data dict |
|---|
{
"proceeding": {
"id": "12OmNC3Xhho",
"title": "Information Visualization, IEEE Symposium on",
"acronym": "ieee-infovis",
"groupId": "1000371",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwl8GJL",
"doi": "10.1109/INFVIS.2004.1",
"title": "A Comparison of the Readability of Graphs Using Node-Link and Matrix-Based Representations",
"normalizedTitle": "A Comparison of the Readability of Graphs Using Node-Link and Matrix-Based Representations",
"abstract": "In this paper, we describe a taxonomy of generic graph related tasks and an evaluation aiming at assessing the readability of two representations of graphs: matrix-based representations and node-link diagrams. This evaluation bears on seven generic tasks and leads to important recommendations with regard to the representation of graphs according to their size and density. For instance, we show that when graphs are bigger than twenty vertices, the matrix-based visualization performs better than node-link diagrams on most tasks. Only path finding is consistently in favor of node-link diagrams throughout the evaluation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we describe a taxonomy of generic graph related tasks and an evaluation aiming at assessing the readability of two representations of graphs: matrix-based representations and node-link diagrams. This evaluation bears on seven generic tasks and leads to important recommendations with regard to the representation of graphs according to their size and density. For instance, we show that when graphs are bigger than twenty vertices, the matrix-based visualization performs better than node-link diagrams on most tasks. Only path finding is consistently in favor of node-link diagrams throughout the evaluation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we describe a taxonomy of generic graph related tasks and an evaluation aiming at assessing the readability of two representations of graphs: matrix-based representations and node-link diagrams. This evaluation bears on seven generic tasks and leads to important recommendations with regard to the representation of graphs according to their size and density. For instance, we show that when graphs are bigger than twenty vertices, the matrix-based visualization performs better than node-link diagrams on most tasks. Only path finding is consistently in favor of node-link diagrams throughout the evaluation.",
"fno": "87790017",
"keywords": [
"Visualization Of Graphs",
"Adjacency Matrices",
"Node Link Representation",
"Readability",
"Evaluation"
],
"authors": [
{
"affiliation": "Ecole des Mines de Nantes",
"fullName": "Mohammad Ghoniem",
"givenName": "Mohammad",
"surname": "Ghoniem",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "INRIA Futurs/LRI",
"fullName": "Jean-Daniel Fekete",
"givenName": "Jean-Daniel",
"surname": "Fekete",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Ecole des Mines de Nantes & IRCCyN",
"fullName": "Philippe Castagliola",
"givenName": "Philippe",
"surname": "Castagliola",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-infovis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-10-01T00:00:00",
"pubType": "proceedings",
"pages": "17-24",
"year": "2004",
"issn": "1522-404X",
"isbn": "0-7803-8779-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "87790009",
"articleId": "12OmNz5JBRE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "87790025",
"articleId": "12OmNzdoMW9",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vissoft/2013/1457/0/06650530",
"title": "Finding structures in multi-type code couplings with node-link and matrix visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2013/06650530/12OmNBsue2a",
"parentPublication": {
"id": "proceedings/vissoft/2013/1457/0",
"title": "2013 First IEEE Working Conference on Software Visualization (VISSOFT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2011/935/0/05742390",
"title": "An extended evaluation of the readability of tapered, animated, and textured directed-edge representations in node-link graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2011/05742390/12OmNC4wtto",
"parentPublication": {
"id": "proceedings/pacificvis/2011/935/0",
"title": "2011 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/1995/7128/2/71280702",
"title": "Automatic hypertext link generation based on conceptual graphs",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/1995/71280702/12OmNrAdswJ",
"parentPublication": {
"id": "proceedings/icdar/1995/7128/2",
"title": "Proceedings of 3rd International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apvis/2007/0808/0/04126225",
"title": "Using eye tracking to investigate graph layout effects",
"doi": null,
"abstractUrl": "/proceedings-article/apvis/2007/04126225/12OmNxEjXQl",
"parentPublication": {
"id": "proceedings/apvis/2007/0808/0",
"title": "Asia-Pacific Symposium on Visualisation 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2011/4513/1/4513a040",
"title": "Measuring Comprehensibility of Web Pages Based on Link Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2011/4513a040/12OmNz5JCd7",
"parentPublication": {
"id": "proceedings/wi-iat/2011/4513/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2005/2790/0/01532129",
"title": "Elastic hierarchies: combining treemaps and node-link diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2005/01532129/12OmNzYwcax",
"parentPublication": {
"id": "proceedings/ieee-infovis/2005/2790/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/12/ttg2012122457",
"title": "Compressed Adjacency Matrices: Untangling Gene Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tg/2012/12/ttg2012122457/13rRUNvyakM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122268",
"title": "Developing and Evaluating Quilts for the Depiction of Large Layered Graphs",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122268/13rRUwwJWFK",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2014/12/06876036",
"title": "Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation",
"doi": null,
"abstractUrl": "/journal/tg/2014/12/06876036/13rRUxZ0o1D",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/01/09908291",
"title": "Comparative Evaluation of Bipartite, Node-Link, and Matrix-Based Network Representations",
"doi": null,
"abstractUrl": "/journal/tg/2023/01/09908291/1HbasfaWNX2",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyYm2wA",
"title": "Asia-Pacific Symposium on Visualisation 2007",
"acronym": "apvis",
"groupId": "1001657",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxEjXQl",
"doi": "10.1109/APVIS.2007.329282",
"title": "Using eye tracking to investigate graph layout effects",
"normalizedTitle": "Using eye tracking to investigate graph layout effects",
"abstract": "Graphs are typically visualized as node-link diagrams. Although there is a fair amount of research focusing on crossing minimization to improve readability, little attention has been paid on how to handle crossings when they are an essential part of the final visualizations. This requires us to understand how people read graphs and how crossings affect reading performance. As an initial step to this end, a preliminary eye tracking experiment was conducted. The specific purpose of this experiment was to test the effects of crossing angles and geometric-path tendency on eye movements and performance. Sixteen subjects performed both path search and node locating tasks with six drawings. The results showed that small angles can slow down and trigger extra eye movements, causing delays for path search tasks, whereas crossings have little impact on node locating tasks. Geometric-path tendency indicates that a path between two nodes can become harder to follow when many branches of the path go toward the target node. The insights obtained are discussed with a view to further confirmation in future work",
"abstracts": [
{
"abstractType": "Regular",
"content": "Graphs are typically visualized as node-link diagrams. Although there is a fair amount of research focusing on crossing minimization to improve readability, little attention has been paid on how to handle crossings when they are an essential part of the final visualizations. This requires us to understand how people read graphs and how crossings affect reading performance. As an initial step to this end, a preliminary eye tracking experiment was conducted. The specific purpose of this experiment was to test the effects of crossing angles and geometric-path tendency on eye movements and performance. Sixteen subjects performed both path search and node locating tasks with six drawings. The results showed that small angles can slow down and trigger extra eye movements, causing delays for path search tasks, whereas crossings have little impact on node locating tasks. Geometric-path tendency indicates that a path between two nodes can become harder to follow when many branches of the path go toward the target node. The insights obtained are discussed with a view to further confirmation in future work",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Graphs are typically visualized as node-link diagrams. Although there is a fair amount of research focusing on crossing minimization to improve readability, little attention has been paid on how to handle crossings when they are an essential part of the final visualizations. This requires us to understand how people read graphs and how crossings affect reading performance. As an initial step to this end, a preliminary eye tracking experiment was conducted. The specific purpose of this experiment was to test the effects of crossing angles and geometric-path tendency on eye movements and performance. Sixteen subjects performed both path search and node locating tasks with six drawings. The results showed that small angles can slow down and trigger extra eye movements, causing delays for path search tasks, whereas crossings have little impact on node locating tasks. Geometric-path tendency indicates that a path between two nodes can become harder to follow when many branches of the path go toward the target node. The insights obtained are discussed with a view to further confirmation in future work",
"fno": "04126225",
"keywords": [
"Graph Drawing",
"Eye Tracking",
"Graph Layout Effect",
"Graph Visualization",
"Node Link Diagram",
"Geometric Path Tendency",
"Path Search",
"Node Locating Task"
],
"authors": [
{
"affiliation": "Nat. ICT Australia Ltd.",
"fullName": "W. Huang",
"givenName": "W.",
"surname": "Huang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "apvis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-02-01T00:00:00",
"pubType": "proceedings",
"pages": "97-100",
"year": "2007",
"issn": null,
"isbn": "1-4244-0808-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04126224",
"articleId": "12OmNwcCILb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04126227",
"articleId": "12OmNBOCWfN",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsm/2010/8630/0/05609582",
"title": "An eye tracking study on the effects of layout in understanding the role of design patterns",
"doi": null,
"abstractUrl": "/proceedings-article/icsm/2010/05609582/12OmNBOCWqE",
"parentPublication": {
"id": "proceedings/icsm/2010/8630/0",
"title": "2010 IEEE International Conference on Software Maintenance",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2012/4652/0/4652b095",
"title": "Virtual Network Mapping through Path Splitting and Migration",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2012/4652b095/12OmNwJybUa",
"parentPublication": {
"id": "proceedings/waina/2012/4652/0",
"title": "2012 26th International Conference on Advanced Information Networking and Applications Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acit-csi/2015/9642/0/9642a201",
"title": "Using Eye Tracking to Investigate Understandability of Cardinal Direction",
"doi": null,
"abstractUrl": "/proceedings-article/acit-csi/2015/9642a201/12OmNy1SFJh",
"parentPublication": {
"id": "proceedings/acit-csi/2015/9642/0",
"title": "2015 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence (ACIT-CSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2008/1966/0/04475457",
"title": "Effects of Crossing Angles",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2008/04475457/12OmNyywxzH",
"parentPublication": {
"id": "proceedings/pacificvis/2008/1966/0",
"title": "IEEE Pacific Visualization Symposium 2008",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2012/4771/0/4771a357",
"title": "A Television News Graphical Layout Analysis Method Using Eye Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2012/4771a357/12OmNz2C1lQ",
"parentPublication": {
"id": "proceedings/iv/2012/4771/0",
"title": "2012 16th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2015/7334/0/7334a388",
"title": "Using Eye-Tracking to Investigate the Different 3D Representation on Students' Mental Model Construction",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2015/7334a388/12OmNzT7Oy5",
"parentPublication": {
"id": "proceedings/icalt/2015/7334/0",
"title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/niss/2009/3687/0/3687a680",
"title": "Finding the Anti-block Vital Node of a Shortest Path",
"doi": null,
"abstractUrl": "/proceedings-article/niss/2009/3687a680/12OmNzTH0W3",
"parentPublication": {
"id": "proceedings/niss/2009/3687/0",
"title": "2009 International Conference on New Trends in Information and Service Science (NISS 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nsw/2011/1049/0/06004630",
"title": "Time spring layout for visualization of dynamic social networks",
"doi": null,
"abstractUrl": "/proceedings-article/nsw/2011/06004630/12OmNzvhvAx",
"parentPublication": {
"id": "proceedings/nsw/2011/1049/0",
"title": "IEEE Network Science Workshop",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122440",
"title": "Evaluation of Traditional, Orthogonal, and Radial Tree Diagrams by an Eye Tracking Study",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122440/13rRUwI5U7W",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/06/ttg2013060953",
"title": "CiSE: A Circular Spring Embedder Layout Algorithm",
"doi": null,
"abstractUrl": "/journal/tg/2013/06/ttg2013060953/13rRUxASuhz",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyr8Ytt",
"title": "2015 19th International Conference on Information Visualisation (iV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxR5UM5",
"doi": "10.1109/iV.2015.46",
"title": "Adjasankey: Visualization of Huge Hierarchical Weighted and Directed Graphs",
"normalizedTitle": "Adjasankey: Visualization of Huge Hierarchical Weighted and Directed Graphs",
"abstract": "Visualization of hierarchical weighted and directed graphs are usually done with node-link or adjacency matrix diagrams. However, these representations suffer from various drawbacks: low readability in a context of Big Data, high number of edge crossings, difficulty to efficiently represent the weighting. With the stated goal of reducing these drawbacks, we designed Adjasankey, a hybrid visual representation of weighted and directed graphs using hierarchical abstractions. This technique combines adjacency matrices readability of large graphs and flow diagrams visual design efficiency for weighting depiction. Associated to Big Data computing and light-weight web rendering, our tool allows to depict and interact in real time on huge dataset and supports user multi-scale exploration and analysis. To show the efficiency of Adjasankey, we present a case study on the analysis of a Customer to Customer website.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Visualization of hierarchical weighted and directed graphs are usually done with node-link or adjacency matrix diagrams. However, these representations suffer from various drawbacks: low readability in a context of Big Data, high number of edge crossings, difficulty to efficiently represent the weighting. With the stated goal of reducing these drawbacks, we designed Adjasankey, a hybrid visual representation of weighted and directed graphs using hierarchical abstractions. This technique combines adjacency matrices readability of large graphs and flow diagrams visual design efficiency for weighting depiction. Associated to Big Data computing and light-weight web rendering, our tool allows to depict and interact in real time on huge dataset and supports user multi-scale exploration and analysis. To show the efficiency of Adjasankey, we present a case study on the analysis of a Customer to Customer website.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Visualization of hierarchical weighted and directed graphs are usually done with node-link or adjacency matrix diagrams. However, these representations suffer from various drawbacks: low readability in a context of Big Data, high number of edge crossings, difficulty to efficiently represent the weighting. With the stated goal of reducing these drawbacks, we designed Adjasankey, a hybrid visual representation of weighted and directed graphs using hierarchical abstractions. This technique combines adjacency matrices readability of large graphs and flow diagrams visual design efficiency for weighting depiction. Associated to Big Data computing and light-weight web rendering, our tool allows to depict and interact in real time on huge dataset and supports user multi-scale exploration and analysis. To show the efficiency of Adjasankey, we present a case study on the analysis of a Customer to Customer website.",
"fno": "7568a211",
"keywords": [
"Visualization",
"Rendering Computer Graphics",
"Data Visualization",
"Clutter",
"Image Color Analysis",
"Navigation",
"Big Data",
"Flow Diagram",
"Hierarchical",
"Weighted And Directed Graphs",
"Adjacency Matrix"
],
"authors": [
{
"affiliation": null,
"fullName": "Joris Sansen",
"givenName": "Joris",
"surname": "Sansen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Frederic Lalanne",
"givenName": "Frederic",
"surname": "Lalanne",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "David Auber",
"givenName": "David",
"surname": "Auber",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Romain Bourqui",
"givenName": "Romain",
"surname": "Bourqui",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-07-01T00:00:00",
"pubType": "proceedings",
"pages": "211-216",
"year": "2015",
"issn": "1550-6037",
"isbn": "978-1-4673-7568-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "7568a206",
"articleId": "12OmNzvz6If",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7568a217",
"articleId": "12OmNviHKc9",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2014/4103/0/4103a234",
"title": "Semantic Blossom Graph: A New Approach for Visual Graph Exploration",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2014/4103a234/12OmNB1eJxU",
"parentPublication": {
"id": "proceedings/iv/2014/4103/0",
"title": "2014 18th International Conference on Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2014/4103/0/4103a013",
"title": "Drawing Large Weighted Graphs Using Clustered Force-Directed Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2014/4103a013/12OmNro0I3Y",
"parentPublication": {
"id": "proceedings/iv/2014/4103/0",
"title": "2014 18th International Conference on Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/1997/8189/0/81890002",
"title": "H3: laying out large directed graphs in 3D hyperbolic space",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/1997/81890002/12OmNwEJ10t",
"parentPublication": {
"id": "proceedings/ieee-infovis/1997/8189/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2005/9477/0/01532071",
"title": "Multiple coordinated views for network attack graphs",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2005/01532071/12OmNwtEEJb",
"parentPublication": {
"id": "proceedings/vizsec/2005/9477/0",
"title": "IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2017/0831/0/0831a199",
"title": "A User Study on Judging the Target Node in Partial Link Drawings",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2017/0831a199/12OmNwvVrAY",
"parentPublication": {
"id": "proceedings/iv/2017/0831/0",
"title": "2017 21st International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2017/0831/0/0831a288",
"title": "Sketch-Based Interactions for Untangling of Force-Directed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2017/0831a288/12OmNyO8tVY",
"parentPublication": {
"id": "proceedings/iv/2017/0831/0",
"title": "2017 21st International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2018/0169/0/016900a150",
"title": "A Novel Subgraph Querying Method on Directed Weighted Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2018/016900a150/17D45Xbl4Qe",
"parentPublication": {
"id": "proceedings/cis/2018/0169/0",
"title": "2018 14th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/topoinvis/2022/9354/0/935400a081",
"title": "Untangling Force-Directed Layouts Using Persistent Homology",
"doi": null,
"abstractUrl": "/proceedings-article/topoinvis/2022/935400a081/1J2XKiZs7xS",
"parentPublication": {
"id": "proceedings/topoinvis/2022/9354/0",
"title": "2022 Topological Data Analysis and Visualization (TopoInVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2019/04/08739137",
"title": "Evaluating the Readability of Force Directed Graph Layouts: A Deep Learning Approach",
"doi": null,
"abstractUrl": "/magazine/cg/2019/04/08739137/1aXM6mNkouI",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/01/08807379",
"title": "Persistent Homology Guided Force-Directed Graph Layouts",
"doi": null,
"abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyKJiwH",
"title": "VLSI Design, International Conference on",
"acronym": "vlsid",
"groupId": "1000799",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrkBwFJ",
"doi": "10.1109/VLSID.2011.71",
"title": "Extraction of Aspect Ratio for Non-Manhattan CMOS Devices",
"normalizedTitle": "Extraction of Aspect Ratio for Non-Manhattan CMOS Devices",
"abstract": "Non-Manhattan CMOS devices are gaining attention because of their special properties. In this paper waffle and closed gate structures are discussed and issues related to their use in CAD tools are addressed. The waffle devices are used where large aspect ratio with low parasitic capacitances and lower silicon overhead is required. The closed-gate layout is used in rad-hard digital libraries due to their edgeless geometry. These devices are difficult to handle because Process Design Kit (PDK) is developed for Manhattan geometries. This paper discusses how the models for Manhattan devices can’t be extended to predict accurate I-V characteristics of the non-manhattan devices. An analytical model is developed to map non-Manhattan devices to equivalent Manhattan devices. A test chip in 0.7?m CMOS technology was developed to validate the concept. The PDK was modified to introduce these structures in normal analog design flow.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Non-Manhattan CMOS devices are gaining attention because of their special properties. In this paper waffle and closed gate structures are discussed and issues related to their use in CAD tools are addressed. The waffle devices are used where large aspect ratio with low parasitic capacitances and lower silicon overhead is required. The closed-gate layout is used in rad-hard digital libraries due to their edgeless geometry. These devices are difficult to handle because Process Design Kit (PDK) is developed for Manhattan geometries. This paper discusses how the models for Manhattan devices can’t be extended to predict accurate I-V characteristics of the non-manhattan devices. An analytical model is developed to map non-Manhattan devices to equivalent Manhattan devices. A test chip in 0.7?m CMOS technology was developed to validate the concept. The PDK was modified to introduce these structures in normal analog design flow.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Non-Manhattan CMOS devices are gaining attention because of their special properties. In this paper waffle and closed gate structures are discussed and issues related to their use in CAD tools are addressed. The waffle devices are used where large aspect ratio with low parasitic capacitances and lower silicon overhead is required. The closed-gate layout is used in rad-hard digital libraries due to their edgeless geometry. These devices are difficult to handle because Process Design Kit (PDK) is developed for Manhattan geometries. This paper discusses how the models for Manhattan devices can’t be extended to predict accurate I-V characteristics of the non-manhattan devices. An analytical model is developed to map non-Manhattan devices to equivalent Manhattan devices. A test chip in 0.7?m CMOS technology was developed to validate the concept. The PDK was modified to introduce these structures in normal analog design flow.",
"fno": "4348a130",
"keywords": [
"Non Manhattan CMOS",
"Aspect Ratio",
"EGTC"
],
"authors": [
{
"affiliation": null,
"fullName": "Shiv Kumar",
"givenName": "Shiv",
"surname": "Kumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Vinay Chandratre",
"givenName": "Vinay",
"surname": "Chandratre",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sudheer K. Mohammed",
"givenName": "Sudheer K.",
"surname": "Mohammed",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "C.K. Pithawa",
"givenName": "C.K.",
"surname": "Pithawa",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vlsid",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-01-01T00:00:00",
"pubType": "proceedings",
"pages": "130-134",
"year": "2011",
"issn": "1063-9667",
"isbn": "978-0-7695-4348-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4348a124",
"articleId": "12OmNAYoKk5",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4348a135",
"articleId": "12OmNC943yG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dac/2004/2501/0/25010646",
"title": "A Packing Algorithm for Non-Manhattan Hexagon/Triangle Placement Design by Using an Adaptive O-Tree Representation",
"doi": null,
"abstractUrl": "/proceedings-article/dac/2004/25010646/12OmNANkoaL",
"parentPublication": {
"id": "proceedings/dac/2004/2501/0",
"title": "Design Automation Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vtsa/1989/9999/0/00068616",
"title": "P-channel devices for half-micron CMOS: advantages of high-energy channel implantations",
"doi": null,
"abstractUrl": "/proceedings-article/vtsa/1989/00068616/12OmNqJq4DG",
"parentPublication": {
"id": "proceedings/vtsa/1989/9999/0",
"title": "International Symposium on VLSI Technology, Systems and Applications,",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vtsa/1993/0978/0/00263617",
"title": "Comparison of buried and surface channel PMOS devices for low voltage 0.5 mu m CMOS",
"doi": null,
"abstractUrl": "/proceedings-article/vtsa/1993/00263617/12OmNqNXEmT",
"parentPublication": {
"id": "proceedings/vtsa/1993/0978/0",
"title": "1993 International Symposium on VLSI Technology, Systems, and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmens/2003/1947/0/19470038",
"title": "High Vertical Aspect Ratio Liga Microwave 3-DB Coupler",
"doi": null,
"abstractUrl": "/proceedings-article/icmens/2003/19470038/12OmNvDqsAK",
"parentPublication": {
"id": "proceedings/icmens/2003/1947/0",
"title": "MEMS, NANO, and Smart Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mue/2008/3134/0/3134a114",
"title": "A Comparative Review of Aspect Ratio Conversion Methods",
"doi": null,
"abstractUrl": "/proceedings-article/mue/2008/3134a114/12OmNvjgWzA",
"parentPublication": {
"id": "proceedings/mue/2008/3134/0",
"title": "Multimedia and Ubiquitous Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisp/2008/3119/4/3119d092",
"title": "Aspect Ratio Conversion Based on Saliency Model",
"doi": null,
"abstractUrl": "/proceedings-article/cisp/2008/3119d092/12OmNy4r3Qw",
"parentPublication": {
"id": "proceedings/cisp/2008/3119/4",
"title": "Image and Signal Processing, Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlsid/2010/3928/0/3928a152",
"title": "Optimized Stage Ratio of Tapered CMOS Inverters for Minimum Power and Mismatch Jitter Product",
"doi": null,
"abstractUrl": "/proceedings-article/vlsid/2010/3928a152/12OmNzmclUA",
"parentPublication": {
"id": "proceedings/vlsid/2010/3928/0",
"title": "VLSI Design, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122276",
"title": "Arc Length-Based Aspect Ratio Selection",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122276/13rRUNvyatg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/1994/02/t0240",
"title": "Cost-Performance Trade-Offs in Manhattan Street Network Versus 2-D Torus",
"doi": null,
"abstractUrl": "/journal/tc/1994/02/t0240/13rRUxZ0o0o",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/mi/1999/05/m5023",
"title": "CMOS Options for Single-Chip Applications",
"doi": null,
"abstractUrl": "/magazine/mi/1999/05/m5023/13rRUy3xYcg",
"parentPublication": {
"id": "mags/mi",
"title": "IEEE Micro",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyjLoRj",
"title": "Multimedia and Ubiquitous Engineering, International Conference on",
"acronym": "mue",
"groupId": "1001875",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvjgWzA",
"doi": "10.1109/MUE.2008.112",
"title": "A Comparative Review of Aspect Ratio Conversion Methods",
"normalizedTitle": "A Comparative Review of Aspect Ratio Conversion Methods",
"abstract": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. Because of the historical and some other factors, there are so many video formats with different aspect ratios and the conversion of aspect ratio is required more and more imminently. The paper introduced all the aspect ratio conversion methods published in literatures, including cropping method, expanding method and so on, and presented experiment results to demonstrate the advantages and disadvantages of each conversion method.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. Because of the historical and some other factors, there are so many video formats with different aspect ratios and the conversion of aspect ratio is required more and more imminently. The paper introduced all the aspect ratio conversion methods published in literatures, including cropping method, expanding method and so on, and presented experiment results to demonstrate the advantages and disadvantages of each conversion method.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. Because of the historical and some other factors, there are so many video formats with different aspect ratios and the conversion of aspect ratio is required more and more imminently. The paper introduced all the aspect ratio conversion methods published in literatures, including cropping method, expanding method and so on, and presented experiment results to demonstrate the advantages and disadvantages of each conversion method.",
"fno": "3134a114",
"keywords": [
"Aspect Ratio Conversion",
"Saliency Model",
"Crop",
"Expand",
"Review"
],
"authors": [
{
"affiliation": null,
"fullName": "Zhongliang Deng",
"givenName": "Zhongliang",
"surname": "Deng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yandong Guo",
"givenName": "Yandong",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaodong Gu",
"givenName": "Xiaodong",
"surname": "Gu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhibo Chen",
"givenName": "Zhibo",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Quqing Chen",
"givenName": "Quqing",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Charles Wang",
"givenName": "Charles",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mue",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-04-01T00:00:00",
"pubType": "proceedings",
"pages": "114-117",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3134-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3134a108",
"articleId": "12OmNxzMnQG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3134a118",
"articleId": "12OmNyuya8c",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isvd/2006/2630/0/26300032",
"title": "Aspect-Ratio Voronoi Diagram with Applications",
"doi": null,
"abstractUrl": "/proceedings-article/isvd/2006/26300032/12OmNBvkdmS",
"parentPublication": {
"id": "proceedings/isvd/2006/2630/0",
"title": "2006 3rd International Symposium on Voronoi Diagrams in Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/1991/2148/0/00139673",
"title": "Finding the aspect-ratio of an imaging system",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1991/00139673/12OmNCdBDEZ",
"parentPublication": {
"id": "proceedings/cvpr/1991/2148/0",
"title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlsid/2011/4348/0/4348a130",
"title": "Extraction of Aspect Ratio for Non-Manhattan CMOS Devices",
"doi": null,
"abstractUrl": "/proceedings-article/vlsid/2011/4348a130/12OmNrkBwFJ",
"parentPublication": {
"id": "proceedings/vlsid/2011/4348/0",
"title": "VLSI Design, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2012/2027/0/06266442",
"title": "A Visual Search User Study on the Influences of Aspect Ratio Distortion of Preview Thumbnails",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2012/06266442/12OmNx4gUkE",
"parentPublication": {
"id": "proceedings/icmew/2012/2027/0",
"title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisp/2008/3119/4/3119d092",
"title": "Aspect Ratio Conversion Based on Saliency Model",
"doi": null,
"abstractUrl": "/proceedings-article/cisp/2008/3119d092/12OmNy4r3Qw",
"parentPublication": {
"id": "proceedings/cisp/2008/3119/4",
"title": "Image and Signal Processing, Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122276",
"title": "Arc Length-Based Aspect Ratio Selection",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122276/13rRUNvyatg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2019/01/08440843",
"title": "Image-Based Aspect Ratio Selection",
"doi": null,
"abstractUrl": "/journal/tg/2019/01/08440843/17D45VTRowg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hipcw/2018/0114/0/08634018",
"title": "Perforated Bluff-Body Wake Simulations: Influence of Aspect Ratio",
"doi": null,
"abstractUrl": "/proceedings-article/hipcw/2018/08634018/17D45XacGjO",
"parentPublication": {
"id": "proceedings/hipcw/2018/0114/0",
"title": "2018 IEEE 25th International Conference on High Performance Computing Workshops (HiPCW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2682",
"title": "Learning to Learn Cropping Models for Different Aspect Ratio Requirements",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2682/1m3o8QfxwFG",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2021/1952/0/09466258",
"title": "Lensless Mismatched Aspect Ratio Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2021/09466258/1uSSTn3ENuE",
"parentPublication": {
"id": "proceedings/iccp/2021/1952/0",
"title": "2021 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvA1hw5",
"title": "Proceedings. 10th IEEE International Conference on Engineering of Complex Computer Systems",
"acronym": "iceccs",
"groupId": "1000271",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxwWoF3",
"doi": "10.1109/ICECCS.2005.75",
"title": "Secure Software Architectures Design by Aspect Orientation",
"normalizedTitle": "Secure Software Architectures Design by Aspect Orientation",
"abstract": "Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach to designing secure software architectures. The underlying formalism is the Software Architecture Model (SAM) that combines Petri nets and temporal logic. SAM supports a precise way to model the problem domain, its software architecture, and security aspects of the software architecture. An integrated architecture is obtained by weaving aspect models with the base architecture model. Mechanisms in SAM are amenable to analyzing correctness of the architecture design.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach to designing secure software architectures. The underlying formalism is the Software Architecture Model (SAM) that combines Petri nets and temporal logic. SAM supports a precise way to model the problem domain, its software architecture, and security aspects of the software architecture. An integrated architecture is obtained by weaving aspect models with the base architecture model. Mechanisms in SAM are amenable to analyzing correctness of the architecture design.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach to designing secure software architectures. The underlying formalism is the Software Architecture Model (SAM) that combines Petri nets and temporal logic. SAM supports a precise way to model the problem domain, its software architecture, and security aspects of the software architecture. An integrated architecture is obtained by weaving aspect models with the base architecture model. Mechanisms in SAM are amenable to analyzing correctness of the architecture design.",
"fno": "22840047",
"keywords": [
"Software Architecture",
"Security",
"Aspect Orientation",
"SAM",
"Formal Method"
],
"authors": [],
"idPrefix": "iceccs",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-06-01T00:00:00",
"pubType": "proceedings",
"pages": "47-55",
"year": "2005",
"issn": null,
"isbn": "0-7695-2284-X",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "22840037",
"articleId": "12OmNzVoBAD",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "22840056",
"articleId": "12OmNxFaLAR",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iscsct/2008/3498/2/3498b431",
"title": "Modeling Aspect-Oriented Extension Software Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/iscsct/2008/3498b431/12OmNAkWvxS",
"parentPublication": {
"id": "proceedings/iscsct/2008/3498/1",
"title": "2008 International Symposium on Computer Science and Computational Technology (ISCSCT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssiri/2009/3758/0/3758a275",
"title": "Security Variability Design and Analysis in an Aspect Oriented Software Architecture",
"doi": null,
"abstractUrl": "/proceedings-article/ssiri/2009/3758a275/12OmNBr4eGC",
"parentPublication": {
"id": "proceedings/ssiri/2009/3758/0",
"title": "Secure System Integration and Reliability Improvement",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/tase/2011/4506/0/4506a225",
"title": "Undesirable Aspect Interactions: A Prevention Policy",
"doi": null,
"abstractUrl": "/proceedings-article/tase/2011/4506a225/12OmNCykm8E",
"parentPublication": {
"id": "proceedings/tase/2011/4506/0",
"title": "2011 Fifth International Conference on Theoretical Aspects of Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2002/1727/0/17270645",
"title": "A Formal Method for Analyzing Software Architecture Models in SAM",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2002/17270645/12OmNvF83s0",
"parentPublication": {
"id": "proceedings/compsac/2002/1727/0",
"title": "Proceedings 26th Annual International Computer Software and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apsec/2010/4266/0/4266a176",
"title": "Aspect Oriented Approach to Building Secure Service Composition",
"doi": null,
"abstractUrl": "/proceedings-article/apsec/2010/4266a176/12OmNvjyxW9",
"parentPublication": {
"id": "proceedings/apsec/2010/4266/0",
"title": "2010 Asia Pacific Software Engineering Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sp/1997/7828/0/78280084",
"title": "Secure software architectures",
"doi": null,
"abstractUrl": "/proceedings-article/sp/1997/78280084/12OmNvs4vox",
"parentPublication": {
"id": "proceedings/sp/1997/7828/0",
"title": "Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apsec/1999/0509/0/05090230",
"title": "On Aspect-Oriented Design: An Approach to Designing Quality Attributes",
"doi": null,
"abstractUrl": "/proceedings-article/apsec/1999/05090230/12OmNx3Zjdg",
"parentPublication": {
"id": "proceedings/apsec/1999/0509/0",
"title": "Proceedings Sixth Asia Pacific Software Engineering Conference (ASPEC'99) (Cat. No.PR00509)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mse/2002/1857/0/18570132",
"title": "Modeling and Analyzing SMIL Documents in SAM",
"doi": null,
"abstractUrl": "/proceedings-article/mse/2002/18570132/12OmNxeusZ7",
"parentPublication": {
"id": "proceedings/mse/2002/1857/0",
"title": "Microelectronics Systems Education, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hase/2004/2094/0/20940289",
"title": "A Formal Approach to Designing Secure Software Architectures",
"doi": null,
"abstractUrl": "/proceedings-article/hase/2004/20940289/12OmNyQYtjM",
"parentPublication": {
"id": "proceedings/hase/2004/2094/0",
"title": "Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/2006/04/e0265",
"title": "Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets",
"doi": null,
"abstractUrl": "/journal/ts/2006/04/e0265/13rRUwInvCw",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzVXNIo",
"title": "Image and Signal Processing, Congress on",
"acronym": "cisp",
"groupId": "1001793",
"volume": "4",
"displayVolume": "4",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy4r3Qw",
"doi": "10.1109/CISP.2008.714",
"title": "Aspect Ratio Conversion Based on Saliency Model",
"normalizedTitle": "Aspect Ratio Conversion Based on Saliency Model",
"abstract": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. The paper is focused on solving the problem that how to play various kinds of videos on the device screen with different aspect ratio from them. It is the first time to introduce saliency model, which can take human attention into account, into the aspect ratio conversion. Based on the saliency model, we proposed a novel cropping mode and a novel un-unique expanding mode, and then combine the two modes according to some principles from media aesthetics. Experiment results show that there is no distortion in the region of interest and no loss will be noticed in the output video sequences, which demonstrates the effectiveness and efficiency of our approach.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. The paper is focused on solving the problem that how to play various kinds of videos on the device screen with different aspect ratio from them. It is the first time to introduce saliency model, which can take human attention into account, into the aspect ratio conversion. Based on the saliency model, we proposed a novel cropping mode and a novel un-unique expanding mode, and then combine the two modes according to some principles from media aesthetics. Experiment results show that there is no distortion in the region of interest and no loss will be noticed in the output video sequences, which demonstrates the effectiveness and efficiency of our approach.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The Aspect ratio is the fractional relation of the width of a video image compared to its height. The paper is focused on solving the problem that how to play various kinds of videos on the device screen with different aspect ratio from them. It is the first time to introduce saliency model, which can take human attention into account, into the aspect ratio conversion. Based on the saliency model, we proposed a novel cropping mode and a novel un-unique expanding mode, and then combine the two modes according to some principles from media aesthetics. Experiment results show that there is no distortion in the region of interest and no loss will be noticed in the output video sequences, which demonstrates the effectiveness and efficiency of our approach.",
"fno": "3119d092",
"keywords": [
"Aspect Ratio Conversion",
"Saliency Model",
"Kalman Filter",
"Crop",
"Expand"
],
"authors": [
{
"affiliation": null,
"fullName": "Yandong Guo",
"givenName": "Yandong",
"surname": "Guo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhongliang Deng",
"givenName": "Zhongliang",
"surname": "Deng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaodong Gu",
"givenName": "Xiaodong",
"surname": "Gu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhibo Chen",
"givenName": "Zhibo",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Quqing Chen",
"givenName": "Quqing",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Charles Wang",
"givenName": "Charles",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cisp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-05-01T00:00:00",
"pubType": "proceedings",
"pages": "92-96",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3119-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3119d087",
"articleId": "12OmNxFJXsc",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3119d097",
"articleId": "12OmNyrIawQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sitis/2011/4635/0/4635a298",
"title": "A Novel Visual Saliency Model for Surveillance Video Compression",
"doi": null,
"abstractUrl": "/proceedings-article/sitis/2011/4635a298/12OmNCbU3bW",
"parentPublication": {
"id": "proceedings/sitis/2011/4635/0",
"title": "2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlsid/2011/4348/0/4348a130",
"title": "Extraction of Aspect Ratio for Non-Manhattan CMOS Devices",
"doi": null,
"abstractUrl": "/proceedings-article/vlsid/2011/4348a130/12OmNrkBwFJ",
"parentPublication": {
"id": "proceedings/vlsid/2011/4348/0",
"title": "VLSI Design, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109a013",
"title": "Saliency Based on Multi-scale Ratio of Dissimilarity",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109a013/12OmNvDqsUe",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mue/2008/3134/0/3134a114",
"title": "A Comparative Review of Aspect Ratio Conversion Methods",
"doi": null,
"abstractUrl": "/proceedings-article/mue/2008/3134a114/12OmNvjgWzA",
"parentPublication": {
"id": "proceedings/mue/2008/3134/0",
"title": "Multimedia and Ubiquitous Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b062",
"title": "A Saliency Detection Model Based on Multi-feature Fusion",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b062/12OmNwDACnH",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2009/3641/0/3641a611",
"title": "Salient Object Extraction Based on Region Saliency Ratio",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2009/3641a611/12OmNx7XH59",
"parentPublication": {
"id": "proceedings/icis/2009/3641/0",
"title": "Computer and Information Science, ACIS International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iih-msp/2011/4517/0/4517a240",
"title": "Visual Attention Model with Cross-Layer Saliency Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/iih-msp/2011/4517a240/12OmNyuPL6f",
"parentPublication": {
"id": "proceedings/iih-msp/2011/4517/0",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isdea/2012/4608/0/4608b079",
"title": "Object-Based Multi-feature Competitive Model for Visual Saliency Detection",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2012/4608b079/12OmNyuy9Zx",
"parentPublication": {
"id": "proceedings/isdea/2012/4608/0",
"title": "2012 Second International Conference on Intelligent System Design and Engineering Application",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122276",
"title": "Arc Length-Based Aspect Ratio Selection",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122276/13rRUNvyatg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2021/1952/0/09466258",
"title": "Lensless Mismatched Aspect Ratio Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2021/09466258/1uSSTn3ENuE",
"parentPublication": {
"id": "proceedings/iccp/2021/1952/0",
"title": "2021 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1uSSOI3aow0",
"title": "2021 IEEE International Conference on Computational Photography (ICCP)",
"acronym": "iccp",
"groupId": "1800125",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1uSSTn3ENuE",
"doi": "10.1109/ICCP51581.2021.9466258",
"title": "Lensless Mismatched Aspect Ratio Imaging",
"normalizedTitle": "Lensless Mismatched Aspect Ratio Imaging",
"abstract": "In photography, as in other imaging areas, the aspect ratio of a picture is dictated by the aspect ratio of an image sensor. In this paper, we present a flexible and efficient lensless approach to overcome aspect ratio dependency. We introduce a theory of coded aperture imaging when the aspect ratio of the scene is mismatched with the aspect ratio of the sensor. Using our prototype, we demonstrate how our theoretical results can be effectively applied for ultra-wide imaging with a conventional image sensor, and for normal aspect ratio imaging with an ultra-wide sensor. We use the latter application to perform high frame rate imaging with a rolling shutter sensor by dividing the sensor area into multiple narrow sub-areas along the rolling shutter direction.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In photography, as in other imaging areas, the aspect ratio of a picture is dictated by the aspect ratio of an image sensor. In this paper, we present a flexible and efficient lensless approach to overcome aspect ratio dependency. We introduce a theory of coded aperture imaging when the aspect ratio of the scene is mismatched with the aspect ratio of the sensor. Using our prototype, we demonstrate how our theoretical results can be effectively applied for ultra-wide imaging with a conventional image sensor, and for normal aspect ratio imaging with an ultra-wide sensor. We use the latter application to perform high frame rate imaging with a rolling shutter sensor by dividing the sensor area into multiple narrow sub-areas along the rolling shutter direction.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In photography, as in other imaging areas, the aspect ratio of a picture is dictated by the aspect ratio of an image sensor. In this paper, we present a flexible and efficient lensless approach to overcome aspect ratio dependency. We introduce a theory of coded aperture imaging when the aspect ratio of the scene is mismatched with the aspect ratio of the sensor. Using our prototype, we demonstrate how our theoretical results can be effectively applied for ultra-wide imaging with a conventional image sensor, and for normal aspect ratio imaging with an ultra-wide sensor. We use the latter application to perform high frame rate imaging with a rolling shutter sensor by dividing the sensor area into multiple narrow sub-areas along the rolling shutter direction.",
"fno": "09466258",
"keywords": [
"Image Coding",
"Image Matching",
"Image Sensors",
"Rolling Shutter Sensor",
"Photography",
"Aperture Image Coding",
"Lensless Mismatched Aspect Ratio Imaging Approach",
"Ultrawide Imaging",
"High Frame Rate Image Sensor",
"Photography",
"Image Sensors",
"Conferences",
"Prototypes",
"Lighting",
"Apertures",
"Sensors",
"Computational Photography",
"Coded Imaging And Lighting",
"Coded Apertures",
"Machine Learning For Image Sensing And Lighting"
],
"authors": [
{
"affiliation": "Sony Corporation,Tokyo,Japan",
"fullName": "Ilya Reshetouski",
"givenName": "Ilya",
"surname": "Reshetouski",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sony Corporation,Tokyo,Japan",
"fullName": "Ryuichi Tadano",
"givenName": "Ryuichi",
"surname": "Tadano",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sony Corporation,Tokyo,Japan",
"fullName": "Hideki Oyaizu",
"givenName": "Hideki",
"surname": "Oyaizu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sony Corporation,Tokyo,Japan",
"fullName": "Kenichiro Nakamura",
"givenName": "Kenichiro",
"surname": "Nakamura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sony Corporation,Tokyo,Japan",
"fullName": "Jun Murayama",
"givenName": "Jun",
"surname": "Murayama",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iccp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-05-01T00:00:00",
"pubType": "proceedings",
"pages": "1-12",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-1952-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1uSSSNBdx4Y",
"name": "piccp202119520-09466258s1-05-038-supp.zip",
"size": "101 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/piccp202119520-09466258s1-05-038-supp.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "09466269",
"articleId": "1uST1ciE3EA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09466274",
"articleId": "1uSSV7tRhSw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/1991/2148/0/00139673",
"title": "Finding the aspect-ratio of an imaging system",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/1991/00139673/12OmNCdBDEZ",
