010/6846/0/05444706",
"title": "Evaluating depth perception of photorealistic mixed reality visualizations for occluded objects in outdoor environments",
"doi": null,
"abstractUrl": "/proceedings-article/3dui/2010/05444706/12OmNsd6vhN",
"parentPublication": {
"id": "proceedings/3dui/2010/6846/0",
"title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/1/3336a949",
"title": "Study on Feature Extraction Method Based on Parallel Coordinate Plots",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336a949/12OmNwErpsP",
"parentPublication": {
"id": "proceedings/csse/2008/3336/1",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a044",
"title": "Hierarchical Temporal Patterns and Interactive Aggregated Views for Pixel-Based Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a044/12OmNxAlA96",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2013/5049/0/5049a059",
"title": "Arrangement of Low-Dimensional Parallel Coordinate Plots for High-Dimensional Data Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2013/5049a059/12OmNy1SFKZ",
"parentPublication": {
"id": "proceedings/iv/2013/5049/0",
"title": "2013 17th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/02/ttg2012020309",
"title": "Data Visualization Optimization via Computational Modeling of Perception",
"doi": null,
"abstractUrl": "/journal/tg/2012/02/ttg2012020309/13rRUxBJhmP",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aivr/2019/5604/0/560400a134",
"title": "Coordinate: A Spreadsheet-Programmable Augmented Reality Framework for Immersive Map-Based Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/aivr/2019/560400a134/1grOjr3Lbfq",
"parentPublication": {
"id": "proceedings/aivr/2019/5604/0",
"title": "2019 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNz5JC3h",
"title": "Learning and Adaptive Behaviors for Robotic Systems, ECSIS Symposium on",
"acronym": "lab-rs",
"groupId": "1002409",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx3q6WW",
"doi": "10.1109/LAB-RS.2008.14",
"title": "Using Cognitive Semantics to Integrate Perception and Motion in a Behavior-Based Robot",
"normalizedTitle": "Using Cognitive Semantics to Integrate Perception and Motion in a Behavior-Based Robot",
"abstract": "The ADAPT project is a collaboration of three universities building a unified architecture for mobile robots. The goal of this project is to endow robots with the full range of cognitive abilities, including perception, use of natural language, learning and the ability to solve complex problems. The perspective of this work is that such anarchitecture should be based on language and visualization. ADAPT is based on an the structure and semantics of language, and more specifically on algebraic linguistics and visualization of semantics. ADAPT organizes its knowledge using linguistic robot schemas, which implement linguistic units within a concurrent, distributed programming language. Each schema is associated with one or more 3D visualizations that provide its semantics. These visualizations are dynamic, and are composed within a virtual world to create ADAPT’s representation of itself and its environment.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The ADAPT project is a collaboration of three universities building a unified architecture for mobile robots. The goal of this project is to endow robots with the full range of cognitive abilities, including perception, use of natural language, learning and the ability to solve complex problems. The perspective of this work is that such anarchitecture should be based on language and visualization. ADAPT is based on an the structure and semantics of language, and more specifically on algebraic linguistics and visualization of semantics. ADAPT organizes its knowledge using linguistic robot schemas, which implement linguistic units within a concurrent, distributed programming language. Each schema is associated with one or more 3D visualizations that provide its semantics. These visualizations are dynamic, and are composed within a virtual world to create ADAPT’s representation of itself and its environment.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The ADAPT project is a collaboration of three universities building a unified architecture for mobile robots. The goal of this project is to endow robots with the full range of cognitive abilities, including perception, use of natural language, learning and the ability to solve complex problems. The perspective of this work is that such anarchitecture should be based on language and visualization. ADAPT is based on an the structure and semantics of language, and more specifically on algebraic linguistics and visualization of semantics. ADAPT organizes its knowledge using linguistic robot schemas, which implement linguistic units within a concurrent, distributed programming language. Each schema is associated with one or more 3D visualizations that provide its semantics. These visualizations are dynamic, and are composed within a virtual world to create ADAPT’s representation of itself and its environment.",
"fno": "3272a077",
"keywords": [
"Cognitive Semantics",
"Linguistics",
"Visualization",
"Mobile Robotics"
],
"authors": [
{
"affiliation": null,
"fullName": "D. Paul Benjamin",
"givenName": "D. Paul",
"surname": "Benjamin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Deryle Lonsdale",
"givenName": "Deryle",
"surname": "Lonsdale",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Damian Lyons",
"givenName": "Damian",
"surname": "Lyons",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Siddtharth Patel",
"givenName": "Siddtharth",
"surname": "Patel",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "lab-rs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-08-01T00:00:00",
"pubType": "proceedings",
"pages": "77-82",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3272-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3272a071",
"articleId": "12OmNzd7bP9",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3272a083",
"articleId": "12OmNBUAvVx",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsc/2009/3800/0/3800a261",
"title": "Semantics in Cognitive Radio",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2009/3800a261/12OmNqGitXo",
"parentPublication": {
"id": "proceedings/icsc/2009/3800/0",
"title": "2009 IEEE International Conference on Semantic Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2012/4859/0/4859a052",
"title": "Cognitive Linguistics as the Underlying Framework for Semantic Annotation",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2012/4859a052/12OmNxFaLs6",
"parentPublication": {
"id": "proceedings/icsc/2012/4859/0",
"title": "2012 IEEE Sixth International Conference on Semantic Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccicc/2014/6081/0/06921431",
"title": "Overcoming the fear of semantics",
"doi": null,
"abstractUrl": "/proceedings-article/iccicc/2014/06921431/12OmNy5hRnW",
"parentPublication": {
"id": "proceedings/iccicc/2014/6081/0",
"title": "2014 IEEE 13th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b100",
"title": "Construction of a Bilingual Cognitive Property Knowledgebase",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b100/12OmNyQGS9S",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kmn/2002/1778/0/17780171",
"title": "Dynamic Semantics of Cognitive Agent Language",
"doi": null,
"abstractUrl": "/proceedings-article/kmn/2002/17780171/12OmNyv7mm2",
"parentPublication": {
"id": "proceedings/kmn/2002/1778/0",
"title": "Proceedings IEEE Workshop on Knowledge Media Networking",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iisa/2018/8161/0/08633668",
"title": "Neural Embeddings for Metaphor Detection in a Corpus of Greek Texts",
"doi": null,
"abstractUrl": "/proceedings-article/iisa/2018/08633668/17D45VtKiuO",
"parentPublication": {
"id": "proceedings/iisa/2018/8161/0",
"title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2018/6420/0/642000i591",
"title": "SemStyle: Learning to Generate Stylised Image Captions Using Unaligned Text",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2018/642000i591/17D45WZZ7DB",
"parentPublication": {
"id": "proceedings/cvpr/2018/6420/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600r7969",
"title": "Comprehending and Ordering Semantics for Image Captioning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600r7969/1H1m1jocA1O",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2023/8263/0/826300a155",
"title": "Transformers, Tables and Frame Semantics",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2023/826300a155/1LFKQtwJ8J2",
"parentPublication": {
"id": "proceedings/icsc/2023/8263/0",
"title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edoc/2019/2702/0/270200a132",
"title": "Modelling the Semantics for Model-Driven Interactive Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/edoc/2019/270200a132/1grPYiG4sbC",
"parentPublication": {
"id": "proceedings/edoc/2019/2702/0",
"title": "2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNzy7uOF",
"title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx9nGLN",
"doi": "10.1109/IV.2004.1320194",
"title": "Learning from Architects: The Difference between Knowledge Visualization and Information Visualization",
"normalizedTitle": "Learning from Architects: The Difference between Knowledge Visualization and Information Visualization",
"abstract": "This paper focuses on an aspect which has been neglected, but which is decisive: The transfer of knowledge to different stakeholders; especially the transfer of insights derived from information visualization tools. In knowledge management the transfer of knowledge is a core process, which can be improved by using our innate abilities to process visual representations. The potential of visualizations are manifold. But business managers miss a holistic framework on the use of visualization methods for information exploration and communication tasks. This paper analyzes how architects use visualizations to amplify cognition and to transfer knowledge. It introduces a mediating framework that brings together isolated research directions and defines the new research focus knowledge visualization. Knowledge visualization examines the use of visualizations for the transfer of knowledge between at least two peoples. We found that the new focus is decisive and has implications for researchers in information visualization and knowledge management.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper focuses on an aspect which has been neglected, but which is decisive: The transfer of knowledge to different stakeholders; especially the transfer of insights derived from information visualization tools. In knowledge management the transfer of knowledge is a core process, which can be improved by using our innate abilities to process visual representations. The potential of visualizations are manifold. But business managers miss a holistic framework on the use of visualization methods for information exploration and communication tasks. This paper analyzes how architects use visualizations to amplify cognition and to transfer knowledge. It introduces a mediating framework that brings together isolated research directions and defines the new research focus knowledge visualization. Knowledge visualization examines the use of visualizations for the transfer of knowledge between at least two peoples. We found that the new focus is decisive and has implications for researchers in information visualization and knowledge management.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper focuses on an aspect which has been neglected, but which is decisive: The transfer of knowledge to different stakeholders; especially the transfer of insights derived from information visualization tools. In knowledge management the transfer of knowledge is a core process, which can be improved by using our innate abilities to process visual representations. The potential of visualizations are manifold. But business managers miss a holistic framework on the use of visualization methods for information exploration and communication tasks. This paper analyzes how architects use visualizations to amplify cognition and to transfer knowledge. It introduces a mediating framework that brings together isolated research directions and defines the new research focus knowledge visualization. Knowledge visualization examines the use of visualizations for the transfer of knowledge between at least two peoples. We found that the new focus is decisive and has implications for researchers in information visualization and knowledge management.",