"parentPublication": {
"id": "proceedings/cvpr/1991/2148/0",
"title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ssst/1990/2038/0/00138168",
"title": "An optical aspect sensor for the gamma ray imaging device",
"doi": null,
"abstractUrl": "/proceedings-article/ssst/1990/00138168/12OmNzmtWE5",
"parentPublication": {
"id": "proceedings/ssst/1990/2038/0",
"title": "Proceedings The Twenty-Second Southeastern Symposium on System Theory",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122276",
"title": "Arc Length-Based Aspect Ratio Selection",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122276/13rRUNvyatg",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2018/6100/0/610000c327",
"title": "Resolution-Enhanced Lensless Color Shadow Imaging Microscopy Based on Large Field-of-View Submicron-Pixel Imaging Sensors",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2018/610000c327/17D45Wc1IKe",
"parentPublication": {
"id": "proceedings/cvprw/2018/6100/0",
"title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200c672",
"title": "Time-Multiplexed Coded Aperture Imaging: Learned Coded Aperture and Pixel Exposures for Compressive Imaging Systems",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200c672/1BmLc0RAlck",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2022/5851/0/09887659",
"title": "MantissaCam: Learning Snapshot High-dynamic-range Imaging with Perceptually-based In-pixel Irradiance Encoding",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2022/09887659/1GZiuL29mBW",
"parentPublication": {
"id": "proceedings/iccp/2022/5851/0",
"title": "2022 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600r7714",
"title": "Synthetic Aperture Imaging with Events and Frames",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600r7714/1H0L6H6N3ag",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2022/6946/0/694600q6313",
"title": "Fisher Information Guidance for Learned Time-of-Flight Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2022/694600q6313/1H1iL7OPV2U",
"parentPublication": {
"id": "proceedings/cvpr/2022/6946/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2019/3263/0/08747341",
"title": "Video from Stills: Lensless Imaging with Rolling Shutter",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2019/08747341/1bcJwMUIgh2",
"parentPublication": {
"id": "proceedings/iccp/2019/3263/0",
"title": "2019 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2021/02/09222047",
"title": "Truth or Square: Aspect Ratio Biases Recall of Position Encodings",
"doi": null,
"abstractUrl": "/journal/tg/2021/02/09222047/1nTqj3fbFXq",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzayNEE",
"title": "Proceedings. 1997 IEEE Conference on Information Visualization (Cat. No.97TB100165)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "1997",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAle6oo",
"doi": "10.1109/IV.1997.626522",
"title": "Interactive visual exploration for knowledge discovery on the Web",
"normalizedTitle": "Interactive visual exploration for knowledge discovery on the Web",
"abstract": "Presents a conceptual structure for the organization and representation of textual and visual information on the World Wide Web. A generic conceptual structure is proposed which contributes to new forms of visual navigation and interactivity within large collections of textual and visual data. This can assist in the exploration, discovery and extraction of relevant information. An application of the approach is illustrated in the domain of design which is characterized by large amounts of unstructured and poorly organized information of project descriptions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Presents a conceptual structure for the organization and representation of textual and visual information on the World Wide Web. A generic conceptual structure is proposed which contributes to new forms of visual navigation and interactivity within large collections of textual and visual data. This can assist in the exploration, discovery and extraction of relevant information. An application of the approach is illustrated in the domain of design which is characterized by large amounts of unstructured and poorly organized information of project descriptions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Presents a conceptual structure for the organization and representation of textual and visual information on the World Wide Web. A generic conceptual structure is proposed which contributes to new forms of visual navigation and interactivity within large collections of textual and visual data. This can assist in the exploration, discovery and extraction of relevant information. An application of the approach is illustrated in the domain of design which is characterized by large amounts of unstructured and poorly organized information of project descriptions.",
"fno": "80760228",
"keywords": [
"Internet Interactive Visual Exploration Knowledge Discovery Generic Conceptual Structure World Wide Web Information Organization Information Representation Textual Information Visual Information Visual Navigation Interactivity Relevant Information Extraction Design Unstructured Information Poorly Organized Information Project Descriptions IEEE Conference On Information Visualisation IV 97"
],
"authors": [
{
"affiliation": "Fac. of Archit., Technion-Israel Inst. of Technol., Haifa, Israel",
"fullName": "R. Oxman",
"givenName": "R.",
"surname": "Oxman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1997-08-01T00:00:00",
"pubType": "proceedings",
"pages": "228",
"year": "1997",
"issn": "1093-9547",
"isbn": "0-8186-8076-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "80760219",
"articleId": "12OmNvA1hgB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "80760235",
"articleId": "12OmNzyp62W",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCfAPCc",
"title": "2012 16th International Conference on Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAnuTkS",
"doi": "10.1109/IV.2012.22",
"title": "A Vertical Timeline Visualization for the Exploratory Analysis of Dialogue Data",
"normalizedTitle": "A Vertical Timeline Visualization for the Exploratory Analysis of Dialogue Data",
"abstract": "This paper presents a novel vertical timeline information-visualization technique developed to support the analysis of human-computer dialogue data. The technique uses combined linked views including distorted views to effectively communicate the timing of dialogue events while presenting text in such a manner that it is easily readable. A prototype has been implemented and tested to demonstrate the technique's effectiveness for supporting exploration and revealing previously unsuspected patterns.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a novel vertical timeline information-visualization technique developed to support the analysis of human-computer dialogue data. The technique uses combined linked views including distorted views to effectively communicate the timing of dialogue events while presenting text in such a manner that it is easily readable. A prototype has been implemented and tested to demonstrate the technique's effectiveness for supporting exploration and revealing previously unsuspected patterns.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a novel vertical timeline information-visualization technique developed to support the analysis of human-computer dialogue data. The technique uses combined linked views including distorted views to effectively communicate the timing of dialogue events while presenting text in such a manner that it is easily readable. A prototype has been implemented and tested to demonstrate the technique's effectiveness for supporting exploration and revealing previously unsuspected patterns.",
"fno": "4771a068",
"keywords": [
"Multiple Coordinated Views",
"Information Visualization",
"Temporal Data",
"Spoken Language Dialogue Systems"
],
"authors": [
{
"affiliation": null,
"fullName": "Paul Craig",
"givenName": "Paul",
"surname": "Craig",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nena Roa-Seiler",
"givenName": "Nena",
"surname": "Roa-Seiler",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-07-01T00:00:00",
"pubType": "proceedings",
"pages": "68-73",
"year": "2012",
"issn": "1550-6037",
"isbn": "978-1-4673-2260-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4771a062",
"articleId": "12OmNwCaCqJ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4771a074",
"articleId": "12OmNqFJhII",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/compsac/2012/4736/0/4736a195",
"title": "A Rapid Development Framework for Multilingual Spoken Dialogue Systems",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2012/4736a195/12OmNBVIUv3",
"parentPublication": {
"id": "proceedings/compsac/2012/4736/0",
"title": "2012 IEEE 36th Annual Computer Software and Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030072",
"title": "Coordinated Multiple Views: a Critical View",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a156",
"title": "BrowseLine: 2D Timeline Visualization of Web Browsing Histories",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a156/12OmNCbU2VK",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030061",
"title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2010/4253/0/4253a116",
"title": "A Multi-Agent Reinforcement Learning Algorithm for Disambiguation in a Spoken Dialogue System",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2010/4253a116/12OmNvkGW7h",
"parentPublication": {
"id": "proceedings/taai/2010/4253/0",
"title": "2010 International Conference on Technologies and Applications of Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mdm/2013/4973/2/4973b217",
"title": "WFST-Based Spoken Dialogue System on Smartphones -- Its Development and Implementation for Field Use",
"doi": null,
"abstractUrl": "/proceedings-article/mdm/2013/4973b217/12OmNxE2mXe",
"parentPublication": {
"id": "proceedings/mdm/2013/4973/2",
"title": "2013 IEEE 14th International Conference on Mobile Data Management",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2005/2396/0/23960003",
"title": "Coordinated Parallel Views for the Exploratory Analysis of Microarray Time-course Data",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2005/23960003/12OmNxwENKJ",
"parentPublication": {
"id": "proceedings/cmv/2005/2396/0",
"title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isuc/2008/3433/0/3433a416",
"title": "Dialogue Act Annotation for Statistically Managed Spoken Dialogue Systems",
"doi": null,
"abstractUrl": "/proceedings-article/isuc/2008/3433a416/12OmNyKa6dv",
"parentPublication": {
"id": "proceedings/isuc/2008/3433/0",
"title": "2008 Second International Symposium on Universal Communication",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2009/06/ttg2009061383",
"title": "Interactive Coordinated Multiple-View Visualization of Biomechanical Motion Data",
"doi": null,
"abstractUrl": "/journal/tg/2009/06/ttg2009061383/13rRUwfI0Q3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiai-aai/2021/2420/0/242000a804",
"title": "Mashuprium and Timeline Visualization: Implementation of 3D Space and Timeline Visualization for Automatic Mashup Creation",
"doi": null,
"abstractUrl": "/proceedings-article/iiai-aai/2021/242000a804/1Eb2ClhUYbS",
"parentPublication": {
"id": "proceedings/iiai-aai/2021/2420/0",
"title": "2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNx7ouU0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"acronym": "cmv",
"groupId": "1000170",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrGb2h5",
"doi": "10.1109/CMV.2007.20",
"title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"normalizedTitle": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"abstract": "The area of Coordinated and Multiple Views has been steadily developing and maturing over the past fifteen years. Some may say that it is a ?solved problem?, while others argue that we are only just scratching the surface of the subject. Considering merely the CMV conference series, it is clear to see that in the early years researchers were concerned with models and techniques, while in latter years authors presented more work on how to apply these ideas to different domains. It is our view that there is still much research to be done, but the subject is changing and developing as a tool for Visual Analytics. This paper provides the ?state of the art? of CMV, it describes areas that should be developed further and looks at what the future may hold for Coordinated and Multiple Views.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The area of Coordinated and Multiple Views has been steadily developing and maturing over the past fifteen years. Some may say that it is a ?solved problem?, while others argue that we are only just scratching the surface of the subject. Considering merely the CMV conference series, it is clear to see that in the early years researchers were concerned with models and techniques, while in latter years authors presented more work on how to apply these ideas to different domains. It is our view that there is still much research to be done, but the subject is changing and developing as a tool for Visual Analytics. This paper provides the ?state of the art? of CMV, it describes areas that should be developed further and looks at what the future may hold for Coordinated and Multiple Views.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The area of Coordinated and Multiple Views has been steadily developing and maturing over the past fifteen years. Some may say that it is a ?solved problem?, while others argue that we are only just scratching the surface of the subject. Considering merely the CMV conference series, it is clear to see that in the early years researchers were concerned with models and techniques, while in latter years authors presented more work on how to apply these ideas to different domains. It is our view that there is still much research to be done, but the subject is changing and developing as a tool for Visual Analytics. This paper provides the ?state of the art? of CMV, it describes areas that should be developed further and looks at what the future may hold for Coordinated and Multiple Views.",
"fno": "29030061",
"keywords": [
"Coordinated And Multiple Views",
"Linked Views",
"Information Visualization",
"Exploratory Visualization"
],
"authors": [
{
"affiliation": "University of Kent, UK",
"fullName": "Jonathan C. Roberts",
"givenName": "Jonathan C.",
"surname": "Roberts",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cmv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-06-01T00:00:00",
"pubType": "proceedings",
"pages": "61-71",
"year": "2007",
"issn": null,
"isbn": "0-7695-2903-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "29030047",
"articleId": "12OmNrIrPrw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "29030072",
"articleId": "12OmNBajTJq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cmv/2007/2903/0/29030072",
"title": "Coordinated Multiple Views: a Critical View",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2004/8779/0/87790159",
"title": "Building Highly-Coordinated Visualizations in Improvise",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2004/87790159/12OmNqBtiFh",
"parentPublication": {
"id": "proceedings/ieee-infovis/2004/8779/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a113",
"title": "The Impact of Multiple Coordinated Views on the Visual Data Exploration and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a113/12OmNrY3LB9",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2007/2900/0/29000156",
"title": "Coordinated and Multiple Views in Augmented Reality Environment",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo",
"parentPublication": {
"id": "proceedings/iv/2007/2900/0",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030076",
"title": "Requirements for coordinated multiple view visualization systems for industrial applications",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030076/12OmNxA3YRg",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2005/2790/0/27900022",
"title": "Visualizing Coordination In Situ",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2005/27900022/12OmNxdm4wZ",
"parentPublication": {
"id": "proceedings/ieee-infovis/2005/2790/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2005/2396/0/23960003",
"title": "Coordinated Parallel Views for the Exploratory Analysis of Microarray Time-course Data",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2005/23960003/12OmNxwENKJ",
"parentPublication": {
"id": "proceedings/cmv/2005/2396/0",
"title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2003/2001/0/20010095",
"title": "Coordinated Views in Dynamic Interactive Documents",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2003/20010095/12OmNy5R3zQ",
"parentPublication": {
"id": "proceedings/cmv/2003/2001/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2004/2179/0/21790084",
"title": "Integrating UML Views with Visual Cues",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2004/21790084/12OmNz2C1mb",
"parentPublication": {
"id": "proceedings/cmv/2004/2179/0",
"title": "Proceedings. Second International Conference on Coordinated & Multiple Views in Exploratory Visualization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030080",
"title": "Is Coordination a Means to Collaboration?",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030080/12OmNzWOBf2",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNylsZKk",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNs4S8Jo",
"doi": "10.1109/IV.2007.38",
"title": "Coordinated and Multiple Views in Augmented Reality Environment",
"normalizedTitle": "Coordinated and Multiple Views in Augmented Reality Environment",
"abstract": "The paper presents a prototype that implements multiple coordinated views to information visualization in augmented reality environments. Augmented reality provides more intuitive and easy interaction. It also reduces the limitations of visualization and enhances the collaborative aspect. A modified version of ARToolKit has been used to create the augmented environment, and the 3D scatter plot technique has been developed to represent the multiple views of data. The coordination between views supported dynamic queries, data selection, and the configuration of views and of the detail on demand feature. This paper also reproduces literature usability tests based on tasks in order to analyze the viability to implement multiple coordinated views in augmented environments for information visualization.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The paper presents a prototype that implements multiple coordinated views to information visualization in augmented reality environments. Augmented reality provides more intuitive and easy interaction. It also reduces the limitations of visualization and enhances the collaborative aspect. A modified version of ARToolKit has been used to create the augmented environment, and the 3D scatter plot technique has been developed to represent the multiple views of data. The coordination between views supported dynamic queries, data selection, and the configuration of views and of the detail on demand feature. This paper also reproduces literature usability tests based on tasks in order to analyze the viability to implement multiple coordinated views in augmented environments for information visualization.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The paper presents a prototype that implements multiple coordinated views to information visualization in augmented reality environments. Augmented reality provides more intuitive and easy interaction. It also reduces the limitations of visualization and enhances the collaborative aspect. A modified version of ARToolKit has been used to create the augmented environment, and the 3D scatter plot technique has been developed to represent the multiple views of data. The coordination between views supported dynamic queries, data selection, and the configuration of views and of the detail on demand feature. This paper also reproduces literature usability tests based on tasks in order to analyze the viability to implement multiple coordinated views in augmented environments for information visualization.",
"fno": "29000156",
"keywords": [
"Information Visualization",
"Augmented Reality",
"Multiple Coordinated Views"
],
"authors": [
{
"affiliation": "Universidade Federal do Par?",
"fullName": "Ricardo Melo Casseb do Carmo",
"givenName": "Ricardo Melo",
"surname": "Casseb do Carmo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centro Universit?rio do Par? (CESUPA) Bel?m-PA-Brasil",
"fullName": "Bianchi Serique Meiguins",
"givenName": "Bianchi Serique",
"surname": "Meiguins",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centro Universit?rio do Par? (CESUPA) Bel?m-PA-Brasil",
"fullName": "Aruanda Sim?es Gon?alves Meiguins",
"givenName": "Aruanda Sim?es Gon?alves",
"surname": "Meiguins",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidade Federal do Par? (UFPA) Bel?m-PA-Brasil",
"fullName": "Sergio Clayton Viana Pinheiro",
"givenName": "Sergio Clayton Viana",
"surname": "Pinheiro",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidade Federal do Par? (UFPA) Bel?m-PA-Brasil",
"fullName": "Leonardo Hernandez Almeida",
"givenName": "Leonardo Hernandez",
"surname": "Almeida",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidade Federal do Par? (UFPA) Bel?m-PA-Brasil",
"fullName": "Paulo Igor A. Godinho",
"givenName": "Paulo Igor A.",
"surname": "Godinho",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-06-01T00:00:00",
"pubType": "proceedings",
"pages": "156-162",
"year": "2007",
"issn": null,
"isbn": "0-7695-2907-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "29000150",
"articleId": "12OmNrAMEKp",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "29000232",
"articleId": "12OmNvDZEV1",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cmv/2007/2903/0/29030072",
"title": "Coordinated Multiple Views: a Critical View",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030061",
"title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a113",
"title": "The Impact of Multiple Coordinated Views on the Visual Data Exploration and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a113/12OmNrY3LB9",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2013/2869/0/06671758",
"title": "Adaptive ghosted views for Augmented Reality",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2013/06671758/12OmNxR5UID",
"parentPublication": {
"id": "proceedings/ismar/2013/2869/0",
"title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2005/2396/0/23960003",
"title": "Coordinated Parallel Views for the Exploratory Analysis of Microarray Time-course Data",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2005/23960003/12OmNxwENKJ",
"parentPublication": {
"id": "proceedings/cmv/2005/2396/0",
"title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2003/2001/0/20010095",
"title": "Coordinated Views in Dynamic Interactive Documents",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2003/20010095/12OmNy5R3zQ",
"parentPublication": {
"id": "proceedings/cmv/2003/2001/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a258",
"title": "Business Transactions Analysis Based on Multiple Data Coordinated Views",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a258/12OmNynJMFi",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a246",
"title": "Coordinated and Multiple Views for Visualizing Text Collections",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a246/12OmNzBwGtI",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/1997/8262/0/82620459",
"title": "Collaborative augmented reality: exploring dynamical systems",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1997/82620459/12OmNzEVRYv",
"parentPublication": {
"id": "proceedings/ieee-vis/1997/8262/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2009/06/ttg2009061383",
"title": "Interactive Coordinated Multiple-View Visualization of Biomechanical Motion Data",
"doi": null,
"abstractUrl": "/journal/tg/2009/06/ttg2009061383/13rRUwfI0Q3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvjgWMZ",
"title": "2008 12th International Conference Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNynJMFi",
"doi": "10.1109/IV.2008.61",
"title": "Business Transactions Analysis Based on Multiple Data Coordinated Views",
"normalizedTitle": "Business Transactions Analysis Based on Multiple Data Coordinated Views",
"abstract": "Getting to know clients and their behavior is essential in the growing process of any company that searches for improvement and business opportunities. One of the ways to discover more about their clients’ behavior is to analyze the history of their transactions with the company or partners. The amount of transactions is often huge, what demands tools that help explore and analyze data in search for patterns or outliers. The tool used in this paper is called PRISMA and is based on multiple coordinated visualization techniques. Its major goal is to enhance the user’s perception about data and what is related to it, identifying problems that might occur during transactions, in order to improve or find business opportunities in them.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Getting to know clients and their behavior is essential in the growing process of any company that searches for improvement and business opportunities. One of the ways to discover more about their clients’ behavior is to analyze the history of their transactions with the company or partners. The amount of transactions is often huge, what demands tools that help explore and analyze data in search for patterns or outliers. The tool used in this paper is called PRISMA and is based on multiple coordinated visualization techniques. Its major goal is to enhance the user’s perception about data and what is related to it, identifying problems that might occur during transactions, in order to improve or find business opportunities in them.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Getting to know clients and their behavior is essential in the growing process of any company that searches for improvement and business opportunities. One of the ways to discover more about their clients’ behavior is to analyze the history of their transactions with the company or partners. The amount of transactions is often huge, what demands tools that help explore and analyze data in search for patterns or outliers. The tool used in this paper is called PRISMA and is based on multiple coordinated visualization techniques. Its major goal is to enhance the user’s perception about data and what is related to it, identifying problems that might occur during transactions, in order to improve or find business opportunities in them.",
"fno": "3268a258",
"keywords": [
"Information Visualization",
"Multiple Coordinated Views",
"Business Transactions"
],
"authors": [
{
"affiliation": null,
"fullName": "Andre Luiz da Silva Kauer",
"givenName": "Andre Luiz da Silva",
"surname": "Kauer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bianchi Serique Meiguins",
"givenName": "Bianchi Serique",
"surname": "Meiguins",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alexandre Henrique Ichihara Pires",
"givenName": "Alexandre Henrique Ichihara",
"surname": "Pires",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Marcelo de Brito Garcia",
"givenName": "Marcelo de Brito",
"surname": "Garcia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Aruanda Sim?es Gon?alves Meiguins",
"givenName": "Aruanda Sim?es Gon?alves",
"surname": "Meiguins",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "258-263",
"year": "2008",
"issn": "1550-6037",
"isbn": "978-0-7695-3268-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3268a252",
"articleId": "12OmNrMZpzl",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3268a264",
"articleId": "12OmNx3Zjnt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2008/3268/0/3268a151",
"title": "An Information Visualization Tool with Multiple Coordinated Views for Network Traffic Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a151/12OmNBKEyuH",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030072",
"title": "Coordinated Multiple Views: a Critical View",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030061",
"title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a113",
"title": "The Impact of Multiple Coordinated Views on the Visual Data Exploration and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a113/12OmNrY3LB9",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2007/2900/0/29000156",
"title": "Coordinated and Multiple Views in Augmented Reality Environment",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo",
"parentPublication": {
"id": "proceedings/iv/2007/2900/0",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030076",
"title": "Requirements for coordinated multiple view visualization systems for industrial applications",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030076/12OmNxA3YRg",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2003/2001/0/20010095",
"title": "Coordinated Views in Dynamic Interactive Documents",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2003/20010095/12OmNy5R3zQ",
"parentPublication": {
"id": "proceedings/cmv/2003/2001/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a246",
"title": "Coordinated and Multiple Views for Visualizing Text Collections",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a246/12OmNzBwGtI",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3pgcic/2011/4531/0/4531a207",
"title": "Enabling Business Rules for Concurrent Transactions",
"doi": null,
"abstractUrl": "/proceedings-article/3pgcic/2011/4531a207/12OmNzahc2R",
"parentPublication": {
"id": "proceedings/3pgcic/2011/4531/0",
"title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2009/06/ttg2009061383",
"title": "Interactive Coordinated Multiple-View Visualization of Biomechanical Motion Data",
"doi": null,
"abstractUrl": "/journal/tg/2009/06/ttg2009061383/13rRUwfI0Q3",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvjgWMZ",
"title": "2008 12th International Conference Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzBwGtI",
"doi": "10.1109/IV.2008.39",
"title": "Coordinated and Multiple Views for Visualizing Text Collections",
"normalizedTitle": "Coordinated and Multiple Views for Visualizing Text Collections",
"abstract": "Multiple Views have been put forward as an alternative to assist exploration of evolving phenomena or associations between distinct data sets or distinct presentations of a single data set. Coordinating between views is a challenge that must be met to improve visualization support for exploratory tasks. This is particularly true for high-dimensional data, such as document collections. We introduce a coordination framework for multiple views of document collections created using projections and point placement visualizations. Coordination can occur between different views of a single data set or between views of multiple data sets. Multiple coordinations are also admitted. Three new types of coordination are presented to illustrate the framework; these have been implemented in a multipurpose multi-dimensional visualization system called PEx (Projection Explorer).",
"abstracts": [
{
"abstractType": "Regular",
"content": "Multiple Views have been put forward as an alternative to assist exploration of evolving phenomena or associations between distinct data sets or distinct presentations of a single data set. Coordinating between views is a challenge that must be met to improve visualization support for exploratory tasks. This is particularly true for high-dimensional data, such as document collections. We introduce a coordination framework for multiple views of document collections created using projections and point placement visualizations. Coordination can occur between different views of a single data set or between views of multiple data sets. Multiple coordinations are also admitted. Three new types of coordination are presented to illustrate the framework; these have been implemented in a multipurpose multi-dimensional visualization system called PEx (Projection Explorer).",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Multiple Views have been put forward as an alternative to assist exploration of evolving phenomena or associations between distinct data sets or distinct presentations of a single data set. Coordinating between views is a challenge that must be met to improve visualization support for exploratory tasks. This is particularly true for high-dimensional data, such as document collections. We introduce a coordination framework for multiple views of document collections created using projections and point placement visualizations. Coordination can occur between different views of a single data set or between views of multiple data sets. Multiple coordinations are also admitted. Three new types of coordination are presented to illustrate the framework; these have been implemented in a multipurpose multi-dimensional visualization system called PEx (Projection Explorer).",
"fno": "3268a246",
"keywords": [
"Coordination Framework",
"Coordinated And Multiple Views",
"Text Visualization",
"Corpus Visualization",
"Document Maps"
],
"authors": [
{
"affiliation": null,
"fullName": "Danilo Medeiros Eler",
"givenName": "Danilo Medeiros",
"surname": "Eler",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fernando Vieira Paulovich",
"givenName": "Fernando Vieira",
"surname": "Paulovich",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Maria Cristina Ferreira de Oliveira",
"givenName": "Maria Cristina Ferreira de",
"surname": "Oliveira",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rosane Minghim",
"givenName": "Rosane",
"surname": "Minghim",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "246-251",
"year": "2008",
"issn": "1550-6037",
"isbn": "978-0-7695-3268-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3268a240",
"articleId": "12OmNzXFoyg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3268a252",
"articleId": "12OmNrMZpzl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2012/4771/0/4771a630",
"title": "A Model to Store Coordination Mappings",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2012/4771a630/12OmNBVIUx5",
"parentPublication": {
"id": "proceedings/iv/2012/4771/0",
"title": "2012 16th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030072",
"title": "Coordinated Multiple Views: a Critical View",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030072/12OmNBajTJq",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a149",
"title": "Topic-Based Coordination for Visual Analysis of Evolving Document Collections",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a149/12OmNBhpS9v",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2004/8779/0/87790159",
"title": "Building Highly-Coordinated Visualizations in Improvise",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2004/87790159/12OmNqBtiFh",
"parentPublication": {
"id": "proceedings/ieee-infovis/2004/8779/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2007/2903/0/29030061",
"title": "State of the Art: Coordinated & Multiple Views in Exploratory Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2007/29030061/12OmNrGb2h5",
"parentPublication": {
"id": "proceedings/cmv/2007/2903/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2008/3268/0/3268a113",
"title": "The Impact of Multiple Coordinated Views on the Visual Data Exploration and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2008/3268a113/12OmNrY3LB9",
"parentPublication": {
"id": "proceedings/iv/2008/3268/0",
"title": "2008 12th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2007/2900/0/29000156",
"title": "Coordinated and Multiple Views in Augmented Reality Environment",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2007/29000156/12OmNs4S8Jo",
"parentPublication": {
"id": "proceedings/iv/2007/2900/0",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2005/2790/0/27900022",
"title": "Visualizing Coordination In Situ",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2005/27900022/12OmNxdm4wZ",
"parentPublication": {
"id": "proceedings/ieee-infovis/2005/2790/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2005/2396/0/23960003",
"title": "Coordinated Parallel Views for the Exploratory Analysis of Microarray Time-course Data",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2005/23960003/12OmNxwENKJ",
"parentPublication": {
"id": "proceedings/cmv/2005/2396/0",
"title": "Proceedings. Third International Conference on Coordinated and Multiple Views in Exploratory Visualization (CMV 2005)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmv/2003/2001/0/20010095",
"title": "Coordinated Views in Dynamic Interactive Documents",
"doi": null,
"abstractUrl": "/proceedings-article/cmv/2003/20010095/12OmNy5R3zQ",
"parentPublication": {
"id": "proceedings/cmv/2003/2001/0",
"title": "Coordinated and Multiple Views in Exploratory Visualization, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNxFJXGh",
"title": "Proceedings of 1994 IEEE Symposium on Visual Languages",
"acronym": "vl",
"groupId": "1000793",
"volume": "0",
"displayVolume": "0",
"year": "1994",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAle6jT",
"doi": "10.1109/VL.1994.363639",
"title": "GUIDO, a visual tool for retrieving documents",
"normalizedTitle": "GUIDO, a visual tool for retrieving documents",
"abstract": "GUIDO (Graphical User Interface for Document Organization) uses an iconic interface to display large numbers of documents. The interface, whose emphasis is on the retrieval of information, reduces the dimensionality of vector space model to comprehensible two-dimensional distance display. The information hidden as the result of iconization and dimension reduction is displayed using several GUIDO tools. These include coordinations among multiple GUIDO displays.<>",
"abstracts": [
{
"abstractType": "Regular",
"content": "GUIDO (Graphical User Interface for Document Organization) uses an iconic interface to display large numbers of documents. The interface, whose emphasis is on the retrieval of information, reduces the dimensionality of vector space model to comprehensible two-dimensional distance display. The information hidden as the result of iconization and dimension reduction is displayed using several GUIDO tools. These include coordinations among multiple GUIDO displays.<>",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "GUIDO (Graphical User Interface for Document Organization) uses an iconic interface to display large numbers of documents. The interface, whose emphasis is on the retrieval of information, reduces the dimensionality of vector space model to comprehensible two-dimensional distance display. The information hidden as the result of iconization and dimension reduction is displayed using several GUIDO tools. These include coordinations among multiple GUIDO displays.",
"fno": "00363639",
"keywords": [
"Information Retrieval",
"Graphical User Interfaces",
"Software Tools",
"Visual Languages",
"Visual Programming",
"GUIDO",
"Graphical User Interface",
"Document Organization",
"Iconic Interface",
"Vector Space Model",
"Two Dimensional Distance Display",
"Dimension Reduction",
"Information Retrieval",
"Visual Databases",
"Graphical User Interfaces",
"Information Science",
"Two Dimensional Displays",
"Data Visualization",
"Information Systems",
"Filters",
"Filtering",
"Books"
],
"authors": [
{
"affiliation": "Dept. of Inf. Sci., Pittsburgh Univ., PA, USA",
"fullName": "A. Nuchprayoon",
"givenName": "A.",
"surname": "Nuchprayoon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Inf. Sci., Pittsburgh Univ., PA, USA",
"fullName": "R.R. Korfhage",
"givenName": "R.R.",
"surname": "Korfhage",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vl",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1994-01-01T00:00:00",
"pubType": "proceedings",
"pages": "64,65,66,67,68,69,70,71",
"year": "1994",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00363638",
"articleId": "12OmNwCsdP6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00363640",
"articleId": "12OmNzcPAgo",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wvl/1991/2330/0/00238850",
"title": "Information display: control of visual representations",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1991/00238850/12OmNB8kHPh",
"parentPublication": {
"id": "proceedings/wvl/1991/2330/0",
"title": "Proceedings 1991 IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl/1995/7045/0/70450107",
"title": "HI-VISUAL as a user-customizable visual programming environment",
"doi": null,
"abstractUrl": "/proceedings-article/vl/1995/70450107/12OmNBCqbIK",
"parentPublication": {
"id": "proceedings/vl/1995/7045/0",
"title": "Visual Languages, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wvl/1989/2002/0/00077056",
"title": "An intelligent iconic system to generate and to interpret visual languages",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1989/00077056/12OmNrFBQ0l",
"parentPublication": {
"id": "proceedings/wvl/1989/2002/0",
"title": "1989 IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmpsac/1991/2152/0/00170175",
"title": "A visual data manipulation language for a semantic data model",
"doi": null,
"abstractUrl": "/proceedings-article/cmpsac/1991/00170175/12OmNvlg8pj",
"parentPublication": {
"id": "proceedings/cmpsac/1991/2152/0",
"title": "1991 The Fifteenth Annual International Computer Software & Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/gscit/2016/2659/0/2659a009",
"title": "Visual Query Manager: A Query Manager for Visual Management of Semantic Databases",
"doi": null,
"abstractUrl": "/proceedings-article/gscit/2016/2659a009/12OmNwMXnsh",
"parentPublication": {
"id": "proceedings/gscit/2016/2659/0",
"title": "2016 Global Summit on Computer & Information Technology (GSCIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iri/2014/5880/0/07051956",
"title": "Understanding implicit and explicit interface tools to perform visual analytics tasks",
"doi": null,
"abstractUrl": "/proceedings-article/iri/2014/07051956/12OmNyVes4P",
"parentPublication": {
"id": "proceedings/iri/2014/5880/0",
"title": "2014 IEEE International Conference on Information Reuse and Integration (IRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wvl/1989/2002/0/00077042",
"title": "QBD: a fully visual system for E-R oriented databases",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1989/00077042/12OmNyYDDwM",
"parentPublication": {
"id": "proceedings/wvl/1989/2002/0",
"title": "1989 IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wvl/1992/3090/0/00275769",
"title": "Visual tools for generating iconic programming environments",
"doi": null,
"abstractUrl": "/proceedings-article/wvl/1992/00275769/12OmNz4SOxa",
"parentPublication": {
"id": "proceedings/wvl/1992/3090/0",
"title": "Proceedings IEEE Workshop on Visual Languages",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/so/1994/06/s6070",
"title": "Dynamic Queries for Visual Information Seeking",
"doi": null,
"abstractUrl": "/magazine/so/1994/06/s6070/13rRUygT7wc",
"parentPublication": {
"id": "mags/so",
"title": "IEEE Software",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ase/2020/6768/0/676800a398",
"title": "Owl Eyes: Spotting UI Display Issues via Visual Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/ase/2020/676800a398/1pP3H5wW7te",
"parentPublication": {
"id": "proceedings/ase/2020/6768/0",
"title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNrAdsts",
"title": "Proceedings of HCC 2001. IEEE Symposium on Human-Centric Computing Languages and Environments",
"acronym": "hcc",
"groupId": "1000339",
"volume": "0",
"displayVolume": "0",
"year": "2001",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAq3hwT",
"doi": "10.1109/HCC.2001.995300",
"title": "VXT: Visual XML Transformer",
"normalizedTitle": "VXT: Visual XML Transformer",
"abstract": "The ever-growing amount of heterogeneous data exchanged via the Internet, combined with the popularity of XML, makes structured document transformations an increasingly important application domain. Most of the existing solutions for expressing XML transformations are textual languages, such as XSLT (Extensible Stylesheet Language Transformations) or DOM (Document Object Model), combined with a general-purpose programming language. Several tools build on top of these languages, providing a graphical environment and debugging facilities. Transformations are, however, still specified in a textual way using the underlying language (often XSLT), thus requiring users to learn it. We believe that visual programming techniques are well-suited to representing XML structures and make the specification of transformations simpler. We propose a visual language, called VXT (Visual XML Transformer), for the specification of XML transformations in an interactive environment based on a zoomable user interface toolkit and on two target languages specialised in structure transformations: Circus and XSLT.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The ever-growing amount of heterogeneous data exchanged via the Internet, combined with the popularity of XML, makes structured document transformations an increasingly important application domain. Most of the existing solutions for expressing XML transformations are textual languages, such as XSLT (Extensible Stylesheet Language Transformations) or DOM (Document Object Model), combined with a general-purpose programming language. Several tools build on top of these languages, providing a graphical environment and debugging facilities. Transformations are, however, still specified in a textual way using the underlying language (often XSLT), thus requiring users to learn it. We believe that visual programming techniques are well-suited to representing XML structures and make the specification of transformations simpler. We propose a visual language, called VXT (Visual XML Transformer), for the specification of XML transformations in an interactive environment based on a zoomable user interface toolkit and on two target languages specialised in structure transformations: Circus and XSLT.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The ever-growing amount of heterogeneous data exchanged via the Internet, combined with the popularity of XML, makes structured document transformations an increasingly important application domain. Most of the existing solutions for expressing XML transformations are textual languages, such as XSLT (Extensible Stylesheet Language Transformations) or DOM (Document Object Model), combined with a general-purpose programming language. Several tools build on top of these languages, providing a graphical environment and debugging facilities. Transformations are, however, still specified in a textual way using the underlying language (often XSLT), thus requiring users to learn it. We believe that visual programming techniques are well-suited to representing XML structures and make the specification of transformations simpler. We propose a visual language, called VXT (Visual XML Transformer), for the specification of XML transformations in an interactive environment based on a zoomable user interface toolkit and on two target languages specialised in structure transformations: Circus and XSLT.",
"fno": "00995300",
"keywords": [
"Hypermedia Markup Languages",
"Visual Languages",
"Specification Languages",
"User Interface Management Systems",
"Interactive Systems",
"Program Debugging",
"VXT",
"Visual XML Transformer",
"Heterogeneous Data Exchange",
"Internet",
"Structured Document Transformations",
"XML Transformations",
"Textual Languages",
"General Purpose Programming Language",
"Graphical Environment",
"Debugging Facilities",
"Visual Programming",
"XML Structure Representation",
"Visual Specification Language",
"Interactive Environment",
"Zoomable User Interface Toolkit",
"Structure Transformations",
"Circus",
"XSLT",
"Extensible Stylesheet Language Transformations",
"XML",
"Data Mining",
"Data Structures",
"Cognitive Science",
"Postal Services",
"Internet",
"Debugging",
"User Interfaces",
"Computer Languages",
"Tree Data Structures"
],
"authors": [
{
"affiliation": "Xerox Res. Centre Eur., Meylan, France",
"fullName": "E. Pietriga",
"givenName": "E.",
"surname": "Pietriga",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Xerox Res. Centre Eur., Meylan, France",
"fullName": "J.-Y. Vion-Dury",
"givenName": "J.-Y.",
"surname": "Vion-Dury",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "hcc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2001-01-01T00:00:00",
"pubType": "proceedings",
"pages": "404,405",
"year": "2001",
"issn": null,
"isbn": "0-7803-7198-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "00995299",
"articleId": "12OmNwwMf1W",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "00995301",
"articleId": "12OmNAJDBvz",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iciw/2009/3613/0/3613a149",
"title": "A Prototype Implementation of PPX: Pretty Printer for XML",
"doi": null,
"abstractUrl": "/proceedings-article/iciw/2009/3613a149/12OmNB06l3E",
"parentPublication": {
"id": "proceedings/iciw/2009/3613/0",
"title": "Internet and Web Applications and Services, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icebe/2007/3003/0/30030701",
"title": "Parallel XML Transformations on Multi-Core Processors",
"doi": null,
"abstractUrl": "/proceedings-article/icebe/2007/30030701/12OmNBBQZtj",
"parentPublication": {
"id": "proceedings/icebe/2007/3003/0",
"title": "IEEE International Conference on e-Business Engineering (ICEBE'07)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aina/2004/2051/1/205110556",
"title": "Using the Extension Function of XSLT and DSL to Secure XML Documents",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2004/205110556/12OmNClQ0tI",
"parentPublication": {
"id": "proceedings/aina/2004/2051/1",
"title": "18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eee/2005/2274/0/22740490",
"title": "Bridging Knowledge Bases' Heterogeneity using XML/XSLT Approach",
"doi": null,
"abstractUrl": "/proceedings-article/eee/2005/22740490/12OmNs0C9Vs",
"parentPublication": {
"id": "proceedings/eee/2005/2274/0",
"title": "Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itng/2009/3596/0/3596b073",
"title": "XML Based Implementation of a Bibliographic Database and Recursive Queries",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2009/3596b073/12OmNxHJ9t1",
"parentPublication": {
"id": "proceedings/itng/2009/3596/0",
"title": "Information Technology: New Generations, Third International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2003/1874/4/187440122b",
"title": "XML Security Using XSLT",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2003/187440122b/12OmNxiKs66",
"parentPublication": {
"id": "proceedings/hicss/2003/1874/4",
"title": "36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2003/1960/2/196021270",
"title": "XPEN: An XML Based Format for Distributed Online Handwriting Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2003/196021270/12OmNyaoDEr",
"parentPublication": {
"id": "proceedings/icdar/2003/1960/2",
"title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/saint/2004/2068/0/20680160",
"title": "XML Data Integration with OWL: Experiences and Challenges",
"doi": null,
"abstractUrl": "/proceedings-article/saint/2004/20680160/12OmNyrqzrX",
"parentPublication": {
"id": "proceedings/saint/2004/2068/0",
"title": "2004 International Symposium on Applications and the Internet. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2007/2932/0/29320015",
"title": "A Generic Framework for Target-Specific Transformation Operators in XML Transformation Languages",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2007/29320015/12OmNzZWbxv",
"parentPublication": {
"id": "proceedings/dexa/2007/2932/0",
"title": "18th International Workshop on Database and Expert Systems Applications (DEXA 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2001/1050/0/10500567",
"title": "TIGRA- An Architectural Style for Enterprise Application Integration",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2001/10500567/12OmNzuIjg0",
"parentPublication": {
"id": "proceedings/icse/2001/1050/0",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqOffxR",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "3",
"displayVolume": "3",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC3o50R",
"doi": "10.1109/ICME.2004.1394687",
"title": "Looking at projected documents: event detection & document identification",
"normalizedTitle": "Looking at projected documents: event detection & document identification",
"abstract": "In the context of a multimodal application, the article proposes an image-based method for bridging the gap between document excerpts and video extracts. The approach, called document image alignment, takes advantage of the observable events related to documents that are visible during meetings. In particular, the article presents a new method for detecting slide changes in slideshows, its evaluation, and a preliminary work on document identification.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the context of a multimodal application, the article proposes an image-based method for bridging the gap between document excerpts and video extracts. The approach, called document image alignment, takes advantage of the observable events related to documents that are visible during meetings. In particular, the article presents a new method for detecting slide changes in slideshows, its evaluation, and a preliminary work on document identification.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the context of a multimodal application, the article proposes an image-based method for bridging the gap between document excerpts and video extracts. The approach, called document image alignment, takes advantage of the observable events related to documents that are visible during meetings. In particular, the article presents a new method for detecting slide changes in slideshows, its evaluation, and a preliminary work on document identification.",
"fno": "01394687",
"keywords": [
"Document Image Processing",
"Object Recognition",
"Video Signal Processing",
"Projected Documents",
"Event Detection",
"Document Identification",
"Multimodal Application",
"Image Processing",
"Document Excerpts",
"Video Extracts",
"Document Image Alignment",
"Slide Change Detection",
"Slideshows",
"Meeting Archives",
"Event Detection",
"Histograms",
"Cameras",
"Focusing",
"Layout",
"Text Analysis",
"Image Analysis",
"Stability",
"Graphical User Interfaces",
"Standards Development"
],
"authors": [
{
"affiliation": "Fribourg Univ., Switzerland",
"fullName": "A. Behera",
"givenName": "A.",
"surname": "Behera",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fribourg Univ., Switzerland",
"fullName": "D. Lalanne",
"givenName": "D.",
"surname": "Lalanne",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fribourg Univ., Switzerland",
"fullName": "R. Ingold",
"givenName": "R.",
"surname": "Ingold",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-01-01T00:00:00",
"pubType": "proceedings",
"pages": "2127,2128,2129,2130",
"year": "2004",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01394686",
"articleId": "12OmNzBwGJ2",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01394688",
"articleId": "12OmNqHqStU",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdar/2013/4999/0/06628595",
"title": "Quality Evaluation of Ancient Digitized Documents for Binarization Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628595/12OmNAlNiMJ",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628669",
"title": "Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628669/12OmNAmmuTr",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2016/1792/0/1792a132",
"title": "Document Image Quality Assessment Based on Texture Similarity Index",
"doi": null,
"abstractUrl": "/proceedings-article/das/2016/1792a132/12OmNqGRGaW",
"parentPublication": {
"id": "proceedings/das/2016/1792/0",
"title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209d008",
"title": "A Global-to-Local Approach to Binarization of Degraded Document Images",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209d008/12OmNvTk06r",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981120",
"title": "ICFHR2014 Competition on Handwritten Document Image Binarization (H-DIBCO 2014)",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981120/12OmNvkGW7A",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiai-aai/2017/0621/0/0621a997",
"title": "Improving Document Availability in Storage",
"doi": null,
"abstractUrl": "/proceedings-article/iiai-aai/2017/0621a997/12OmNwCaCvJ",
"parentPublication": {
"id": "proceedings/iiai-aai/2017/0621/0",
"title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628796",
"title": "Detecting Main Body Size in Document Images",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628796/12OmNwNOaPC",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eisic/2011/4406/0/4406a038",
"title": "On Refining Real-Time Multilingual News Event Extraction through Deployment of Cross-Lingual Information Fusion Techniques",
"doi": null,
"abstractUrl": "/proceedings-article/eisic/2011/4406a038/12OmNxEBz08",
"parentPublication": {
"id": "proceedings/eisic/2011/4406/0",
"title": "European Intelligence and Security Informatics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icfhr/2014/4335/0/06981067",
"title": "Page Segmentation for Historical Handwritten Document Images Using Color and Texture Features",
"doi": null,
"abstractUrl": "/proceedings-article/icfhr/2014/06981067/12OmNxI0KA6",
"parentPublication": {
"id": "proceedings/icfhr/2014/4335/0",
"title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628607",
"title": "An Objective Method to Evaluate Stroke-Width Measures for Binarized Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628607/12OmNz6Apb9",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyO8tML",
"title": "2017 International Conference on Machine learning and Data Science (MLDS)",
"acronym": "mlds",
"groupId": "1824204",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCgrD0L",
"doi": "10.1109/MLDS.2017.24",
"title": "Learning to Filter Documents for Information Extraction Using Rapid Annotation",
"normalizedTitle": "Learning to Filter Documents for Information Extraction Using Rapid Annotation",
"abstract": "Corpus-driven approaches to information extraction from documents face problems of relevance determination, namely determining which documents are of requisite type, structure, and content for a specified query and context. In this paper, we discuss the problem of learning to filter documents crawled from the web with respect to such relevance criteria, and in particular how to annotate document corpora for supervised classification learning approaches to this problem. For context, we describe a system aimed at extracting experimental data from scientific publications, with the long-term goal of extracting procedural information from relevant sections on experimental methodology. We consider motivating use cases for our learning filter, using the documents passed by the filter: marking up sections (or passages); capturing entities and relationships; and explaining to a domain expert why a document is relevant. These distinct use cases make the annotation task multi-faceted. Our approach focuses on speeding up annotation in learning to filter while minimizing loss of precision or recall on the learning task, using a reconfigurable user interface. We develop such an interface, report on its use in tandem with classification on a real extraction task, and discuss extensions of this work to visual scene filtering and annotation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Corpus-driven approaches to information extraction from documents face problems of relevance determination, namely determining which documents are of requisite type, structure, and content for a specified query and context. In this paper, we discuss the problem of learning to filter documents crawled from the web with respect to such relevance criteria, and in particular how to annotate document corpora for supervised classification learning approaches to this problem. For context, we describe a system aimed at extracting experimental data from scientific publications, with the long-term goal of extracting procedural information from relevant sections on experimental methodology. We consider motivating use cases for our learning filter, using the documents passed by the filter: marking up sections (or passages); capturing entities and relationships; and explaining to a domain expert why a document is relevant. These distinct use cases make the annotation task multi-faceted. Our approach focuses on speeding up annotation in learning to filter while minimizing loss of precision or recall on the learning task, using a reconfigurable user interface. We develop such an interface, report on its use in tandem with classification on a real extraction task, and discuss extensions of this work to visual scene filtering and annotation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Corpus-driven approaches to information extraction from documents face problems of relevance determination, namely determining which documents are of requisite type, structure, and content for a specified query and context. In this paper, we discuss the problem of learning to filter documents crawled from the web with respect to such relevance criteria, and in particular how to annotate document corpora for supervised classification learning approaches to this problem. For context, we describe a system aimed at extracting experimental data from scientific publications, with the long-term goal of extracting procedural information from relevant sections on experimental methodology. We consider motivating use cases for our learning filter, using the documents passed by the filter: marking up sections (or passages); capturing entities and relationships; and explaining to a domain expert why a document is relevant. These distinct use cases make the annotation task multi-faceted. Our approach focuses on speeding up annotation in learning to filter while minimizing loss of precision or recall on the learning task, using a reconfigurable user interface. We develop such an interface, report on its use in tandem with classification on a real extraction task, and discuss extensions of this work to visual scene filtering and annotation.",
"fno": "3446a085",
"keywords": [
"Data Mining",
"Image Annotation",
"Image Retrieval",
"Information Retrieval",
"Learning Artificial Intelligence",
"Pattern Classification",
"User Interfaces",
"Procedural Information",
"Learning Filter",
"Visual Scene Filtering",
"Relevance Criteria",
"Document Corpora",
"Supervised Classification Learning",
"Information Extraction Task",
"Document Filtering",
"Reconfigurable User Interface",
"Task Analysis",
"Information Filters",
"Data Mining",
"Feature Extraction",
"User Interfaces"
],
"authors": [
{
"affiliation": null,
"fullName": "Carlos A. Aguirre",
"givenName": "Carlos A.",
"surname": "Aguirre",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Sneha Gullapalli",
"givenName": "Sneha",
"surname": "Gullapalli",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Maria F. De La Torre",
"givenName": "Maria F.",
"surname": "De La Torre",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alice Lam",
"givenName": "Alice",
"surname": "Lam",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Joshua Levi Weese",
"givenName": "Joshua Levi",
"surname": "Weese",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "William H. Hsu",
"givenName": "William H.",
"surname": "Hsu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "mlds",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "85-90",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-3446-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3446a080",
"articleId": "12OmNBEpnEN",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3446a091",
"articleId": "12OmNyRxFzA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icde/2005/2285/0/22850583",
"title": "Bootstrapping Semantic Annotation for Content-Rich HTML Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2005/22850583/12OmNBKW9xJ",
"parentPublication": {
"id": "proceedings/icde/2005/2285/0",
"title": "21st International Conference on Data Engineering (ICDE'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edocw/2010/7965/0/05629043",
"title": "An Infrastructure for Managing Semantic Documents",
"doi": null,
"abstractUrl": "/proceedings-article/edocw/2010/05629043/12OmNBqdr6r",
"parentPublication": {
"id": "proceedings/edocw/2010/7965/0",
"title": "2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2015/1805/0/07333775",
"title": "Automatic annotation extension and classification of documents using a probabilistic graphical model",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2015/07333775/12OmNwIHoxE",
"parentPublication": {
"id": "proceedings/icdar/2015/1805/0",
"title": "2015 13th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2008/3337/0/3337a329",
"title": "Accuracy Improvement and Objective Evaluation of Annotation Extraction from Printed Documents",
"doi": null,
"abstractUrl": "/proceedings-article/das/2008/3337a329/12OmNxA3Z8H",
"parentPublication": {
"id": "proceedings/das/2008/3337/0",
"title": "2008 The Eighth IAPR International Workshop on Document Analysis Systems (DAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2016/1792/0/1792a434",
"title": "Camera-Based System for User Friendly Annotation of Documents",
"doi": null,
"abstractUrl": "/proceedings-article/das/2016/1792a434/12OmNxcMSfE",
"parentPublication": {
"id": "proceedings/das/2016/1792/0",
"title": "2016 12th IAPR Workshop on Document Analysis Systems (DAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2007/2822/1/28220023",
"title": "A Method of Annotation Extraction from Paper Documents Using Alignment Based on Local Arrangements of Feature Points",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2007/28220023/12OmNzaQoJT",
"parentPublication": {
"id": "proceedings/icdar/2007/2822/1",
"title": "Ninth International Conference on Document Analysis and Recognition (ICDAR 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsc/2019/6783/0/08665501",
"title": "Corpus-Driven Annotation Enrichment",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2019/08665501/18qchfw6SJi",
"parentPublication": {
"id": "proceedings/icsc/2019/6783/0",
"title": "2019 IEEE 13th International Conference on Semantic Computing (ICSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ichi/2022/6845/0/684500a530",
"title": "MedTator: A Serverless Web-based Tool for Corpus Annotation",
"doi": null,
"abstractUrl": "/proceedings-article/ichi/2022/684500a530/1Gvdr8p8x3O",
"parentPublication": {
"id": "proceedings/ichi/2022/6845/0",
"title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006355",
"title": "WATAPI: Composing Web API Specification from API Documentations through an Intelligent and Interactive Annotation Tool",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006355/1hJrZG4XNT2",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mass/2021/4935/0/493500a633",
"title": "Pyrenote: a Web-based, Manual Annotation Tool for Passive Acoustic Monitoring",
"doi": null,
"abstractUrl": "/proceedings-article/mass/2021/493500a633/1ziOyp19B5e",
"parentPublication": {
"id": "proceedings/mass/2021/4935/0",
"title": "2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems (MASS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNApu5mZ",
"title": "2008 4th International Conference on Autonomic and Autonomous Systems",
"acronym": "icas",
"groupId": "1001508",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxX3urz",
"doi": "10.1109/ICAS.2008.30",
"title": "Understanding Stories about Personal Documents",
"normalizedTitle": "Understanding Stories about Personal Documents",
"abstract": "Hierarchies are the most common way to help users organize their personal information. However, their use is fraught with problems. In particular, the users? documents, stored in the filesystem, are notoriously difficult to manage and retrieve. A way to alleviate those problems is to resort to a wide range of knowledge about the users, their actions and the world that surrounds them. Systems that have done so lack an organizing principle that helps users refer to all the information that might be relevant. We propose a novel user interface paradigm, narrative-based interfaces, that provides such an organizing principle, showing how knowledge plays a central role in understanding the users? stories. An analysis of Quill, a prototype narrative-based interface for personal document retrieval, will show how narratives can successfully be used to help users retrieve their documents.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Hierarchies are the most common way to help users organize their personal information. However, their use is fraught with problems. In particular, the users? documents, stored in the filesystem, are notoriously difficult to manage and retrieve. A way to alleviate those problems is to resort to a wide range of knowledge about the users, their actions and the world that surrounds them. Systems that have done so lack an organizing principle that helps users refer to all the information that might be relevant. We propose a novel user interface paradigm, narrative-based interfaces, that provides such an organizing principle, showing how knowledge plays a central role in understanding the users? stories. An analysis of Quill, a prototype narrative-based interface for personal document retrieval, will show how narratives can successfully be used to help users retrieve their documents.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Hierarchies are the most common way to help users organize their personal information. However, their use is fraught with problems. In particular, the users? documents, stored in the filesystem, are notoriously difficult to manage and retrieve. A way to alleviate those problems is to resort to a wide range of knowledge about the users, their actions and the world that surrounds them. Systems that have done so lack an organizing principle that helps users refer to all the information that might be relevant. We propose a novel user interface paradigm, narrative-based interfaces, that provides such an organizing principle, showing how knowledge plays a central role in understanding the users? stories. An analysis of Quill, a prototype narrative-based interface for personal document retrieval, will show how narratives can successfully be used to help users retrieve their documents.",
"fno": "3093a023",
"keywords": [
"Personal Information Management",
"User Interfaces",
"Information Retrieval",
"User Centered Design"
],
"authors": [
{
"affiliation": null,
"fullName": "Daniel Gon?alves",
"givenName": "Daniel",
"surname": "Gon?alves",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tiago Guerreiro",
"givenName": "Tiago",
"surname": "Guerreiro",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Joaquim A. Jorge",
"givenName": "Joaquim A.",
"surname": "Jorge",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icas",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-03-01T00:00:00",
"pubType": "proceedings",
"pages": "23-28",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3093-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3093a015",
"articleId": "12OmNzvhvMg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3093a029",
"articleId": "12OmNro0I7m",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2004/8603/1/01394260",
"title": "Formalising stories: sequences of events and state changes",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394260/12OmNB9t6qz",
"parentPublication": {
"id": "proceedings/icme/2004/8603/1",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcdl/2006/354/0/04119151",
"title": "Information seeking in academic learning environments: an exploratory factor analytic approach to understanding design features",
"doi": null,
"abstractUrl": "/proceedings-article/jcdl/2006/04119151/12OmNBigFlp",
"parentPublication": {
"id": "proceedings/jcdl/2006/354/0",
"title": "2006 IEEE/ACM 6th Joint Conference on Digital Libraries",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997b631",
"title": "The Design and Implement of Personal Information System",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997b631/12OmNBqdrht",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2008/3167/0/3167a549",
"title": "Investigating User Engagement with Synthetic Characters",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2008/3167a549/12OmNrAdsxL",
"parentPublication": {
"id": "proceedings/icalt/2008/3167/0",
"title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2009/3896/0/3896b117",
"title": "Personal Information Classification for Privacy Negotiation",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2009/3896b117/12OmNwDAC8r",
"parentPublication": {
"id": "proceedings/iccit/2009/3896/0",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/1/3496a558",
"title": "Intelligent Search in Digital Documents",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496a558/12OmNx5Yv4h",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2009/3763/0/3763a412",
"title": "A Flexible Data Warehousing Approach for One-Stop Querying on Heterogeneous Personal Information",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2009/3763a412/12OmNzZWbNl",
"parentPublication": {
"id": "proceedings/dexa/2009/3763/0",
"title": "2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itng/2010/3984/0/3984a557",
"title": "Personal Digital Information Resources Management Behavior",
"doi": null,
"abstractUrl": "/proceedings-article/itng/2010/3984a557/12OmNzxPTNe",
"parentPublication": {
"id": "proceedings/itng/2010/3984/0",
"title": "Information Technology: New Generations, Third International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2012/09/ttk2012091584",
"title": "Efficient Multidimensional Fuzzy Search for Personal Information Management Systems",
"doi": null,
"abstractUrl": "/journal/tk/2012/09/ttk2012091584/13rRUEgarBL",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2006/08/i1187",
"title": "Font Adaptive Word Indexing of Modern Printed Documents",
"doi": null,
"abstractUrl": "/journal/tp/2006/08/i1187/13rRUwhHcRQ",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvjQ8WW",
"title": "Intelligent Information Hiding and Multimedia Signal Processing, International Conference on",
"acronym": "iih-msp",
"groupId": "1001543",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy4IFa1",
"doi": "10.1109/IIHMSP.2010.15",
"title": "A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System",
"normalizedTitle": "A Data Hiding Scheme on Word Documents Using Multiple-Base Notation System",
"abstract": "A novel data hiding scheme in the word document files are to be proposed. There are two basic concepts in our approach. First of all, let the spaces of each line, which the number of spaces is more than one of cover files embeds secret messages. In the past, the data hiding schemes on document files usually used a pair or block of inter-word spaces to embed secret messages. Comparatively, our scheme can decrease the time of modifying spaces. Secondly, the multiple-base notational system is to be used. We let the number of spaces of lines be the base of the multiple-base notation system because of the cover files that are in the text format, as long as the file size is not large and the calculating cost is kept low. The proposed scheme is efficient and easy, the capacity is more than other schemes, and the time of the modifying spaces is less as well. It will be appropriate for data hiding in the word document files.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A novel data hiding scheme in the word document files are to be proposed. There are two basic concepts in our approach. First of all, let the spaces of each line, which the number of spaces is more than one of cover files embeds secret messages. In the past, the data hiding schemes on document files usually used a pair or block of inter-word spaces to embed secret messages. Comparatively, our scheme can decrease the time of modifying spaces. Secondly, the multiple-base notational system is to be used. We let the number of spaces of lines be the base of the multiple-base notation system because of the cover files that are in the text format, as long as the file size is not large and the calculating cost is kept low. The proposed scheme is efficient and easy, the capacity is more than other schemes, and the time of the modifying spaces is less as well. It will be appropriate for data hiding in the word document files.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A novel data hiding scheme in the word document files are to be proposed. There are two basic concepts in our approach. First of all, let the spaces of each line, which the number of spaces is more than one of cover files embeds secret messages. In the past, the data hiding schemes on document files usually used a pair or block of inter-word spaces to embed secret messages. Comparatively, our scheme can decrease the time of modifying spaces. Secondly, the multiple-base notational system is to be used. We let the number of spaces of lines be the base of the multiple-base notation system because of the cover files that are in the text format, as long as the file size is not large and the calculating cost is kept low. The proposed scheme is efficient and easy, the capacity is more than other schemes, and the time of the modifying spaces is less as well. It will be appropriate for data hiding in the word document files.",
"fno": "4222a031",
"keywords": [
"Multiple Based Notation System",
"Inter Word Space",
"Document"
],
"authors": [
{
"affiliation": null,
"fullName": "Iuon-Chang Lin",
"givenName": "Iuon-Chang",
"surname": "Lin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ping-Kun Hsu",
"givenName": "Ping-Kun",
"surname": "Hsu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iih-msp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "31-33",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4222-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4222a027",
"articleId": "12OmNx7G61V",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4222a034",
"articleId": "12OmNxVV5XX",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdar/2011/4520/0/4520a279",
"title": "Efficient Cut-Off Threshold Estimation for Word Spotting Applications",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2011/4520a279/12OmNCdk2Me",
"parentPublication": {
"id": "proceedings/icdar/2011/4520/0",
"title": "2011 International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscsct/2008/3498/2/3498b217",
"title": "A Text Digital Watermarking for Chinese Word Document",
"doi": null,
"abstractUrl": "/proceedings-article/iscsct/2008/3498b217/12OmNvjgWzy",
"parentPublication": {
"id": "proceedings/iscsct/2008/3498/1",
"title": "2008 International Symposium on Computer Science and Computational Technology (ISCSCT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccee/2009/3925/1/3925a482",
"title": "A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents",
"doi": null,
"abstractUrl": "/proceedings-article/iccee/2009/3925a482/12OmNwCaCtK",
"parentPublication": {
"id": "iccee/2009/3925/1",
"title": "Computer and Electrical Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2011/4520/0/4520a875",
"title": "Exploiting Collection Level for Improving Assisted Handwritten Word Transcription of Historical Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2011/4520a875/12OmNwE9OVe",
"parentPublication": {
"id": "proceedings/icdar/2011/4520/0",
"title": "2011 International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/das/2012/4661/0/4661a379",
"title": "Efficient Word Retrieval Using a Multiple Ranking Combination Scheme",
"doi": null,
"abstractUrl": "/proceedings-article/das/2012/4661a379/12OmNxG1yJc",
"parentPublication": {
"id": "proceedings/das/2012/4661/0",
"title": "Document Analysis Systems, IAPR International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/1995/7128/1/71280442",
"title": "Visual inter-word relations and their use in OCR postprocessing",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/1995/71280442/12OmNxXUhR4",
"parentPublication": {
"id": "proceedings/icdar/1995/7128/1",
"title": "Proceedings of 3rd International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2009/3725/0/3725a331",
"title": "Keyword Spotting in Document Images through Word Shape Coding",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2009/3725a331/12OmNyUWQTw",
"parentPublication": {
"id": "proceedings/icdar/2009/3725/0",
"title": "2009 10th International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2003/1960/2/196020655",
"title": "Indexing and Retrieval of On-line Handwritten Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2003/196020655/12OmNzBOi5O",
"parentPublication": {
"id": "proceedings/icdar/2003/1960/2",
"title": "Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109b989",
"title": "Shape Code Based Word-Image Matching for Retrieval of Indian Multi-lingual Documents",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109b989/12OmNzmclZw",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/1995/7128/2/71280761",
"title": "Simultaneous word segmentation from document images using recursive morphological closing transform",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/1995/71280761/12OmNzwpUgb",
"parentPublication": {
"id": "proceedings/icdar/1995/7128/2",
"title": "Proceedings of 3rd International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzy7uOF",
"title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzC5STU",
"doi": "10.1109/IV.2004.1320209",
"title": "ORRIL: A Simple Building Blocks Approach to Zoomable User Interfaces",
"normalizedTitle": "ORRIL: A Simple Building Blocks Approach to Zoomable User Interfaces",
"abstract": "Zoomable User Interfaces (ZUI) can help people perceive and interact with large collections of information. These large collections complicate the task of creating ZUIs. In this paper the ORRIL (Objects, Regions, Relations and Interface Logic) framework is defined and presented as a technique for aiding ZUI design and creation. ORRIL makes explicit the data that appears in a zoomable information space, while simultaneously emphasising the relationships between user actions and transforms of the data. This is important for modeling and clarifying the processes that occur within a ZUI application. From the perspective of an implementer it may be used as an underlying model when designing and implementing a framework for building ZUIs.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Zoomable User Interfaces (ZUI) can help people perceive and interact with large collections of information. These large collections complicate the task of creating ZUIs. In this paper the ORRIL (Objects, Regions, Relations and Interface Logic) framework is defined and presented as a technique for aiding ZUI design and creation. ORRIL makes explicit the data that appears in a zoomable information space, while simultaneously emphasising the relationships between user actions and transforms of the data. This is important for modeling and clarifying the processes that occur within a ZUI application. From the perspective of an implementer it may be used as an underlying model when designing and implementing a framework for building ZUIs.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Zoomable User Interfaces (ZUI) can help people perceive and interact with large collections of information. These large collections complicate the task of creating ZUIs. In this paper the ORRIL (Objects, Regions, Relations and Interface Logic) framework is defined and presented as a technique for aiding ZUI design and creation. ORRIL makes explicit the data that appears in a zoomable information space, while simultaneously emphasising the relationships between user actions and transforms of the data. This is important for modeling and clarifying the processes that occur within a ZUI application. From the perspective of an implementer it may be used as an underlying model when designing and implementing a framework for building ZUIs.",
"fno": "21770639",
"keywords": [
"Zoomable Interfaces",
"Multiscale Interfaces",
"Information Visualization",
"User Interfaces",
"Interactive Graphics",
"Audio Display"
],
"authors": [
{
"affiliation": "Media Lab Europe, Ireland",
"fullName": "Mike Bennett",
"givenName": "Mike",
"surname": "Bennett",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University College Dublin, Ireland",
"fullName": "Fred Cummins",
"givenName": "Fred",
"surname": "Cummins",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-07-01T00:00:00",
"pubType": "proceedings",
"pages": "639-644",
"year": "2004",
"issn": "1093-9547",
"isbn": "0-7695-2177-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21770633",
"articleId": "12OmNzhna99",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21770645",
"articleId": "12OmNBNM8Z3",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/la-web/2009/3856/0/3856a044",
"title": "Model Driven Engineering of Rich Internet Applications Equipped with Zoomable User Interfaces",
"doi": null,
"abstractUrl": "/proceedings-article/la-web/2009/3856a044/12OmNwDACk4",
"parentPublication": {
"id": "proceedings/la-web/2009/3856/0",
"title": "Web Congress, Latin American",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vlhcc/2004/8696/0/86960038",
"title": "Integrating a Zoomable User Interfaces Concept into a Visual Language Meta-Tool Environment",
"doi": null,
"abstractUrl": "/proceedings-article/vlhcc/2004/86960038/12OmNwudQLP",
"parentPublication": {
"id": "proceedings/vlhcc/2004/8696/0",
"title": "Proceedings. 2004 IEEE Symposium on Visual Languages and Human Centric Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmpeur/1989/1940/0/00093328",
"title": "Beyond icons: surface and structure of user interfaces",
"doi": null,
"abstractUrl": "/proceedings-article/cmpeur/1989/00093328/12OmNwxlrg2",
"parentPublication": {
"id": "proceedings/cmpeur/1989/1940/0",
"title": "COMPEURO 89 Proceedings VLSI and Computer Peripherals.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/percom-workshops/2020/4716/0/09156182",
"title": "Provable Consent for Voice User Interfaces",
"doi": null,
"abstractUrl": "/proceedings-article/percom-workshops/2020/09156182/1m1jzr7KqvS",
"parentPublication": {
"id": "proceedings/percom-workshops/2020/4716/0",
"title": "2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1Ehs5xMRX6E",
"title": "2022 IEEE/ACM International Conference on Automation of Software Test (AST)",
"acronym": "ast",
"groupId": "1001292",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1Ehs80YAdlm",
"doi": "10.1145/3524481.3527229",
"title": "CRAWLABEL: Computing Natural-Language Labels for UI Test Cases",
"normalizedTitle": "CRAWLABEL: Computing Natural-Language Labels for UI Test Cases",
"abstract": "End-to-end test cases that exercise the application under test via its user interface (UI) are known to be hard for developers to read and understand; consequently, diagnosing failures in these tests and maintaining them can be tedious. Techniques for computing natural-language descriptions of test cases can help increase test readability. However, so far, such techniques have been developed for unit test cases; they are not applicable to end-to-end test cases. In this paper, we focus on the problem of computing naturallanguage labels for the steps of end-to-end UI test cases for web applications. We present two techniques that apply natural-language processing to information available in the browser document object model (DOM). The first technique is an instance of a supervised approach in which labeling-relevant DOM attributes are ranked via manual analysis and fed into label computation. However, supervised approach requires a training dataset. So we propose the second technique, which is unsupervised: it leverages probabilistic context-free grammar learning to compute dominant DOM attributes automatically. We implemented these techniques, along with two simpler baseline techniques, in a tool called CRAWLABEL (available as a plugin to Crawljax, a state-of-the-art UI test-generation tool for web applications) and evaluated their effectiveness on open-source web applications. Our results indicate that the supervised approach can achieve precision, recall, and Fl-score of 83.38, 60.64, and 66.40, respectively. The unsupervised approach, although less effective, is competitive, achieving scores of 72.37, 58.12, and 59.77. We highlight key results and discuss the implications of our findings.",
"abstracts": [
{
"abstractType": "Regular",
"content": "End-to-end test cases that exercise the application under test via its user interface (UI) are known to be hard for developers to read and understand; consequently, diagnosing failures in these tests and maintaining them can be tedious. Techniques for computing natural-language descriptions of test cases can help increase test readability. However, so far, such techniques have been developed for unit test cases; they are not applicable to end-to-end test cases. In this paper, we focus on the problem of computing naturallanguage labels for the steps of end-to-end UI test cases for web applications. We present two techniques that apply natural-language processing to information available in the browser document object model (DOM). The first technique is an instance of a supervised approach in which labeling-relevant DOM attributes are ranked via manual analysis and fed into label computation. However, supervised approach requires a training dataset. So we propose the second technique, which is unsupervised: it leverages probabilistic context-free grammar learning to compute dominant DOM attributes automatically. We implemented these techniques, along with two simpler baseline techniques, in a tool called CRAWLABEL (available as a plugin to Crawljax, a state-of-the-art UI test-generation tool for web applications) and evaluated their effectiveness on open-source web applications. Our results indicate that the supervised approach can achieve precision, recall, and Fl-score of 83.38, 60.64, and 66.40, respectively. The unsupervised approach, although less effective, is competitive, achieving scores of 72.37, 58.12, and 59.77. We highlight key results and discuss the implications of our findings.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "End-to-end test cases that exercise the application under test via its user interface (UI) are known to be hard for developers to read and understand; consequently, diagnosing failures in these tests and maintaining them can be tedious. Techniques for computing natural-language descriptions of test cases can help increase test readability. However, so far, such techniques have been developed for unit test cases; they are not applicable to end-to-end test cases. In this paper, we focus on the problem of computing naturallanguage labels for the steps of end-to-end UI test cases for web applications. We present two techniques that apply natural-language processing to information available in the browser document object model (DOM). The first technique is an instance of a supervised approach in which labeling-relevant DOM attributes are ranked via manual analysis and fed into label computation. However, supervised approach requires a training dataset. So we propose the second technique, which is unsupervised: it leverages probabilistic context-free grammar learning to compute dominant DOM attributes automatically. We implemented these techniques, along with two simpler baseline techniques, in a tool called CRAWLABEL (available as a plugin to Crawljax, a state-of-the-art UI test-generation tool for web applications) and evaluated their effectiveness on open-source web applications. Our results indicate that the supervised approach can achieve precision, recall, and Fl-score of 83.38, 60.64, and 66.40, respectively. The unsupervised approach, although less effective, is competitive, achieving scores of 72.37, 58.12, and 59.77. We highlight key results and discuss the implications of our findings.",
"fno": "928600a103",
"keywords": [
"Computational Linguistics",
"Context Free Grammars",
"Internet",
"Learning Artificial Intelligence",
"Natural Language Processing",
"Online Front Ends",
"Program Testing",
"Public Domain Software",
"User Interfaces",
"Natural Language Descriptions",
"Test Readability",
"Unit Test Cases",
"End To End Test Cases",
"Web Applications",
"Natural Language Processing",
"Supervised Approach",
"Labeling Relevant DOM Attributes",
"Label Computation",
"Simpler Baseline Techniques",
"State Of The Art UI Test Generation Tool",
"Natural Language Labels",
"UI Test Cases",
"Training",
"Automation",
"Computational Modeling",
"Manuals",
"User Interfaces",
"Probabilistic Logic",
"Grammar"
],
"authors": [
{
"affiliation": "University of Texas at Austin,Austin,TX,USA",
"fullName": "Yu Liu",
"givenName": "Yu",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of British Columbia,Vancouver,BC,Canada",
"fullName": "Rahulkrishna Yandrapally",
"givenName": "Rahulkrishna",
"surname": "Yandrapally",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dataminr, Inc,NY,USA",
"fullName": "Anup K. Kalia",
"givenName": "Anup K.",
"surname": "Kalia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research,Yorktown Heights,NY,USA",
"fullName": "Saurabh Sinha",
"givenName": "Saurabh",
"surname": "Sinha",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Research,Haifa,Israel",
"fullName": "Rachel Tzoref-Brill",
"givenName": "Rachel",
"surname": "Tzoref-Brill",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of British Columbia,Vancouver,BC,Canada",
"fullName": "Ali Mesbah",
"givenName": "Ali",
"surname": "Mesbah",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ast",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-05-01T00:00:00",
"pubType": "proceedings",
"pages": "103-114",
"year": "2022",
"issn": null,
"isbn": "978-1-4503-9286-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "928600a092",
"articleId": "1Ehs6Sb5fTG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "928600a115",
"articleId": "1Ehs8M3rpSM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icis/2012/1536/0/06211160",
"title": "Functional and User Interface Model for Generating Test Cases",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2012/06211160/12OmNArthbl",
"parentPublication": {
"id": "proceedings/icis/2012/1536/0",
"title": "2012 IEEE/ACIS 11th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icst/2016/1827/0/1827a330",
"title": "Atrina: Inferring Unit Oracles from GUI Test Cases",
"doi": null,
"abstractUrl": "/proceedings-article/icst/2016/1827a330/12OmNqBbHYU",
"parentPublication": {
"id": "proceedings/icst/2016/1827/0",
"title": "2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ast/2012/1821/0/06228996",
"title": "BlackHorse: Creating smart test cases from brittle recorded tests",
"doi": null,
"abstractUrl": "/proceedings-article/ast/2012/06228996/12OmNzUPpgr",
"parentPublication": {
"id": "proceedings/ast/2012/1821/0",
"title": "Automation of Software Test, Second International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/ts/2023/03/09763328",
"title": "Identifying Similar Test Cases That Are Specified in Natural Language",
"doi": null,
"abstractUrl": "/journal/ts/2023/03/09763328/1CT4YDXaTDO",
"parentPublication": {
"id": "trans/ts",
"title": "IEEE Transactions on Software Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-companion/2022/9598/0/959800a334",
"title": "Woodpecker: Identifying and Fixing Android UI Display Issues",
"doi": null,
"abstractUrl": "/proceedings-article/icse-companion/2022/959800a334/1EaP44BXN7i",
"parentPublication": {
"id": "proceedings/icse-companion/2022/9598/0",
"title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2022/9062/0/09956234",
"title": "Method to Improve UI Rendering using Predictive Sequence Modelling",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2022/09956234/1IHqetEniRW",
"parentPublication": {
"id": "proceedings/icpr/2022/9062/0",
"title": "2022 26th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vl-hcc/2019/0810/0/08818827",
"title": "Mocking-up Desired UI Behaviors from UI Element-Based Recording",
"doi": null,
"abstractUrl": "/proceedings-article/vl-hcc/2019/08818827/1dsfUAoHq1O",
"parentPublication": {
"id": "proceedings/vl-hcc/2019/0810/0",
"title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ase/2020/6768/0/676800a398",
"title": "Owl Eyes: Spotting UI Display Issues via Visual Understanding",
"doi": null,
"abstractUrl": "/proceedings-article/ase/2020/676800a398/1pP3H5wW7te",
"parentPublication": {
"id": "proceedings/ase/2020/6768/0",
"title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse-companion/2021/1219/0/121900a089",
"title": "UIS-Hunter: Detecting UI Design Smells in Android Apps",
"doi": null,
"abstractUrl": "/proceedings-article/icse-companion/2021/121900a089/1sET5YXPYnC",
"parentPublication": {
"id": "proceedings/icse-companion/2021/1219/0/",
"title": "2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/models-c/2021/2484/0/248400a138",
"title": "Improving Collaboration Efficiency Between UX/UI Designers and Developers in a Low-Code Platform",
"doi": null,
"abstractUrl": "/proceedings-article/models-c/2021/248400a138/1zutz8dvjzy",
"parentPublication": {
"id": "proceedings/models-c/2021/2484/0",
"title": "2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCbU3aD",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "1996",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAXxX6r",
"doi": "10.1109/VISUAL.1996.567796",
"title": "Flexible Information Visualization of Multivariate Data from Biological Sequence Similarity Searches",
"normalizedTitle": "Flexible Information Visualization of Multivariate Data from Biological Sequence Similarity Searches",
"abstract": "Information visualization faces challenges presented by the need to represent abstract data and the relationships within the data. Previously, we presented a system for visualizing similarities between a single DNA sequence and a large database of other DNA sequences [6]. Similarity algorithms generate similarity information in textual reports that can be hundreds or thousands of pages long. Our original system visualized the most important variables from these reports. However, the biologists we work with found this system so useful they requested visual representations of other variables. We present an enhanced system for interactive exploration of this multivariate data. We identify a larger set of useful variables in the information space. The new system involves more variables, so it focuses on exploring subsets of the data. We present an interactive system allowing mapping of different variables to different axes, incorporating animation using a time-axis, and providing tools for viewing subsets of the data. Detail-on-demand is preserved by hyperlinks to the analysis reports. We present three case studies illustrating the use of these techniques. The combined technique of applying a time axis with a 3D scatter plot and query filters to visualization of biological sequence similarity data is both powerful and novel.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Information visualization faces challenges presented by the need to represent abstract data and the relationships within the data. Previously, we presented a system for visualizing similarities between a single DNA sequence and a large database of other DNA sequences [6]. Similarity algorithms generate similarity information in textual reports that can be hundreds or thousands of pages long. Our original system visualized the most important variables from these reports. However, the biologists we work with found this system so useful they requested visual representations of other variables. We present an enhanced system for interactive exploration of this multivariate data. We identify a larger set of useful variables in the information space. The new system involves more variables, so it focuses on exploring subsets of the data. We present an interactive system allowing mapping of different variables to different axes, incorporating animation using a time-axis, and providing tools for viewing subsets of the data. Detail-on-demand is preserved by hyperlinks to the analysis reports. We present three case studies illustrating the use of these techniques. The combined technique of applying a time axis with a 3D scatter plot and query filters to visualization of biological sequence similarity data is both powerful and novel.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Information visualization faces challenges presented by the need to represent abstract data and the relationships within the data. Previously, we presented a system for visualizing similarities between a single DNA sequence and a large database of other DNA sequences [6]. Similarity algorithms generate similarity information in textual reports that can be hundreds or thousands of pages long. Our original system visualized the most important variables from these reports. However, the biologists we work with found this system so useful they requested visual representations of other variables. We present an enhanced system for interactive exploration of this multivariate data. We identify a larger set of useful variables in the information space. The new system involves more variables, so it focuses on exploring subsets of the data. We present an interactive system allowing mapping of different variables to different axes, incorporating animation using a time-axis, and providing tools for viewing subsets of the data. Detail-on-demand is preserved by hyperlinks to the analysis reports. We present three case studies illustrating the use of these techniques. The combined technique of applying a time axis with a 3D scatter plot and query filters to visualization of biological sequence similarity data is both powerful and novel.",
"fno": "36730133",
"keywords": [
"Information Visualization",
"Biomedical Visualization",
"Multimodal And Multidimensional Visualization",
"Applications Of Visualization"
],
"authors": [
{
"affiliation": "University of Minnesota",
"fullName": "Ed Huai-hsin Chi",
"givenName": "Ed Huai-hsin",
"surname": "Chi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota",
"fullName": "John Riedl",
"givenName": "John",
"surname": "Riedl",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota",
"fullName": "Elizabeth Shoop",
"givenName": "Elizabeth",
"surname": "Shoop",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota",
"fullName": "John V. Carlis",
"givenName": "John V.",
"surname": "Carlis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota",
"fullName": "Ernest Retzel",
"givenName": "Ernest",
"surname": "Retzel",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota",
"fullName": "Phillip Barry",
"givenName": "Phillip",
"surname": "Barry",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "1996-10-01T00:00:00",
"pubType": "proceedings",
"pages": "133",
"year": "1996",
"issn": "1070-2385",
"isbn": "0-7803-3673-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "36730127",
"articleId": "12OmNqFJhMo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "36730141",
"articleId": "12OmNCbkQDV",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/1995/7187/0/71870044",
"title": "Visualization of Biological Sequence Similarity Search Results",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/1995/71870044/12OmNB8TUc3",