"fno": "21770519",
"keywords": [
"Knowledge Visualization",
"Information Visualization",
"Knowledge Transfer",
"Knowledge Management"
],
"authors": [
{
"affiliation": "University of St. Gallen",
"fullName": "Remo A. Burkhard",
"givenName": "Remo A.",
"surname": "Burkhard",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-07-01T00:00:00",
"pubType": "proceedings",
"pages": "519-524",
"year": "2004",
"issn": "1093-9547",
"isbn": "0-7695-2177-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21770513",
"articleId": "12OmNCcbDXS",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21770527",
"articleId": "12OmNzYNNlH",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hicss/2012/4525/0/4525e001",
"title": "Dynamic Knowledge Mapping: A Visualization Approach for Knowledge Management Systems",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2012/4525e001/12OmNASraz1",
"parentPublication": {
"id": "proceedings/hicss/2012/4525/0",
"title": "2012 45th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssme/2009/3729/0/3729a120",
"title": "The Model and Strategy of Knowledge Transfer in Project Environments",
"doi": null,
"abstractUrl": "/proceedings-article/ssme/2009/3729a120/12OmNCdk2vk",
"parentPublication": {
"id": "proceedings/ssme/2009/3729/0",
"title": "2009 IITA International Conference on Services Science, Management and Engineering (SSME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isise/2009/6325/0/05447200",
"title": "The Effect of Knowledge Transfer Intention of Customer on Knowledge Transfer Behavior: A Social Exchange Perspective",
"doi": null,
"abstractUrl": "/proceedings-article/isise/2009/05447200/12OmNs5rkY0",
"parentPublication": {
"id": "proceedings/isise/2009/6325/0",
"title": "2009 Second International Symposium on Information Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cason/2010/4202/0/4202a430",
"title": "Research on the Relationships between Knowledge Potential Difference and Knowledge Transfer Based on the Knowledge Network of Enterprise, University and Research Institute",
"doi": null,
"abstractUrl": "/proceedings-article/cason/2010/4202a430/12OmNx6PiDi",
"parentPublication": {
"id": "proceedings/cason/2010/4202/0",
"title": "Computational Aspects of Social Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2014/4038/0/4038a714",
"title": "Ontological Engineering in Education: Tools for Knowledge Transfer and Knowledge Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2014/4038a714/12OmNxzMo1I",
"parentPublication": {
"id": "proceedings/icalt/2014/4038/0",
"title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2005/2397/0/23970377",
"title": "A Case Study Based Approach to Knowledge Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2005/23970377/12OmNyXMQeu",
"parentPublication": {
"id": "proceedings/iv/2005/2397/0",
"title": "Ninth International Conference on Information Visualisation (IV'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/2/3357c767",
"title": "The Application of Visualization Technology on Knowledge Management",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357c767/12OmNzFv4hI",
"parentPublication": {
"id": "icicta/2008/3357/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2009/01/mcg2009010012",
"title": "Data, Information, and Knowledge in Visualization",
"doi": null,
"abstractUrl": "/magazine/cg/2009/01/mcg2009010012/13rRUx0geC1",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2012/01/mcg2012010012",
"title": "Scientific Storytelling Using Visualization",
"doi": null,
"abstractUrl": "/magazine/cg/2012/01/mcg2012010012/13rRUyuegjn",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552844",
"title": "<italic>KG4Vis:</italic> A Knowledge Graph-Based Approach for Visualization Recommendation",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552844/1xic3q426Os",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNAnMuCK",
"title": "Computer-Human Interaction, Australasian Conference on",
"acronym": "ozchi",
"groupId": "1000154",
"volume": "0",
"displayVolume": "0",
"year": "1998",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyuPLbI",
"doi": "10.1109/OZCHI.1998.732215",
"title": "Integrating Metric Visualization into a Commercial User-Interface Builder",
"normalizedTitle": "Integrating Metric Visualization into a Commercial User-Interface Builder",
"abstract": "Interactive Metric Visualization gives interface designers information about the usability of their designs, by overlaying usability information into their designs. To date, visualizations have been provided by special-purpose prototype software. We describe how visualizations can be integrated into a commercial interface design tool, VisualWorks Smalltalk. This integration provides the benefits of metric visualization to the users of the tool, illustrates the effort required to support visualization in similar tools, and will support further experiments with metrics visualization techniques.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Interactive Metric Visualization gives interface designers information about the usability of their designs, by overlaying usability information into their designs. To date, visualizations have been provided by special-purpose prototype software. We describe how visualizations can be integrated into a commercial interface design tool, VisualWorks Smalltalk. This integration provides the benefits of metric visualization to the users of the tool, illustrates the effort required to support visualization in similar tools, and will support further experiments with metrics visualization techniques.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Interactive Metric Visualization gives interface designers information about the usability of their designs, by overlaying usability information into their designs. To date, visualizations have been provided by special-purpose prototype software. We describe how visualizations can be integrated into a commercial interface design tool, VisualWorks Smalltalk. This integration provides the benefits of metric visualization to the users of the tool, illustrates the effort required to support visualization in similar tools, and will support further experiments with metrics visualization techniques.",
"fno": "92060200",
"keywords": [
"Interactive Metric Visualization",
"Software Visualization",
"Object Oriented",
"User Interface Design",
"Smalltalk"
],
"authors": [
{
"affiliation": "Macquarie University",
"fullName": "James Noble",
"givenName": "James",
"surname": "Noble",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ozchi",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1998-11-01T00:00:00",
"pubType": "proceedings",
"pages": "200",
"year": "1998",
"issn": null,
"isbn": "0-8186-9206-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "92060192",
"articleId": "12OmNrkT7HV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "92060208",
"articleId": "12OmNzn3924",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1jIx7fmpQ9a",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1jIxfA3tlUk",
"doi": "10.1109/VR46266.2020.00084",
"title": "Graphical Perception for Immersive Analytics",
"normalizedTitle": "Graphical Perception for Immersive Analytics",
"abstract": "Immersive Analytics (IA) uses immersive virtual and augmented reality displays for data visualization and visual analytics. Designers rely on studies of how accurately people interpret data in different visualizations to make effective visualization choices. However, these studies focus on data analysis in traditional desktop environments. We lack empirical grounding for how to best visualize data in immersive environments. This study explores how people interpret data visualizations across different display types by measuring how quickly and accurately people conduct three analysis tasks over five visual channels: color, size, height, orientation, and depth. We identify key quantitative differences in performance and user behavior, indicating that stereo viewing resolves some of the challenges of visualizations in 3D space. We also find that while AR displays encourage increased navigation, they decrease performance with color-based visualizations. Our results provide guidelines on how to tailor visualizations to different displays in order to better leverage the affordances of IA modalities.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Immersive Analytics (IA) uses immersive virtual and augmented reality displays for data visualization and visual analytics. Designers rely on studies of how accurately people interpret data in different visualizations to make effective visualization choices. However, these studies focus on data analysis in traditional desktop environments. We lack empirical grounding for how to best visualize data in immersive environments. This study explores how people interpret data visualizations across different display types by measuring how quickly and accurately people conduct three analysis tasks over five visual channels: color, size, height, orientation, and depth. We identify key quantitative differences in performance and user behavior, indicating that stereo viewing resolves some of the challenges of visualizations in 3D space. We also find that while AR displays encourage increased navigation, they decrease performance with color-based visualizations. Our results provide guidelines on how to tailor visualizations to different displays in order to better leverage the affordances of IA modalities.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Immersive Analytics (IA) uses immersive virtual and augmented reality displays for data visualization and visual analytics. Designers rely on studies of how accurately people interpret data in different visualizations to make effective visualization choices. However, these studies focus on data analysis in traditional desktop environments. We lack empirical grounding for how to best visualize data in immersive environments. This study explores how people interpret data visualizations across different display types by measuring how quickly and accurately people conduct three analysis tasks over five visual channels: color, size, height, orientation, and depth. We identify key quantitative differences in performance and user behavior, indicating that stereo viewing resolves some of the challenges of visualizations in 3D space. We also find that while AR displays encourage increased navigation, they decrease performance with color-based visualizations. Our results provide guidelines on how to tailor visualizations to different displays in order to better leverage the affordances of IA modalities.",
"fno": "09089446",
"keywords": [
"Data Visualization",
"Task Analysis",
"Image Color Analysis",
"Visualization",
"Navigation",
"Three Dimensional Displays",
"Two Dimensional Displays",
"Human Centered Computing X 2014 Visualization X 2014 Empirical Studies In Visualization",
"Human Centered Computing X 2014 Human Computer Interaction HCI X 2014 Interaction Paradigms X 2014 Mixed Augmented Reality",
"Human Centered Computing X 2014 Human Computer Interaction HCI X 2014 Interaction Paradigms X 2014 Virtual Reality"
],
"authors": [
{
"affiliation": "University of Colorado – Boulder",
"fullName": "Matt Whitlock",
"givenName": "Matt",
"surname": "Whitlock",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Colorado – Boulder",
"fullName": "Stephen Smart",
"givenName": "Stephen",
"surname": "Smart",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Colorado – Boulder",
"fullName": "Danielle Albers Szafir",
"givenName": "Danielle Albers",
"surname": "Szafir",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-03-01T00:00:00",
"pubType": "proceedings",
"pages": "616-625",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-5608-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09089581",
"articleId": "1jIx7AbnvIA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09089452",
"articleId": "1jIxcobDHi0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vr/2017/6647/0/07892264",
"title": "Group immersive education with digital fulldome planetariums",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2017/07892264/12OmNxiKs1k",
"parentPublication": {
"id": "proceedings/vr/2017/6647/0",
"title": "2017 IEEE Virtual Reality (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2015/7343/0/07314296",
"title": "Immersive Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2015/07314296/12OmNzVXNSO",
"parentPublication": {
"id": "proceedings/bdva/2015/7343/0",
"title": "2015 Big Data Visual Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/07/07390081",
"title": "A Study of Layout, Rendering, and Interaction Methods for Immersive Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2016/07/07390081/13rRUxly8XJ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2018/9194/0/08533892",
"title": "Axes and Coordinate Systems Representations for Immersive Analytics of Multi-Dimensional Data",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2018/08533892/17D45WYQJ8j",
"parentPublication": {
"id": "proceedings/bdva/2018/9194/0",
"title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2018/9194/0/08533893",
"title": "Building Multiple Coordinated Spaces for Effective Immersive Analytics through Distributed Cognition",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2018/08533893/17D45Wuc3a3",
"parentPublication": {
"id": "proceedings/bdva/2018/9194/0",
"title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vrw/2022/8402/0/840200a950",
"title": "[DC] Annotation in Asynchronous Collaborative Immersive Analytic Environments using Augmented Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vrw/2022/840200a950/1CJefBkSOY0",
"parentPublication": {
"id": "proceedings/vrw/2022/8402/0",
"title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/03/08770302",
"title": "Survey of Immersive Analytics",
"doi": null,
"abstractUrl": "/journal/tg/2021/03/08770302/1bTRatYkzoA",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797978",
"title": "IATK: An Immersive Analytics Toolkit",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797978/1cJ0GweguUo",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09222313",
"title": "ShuttleSpace: Exploring and Analyzing Movement Trajectory in Immersive Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09222313/1nTr29xEpkk",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aivr/2020/7463/0/746300a055",
"title": "DatAR: An Immersive Literature Exploration Environment for Neuroscientists",
"doi": null,
"abstractUrl": "/proceedings-article/aivr/2020/746300a055/1qpzDRXTjl6",
"parentPublication": {
"id": "proceedings/aivr/2020/7463/0",
"title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCmpcNk",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAY79q0",
"doi": "10.1109/VIS.2005.1",
"title": "2D Asymmetric Tensor Analysis",
"normalizedTitle": "2D Asymmetric Tensor Analysis",
"abstract": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"fno": "27660001",
"keywords": [
"Critical Points",
"General Tensors",
"Symmetric Tensors",
"Degenerate Tensors",
"Tensor Topology",
"Topological Lines",
"Hyperstreamlines"
],
"authors": [
{
"affiliation": "University of California, Santa Cruz",
"fullName": "Xiaoqiang Zheng",
"givenName": "Xiaoqiang",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California, Santa Cruz",
"fullName": "Alex Pang",
"givenName": "Alex",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1",
"year": "2005",
"issn": null,
"isbn": "0-7803-9462-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01532786",
"articleId": "12OmNwe2Im1",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01532787",
"articleId": "12OmNs0C9UL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2004/8788/0/87880313",
"title": "Topological Lines in 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880313/12OmNApLGKA",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660002",
"title": "Exploring 2D Tensor Fields Using Stress Nets",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660002/12OmNBCZnRL",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532770",
"title": "2D asymmetric tensor analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532770/12OmNCw3z9K",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660070",
"title": "Topological Structures of 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660070/12OmNxeusY2",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620059",
"title": "Singularities in nonuniform tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620059/12OmNzFMFiX",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2004/8788/0/87880123",
"title": "Physically Based Methods for Tensor Field Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880123/12OmNzTppFk",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2005/04/v0395",
"title": "Topological Lines in 3D Tensor Fields and Discriminant Hessian Factorization",
"doi": null,
"abstractUrl": "/journal/tg/2005/04/v0395/13rRUIM2VGT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/ttg2008061627",
"title": "Invariant Crease Lines for Topological and Structural Analysis of Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/ttg2008061627/13rRUxASu0F",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011121979",
"title": "Asymmetric Tensor Field Visualization for Surfaces",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011121979/13rRUygT7fa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552927",
"title": "Feature Curves and Surfaces of 3D Asymmetric Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552927/1xic6oeRxnO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNxWuirg",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNApLGKA",
"doi": "10.1109/VISUAL.2004.105",
"title": "Topological Lines in 3D Tensor Fields",
"normalizedTitle": "Topological Lines in 3D Tensor Fields",
"abstract": "Visualization of 3D tensor fields continues to be a major challenge in terms of providing intuitive and uncluttered images that allow the users to better understand their data. The primary focus of this paper is on finding a formulation that lends itself to a stable numerical algorithm for extracting stable and persistent topological features from 2nd order real symmetric 3D tensors. While features in 2D tensors can be identified as either wedge or trisector points, in 3D, the corresponding stable features are lines, not just points. These topological feature lines provide a compact representation of the 3D tensor field and are essential in helping scientists and engineers understand their complex nature. Existing techniques work by finding degenerate points and are not numerically stable, and worse, produce both false positive and false negative feature points. This paper seeks to address this problem with a robust algorithm that can extract these features in a numerically stable, accurate, and complete manner.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Visualization of 3D tensor fields continues to be a major challenge in terms of providing intuitive and uncluttered images that allow the users to better understand their data. The primary focus of this paper is on finding a formulation that lends itself to a stable numerical algorithm for extracting stable and persistent topological features from 2nd order real symmetric 3D tensors. While features in 2D tensors can be identified as either wedge or trisector points, in 3D, the corresponding stable features are lines, not just points. These topological feature lines provide a compact representation of the 3D tensor field and are essential in helping scientists and engineers understand their complex nature. Existing techniques work by finding degenerate points and are not numerically stable, and worse, produce both false positive and false negative feature points. This paper seeks to address this problem with a robust algorithm that can extract these features in a numerically stable, accurate, and complete manner.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Visualization of 3D tensor fields continues to be a major challenge in terms of providing intuitive and uncluttered images that allow the users to better understand their data. The primary focus of this paper is on finding a formulation that lends itself to a stable numerical algorithm for extracting stable and persistent topological features from 2nd order real symmetric 3D tensors. While features in 2D tensors can be identified as either wedge or trisector points, in 3D, the corresponding stable features are lines, not just points. These topological feature lines provide a compact representation of the 3D tensor field and are essential in helping scientists and engineers understand their complex nature. Existing techniques work by finding degenerate points and are not numerically stable, and worse, produce both false positive and false negative feature points. This paper seeks to address this problem with a robust algorithm that can extract these features in a numerically stable, accurate, and complete manner.",