"parentPublication": {
"id": "proceedings/ieee-vis/1995/7187/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sisap/2008/3101/0/3101a003",
"title": "Evolving Models of Biological Sequence Similarity",
"doi": null,
"abstractUrl": "/proceedings-article/sisap/2008/3101a003/12OmNBqMDj4",
"parentPublication": {
"id": "proceedings/sisap/2008/3101/0",
"title": "2008 First International Workshop on Similarity Search and Applications (SISAP '08)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2008/3452/0/3452a104",
"title": "Using Global Sequence Similarity to Enhance Biological Sequence Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2008/3452a104/12OmNCd2rEW",
"parentPublication": {
"id": "proceedings/bibm/2008/3452/0",
"title": "2008 IEEE International Conference on Bioinformatics and Biomedicine",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdew/2008/2161/0/04498339",
"title": "Evolving models of biological sequence similarity",
"doi": null,
"abstractUrl": "/proceedings-article/icdew/2008/04498339/12OmNvxsSVN",
"parentPublication": {
"id": "proceedings/icdew/2008/2161/0",
"title": "2008 IEEE 24th International Conference on Data Engineering Workshop",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2012/4789/0/4789a263",
"title": "Sequence Similarity Analysis of Buthus Martensii Neurotoxin Genes Based on Structure Matrix",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2012/4789a263/12OmNx0RINY",
"parentPublication": {
"id": "proceedings/iccis/2012/4789/0",
"title": "2012 Fourth International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismse/2003/2031/0/20310305",
"title": "SimSearcher: A Local Similarity Search Engine for Biological Sequence Databases",
"doi": null,
"abstractUrl": "/proceedings-article/ismse/2003/20310305/12OmNyFU74Z",
"parentPublication": {
"id": "proceedings/ismse/2003/2031/0",
"title": "Multimedia Software Engineering, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2007/0909/0/04228166",
"title": "Reconfigurable Architecture for Biological Sequence Comparison in Reduced Memory Space",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2007/04228166/12OmNz4BdnO",
"parentPublication": {
"id": "proceedings/ipdps/2007/0909/0",
"title": "2007 IEEE International Parallel and Distributed Processing Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2016/05/07307142",
"title": "A Guaranteed Similarity Metric Learning Framework for Biological Sequence Comparison",
"doi": null,
"abstractUrl": "/journal/tb/2016/05/07307142/13rRUIIVliY",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2013/06/ttb2013061505",
"title": "Multivariate Hypergeometric Similarity Measure",
"doi": null,
"abstractUrl": "/journal/tb/2013/06/ttb2013061505/13rRUNvyado",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2013/05/ttb2013051201",
"title": "Biological Sequence Classification with Multivariate String Kernels",
"doi": null,
"abstractUrl": "/journal/tb/2013/05/ttb2013051201/13rRUwjoNvh",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBSBk6i",
"title": "Information Visualization, IEEE Symposium on",
"acronym": "ieee-infovis",
"groupId": "1000371",
"volume": "0",
"displayVolume": "0",
"year": "2002",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBTs7tv",
"doi": "10.1109/INFVIS.2002.1173156",
"title": "Interactive Information Visualization of a Million Items",
"normalizedTitle": "Interactive Information Visualization of a Million Items",
"abstract": "Existing information visualization techniques are usually limited to the display of a few thousand items. This article describes new interactive techniques capable of handling a million items (effectively visible and manageable on screen). We evaluate the use of hardware-based techniques available with newer graphics cards, as well as new animation techniques and non-standard graphical features such as stereovision and overlap count. These techniques have been applied to two popular information visualizations: treemaps and scatter plot diagrams; but are generic enough to be applied to other 2D representations as well.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Existing information visualization techniques are usually limited to the display of a few thousand items. This article describes new interactive techniques capable of handling a million items (effectively visible and manageable on screen). We evaluate the use of hardware-based techniques available with newer graphics cards, as well as new animation techniques and non-standard graphical features such as stereovision and overlap count. These techniques have been applied to two popular information visualizations: treemaps and scatter plot diagrams; but are generic enough to be applied to other 2D representations as well.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Existing information visualization techniques are usually limited to the display of a few thousand items. This article describes new interactive techniques capable of handling a million items (effectively visible and manageable on screen). We evaluate the use of hardware-based techniques available with newer graphics cards, as well as new animation techniques and non-standard graphical features such as stereovision and overlap count. These techniques have been applied to two popular information visualizations: treemaps and scatter plot diagrams; but are generic enough to be applied to other 2D representations as well.",
"fno": "17510117",
"keywords": [],
"authors": [
{
"affiliation": "University of Maryland",
"fullName": "Jean-Daniel Fekete",
"givenName": "Jean-Daniel",
"surname": "Fekete",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Maryland",
"fullName": "Catherine Plaisant",
"givenName": "Catherine",
"surname": "Plaisant",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-infovis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2002-10-01T00:00:00",
"pubType": "proceedings",
"pages": "117",
"year": "2002",
"issn": "1522-404X",
"isbn": "0-7695-1751-X",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "17510110",
"articleId": "12OmNzGDsNg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "17510127",
"articleId": "12OmNzYNNf3",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-infovis/1999/0431/0/04310073",
"title": "Cushion Treemaps: Visualization of Hierarchical Information",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/1999/04310073/12OmNAle6om",
"parentPublication": {
"id": "proceedings/ieee-infovis/1999/0431/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/grc/2011/0372/0/06122687",
"title": "K-anonymity on sensitive transaction items",
"doi": null,
"abstractUrl": "/proceedings-article/grc/2011/06122687/12OmNB7cjjz",
"parentPublication": {
"id": "proceedings/grc/2011/0372/0",
"title": "2011 IEEE International Conference on Granular Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2015/6879/0/07156360",
"title": "Variational circular treemaps for interactive visualization of hierarchical data",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2015/07156360/12OmNBpmDGk",
"parentPublication": {
"id": "proceedings/pacificvis/2015/6879/0",
"title": "2015 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2015/8517/0/07348077",
"title": "Large interactive visualization of density functions on big data infrastructure",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2015/07348077/12OmNC8Msxg",
"parentPublication": {
"id": "proceedings/ldav/2015/8517/0",
"title": "2015 IEEE 5th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2016/8942/0/8942a183",
"title": "Evaluation of Sketchiness as a Visual Variable for 2.5D Treemaps",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2016/8942a183/12OmNvAiScQ",
"parentPublication": {
"id": "proceedings/iv/2016/8942/0",
"title": "2016 20th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2008/1966/0/04475475",
"title": "Interactive Visual Analysis of the NSF Funding Information",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2008/04475475/12OmNvlxJvf",
"parentPublication": {
"id": "proceedings/pacificvis/2008/1966/0",
"title": "IEEE Pacific Visualization Symposium 2008",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a645",
"title": "WebPrisma: An Interactive Web-Based Tool for Exploratory Visualization Using Multiple Coordinated Views",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a645/12OmNwErpOH",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vissoft/2013/1457/0/06650518",
"title": "Keynote talk: Information visualization: Experiences and lessons learned",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2013/06650518/12OmNwwd2Ii",
"parentPublication": {
"id": "proceedings/vissoft/2013/1457/0",
"title": "2013 First IEEE Working Conference on Software Visualization (VISSOFT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icst/2012/4670/0/4670a737",
"title": "Enhancing Fault Localization via Multivariate Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/icst/2012/4670a737/12OmNxd4to6",
"parentPublication": {
"id": "proceedings/icst/2012/4670/0",
"title": "2012 IEEE Fifth International Conference on Software Testing, Verification and Validation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400b394",
"title": "Finding Significant Items in Data Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400b394/1aDSPabVGwM",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNylsZKk",
"title": "2007 11th International Conference Information Visualization (IV '07)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzBOhvN",
"doi": "10.1109/IV.2007.5",
"title": "2D and 3D Neural-Network Based Visualization of High-Dimensional Biomedical Data",
"normalizedTitle": "2D and 3D Neural-Network Based Visualization of High-Dimensional Biomedical Data",
"abstract": "In this paper we integrate self-organizing map algorithm (SOM) with scatter plot and Radviz, extending these visualizations into the third dimension and reducing overlap. Classic visualizations are used as the twodimensional base, combined with a self-organizing map that extends them into the third dimension, with an adjusted neighborhood function. This approach solves the problem of overlap where more than one point plots to the same space and uncovers additional information about relationships inherent in high-dimensional data sets, including distribution of points, outliers and associations. Case studies are presented on a microarray and miRNA data sets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper we integrate self-organizing map algorithm (SOM) with scatter plot and Radviz, extending these visualizations into the third dimension and reducing overlap. Classic visualizations are used as the twodimensional base, combined with a self-organizing map that extends them into the third dimension, with an adjusted neighborhood function. This approach solves the problem of overlap where more than one point plots to the same space and uncovers additional information about relationships inherent in high-dimensional data sets, including distribution of points, outliers and associations. Case studies are presented on a microarray and miRNA data sets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper we integrate self-organizing map algorithm (SOM) with scatter plot and Radviz, extending these visualizations into the third dimension and reducing overlap. Classic visualizations are used as the twodimensional base, combined with a self-organizing map that extends them into the third dimension, with an adjusted neighborhood function. This approach solves the problem of overlap where more than one point plots to the same space and uncovers additional information about relationships inherent in high-dimensional data sets, including distribution of points, outliers and associations. Case studies are presented on a microarray and miRNA data sets.",
"fno": "29000545",
"keywords": [],
"authors": [
{
"affiliation": "Louisiana State University, Shreveport, LA",
"fullName": "Urska Cvek",
"givenName": "Urska",
"surname": "Cvek",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Louisiana State University, Shreveport, LA",
"fullName": "Marjan Trutschl",
"givenName": "Marjan",
"surname": "Trutschl",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Louisiana State University, Shreveport, LA",
"fullName": "John C. Cannon",
"givenName": "John C.",
"surname": "Cannon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LSUHSC, Shreveport, LA",
"fullName": "Rona S. Scott",
"givenName": "Rona S.",
"surname": "Scott",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LSUHSC, Shreveport, LA",
"fullName": "Robert E. Rhoads",
"givenName": "Robert E.",
"surname": "Rhoads",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-06-01T00:00:00",
"pubType": "proceedings",
"pages": "545-550",
"year": "2007",
"issn": null,
"isbn": "0-7695-2907-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "29000535",
"articleId": "12OmNyfdOS6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "29000551",
"articleId": "12OmNB06l10",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iacsit-sc/2009/3653/0/3653a506",
"title": "Two Parameter Image Representation in 3D Biomedical Visualization with CT Images",
"doi": null,
"abstractUrl": "/proceedings-article/iacsit-sc/2009/3653a506/12OmNBSjJ7c",
"parentPublication": {
"id": "proceedings/iacsit-sc/2009/3653/0",
"title": "Computer Science and Information Technology, International Association of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2006/2503/0/25030263",
"title": "The Isometric Self-Organizing Map for 3D Hand Pose Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2006/25030263/12OmNvlPkB6",
"parentPublication": {
"id": "proceedings/fg/2006/2503/0",
"title": "7th International Conference on Automatic Face and Gesture Recognition (FGR06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vizsec/2005/9477/0/01532073",
"title": "Exploring three-dimensional visualization for intrusion detection",
"doi": null,
"abstractUrl": "/proceedings-article/vizsec/2005/01532073/12OmNwwuE3t",
"parentPublication": {
"id": "proceedings/vizsec/2005/9477/0",
"title": "IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2010/4189/0/4189a082",
"title": "C*-tree: A Multi-Dimensional Index Structure for Resource Space Model",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2010/4189a082/12OmNx7ouWJ",
"parentPublication": {
"id": "proceedings/skg/2010/4189/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2012/4771/0/4771a229",
"title": "Voronoi Diagram Based Dimensional Anchor Assessment for Radial Visualizations",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2012/4771a229/12OmNxVDuUI",
"parentPublication": {
"id": "proceedings/iv/2012/4771/0",
"title": "2012 16th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-infovis/2003/2055/0/20550017",
"title": "Intelligently Resolving Point Occlusion",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-infovis/2003/20550017/12OmNzJbQVb",
"parentPublication": {
"id": "proceedings/ieee-infovis/2003/2055/0",
"title": "Information Visualization, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2015/6879/0/07156365",
"title": "Extending Dimensions in Radviz based on mean shift",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2015/07156365/12OmNzUxOjK",
"parentPublication": {
"id": "proceedings/pacificvis/2015/6879/0",
"title": "2015 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2012/4893/0/4893a076",
"title": "High-Performance Visualization of Multi-Dimensional Gene Expression Data",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2012/4893a076/12OmNzl3WZm",
"parentPublication": {
"id": "proceedings/icnc/2012/4893/0",
"title": "2012 Third International Conference on Networking and Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2006/2602/0/26020707",
"title": "Enhanced High Dimensional Data Visualization through Dimension Reduction and Attribute Arrangement",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2006/26020707/12OmNzw8j0q",
"parentPublication": {
"id": "proceedings/iv/2006/2602/0",
"title": "Tenth International Conference on Information Visualisation (IV'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/01/06826569",
"title": "The Impact of Interactivity on Comprehending 2D and 3D Visualizations of Movement Data",
"doi": null,
"abstractUrl": "/journal/tg/2015/01/06826569/13rRUyYjKah",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNAkWvab",
"title": "2012 Third International Conference on Networking and Computing",
"acronym": "icnc",
"groupId": "1800265",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzl3WZm",
"doi": "10.1109/ICNC.2012.20",
"title": "High-Performance Visualization of Multi-Dimensional Gene Expression Data",
"normalizedTitle": "High-Performance Visualization of Multi-Dimensional Gene Expression Data",
"abstract": "Previous application of Kohonen's self organizing map to common visualizations has yielded promising results. In this research, we extend the classic two-dimensional scatter plot visualization algorithm into the third dimension by permitting competition to occur within a three-dimensional search space. This approach takes advantage of spatial memory and increases the intrinsic dimensionality of a widely used visualization technique. We also present a method of parallelizing this novel algorithm as a method of overcoming the runtime complexity associated with it using MPI. We note that this algorithm responds extremely well to parallelization and that it leads to an effective method for knowledge discovery in complex multidimensional datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Previous application of Kohonen's self organizing map to common visualizations has yielded promising results. In this research, we extend the classic two-dimensional scatter plot visualization algorithm into the third dimension by permitting competition to occur within a three-dimensional search space. This approach takes advantage of spatial memory and increases the intrinsic dimensionality of a widely used visualization technique. We also present a method of parallelizing this novel algorithm as a method of overcoming the runtime complexity associated with it using MPI. We note that this algorithm responds extremely well to parallelization and that it leads to an effective method for knowledge discovery in complex multidimensional datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Previous application of Kohonen's self organizing map to common visualizations has yielded promising results. In this research, we extend the classic two-dimensional scatter plot visualization algorithm into the third dimension by permitting competition to occur within a three-dimensional search space. This approach takes advantage of spatial memory and increases the intrinsic dimensionality of a widely used visualization technique. We also present a method of parallelizing this novel algorithm as a method of overcoming the runtime complexity associated with it using MPI. We note that this algorithm responds extremely well to parallelization and that it leads to an effective method for knowledge discovery in complex multidimensional datasets.",
"fno": "4893a076",
"keywords": [
"Clustering Algorithms",
"Machine Learning",
"Neural Networks",
"Information Visualization",
"Parallel Architectures"
],
"authors": [
{
"affiliation": null,
"fullName": "Marjan Trutschl",
"givenName": "Marjan",
"surname": "Trutschl",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Phillip C.S.R. Kilgore",
"givenName": "Phillip C.S.R.",
"surname": "Kilgore",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Urka Cvek",
"givenName": "Urka",
"surname": "Cvek",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icnc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-12-01T00:00:00",
"pubType": "proceedings",
"pages": "76-84",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-4624-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4893a068",
"articleId": "12OmNxcdG4g",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4893a085",
"articleId": "12OmNzSyCeD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bdcat/2016/4617/0/6005a061",
"title": "Visualization of Big High Dimensional Data in a Three Dimensional Space",
"doi": null,
"abstractUrl": "/proceedings-article/bdcat/2016/6005a061/12OmNAnMuL0",
"parentPublication": {
"id": "proceedings/bdcat/2016/4617/0",
"title": "2016 IEEE/ACM 3rd International Conference on Big Data Computing Applications and Technologies (BDCAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2006/2602/0/26020721",
"title": "Stimulation Spectrum Based High-dimensional Data Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2006/26020721/12OmNBlFR0Q",
"parentPublication": {
"id": "proceedings/iv/2006/2602/0",
"title": "Tenth International Conference on Information Visualisation (IV'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2005/2397/0/23970692",
"title": "Visualization for High-Dimensional Data: VisHD",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2005/23970692/12OmNvSbBzw",
"parentPublication": {
"id": "proceedings/iv/2005/2397/0",
"title": "Ninth International Conference on Information Visualisation (IV'05)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2002/1435/6/14350143",
"title": "Interactive Visualization and Analysis for Gene Expression Data",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2002/14350143/12OmNwsNReP",
"parentPublication": {
"id": "proceedings/hicss/2002/1435/6",
"title": "Proceedings of the 35th Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aipr/2016/3284/0/08010591",
"title": "Visualization of high dimensional image features for classification",
"doi": null,
"abstractUrl": "/proceedings-article/aipr/2016/08010591/12OmNyGbI5g",
"parentPublication": {
"id": "proceedings/aipr/2016/3284/0",
"title": "2016 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cad-graphics/2013/2576/0/06815008",
"title": "Network-Based Clustering and Embedding for High-Dimensional Data Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/cad-graphics/2013/06815008/12OmNyL0Tx5",
"parentPublication": {
"id": "proceedings/cad-graphics/2013/2576/0",
"title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2017/1600/0/1600a350",
"title": "Auto-Encoder Based for High Spectral Dimensional Data Classification and Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2017/1600a350/12OmNzZmZxR",
"parentPublication": {
"id": "proceedings/dsc/2017/1600/0",
"title": "2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/11/ttg2011111547",
"title": "Visualization of High-Dimensional Point Clouds Using Their Density Distribution's Topology",
"doi": null,
"abstractUrl": "/journal/tg/2011/11/ttg2011111547/13rRUx0Pqpu",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2010/01/ttb2010010064",
"title": "Integrating Data Clustering and Visualization for the Analysis of 3D Gene Expression Data",
"doi": null,
"abstractUrl": "/journal/tb/2010/01/ttb2010010064/13rRUxAStZp",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2022/4609/0/460900a626",
"title": "Unsupervised DeepView: Global Uncertainty Visualization for High Dimensional Data",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2022/460900a626/1KBr5pVl2qA",
"parentPublication": {
"id": "proceedings/icdmw/2022/4609/0",
"title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1tzywdsEsQo",
"title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)",
"acronym": "icmcce",
"groupId": "1824464",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1tzze2WAC0E",
"doi": "10.1109/ICMCCE51767.2020.00437",
"title": "A New Visualization for Many-Objective Optimization",
"normalizedTitle": "A New Visualization for Many-Objective Optimization",
"abstract": "The visualization of the approximations in high-dimensional space is a critical issue in many-objective optimization. As a popular visualization method, the parallel coordinates plots (PCPs) have been widely used in displaying the high-dimensional approximations. However, it is not as straightforward as the classic scatter plot for well-presenting the information contained in an approximation. One observation for PCPs is that their presented information changes when the axes order changes. In this paper, we propose a kernel-based visualization (KBV) method for many-objective optimization, in terms of comparing the quality of approximations, understanding the distribution of a solution set, and reflecting the relationship between different objectives. In KBV, the kernel feature map is combined with a re-order method for improving the effectiveness of the PCPs and providing more insightful information among different objectives, which is clearly beneficial for decision makers. The experimental analysis of KBV is also given in this paper. Finally, we introduce KBV to visualize the approximation on water resource problem (WRP).",
"abstracts": [
{
"abstractType": "Regular",
"content": "The visualization of the approximations in high-dimensional space is a critical issue in many-objective optimization. As a popular visualization method, the parallel coordinates plots (PCPs) have been widely used in displaying the high-dimensional approximations. However, it is not as straightforward as the classic scatter plot for well-presenting the information contained in an approximation. One observation for PCPs is that their presented information changes when the axes order changes. In this paper, we propose a kernel-based visualization (KBV) method for many-objective optimization, in terms of comparing the quality of approximations, understanding the distribution of a solution set, and reflecting the relationship between different objectives. In KBV, the kernel feature map is combined with a re-order method for improving the effectiveness of the PCPs and providing more insightful information among different objectives, which is clearly beneficial for decision makers. The experimental analysis of KBV is also given in this paper. Finally, we introduce KBV to visualize the approximation on water resource problem (WRP).",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The visualization of the approximations in high-dimensional space is a critical issue in many-objective optimization. As a popular visualization method, the parallel coordinates plots (PCPs) have been widely used in displaying the high-dimensional approximations. However, it is not as straightforward as the classic scatter plot for well-presenting the information contained in an approximation. One observation for PCPs is that their presented information changes when the axes order changes. In this paper, we propose a kernel-based visualization (KBV) method for many-objective optimization, in terms of comparing the quality of approximations, understanding the distribution of a solution set, and reflecting the relationship between different objectives. In KBV, the kernel feature map is combined with a re-order method for improving the effectiveness of the PCPs and providing more insightful information among different objectives, which is clearly beneficial for decision makers. The experimental analysis of KBV is also given in this paper. Finally, we introduce KBV to visualize the approximation on water resource problem (WRP).",
"fno": "231400b998",
"keywords": [
"Data Analysis",
"Data Visualisation",
"Water Resources",
"PC Ps",
"Presented Information Changes",
"Axes Order Changes",
"Kernel Based Visualization Method",
"KBV",
"Many Objective Optimization",
"Re Order Method",
"Insightful Information",
"High Dimensional Space",
"Popular Visualization Method",
"Parallel Coordinates Plots",
"High Dimensional Approximations",
"Classic Scatter Plot",
"Visualization",
"Approximation Algorithms",
"Kernel",
"Optimization",
"Water Resources",
"Many Objective Optimization",
"Visualization",
"Kernel Method",
"Re Order Method"
],
"authors": [
{
"affiliation": "The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,Nanjing,China",
"fullName": "Yushun Xiao",
"givenName": "Yushun",
"surname": "Xiao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,Nanjing,China",
"fullName": "Qi Sun",
"givenName": "Qi",
"surname": "Sun",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmcce",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1998-2002",
"year": "2020",
"issn": null,
"isbn": "978-1-6654-2314-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "231400b993",
"articleId": "1tzzfjb48H6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "231400c003",
"articleId": "1tzz87lcn4s",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/his/2007/2946/0/29460156",
"title": "Visualization of Pareto-Sets in Evolutionary Multi-Objective Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/his/2007/29460156/12OmNB0nWfn",
"parentPublication": {
"id": "proceedings/his/2007/2946/0",
"title": "Hybrid Intelligent Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2012/4896/0/4896a011",
"title": "A New Objective Reduction Algorithm for Many-Objective Problems: Employing Mutual Information and Clustering Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2012/4896a011/12OmNBa2iAK",
"parentPublication": {
"id": "proceedings/cis/2012/4896/0",
"title": "2012 Eighth International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2014/4103/0/4103a378",
"title": "A Tool for Visually Exploring Multi-objective Mixed-Integer Optimization Models",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2014/4103a378/12OmNvCi45g",
"parentPublication": {
"id": "proceedings/iv/2014/4103/0",
"title": "2014 18th International Conference on Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2017/4822/0/482201a006",
"title": "An alpha-Dominance Expandation Based Algorithm for Many-Objective Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2017/482201a006/12OmNwJPMYn",
"parentPublication": {
"id": "proceedings/cis/2017/4822/0",
"title": "2017 13th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uksim/2008/3114/0/3114a266",
"title": "Behavior of Evolutionary Many-Objective Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/uksim/2008/3114a266/12OmNwcl7Ln",
"parentPublication": {
"id": "proceedings/uksim/2008/3114/0",
"title": "Computer Modeling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2016/3566/0/07839622",
"title": "A New Estimation Distributed Algorithm Applied to a Many-Objective Discrete Optimization Problem",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2016/07839622/12OmNx4yvwl",
"parentPublication": {
"id": "proceedings/bracis/2016/3566/0",
"title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2013/2246/0/2246a378",
"title": "EVOLVE: A Linked Visualization Environment for Explanatory Variables and Objective Function of Optimization Problems",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2013/2246a378/12OmNx965z6",
"parentPublication": {
"id": "proceedings/cw/2013/2246/0",
"title": "2013 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2014/4103/0/4103a351",
"title": "EVOLVE: A Visualization Tool for Multi-objective Optimization Featuring Linked View of Explanatory Variables and Objective Functions",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2014/4103a351/12OmNxvwoXm",
"parentPublication": {
"id": "proceedings/iv/2014/4103/0",
"title": "2014 18th International Conference on Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2019/4528/0/452800a188",
"title": "Visualization of the Non-Dominated Solutions in Many-Objective Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2019/452800a188/1fHjOmQsZPi",
"parentPublication": {
"id": "proceedings/dsc/2019/4528/0",
"title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bracis/2019/4253/0/425300a515",
"title": "Bio-Inspired Algorithms for Many-Objective Discrete Optimization",
"doi": null,
"abstractUrl": "/proceedings-article/bracis/2019/425300a515/1fHkLVJO3gQ",
"parentPublication": {
"id": "proceedings/bracis/2019/4253/0",
"title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBTawmW",
"title": "Parallel and Distributed Methods in Verification, 2010 Ninth International Workshop on, and High Performance Computational Systems Biology, Second International Workshop on",
"acronym": "pdmc-hibi",
"groupId": "1002929",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvHY2G2",
"doi": "10.1109/PDMC-HiBi.2010.22",
"title": "Predicting the Effects of Parameters Changes in Stochastic Models through Parallel Synthetic Experiments and Multivariate Analysis",
"normalizedTitle": "Predicting the Effects of Parameters Changes in Stochastic Models through Parallel Synthetic Experiments and Multivariate Analysis",
"abstract": "Usually researchers require many experiments to verify how biological systems respond to stimuli. However, the high cost of reagents and facilities as well as the time required to carry out experiments are sometimes the main cause of failure. In this regards, Information Technology offers a valuable help: modeling and simulation are mathematical tools to execute virtual experiments on computing devices. Through synthetic experimentation, researchers can sample the parameters space of a biological system and obtain hundreds of potential results, ready to be reused to design and conduct more targeted wet-lab experiments. A non negligible achievement of this is the enormous saving of resources and time. In this paper, we present a plug-in-based software prototype that combines high performance computing and statistics. Our framework relies on parallel computing to run large numbers of synthetic experiments. Multivariate analysis is then used to interpret and validate results. The software is tested on two well-known oscillatory models: Predator-Prey (Lotka-Volterra) and Repressilator.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Usually researchers require many experiments to verify how biological systems respond to stimuli. However, the high cost of reagents and facilities as well as the time required to carry out experiments are sometimes the main cause of failure. In this regards, Information Technology offers a valuable help: modeling and simulation are mathematical tools to execute virtual experiments on computing devices. Through synthetic experimentation, researchers can sample the parameters space of a biological system and obtain hundreds of potential results, ready to be reused to design and conduct more targeted wet-lab experiments. A non negligible achievement of this is the enormous saving of resources and time. In this paper, we present a plug-in-based software prototype that combines high performance computing and statistics. Our framework relies on parallel computing to run large numbers of synthetic experiments. Multivariate analysis is then used to interpret and validate results. The software is tested on two well-known oscillatory models: Predator-Prey (Lotka-Volterra) and Repressilator.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Usually researchers require many experiments to verify how biological systems respond to stimuli. However, the high cost of reagents and facilities as well as the time required to carry out experiments are sometimes the main cause of failure. In this regards, Information Technology offers a valuable help: modeling and simulation are mathematical tools to execute virtual experiments on computing devices. Through synthetic experimentation, researchers can sample the parameters space of a biological system and obtain hundreds of potential results, ready to be reused to design and conduct more targeted wet-lab experiments. A non negligible achievement of this is the enormous saving of resources and time. In this paper, we present a plug-in-based software prototype that combines high performance computing and statistics. Our framework relies on parallel computing to run large numbers of synthetic experiments. Multivariate analysis is then used to interpret and validate results. The software is tested on two well-known oscillatory models: Predator-Prey (Lotka-Volterra) and Repressilator.",
"fno": "4265a105",
"keywords": [
"Sensitivity Analysis",
"Synthetic Experiment",
"Multivariate Analysis",
"Parallel Computing"
],
"authors": [
{
"affiliation": null,
"fullName": "Michele Forlin",
"givenName": "Michele",
"surname": "Forlin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Tommaso Mazza",
"givenName": "Tommaso",
"surname": "Mazza",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Davide Prandi",
"givenName": "Davide",
"surname": "Prandi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pdmc-hibi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-09-01T00:00:00",
"pubType": "proceedings",
"pages": "105-115",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4265-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4265a095",
"articleId": "12OmNxvwoV8",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4265a116",
"articleId": "12OmNrJROTB",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/csse/2008/3336/4/3336g730",
"title": "A Novel Approach to the Similarity Analysis of Multivariate Time Series and Its Application in Hydrological Data Mining",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336g730/12OmNBOllhR",
"parentPublication": {
"id": "csse/2008/3336/4",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wsc/1989/58/0/00718701",
"title": "Simulation Sensitivity Analysis Using Frequency Domain Experiments",
"doi": null,
"abstractUrl": "/proceedings-article/wsc/1989/00718701/12OmNqJ8tu4",
"parentPublication": {
"id": "proceedings/wsc/1989/58/0",
"title": "Winter Simulation Conference Proceedings 1989",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/services/2009/3708/0/3708a717",
"title": "Supporting Bioinformatic Experiments with a Service Query Engine",
"doi": null,
"abstractUrl": "/proceedings-article/services/2009/3708a717/12OmNqJZgFv",
"parentPublication": {
"id": "proceedings/services/2009/3708/0",
"title": "2009 Congress on Services - I",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2012/4357/0/06399724",
"title": "A distributed software package for global sensitivity analysis of biological models",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2012/06399724/12OmNrGsDmQ",
"parentPublication": {
"id": "proceedings/bibe/2012/4357/0",
"title": "2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icip/1997/8183/3/81833718",
"title": "Estimating squinted SAR data: an efficient multivariate minimization approach using only essential 3-D target information",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1997/81833718/12OmNwoPtrO",
"parentPublication": {
"id": "proceedings/icip/1997/8183/3",
"title": "Proceedings of International Conference on Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/3/4077e950",
"title": "The Sensitivity Analysis, Optimization and Uncertainty Assessment of the Land Surface Model Parameters",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077e950/12OmNx5Yvs5",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/3",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2013/06/ttb2013061478",
"title": "Designing Pooling Systems for Noisy High-Throughput Protein-Protein Interaction Experiments Using Boolean Compressed Sensing",
"doi": null,
"abstractUrl": "/journal/tb/2013/06/ttb2013061478/13rRUB6SpYW",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2001/11/t1279",
"title": "Multivariate Rational Approximants for Multiclass Closed Queuing Networks",
"doi": null,
"abstractUrl": "/journal/tc/2001/11/t1279/13rRUxC0SO9",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2011/02/ttb2011020464",
"title": "Microarray Time Course Experiments: Finding Profiles",
"doi": null,
"abstractUrl": "/journal/tb/2011/02/ttb2011020464/13rRUy2YLWI",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2020/05/08664139",
"title": "Modeling Variability in Populations of Cells Using Approximated Multivariate Distributions",
"doi": null,
"abstractUrl": "/journal/tb/2020/05/08664139/18BHFPgRfRS",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvjgWMP",
"title": "Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on",
"acronym": "socialcom",
"groupId": "1800143",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvUaNry",
"doi": "10.1109/SocialCom.2010.123",
"title": "Measuring Disclosure Risk for Multimethod Synthetic Data Generation",
"normalizedTitle": "Measuring Disclosure Risk for Multimethod Synthetic Data Generation",
"abstract": "Government agencies must simultaneously maintain confidentiality of individual records and disseminate useful microdata. We propose a method to create synthetic data that combines quantile regression, hot deck imputation, and rank swapping. The result from implementation of the proposed procedure is a releasable data set containing original values for a few key variables, synthetic quantile regression predictions for several variables, and imputed and perturbed values for remaining variables. To measure the disclosure risk in the resulting synthetic data set, we extend existing probabilistic risk measures that aim to imitate an intruder attempting to match a record in the released data with information previously available on a target respondent.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Government agencies must simultaneously maintain confidentiality of individual records and disseminate useful microdata. We propose a method to create synthetic data that combines quantile regression, hot deck imputation, and rank swapping. The result from implementation of the proposed procedure is a releasable data set containing original values for a few key variables, synthetic quantile regression predictions for several variables, and imputed and perturbed values for remaining variables. To measure the disclosure risk in the resulting synthetic data set, we extend existing probabilistic risk measures that aim to imitate an intruder attempting to match a record in the released data with information previously available on a target respondent.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Government agencies must simultaneously maintain confidentiality of individual records and disseminate useful microdata. We propose a method to create synthetic data that combines quantile regression, hot deck imputation, and rank swapping. The result from implementation of the proposed procedure is a releasable data set containing original values for a few key variables, synthetic quantile regression predictions for several variables, and imputed and perturbed values for remaining variables. To measure the disclosure risk in the resulting synthetic data set, we extend existing probabilistic risk measures that aim to imitate an intruder attempting to match a record in the released data with information previously available on a target respondent.",
"fno": "4211a808",
"keywords": [
"Hot Deck Imputation",
"Quantile Regression",
"Rank Swapping",
"Statistical Disclosure Limitation",
"Synthetic Data"
],
"authors": [
{
"affiliation": null,
"fullName": "Michael D. Larsen",
"givenName": "Michael D.",
"surname": "Larsen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jennifer C. Huckett",
"givenName": "Jennifer C.",
"surname": "Huckett",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "socialcom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "808-815",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4211-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4211a800",
"articleId": "12OmNwKGAoB",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4211a816",
"articleId": "12OmNyuyabw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icise/2009/3887/0/pid978890",
"title": "Measuring Market Risk of China Wheat Futures Based on AAVS-CAViaR Model",
"doi": null,
"abstractUrl": "/proceedings-article/icise/2009/pid978890/12OmNrNh0Os",
"parentPublication": {
"id": "proceedings/icise/2009/3887/0",
"title": "Information Science and Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2011/4409/0/4409a651",
"title": "Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2011/4409a651/12OmNxAlA5a",
"parentPublication": {
"id": "proceedings/icdmw/2011/4409/0",
"title": "2011 IEEE 11th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2010/4116/0/4116a346",
"title": "Constructing Risk Measurement Models by Quantile Regression Method",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2010/4116a346/12OmNxWuis4",
"parentPublication": {
"id": "proceedings/bife/2010/4116/0",
"title": "2010 Third International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ifita/2010/4115/3/4115c169",
"title": "Quantile Regression Analysis of Cross-Section Returns in Chinese Stock Market",
"doi": null,
"abstractUrl": "/proceedings-article/ifita/2010/4115c169/12OmNzTYBWY",
"parentPublication": {
"id": "proceedings/ifita/2010/4115/1",
"title": "Information Technology and Applications, International Forum on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2011/4409/0/4409b163",
"title": "RFM Variables Revisited Using Quantile Regression",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2011/4409b163/12OmNzlly2z",
"parentPublication": {
"id": "proceedings/icdmw/2011/4409/0",
"title": "2011 IEEE 11th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cogmi/2021/1621/0/162100a054",
"title": "Boosting Synthetic Data Generation with Effective Nonlinear Causal Discovery",
"doi": null,
"abstractUrl": "/proceedings-article/cogmi/2021/162100a054/1CxzWfziXGE",
"parentPublication": {
"id": "proceedings/cogmi/2021/1621/0",
"title": "2021 IEEE Third International Conference on Cognitive Machine Intelligence (CogMI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "17D45VtKirI",
"title": "2018 International Conference on Cyberworlds (CW)",
"acronym": "cw",
"groupId": "1000175",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45VsBTVY",
"doi": "10.1109/CW.2018.00068",
"title": "Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets",
"normalizedTitle": "Analysis of Keystroke Dynamics for the Generation of Synthetic Datasets",
"abstract": "Biometrics is an emerging technology more and more present in our daily life. However, building biometric systems requires a large amount of data that may be difficult to collect. Collecting such sensitive data is also very time consuming and constrained, s.a. GDPR legislation. In the case of keystroke dynamics, existing databases have less than 200 users. For these reasons, we aim at generating a keystroke dynamics synthetic dataset. This paper presents the generation of keystroke data from known users as a first step towards the generation of synthetic datasets, and could also be used to impersonate users' identity.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Biometrics is an emerging technology more and more present in our daily life. However, building biometric systems requires a large amount of data that may be difficult to collect. Collecting such sensitive data is also very time consuming and constrained, s.a. GDPR legislation. In the case of keystroke dynamics, existing databases have less than 200 users. For these reasons, we aim at generating a keystroke dynamics synthetic dataset. This paper presents the generation of keystroke data from known users as a first step towards the generation of synthetic datasets, and could also be used to impersonate users' identity.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Biometrics is an emerging technology more and more present in our daily life. However, building biometric systems requires a large amount of data that may be difficult to collect. Collecting such sensitive data is also very time consuming and constrained, s.a. GDPR legislation. In the case of keystroke dynamics, existing databases have less than 200 users. For these reasons, we aim at generating a keystroke dynamics synthetic dataset. This paper presents the generation of keystroke data from known users as a first step towards the generation of synthetic datasets, and could also be used to impersonate users' identity.",
"fno": "731500a339",
"keywords": [
"Correlation",
"Biological System Modeling",
"Data Models",
"Feature Extraction",
"Authentication",
"Password",
"Keyboards",
"Keystroke",
"Synthetic Dataset",
"Data Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Denis Migdal",
"givenName": "Denis",
"surname": "Migdal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Christophe Rosenberger",
"givenName": "Christophe",
"surname": "Rosenberger",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-10-01T00:00:00",
"pubType": "proceedings",
"pages": "339-344",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-7315-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "731500a331",
"articleId": "17D45VObpNG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "731500a345",
"articleId": "17D45WK5Amm",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pst/2010/7551/0/05593258",
"title": "Keystroke dynamics: Characteristics and opportunities",
"doi": null,
"abstractUrl": "/proceedings-article/pst/2010/05593258/12OmNCga1NQ",
"parentPublication": {
"id": "proceedings/pst/2010/7551/0",
"title": "2010 Eighth International Conference on Privacy, Security and Trust",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/msn/2016/5696/0/07950276",
"title": "User Identification and Authentication Using Keystroke Dynamics with Acoustic Signal",
"doi": null,
"abstractUrl": "/proceedings-article/msn/2016/07950276/12OmNviHK4N",
"parentPublication": {
"id": "proceedings/msn/2016/5696/0",
"title": "2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hase/2014/3466/0/3466a009",
"title": "Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems",
"doi": null,
"abstractUrl": "/proceedings-article/hase/2014/3466a009/12OmNvjyxHl",
"parentPublication": {
"id": "proceedings/hase/2014/3466/0",
"title": "2014 IEEE 15th International Symposium on High-Assurance Systems Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/collaboratecom/2010/2/0/05766991",
"title": "Keystroke-dynamics authentication against synthetic forgeries",
"doi": null,
"abstractUrl": "/proceedings-article/collaboratecom/2010/05766991/12OmNvmowTA",
"parentPublication": {
"id": "proceedings/collaboratecom/2010/2/0",
"title": "2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ic3/2017/3077/0/08284338",
"title": "Keystroke dynamics based authentication using fuzzy logic",
"doi": null,
"abstractUrl": "/proceedings-article/ic3/2017/08284338/12OmNxeut9d",
"parentPublication": {
"id": "proceedings/ic3/2017/3077/0",
"title": "2017 Tenth International Conference on Contemporary Computing (IC3)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2018/7315/0/731500a324",
"title": "User Dependent Template Update for Keystroke Dynamics Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2018/731500a324/17D45WaTkfs",
"parentPublication": {
"id": "proceedings/cw/2018/7315/0",
"title": "2018 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acit/2018/0385/0/08672706",
"title": "Feature Selection for Android Keystroke Dynamics",
"doi": null,
"abstractUrl": "/proceedings-article/acit/2018/08672706/18Ipl5TfGlG",
"parentPublication": {
"id": "proceedings/acit/2018/0385/0",
"title": "2018 International Arab Conference on Information Technology (ACIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/5555/01/09786740",
"title": "CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics",
"doi": null,
"abstractUrl": "/journal/tq/5555/01/09786740/1DSuoGwfC4E",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2019/2297/0/229700a274",
"title": "Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2019/229700a274/1fHknAbAkww",
"parentPublication": {
"id": "proceedings/cw/2019/2297/0",
"title": "2019 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cw/2021/4065/0/406500a295",
"title": "Keystroke Dynamics Classification Based On LSTM and BLSTM Models",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2021/406500a295/1yBF6aVw56E",
"parentPublication": {
"id": "proceedings/cw/2021/4065/0",
"title": "2021 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1FY1bDsyg6Y",
"title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)",
"acronym": "cacml",
"groupId": "1847344",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1FY1rkCiwow",
"doi": "10.1109/CACML55074.2022.00073",