"fno": "87880313",
"keywords": [
"Hyperstreamlines",
"Real Symmetric Tensors",
"Degenerate Tensors",
"Tensor Topology",
"Topological Lines"
],
"authors": [
{
"affiliation": "University of California at Santa Cruz",
"fullName": "Xiaoqiang Zheng",
"givenName": "Xiaoqiang",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California at Santa Cruz",
"fullName": "Alex Pang",
"givenName": "Alex",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-10-01T00:00:00",
"pubType": "proceedings",
"pages": "313-320",
"year": "2004",
"issn": null,
"isbn": "0-7803-8788-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "87880305",
"articleId": "12OmNAFWONQ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "87880321",
"articleId": "12OmNCd2rFT",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2005/2766/0/27660001",
"title": "2D Asymmetric Tensor Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660001/12OmNAY79q0",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660005",
"title": "Visualizing Tensor Fields in Geomechanics",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660005/12OmNvpewaO",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660004",
"title": "HOT- Lines: Tracking Lines in Higher Order Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660004/12OmNwMXnqd",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532841",
"title": "Topological structures of 3D tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532841/12OmNx5GTXp",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660070",
"title": "Topological Structures of 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660070/12OmNxeusY2",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620059",
"title": "Singularities in nonuniform tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620059/12OmNzFMFiX",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532773",
"title": "HOT-lines: tracking lines in higher order tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532773/12OmNzWx07T",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2005/04/v0395",
"title": "Topological Lines in 3D Tensor Fields and Discriminant Hessian Factorization",
"doi": null,
"abstractUrl": "/journal/tg/2005/04/v0395/13rRUIM2VGT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/07/08967163",
"title": "Visualization of 3D Stress Tensor Fields Using Superquadric Glyphs on Displacement Streamlines",
"doi": null,
"abstractUrl": "/journal/tg/2021/07/08967163/1gPjyn904OA",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552927",
"title": "Feature Curves and Surfaces of 3D Asymmetric Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552927/1xic6oeRxnO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCmpcNk",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCw3z9K",
"doi": "10.1109/VISUAL.2005.1532770",
"title": "2D asymmetric tensor analysis",
"normalizedTitle": "2D asymmetric tensor analysis",
"abstract": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to analyzing symmetric second order tensor fields. In this paper, we extend the topological analysis to 2D general (asymmetric) second order tensor fields. We show that it is not sufficient to define degeneracies based on eigenvalues alone, but one must also include the eigenvectors in the analysis. We also study the behavior of these eigenvectors as they cross from one topological region into another.",
"fno": "01532770",
"keywords": [
"Data Visualisation",
"Tensors",
"Eigenvalues And Eigenfunctions",
"Topology",
"2 D Asymmetric Tensor Analysis",
"Topological Structure",
"Eigenvectors Analysis",
"Tensile Stress",
"Eigenvalues And Eigenfunctions",
"Topology",
"Visualization",
"Computer Science",
"Chromium",
"Computer Graphics",
"Biomedical Imaging",
"Ellipsoids",
"Plastics"
],
"authors": [
{
"affiliation": "Comput. Sci. Dept., California Univ., Santa Cruz, CA, USA",
"fullName": "X. Zheng",
"givenName": "X.",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Comput. Sci. Dept., California Univ., Santa Cruz, CA, USA",
"fullName": "A. Pang",
"givenName": "A.",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-01-01T00:00:00",
"pubType": "proceedings",
"pages": "3,4,5,6,7,8,9,10",
"year": "2005",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": null,
"next": {
"fno": "01532771",
"articleId": "12OmNzmtWye",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2005/2766/0/27660001",
"title": "2D Asymmetric Tensor Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660001/12OmNAY79q0",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1994/6627/0/00346326",
"title": "The topology of symmetric, second-order tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1994/00346326/12OmNvxKu1Q",
"parentPublication": {
"id": "proceedings/visual/1994/6627/0",
"title": "Proceedings Visualization '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532841",
"title": "Topological structures of 3D tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532841/12OmNx5GTXp",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660070",
"title": "Topological Structures of 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660070/12OmNxeusY2",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532771",
"title": "Exploring 2D tensor fields using stress nets",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532771/12OmNzmtWye",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/01/07539639",
"title": "Glyphs for General Second-Order 2D and 3D Tensors",
"doi": null,
"abstractUrl": "/journal/tg/2017/01/07539639/13rRUwwJWFR",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/05/v1189",
"title": "Analyzing Vortex Breakdown Flow Structures by Assignment of Colors to Tensor Invariants",
"doi": null,
"abstractUrl": "/journal/tg/2006/05/v1189/13rRUxjQyv8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08453873",
"title": "Robust and Fast Extraction of 3D Symmetric Tensor Field Topology",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08453873/17D45WHONif",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/01/08805436",
"title": "Multi-Scale Topological Analysis of Asymmetric Tensor Fields on Surfaces",
"doi": null,
"abstractUrl": "/journal/tg/2020/01/08805436/1cG4IGNd2Y8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552927",
"title": "Feature Curves and Surfaces of 3D Asymmetric Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552927/1xic6oeRxnO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNvlPkDE",
"title": "Proceedings Visualization '94",
"acronym": "visual",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvxKu1Q",
"doi": "10.1109/VISUAL.1994.346326",
"title": "The topology of symmetric, second-order tensor fields",
"normalizedTitle": "The topology of symmetric, second-order tensor fields",
"abstract": "We study the topology of symmetric, second-order tensor fields. The goal is to represent their complex structure by a simple set of carefully chosen points and lines analogous to vector field topology. We extract topological skeletons of the eigenvector fields, and we track their evolution over time. We study tensor topological transitions and correlate tensor and vector data. The basic constituents of tensor topology are the degenerate points, or points where eigenvalues are equal to each other. Degenerate points play a similar role as critical points in vector fields. We identify two kinds of elementary degenerate points, which we call wedges and trisectors. They can combine to form more familiar singularities-such as saddles, nodes, centers, or foci. However, these are generally unstable structures in tensor fields. Finally, we show a topological rule that puts a constraint on the topology of tensor fields defined across surfaces, extending to tensor fields the Poincare-Hopf theorem for vector fields.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "We study the topology of symmetric, second-order tensor fields. The goal is to represent their complex structure by a simple set of carefully chosen points and lines analogous to vector field topology. We extract topological skeletons of the eigenvector fields, and we track their evolution over time. We study tensor topological transitions and correlate tensor and vector data. The basic constituents of tensor topology are the degenerate points, or points where eigenvalues are equal to each other. Degenerate points play a similar role as critical points in vector fields. We identify two kinds of elementary degenerate points, which we call wedges and trisectors. They can combine to form more familiar singularities-such as saddles, nodes, centers, or foci. However, these are generally unstable structures in tensor fields. Finally, we show a topological rule that puts a constraint on the topology of tensor fields defined across surfaces, extending to tensor fields the Poincare-Hopf theorem for vector fields.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We study the topology of symmetric, second-order tensor fields. The goal is to represent their complex structure by a simple set of carefully chosen points and lines analogous to vector field topology. We extract topological skeletons of the eigenvector fields, and we track their evolution over time. We study tensor topological transitions and correlate tensor and vector data. The basic constituents of tensor topology are the degenerate points, or points where eigenvalues are equal to each other. Degenerate points play a similar role as critical points in vector fields. We identify two kinds of elementary degenerate points, which we call wedges and trisectors. They can combine to form more familiar singularities-such as saddles, nodes, centers, or foci. However, these are generally unstable structures in tensor fields. Finally, we show a topological rule that puts a constraint on the topology of tensor fields defined across surfaces, extending to tensor fields the Poincare-Hopf theorem for vector fields.",
"fno": "00346326",
"keywords": [
"Topology",
"Eigenvalues And Eigenfunctions",
"Tensors",
"Vectors",
"Data Visualisation",
"Symmetric Second Order Tensor Fields",
"Topology",
"Vector Field Topology",
"Topological Skeletons",
"Eigenvector Fields",
"Tensor Topological Transitions",
"Vector Data",
"Tensor Topology",
"Eigenvalues",
"Elementary Degenerate Points",
"Wedges",
"Trisectors",
"Saddles",
"Nodes",
"Centers",
"Foci",
"Topological Rule",
"Poincare Hopf Theorem",
"Vector Fields",
"Tensor Fields",
"Topology",
"Tensile Stress",
"Skeleton",
"Eigenvalues And Eigenfunctions",
"Data Visualization",
"Joining Processes",
"Physics",
"Data Mining",
"Constraint Theory",
"Fluid Flow"
],
"authors": [
{
"affiliation": "Dept. of Appl. Phys., Stanford Univ., CA, USA",
"fullName": "T. Delmarcelle",
"givenName": "T.",
"surname": "Delmarcelle",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "L. Hesselink",
"givenName": "L.",
"surname": "Hesselink",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "visual",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "140-147, CP15",
"year": "1994",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00346325",
"articleId": "12OmNx3Zjpb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00346327",
"articleId": "12OmNAIvcXE",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2005/2766/0/01532770",
"title": "2D asymmetric tensor analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532770/12OmNCw3z9K",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532841",
"title": "Topological structures of 3D tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532841/12OmNx5GTXp",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620059",
"title": "Singularities in nonuniform tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620059/12OmNzFMFiX",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1997/01/v0001",
"title": "The Topology of Symmetric, Second-Order 3D Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/1997/01/v0001/13rRUILc8f6",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/03/07286850",
"title": "Feature Surfaces in Symmetric Tensor Fields Based on Eigenvalue Manifold",
"doi": null,
"abstractUrl": "/journal/tg/2016/03/07286850/13rRUwhpBE8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2007/01/v0094",
"title": "Interactive Tensor Field Design and Visualization on Surfaces",
"doi": null,
"abstractUrl": "/journal/tg/2007/01/v0094/13rRUxASuG8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06933942",
"title": "A Topologically-Informed Hyperstreamline Seeding Method for Alignment Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06933942/13rRUxly8XG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/1993/04/mcg1993040025",
"title": "Visualizing Second-Order Tensor Fields with Hyperstreamlines",
"doi": null,
"abstractUrl": "/magazine/cg/1993/04/mcg1993040025/13rRUyv53HF",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08453873",
"title": "Robust and Fast Extraction of 3D Symmetric Tensor Field Topology",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08453873/17D45WHONif",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552927",
"title": "Feature Curves and Surfaces of 3D Asymmetric Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552927/1xic6oeRxnO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCmpcNk",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx5GTXp",
"doi": "10.1109/VISUAL.2005.1532841",
"title": "Topological structures of 3D tensor fields",
"normalizedTitle": "Topological structures of 3D tensor fields",
"abstract": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular slate. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular slate. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular slate. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"fno": "01532841",
"keywords": [
"Computational Geometry",
"Tensors",
"Eigenvalues And Eigenfunctions",
"Surface Fitting",
"Curve Fitting",
"3 D Tensor Field",
"Tensor Topology",
"Eigenvectors",
"3 D Separating Surfaces",
"Perturbation Theory",
"Eigenvalues",
"Curve Fitting",
"Tensile Stress",
"Topology",
"Switches",
"Computer Science",
"Eigenvalues And Eigenfunctions",
"Feature Extraction",
"Mathematics",
"Spine",
"Chromium",
"Computer Graphics"
],
"authors": [
{
"affiliation": "Comput. Sci. Dept., UCSC, Santa Cruz, CA, USA",
"fullName": "X. Zheng",
"givenName": "X.",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "B. Parlett",
"givenName": "B.",
"surname": "Parlett",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "A. Pang",
"givenName": "A.",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-01-01T00:00:00",
"pubType": "proceedings",
"pages": "551,552,553,554,555,556,557,558",
"year": "2005",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "27660056",
"articleId": "12OmNAGepUL",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "27660057",
"articleId": "12OmNwwd30n",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2004/8788/0/87880313",
"title": "Topological Lines in 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880313/12OmNApLGKA",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532770",
"title": "2D asymmetric tensor analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532770/12OmNCw3z9K",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1994/6627/0/00346326",
"title": "The topology of symmetric, second-order tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1994/00346326/12OmNvxKu1Q",
"parentPublication": {
"id": "proceedings/visual/1994/6627/0",
"title": "Proceedings Visualization '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660070",
"title": "Topological Structures of 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660070/12OmNxeusY2",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1997/01/v0001",
"title": "The Topology of Symmetric, Second-Order 3D Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/1997/01/v0001/13rRUILc8f6",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2005/04/v0395",
"title": "Topological Lines in 3D Tensor Fields and Discriminant Hessian Factorization",
"doi": null,
"abstractUrl": "/journal/tg/2005/04/v0395/13rRUIM2VGT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2016/03/07286850",
"title": "Feature Surfaces in Symmetric Tensor Fields Based on Eigenvalue Manifold",
"doi": null,
"abstractUrl": "/journal/tg/2016/03/07286850/13rRUwhpBE8",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/03/06933942",
"title": "A Topologically-Informed Hyperstreamline Seeding Method for Alignment Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2015/03/06933942/13rRUxly8XG",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08453873",
"title": "Robust and Fast Extraction of 3D Symmetric Tensor Field Topology",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08453873/17D45WHONif",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552927",
"title": "Feature Curves and Surfaces of 3D Asymmetric Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552927/1xic6oeRxnO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNCmpcNk",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxeusY2",
"doi": "10.1109/VIS.2005.105",
"title": "Topological Structures of 3D Tensor Fields",
"normalizedTitle": "Topological Structures of 3D Tensor Fields",
"abstract": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular state. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular state. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Tensor topology is useful in providing a simplified and yet detailed representation of a tensor field. Recently the field of 3D tensor topology is advanced by the discovery that degenerate tensors usually form lines in their most basic configurations. These lines form the backbone for further topological analysis. A number of ways for extracting and tracing the degenerate tensor lines have also been proposed. In this paper, we complete the previous work by studying the behavior and extracting the separating surfaces emanating from these degenerate lines. First, we show that analysis of eigenvectors around a 3D degenerate tensor can be reduced to 2D. That is, in most instances, the 3D separating surfaces are just the trajectory of the individual 2D separatrices which includes trisectors and wedges. But the proof is by no means trivial since it is closely related to perturbation theory around a pair of singular state. Such analysis naturally breaks down at the tangential points where the degenerate lines pass through the plane spanned by the eigenvectors associated with the repeated eigenvalues. Second, we show that the separatrices along a degenerate line may switch types (e.g. trisectors to wedges) exactly at the points where the eigenplane is tangential to the degenerate curve. This property leads to interesting and yet complicated configuration of surfaces around such transition points. Finally, we apply the technique to several common data sets to verify its correctness.",
"fno": "27660070",
"keywords": [
"Separating Surface",
"Trisectors",
"Wedges",
"Symmetric Tensors",
"Hyperstreamlines",
"Degenerate Tensors",
"Tensor Topology",
"Topological Lines"
],
"authors": [
{
"affiliation": "UCSC",
"fullName": "Xiaoqiang Zheng",
"givenName": "Xiaoqiang",
"surname": "Zheng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "UCB",
"fullName": "Beresford Parlett",
"givenName": "Beresford",
"surname": "Parlett",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "UCSC",
"fullName": "Alex Pang",
"givenName": "Alex",
"surname": "Pang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-10-01T00:00:00",
"pubType": "proceedings",
"pages": "70",
"year": "2005",
"issn": null,
"isbn": "0-7803-9462-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01532854",
"articleId": "12OmNvF83nf",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01532855",
"articleId": "12OmNBRsVxy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2005/2766/0/27660001",
"title": "2D Asymmetric Tensor Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660001/12OmNAY79q0",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2004/8788/0/87880313",
"title": "Topological Lines in 3D Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2004/87880313/12OmNApLGKA",
"parentPublication": {
"id": "proceedings/ieee-vis/2004/8788/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/visual/1994/6627/0/00346326",
"title": "The topology of symmetric, second-order tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/visual/1994/00346326/12OmNvxKu1Q",
"parentPublication": {
"id": "proceedings/visual/1994/6627/0",
"title": "Proceedings Visualization '94",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/27660004",
"title": "HOT- Lines: Tracking Lines in Higher Order Tensor Fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/27660004/12OmNwMXnqd",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532841",
"title": "Topological structures of 3D tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532841/12OmNx5GTXp",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620059",
"title": "Singularities in nonuniform tensor fields",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620059/12OmNzFMFiX",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1997/01/v0001",
"title": "The Topology of Symmetric, Second-Order 3D Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/1997/01/v0001/13rRUILc8f6",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2005/04/v0395",
"title": "Topological Lines in 3D Tensor Fields and Discriminant Hessian Factorization",
"doi": null,
"abstractUrl": "/journal/tg/2005/04/v0395/13rRUIM2VGT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/ttg2008061627",
"title": "Invariant Crease Lines for Topological and Structural Analysis of Tensor Fields",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/ttg2008061627/13rRUxASu0F",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09224154",