"title": "Face alignment by learning from small real datasets and large synthetic datasets",
"normalizedTitle": "Face alignment by learning from small real datasets and large synthetic datasets",
"abstract": "In recent years, face-related research had a wide variety of real-life applications. However, issues such as privacy violations and data abuse caused by its applications have also triggered global controversy. It is undeniable that face-related technology is efficient and convenient, but the dangers and risks are hidden by face technology should be comprehensively considered. Current face algorithms are still challenging in complex and challenging environments (e.g., large angles or expressions). Firstly the existing public training datasets are mostly frontal faces, which have an unbalanced distribution of challenging data. Secondly, the collected real datasets require explicit user consent, and the annotation process is time-consuming and expensive. In this paper, we open a new research direction through synthetic datasets. We try to use synthetic datasets to reduce the dependence of the model on the real-world data set. The face alignment experiments explore the synthetic dataset's complementarity and availability.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In recent years, face-related research had a wide variety of real-life applications. However, issues such as privacy violations and data abuse caused by its applications have also triggered global controversy. It is undeniable that face-related technology is efficient and convenient, but the dangers and risks are hidden by face technology should be comprehensively considered. Current face algorithms are still challenging in complex and challenging environments (e.g., large angles or expressions). Firstly the existing public training datasets are mostly frontal faces, which have an unbalanced distribution of challenging data. Secondly, the collected real datasets require explicit user consent, and the annotation process is time-consuming and expensive. In this paper, we open a new research direction through synthetic datasets. We try to use synthetic datasets to reduce the dependence of the model on the real-world data set. The face alignment experiments explore the synthetic dataset's complementarity and availability.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In recent years, face-related research had a wide variety of real-life applications. However, issues such as privacy violations and data abuse caused by its applications have also triggered global controversy. It is undeniable that face-related technology is efficient and convenient, but the dangers and risks are hidden by face technology should be comprehensively considered. Current face algorithms are still challenging in complex and challenging environments (e.g., large angles or expressions). Firstly the existing public training datasets are mostly frontal faces, which have an unbalanced distribution of challenging data. Secondly, the collected real datasets require explicit user consent, and the annotation process is time-consuming and expensive. In this paper, we open a new research direction through synthetic datasets. We try to use synthetic datasets to reduce the dependence of the model on the real-world data set. The face alignment experiments explore the synthetic dataset's complementarity and availability.",
"fno": "829000a397",
"keywords": [
"Data Privacy",
"Face Recognition",
"Learning Artificial Intelligence",
"Frontal Faces",
"Synthetic Datasets",
"Real World Data",
"Face Alignment Experiments",
"Synthetic Dataset",
"Face Related Research",
"Real Life Applications",
"Privacy Violations",
"Global Controversy",
"Face Related Technology",
"Face Technology",
"Current Face Algorithms",
"Complex Environments",
"Existing Public Training Datasets",
"Training",
"Data Privacy",
"Machine Learning Algorithms",
"Annotations",
"Computational Modeling",
"Asia",
"Machine Learning",
"Privacy Concern",
"Face Alignment",
"Synthetic Datasets"
],
"authors": [
{
"affiliation": "Wakayama university,Department of Engineering,Wakayama,Japan",
"fullName": "Haoqi Gao",
"givenName": "Haoqi",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Wakayama university,Department of Engineering,Wakayama,Japan",
"fullName": "Koichi Ogawara",
"givenName": "Koichi",
"surname": "Ogawara",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cacml",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-03-01T00:00:00",
"pubType": "proceedings",
"pages": "397-402",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8290-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "829000a391",
"articleId": "1FY1flsbcs0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "829000a403",
"articleId": "1FY1tepPvaw",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iccvw/2017/1034/0/1034b619",
"title": "Dense Face Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2017/1034b619/12OmNwF0C4S",
"parentPublication": {
"id": "proceedings/iccvw/2017/1034/0",
"title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2021/3902/0/09672029",
"title": "SOF: A Synthetic Occluded Face Dataset",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2021/09672029/1A8gAdD0gVy",
"parentPublication": {
"id": "proceedings/big-data/2021/3902/0",
"title": "2021 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200k0860",
"title": "SynFace: Face Recognition with Synthetic Data",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200k0860/1BmLqkEC28U",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900e710",
"title": "Delving into High-Quality Synthetic Face Occlusion Segmentation Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900e710/1G56NYPFggU",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2023/4544/0/10042627",
"title": "Unsupervised Face Recognition using Unlabeled Synthetic Data",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2023/10042627/1KOuZ9cPGgM",
"parentPublication": {
"id": "proceedings/fg/2023/4544/0",
"title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cogmi/2022/7406/0/740600a101",
"title": "Face Biometric Fairness Evaluation on Real vs Synthetic Cross-Spectral Images",
"doi": null,
"abstractUrl": "/proceedings-article/cogmi/2022/740600a101/1Lu4hNwQUrm",
"parentPublication": {
"id": "proceedings/cogmi/2022/7406/0",
"title": "2022 IEEE 4th International Conference on Cognitive Machine Intelligence (CogMI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005476",
"title": "Utility and Privacy Assessments of Synthetic Data for Regression Tasks",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005476/1hJs8eOjss0",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2021/0477/0/047700a207",
"title": "RarePlanes: Synthetic Data Takes Flight",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2021/047700a207/1uqGod3ZvMY",
"parentPublication": {
"id": "proceedings/wacv/2021/0477/0",
"title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2021/0191/0/019100b487",
"title": "Masked Face Recognition Datasets and Validation",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2021/019100b487/1yNhT6eVo08",
"parentPublication": {
"id": "proceedings/iccvw/2021/0191/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900b521",
"title": "ASMNet: a Lightweight Deep Neural Network for Face Alignment and Pose Estimation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900b521/1yXsIWhifv2",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1G55WEFExd6",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"acronym": "cvprw",
"groupId": "1001809",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1G56NYPFggU",
"doi": "10.1109/CVPRW56347.2022.00517",
"title": "Delving into High-Quality Synthetic Face Occlusion Segmentation Datasets",
"normalizedTitle": "Delving into High-Quality Synthetic Face Occlusion Segmentation Datasets",
"abstract": "This paper performs comprehensive analysis on datasets for occlusion-aware face segmentation, a task that is crucial for many downstream applications. The collection and annotation of such datasets are time-consuming and labor-intensive. Although some efforts have been made in synthetic data generation, the naturalistic aspect of data remains less explored. In our study, we propose two occlusion generation techniques, Naturalistic Occlusion Generation (NatOcc), for producing high-quality naturalistic synthetic occluded faces; and Random Occlusion Generation (RandOcc), a more general synthetic occluded data generation method (Figure 1). We empirically show the effectiveness and robustness of both methods, even for unseen occlusions. To facilitate model evaluation, we present two high-resolution real-world occluded face datasets with finegrained annotations, RealOcc and RealOcc-Wild, featuring both careful alignment preprocessing and an in-the-wild setting for robustness test. We further conduct a comprehensive analysis on a newly introduced segmentation benchmark, offering insights for future exploration. Our code and dataset are available at https://github.com/kennyvoo/face-occlusion-generation.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper performs comprehensive analysis on datasets for occlusion-aware face segmentation, a task that is crucial for many downstream applications. The collection and annotation of such datasets are time-consuming and labor-intensive. Although some efforts have been made in synthetic data generation, the naturalistic aspect of data remains less explored. In our study, we propose two occlusion generation techniques, Naturalistic Occlusion Generation (NatOcc), for producing high-quality naturalistic synthetic occluded faces; and Random Occlusion Generation (RandOcc), a more general synthetic occluded data generation method (Figure 1). We empirically show the effectiveness and robustness of both methods, even for unseen occlusions. To facilitate model evaluation, we present two high-resolution real-world occluded face datasets with finegrained annotations, RealOcc and RealOcc-Wild, featuring both careful alignment preprocessing and an in-the-wild setting for robustness test. We further conduct a comprehensive analysis on a newly introduced segmentation benchmark, offering insights for future exploration. Our code and dataset are available at https://github.com/kennyvoo/face-occlusion-generation.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper performs comprehensive analysis on datasets for occlusion-aware face segmentation, a task that is crucial for many downstream applications. The collection and annotation of such datasets are time-consuming and labor-intensive. Although some efforts have been made in synthetic data generation, the naturalistic aspect of data remains less explored. In our study, we propose two occlusion generation techniques, Naturalistic Occlusion Generation (NatOcc), for producing high-quality naturalistic synthetic occluded faces; and Random Occlusion Generation (RandOcc), a more general synthetic occluded data generation method (Figure 1). We empirically show the effectiveness and robustness of both methods, even for unseen occlusions. To facilitate model evaluation, we present two high-resolution real-world occluded face datasets with finegrained annotations, RealOcc and RealOcc-Wild, featuring both careful alignment preprocessing and an in-the-wild setting for robustness test. We further conduct a comprehensive analysis on a newly introduced segmentation benchmark, offering insights for future exploration. Our code and dataset are available at https://github.com/kennyvoo/face-occlusion-generation.",
"fno": "873900e710",
"keywords": [
"Face Recognition",
"Feature Extraction",
"Image Segmentation",
"Unseen Occlusions",
"High Resolution Real World",
"Face Datasets",
"Newly Introduced Segmentation Benchmark",
"High Quality Synthetic Face Occlusion Segmentation Datasets",
"Occlusion Aware Face Segmentation",
"Synthetic Data Generation",
"General Synthetic Occluded Data Generation Method",
"Random Occlusion Generation",
"High Quality Naturalistic Synthetic Occluded Faces",
"Naturalistic Occlusion Generation",
"Occlusion Generation Techniques",
"Computer Vision",
"Codes",
"Annotations",
"Face Recognition",
"Conferences",
"Benchmark Testing",
"Robustness"
],
"authors": [
{
"affiliation": "Nanyang Technological University,S-Lab",
"fullName": "Kenny T. R. Voo",
"givenName": "Kenny T. R.",
"surname": "Voo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanyang Technological University,S-Lab",
"fullName": "Liming Jiang",
"givenName": "Liming",
"surname": "Jiang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Nanyang Technological University,S-Lab",
"fullName": "Chen Change Loy",
"givenName": "Chen Change",
"surname": "Loy",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cvprw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-06-01T00:00:00",
"pubType": "proceedings",
"pages": "4710-4719",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8739-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [
{
"id": "1G56NTjUdFe",
"name": "pcvprw202287390-09857373s1-mm_873900e710.zip",
"size": "7.57 MB",
"location": "https://www.computer.org/csdl/api/v1/extra/pcvprw202287390-09857373s1-mm_873900e710.zip",
"__typename": "WebExtraType"
}
],
"adjacentArticles": {
"previous": {
"fno": "873900e700",
"articleId": "1G57a4EZ0kg",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "873900e720",
"articleId": "1G56HAYCnEA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cw/2016/2303/0/2303a189",
"title": "Occlusion Detection and Localization from Kinect Depth Images",
"doi": null,
"abstractUrl": "/proceedings-article/cw/2016/2303a189/12OmNAS9zvZ",
"parentPublication": {
"id": "proceedings/cw/2016/2303/0",
"title": "2016 International Conference on Cyberworlds (CW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2016/7258/0/07552982",
"title": "Occlusion pattern-based dictionary for robust face recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2016/07552982/12OmNqFrGEj",
"parentPublication": {
"id": "proceedings/icme/2016/7258/0",
"title": "2016 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2017/2937/0/2937a014",
"title": "Occlusion Robust Light Field Depth Estimation Using Segmentation Guided Bilateral Filtering",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2017/2937a014/12OmNqGA5iK",
"parentPublication": {
"id": "proceedings/ism/2017/2937/0",
"title": "2017 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2011/9140/0/05771404",
"title": "Face alignment robust to occlusion",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2011/05771404/12OmNyS6RIV",
"parentPublication": {
"id": "proceedings/fg/2011/9140/0",
"title": "Face and Gesture 2011",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2018/4195/0/08551507",
"title": "Occlusion-and-Edge-Aware Depth Estimation From Stereo Images for Synthetic Refocusing",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2018/08551507/17D45XH89nc",
"parentPublication": {
"id": "proceedings/icmew/2018/4195/0",
"title": "2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2021/2812/0/281200o4448",
"title": "Occlusion-Aware Video Object Inpainting",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2021/281200o4448/1BmJrj3Gicg",
"parentPublication": {
"id": "proceedings/iccv/2021/2812/0",
"title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdicn/2022/8476/0/847600a721",
"title": "Learning from Face recognition under occlusion",
"doi": null,
"abstractUrl": "/proceedings-article/bdicn/2022/847600a721/1CJfVvZTgQM",
"parentPublication": {
"id": "proceedings/bdicn/2022/8476/0",
"title": "2022 International Conference on Big Data, Information and Computer Network (BDICN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300a773",
"title": "Occlusion Robust Face Recognition Based on Mask Learning With Pairwise Differential Siamese Network",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300a773/1hVlfDsixVu",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2020/1331/0/09102788",
"title": "Occlusion-Aware GAN for Face De-Occlusion in the Wild",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2020/09102788/1kwqZfMSDIc",
"parentPublication": {
"id": "proceedings/icme/2020/1331/0",
"title": "2020 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900l1136",
"title": "Robust Instance Segmentation through Reasoning about Multi-Object Occlusion",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900l1136/1yeKQf3GVl6",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1J7W6LmbCw0",
"title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)",
"acronym": "ismar-adjunct",
"groupId": "9973799",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1J7WuBy14go",
"doi": "10.1109/ISMAR-Adjunct57072.2022.00081",
"title": "SynDa: A Novel Synthetic Data Generation Pipeline for Activity Recognition",
"normalizedTitle": "SynDa: A Novel Synthetic Data Generation Pipeline for Activity Recognition",
"abstract": "The task of classifying or predicting the activity performed by hu-mans is called human activity recognition. Many existing models aim to solve the problem of activity recognition in this field, but we recognise the lack of real data can have a great impact on the effectiveness of such models. In this paper, we introduce SynDa, a first-of-its-kind streamlined semi-automated pipeline for synthetic data generation built using photorealistic rendering and AI pose estimation, that harvests existing real-life video datasets to create new large-scale datasets. The synthetic data can augment real data to train models robustly and overcome the lack of and associated costs to acquire more real data. Preliminary work indicates that combining real data and synthetic video data generated using this pipeline to train models presents a mAP of 32.35%, while a model trained on real data presented 29.95%.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The task of classifying or predicting the activity performed by hu-mans is called human activity recognition. Many existing models aim to solve the problem of activity recognition in this field, but we recognise the lack of real data can have a great impact on the effectiveness of such models. In this paper, we introduce SynDa, a first-of-its-kind streamlined semi-automated pipeline for synthetic data generation built using photorealistic rendering and AI pose estimation, that harvests existing real-life video datasets to create new large-scale datasets. The synthetic data can augment real data to train models robustly and overcome the lack of and associated costs to acquire more real data. Preliminary work indicates that combining real data and synthetic video data generated using this pipeline to train models presents a mAP of 32.35%, while a model trained on real data presented 29.95%.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The task of classifying or predicting the activity performed by hu-mans is called human activity recognition. Many existing models aim to solve the problem of activity recognition in this field, but we recognise the lack of real data can have a great impact on the effectiveness of such models. In this paper, we introduce SynDa, a first-of-its-kind streamlined semi-automated pipeline for synthetic data generation built using photorealistic rendering and AI pose estimation, that harvests existing real-life video datasets to create new large-scale datasets. The synthetic data can augment real data to train models robustly and overcome the lack of and associated costs to acquire more real data. Preliminary work indicates that combining real data and synthetic video data generated using this pipeline to train models presents a mAP of 32.35%, while a model trained on real data presented 29.95%.",
"fno": "536500a373",
"keywords": [
"Computer Vision",
"Feature Extraction",
"Image Motion Analysis",
"Pattern Classification",
"Pose Estimation",
"Rendering Computer Graphics",
"Video Signal Processing",
"Human Activity Recognition",
"Novel Synthetic Data Generation Pipeline",
"Real Life Video Datasets",
"Syn Da",
"Synthetic Video Data",
"Costs",
"Pipelines",
"Pose Estimation",
"Streaming Media",
"Rendering Computer Graphics",
"Data Models",
"Human Activity Recognition",
"Activity Recognition Computer Vision Elderly Activities Of Daily Living",
"Skeletal Pose Estimation Pose Tracking Photorealistic RTX Rendering",
"Synthetic Data Generation Synthetic Data Pipeline Synthetic Data For ADL"
],
"authors": [
{
"affiliation": "NVIDIA AI Technology Center",
"fullName": "Megani Rajendran",
"givenName": "Megani",
"surname": "Rajendran",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centre for Immersification Singapore Institute of Technology",
"fullName": "Chek Tien Tan",
"givenName": "Chek Tien",
"surname": "Tan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Centre for Immersification Singapore Institute of Technology",
"fullName": "Indriyati Atmosukarto",
"givenName": "Indriyati",
"surname": "Atmosukarto",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NVIDIA AI Technology Center",
"fullName": "Aik Beng Ng",
"givenName": "Aik Beng",
"surname": "Ng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "NVIDIA AI Technology Center",
"fullName": "Simon See",
"givenName": "Simon",
"surname": "See",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ismar-adjunct",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-10-01T00:00:00",
"pubType": "proceedings",
"pages": "373-377",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-5365-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "536500a369",
"articleId": "1J7Waia4UXm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "536500a378",
"articleId": "1J7WlQhLiGQ",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ssiri-c/2011/4454/0/4454a009",
"title": "Feedback-Directed Test Case Generation Based on UML Activity Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/ssiri-c/2011/4454a009/12OmNC1Y5mu",
"parentPublication": {
"id": "proceedings/ssiri-c/2011/4454/0",
"title": "Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dv/2017/2610/0/261001a001",
"title": "DepthSynth: Real-Time Realistic Synthetic Data Generation from CAD Models for 2.5D Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/3dv/2017/261001a001/12OmNvjgWHB",
"parentPublication": {
"id": "proceedings/3dv/2017/2610/0",
"title": "2017 International Conference on 3D Vision (3DV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2011/09/ttk2011091359",
"title": "A Pattern Mining Approach to Sensor-Based Human Activity Recognition",
"doi": null,
"abstractUrl": "/journal/tk/2011/09/ttk2011091359/13rRUyuNsxp",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100b103",
"title": "Human Activity Recognition Using Federated Learning",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100b103/18AuNXG8wKs",
"parentPublication": {
"id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0",
"title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/irc/2022/7260/0/726000a435",
"title": "Object pose estimation in industrial environments using a synthetic data generation pipeline",
"doi": null,
"abstractUrl": "/proceedings-article/irc/2022/726000a435/1KckhI0QQ0g",
"parentPublication": {
"id": "proceedings/irc/2022/7260/0",
"title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020848",
"title": "HAR-CTGAN: A Mobile Sensor Data Generation Tool for Human Activity Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020848/1KfSoAyOpiM",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2018/1360/0/136000b234",
"title": "Towards a Simulation Platform for Generation of Synthetic Videos for Human Activity Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2018/136000b234/1gjRyGwZXKo",
"parentPublication": {
"id": "proceedings/csci/2018/1360/0",
"title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2019/5584/0/558400a635",
"title": "Designing a Simulation Platform for Generation of Synthetic Videos for Human Activity Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2019/558400a635/1jdDQCY1ZU4",
"parentPublication": {
"id": "proceedings/csci/2019/5584/0",
"title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2383",
"title": "Learning From Synthetic Animals",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2383/1m3nkH0jTaM",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2021/4899/0/489900b542",
"title": "An Efficient 3D Synthetic Model Generation Pipeline for Human Pose Data Augmentation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2021/489900b542/1yJYl0Ho3QI",
"parentPublication": {
"id": "proceedings/cvprw/2021/4899/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1KfQshha0dW",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "10020192",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KfRyX0PUpa",
"doi": "10.1109/BigData55660.2022.10020479",
"title": "Overcoming Challenges of Synthetic Data Generation",
"normalizedTitle": "Overcoming Challenges of Synthetic Data Generation",
"abstract": "There are several shortcomings in current methods of generating synthetic data using Generative Adversarial Networks (GANs). First, they tend to only emulate certain attributes of the original dataset. Second, they do not effectively model unbalanced discrete columns, long tails, or bimodal distributions of continuous columns. Lastly, these approaches often do not consider the potential for information leakage from the generated data. We propose UniformGAN, a GAN with a novel uniform loss function, which addresses these challenges and provides strong privacy guarantees using differential privacy. UniformGAN pre-processes datasets to transpose each column into a uniform distribution. We use a modified Deep Convolutional Generative Adversarial Network (DCGAN) architecture in which we replace ReLU activation functions with the more robust SeLU, which has significantly better performance and better convergence properties, and apply Dense-Sparse-Dense training to our network. We also use differential privacy to add noise to the discriminator during training. Along with UniformGAN, we provide a configurable command-line tool to generate and evaluate synthetic datasets on numerous metrics. It allows users to generate synthetic datasets from CTGAN, TableGAN, UniformGAN, or a custom framework and analyze the resultant datasets. This tool will help data scientists and industry users compare different synthetic dataset generation models and enable them to improve existing methods. We evaluated UniformGAN using multiple datasets, including the Adult, Covertype, and Credit Kaggle datasets, as well as two insurance-related Kaggle datasets. The results show that, when used on datatsets containing a large number of continuous columns, UniformGAN out performs other methods by producing synthetic data with similar correlations and distributions as the original dataset while ensuring privacy.",
"abstracts": [
{
"abstractType": "Regular",
"content": "There are several shortcomings in current methods of generating synthetic data using Generative Adversarial Networks (GANs). First, they tend to only emulate certain attributes of the original dataset. Second, they do not effectively model unbalanced discrete columns, long tails, or bimodal distributions of continuous columns. Lastly, these approaches often do not consider the potential for information leakage from the generated data. We propose UniformGAN, a GAN with a novel uniform loss function, which addresses these challenges and provides strong privacy guarantees using differential privacy. UniformGAN pre-processes datasets to transpose each column into a uniform distribution. We use a modified Deep Convolutional Generative Adversarial Network (DCGAN) architecture in which we replace ReLU activation functions with the more robust SeLU, which has significantly better performance and better convergence properties, and apply Dense-Sparse-Dense training to our network. We also use differential privacy to add noise to the discriminator during training. Along with UniformGAN, we provide a configurable command-line tool to generate and evaluate synthetic datasets on numerous metrics. It allows users to generate synthetic datasets from CTGAN, TableGAN, UniformGAN, or a custom framework and analyze the resultant datasets. This tool will help data scientists and industry users compare different synthetic dataset generation models and enable them to improve existing methods. We evaluated UniformGAN using multiple datasets, including the Adult, Covertype, and Credit Kaggle datasets, as well as two insurance-related Kaggle datasets. The results show that, when used on datatsets containing a large number of continuous columns, UniformGAN out performs other methods by producing synthetic data with similar correlations and distributions as the original dataset while ensuring privacy.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "There are several shortcomings in current methods of generating synthetic data using Generative Adversarial Networks (GANs). First, they tend to only emulate certain attributes of the original dataset. Second, they do not effectively model unbalanced discrete columns, long tails, or bimodal distributions of continuous columns. Lastly, these approaches often do not consider the potential for information leakage from the generated data. We propose UniformGAN, a GAN with a novel uniform loss function, which addresses these challenges and provides strong privacy guarantees using differential privacy. UniformGAN pre-processes datasets to transpose each column into a uniform distribution. We use a modified Deep Convolutional Generative Adversarial Network (DCGAN) architecture in which we replace ReLU activation functions with the more robust SeLU, which has significantly better performance and better convergence properties, and apply Dense-Sparse-Dense training to our network. We also use differential privacy to add noise to the discriminator during training. Along with UniformGAN, we provide a configurable command-line tool to generate and evaluate synthetic datasets on numerous metrics. It allows users to generate synthetic datasets from CTGAN, TableGAN, UniformGAN, or a custom framework and analyze the resultant datasets. This tool will help data scientists and industry users compare different synthetic dataset generation models and enable them to improve existing methods. We evaluated UniformGAN using multiple datasets, including the Adult, Covertype, and Credit Kaggle datasets, as well as two insurance-related Kaggle datasets. The results show that, when used on datatsets containing a large number of continuous columns, UniformGAN out performs other methods by producing synthetic data with similar correlations and distributions as the original dataset while ensuring privacy.",
"fno": "10020479",
"keywords": [
"Data Analysis",
"Data Handling",
"Data Mining",
"Data Privacy",
"Feature Extraction",
"Learning Artificial Intelligence",
"Neural Nets",
"Transfer Functions",
"Bimodal Distributions",
"Configurable Command Line Tool",
"Continuous Columns",
"Credit Kaggle Datasets",
"Data Scientists",
"Dense Sparse Dense Training",
"Different Synthetic Dataset Generation Models",
"Differential Privacy",
"GAN",
"Generative Adversarial Networks",
"Information Leakage",
"Insurance Related Kaggle Datasets",
"Long Tails",
"Modified Deep Convolutional Generative Adversarial Network Architecture",
"Multiple Datasets",
"Overcoming Challenges",
"Performs Other Methods",
"Re LU Activation Functions",
"Resultant Datasets",
"Similar Correlations",
"Strong Privacy Guarantees",
"Synthetic Data Generation",
"Synthetic Datasets",
"Unbalanced Discrete Columns",
"Uniform Distribution",
"Uniform Loss Function",
"Uniform GAN Pre Processes Datasets",
"Training",
"Measurement",
"Industries",
"Differential Privacy",
"Privacy",
"Tail",
"Big Data",
"Synthetic Data Generation",
"Generative Adversarial Networks GA Ns",
"Differential Privacy"
],
"authors": [
{
"affiliation": "Massachusetts Institute of Technology,Cambridge,MA",
"fullName": "Kevin Fang",
"givenName": "Kevin",
"surname": "Fang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Massachusetts Institute of Technology,Cambridge,MA",
"fullName": "Vaikkunth Mugunthan",
"givenName": "Vaikkunth",
"surname": "Mugunthan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Massachusetts Institute of Technology,Cambridge,MA",
"fullName": "Vayd Ramkumar",
"givenName": "Vayd",
"surname": "Ramkumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Massachusetts Institute of Technology,Cambridge,MA",
"fullName": "Lalana Kagal",
"givenName": "Lalana",
"surname": "Kagal",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "262-270",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "10020338",
"articleId": "1KfSblGzPva",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "10020788",
"articleId": "1KfRi99jn7q",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "trans/lt/2017/01/07563858",
"title": "Privacy-Preserving Learning Analytics: Challenges and Techniques",
"doi": null,
"abstractUrl": "/journal/lt/2017/01/07563858/13rRUwkfAVM",
"parentPublication": {
"id": "trans/lt",
"title": "IEEE Transactions on Learning Technologies",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cogmi/2021/1621/0/162100a054",
"title": "Boosting Synthetic Data Generation with Effective Nonlinear Causal Discovery",
"doi": null,
"abstractUrl": "/proceedings-article/cogmi/2021/162100a054/1CxzWfziXGE",
"parentPublication": {
"id": "proceedings/cogmi/2021/1621/0",
"title": "2021 IEEE Third International Conference on Cognitive Machine Intelligence (CogMI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2023/4544/0/10042627",
"title": "Unsupervised Face Recognition using Unlabeled Synthetic Data",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2023/10042627/1KOuZ9cPGgM",
"parentPublication": {
"id": "proceedings/fg/2023/4544/0",
"title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020936",
"title": "Efficient Bayesian Network Construction for Increased Privacy on Synthetic Data",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020936/1KfSKqy03iU",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020237",
"title": "Generation of Synthetic Urban Vehicle Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020237/1KfSQVp3BNS",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2023/7578/0/757800a314",
"title": "TCAC-GAN: Synthetic Trajectory Generation Model Using Auxiliary Classifier Generative Adversarial Networks for Improved Protection of Trajectory Data",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2023/757800a314/1LFLFBFtnk4",
"parentPublication": {
"id": "proceedings/bigcomp/2023/7578/0",
"title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/msn/2022/6457/0/645700a320",
"title": "RDP-WGAN: Image Data Privacy Protection Based on Rényi Differential Privacy",
"doi": null,
"abstractUrl": "/proceedings-article/msn/2022/645700a320/1LUtXzdVOCs",
"parentPublication": {
"id": "proceedings/msn/2022/6457/0",
"title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2019/2506/0/250600a098",
"title": "DP-CGAN: Differentially Private Synthetic Data and Label Generation",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2019/250600a098/1iTveSlRhV6",
"parentPublication": {
"id": "proceedings/cvprw/2019/2506/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iisa/2021/0032/0/09555521",
"title": "Differentially Private Synthetic Mixed-Type Data Generation For Unsupervised Learning",
"doi": null,
"abstractUrl": "/proceedings-article/iisa/2021/09555521/1xxcrx4JwoU",
"parentPublication": {
"id": "proceedings/iisa/2021/0032/0",
"title": "2021 12th International Conference on Information, Intelligence, Systems & Applications (IISA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400b574",
"title": "Synthetic Differential Privacy Data Generation for Revealing Bias Modelling Risks",
"doi": null,
"abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400b574/1zxKWvJeyXK",
"parentPublication": {
"id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0",
"title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1KfQshha0dW",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "10020192",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1KfSQVp3BNS",
"doi": "10.1109/BigData55660.2022.10020237",
"title": "Generation of Synthetic Urban Vehicle Trajectories",
"normalizedTitle": "Generation of Synthetic Urban Vehicle Trajectories",
"abstract": "The analysis of trajectory datasets has numerous applications ranging from urban planning to human mobility understanding, but to protect the privacy of individuals trajectory datasets are rarely released to researchers. And even when they are, they are limited in size and spatio-temporal coverage. To address these issues a number of methods for generating synthetic yet realistic trajectory datasets have been proposed. These existing methods either require a lot of complex parameters to be calibrated (simulators) or rely on existing trajectory datasets (generative models). In this paper, we propose Data-Driven Trajectory Generator, dubbed DDTG, a data-driven, model-free, and parameter-less algorithm for generating realistic synthetic vehicle trajectory datasets. Unlike existing approaches, DDTG relies on aggregate origin-destination and traffic data, both of which are publicly available and free of privacy concerns. Furthermore, we show that our method is orthogonal to the existing approaches with which DDTG can be combined to generate synthetic datasets of higher quality. Our experiments with real-world trajectory and traffic data show that the datasets generated by DDTG follow distributions that are very close to the distributions of real trajectory datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The analysis of trajectory datasets has numerous applications ranging from urban planning to human mobility understanding, but to protect the privacy of individuals trajectory datasets are rarely released to researchers. And even when they are, they are limited in size and spatio-temporal coverage. To address these issues a number of methods for generating synthetic yet realistic trajectory datasets have been proposed. These existing methods either require a lot of complex parameters to be calibrated (simulators) or rely on existing trajectory datasets (generative models). In this paper, we propose Data-Driven Trajectory Generator, dubbed DDTG, a data-driven, model-free, and parameter-less algorithm for generating realistic synthetic vehicle trajectory datasets. Unlike existing approaches, DDTG relies on aggregate origin-destination and traffic data, both of which are publicly available and free of privacy concerns. Furthermore, we show that our method is orthogonal to the existing approaches with which DDTG can be combined to generate synthetic datasets of higher quality. Our experiments with real-world trajectory and traffic data show that the datasets generated by DDTG follow distributions that are very close to the distributions of real trajectory datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The analysis of trajectory datasets has numerous applications ranging from urban planning to human mobility understanding, but to protect the privacy of individuals trajectory datasets are rarely released to researchers. And even when they are, they are limited in size and spatio-temporal coverage. To address these issues a number of methods for generating synthetic yet realistic trajectory datasets have been proposed. These existing methods either require a lot of complex parameters to be calibrated (simulators) or rely on existing trajectory datasets (generative models). In this paper, we propose Data-Driven Trajectory Generator, dubbed DDTG, a data-driven, model-free, and parameter-less algorithm for generating realistic synthetic vehicle trajectory datasets. Unlike existing approaches, DDTG relies on aggregate origin-destination and traffic data, both of which are publicly available and free of privacy concerns. Furthermore, we show that our method is orthogonal to the existing approaches with which DDTG can be combined to generate synthetic datasets of higher quality. Our experiments with real-world trajectory and traffic data show that the datasets generated by DDTG follow distributions that are very close to the distributions of real trajectory datasets.",
"fno": "10020237",
"keywords": [
"Data Mining",
"Data Privacy",
"Pattern Classification",
"Road Traffic",
"Road Vehicles",
"Telecommunication Traffic",
"Town And Country Planning",
"Traffic Engineering Computing",
"Data Driven Trajectory Generator",
"DDTG",
"Generative Models",
"Human Mobility Understanding",
"Individuals Trajectory Datasets",
"Model Free",
"Real World Trajectory",
"Realistic Synthetic Vehicle Trajectory Datasets",
"Realistic Trajectory Datasets",
"Spatio Temporal Coverage",
"Synthetic Datasets",
"Synthetic Urban Vehicle Trajectories",
"Traffic Data",
"Urban Planning",
"Differential Privacy",
"Aggregates",
"Urban Planning",
"Big Data",
"Generators",
"Distance Measurement",
"Trajectory",
"Synthetic Vehicle Trajectory",
"Synthetic Datasets"
],
"authors": [
{
"affiliation": "University of Southern California,Department of Computer Science,Los Angeles,California",
"fullName": "Chrysovalantis Anastasiou",
"givenName": "Chrysovalantis",
"surname": "Anastasiou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Southern California,Integrated Media Systems Center,Los Angeles,California",
"fullName": "Seon Ho Kim",
"givenName": "Seon Ho",
"surname": "Kim",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Southern California,Department of Computer Science,Los Angeles,California",
"fullName": "Cyrus Shahabi",
"givenName": "Cyrus",
"surname": "Shahabi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-12-01T00:00:00",
"pubType": "proceedings",
"pages": "359-366",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-8045-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "10020834",
"articleId": "1KfRS7ub80U",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "10020847",
"articleId": "1KfT19OxjZS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dcc/2012/4656/0/4656a062",
"title": "Compression of GPS Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/dcc/2012/4656a062/12OmNBDyA9C",
"parentPublication": {
"id": "proceedings/dcc/2012/4656/0",
"title": "Data Compression Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uic-atc-scalcom/2015/7211/0/07518255",
"title": "Discovering Urban Social Functional Regions Using Taxi Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518255/12OmNwpXRXJ",
"parentPublication": {
"id": "proceedings/uic-atc-scalcom/2015/7211/0",
"title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109d818",
"title": "Traj Align: A Method for Precise Matching of 3-D Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109d818/12OmNxTmHIc",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/03/06871403",
"title": "Discovering Urban Functional Zones Using Latent Activity Trajectories",
"doi": null,
"abstractUrl": "/journal/tk/2015/03/06871403/13rRUILtJmx",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mdm/2022/5176/0/517600a099",
"title": "Collecting Individual Trajectories under Local Differential Privacy",
"doi": null,
"abstractUrl": "/proceedings-article/mdm/2022/517600a099/1G89Gpgw3gQ",
"parentPublication": {
"id": "proceedings/mdm/2022/5176/0",
"title": "2022 23rd IEEE International Conference on Mobile Data Management (MDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020479",
"title": "Overcoming Challenges of Synthetic Data Generation",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020479/1KfRyX0PUpa",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccvw/2019/5023/0/502300c310",
"title": "Conditional Vehicle Trajectories Prediction in CARLA Urban Environment",
"doi": null,
"abstractUrl": "/proceedings-article/iccvw/2019/502300c310/1i5mDzBN5UQ",
"parentPublication": {
"id": "proceedings/iccvw/2019/5023/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2021/8808/0/09412158",
"title": "Multiple Future Prediction Leveraging Synthetic Trajectories",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2021/09412158/1tmiA1VpmNy",
"parentPublication": {
"id": "proceedings/icpr/2021/8808/0",
"title": "2020 25th International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400c189",
"title": "TrajForesee: How limited detailed trajectories enhance large-scale sparse information to predict vehicle trajectories?",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400c189/1uGXouWwcH6",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900g404",
"title": "Euro-PVI: Pedestrian Vehicle Interactions in Dense Urban Centers",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900g404/1yeJrOFfLtC",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzVXNJh",
"title": "2015 IEEE Symposium on 3D User Interfaces (3DUI)",
"acronym": "3dui",
"groupId": "1001623",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrYCY1N",
"doi": "10.1109/3DUI.2015.7131741",
"title": "Utilization of variation in stereoscopic depth for encoding aspects of non-spatial data",
"normalizedTitle": "Utilization of variation in stereoscopic depth for encoding aspects of non-spatial data",
"abstract": "In this paper, we present our experience in utilizing the stereoscopic depth for highlighting the structural relations in compound graphs. In this regard, we use the stereoscopic depth to encode the different levels-of-details in compound graphs and the interaction operations provided by the ExpanD technique for expanding or contracting the nodes in order to align graph nodes in the 3D space with minimum occlusion. We conducted a controlled evaluation study where we invited 30 participants to evaluate the approach using different configurations with different graph sizes and different visual clues. The aim of the study was to understand the viewers' ability in detecting the variations in the stereoscopic depth. The study results show that stereoscopic depth can be used to encode data aspects of graphs under certain circumstances.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present our experience in utilizing the stereoscopic depth for highlighting the structural relations in compound graphs. In this regard, we use the stereoscopic depth to encode the different levels-of-details in compound graphs and the interaction operations provided by the ExpanD technique for expanding or contracting the nodes in order to align graph nodes in the 3D space with minimum occlusion. We conducted a controlled evaluation study where we invited 30 participants to evaluate the approach using different configurations with different graph sizes and different visual clues. The aim of the study was to understand the viewers' ability in detecting the variations in the stereoscopic depth. The study results show that stereoscopic depth can be used to encode data aspects of graphs under certain circumstances.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present our experience in utilizing the stereoscopic depth for highlighting the structural relations in compound graphs. In this regard, we use the stereoscopic depth to encode the different levels-of-details in compound graphs and the interaction operations provided by the ExpanD technique for expanding or contracting the nodes in order to align graph nodes in the 3D space with minimum occlusion. We conducted a controlled evaluation study where we invited 30 participants to evaluate the approach using different configurations with different graph sizes and different visual clues. The aim of the study was to understand the viewers' ability in detecting the variations in the stereoscopic depth. The study results show that stereoscopic depth can be used to encode data aspects of graphs under certain circumstances.",
"fno": "07131741",
"keywords": [
"Stereo Image Processing",
"Three Dimensional Displays",
"Compounds",
"Color",
"Accuracy",
"Data Visualization",
"Visualization"
],
"authors": [
{
"affiliation": "Computer Graphics and HCI Group, University of Kaiserslautern, Germany",
"fullName": "Ragaad AlTarawneh",
"givenName": "Ragaad",
"surname": "AlTarawneh",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Graphics and HCI Group, University of Kaiserslautern, Germany",
"fullName": "Shah Rukh Humayoun",
"givenName": "Shah Rukh",
"surname": "Humayoun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computer Graphics and HCI Group, University of Kaiserslautern, Germany",
"fullName": "Achim Ebert",
"givenName": "Achim",
"surname": "Ebert",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "3dui",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-03-01T00:00:00",
"pubType": "proceedings",
"pages": "143-144",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-6886-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07131740",
"articleId": "12OmNqzcvNM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07131742",
"articleId": "12OmNyxFKaM",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2012/1226/0/007P1A07",
"title": "Scene warping: Layer-based stereoscopic image resizing",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/007P1A07/12OmNAiFI8D",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2016/1552/0/07574768",
"title": "Visual attention modeling for stereoscopic video",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2016/07574768/12OmNBSBk8d",
"parentPublication": {
"id": "proceedings/icmew/2016/1552/0",
"title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2014/4717/0/06890709",
"title": "Learning visual saliency for stereoscopic images",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2014/06890709/12OmNqIhFMD",
"parentPublication": {
"id": "proceedings/icmew/2014/4717/0",
"title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcn/2012/1565/0/06423586",
"title": "3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2012/06423586/12OmNqzcvC0",
"parentPublication": {
"id": "proceedings/lcn/2012/1565/0",
"title": "37th Annual IEEE Conference on Local Computer Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dvis/2014/6826/0/07160093",
"title": "The (possible) utility of stereoscopic 3D displays for information visualization: The good, the bad, and the ugly",
"doi": null,
"abstractUrl": "/proceedings-article/3dvis/2014/07160093/12OmNxWcHag",
"parentPublication": {
"id": "proceedings/3dvis/2014/6826/0",
"title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/01/06824802",
"title": "Geometrically Consistent Stereoscopic Image Editing Using Patch-Based Synthesis",
"doi": null,
"abstractUrl": "/journal/tg/2015/01/06824802/13rRUwInvsT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/08/ttg2013081375",
"title": "StereoPasting: Interactive Composition in Stereoscopic Images",
"doi": null,
"abstractUrl": "/journal/tg/2013/08/ttg2013081375/13rRUxC0SWa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122325",
"title": "Stereoscopic Highlighting: 2D Graph Visualization on Stereo Displays",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122325/13rRUy2YLSZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b655",
"title": "Warping-Based Stereoscopic 3D Video Retargeting With Depth Remapping",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b655/18j8LvV2AJG",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300j741",
"title": "Learning to Explore Intrinsic Saliency for Stereoscopic Video",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300j741/1gyrLoWsF1u",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNrkjVbR",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvk7K65",
"doi": "10.1109/ICME.2013.6607587",
"title": "Making stereo photo cropping easy",
"normalizedTitle": "Making stereo photo cropping easy",