"title": "Mode Surfaces of Symmetric Tensor Fields: Topological Analysis and Seamless Extraction",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09224154/1nV63QG11le",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNynJMVB",
"title": "2017 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"acronym": "vizsec",
"groupId": "1810104",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyfdOR3",
"doi": "10.1109/VIZSEC.2017.8062195",
"title": "Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security",
"normalizedTitle": "Expert-interviews led analysis of EEVi — A model for effective visualization in cyber-security",
"abstract": "The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user involvement in the design process leads to visualizations that are generic and often ineffective for cyber-security analysts. Thus, the adoption of the resultant cyber-security visualizations is low and this highlights a major research gap. This paper presents expert-interview based validation of EEVi — a model developed to aid in the design and evaluation process of cyber-security visualizations, with a view to make them more effective for cyber-security analysts. A visualization is considered effective if the characteristics of the visualization are essential for an analyst to competently perform a certain task. Thirteen experts were interviewed (six visualization designers and seven cyber-security analysts) and their feedback guided revisions to the model. The responses were subsequently transposed from qualitative data to quantitive data in order to perform statistical analyses on the overall data. This demonstrated that the perspectives of visualization designers and cyber-security analysts generally agreed in their views of effective characteristics for cyber-security visualization, however there was no statistically significant correlation in their responses.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user involvement in the design process leads to visualizations that are generic and often ineffective for cyber-security analysts. Thus, the adoption of the resultant cyber-security visualizations is low and this highlights a major research gap. This paper presents expert-interview based validation of EEVi — a model developed to aid in the design and evaluation process of cyber-security visualizations, with a view to make them more effective for cyber-security analysts. A visualization is considered effective if the characteristics of the visualization are essential for an analyst to competently perform a certain task. Thirteen experts were interviewed (six visualization designers and seven cyber-security analysts) and their feedback guided revisions to the model. The responses were subsequently transposed from qualitative data to quantitive data in order to perform statistical analyses on the overall data. This demonstrated that the perspectives of visualization designers and cyber-security analysts generally agreed in their views of effective characteristics for cyber-security visualization, however there was no statistically significant correlation in their responses.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The area of visualization in cyber-security is advancing at a fast pace. However, there is a lack of standardized guidelines for designing and evaluating the resulting visualizations. Furthermore, limited end-user involvement in the design process leads to visualizations that are generic and often ineffective for cyber-security analysts. Thus, the adoption of the resultant cyber-security visualizations is low and this highlights a major research gap. This paper presents expert-interview based validation of EEVi — a model developed to aid in the design and evaluation process of cyber-security visualizations, with a view to make them more effective for cyber-security analysts. A visualization is considered effective if the characteristics of the visualization are essential for an analyst to competently perform a certain task. Thirteen experts were interviewed (six visualization designers and seven cyber-security analysts) and their feedback guided revisions to the model. The responses were subsequently transposed from qualitative data to quantitive data in order to perform statistical analyses on the overall data. This demonstrated that the perspectives of visualization designers and cyber-security analysts generally agreed in their views of effective characteristics for cyber-security visualization, however there was no statistically significant correlation in their responses.",
"fno": "08062195",
"keywords": [
"Computer Security",
"Data Visualization",
"Tools",
"Analytical Models",
"Guidelines",
"Cyber Security",
"Data Visualization",
"Qualitative Evaluation",
"Task And Requirements Analysis",
"Human Factors"
],
"authors": [
{
"affiliation": "Electronics and Computer Science, University of Southampton",
"fullName": "Aneesha Sethi",
"givenName": "Aneesha",
"surname": "Sethi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Electronics and Computer Science, University of Southampton",
"fullName": "Gary Wills",
"givenName": "Gary",
"surname": "Wills",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vizsec",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2693-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08062194",
"articleId": "12OmNwnYFW7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08062196",
"articleId": "12OmNBNM8Q4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vizsec/2015/7599/0/07312771",
"title": "Unlocking user-centered design methods for building cyber security visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2015/07312771/12OmNAWH9Ev",
"parentPublication": {
"id": "proceedings/vizsec/2015/7599/0",
"title": "2015 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2017/2693/0/08062200",
"title": "Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2017/08062200/12OmNC4wtMs",
"parentPublication": {
"id": "proceedings/vizsec/2017/2693/0",
"title": "2017 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2017/2693/0/08062201",
"title": "Towards designing effective visualizations for DNS-based network threat analysis",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2017/08062201/12OmNrAv3M3",
"parentPublication": {
"id": "proceedings/vizsec/2017/2693/0",
"title": "2017 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2012/4752/0/06400507",
"title": "Agile visual analytics for banking cyber “big data”",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2012/06400507/12OmNyPQ4EL",
"parentPublication": {
"id": "proceedings/vast/2012/4752/0",
"title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fas*w/2017/6558/0/08064155",
"title": "An Intelligent Security Assistant for Cyber Security Operations",
"doi": null,
"abstractUrl": "/proceedings-article/fas*w/2017/08064155/12OmNzXFoyB",
"parentPublication": {
"id": "proceedings/fas*w/2017/6558/0",
"title": "2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029565",
"title": "Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029565/17D45WIXbRN",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase-icess/2017/4906/0",
"title": "2017 IEEE Trustcom/BigDataSE/ICESS",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ncs/2018/7252/0/725200a016",
"title": "Allocating Security Analysts to Cyber Alerts Using Markov Games",
"doi": null,
"abstractUrl": "/proceedings-article/ncs/2018/725200a016/17D45XeKgmA",
"parentPublication": {
"id": "proceedings/ncs/2018/7252/0",
"title": "2018 National Cyber Summit (NCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2018/8194/0/08709187",
"title": "Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2018/08709187/19ZL1NrNwYM",
"parentPublication": {
"id": "proceedings/vizsec/2018/8194/0",
"title": "2018 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552186",
"title": "Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552186/1xic2Q1Po0E",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2021/2085/0/208500a001",
"title": "Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2021/208500a001/1z93N3tNIaY",
"parentPublication": {
"id": "proceedings/vizsec/2021/2085/0",
"title": "2021 IEEE Symposium on Visualization for Cyber Security (VizSec)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNyFCvPo",
"title": "2013 IEEE International Conference on Computer Vision (ICCV)",
"acronym": "iccv",
"groupId": "1000149",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzR8CzP",
"doi": "10.1109/ICCV.2013.86",
"title": "Tracking via Robust Multi-task Multi-view Joint Sparse Representation",
"normalizedTitle": "Tracking via Robust Multi-task Multi-view Joint Sparse Representation",
"abstract": "Combining multiple observation views has proven beneficial for tracking. In this paper, we cast tracking as a novel multi-task multi-view sparse learning problem and exploit the cues from multiple views including various types of visual features, such as intensity, color, and edge, where each feature observation can be sparsely represented by a linear combination of atoms from an adaptive feature dictionary. The proposed method is integrated in a particle filter framework where every view in each particle is regarded as an individual task. We jointly consider the underlying relationship between tasks across different views and different particles, and tackle it in a unified robust multi-task formulation. In addition, to capture the frequently emerging outlier tasks, we decompose the representation matrix to two collaborative components which enable a more robust and accurate approximation. We show that the proposed formulation can be efficiently solved using the Accelerated Proximal Gradient method with a small number of closed-form updates. The presented tracker is implemented using four types of features and is tested on numerous benchmark video sequences. Both the qualitative and quantitative results demonstrate the superior performance of the proposed approach compared to several state-of-the-art trackers.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Combining multiple observation views has proven beneficial for tracking. In this paper, we cast tracking as a novel multi-task multi-view sparse learning problem and exploit the cues from multiple views including various types of visual features, such as intensity, color, and edge, where each feature observation can be sparsely represented by a linear combination of atoms from an adaptive feature dictionary. The proposed method is integrated in a particle filter framework where every view in each particle is regarded as an individual task. We jointly consider the underlying relationship between tasks across different views and different particles, and tackle it in a unified robust multi-task formulation. In addition, to capture the frequently emerging outlier tasks, we decompose the representation matrix to two collaborative components which enable a more robust and accurate approximation. We show that the proposed formulation can be efficiently solved using the Accelerated Proximal Gradient method with a small number of closed-form updates. The presented tracker is implemented using four types of features and is tested on numerous benchmark video sequences. Both the qualitative and quantitative results demonstrate the superior performance of the proposed approach compared to several state-of-the-art trackers.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Combining multiple observation views has proven beneficial for tracking. In this paper, we cast tracking as a novel multi-task multi-view sparse learning problem and exploit the cues from multiple views including various types of visual features, such as intensity, color, and edge, where each feature observation can be sparsely represented by a linear combination of atoms from an adaptive feature dictionary. The proposed method is integrated in a particle filter framework where every view in each particle is regarded as an individual task. We jointly consider the underlying relationship between tasks across different views and different particles, and tackle it in a unified robust multi-task formulation. In addition, to capture the frequently emerging outlier tasks, we decompose the representation matrix to two collaborative components which enable a more robust and accurate approximation. We show that the proposed formulation can be efficiently solved using the Accelerated Proximal Gradient method with a small number of closed-form updates. The presented tracker is implemented using four types of features and is tested on numerous benchmark video sequences. Both the qualitative and quantitative results demonstrate the superior performance of the proposed approach compared to several state-of-the-art trackers.",
"fno": "2840a649",
"keywords": [
"Target Tracking",
"Robustness",
"Visualization",
"Dictionaries",
"Joints",
"Matrix Decomposition",
"Image Color Analysis",
"Sparse Representation",
"Tracking",
"Multi Task",
"Multi View",
"Outliers"
],
"authors": [
{
"affiliation": null,
"fullName": "Zhibin Hong",
"givenName": "Zhibin",
"surname": "Hong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xue Mei",
"givenName": "Xue",
"surname": "Mei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Danil Prokhorov",
"givenName": "Danil",
"surname": "Prokhorov",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dacheng Tao",
"givenName": "Dacheng",
"surname": "Tao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-12-01T00:00:00",
"pubType": "proceedings",
"pages": "649-656",
"year": "2013",
"issn": "1550-5499",
"isbn": "978-1-4799-2840-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2840a641",
"articleId": "12OmNvxKu0j",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2840a657",
"articleId": "12OmNBpmDPz",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2014/5118/0/5118b194",
"title": "Multi-cue Visual Tracking Using Robust Feature-Level Fusion Based on Joint Sparse Representation",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2014/5118b194/12OmNAnuTx2",
"parentPublication": {
"id": "proceedings/cvpr/2014/5118/0",
"title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2015/7632/0/07301775",
"title": "Online multi-modal task-driven dictionary learning and robust joint sparse representation for visual tracking",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2015/07301775/12OmNB0nWdy",
"parentPublication": {
"id": "proceedings/avss/2015/7632/0",
"title": "2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2012/2216/0/06460469",
"title": "Joint dynamic sparse learning and its application to multi-view face recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2012/06460469/12OmNqFJhEP",
"parentPublication": {
"id": "proceedings/icpr/2012/2216/0",
"title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2013/5545/0/06553787",
"title": "Video-based face recognition via joint sparse representation",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2013/06553787/12OmNqFJhPl",
"parentPublication": {
"id": "proceedings/fg/2013/5545/0",
"title": "2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2012/1226/0/258O2C04",
"title": "Robust visual tracking via multi-task sparse learning",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/258O2C04/12OmNwHhoPU",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2017/12/07855789",
"title": "Multi-View Multi-Instance Learning Based on Joint Sparse Representation and Multi-View Dictionary Learning",
"doi": null,
"abstractUrl": "/journal/tp/2017/12/07855789/13rRUEgs2Ne",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2015/04/06891248",
"title": "Single and Multiple Object Tracking Using a Multi-Feature Joint Sparse Representation",
"doi": null,
"abstractUrl": "/journal/tp/2015/04/06891248/13rRUwfZC1G",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2018/1737/0/08486581",
"title": "Robust Structured Multi-Task Multi-View Sparse Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486581/14jQfSmcyai",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbk/2018/9125/0/912500a091",
"title": "Robust Lifelong Multi-task Multi-view Representation Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icbk/2018/912500a091/17D45WKWnII",
"parentPublication": {
"id": "proceedings/icbk/2018/9125/0",
"title": "2018 IEEE International Conference on Big Knowledge (ICBK)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/bd/2022/04/09618849",
"title": "Multi-View Clustering With Self-Representation and Structural Constraint",
"doi": null,
"abstractUrl": "/journal/bd/2022/04/09618849/1yBAvmyuCGc",
"parentPublication": {
"id": "trans/bd",
"title": "IEEE Transactions on Big Data",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "12OmNy5hRdd",
"title": "2014 IEEE International Conference on Data Mining (ICDM)",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2014",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzkuKJl",
"doi": "10.1109/ICDM.2014.97",
"title": "Multi-graph-view Learning for Graph Classification",
"normalizedTitle": "Multi-graph-view Learning for Graph Classification",
"abstract": "Graph classification has traditionally focused on graphs generated from a single feature view. In many applications, it is common to have useful information from different channels/views to describe objects, which naturally results in a new representation with multiple graphs generated from different feature views being used to describe one object. In this paper, we formulate a new Multi-Graph-View learning task for graph classification, where each object to be classified contains graphs from multiple graph-views. This problem setting is essentially different from traditional single-graph-view graph classification, where graphs are from one single feature view. To solve the problem, we propose a Cross Graph-View Sub graph Feature based Learning (gCGVFL) algorithm that explores an optimal set of sub graphs, across multiple graph-views, as features to represent graphs. Specifically, we derive an evaluation criterion to estimate the discriminative power and the redundancy of sub graph features across all views, and assign proper weight values to each view to indicate its importance for graph classification. The iterative cross graph-view sub graph scoring and graph-view weight updating form a closed loop to find optimal sub graphs to represent graphs for multi-graph-view learning. Experiments and comparisons on real-world tasks demonstrate the algorithm's performance.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graph classification has traditionally focused on graphs generated from a single feature view. In many applications, it is common to have useful information from different channels/views to describe objects, which naturally results in a new representation with multiple graphs generated from different feature views being used to describe one object. In this paper, we formulate a new Multi-Graph-View learning task for graph classification, where each object to be classified contains graphs from multiple graph-views. This problem setting is essentially different from traditional single-graph-view graph classification, where graphs are from one single feature view. To solve the problem, we propose a Cross Graph-View Sub graph Feature based Learning (gCGVFL) algorithm that explores an optimal set of sub graphs, across multiple graph-views, as features to represent graphs. Specifically, we derive an evaluation criterion to estimate the discriminative power and the redundancy of sub graph features across all views, and assign proper weight values to each view to indicate its importance for graph classification. The iterative cross graph-view sub graph scoring and graph-view weight updating form a closed loop to find optimal sub graphs to represent graphs for multi-graph-view learning. Experiments and comparisons on real-world tasks demonstrate the algorithm's performance.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graph classification has traditionally focused on graphs generated from a single feature view. In many applications, it is common to have useful information from different channels/views to describe objects, which naturally results in a new representation with multiple graphs generated from different feature views being used to describe one object. In this paper, we formulate a new Multi-Graph-View learning task for graph classification, where each object to be classified contains graphs from multiple graph-views. This problem setting is essentially different from traditional single-graph-view graph classification, where graphs are from one single feature view. To solve the problem, we propose a Cross Graph-View Sub graph Feature based Learning (gCGVFL) algorithm that explores an optimal set of sub graphs, across multiple graph-views, as features to represent graphs. Specifically, we derive an evaluation criterion to estimate the discriminative power and the redundancy of sub graph features across all views, and assign proper weight values to each view to indicate its importance for graph classification. The iterative cross graph-view sub graph scoring and graph-view weight updating form a closed loop to find optimal sub graphs to represent graphs for multi-graph-view learning. Experiments and comparisons on real-world tasks demonstrate the algorithm's performance.",
"fno": "4302a590",
"keywords": [
"Redundancy",
"Vectors",
"Image Color Analysis",
"Training",
"Educational Institutions",
"Histograms",
"Optimization",
"Graph Classification",
"Multi Graph View",
"Feature Selection",
"Subgraph Mining"
],
"authors": [
{
"affiliation": null,
"fullName": "Jia Wu",
"givenName": "Jia",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhibin Hong",
"givenName": "Zhibin",
"surname": "Hong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shirui Pan",
"givenName": "Shirui",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xingquan Zhu",
"givenName": "Xingquan",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhihua Cai",
"givenName": "Zhihua",
"surname": "Cai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chengqi Zhang",
"givenName": "Chengqi",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2014-12-01T00:00:00",
"pubType": "proceedings",
"pages": "590-599",