"abstract": "The increasing popularity of stereoscopic 3D brings the demand for tools for editing and authoring stereoscopic images and videos. This paper shows that even a simple task like cropping is difficult for amateur users with little stereoscopic photography knowledge. Unlike regular monocular (2D) images, cropping a stereoscopic image needs to be carefully executed to avoid stereoscopic violations, which otherwise cause an unpleasant stereoscopic viewing experience. In this paper, we present a system that assists in stereoscopic photo cropping by automatically measuring the stereoscopic photography violations and alerting users with the potential violations. Our study shows that compared to a popular stereoscopic photo editing system, our system makes stereoscopic photo cropping easier even for amateur users with little stereoscopic photography knowledge and provides a good user experience.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The increasing popularity of stereoscopic 3D brings the demand for tools for editing and authoring stereoscopic images and videos. This paper shows that even a simple task like cropping is difficult for amateur users with little stereoscopic photography knowledge. Unlike regular monocular (2D) images, cropping a stereoscopic image needs to be carefully executed to avoid stereoscopic violations, which otherwise cause an unpleasant stereoscopic viewing experience. In this paper, we present a system that assists in stereoscopic photo cropping by automatically measuring the stereoscopic photography violations and alerting users with the potential violations. Our study shows that compared to a popular stereoscopic photo editing system, our system makes stereoscopic photo cropping easier even for amateur users with little stereoscopic photography knowledge and provides a good user experience.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The increasing popularity of stereoscopic 3D brings the demand for tools for editing and authoring stereoscopic images and videos. This paper shows that even a simple task like cropping is difficult for amateur users with little stereoscopic photography knowledge. Unlike regular monocular (2D) images, cropping a stereoscopic image needs to be carefully executed to avoid stereoscopic violations, which otherwise cause an unpleasant stereoscopic viewing experience. In this paper, we present a system that assists in stereoscopic photo cropping by automatically measuring the stereoscopic photography violations and alerting users with the potential violations. Our study shows that compared to a popular stereoscopic photo editing system, our system makes stereoscopic photo cropping easier even for amateur users with little stereoscopic photography knowledge and provides a good user experience.",
"fno": "06607587",
"keywords": [
"Stereo Image Processing",
"Three Dimensional Displays",
"Photography",
"Agriculture",
"Image Edge Detection",
"Image Color Analysis",
"Histograms",
"Photo Editing",
"Stereoscopic Photography",
"Photo Cropping"
],
"authors": [
{
"affiliation": "Department of Computer Science, Portland State University, USA",
"fullName": "Fan Zhang",
"givenName": null,
"surname": "Fan Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Portland State University, USA",
"fullName": "Yuzhen Niu",
"givenName": "Yuzhen",
"surname": "Niu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science, Portland State University, USA",
"fullName": "Feng Liu",
"givenName": null,
"surname": "Feng Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2013",
"issn": "1945-7871",
"isbn": "978-1-4799-0015-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06607586",
"articleId": "12OmNqyUUBI",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06607588",
"articleId": "12OmNyr8Yhe",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wacv/2015/6683/0/6683a448",
"title": "Learning an Aesthetic Photo Cropping Cascade",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2015/6683a448/12OmNvSKNRd",
"parentPublication": {
"id": "proceedings/wacv/2015/6683/0",
"title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2017/4822/0/07926615",
"title": "Quantitative Analysis of Automatic Image Cropping Algorithms: A Dataset and Comparative Study",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2017/07926615/12OmNwc3wAt",
"parentPublication": {
"id": "proceedings/wacv/2017/4822/0",
"title": "2017 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2017/1032/0/1032c205",
"title": "Deep Cropping via Attention Box Prediction and Aesthetics Assessment",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2017/1032c205/12OmNyqiaOb",
"parentPublication": {
"id": "proceedings/iccv/2017/1032/0",
"title": "2017 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/10/08078205",
"title": "PhotoRecomposer: Interactive Photo Recomposition by Cropping",
"doi": null,
"abstractUrl": "/journal/tg/2018/10/08078205/13rRUEgs2M9",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/08/07544591",
"title": "Stereoscopic Thumbnail Creation via Efficient Stereo Saliency Detection",
"doi": null,
"abstractUrl": "/journal/tg/2017/08/07544591/13rRUyfbwqP",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2019/07/08365844",
"title": "A Deep Network Solution for Attention and Aesthetics Aware Photo Cropping",
"doi": null,
"abstractUrl": "/journal/tp/2019/07/08365844/13rRUypp58W",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2022/9617/0/961700a321",
"title": "Continuous Transformation Superposition for Visual Comfort Enhancement of Casual Stereoscopic Photography",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2022/961700a321/1CJbKHvtVqE",
"parentPublication": {
"id": "proceedings/vr/2022/9617/0",
"title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2019/9552/0/955200a254",
"title": "Collaborative Deep Reinforcement Learning for Image Cropping",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2019/955200a254/1cdOGxN3g5O",
"parentPublication": {
"id": "proceedings/icme/2019/9552/0",
"title": "2019 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089475",
"title": "Recurrent Enhancement of Visual Comfort for Casual Stereoscopic Photography",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089475/1jIx9ixQvzq",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2020/7168/0/716800m2682",
"title": "Learning to Learn Cropping Models for Different Aspect Ratio Requirements",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2020/716800m2682/1m3o8QfxwFG",
"parentPublication": {
"id": "proceedings/cvpr/2020/7168/0",
"title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNx6g6nR",
"title": "2015 International Conference on Computer Science and Applications (CSA)",
"acronym": "csa",
"groupId": "1803775",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyKJiyr",
"doi": "10.1109/CSA.2015.17",
"title": "Learning Stereoscopic Visual Attention Model for 3D Video",
"normalizedTitle": "Learning Stereoscopic Visual Attention Model for 3D Video",
"abstract": "Various saliency detection model have been proposed for the visual attention prediction in 2D images/videos. The rapid development of stereoscopic display techniques along with the emerging 3D applications, bring the depth information. Depth is an appealing vision feature since it provides instantaneous depth perception for the scene and can affect human's visual attention. In this paper, we propose to build a model of visual attention based on learning method for stereoscopic videos. The proposed method takes the eye tracking data to build up the ground truth saliency map. The 2D features and the depth information are integrated by the learning method. Experimental results demonstrate that our method is effective and reasonable.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Various saliency detection model have been proposed for the visual attention prediction in 2D images/videos. The rapid development of stereoscopic display techniques along with the emerging 3D applications, bring the depth information. Depth is an appealing vision feature since it provides instantaneous depth perception for the scene and can affect human's visual attention. In this paper, we propose to build a model of visual attention based on learning method for stereoscopic videos. The proposed method takes the eye tracking data to build up the ground truth saliency map. The 2D features and the depth information are integrated by the learning method. Experimental results demonstrate that our method is effective and reasonable.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Various saliency detection model have been proposed for the visual attention prediction in 2D images/videos. The rapid development of stereoscopic display techniques along with the emerging 3D applications, bring the depth information. Depth is an appealing vision feature since it provides instantaneous depth perception for the scene and can affect human's visual attention. In this paper, we propose to build a model of visual attention based on learning method for stereoscopic videos. The proposed method takes the eye tracking data to build up the ground truth saliency map. The 2D features and the depth information are integrated by the learning method. Experimental results demonstrate that our method is effective and reasonable.",
"fno": "9961a006",
"keywords": [
"Stereo Image Processing",
"Computational Modeling",
"Gaze Tracking",
"Visualization",
"Three Dimensional Displays",
"Databases",
"Two Dimensional Displays",
"SVM",
"Eye Tracking",
"Stereoscopic Videos",
"Visual Attention"
],
"authors": [
{
"affiliation": null,
"fullName": "Gang-Jian Huang",
"givenName": "Gang-Jian",
"surname": "Huang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xin Du",
"givenName": "Xin",
"surname": "Du",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yun-Fang Zhu",
"givenName": "Yun-Fang",
"surname": "Zhu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "csa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-11-01T00:00:00",
"pubType": "proceedings",
"pages": "6-9",
"year": "2015",
"issn": null,
"isbn": "978-1-4799-9961-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "9961a001",
"articleId": "12OmNzuZUoU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "9961a010",
"articleId": "12OmNrK9q4E",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmew/2016/1552/0/07574768",
"title": "Visual attention modeling for stereoscopic video",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2016/07574768/12OmNBSBk8d",
"parentPublication": {
"id": "proceedings/icmew/2016/1552/0",
"title": "2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2014/4717/0/06890709",
"title": "Learning visual saliency for stereoscopic images",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2014/06890709/12OmNqIhFMD",
"parentPublication": {
"id": "proceedings/icmew/2014/4717/0",
"title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2016/7258/0/07552998",
"title": "Visual attention analysis on stereoscopic images for subjective discomfort evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2016/07552998/12OmNx38vR3",
"parentPublication": {
"id": "proceedings/icme/2016/7258/0",
"title": "2016 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3dvis/2014/6826/0/07160093",
"title": "The (possible) utility of stereoscopic 3D displays for information visualization: The good, the bad, and the ugly",
"doi": null,
"abstractUrl": "/proceedings-article/3dvis/2014/07160093/12OmNxWcHag",
"parentPublication": {
"id": "proceedings/3dvis/2014/6826/0",
"title": "2014 IEEE VIS International Workshop on 3DVis (3DVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2015/01/06824802",
"title": "Geometrically Consistent Stereoscopic Image Editing Using Patch-Based Synthesis",
"doi": null,
"abstractUrl": "/journal/tg/2015/01/06824802/13rRUwInvsT",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b655",
"title": "Warping-Based Stereoscopic 3D Video Retargeting With Depth Remapping",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b655/18j8LvV2AJG",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2022/9617/0/961700a321",
"title": "Continuous Transformation Superposition for Visual Comfort Enhancement of Casual Stereoscopic Photography",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2022/961700a321/1CJbKHvtVqE",
"parentPublication": {
"id": "proceedings/vr/2022/9617/0",
"title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a342",
"title": "Objective Quality Assessment Method for Stereoscopic Image Retargeting",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a342/1cJ0BFEtKeI",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2019/3293/0/329300j741",
"title": "Learning to Explore Intrinsic Saliency for Stereoscopic Video",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2019/329300j741/1gyrLoWsF1u",
"parentPublication": {
"id": "proceedings/cvpr/2019/3293/0",
"title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2023/02/09551731",
"title": "Learning from Deep Stereoscopic Attention for Simulator Sickness Prediction",
"doi": null,
"abstractUrl": "/journal/tg/2023/02/09551731/1xgx3DIeexq",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzcxYUb",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzICEDS",
"doi": "10.1109/ICME.2012.177",
"title": "Subjective Crosstalk Assessment Methodology for Auto-stereoscopic Displays",
"normalizedTitle": "Subjective Crosstalk Assessment Methodology for Auto-stereoscopic Displays",
"abstract": "Cross talk is one of the most annoying distortions in the visualization stage of stereoscopic systems. Specifically, both pattern and amount of cross talk in multi-view auto-stereoscopic displays are more complex because of viewing angle dependability, when compared to cross talk in 2-view stereoscopic displays. Regarding system cross talk there are objective measures to assess it in auto-stereoscopic displays. However, in addition to system cross talk, cross talk perceived by users is also impacted by scene content. Moreover, some cross talk is arguably beneficial in auto-stereoscopic displays. Therefore, in this paper, we further assess how cross talk is perceived by users with various scene contents and different viewing positions using auto-stereoscopic displays. In particular, the proposed subjective cross talk assessment methodology is realistic without restriction of the users viewing behavior and is not limited to the specific technique used in auto-stereoscopic displays. The test was performed on a slanted parallax barrier based auto-stereoscopic display. The subjective cross talk assessment results show their consistence to the system cross talk meanwhile more scene content and viewing position related cross talk perception information is provided. This knowledge can be used to design new cross talk perception metrics.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Cross talk is one of the most annoying distortions in the visualization stage of stereoscopic systems. Specifically, both pattern and amount of cross talk in multi-view auto-stereoscopic displays are more complex because of viewing angle dependability, when compared to cross talk in 2-view stereoscopic displays. Regarding system cross talk there are objective measures to assess it in auto-stereoscopic displays. However, in addition to system cross talk, cross talk perceived by users is also impacted by scene content. Moreover, some cross talk is arguably beneficial in auto-stereoscopic displays. Therefore, in this paper, we further assess how cross talk is perceived by users with various scene contents and different viewing positions using auto-stereoscopic displays. In particular, the proposed subjective cross talk assessment methodology is realistic without restriction of the users viewing behavior and is not limited to the specific technique used in auto-stereoscopic displays. The test was performed on a slanted parallax barrier based auto-stereoscopic display. The subjective cross talk assessment results show their consistence to the system cross talk meanwhile more scene content and viewing position related cross talk perception information is provided. This knowledge can be used to design new cross talk perception metrics.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Cross talk is one of the most annoying distortions in the visualization stage of stereoscopic systems. Specifically, both pattern and amount of cross talk in multi-view auto-stereoscopic displays are more complex because of viewing angle dependability, when compared to cross talk in 2-view stereoscopic displays. Regarding system cross talk there are objective measures to assess it in auto-stereoscopic displays. However, in addition to system cross talk, cross talk perceived by users is also impacted by scene content. Moreover, some cross talk is arguably beneficial in auto-stereoscopic displays. Therefore, in this paper, we further assess how cross talk is perceived by users with various scene contents and different viewing positions using auto-stereoscopic displays. In particular, the proposed subjective cross talk assessment methodology is realistic without restriction of the users viewing behavior and is not limited to the specific technique used in auto-stereoscopic displays. The test was performed on a slanted parallax barrier based auto-stereoscopic display. The subjective cross talk assessment results show their consistence to the system cross talk meanwhile more scene content and viewing position related cross talk perception information is provided. This knowledge can be used to design new cross talk perception metrics.",
"fno": "4711a515",
"keywords": [
"Crosstalk",
"Stereo Image Processing",
"Head",
"Training",
"Sensors",
"Three Dimensional Displays",
"Skeleton",
"Subjective Crosstalk Assessment",
"3 D Digital Signal Processing",
"Auto Stereoscopic Display",
"Spatial Multiplex",
"System Crosstalk"
],
"authors": [
{
"affiliation": null,
"fullName": "Liyuan Xing",
"givenName": "Liyuan",
"surname": "Xing",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jie Xu",
"givenName": "Jie",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Kim Skildheim",
"givenName": "Kim",
"surname": "Skildheim",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Andrew Perkis",
"givenName": "Andrew",
"surname": "Perkis",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Touradj Ebrahimi",
"givenName": "Touradj",
"surname": "Ebrahimi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-07-01T00:00:00",
"pubType": "proceedings",
"pages": "515-520",
"year": "2012",
"issn": "1945-7871",
"isbn": "978-1-4673-1659-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4711a509",
"articleId": "12OmNwM6A0j",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4711a521",
"articleId": "12OmNCmpcN1",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2012/4711/0/4711a302",
"title": "Warping-Based Novel View Synthesis from a Binocular Image for Autostereoscopic Displays",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2012/4711a302/12OmNAoUTsE",
"parentPublication": {
"id": "proceedings/icme/2012/4711/0",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2003/1882/0/18820269",
"title": "Depth Perception and Visual After-effects at Stereoscopic Workbench Displays",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2003/18820269/12OmNqBbHJc",
"parentPublication": {
"id": "proceedings/vr/2003/1882/0",
"title": "Proceedings IEEE Virtual Reality 2003",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icce/2009/2558/0/05012210",
"title": "Multi-view renderer for auto-stereoscopic mobile devices",
"doi": null,
"abstractUrl": "/proceedings-article/icce/2009/05012210/12OmNqzcvJb",
"parentPublication": {
"id": "proceedings/icce/2009/2558/0",
"title": "2009 Digest of Technical Papers International Conference on Consumer Electronics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgiv/2006/2606/0/26060128",
"title": "3D Images Compression for Multi-View Auto-Stereoscopic Displays",
"doi": null,
"abstractUrl": "/proceedings-article/cgiv/2006/26060128/12OmNxzMnL1",
"parentPublication": {
"id": "proceedings/cgiv/2006/2606/0",
"title": "International Conference on Computer Graphics, Imaging and Visualisation (CGIV'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apwcs/2010/4003/0/4003a147",
"title": "A New Virtual View Rendering Method Based on Depth Image",
"doi": null,
"abstractUrl": "/proceedings-article/apwcs/2010/4003a147/12OmNy6HQX6",
"parentPublication": {
"id": "proceedings/apwcs/2010/4003/0",
"title": "Wearable Computing Systems, Asia-Pacific Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a169",
"title": "Visualizing the Perceived Discomfort of Stereoscopic Video",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a169/12OmNz4SOrX",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2004/2177/0/21770633",
"title": "Do we Need Stereoscopic Displays for 3D Augmented Reality Target Selection Tasks?",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2004/21770633/12OmNzhna99",
"parentPublication": {
"id": "proceedings/iv/2004/2177/0",
"title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2011/4589/0/4589a512",
"title": "Evaluation of Crosstalk Metrics for 3D Display Technologies with Respect to Temporal Luminance Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a512/12OmNzlD99Y",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2002/02/v0129",
"title": "A Geometric Comparison of Algorithms for Fusion Control in Stereoscopic HTDs",
"doi": null,
"abstractUrl": "/journal/tg/2002/02/v0129/13rRUwbs2aS",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBDyAb4",
"title": "2016 XVIII Symposium on Virtual and Augmented Reality (SVR)",
"acronym": "svr",
"groupId": "1800426",
"volume": "0",
"displayVolume": "0",
"year": "2016",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzTYC6l",
"doi": "10.1109/SVR.2016.42",
"title": "Three-Dimensionality Perception Evaluation in Stereoscopic Virtual Environments: A Systematic Review",
"normalizedTitle": "Three-Dimensionality Perception Evaluation in Stereoscopic Virtual Environments: A Systematic Review",
"abstract": "The three-dimensionality perception in visual scenes is provided by the representation of objects in different dimensions and distortion, both related to perspective. However, the feeling of being in a virtual environment can be provided by the use of stereoscopic techniques. Although there are several studies on users three-dimensionality perception in stereoscopic systems, there are no systematic reviews in the literature aimed at categorizing evaluation methods about this perception in experimental studies. This article presents a systematic review that identifies effects, parameters and evaluation methods regarding the three-dimensionality perception in virtual environments with stereoscopy.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The three-dimensionality perception in visual scenes is provided by the representation of objects in different dimensions and distortion, both related to perspective. However, the feeling of being in a virtual environment can be provided by the use of stereoscopic techniques. Although there are several studies on users three-dimensionality perception in stereoscopic systems, there are no systematic reviews in the literature aimed at categorizing evaluation methods about this perception in experimental studies. This article presents a systematic review that identifies effects, parameters and evaluation methods regarding the three-dimensionality perception in virtual environments with stereoscopy.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The three-dimensionality perception in visual scenes is provided by the representation of objects in different dimensions and distortion, both related to perspective. However, the feeling of being in a virtual environment can be provided by the use of stereoscopic techniques. Although there are several studies on users three-dimensionality perception in stereoscopic systems, there are no systematic reviews in the literature aimed at categorizing evaluation methods about this perception in experimental studies. This article presents a systematic review that identifies effects, parameters and evaluation methods regarding the three-dimensionality perception in virtual environments with stereoscopy.",
"fno": "4149a198",
"keywords": [
"Visualization",
"Three Dimensional Displays",
"Systematics",
"Stereo Image Processing",
"Virtual Environments",
"Avatars",
"Augmented Reality",
"Evaluation",
"Three Dimensional Perception",
"Stereoscopy",
"Systematic Review"
],
"authors": [
{
"affiliation": null,
"fullName": "Sahra Karolina Gomes e Silva",
"givenName": "Sahra Karolina",
"surname": "Gomes e Silva",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Cléber G. Corrêa",
"givenName": "Cléber G.",
"surname": "Corrêa",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fátima L.S. Nunes",
"givenName": "Fátima L.S.",
"surname": "Nunes",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "svr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2016-06-01T00:00:00",
"pubType": "proceedings",
"pages": "198-209",
"year": "2016",
"issn": null,
"isbn": "978-1-5090-4149-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4149a193",
"articleId": "12OmNrFTr5b",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4149a210",
"articleId": "12OmNzDvSiS",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ismar/2014/6184/0/06948413",
"title": "A study of depth perception in hand-held augmented reality using autostereoscopic displays",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2014/06948413/12OmNAoUTpO",
"parentPublication": {
"id": "proceedings/ismar/2014/6184/0",
"title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/avss/2011/0844/0/06027293",
"title": "Stereoscopic viewing facilitates the perception of crowds",
"doi": null,
"abstractUrl": "/proceedings-article/avss/2011/06027293/12OmNBEpnya",
"parentPublication": {
"id": "proceedings/avss/2011/0844/0",
"title": "2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2015/7204/0/7204a052",
"title": "Depth Perception Evaluation with Different Stereoscopic Techniques: A Case Study",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2015/7204a052/12OmNC943QQ",
"parentPublication": {
"id": "proceedings/svr/2015/7204/0",
"title": "2015 XVII Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2003/1882/0/18820269",
"title": "Depth Perception and Visual After-effects at Stereoscopic Workbench Displays",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2003/18820269/12OmNqBbHJc",
"parentPublication": {
"id": "proceedings/vr/2003/1882/0",
"title": "Proceedings IEEE Virtual Reality 2003",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2016/7258/0/07552873",
"title": "Learning-based quality assessment of retargeted stereoscopic images",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2016/07552873/12OmNrFkeQd",
"parentPublication": {
"id": "proceedings/icme/2016/7258/0",
"title": "2016 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/1999/0234/0/02340029",
"title": "Development of Stereoscopic-Haptic Virtual Environments",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/1999/02340029/12OmNwHz090",
"parentPublication": {
"id": "proceedings/cbms/1999/0234/0",
"title": "Proceedings 12th IEEE Symposium on Computer-Based Medical Systems (Cat. No.99CB36365)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismarw/2016/3740/0/07836486",
"title": "Modeling Physical Structure as Additional Constraints for Stereoscopic Optical See-Through Head-Mounted Display Calibration",
"doi": null,
"abstractUrl": "/proceedings-article/ismarw/2016/07836486/12OmNx7XH8d",
"parentPublication": {
"id": "proceedings/ismarw/2016/3740/0",
"title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ismar/2013/2869/0/06671806",
"title": "Psychophysical exploration of stereoscopic pseudo-transparency",
"doi": null,
"abstractUrl": "/proceedings-article/ismar/2013/06671806/12OmNyz5JSD",
"parentPublication": {
"id": "proceedings/ismar/2013/2869/0",
"title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2019/1377/0/08797744",
"title": "Effects of Stereoscopic Viewing and Haptic Feedback, Sensory-Motor Congruence and Calibration on Near-Field Fine Motor Perception-Action Coordination in Virtual Reality",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2019/08797744/1cJ1dKraais",
"parentPublication": {
"id": "proceedings/vr/2019/1377/0",
"title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csci/2018/1360/0/136000a596",
"title": "A Systematic Literature Review of Indicators for the Understanding of Interactions in Virtual Learning Environments",
"doi": null,
"abstractUrl": "/proceedings-article/csci/2018/136000a596/1gjRw0EJe4U",
"parentPublication": {
"id": "proceedings/csci/2018/1360/0",
"title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNAkEU4f",
"title": "2011 IEEE International Conference on Multimedia and Expo",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzVGcCN",
"doi": "10.1109/ICME.2011.6012099",
"title": "MVC based scalable codec enhancing frame-compatible stereoscopic video",
"normalizedTitle": "MVC based scalable codec enhancing frame-compatible stereoscopic video",
"abstract": "Existing 3D video solutions take advantages of the 2D video infrastructure, by coding two views of the stereoscopic video content in a frame-compatible manner, such as side-by-side or top-bottom. Content providers and service providers are using the existing 2D video authorizing tools and delivery infrastructure to enhance the 2D video experience into 3D with relatively small additional cost. However, such a frame-compatible solution typically sacrifices the quality of each view, by providing a half-resolution representation. In the future, it is expected that more and more devices are capable of rendering full-resolution 1080p stereoscopic video content. Co-existing of services based on half-resolution stereoscopic video, full-resolution stereoscopic video, as well as full-resolution 2D video is expected in the marketplace. In this paper, a scalable codec is proposed to support the decoding and rendering of frame-compatible stereo, full-resolution 2D and full-resolution stereo video representations. Compared to codecs providing similar functionalities, significant coding gain can be achieved.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Existing 3D video solutions take advantages of the 2D video infrastructure, by coding two views of the stereoscopic video content in a frame-compatible manner, such as side-by-side or top-bottom. Content providers and service providers are using the existing 2D video authorizing tools and delivery infrastructure to enhance the 2D video experience into 3D with relatively small additional cost. However, such a frame-compatible solution typically sacrifices the quality of each view, by providing a half-resolution representation. In the future, it is expected that more and more devices are capable of rendering full-resolution 1080p stereoscopic video content. Co-existing of services based on half-resolution stereoscopic video, full-resolution stereoscopic video, as well as full-resolution 2D video is expected in the marketplace. In this paper, a scalable codec is proposed to support the decoding and rendering of frame-compatible stereo, full-resolution 2D and full-resolution stereo video representations. Compared to codecs providing similar functionalities, significant coding gain can be achieved.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Existing 3D video solutions take advantages of the 2D video infrastructure, by coding two views of the stereoscopic video content in a frame-compatible manner, such as side-by-side or top-bottom. Content providers and service providers are using the existing 2D video authorizing tools and delivery infrastructure to enhance the 2D video experience into 3D with relatively small additional cost. However, such a frame-compatible solution typically sacrifices the quality of each view, by providing a half-resolution representation. In the future, it is expected that more and more devices are capable of rendering full-resolution 1080p stereoscopic video content. Co-existing of services based on half-resolution stereoscopic video, full-resolution stereoscopic video, as well as full-resolution 2D video is expected in the marketplace. In this paper, a scalable codec is proposed to support the decoding and rendering of frame-compatible stereo, full-resolution 2D and full-resolution stereo video representations. Compared to codecs providing similar functionalities, significant coding gain can be achieved.",
"fno": "06012099",
"keywords": [
"Decoding",
"Image Enhancement",
"Image Representation",
"Image Resolution",
"Stereo Image Processing",
"Video Codecs",
"Video Coding",
"Visual Perception",
"MVC Based Scalable Codec",
"Frame Compatible Stereoscopic Video Enhancement",
"3 D Video Solution",
"2 D Video Infrastructure",
"2 D Video Authorizing Tool",
"Full Resolution Stereoscopic Video Content",
"Half Resolution Stereoscopic Video",
"Full Resolution Stereo Video Representation",
"Encoding",
"IEC",
"Stereo Image Processing",
"3 DTV",
"Frame Compatible Stereoscopic Video",
"H 264 AVC",
"MVC Multiview Video Coding",
"Scalable Video"
],
"authors": [
{
"affiliation": "QCT Multimedia R&D and Standards, Qualcomm Inc., 5776 Morehouse Dr. San Diego, CA, 92121, USA",
"fullName": "Ying Chen",
"givenName": "Ying",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "QCT Multimedia R&D and Standards, Qualcomm Inc., 5776 Morehouse Dr. San Diego, CA, 92121, USA",
"fullName": "Rong Zhang",
"givenName": "Rong",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "QCT Multimedia R&D and Standards, Qualcomm Inc., 5776 Morehouse Dr. San Diego, CA, 92121, USA",
"fullName": "Marta Karczewicz",
"givenName": "Marta",
"surname": "Karczewicz",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-4",
"year": "2011",
"issn": "1945-7871",
"isbn": "978-1-61284-348-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06012098",
"articleId": "12OmNwqft4b",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06012100",
"articleId": "12OmNBlXs6k",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icmew/2012/2027/0/06266227",
"title": "User Requirements Elicitation of Stereoscopic 3D Video Interaction",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2012/06266227/12OmNB7Lvyi",
"parentPublication": {
"id": "proceedings/icmew/2012/2027/0",
"title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2008/2570/0/04607477",
"title": "Frame concealment algorithm for stereoscopic video using motion vector sharing",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2008/04607477/12OmNBOCWrU",
"parentPublication": {
"id": "proceedings/icme/2008/2570/0",
"title": "2008 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2012/4711/0/4711a640",
"title": "Perceived Picture Quality of Frame-Compatible 3DTV Video Formats",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2012/4711a640/12OmNqFrGMQ",
"parentPublication": {
"id": "proceedings/icme/2012/4711/0",
"title": "2012 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2014/4717/0/06890709",
"title": "Learning visual saliency for stereoscopic images",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2014/06890709/12OmNqIhFMD",
"parentPublication": {
"id": "proceedings/icmew/2014/4717/0",
"title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2013/2840/0/2840a073",
"title": "Joint Subspace Stabilization for Stereoscopic Video",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2013/2840a073/12OmNxT56Af",
"parentPublication": {
"id": "proceedings/iccv/2013/2840/0",
"title": "2013 IEEE International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588879",
"title": "Stereoscopic Image Quality Assessment Based on Cyclopean Image",
"doi": null,
"abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588879/12OmNzAoi4D",
"parentPublication": {
"id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0",
"title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607551",
"title": "Orthogonal Muxing Frame Compatible Full Resolution technology for multi-resolution frame-compatible stereo coding",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607551/12OmNzcPAFn",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2011/348/0/06012197",
"title": "Hybrid video codec based joint rate control of stereoscopic video for terrestrial broadcasting services",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2011/06012197/12OmNzwpUoo",
"parentPublication": {
"id": "proceedings/icme/2011/348/0",
"title": "2011 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/08/ttg2013081375",
"title": "StereoPasting: Interactive Composition in Stereoscopic Images",
"doi": null,
"abstractUrl": "/journal/tg/2013/08/ttg2013081375/13rRUxC0SWa",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900a705",
"title": "A New Dataset and Transformer for Stereoscopic Video Super-Resolution",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900a705/1G563GrTA40",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1CJbEwHHqEg",
"title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)",
"acronym": "vr",
"groupId": "1000791",
"volume": "0",
"displayVolume": "0",
"year": "2022",
"__typename": "ProceedingType"
},
"article": {
"id": "1CJbKHvtVqE",
"doi": "10.1109/VR51125.2022.00051",
"title": "Continuous Transformation Superposition for Visual Comfort Enhancement of Casual Stereoscopic Photography",
"normalizedTitle": "Continuous Transformation Superposition for Visual Comfort Enhancement of Casual Stereoscopic Photography",
"abstract": "Casual stereoscopic photography allows ordinary users to create a stereoscopic photo using two photos taken casually by a monocular camera. The visual comfort of a casual stereoscopic photo can greatly affect its visual experience. In this paper, we present a novel visual comfort enhancement method for casual stereoscopic photography via reinforcement learning based on continuous transformation superposition. We consider the transformation, in a continuous transformation space, to transform each view as superpositions of several basic continuous transformations, enabling more subtle and flexible image transformation operations to approach better solutions. To achieve the continuous transformation superposition, we prepare a collection of continuous transformation models for translation, rotation, and perspective transformations. Then we train a policy model to determine an optimal transformation chain to recurrently handle both the geometric constraints and disparity adjustment, and thereby enhance the visual comfort of casual stereoscopic images. We further propose an attention-based stereo feature fusion module that enhances and integrates the binocular information between the left and right views. Experimental results on three datasets demonstrate that our proposed method achieves superior performance to state-of-the-art methods.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Casual stereoscopic photography allows ordinary users to create a stereoscopic photo using two photos taken casually by a monocular camera. The visual comfort of a casual stereoscopic photo can greatly affect its visual experience. In this paper, we present a novel visual comfort enhancement method for casual stereoscopic photography via reinforcement learning based on continuous transformation superposition. We consider the transformation, in a continuous transformation space, to transform each view as superpositions of several basic continuous transformations, enabling more subtle and flexible image transformation operations to approach better solutions. To achieve the continuous transformation superposition, we prepare a collection of continuous transformation models for translation, rotation, and perspective transformations. Then we train a policy model to determine an optimal transformation chain to recurrently handle both the geometric constraints and disparity adjustment, and thereby enhance the visual comfort of casual stereoscopic images. We further propose an attention-based stereo feature fusion module that enhances and integrates the binocular information between the left and right views. Experimental results on three datasets demonstrate that our proposed method achieves superior performance to state-of-the-art methods.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Casual stereoscopic photography allows ordinary users to create a stereoscopic photo using two photos taken casually by a monocular camera. The visual comfort of a casual stereoscopic photo can greatly affect its visual experience. In this paper, we present a novel visual comfort enhancement method for casual stereoscopic photography via reinforcement learning based on continuous transformation superposition. We consider the transformation, in a continuous transformation space, to transform each view as superpositions of several basic continuous transformations, enabling more subtle and flexible image transformation operations to approach better solutions. To achieve the continuous transformation superposition, we prepare a collection of continuous transformation models for translation, rotation, and perspective transformations. Then we train a policy model to determine an optimal transformation chain to recurrently handle both the geometric constraints and disparity adjustment, and thereby enhance the visual comfort of casual stereoscopic images. We further propose an attention-based stereo feature fusion module that enhances and integrates the binocular information between the left and right views. Experimental results on three datasets demonstrate that our proposed method achieves superior performance to state-of-the-art methods.",
"fno": "961700a321",
"keywords": [
"Cameras",
"Image Fusion",
"Learning Artificial Intelligence",
"Photography",
"Stereo Image Processing",
"Visual Experience",
"Casual Stereoscopic Photography",
"Continuous Transformation Superposition",
"Continuous Transformation Space",
"Subtle Image Transformation Operations",
"Flexible Image Transformation Operations",
"Continuous Transformation Models",
"Perspective Transformations",
"Optimal Transformation Chain",
"Casual Stereoscopic Images",
"Casual Stereoscopic Photo",
"Visual Comfort Enhancement Method",
"Attention Based Stereo Feature Fusion Module",
"Photography",
"Visualization",
"Solid Modeling",
"Three Dimensional Displays",
"Stereo Image Processing",
"Conferences",
"Virtual Reality",
"Human Centered Computing",
"3 D Authoring",
"Image And Video Acquisition",
"Computer Vision"
],
"authors": [
{
"affiliation": "Fuzhou University,College of Computer and Data Science,China",
"fullName": "Yuzhong Chen",
"givenName": "Yuzhong",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fuzhou University,College of Computer and Data Science,China",
"fullName": "Qijin Shen",
"givenName": "Qijin",
"surname": "Shen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fuzhou University,College of Computer and Data Science,China",
"fullName": "Yuzhen Niu",
"givenName": "Yuzhen",
"surname": "Niu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Fuzhou University,College of Computer and Data Science,China",
"fullName": "Wenxi Liu",
"givenName": "Wenxi",
"surname": "Liu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2022-03-01T00:00:00",
"pubType": "proceedings",
"pages": "321-329",
"year": "2022",
"issn": null,
"isbn": "978-1-6654-9617-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "961700a311",
"articleId": "1CJbTCLo1X2",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "961700a330",
"articleId": "1CJc2ZgMCFq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cvpr/2012/1226/0/058P1B05",
"title": "Leveraging stereopsis for saliency analysis",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2012/058P1B05/12OmNy50g5B",
"parentPublication": {
"id": "proceedings/cvpr/2012/1226/0",
"title": "2012 IEEE Conference on Computer Vision and Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a306",
"title": "Towards Automatic Stereoscopic Video Synthesis from a Casual Monocular Video",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a306/12OmNyKrHdW",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/svr/2016/4149/0/4149a198",
"title": "Three-Dimensionality Perception Evaluation in Stereoscopic Virtual Environments: A Systematic Review",
"doi": null,
"abstractUrl": "/proceedings-article/svr/2016/4149a198/12OmNzTYC6l",
"parentPublication": {
"id": "proceedings/svr/2016/4149/0",
"title": "2016 XVIII Symposium on Virtual and Augmented Reality (SVR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2012/1611/0/06238902",
"title": "Perceptual based stereoscopic content analysis using salient information, dense disparity maps, and modified random walk framework",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2012/06238902/12OmNzw8jhE",
"parentPublication": {
"id": "proceedings/cvprw/2012/1611/0",
"title": "2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122325",
"title": "Stereoscopic Highlighting: 2D Graph Visualization on Stereo Displays",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122325/13rRUy2YLSZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigmm/2018/5321/0/08499087",
"title": "A 3D Visual Comfort Metric Based on Binocular Asymmetry Factor",
"doi": null,
"abstractUrl": "/proceedings-article/bigmm/2018/08499087/17D45VObpOA",
"parentPublication": {
"id": "proceedings/bigmm/2018/5321/0",
"title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wacv/2019/1975/0/197500b655",
"title": "Warping-Based Stereoscopic 3D Video Retargeting With Depth Remapping",
"doi": null,
"abstractUrl": "/proceedings-article/wacv/2019/197500b655/18j8LvV2AJG",
"parentPublication": {
"id": "proceedings/wacv/2019/1975/0",
"title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccp/2019/3263/0/08747337",
"title": "Stereoscopic Dark Flash for Low-light Photography",
"doi": null,
"abstractUrl": "/proceedings-article/iccp/2019/08747337/1bcJw5jAcAE",
"parentPublication": {
"id": "proceedings/iccp/2019/3263/0",
"title": "2019 IEEE International Conference on Computational Photography (ICCP)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2019/9214/0/921400a342",
"title": "Objective Quality Assessment Method for Stereoscopic Image Retargeting",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2019/921400a342/1cJ0BFEtKeI",
"parentPublication": {
"id": "proceedings/icmew/2019/9214/0",
"title": "2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vr/2020/5608/0/09089475",
"title": "Recurrent Enhancement of Visual Comfort for Casual Stereoscopic Photography",
"doi": null,
"abstractUrl": "/proceedings-article/vr/2020/09089475/1jIx9ixQvzq",
"parentPublication": {
"id": "proceedings/vr/2020/5608/0",
"title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCmpcNk",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzUxO6V",
"doi": "10.1109/VIS.2005.46",
"title": "High Dynamic Range Volume Visualization",
"normalizedTitle": "High Dynamic Range Volume Visualization",
"abstract": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.",
"abstracts": [
{
"abstractType": "Regular",
"content": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "High resolution volumes require high precision compositing to preserve detailed structures. This is even more desirable for volumes with high dynamic range values. After the high precision intermediate image has been computed, simply rounding up pixel values to regular display scales loses the computed details. In this paper, we present a novel high dynamic range volume visualization method for rendering volume data with both high spatial and intensity resolutions. Our method performs high precision volume rendering followed by dynamic tone mapping to preserve details on regular display devices. By leveraging available high dynamic range image display algorithms, this dynamic tone mapping can be automatically adjusted to enhance selected features for the final display. We also present a novel transfer function design interface with nonlinear magnification of the density range and logarithmic scaling of the color/opacity range to facilitate high dynamic range volume visualization. By leveraging modern commodity graphics hardware and out-of-core acceleration, our system can produce an effective visualization of huge volume data.",
"fno": "27660042",
"keywords": [
"Volume Rendering",
"High Dynamic Range",
"Focus Context Techniques",
"User Interfaces",
"Transfer Function Design",
"Non Linear Magnification"
],
"authors": [
{
"affiliation": "Department of Computer Science and Engineering, University of Minnesota at Twin Cities",
"fullName": "Xiaoru Yuan",
"givenName": "Xiaoru",
"surname": "Yuan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Engineering, University of Minnesota at Twin Cities",
"fullName": "Minh X. Nguyen",
"givenName": "Minh X.",
"surname": "Nguyen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Minnesota at Twin Cities",
"fullName": "Baoquan Chen",
"givenName": "Baoquan",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Computational Science and Engineering (LCSE), University of Minnesota at Twin Cities",
"fullName": "David H. Porter",
"givenName": "David H.",
"surname": "Porter",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-10-01T00:00:00",
"pubType": "proceedings",
"pages": "42",
"year": "2005",
"issn": null,
"isbn": "0-7803-9462-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01532827",
"articleId": "12OmNCbU35C",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01532828",
"articleId": "12OmNxvwoMs",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vg/2005/26/0/01500529",
"title": "Volume rendering for high dynamic range displays",
"doi": null,
"abstractUrl": "/proceedings-article/vg/2005/01500529/12OmNAkEU5K",
"parentPublication": {
"id": "proceedings/vg/2005/26/0",
"title": "Volume Graphics 2005",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ieee-vis/2005/2766/0/01532812",
"title": "High dynamic range volume visualization",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2005/01532812/12OmNBO3Kih",
"parentPublication": {
"id": "proceedings/ieee-vis/2005/2766/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2008/2174/0/04761893",
"title": "Adaptive local contrast enhancement for the visualization of high dynamic range images",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2008/04761893/12OmNC1Y5iC",
"parentPublication": {
"id": "proceedings/icpr/2008/2174/0",
"title": "ICPR 2008 19th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etvis/2016/4731/0/07851159",
"title": "Gaze-contingent interactive visualization of high-dynamic-range imagery",
"doi": null,
"abstractUrl": "/proceedings-article/etvis/2016/07851159/12OmNqBbHOw",
"parentPublication": {
"id": "proceedings/etvis/2016/4731/0",
"title": "2016 IEEE Second Workshop on Eye Tracking and Visualization (ETVIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2008/3382/1/3382a368",
"title": "Intelligent Focus+Context Volume Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2008/3382a368/12OmNy5R3sk",
"parentPublication": {
"id": "proceedings/isda/2008/3382/1",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2004/2177/0/21770269",
"title": "Two-Channel Technique for High Dynamic Range Image Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2004/21770269/12OmNyo1nMX",
"parentPublication": {
"id": "proceedings/iv/2004/2177/0",
"title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2006/04/v0433",
"title": "HDR VolVis: High Dynamic Range Volume Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2006/04/v0433/13rRUxjQyv7",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvprw/2022/8739/0/873900b182",
"title": "Bidirectional Motion Estimation with Cyclic Cost Volume for High Dynamic Range Imaging",
"doi": null,
"abstractUrl": "/proceedings-article/cvprw/2022/873900b182/1G56AFpQBri",
"parentPublication": {
"id": "proceedings/cvprw/2022/8739/0",
"title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/06/09035636",
"title": "Photographic High-Dynamic-Range Scalar Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2020/06/09035636/1iaeBQ4H756",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdh/2020/9234/0/923400a075",
"title": "A Perception-Based Brightness Segmentation Method of High Dynamic Range Infrared Images",
"doi": null,
"abstractUrl": "/proceedings-article/icdh/2020/923400a075/1uGXWt7RKh2",
"parentPublication": {
"id": "proceedings/icdh/2020/9234/0",
"title": "2020 8th International Conference on Digital Home (ICDH)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCf1Dp1",
"title": "Visualization Conference, IEEE",
"acronym": "ieee-vis",
"groupId": "1000796",
"volume": "0",
"displayVolume": "0",
"year": "2002",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzcxZrN",
"doi": "10.1109/VISUAL.2002.1183781",
"title": "GeneVis: Visualization Tools for Genetic Regulatory Network Dynamics",
"normalizedTitle": "GeneVis: Visualization Tools for Genetic Regulatory Network Dynamics",
"abstract": "GeneVis provides a visual environment for exploring the dynamics of genetic regulatory networks. At present time, genetic regulation is the focus of intensive research worldwide, and computational aids are being called for to help in the research of factors that are difficult to observe directly. GeneVis provides a particle-based simulation of genetic networks and visualizes the process of this simulation as it occurs. Two dynamic visualization techniques are provided, a visualization of the movement of the regulatory proteins and a visualization of the relative concentrations of these proteins. Several interactive tools relate the dynamic visualizations to the underlying genetic network structure.",
"abstracts": [
{
"abstractType": "Regular",
"content": "GeneVis provides a visual environment for exploring the dynamics of genetic regulatory networks. At present time, genetic regulation is the focus of intensive research worldwide, and computational aids are being called for to help in the research of factors that are difficult to observe directly. GeneVis provides a particle-based simulation of genetic networks and visualizes the process of this simulation as it occurs. Two dynamic visualization techniques are provided, a visualization of the movement of the regulatory proteins and a visualization of the relative concentrations of these proteins. Several interactive tools relate the dynamic visualizations to the underlying genetic network structure.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "GeneVis provides a visual environment for exploring the dynamics of genetic regulatory networks. At present time, genetic regulation is the focus of intensive research worldwide, and computational aids are being called for to help in the research of factors that are difficult to observe directly. GeneVis provides a particle-based simulation of genetic networks and visualizes the process of this simulation as it occurs. Two dynamic visualization techniques are provided, a visualization of the movement of the regulatory proteins and a visualization of the relative concentrations of these proteins. Several interactive tools relate the dynamic visualizations to the underlying genetic network structure.",
"fno": "7498baker",
"keywords": [
"Biological Visualization",
"Visualization",
"Multi Representation",
"Genetic Networks",
"Lenses",
"Focus And Context"
],
"authors": [
{
"affiliation": "University of Calgary",
"fullName": "C. A. H. Baker",
"givenName": "C. A. H.",
"surname": "Baker",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Calgary",
"fullName": "M. S. T. Carpendale",
"givenName": "M. S. T.",
"surname": "Carpendale",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Calgary",
"fullName": "P. Prusinkiewicz",
"givenName": "P.",
"surname": "Prusinkiewicz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Calgary",
"fullName": "M. G. Surette",
"givenName": "M. G.",
"surname": "Surette",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ieee-vis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2002-10-01T00:00:00",
"pubType": "proceedings",
"pages": "null",
"year": "2002",
"issn": "1070-2385",
"isbn": "0-7803-7498-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01183804",
"articleId": "12OmNxHryfb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "7498hotz",
"articleId": "12OmNBa2iBY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2011/1799/0/06120435",
"title": "Delay-Dependent Stability for Genetic Regulatory Networks",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2011/06120435/12OmNBBhN5i",
"parentPublication": {
"id": "proceedings/bibm/2011/1799/0",
"title": "2011 IEEE International Conference on Bioinformatics and Biomedicine",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2008/3304/2/3304b527",
"title": "Robust Stability of Stochastic Genetic Regulatory Networks with Time-Varying Delays",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2008/3304b527/12OmNC3Xhwi",
"parentPublication": {
"id": "proceedings/icnc/2008/3304/2",
"title": "2008 Fourth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micai/2006/2722/0/04022167",
"title": "Finding DNA Motifs Using Genetic Algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/micai/2006/04022167/12OmNqGRGgD",
"parentPublication": {
"id": "proceedings/micai/2006/2722/0",
"title": "2006 Fifth Mexican International Conference on Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031f341",
"title": "Modeling Gene Regulatory Network Based on Genetic Programming",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031f341/12OmNwnH4M5",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2006/2602/0/26020089",
"title": "Visualization of Lattice-Based Protein Folding Simulations",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2006/26020089/12OmNy50g5Z",
"parentPublication": {
"id": "proceedings/iv/2006/2602/0",
"title": "Tenth International Conference on Information Visualisation (IV'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2008/02/ttb2008020208",
"title": "Search for Steady States of Piecewise-Linear Differential Equation Models of Genetic Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tb/2008/02/ttb2008020208/13rRUwbs1Zc",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/ex/2002/02/x2037",
"title": "Bayesian Methods for Elucidating Genetic Regulatory Networks",
"doi": null,
"abstractUrl": "/magazine/ex/2002/02/x2037/13rRUwhpBGU",
"parentPublication": {
"id": "mags/ex",
"title": "IEEE Intelligent Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2012/04/06175006",
"title": "Transient Dynamics of Reduced-Order Models of Genetic Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tb/2012/04/06175006/13rRUy3gn5W",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2011/01/ttb2011010253",
"title": "Disturbance Analysis of Nonlinear Differential Equation Models of Genetic SUM Regulatory Networks",
"doi": null,
"abstractUrl": "/journal/tb/2011/01/ttb2011010253/13rRUyuegnA",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2018/06/08335337",
"title": "Robust Gene Circuit Control Design for Time-Delayed Genetic Regulatory Networks Without SUM Regulatory Logic",
"doi": null,
"abstractUrl": "/journal/tb/2018/06/08335337/17D45WaTkgA",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "17D45VtKisB",
"title": "2018 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45XdBRRp",
"doi": "10.1109/BigData.2018.8622443",
"title": "In situ TensorView: In situ Visualization of Convolutional Neural Networks",
"normalizedTitle": "In situ TensorView: In situ Visualization of Convolutional Neural Networks",
"abstract": "Convolutional Neural Networks(CNNs) are complex systems trained to recognize images, texts and more. However, once trained, they are regarded as black-boxes that are not easy to analyze and understand. Visualizing the dynamics within such deep artificial neural networks can provide a better understanding of how they are learning and making predictions. In the field of scientific simulations, visualization tools like Paraview have long been utilized to provide insights. We present in situ TensorView to visualize the training and functioning of CNNs as if they are systems of scientific simulations. In situ TensorView is a loosely coupled in situ visualization open framework that provides multiple viewers with the ability to visualize and understand their networks. It leverages the capability of co-processing from Paraview to provide real-time visualization during training and predicting phases, and avoids heavy I/O overhead. Tensorview is easily coupled with Tensorflow, as it only requires the insertion of a few lines of code into a TensorFlow framework. In this work, we showcase visualizing LeNet-5 and VGG16 using in situ TensorView. With the insight provided by Tensorview, users can adjust network architectures, or compress pre-trained networks guided by visualization results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Convolutional Neural Networks(CNNs) are complex systems trained to recognize images, texts and more. However, once trained, they are regarded as black-boxes that are not easy to analyze and understand. Visualizing the dynamics within such deep artificial neural networks can provide a better understanding of how they are learning and making predictions. In the field of scientific simulations, visualization tools like Paraview have long been utilized to provide insights. We present in situ TensorView to visualize the training and functioning of CNNs as if they are systems of scientific simulations. In situ TensorView is a loosely coupled in situ visualization open framework that provides multiple viewers with the ability to visualize and understand their networks. It leverages the capability of co-processing from Paraview to provide real-time visualization during training and predicting phases, and avoids heavy I/O overhead. Tensorview is easily coupled with Tensorflow, as it only requires the insertion of a few lines of code into a TensorFlow framework. In this work, we showcase visualizing LeNet-5 and VGG16 using in situ TensorView. With the insight provided by Tensorview, users can adjust network architectures, or compress pre-trained networks guided by visualization results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Convolutional Neural Networks(CNNs) are complex systems trained to recognize images, texts and more. However, once trained, they are regarded as black-boxes that are not easy to analyze and understand. Visualizing the dynamics within such deep artificial neural networks can provide a better understanding of how they are learning and making predictions. In the field of scientific simulations, visualization tools like Paraview have long been utilized to provide insights. We present in situ TensorView to visualize the training and functioning of CNNs as if they are systems of scientific simulations. In situ TensorView is a loosely coupled in situ visualization open framework that provides multiple viewers with the ability to visualize and understand their networks. It leverages the capability of co-processing from Paraview to provide real-time visualization during training and predicting phases, and avoids heavy I/O overhead. Tensorview is easily coupled with Tensorflow, as it only requires the insertion of a few lines of code into a TensorFlow framework. In this work, we showcase visualizing LeNet-5 and VGG16 using in situ TensorView. With the insight provided by Tensorview, users can adjust network architectures, or compress pre-trained networks guided by visualization results.",
"fno": "08622443",
"keywords": [
"Deep Neural Networks",
"Neural Network Compression",
"Online Pruning"
],
"authors": [
{
"affiliation": "University of New Mexico",
"fullName": "Xinyu Chen",
"givenName": "Xinyu",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Kent State University",
"fullName": "Qiang Guan",
"givenName": "Qiang",
"surname": "Guan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Los Alamos National Laboratory",
"fullName": "Li-Ta Lo",
"givenName": "Li-Ta",
"surname": "Lo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "US Army Research Laboratory",
"fullName": "Simon Su",
"givenName": "Simon",
"surname": "Su",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Kent State University",
"fullName": "Zhengyong Ren",
"givenName": "Zhengyong",
"surname": "Ren",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Los Alamos National Laboratory",
"fullName": "James Paul Ahrens",
"givenName": "James Paul",
"surname": "Ahrens",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of New Mexico",
"fullName": "Trilce Estrada",
"givenName": "Trilce",
"surname": "Estrada",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1899-1904",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-5035-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08622197",
"articleId": "17D45XoXP3P",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08622073",
"articleId": "17D45Wda7es",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ldav/2011/0155/0/06092322",
"title": "The ParaView Coprocessing Library: A scalable, general purpose in situ visualization library",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2011/06092322/12OmNAGNCeu",
"parentPublication": {
"id": "proceedings/ldav/2011/0155/0",
"title": "IEEE Symposium on Large Data Analysis and Visualization (LDAV 2011)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2014/5666/0/07004275",
"title": "In-situ visualization and computational steering for large-scale simulation of turbulent flows in complex geometries",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2014/07004275/12OmNrMHOiY",
"parentPublication": {
"id": "proceedings/big-data/2014/5666/0",
"title": "2014 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2016/02/mcg2016020005",
"title": "The Tensions of In Situ Visualization",
"doi": null,
"abstractUrl": "/magazine/cg/2016/02/mcg2016020005/13rRUILLkIJ",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2018/01/mcg2018010119",
"title": "Optimizing Scientist Time through In Situ Visualization and Analysis",
"doi": null,
"abstractUrl": "/magazine/cg/2018/01/mcg2018010119/13rRUwciPhU",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2010/03/mcg2010030045",
"title": "In Situ Visualization for Large-Scale Combustion Simulations",
"doi": null,
"abstractUrl": "/magazine/cg/2010/03/mcg2010030045/13rRUxBa5em",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2022/8106/0/810600a538",
"title": "Colza: Enabling Elastic In Situ Visualization for High-performance Computing Simulations",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2022/810600a538/1F1W9cR1VcI",
"parentPublication": {
"id": "proceedings/ipdps/2022/8106/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2022/9156/0/09966405",
"title": "Distributed Volumetric Neural Representation for in situ Visualization and Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2022/09966405/1IT0AinAyL6",
"parentPublication": {
"id": "proceedings/ldav/2022/9156/0",
"title": "2022 IEEE 12th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ldav/2019/2605/0/08944265",
"title": "Low-Overhead In Situ Visualization Using Halo Replay",
"doi": null,
"abstractUrl": "/proceedings-article/ldav/2019/08944265/1grOFpiaovK",
"parentPublication": {
"id": "proceedings/ldav/2019/2605/0",
"title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2020/6876/0/09139783",
"title": "ETH: An Architecture for Exploring the Design Space of In-situ Scientific Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2020/09139783/1lss5XSR3i0",
"parentPublication": {
"id": "proceedings/ipdps/2020/6876/0",
"title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cs/2021/03/09388894",
"title": "<italic>In Situ</italic> Visualization With Temporal Caching",
"doi": null,
"abstractUrl": "/magazine/cs/2021/03/09388894/1smZR2zRFyo",
"parentPublication": {
"id": "mags/cs",
"title": "Computing in Science & Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBKW9yF",
"title": "Proceedings 41st Annual Symposium on Foundations of Computer Science",
"acronym": "focs",
"groupId": "1000292",
"volume": "0",
"displayVolume": "0",
"year": "2000",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBkfRl1",
"doi": "10.1109/SFCS.2000.892065",
"title": "Stochastic models for the Web graph",
"normalizedTitle": "Stochastic models for the Web graph",
"abstract": "The Web may be viewed as a directed graph each of whose vertices is a static HTML Web page, and each of whose edges corresponds to a hyperlink from one Web page to another. We propose and analyze random graph models inspired by a series of empirical observations on the Web. Our graph models differ from the traditional G/sub n,p/ models in two ways: 1. Independently chosen edges do not result in the statistics (degree distributions, clique multitudes) observed on the Web. Thus, edges in our model are statistically dependent on each other. 2. Our model introduces new vertices in the graph as time evolves. This captures the fact that the Web is changing with time. Our results are two fold: we show that graphs generated using our model exhibit the statistics observed on the Web graph, and additionally, that natural graph models proposed earlier do not exhibit them. This remains true even when these earlier models are generalized to account for the arrival of vertices over time. In particular, the sparse random graphs in our models exhibit properties that do not arise in far denser random graphs generated by Erdos-Renyi models.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The Web may be viewed as a directed graph each of whose vertices is a static HTML Web page, and each of whose edges corresponds to a hyperlink from one Web page to another. We propose and analyze random graph models inspired by a series of empirical observations on the Web. Our graph models differ from the traditional G/sub n,p/ models in two ways: 1. Independently chosen edges do not result in the statistics (degree distributions, clique multitudes) observed on the Web. Thus, edges in our model are statistically dependent on each other. 2. Our model introduces new vertices in the graph as time evolves. This captures the fact that the Web is changing with time. Our results are two fold: we show that graphs generated using our model exhibit the statistics observed on the Web graph, and additionally, that natural graph models proposed earlier do not exhibit them. This remains true even when these earlier models are generalized to account for the arrival of vertices over time. In particular, the sparse random graphs in our models exhibit properties that do not arise in far denser random graphs generated by Erdos-Renyi models.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The Web may be viewed as a directed graph each of whose vertices is a static HTML Web page, and each of whose edges corresponds to a hyperlink from one Web page to another. We propose and analyze random graph models inspired by a series of empirical observations on the Web. Our graph models differ from the traditional G/sub n,p/ models in two ways: 1. Independently chosen edges do not result in the statistics (degree distributions, clique multitudes) observed on the Web. Thus, edges in our model are statistically dependent on each other. 2. Our model introduces new vertices in the graph as time evolves. This captures the fact that the Web is changing with time. Our results are two fold: we show that graphs generated using our model exhibit the statistics observed on the Web graph, and additionally, that natural graph models proposed earlier do not exhibit them. This remains true even when these earlier models are generalized to account for the arrival of vertices over time. In particular, the sparse random graphs in our models exhibit properties that do not arise in far denser random graphs generated by Erdos-Renyi models.",
"fno": "08500057",
"keywords": [
"Directed Graphs Random Processes Information Resources Stochastic Processes Stochastic Models Web Graph Directed Graph Static HTML Web Page Hyperlink Random Graph Model Statistics Vertices Sparse Random Graphs Erdos Renyi Models"
],
"authors": [
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "R. Kumar",
"givenName": "R.",
"surname": "Kumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "P. Raghavan",
"givenName": "P.",
"surname": "Raghavan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "S. Rajagopalan",
"givenName": "S.",
"surname": "Rajagopalan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "D. Sivakumar",
"givenName": "D.",
"surname": "Sivakumar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "A. Tomkins",
"givenName": "A.",
"surname": "Tomkins",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "IBM Almaden Res. Center, San Jose, CA, USA",
"fullName": "E. Upfal",
"givenName": "E.",
"surname": "Upfal",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "focs",
"isOpenAccess": false,
"showRecommendedArticles": false,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2000-11-01T00:00:00",
"pubType": "proceedings",
"pages": "57",
"year": "2000",
"issn": "0272-5428",
"isbn": "0-7695-0850-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08500043",
"articleId": "12OmNrMHOfT",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08500066",
"articleId": "12OmNwtEEC6",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqH9hns",
"title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"acronym": "cluster",
"groupId": "1000095",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzWfoT6",
"doi": "10.1109/CLUSTER.2017.44",
"title": "OmniGraph: A Scalable Hardware Accelerator for Graph Processing",
"normalizedTitle": "OmniGraph: A Scalable Hardware Accelerator for Graph Processing",
"abstract": "Large-scale graphs processing attracts more and more attentions, and it has been widely applied in many application domains. FPGA is a promising platform to implement graph processing algorithms with high power-efficiency and parallelism. In this paper, we propose OmniGraph, a scalable hardware accelerator for graph processing. OmniGraph can process graphs with different sizes adaptively and is adaptable to various graph algorithms. OmniGraph improves the preprocessing methodology based on Interval-Shard and consists of three computation engines, vertices on-chip && edges on-chip engine, vertices on-chip && edges off-chip engine, and vertices off-chip && edges off-chip engine. Experimental results on the state-of-the-art Xilinx Virtex-7 board demonstrate that case studies in OmniGraph achieve 1.03x-8.13x average speedup comparing to GraphChi on Intel core2 processors.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Large-scale graphs processing attracts more and more attentions, and it has been widely applied in many application domains. FPGA is a promising platform to implement graph processing algorithms with high power-efficiency and parallelism. In this paper, we propose OmniGraph, a scalable hardware accelerator for graph processing. OmniGraph can process graphs with different sizes adaptively and is adaptable to various graph algorithms. OmniGraph improves the preprocessing methodology based on Interval-Shard and consists of three computation engines, vertices on-chip && edges on-chip engine, vertices on-chip && edges off-chip engine, and vertices off-chip && edges off-chip engine. Experimental results on the state-of-the-art Xilinx Virtex-7 board demonstrate that case studies in OmniGraph achieve 1.03x-8.13x average speedup comparing to GraphChi on Intel core2 processors.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Large-scale graphs processing attracts more and more attentions, and it has been widely applied in many application domains. FPGA is a promising platform to implement graph processing algorithms with high power-efficiency and parallelism. In this paper, we propose OmniGraph, a scalable hardware accelerator for graph processing. OmniGraph can process graphs with different sizes adaptively and is adaptable to various graph algorithms. OmniGraph improves the preprocessing methodology based on Interval-Shard and consists of three computation engines, vertices on-chip && edges on-chip engine, vertices on-chip && edges off-chip engine, and vertices off-chip && edges off-chip engine. Experimental results on the state-of-the-art Xilinx Virtex-7 board demonstrate that case studies in OmniGraph achieve 1.03x-8.13x average speedup comparing to GraphChi on Intel core2 processors.",
"fno": "2326a623",
"keywords": [
"Engines",
"System On Chip",
"Hardware",
"Field Programmable Gate Arrays",
"Program Processors",
"Big Data",
"Systems Architecture"
],
"authors": [
{
"affiliation": null,
"fullName": "Chongchong Xu",
"givenName": "Chongchong",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chao Wang",
"givenName": "Chao",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lei Gong",
"givenName": "Lei",
"surname": "Gong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yuntao Lu",
"givenName": "Yuntao",
"surname": "Lu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fan Sun",
"givenName": "Fan",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yiwei Zhang",
"givenName": "Yiwei",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xi Li",
"givenName": "Xi",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xuehai Zhou",
"givenName": "Xuehai",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cluster",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-09-01T00:00:00",
"pubType": "proceedings",
"pages": "623-624",
"year": "2017",
"issn": "2168-9253",
"isbn": "978-1-5386-2326-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "2326a621",
"articleId": "12OmNzWfoX9",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "2326a625",
"articleId": "12OmNwLOYVR",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hpcc-css-icess/2015/8937/0/07336180",
"title": "Addressing Memory Wall Problem of Graph Computation in Reconfigurable System",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-css-icess/2015/07336180/12OmNANkofa",
"parentPublication": {
"id": "proceedings/hpcc-css-icess/2015/8937/0",
"title": "2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS) and 2015 IEEE 12th International Conf on Embedded Software and Systems (ICESS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccgrid/2017/6611/0/07973769",
"title": "TuNao: A High-Performance and Energy-Efficient Reconfigurable Accelerator for Graph Processing",
"doi": null,
"abstractUrl": "/proceedings-article/ccgrid/2017/07973769/12OmNC8Msyq",
"parentPublication": {
"id": "proceedings/ccgrid/2017/6611/0",
"title": "2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccd/2013/2987/0/06657039",
"title": "Accelerator-rich CMPs: From concept to real hardware",
"doi": null,
"abstractUrl": "/proceedings-article/iccd/2013/06657039/12OmNz6iOqZ",
"parentPublication": {
"id": "proceedings/iccd/2013/2987/0",
"title": "2013 IEEE 31st International Conference on Computer Design (ICCD)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/2015/06/06891374",
"title": "MAHA: An Energy-Efficient Malleable Hardware Accelerator for Data-Intensive Applications",
"doi": null,
"abstractUrl": "/journal/si/2015/06/06891374/13rRUIJcWuy",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/si/2012/05/05740396",
"title": "A Scalable High-Performance Virus Detection Processor against a Large Pattern Set for Embedded Network Security",
"doi": null,
"abstractUrl": "/journal/si/2012/05/05740396/13rRUwvT9el",
"parentPublication": {
"id": "trans/si",
"title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icws/2018/7247/0/724701a274",
"title": "Domino: Graph Processing Services on Energy-Efficient Hardware Accelerator",
"doi": null,
"abstractUrl": "/proceedings-article/icws/2018/724701a274/13rRUxYrbIa",
"parentPublication": {
"id": "proceedings/icws/2018/7247/0",
"title": "2018 IEEE International Conference on Web Services (ICWS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iiswc/2018/6780/0/08573480",
"title": "Heterogeneous Memory Subsystem for Natural Graph Analytics",
"doi": null,
"abstractUrl": "/proceedings-article/iiswc/2018/08573480/17D45WrVg6D",
"parentPublication": {
"id": "proceedings/iiswc/2018/6780/0",
"title": "2018 IEEE International Symposium on Workload Characterization (IISWC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cool-chips/2018/6103/0/08373076",
"title": "XNORBIN: A 95 TOp/s/W hardware accelerator for binary convolutional neural networks",
"doi": null,
"abstractUrl": "/proceedings-article/cool-chips/2018/08373076/17D45XvMcau",
"parentPublication": {
"id": "proceedings/cool-chips/2018/6103/0",
"title": "2018 IEEE Symposium in Low-Power and High-Speed Chips (COOL CHIPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fccm/2022/8332/0/09786209",
"title": "TopSort: A High-Performance Two-Phase Sorting Accelerator Optimized on HBM-based FPGAs",
"doi": null,
"abstractUrl": "/proceedings-article/fccm/2022/09786209/1DUdRBsfmdq",
"parentPublication": {
"id": "proceedings/fccm/2022/8332/0",
"title": "2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpca/2022/2027/0/202700a199",
"title": "ScalaGraph: A Scalable Accelerator for Massively Parallel Graph Processing",
"doi": null,
"abstractUrl": "/proceedings-article/hpca/2022/202700a199/1Ds0egSn2s8",
"parentPublication": {
"id": "proceedings/hpca/2022/2027/0",
"title": "2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1rSR7vfukX6",
"title": "2020 24th International Conference Information Visualisation (IV)",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1rSR9vG2u4w",
"doi": "10.1109/IV51561.2020.00048",
"title": "Time-Aligned Edge Plots for Dynamic Graph Visualization",
"normalizedTitle": "Time-Aligned Edge Plots for Dynamic Graph Visualization",
"abstract": "We present time-aligned edge plots: time- and edge-scalable representations of dynamic graphs. Vertices are mapped to two vertical parallel axes. The left axis depicts the source vertices, whereas the right one depicts the destination vertices. The time axis is horizontally embedded in-between the two axes, resulting in a two-dimensional graph layout. Edges are added by drawing straight lines connecting the corresponding source and destination vertices through time, while the pixels along the lines are used to encode the time-varying information. In this way, the depiction of edges at the individual timepoints is reduced to only a few pixels, resulting in a less cluttered representation of dynamic graphs, while the alignment of edges over time reveals the temporal patterns in the data and preserves the users' mental map. We evaluate our approach by comparing it theoretically and empirically against the state-of-the-art using dynamic graphs of varying complexities.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present time-aligned edge plots: time- and edge-scalable representations of dynamic graphs. Vertices are mapped to two vertical parallel axes. The left axis depicts the source vertices, whereas the right one depicts the destination vertices. The time axis is horizontally embedded in-between the two axes, resulting in a two-dimensional graph layout. Edges are added by drawing straight lines connecting the corresponding source and destination vertices through time, while the pixels along the lines are used to encode the time-varying information. In this way, the depiction of edges at the individual timepoints is reduced to only a few pixels, resulting in a less cluttered representation of dynamic graphs, while the alignment of edges over time reveals the temporal patterns in the data and preserves the users' mental map. We evaluate our approach by comparing it theoretically and empirically against the state-of-the-art using dynamic graphs of varying complexities.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present time-aligned edge plots: time- and edge-scalable representations of dynamic graphs. Vertices are mapped to two vertical parallel axes. The left axis depicts the source vertices, whereas the right one depicts the destination vertices. The time axis is horizontally embedded in-between the two axes, resulting in a two-dimensional graph layout. Edges are added by drawing straight lines connecting the corresponding source and destination vertices through time, while the pixels along the lines are used to encode the time-varying information. In this way, the depiction of edges at the individual timepoints is reduced to only a few pixels, resulting in a less cluttered representation of dynamic graphs, while the alignment of edges over time reveals the temporal patterns in the data and preserves the users' mental map. We evaluate our approach by comparing it theoretically and empirically against the state-of-the-art using dynamic graphs of varying complexities.",
"fno": "913400a248",
"keywords": [
"Data Visualisation",
"Graph Theory",
"Edge Scalable Representations",
"Dynamic Graphs",
"Vertical Parallel Axes",
"Source Vertices",
"Destination Vertices",
"Time Axis",
"Two Dimensional Graph Layout",
"Time Varying Information",
"Time Aligned Edge Plots",
"Dynamic Graph Visualization",
"Layout",
"Data Visualization",
"Complexity Theory",
"Clutter",
"Visualization",
"Dynamic Graphs",
"Time Scalability",
"Visual Clutter"
],
"authors": [
{
"affiliation": "University of Stuttgart,VISUS,Germany",
"fullName": "Moataz Abdelaal",
"givenName": "Moataz",
"surname": "Abdelaal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Stuttgart,VISUS,Germany",
"fullName": "Antoine Lhuillier",
"givenName": "Antoine",
"surname": "Lhuillier",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Stuttgart,VISUS,Germany",
"fullName": "Marcel Hlawatsch",
"givenName": "Marcel",
"surname": "Hlawatsch",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Stuttgart,VISUS,Germany",
"fullName": "Daniel Weiskopf",
"givenName": "Daniel",
"surname": "Weiskopf",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-09-01T00:00:00",
"pubType": "proceedings",
"pages": "248-257",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9134-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "913400a242",
"articleId": "1rSRaQV3b3y",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "913400a258",
"articleId": "1rSRebcByKs",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/iv/2010/7846/0/05571226",
"title": "An Application of Edge Bundling Techniques to the Visualization of Media Analysis Results",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2010/05571226/12OmNAThXUv",
"parentPublication": {
"id": "proceedings/iv/2010/7846/0",
"title": "2010 14th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2010/7846/0/05571244",
"title": "3D Edge Bundling for Geographical Data Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2010/05571244/12OmNqzu6LL",
"parentPublication": {
"id": "proceedings/iv/2010/7846/0",
"title": "2010 14th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2013/4797/0/06596146",
"title": "Visualizing edge-edge relations in graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2013/06596146/12OmNzsJ7ya",
"parentPublication": {
"id": "proceedings/pacificvis/2013/4797/0",
"title": "2013 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2008/06/ttg2008061277",
"title": "Geometry-Based Edge Clustering for Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2008/06/ttg2008061277/13rRUNvyakF",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122344",
"title": "Parallel Edge Splatting for Scalable Dynamic Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122344/13rRUwIF6dM",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2017/01/07539373",
"title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2012/05/ttg2012050810",
"title": "Ambiguity-Free Edge-Bundling for Interactive Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2012/05/ttg2012050810/13rRUxASuby",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122364",
"title": "Skeleton-Based Edge Bundling for Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122364/13rRUxjyX3W",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/10/08673661",
"title": "Eiffel: Evolutionary Flow Map for Influence Graph Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2020/10/08673661/18LF7Q1L3na",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2020/5697/0/09086283",
"title": "Dynamic Graph Map Animation",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2020/09086283/1kuHn9E2jSg",
"parentPublication": {
"id": "proceedings/pacificvis/2020/5697/0",
"title": "2020 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1pZ0TbXJiBq",
"title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)",
"acronym": "ldav",
"groupId": "1800568",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1pZ0Ti8Eb4s",
"doi": "10.1109/LDAV51489.2020.00013",
"title": "A Distributed Algorithm for Force Directed Edge Bundling",
"normalizedTitle": "A Distributed Algorithm for Force Directed Edge Bundling",
"abstract": "Existing edge bundling algorithms typically require the global information structure of a graph. Therefore, with a simple division of the edges of a graph, it is challenging to conduct edge bundling in a distributed environment and achieve scalable performance. We select a representative edge bundling algorithm, Force-Directed Edge Bundling (FDEB), and parallelize it in a distributed environment. Particularly, to address the difficulties of partitioning and distributions of a large graph among processors, we first create a high dimensional space to represent the data distribution of a graph in FDEB. Second, we map each edge as a data point in this high dimensional space, and then partition and distribute the point cloud among processors. In this way, we can significantly reduce the data communication across processors, and ensure each processor assigned with a similar workload.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Existing edge bundling algorithms typically require the global information structure of a graph. Therefore, with a simple division of the edges of a graph, it is challenging to conduct edge bundling in a distributed environment and achieve scalable performance. We select a representative edge bundling algorithm, Force-Directed Edge Bundling (FDEB), and parallelize it in a distributed environment. Particularly, to address the difficulties of partitioning and distributions of a large graph among processors, we first create a high dimensional space to represent the data distribution of a graph in FDEB. Second, we map each edge as a data point in this high dimensional space, and then partition and distribute the point cloud among processors. In this way, we can significantly reduce the data communication across processors, and ensure each processor assigned with a similar workload.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Existing edge bundling algorithms typically require the global information structure of a graph. Therefore, with a simple division of the edges of a graph, it is challenging to conduct edge bundling in a distributed environment and achieve scalable performance. We select a representative edge bundling algorithm, Force-Directed Edge Bundling (FDEB), and parallelize it in a distributed environment. Particularly, to address the difficulties of partitioning and distributions of a large graph among processors, we first create a high dimensional space to represent the data distribution of a graph in FDEB. Second, we map each edge as a data point in this high dimensional space, and then partition and distribute the point cloud among processors. In this way, we can significantly reduce the data communication across processors, and ensure each processor assigned with a similar workload.",
"fno": "846800a053",
"keywords": [
"Computational Complexity",
"Data Visualisation",
"Graph Theory",
"Multimedia Computing",
"Parallel Processing",
"Force Directed Edge Bundling",
"FDEB",
"Distributed Environment",
"Processors",
"High Dimensional Space",
"Data Distribution",
"Distributed Algorithm",
"Force Directed Edge",
"Edge Bundling Algorithms",
"Global Information Structure",
"Simple Division",
"Scalable Performance",
"Representative Edge Bundling Algorithm",
"Two Dimensional Displays",
"Graphics Processing Units",
"Data Visualization",
"Scalability",
"Extraterrestrial Measurements",
"Distributed Databases",
"Visualization",
"Human Centered Computing",
"Visualization",
"Visu Alization Techniques",
"Graph Drawings"
],
"authors": [
{
"affiliation": "University of Nebraska-Lincoln",
"fullName": "Yves Tuyishime",
"givenName": "Yves",
"surname": "Tuyishime",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Nebraska-Lincoln",
"fullName": "Yu Pan",
"givenName": "Yu",
"surname": "Pan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Nebraska-Lincoln",
"fullName": "Hongfeng Yu",
"givenName": "Hongfeng",
"surname": "Yu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ldav",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-10-01T00:00:00",
"pubType": "proceedings",
"pages": "53-54",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-8468-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "846800a042",
"articleId": "1pZ0TM9iMHm",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "846800a055",
"articleId": "1pZ0Tt4cGys",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/pacificvis/2016/1451/0/07465267",
"title": "Multilayer graph edge bundling",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2016/07465267/12OmNCbCrKh",
"parentPublication": {
"id": "proceedings/pacificvis/2016/1451/0",
"title": "2016 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2015/9926/0/07364046",
"title": "Texture-based edge bundling: A web-based approach for interactively visualizing large graphs",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2015/07364046/12OmNro0Idz",
"parentPublication": {
"id": "proceedings/big-data/2015/9926/0",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2012/4818/0/4818a052",
"title": "Parallelized Force-Directed Edge Bundling on the GPU",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2012/4818a052/12OmNvxbhO5",
"parentPublication": {
"id": "proceedings/dcabes/2012/4818/0",
"title": "2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2011/935/0/05742389",
"title": "Multilevel agglomerative edge bundling for visualizing large graphs",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y",
"parentPublication": {
"id": "proceedings/pacificvis/2011/935/0",
"title": "2011 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2013/5049/0/5049a028",
"title": "Edge Bundling by Rapidly-Exploring Random Trees",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2013/5049a028/12OmNz5s0F9",
"parentPublication": {
"id": "proceedings/iv/2013/5049/0",
"title": "2013 17th International Conference on Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2017/5738/0/08031594",
"title": "FFTEB: Edge bundling of huge graphs by the Fast Fourier Transform",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2017/08031594/12OmNzuZUEs",
"parentPublication": {
"id": "proceedings/pacificvis/2017/5738/0",
"title": "2017 IEEE Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2016/8942/0/8942a094",
"title": "On Edge Bundling and Node Layout for Mutually Connected Directed Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2016/8942a094/12OmNzwZ6qg",
"parentPublication": {
"id": "proceedings/iv/2016/8942/0",
"title": "2016 20th International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122354",
"title": "Divided Edge Bundling for Directional Network Data",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122354/13rRUzpzeB1",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2020/01/08807234",
"title": "Interactive Structure-aware Blending of Diverse Edge Bundling Visualizations",
"doi": null,
"abstractUrl": "/journal/tg/2020/01/08807234/1cG6kigQUVO",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2022/01/09552919",
"title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach",
"doi": null,
"abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvs4vpC",
"title": "2011 IEEE International Symposium on Multimedia",
"acronym": "ism",
"groupId": "1001094",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAR1aSD",
"doi": "10.1109/ISM.2011.27",
"title": "Automatic Bird Species Identification for Large Number of Species",
"normalizedTitle": "Automatic Bird Species Identification for Large Number of Species",
"abstract": "In this paper we focus on the automatic identification of bird species from their audio recorded song. Bird monitoring is important to perform several tasks, such as to evaluate the quality of their living environment or to monitor dangerous situations to planes caused by birds near airports. We deal with the bird species identification problem using signal processing and machine learning techniques. First, features are extracted from the bird recorded songs using specific audio treatment, next the problem is performed according to a classical machine learning scenario, where a labeled database of previously known bird songs are employed to create a decision procedure that is used to predict the species of a new bird song. Experiments are conducted in a dataset of recorded songs of bird species which appear in a specific region. The experimental results compare the performance obtained in different situations, encompassing the complete audio signals, as recorded in the field, and short audio segments (pulses) obtained from the signals by a split procedure. The influence of the number of classes (bird species) in the identification accuracy is also evaluated.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper we focus on the automatic identification of bird species from their audio recorded song. Bird monitoring is important to perform several tasks, such as to evaluate the quality of their living environment or to monitor dangerous situations to planes caused by birds near airports. We deal with the bird species identification problem using signal processing and machine learning techniques. First, features are extracted from the bird recorded songs using specific audio treatment, next the problem is performed according to a classical machine learning scenario, where a labeled database of previously known bird songs are employed to create a decision procedure that is used to predict the species of a new bird song. Experiments are conducted in a dataset of recorded songs of bird species which appear in a specific region. The experimental results compare the performance obtained in different situations, encompassing the complete audio signals, as recorded in the field, and short audio segments (pulses) obtained from the signals by a split procedure. The influence of the number of classes (bird species) in the identification accuracy is also evaluated.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper we focus on the automatic identification of bird species from their audio recorded song. Bird monitoring is important to perform several tasks, such as to evaluate the quality of their living environment or to monitor dangerous situations to planes caused by birds near airports. We deal with the bird species identification problem using signal processing and machine learning techniques. First, features are extracted from the bird recorded songs using specific audio treatment, next the problem is performed according to a classical machine learning scenario, where a labeled database of previously known bird songs are employed to create a decision procedure that is used to predict the species of a new bird song. Experiments are conducted in a dataset of recorded songs of bird species which appear in a specific region. The experimental results compare the performance obtained in different situations, encompassing the complete audio signals, as recorded in the field, and short audio segments (pulses) obtained from the signals by a split procedure. The influence of the number of classes (bird species) in the identification accuracy is also evaluated.",
"fno": "4589a117",
"keywords": [
"Signal Processing",
"Pattern Recognition",
"Machine Learning",
"Bird Species Identification"
],
"authors": [
{
"affiliation": null,
"fullName": "Marcelo T. Lopes",
"givenName": "Marcelo T.",
"surname": "Lopes",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lucas L. Gioppo",
"givenName": "Lucas L.",
"surname": "Gioppo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Thiago T. Higushi",
"givenName": "Thiago T.",
"surname": "Higushi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Celso A.A. Kaestner",
"givenName": "Celso A.A.",
"surname": "Kaestner",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Carlos N. Silla Jr.",
"givenName": "Carlos N.",
"surname": "Silla Jr.",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Alessandro L. Koerich",
"givenName": "Alessandro L.",
"surname": "Koerich",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ism",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "117-122",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4589-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4589a111",
"articleId": "12OmNyKrH6F",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4589a123",
"articleId": "12OmNz4BdtY",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/lcn/2008/2412/0/04664273",
"title": "Demonstration of bird species detection using an acoustic wireless sensor network",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2008/04664273/12OmNAOsMMy",
"parentPublication": {
"id": "proceedings/lcn/2008/2412/0",
"title": "2008 33rd IEEE Conference on Local Computer Networks (LCN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2014/4311/0/4311a223",
"title": "Automatic Segmentation of Audio Signals for Bird Species Identification",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2014/4311a223/12OmNqG0SON",
"parentPublication": {
"id": "proceedings/ism/2014/4311/0",
"title": "2014 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a024",
"title": "Spectral Noise Gate Technique Applied to Birdsong Preprocessing on Embedded Unit",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a024/12OmNrJiCOF",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wowmom/2011/0352/0/05986215",
"title": "Acoustic scheme to count bird songs with wireless sensor networks",
"doi": null,
"abstractUrl": "/proceedings-article/wowmom/2011/05986215/12OmNwF0BLA",
"parentPublication": {
"id": "proceedings/wowmom/2011/0352/0",
"title": "2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a051",
"title": "Audio Classification of Bird Species: A Statistical Manifold Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a051/12OmNwc3wwC",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607576",
"title": "Bird species identification based on timbre and pitch features",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607576/12OmNwcl7Fu",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2009/3926/0/3926a053",
"title": "A Syllable-Level Probabilistic Framework for Bird Species Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2009/3926a053/12OmNxYtu8y",
"parentPublication": {
"id": "proceedings/icmla/2009/3926/0",
"title": "Machine Learning and Applications, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2016/1269/0/07759992",
"title": "Identification of bird species from their singing",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2016/07759992/12OmNxwENpm",
"parentPublication": {
"id": "proceedings/iciev/2016/1269/0",
"title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicic/2007/2882/0/28820143",
"title": "Bird Species Recognition by Comparing the HMMs of the Syllables",
"doi": null,
"abstractUrl": "/proceedings-article/icicic/2007/28820143/12OmNzmtWv2",
"parentPublication": {
"id": "proceedings/icicic/2007/2882/0",
"title": "2007 Second International Conference on Innovative Computing, Information and Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzBOhWk",
"title": "2010 IEEE International Conference on Data Mining",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCbU2SG",
"doi": "10.1109/ICDM.2010.103",
"title": "Modeling Experts and Novices in Citizen Science Data for Species Distribution Modeling",
"normalizedTitle": "Modeling Experts and Novices in Citizen Science Data for Species Distribution Modeling",