"year": "2014",
"issn": "1550-4786",
"isbn": "978-1-4799-4302-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4302a580",
"articleId": "12OmNwJgAFn",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4302a600",
"articleId": "12OmNrF2DID",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2016/8851/0/8851e847",
"title": "Multi-view Deep Network for Cross-View Classification",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2016/8851e847/12OmNBpmDC1",
"parentPublication": {
"id": "proceedings/cvpr/2016/8851/0",
"title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2013/5108/0/5108a827",
"title": "Multi-instance Multi-graph Dual Embedding Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2013/5108a827/12OmNzBOhw2",
"parentPublication": {
"id": "proceedings/icdm/2013/5108/0",
"title": "2013 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08257918",
"title": "Multi-view graph learning with adaptive label propagation",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08257918/17D45XuDNI6",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859645",
"title": "Series Photo Selection via Multi-View Graph Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859645/1G9DTtUgJnq",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2022/8563/0/09859714",
"title": "Graph Convolution Network Based Representation for Multi-View Multi-Label Learning",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2022/09859714/1G9E43feT8k",
"parentPublication": {
"id": "proceedings/icme/2022/8563/0",
"title": "2022 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2023/06/09947327",
"title": "Learning View-Based Graph Convolutional Network for Multi-View 3D Shape Analysis",
"doi": null,
"abstractUrl": "/journal/tp/2023/06/09947327/1IiLnMjU1KE",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2019/4604/0/460400b204",
"title": "Consistency Meets Inconsistency: A Unified Graph Learning Framework for Multi-view Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2019/460400b204/1h5XN7tS1oI",
"parentPublication": {
"id": "proceedings/icdm/2019/4604/0",
"title": "2019 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2022/01/09026760",
"title": "Fast Multi-View Semi-Supervised Learning With Learned Graph",
"doi": null,
"abstractUrl": "/journal/tk/2022/01/09026760/1hYGvcaK91K",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/02/09508843",
"title": "Multi-View Attributed Graph Clustering",
"doi": null,
"abstractUrl": "/journal/tk/2023/02/09508843/1vQzgycrMWc",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/03/09573400",
"title": "A Ranking Based Multi-View Method for Positive and Unlabeled Graph Classification",
"doi": null,
"abstractUrl": "/journal/tk/2023/03/09573400/1xH5BrLYq0E",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
{
"proceeding": {
"id": "1gyshXRzHpK",
"title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"acronym": "ismar-adjunct",
"groupId": "1810084",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1gysnIklSSY",
"doi": "10.1109/ISMAR-Adjunct.2019.000-9",
"title": "Visualization-Guided Attention Direction in Dynamic Control Tasks",
"normalizedTitle": "Visualization-Guided Attention Direction in Dynamic Control Tasks",
"abstract": "In high-paced applications like air traffic control, disaster management, and medical triage, information is often routed through a central location such as a dispatch or control center. In this work, we introduce a set of color-coded and gaze-aware visualizations designed to simultaneously manage both information priority and user attention. These notifications are unique in that they not only respond to whether or not they have been observed by the user, but they use color to represent the priority of the object to assist processing of other incoming information in the environment. We built both heads-up display (HUD)-based and in-situ information management paradigms and combined these with gaze and color visualizations. In an interactive virtual reality (VR) control center simulation, HUD visualizations slightly reduced unnecessary head movement without sacrificing performance, but were distracting to participants.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In high-paced applications like air traffic control, disaster management, and medical triage, information is often routed through a central location such as a dispatch or control center. In this work, we introduce a set of color-coded and gaze-aware visualizations designed to simultaneously manage both information priority and user attention. These notifications are unique in that they not only respond to whether or not they have been observed by the user, but they use color to represent the priority of the object to assist processing of other incoming information in the environment. We built both heads-up display (HUD)-based and in-situ information management paradigms and combined these with gaze and color visualizations. In an interactive virtual reality (VR) control center simulation, HUD visualizations slightly reduced unnecessary head movement without sacrificing performance, but were distracting to participants.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In high-paced applications like air traffic control, disaster management, and medical triage, information is often routed through a central location such as a dispatch or control center. In this work, we introduce a set of color-coded and gaze-aware visualizations designed to simultaneously manage both information priority and user attention. These notifications are unique in that they not only respond to whether or not they have been observed by the user, but they use color to represent the priority of the object to assist processing of other incoming information in the environment. We built both heads-up display (HUD)-based and in-situ information management paradigms and combined these with gaze and color visualizations. In an interactive virtual reality (VR) control center simulation, HUD visualizations slightly reduced unnecessary head movement without sacrificing performance, but were distracting to participants.",
"fno": "476500a372",
"keywords": [
"Air Traffic Control",
"Data Visualisation",
"Head Up Displays",
"Helmet Mounted Displays",
"Information Management",
"Interactive Systems",
"Traffic Engineering Computing",
"Virtual Reality",
"Information Management Paradigms",
"Interactive Virtual Reality Control Center Simulation",
"HUD Visualizations",
"Unnecessary Head Movement",
"Visualization Guided Attention Direction",
"Dynamic Control Tasks",
"High Paced Applications",
"Air Traffic Control",
"Disaster Management",
"Medical Triage",
"Central Location",
"Gaze Aware Visualizations",
"Information Priority",
"User Attention",
"Notifications",
"Incoming Information",
"Heads Up Display",
"Visualization",
"Task Analysis",
"Augmented Reality",
"Image Color Analysis",
"Monitoring",
"Gaze Tracking",
"Navigation",
"Visualization",
"Attention",
"Virtual Reality",
"Eye Tracking",
"Guidance",
"Periphery"
],
"authors": [
{
"affiliation": "Osaka University",
"fullName": "Jason Orlosky",
"givenName": "Jason",
"surname": "Orlosky",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Osaka University",
"fullName": "Chang Liu",
"givenName": "Chang",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graz University",
"fullName": "Denis Kalkofen",
"givenName": "Denis",
"surname": "Kalkofen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nara Institute of Science and Technology",
"fullName": "Kiyoshi Kiyokawa",
"givenName": "Kiyoshi",
"surname": "Kiyokawa",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ismar-adjunct",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-10-01T00:00:00",
"pubType": "proceedings",
"pages": "372-373",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-4765-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "476500a366",
"articleId": "1gysjSArEsM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "476500a374",
"articleId": "1gyskmc7yE0",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ismar/2012/4660/0/06402595",
"title": "Depth perception control by hiding displayed images based on car vibration for monocular head-up display",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2012/06402595/12OmNAXglOH",
"parentPublication": {
"id": "proceedings/ismar/2012/4660/0",
"title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2017/2943/0/2943a136",
"title": "3D-FRC: Depiction of the future road course in the Head-Up-Display",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2017/2943a136/12OmNAo45DT",
"parentPublication": {
"id": "proceedings/ismar/2017/2943/0",
"title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icat/2007/3056/0/30560280",
"title": "Interaction Without Gesture or Speech -- A Gaze Controlled AR System",
"doi": null,
"abstractUrl": "/proceedings-article/icat/2007/30560280/12OmNCcKQtv",
"parentPublication": {
"id": "proceedings/icat/2007/3056/0",
"title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/delta/2008/3110/0/3110a470",
"title": "Model-Based Gaze Direction Estimation in Office Environment",
"doi": null,
"abstractUrl": "/proceedings-article/delta/2008/3110a470/12OmNqGRGgh",
"parentPublication": {
"id": "proceedings/delta/2008/3110/0",
"title": "Electronic Design, Test and Applications, IEEE International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wkdd/2009/3543/0/3543a594",
"title": "Research on Eye-gaze Tracking Network Generated by Augmented Reality Application",
"doi": null,
"abstractUrl": "/proceedings-article/wkdd/2009/3543a594/12OmNzl3WVn",
"parentPublication": {
"id": "proceedings/wkdd/2009/3543/0",
"title": "2009 Second International Workshop on Knowledge Discovery and Data Mining. WKDD 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/02/07414495",
"title": "Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks",
"doi": null,
"abstractUrl": "/journal/tg/2017/02/07414495/13rRUwInvyE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/11/08466859",
"title": "Augmented Reality Interface Design Approaches for Goal-directed and Stimulus-driven Driving Tasks",
"doi": null,
"abstractUrl": "/journal/tg/2018/11/08466859/14M3E5b55mM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2022/5325/0/532500a787",
"title": "VRDoc: Gaze-based Interactions for VR Reading Experience",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2022/532500a787/1JrRgFp6G2s",
"parentPublication": {
"id": "proceedings/ismar/2022/5325/0",
"title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/05/08998348",
"title": "Effects of Depth Information on Visual Target Identification Task Performance in Shared Gaze Environments",
"doi": null,
"abstractUrl": "/journal/tg/2020/05/08998348/1hrXedrZXos",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar-adjunct/2021/1298/0/129800a159",
"title": "Exploring the Effect of Visual Cues on Eye Gaze During AR-Guided Picking and Assembly Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a159/1yeQM18rD7G",
"parentPublication": {
"id": "proceedings/ismar-adjunct/2021/1298/0",
"title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.