"abstract": "Citizen scientists, who are volunteers from the community that participate as field assistants in scientific studies [3], enable research to be performed at much larger spatial and temporal scales than trained scientists can cover. Species distribution modeling [6], which involves understanding species-habitat relationships, is a research area that can benefit greatly from citizen science. The eBird project [16] is one of the largest citizen science programs in existence. By allowing birders to upload observations of bird species to an online database, eBird can provide useful data for species distribution modeling. However, since birders vary in their levels of expertise, the quality of data submitted to eBird is often questioned. In this paper, we develop a probabilistic model called the Occupancy-Detection-Expertise (ODE) model that incorporates the expertise of birders submitting data to eBird. We show that modeling the expertise of birders can improve the accuracy of predicting observations of a bird species at a site. In addition, we can use the ODE model for two other tasks: predicting birder expertise given their history of eBird checklists and identifying bird species that are difficult for novices to detect.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Citizen scientists, who are volunteers from the community that participate as field assistants in scientific studies [3], enable research to be performed at much larger spatial and temporal scales than trained scientists can cover. Species distribution modeling [6], which involves understanding species-habitat relationships, is a research area that can benefit greatly from citizen science. The eBird project [16] is one of the largest citizen science programs in existence. By allowing birders to upload observations of bird species to an online database, eBird can provide useful data for species distribution modeling. However, since birders vary in their levels of expertise, the quality of data submitted to eBird is often questioned. In this paper, we develop a probabilistic model called the Occupancy-Detection-Expertise (ODE) model that incorporates the expertise of birders submitting data to eBird. We show that modeling the expertise of birders can improve the accuracy of predicting observations of a bird species at a site. In addition, we can use the ODE model for two other tasks: predicting birder expertise given their history of eBird checklists and identifying bird species that are difficult for novices to detect.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Citizen scientists, who are volunteers from the community that participate as field assistants in scientific studies [3], enable research to be performed at much larger spatial and temporal scales than trained scientists can cover. Species distribution modeling [6], which involves understanding species-habitat relationships, is a research area that can benefit greatly from citizen science. The eBird project [16] is one of the largest citizen science programs in existence. By allowing birders to upload observations of bird species to an online database, eBird can provide useful data for species distribution modeling. However, since birders vary in their levels of expertise, the quality of data submitted to eBird is often questioned. In this paper, we develop a probabilistic model called the Occupancy-Detection-Expertise (ODE) model that incorporates the expertise of birders submitting data to eBird. We show that modeling the expertise of birders can improve the accuracy of predicting observations of a bird species at a site. In addition, we can use the ODE model for two other tasks: predicting birder expertise given their history of eBird checklists and identifying bird species that are difficult for novices to detect.",
"fno": "4256b157",
"keywords": [
"Applications",
"Species Distribution Modeling",
"Citizen Science",
"Graphical Models",
"Contrast Mining"
],
"authors": [
{
"affiliation": null,
"fullName": "Jun Yu",
"givenName": "Jun",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Weng-Keen Wong",
"givenName": "Weng-Keen",
"surname": "Wong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rebecca A. Hutchinson",
"givenName": "Rebecca A.",
"surname": "Hutchinson",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1157-1162",
"year": "2010",
"issn": "1550-4786",
"isbn": "978-0-7695-4256-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4256b151",
"articleId": "12OmNBgz4A0",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4256b163",
"articleId": "12OmNwkzuvk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ism/2011/4589/0/4589a117",
"title": "Automatic Bird Species Identification for Large Number of Species",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a117/12OmNAR1aSD",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esciencew/2011/4598/0/4598a020",
"title": "Emergent Filters: Automated Data Verification in a Large-Scale Citizen Science Project",
"doi": null,
"abstractUrl": "/proceedings-article/esciencew/2011/4598a020/12OmNvA1he6",
"parentPublication": {
"id": "proceedings/esciencew/2011/4598/0",
"title": "e-Science Workshops, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dexa/2009/3763/0/3763a345",
"title": "Information Visualization and Organization for Participatory Monitoring of Invasive Alien Species",
"doi": null,
"abstractUrl": "/proceedings-article/dexa/2009/3763a345/12OmNvmG81g",
"parentPublication": {
"id": "proceedings/dexa/2009/3763/0",
"title": "2009 20th International Workshop on Database and Expert Systems Application. DEXA 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/2013/4892/0/4892a450",
"title": "Motivation and Data Quality in a Citizen Science Game: A Design Science Evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/2013/4892a450/12OmNvxKu0w",
"parentPublication": {
"id": "proceedings/hicss/2013/4892/0",
"title": "2013 46th Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esciencew/2011/4598/0/4598a014",
"title": "Mechanisms for Data Quality and Validation in Citizen Science",
"doi": null,
"abstractUrl": "/proceedings-article/esciencew/2011/4598a014/12OmNwDAC7g",
"parentPublication": {
"id": "proceedings/esciencew/2011/4598/0",
"title": "e-Science Workshops, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2012/4467/0/06404472",
"title": "Automated data verification in a large-scale citizen science project: A case study",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2012/06404472/12OmNwHhoXQ",
"parentPublication": {
"id": "proceedings/e-science/2012/4467/0",
"title": "2012 IEEE 8th International Conference on E-Science (e-Science)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esciencew/2011/4598/0/4598a028",
"title": "Gaming for (Citizen) Science: Exploring Motivation and Data Quality in the Context of Crowdsourced Science through the Design and Evaluation of a Social-Computational System",
"doi": null,
"abstractUrl": "/proceedings-article/esciencew/2011/4598a028/12OmNxFsmGk",
"parentPublication": {
"id": "proceedings/esciencew/2011/4598/0",
"title": "e-Science Workshops, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2009/3926/0/3926a053",
"title": "A Syllable-Level Probabilistic Framework for Bird Species Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2009/3926a053/12OmNxYtu8y",
"parentPublication": {
"id": "proceedings/icmla/2009/3926/0",
"title": "Machine Learning and Applications, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/esciencew/2011/4598/0/4598a007",
"title": "Reputation-aware Filtering Services for Citizen Science Data",
"doi": null,
"abstractUrl": "/proceedings-article/esciencew/2011/4598a007/12OmNzE54IZ",
"parentPublication": {
"id": "proceedings/esciencew/2011/4598/0",
"title": "e-Science Workshops, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122374",
"title": "BirdVis: Visualizing and Understanding Bird Populations",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122374/13rRUzp02oh",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBhpS6R",
"title": "2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks",
"acronym": "wowmom",
"groupId": "1001379",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwF0BLA",
"doi": "10.1109/WoWMoM.2011.5986215",
"title": "Acoustic scheme to count bird songs with wireless sensor networks",
"normalizedTitle": "Acoustic scheme to count bird songs with wireless sensor networks",
"abstract": "A key issue for any project that aims to study endangered animals is the counting process. In this work, we propose an algorithm for automatic counting of singing birds in their habitat by using wireless sensors fitted with microphone. Sensors are used to record audio samples of bird songs and samples are analyzed to extract fingerprints that permit to recognize bird species. This paper details the counting algorithm that uses graph theory and audio inputs comparison. Finally, we demonstrate our scheme efficiency through experimentations.",
"abstracts": [
{
"abstractType": "Regular",
"content": "A key issue for any project that aims to study endangered animals is the counting process. In this work, we propose an algorithm for automatic counting of singing birds in their habitat by using wireless sensors fitted with microphone. Sensors are used to record audio samples of bird songs and samples are analyzed to extract fingerprints that permit to recognize bird species. This paper details the counting algorithm that uses graph theory and audio inputs comparison. Finally, we demonstrate our scheme efficiency through experimentations.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "A key issue for any project that aims to study endangered animals is the counting process. In this work, we propose an algorithm for automatic counting of singing birds in their habitat by using wireless sensors fitted with microphone. Sensors are used to record audio samples of bird songs and samples are analyzed to extract fingerprints that permit to recognize bird species. This paper details the counting algorithm that uses graph theory and audio inputs comparison. Finally, we demonstrate our scheme efficiency through experimentations.",
"fno": "05986215",
"keywords": [
"Endangered Animals",
"Acoustic Scheme",
"Wireless Sensor Networks",
"Bird Song Counting",
"Microphone",
"Graph Theory"
],
"authors": [
{
"affiliation": "LAMIA Lab., Univ. of the French West Indies & Guiana, France",
"fullName": "E. Stattner",
"givenName": "E.",
"surname": "Stattner",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LAMIA Lab., Univ. of the French West Indies & Guiana, France",
"fullName": "P. Hunel",
"givenName": "P.",
"surname": "Hunel",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LAMIA Lab., Univ. of the French West Indies & Guiana, France",
"fullName": "N. Vidot",
"givenName": "N.",
"surname": "Vidot",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "LAMIA Lab., Univ. of the French West Indies & Guiana, France",
"fullName": "M. Collard",
"givenName": "M.",
"surname": "Collard",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wowmom",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-06-01T00:00:00",
"pubType": "proceedings",
"pages": "1-3",
"year": "2011",
"issn": null,
"isbn": "978-1-4577-0352-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "05986214",
"articleId": "12OmNyKJigw",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "05986382",
"articleId": "12OmNxeut5T",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/lcn/2008/2412/0/04664273",
"title": "Demonstration of bird species detection using an acoustic wireless sensor network",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2008/04664273/12OmNAOsMMy",
"parentPublication": {
"id": "proceedings/lcn/2008/2412/0",
"title": "2008 33rd IEEE Conference on Local Computer Networks (LCN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2011/4589/0/4589a117",
"title": "Automatic Bird Species Identification for Large Number of Species",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a117/12OmNAR1aSD",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mas/2015/9828/0/9828a043",
"title": "Bird Sounds Detection Using Normalized Audio Power Sequences",
"doi": null,
"abstractUrl": "/proceedings-article/mas/2015/9828a043/12OmNqJq4rI",
"parentPublication": {
"id": "proceedings/mas/2015/9828/0",
"title": "2015 4th International Conference on Modeling and Simulation (MAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2005/9331/0/01521503",
"title": "Automatic surveillance of the acoustic activity in our living environment",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2005/01521503/12OmNxWuitn",
"parentPublication": {
"id": "proceedings/icme/2005/9331/0",
"title": "2005 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2009/3926/0/3926a053",
"title": "A Syllable-Level Probabilistic Framework for Bird Species Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2009/3926a053/12OmNxYtu8y",
"parentPublication": {
"id": "proceedings/icmla/2009/3926/0",
"title": "Machine Learning and Applications, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcnw/2012/2130/0/06424060",
"title": "Wireless sensor network for habitat monitoring: A counting heuristic",
"doi": null,
"abstractUrl": "/proceedings-article/lcnw/2012/06424060/12OmNzC5Tik",
"parentPublication": {
"id": "proceedings/lcnw/2012/2130/0",
"title": "2012 IEEE 37th Annual Conference on Local Computer Networks (LCN 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327207",
"title": "Classification of the harmonic structure in bird vocalization",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327207/12OmNzlly2M",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNrkjVbR",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"acronym": "icme",
"groupId": "1000477",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwcl7Fu",
"doi": "10.1109/ICME.2013.6607576",
"title": "Bird species identification based on timbre and pitch features",
"normalizedTitle": "Bird species identification based on timbre and pitch features",
"abstract": "This study proposes an automatic bird sound identification system to help people learn to identify bird species. The system is built upon a two-stage identification framework. The first stage performs call/song classification. If an unknown sound clip is classified as a call, it is then handled by a call identifier in the second stage; otherwise, it is handled by a song identifier. Both identifiers use two acoustic features, timbre and pitch, to determine which of the bird species the sound clip belong to. In using timbre features, bird sounds are converted into MFCCs and their first derivatives and then analyzed using Gaussian mixture models. In using pitch feature, we convert bird sounds into MIDI note sequences and then use bigram models to analyze the dynamic change information of the notes. Our experiments, conducted using a database including twenty common bird species, show that the proposed system can achieve 90.4% accuracy.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This study proposes an automatic bird sound identification system to help people learn to identify bird species. The system is built upon a two-stage identification framework. The first stage performs call/song classification. If an unknown sound clip is classified as a call, it is then handled by a call identifier in the second stage; otherwise, it is handled by a song identifier. Both identifiers use two acoustic features, timbre and pitch, to determine which of the bird species the sound clip belong to. In using timbre features, bird sounds are converted into MFCCs and their first derivatives and then analyzed using Gaussian mixture models. In using pitch feature, we convert bird sounds into MIDI note sequences and then use bigram models to analyze the dynamic change information of the notes. Our experiments, conducted using a database including twenty common bird species, show that the proposed system can achieve 90.4% accuracy.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This study proposes an automatic bird sound identification system to help people learn to identify bird species. The system is built upon a two-stage identification framework. The first stage performs call/song classification. If an unknown sound clip is classified as a call, it is then handled by a call identifier in the second stage; otherwise, it is handled by a song identifier. Both identifiers use two acoustic features, timbre and pitch, to determine which of the bird species the sound clip belong to. In using timbre features, bird sounds are converted into MFCCs and their first derivatives and then analyzed using Gaussian mixture models. In using pitch feature, we convert bird sounds into MIDI note sequences and then use bigram models to analyze the dynamic change information of the notes. Our experiments, conducted using a database including twenty common bird species, show that the proposed system can achieve 90.4% accuracy.",
"fno": "06607576",
"keywords": [
"Hidden Markov Models",
"Abstracts",
"Indexes",
"Timbre",
"Birds",
"Bird Sound Identification",
"Bird Call",
"Bird Song",
"Bird Species"
],
"authors": [
{
"affiliation": "Department of Electronic Engineering & Graduate Institute of Computer and Communication Engineering, National Taipei University of Technology, Taiwan",
"fullName": "Wei-Ho Tsai",
"givenName": "Wei-Ho",
"surname": "Tsai",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Computer Science and Information Engineering, Hungkuang University, Taichung, Taiwan",
"fullName": "Yeong-Yuh Xu",
"givenName": "Yeong-Yuh",
"surname": "Xu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Electronic Engineering & Graduate Institute of Computer and Communication Engineering, National Taipei University of Technology, Taiwan",
"fullName": "Wei-Cheng Lin",
"givenName": "Wei-Cheng",
"surname": "Lin",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icme",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-07-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2013",
"issn": "1945-7871",
"isbn": "978-1-4799-0015-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06607575",
"articleId": "12OmNzTYC2P",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06607577",
"articleId": "12OmNwt5skt",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ism/2011/4589/0/4589a117",
"title": "Automatic Bird Species Identification for Large Number of Species",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a117/12OmNAR1aSD",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493a798",
"title": "Computer-Assisted Sampling of Acoustic Data for More Efficient Determination of Bird Species Richness",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a798/12OmNAY79bm",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2016/4459/0/4459a396",
"title": "Combining Visual and Acoustic Features for Bird Species Classification",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2016/4459a396/12OmNBdJ5jj",
"parentPublication": {
"id": "proceedings/ictai/2016/4459/0",
"title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2014/4311/0/4311a223",
"title": "Automatic Segmentation of Audio Signals for Bird Species Identification",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2014/4311a223/12OmNqG0SON",
"parentPublication": {
"id": "proceedings/ism/2014/4311/0",
"title": "2014 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2016/1269/0/07759992",
"title": "Identification of bird species from their singing",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2016/07759992/12OmNxwENpm",
"parentPublication": {
"id": "proceedings/iciev/2016/1269/0",
"title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327238",
"title": "Bird song recognition based on syllable pair histograms",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327238/12OmNyvY9uY",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/3/252130400",
"title": "Data Mining Applied to Acoustic Bird Species Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/252130400/12OmNzJbQXY",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/3",
"title": "2006 18th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicic/2007/2882/0/28820143",
"title": "Bird Species Recognition by Comparing the HMMs of the Syllables",
"doi": null,
"abstractUrl": "/proceedings-article/icicic/2007/28820143/12OmNzmtWv2",
"parentPublication": {
"id": "proceedings/icicic/2007/2882/0",
"title": "2007 Second International Conference on Innovative Computing, Information and Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2019/0801/0/08940168",
"title": "Analysis and Modeling of Timbre Perception Features of Chinese Musical Instruments",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2019/08940168/1gjRLRyei1G",
"parentPublication": {
"id": "proceedings/icis/2019/0801/0",
"title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNxvO06X",
"title": "Computer and Information Science, ACIS International Conference on",
"acronym": "icis",
"groupId": "1001200",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwvDQpT",
"doi": "10.1109/ICIS.2009.33",
"title": "Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis",
"normalizedTitle": "Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis",
"abstract": "Knowledge of wetland use of migratory bird species during the annual life circle is important to construct conservation strategy and explore the implication for avian influenza control. Biological scientists have used GPS satellite telemetry to determine the habitat of wild birds. However, because there is not an efficient method to process the location data sets, scientists have to devote themselves to calculating the scattering location points in the GIS and using MCP or Kernel method to find the approximate home range of bird species. This paper presents an alternative hierarchy clustering-based methodology to build a Spatial-Tree for discovering the habitat area that overcomes the limit of human observation ability. Preliminary results showed that some nodes of the Spatial-Tree correspond to core range area providing an illusive map to depict the breeding and wintering home range of Bar-headed Goose.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Knowledge of wetland use of migratory bird species during the annual life circle is important to construct conservation strategy and explore the implication for avian influenza control. Biological scientists have used GPS satellite telemetry to determine the habitat of wild birds. However, because there is not an efficient method to process the location data sets, scientists have to devote themselves to calculating the scattering location points in the GIS and using MCP or Kernel method to find the approximate home range of bird species. This paper presents an alternative hierarchy clustering-based methodology to build a Spatial-Tree for discovering the habitat area that overcomes the limit of human observation ability. Preliminary results showed that some nodes of the Spatial-Tree correspond to core range area providing an illusive map to depict the breeding and wintering home range of Bar-headed Goose.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Knowledge of wetland use of migratory bird species during the annual life circle is important to construct conservation strategy and explore the implication for avian influenza control. Biological scientists have used GPS satellite telemetry to determine the habitat of wild birds. However, because there is not an efficient method to process the location data sets, scientists have to devote themselves to calculating the scattering location points in the GIS and using MCP or Kernel method to find the approximate home range of bird species. This paper presents an alternative hierarchy clustering-based methodology to build a Spatial-Tree for discovering the habitat area that overcomes the limit of human observation ability. Preliminary results showed that some nodes of the Spatial-Tree correspond to core range area providing an illusive map to depict the breeding and wintering home range of Bar-headed Goose.",
"fno": "3641a130",
"keywords": [
"Clustering",
"Bird Migration Habitat",
"Scientific Data",
"Qinghai Lake"
],
"authors": [
{
"affiliation": null,
"fullName": "MingJie Tang",
"givenName": "MingJie",
"surname": "Tang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "YuanChun Zhou",
"givenName": "YuanChun",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Peng Cui",
"givenName": "Peng",
"surname": "Cui",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "HaiTing Zhang",
"givenName": "HaiTing",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "LiangL Hu",
"givenName": "LiangL",
"surname": "Hu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "YuanSheng Hou",
"givenName": "YuanSheng",
"surname": "Hou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "BaoPing Yan",
"givenName": "BaoPing",
"surname": "Yan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icis",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-06-01T00:00:00",
"pubType": "proceedings",
"pages": "130-135",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3641-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3641a124",
"articleId": "12OmNBpEeQE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3641a136",
"articleId": "12OmNwtn3Gh",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2010/4256/0/4256b157",
"title": "Modeling Experts and Novices in Citizen Science Data for Species Distribution Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256b157/12OmNCbU2SG",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2008/3304/5/3304e628",
"title": "The Effect of Habitat Destruction On the Multi-Species Competition System With Allee Effects",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2008/3304e628/12OmNCcKQNw",
"parentPublication": {
"id": "proceedings/icnc/2008/3304/5",
"title": "2008 Fourth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wowmom/2011/0352/0/05986215",
"title": "Acoustic scheme to count bird songs with wireless sensor networks",
"doi": null,
"abstractUrl": "/proceedings-article/wowmom/2011/05986215/12OmNwF0BLA",
"parentPublication": {
"id": "proceedings/wowmom/2011/0352/0",
"title": "2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2013/5083/0/06683886",
"title": "Bird-SDPS: A Migratory Birds' Spatial Distribution Prediction System",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2013/06683886/12OmNxFaLBO",
"parentPublication": {
"id": "proceedings/e-science/2013/5083/0",
"title": "2013 IEEE 9th International Conference on eScience (eScience)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-icess/2011/4538/0/4538a875",
"title": "Discovering Abiotic Interactions between Bird Habitat and Water Quality through Ubiquitous Computing",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a875/12OmNxQOjyu",
"parentPublication": {
"id": "proceedings/hpcc-icess/2011/4538/0",
"title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isms/2012/4668/0/4668a325",
"title": "Edible Bird Nest Shape Quality Assessment Using Machine Vision System",
"doi": null,
"abstractUrl": "/proceedings-article/isms/2012/4668a325/12OmNyrqzrs",
"parentPublication": {
"id": "proceedings/isms/2012/4668/0",
"title": "Intelligent Systems, Modelling and Simulation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcnw/2012/2130/0/06424060",
"title": "Wireless sensor network for habitat monitoring: A counting heuristic",
"doi": null,
"abstractUrl": "/proceedings-article/lcnw/2012/06424060/12OmNzC5Tik",
"parentPublication": {
"id": "proceedings/lcnw/2012/2130/0",
"title": "2012 IEEE 37th Annual Conference on Local Computer Networks (LCN 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2006/2521/3/252130400",
"title": "Data Mining Applied to Acoustic Bird Species Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2006/252130400/12OmNzJbQXY",
"parentPublication": {
"id": "proceedings/icpr/2006/2521/3",
"title": "2006 18th International Conference on Pattern Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icwmc/2009/3750/0/3750a157",
"title": "Web Interface for Habitat Monitoring Using Wireless Sensor Network",
"doi": null,
"abstractUrl": "/proceedings-article/icwmc/2009/3750a157/12OmNzvQI6o",
"parentPublication": {
"id": "proceedings/icwmc/2009/3750/0",
"title": "Wireless and Mobile Communications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122374",
"title": "BirdVis: Visualizing and Understanding Bird Populations",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122374/13rRUzp02oh",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCeaPZK",
"title": "2011 IEEE 7th International Conference on E-Science (e-Science)",
"acronym": "e-science",
"groupId": "1001511",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxAlA7n",
"doi": "10.1109/eScience.2011.29",
"title": "Large Scale Participatory Acoustic Sensor Data Analysis: Tools and Reputation Models to Enhance Effectiveness",
"normalizedTitle": "Large Scale Participatory Acoustic Sensor Data Analysis: Tools and Reputation Models to Enhance Effectiveness",
"abstract": "Acoustic sensors play an important role in augmenting the traditional biodiversity monitoring activities carried out by ecologists and conservation biologists. With this ability however comes the burden of analysing large volumes of complex acoustic data. Given the complexity of acoustic sensor data, fully automated analysis for a wide range of species is still a significant challenge. This research investigates the use of citizen scientists to analyse large volumes of environmental acoustic data in order to identify bird species. Specifically, it investigates ways in which the efficiency of a user can be improved through the use of species identification tools and the use of reputation models to predict the accuracy of users with unidentified skill levels. Initial experimental results are reported.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Acoustic sensors play an important role in augmenting the traditional biodiversity monitoring activities carried out by ecologists and conservation biologists. With this ability however comes the burden of analysing large volumes of complex acoustic data. Given the complexity of acoustic sensor data, fully automated analysis for a wide range of species is still a significant challenge. This research investigates the use of citizen scientists to analyse large volumes of environmental acoustic data in order to identify bird species. Specifically, it investigates ways in which the efficiency of a user can be improved through the use of species identification tools and the use of reputation models to predict the accuracy of users with unidentified skill levels. Initial experimental results are reported.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Acoustic sensors play an important role in augmenting the traditional biodiversity monitoring activities carried out by ecologists and conservation biologists. With this ability however comes the burden of analysing large volumes of complex acoustic data. Given the complexity of acoustic sensor data, fully automated analysis for a wide range of species is still a significant challenge. This research investigates the use of citizen scientists to analyse large volumes of environmental acoustic data in order to identify bird species. Specifically, it investigates ways in which the efficiency of a user can be improved through the use of species identification tools and the use of reputation models to predict the accuracy of users with unidentified skill levels. Initial experimental results are reported.",
"fno": "06123272",
"keywords": [
"Computerised Instrumentation",
"Data Analysis",
"Ecology",
"Environmental Science Computing",
"Sensors",
"Participatory Acoustic Sensor",
"Data Analysis",
"Biodiversity Monitoring Activity",
"Ecology",
"Conservation Biology",
"Citizen Scientists",
"Environmental Acoustic Data",
"Species Identification Tools",
"Acoustic Sensors",
"Acoustics",
"Accuracy",
"Libraries",
"Data Analysis",
"Biodiversity",
"Global Climate Change",
"Sensors",
"Acoustic Sensing",
"Acoustic Analysis",
"Citizen Science",
"Reputation Management",
"Participatory Sensing",
"Participatory Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Anthony Truskinger",
"givenName": "Anthony",
"surname": "Truskinger",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Haofan Yang",
"givenName": "Haofan",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jason Wimmer",
"givenName": "Jason",
"surname": "Wimmer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jinglan Zhang",
"givenName": "Jinglan",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ian Williamson",
"givenName": "Ian",
"surname": "Williamson",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Paul Roe",
"givenName": "Paul",
"surname": "Roe",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "e-science",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "150-157",
"year": "2011",
"issn": null,
"isbn": "978-1-4577-2163-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06123271",
"articleId": "12OmNzIUfPi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06123273",
"articleId": "12OmNzd7bcL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdmw/2015/8493/0/8493a798",
"title": "Computer-Assisted Sampling of Acoustic Data for More Efficient Determination of Bird Species Richness",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a798/12OmNAY79bm",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2010/8957/0/05693932",
"title": "Scaling Acoustic Data Analysis through Collaboration and Automation",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2010/05693932/12OmNCga1Rk",
"parentPublication": {
"id": "proceedings/e-science/2010/8957/0",
"title": "E-Science 2010. 6th IEEE International Conference on E-Science (E-Science 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2015/7343/0/07314306",
"title": "Visual Fingerprints of the Acoustic Environment: The Use of Acoustic Indices to Characterise Natural Habitats",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2015/07314306/12OmNrHjqJv",
"parentPublication": {
"id": "proceedings/bdva/2015/7343/0",
"title": "2015 Big Data Visual Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2013/5096/0/5096a997",
"title": "Managing and Analysing Big Audio Data for Environmental Monitoring",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2013/5096a997/12OmNwErpWp",
"parentPublication": {
"id": "proceedings/cse/2013/5096/0",
"title": "2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493a762",
"title": "Compact Features for Birdcall Retrieval from Environmental Acoustic Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a762/12OmNxFsmyu",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2008/3380/0/04736750",
"title": "Towards an Acoustic Environmental Observatory",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2008/04736750/12OmNxbW4Sq",
"parentPublication": {
"id": "proceedings/e-science/2008/3380/0",
"title": "2008 IEEE Fourth International Conference on eScience",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdcloud/2014/6719/0/6719a091",
"title": "Practical Analysis of Big Acoustic Sensor Data for Environmental Monitoring",
"doi": null,
"abstractUrl": "/proceedings-article/bdcloud/2014/6719a091/12OmNxxNbRJ",
"parentPublication": {
"id": "proceedings/bdcloud/2014/6719/0",
"title": "2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipsn/2017/4890/0/07944815",
"title": "Poster Abstract: Long-Term Monitoring of Cane-Toads Using Acoustic Sensors",
"doi": null,
"abstractUrl": "/proceedings-article/ipsn/2017/07944815/12OmNy3RRx4",
"parentPublication": {
"id": "proceedings/ipsn/2017/4890/0",
"title": "2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2017/2686/0/08109135",
"title": "An Investigation into Acoustic Analysis Methods for Endangered Species Monitoring: A Case of Monitoring the Critically Endangered White-Bellied Heron in Bhutan",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2017/08109135/12OmNy68EJ1",
"parentPublication": {
"id": "proceedings/e-science/2017/2686/0",
"title": "2017 IEEE 13th International Conference on e-Science (e-Science)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvDI3Md",
"title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on",
"acronym": "hpcc-icess",
"groupId": "1002461",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxQOjyu",
"doi": "10.1109/HPCC.2011.125",
"title": "Discovering Abiotic Interactions between Bird Habitat and Water Quality through Ubiquitous Computing",
"normalizedTitle": "Discovering Abiotic Interactions between Bird Habitat and Water Quality through Ubiquitous Computing",
"abstract": "Conventional water quality monitoring and bird species observation were recorded using pen and paper. Moreover, experiments can usually only be conducted in limited areas due to the high cost of the water monitoring equipment. Consequently, not enough data could be collected to find the a biotic interactions between water quality factors and bird habitat. To resolve this problem, the proposed smart phone based system can transmit the water quality measurements and observed quantity of each bird species to the back-end server via a 3G network. This server functions as a ubiquitous information center where all measured and observed data are stored. Fuzzy C-means is applied to cluster water quality factors and bird species. The clustering results of bird quantity are then used to calculate the Simpson¡¦s diversity indices. Based on the results from the water quality factors and biodiversity index pattern trees (PTs) are constructed to find the a biotic interactions between them. The PTs can be further transformed into IF-THEN rules to provide references for researchers to conduct environmental protection. Experimental results are given to verify the applicability of the proposed system in finding the a biotic interactions.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Conventional water quality monitoring and bird species observation were recorded using pen and paper. Moreover, experiments can usually only be conducted in limited areas due to the high cost of the water monitoring equipment. Consequently, not enough data could be collected to find the a biotic interactions between water quality factors and bird habitat. To resolve this problem, the proposed smart phone based system can transmit the water quality measurements and observed quantity of each bird species to the back-end server via a 3G network. This server functions as a ubiquitous information center where all measured and observed data are stored. Fuzzy C-means is applied to cluster water quality factors and bird species. The clustering results of bird quantity are then used to calculate the Simpson¡¦s diversity indices. Based on the results from the water quality factors and biodiversity index pattern trees (PTs) are constructed to find the a biotic interactions between them. The PTs can be further transformed into IF-THEN rules to provide references for researchers to conduct environmental protection. Experimental results are given to verify the applicability of the proposed system in finding the a biotic interactions.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Conventional water quality monitoring and bird species observation were recorded using pen and paper. Moreover, experiments can usually only be conducted in limited areas due to the high cost of the water monitoring equipment. Consequently, not enough data could be collected to find the a biotic interactions between water quality factors and bird habitat. To resolve this problem, the proposed smart phone based system can transmit the water quality measurements and observed quantity of each bird species to the back-end server via a 3G network. This server functions as a ubiquitous information center where all measured and observed data are stored. Fuzzy C-means is applied to cluster water quality factors and bird species. The clustering results of bird quantity are then used to calculate the Simpson¡¦s diversity indices. Based on the results from the water quality factors and biodiversity index pattern trees (PTs) are constructed to find the a biotic interactions between them. The PTs can be further transformed into IF-THEN rules to provide references for researchers to conduct environmental protection. Experimental results are given to verify the applicability of the proposed system in finding the a biotic interactions.",
"fno": "4538a875",
"keywords": [
"Ubiquitous Computing",
"Water Quality Factors",
"Biodiversity",
"Fuzzy C Means",
"Pattern Trees"
],
"authors": [],
"idPrefix": "hpcc-icess",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-09-01T00:00:00",
"pubType": "proceedings",
"pages": "875-880",
"year": "2011",
"issn": null,
"isbn": null,
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4538a869",
"articleId": "12OmNvDqsDi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4538a881",
"articleId": "12OmNC8uRvW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uic-atc/2012/4843/0/4843a719",
"title": "Ubiquitous Computing and Evaluation of Water Quality by Grey Relational Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc/2012/4843a719/12OmNBVIUyn",
"parentPublication": {
"id": "proceedings/uic-atc/2012/4843/0",
"title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uic-atc/2010/4272/0/4272a070",
"title": "Water Quality Monitoring with Ubiquitous Computing",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc/2010/4272a070/12OmNvAAtKA",
"parentPublication": {
"id": "proceedings/uic-atc/2010/4272/0",
"title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmtma/2013/4932/0/4932a291",
"title": "Application of Fuzzy C-means Clustering for Assessing Rural Surface Water Quality in Lianyungang City",
"doi": null,
"abstractUrl": "/proceedings-article/icmtma/2013/4932a291/12OmNvyjGg2",
"parentPublication": {
"id": "proceedings/icmtma/2013/4932/0",
"title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isdea/2013/4893/0/06456116",
"title": "Problems and Countermeasures in Sihu Lacustrine Wetland of Hubei",
"doi": null,
"abstractUrl": "/proceedings-article/isdea/2013/06456116/12OmNwbcJ62",
"parentPublication": {
"id": "proceedings/isdea/2013/4893/0",
"title": "2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2009/3641/0/3641a130",
"title": "Exploring the Spatial Distribution of Bird Habitat with Cluster Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2009/3641a130/12OmNwvDQpT",
"parentPublication": {
"id": "proceedings/icis/2009/3641/0",
"title": "Computer and Information Science, ACIS International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327238",
"title": "Bird song recognition based on syllable pair histograms",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327238/12OmNyvY9uY",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122374",
"title": "BirdVis: Visualizing and Understanding Bird Populations",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122374/13rRUzp02oh",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iceitsa/2022/6401/0/640100a206",
"title": "Design of Multi-Functional Agricultural And Forestry Bird Repellent Irrigation Device Based on Radar and Ultrasonic Probing Drive",
"doi": null,
"abstractUrl": "/proceedings-article/iceitsa/2022/640100a206/1L088qqJzag",
"parentPublication": {
"id": "proceedings/iceitsa/2022/6401/0",
"title": "2022 2nd International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzmclVQ",
"title": "Machine Learning and Applications, Fourth International Conference on",
"acronym": "icmla",
"groupId": "1001544",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxYtu8y",
"doi": "10.1109/ICMLA.2009.79",
"title": "A Syllable-Level Probabilistic Framework for Bird Species Identification",
"normalizedTitle": "A Syllable-Level Probabilistic Framework for Bird Species Identification",
"abstract": "In this paper, we present new probabilistic models for identifying bird species from audio recordings. We introduce the independent syllable model and consider two ways of aggregating frame level features within a syllable. We characterize each syllable as a probability distribution of its frame level features. The independent frame independent syllable (IFIS) model allows us to distinguish syllables whose feature distributions are different from one another. The Markov chain frame independent syllable (MCFIS) model is introduced for scenarios where the temporal structure within the syllable provides significant amount of discriminative information. We derive the Bayes risk minimizing classifier for each model and show that it can be approximated as a nearest neighbour classifier. Our experiments indicate that the IFIS and MCFIS models achieve 88.26% and 90.61% correct classification rates, respectively, while the equivalent SVM implementation achieves 86.15%.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this paper, we present new probabilistic models for identifying bird species from audio recordings. We introduce the independent syllable model and consider two ways of aggregating frame level features within a syllable. We characterize each syllable as a probability distribution of its frame level features. The independent frame independent syllable (IFIS) model allows us to distinguish syllables whose feature distributions are different from one another. The Markov chain frame independent syllable (MCFIS) model is introduced for scenarios where the temporal structure within the syllable provides significant amount of discriminative information. We derive the Bayes risk minimizing classifier for each model and show that it can be approximated as a nearest neighbour classifier. Our experiments indicate that the IFIS and MCFIS models achieve 88.26% and 90.61% correct classification rates, respectively, while the equivalent SVM implementation achieves 86.15%.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this paper, we present new probabilistic models for identifying bird species from audio recordings. We introduce the independent syllable model and consider two ways of aggregating frame level features within a syllable. We characterize each syllable as a probability distribution of its frame level features. The independent frame independent syllable (IFIS) model allows us to distinguish syllables whose feature distributions are different from one another. The Markov chain frame independent syllable (MCFIS) model is introduced for scenarios where the temporal structure within the syllable provides significant amount of discriminative information. We derive the Bayes risk minimizing classifier for each model and show that it can be approximated as a nearest neighbour classifier. Our experiments indicate that the IFIS and MCFIS models achieve 88.26% and 90.61% correct classification rates, respectively, while the equivalent SVM implementation achieves 86.15%.",
"fno": "3926a053",
"keywords": [
"Probabilistic Modeling Audio Classification Bayesian Inference Bird Species Identification"
],
"authors": [
{
"affiliation": null,
"fullName": "Balaji Lakshminarayanan",
"givenName": "Balaji",
"surname": "Lakshminarayanan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Raviv Raich",
"givenName": "Raviv",
"surname": "Raich",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoli Fern",
"givenName": "Xiaoli",
"surname": "Fern",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmla",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-12-01T00:00:00",
"pubType": "proceedings",
"pages": "53-59",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3926-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3926a047",
"articleId": "12OmNx6PiBE",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3926a063",
"articleId": "12OmNqJq4vk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isspit/2009/5949/0/05407514",
"title": "Automatic meter classification in Persian poetries using support vector machines",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2009/05407514/12OmNAKcNNO",
"parentPublication": {
"id": "proceedings/isspit/2009/5949/0",
"title": "2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2011/4589/0/4589a117",
"title": "Automatic Bird Species Identification for Large Number of Species",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a117/12OmNAR1aSD",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1996/3192/2/00543261",
"title": "The use of syllable phonotactics for word hypothesization",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1996/00543261/12OmNAS9zM7",
"parentPublication": {
"id": "proceedings/icassp/1996/3192/2",
"title": "1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apscc/2008/3473/0/3473a745",
"title": "On the Studies of Syllable Segmentation and Improving MFCCs for Automatic Birdsong Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/apscc/2008/3473a745/12OmNvRU0kB",
"parentPublication": {
"id": "proceedings/apscc/2008/3473/0",
"title": "2008 IEEE Asia-Pacific Services Computing Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2008/3357/1/3357a030",
"title": "Application of Immune Classifier Based on Increment of Diversity in the Model Species Genomes Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2008/3357a030/12OmNvnwVpx",
"parentPublication": {
"id": "proceedings/icicta/2008/3357/1",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2013/4999/0/06628748",
"title": "Using a Probabilistic Syllable Model to Improve Scene Text Recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2013/06628748/12OmNxETadJ",
"parentPublication": {
"id": "proceedings/icdar/2013/4999/0",
"title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uic-atc/2009/3737/0/3737a189",
"title": "Bird Species Recognition by Wavelet Transformation of a Section of Birdsong",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc/2009/3737a189/12OmNxiKs7e",
"parentPublication": {
"id": "proceedings/uic-atc/2009/3737/0",
"title": "Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327238",
"title": "Bird song recognition based on syllable pair histograms",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327238/12OmNyvY9uY",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicic/2007/2882/0/28820143",
"title": "Bird Species Recognition by Comparing the HMMs of the Syllables",
"doi": null,
"abstractUrl": "/proceedings-article/icicic/2007/28820143/12OmNzmtWv2",
"parentPublication": {
"id": "proceedings/icicic/2007/2882/0",
"title": "2007 Second International Conference on Innovative Computing, Information and Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aemcse/2020/8143/0/814300a497",
"title": "A Preliminary Study on Time-Domain Acoustic Characteristics of Chinese Syllable Signals",
"doi": null,
"abstractUrl": "/proceedings-article/aemcse/2020/814300a497/1l8xivCTwMo",
"parentPublication": {
"id": "proceedings/aemcse/2020/8143/0",
"title": "2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNxwENv0",
"title": "2015 IEEE Symposium on Computers and Communication (ISCC)",
"acronym": "iscc",
"groupId": "1000156",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxzuMF1",
"doi": "10.1109/ISCC.2015.7405516",
"title": "Monitoring and recognition of bird population in protected bird territory",
"normalizedTitle": "Monitoring and recognition of bird population in protected bird territory",
"abstract": "Currently, the monitoring of individual bird species is provided by using conventional methods, i.e. observation by ornithologists. Monitoring by conventional methods is ineffective and observers themselves interfere with the natural environment. Their presence has a distorting effect. For these reasons, we propose a monitoring system that minimizes human impact. We also expect that changing the method of observation will be more accurate in terms of monitoring the population and on the basis of long-term operation. The system will be able to predict the further evolution of endangered species. When observing bird areas, the aim is to minimize the impact of the implemented monitoring system to the nature. For this reason, we decided to use simple wireless sensors, which are able to evaluate acoustic speech of birds in the monitored area.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Currently, the monitoring of individual bird species is provided by using conventional methods, i.e. observation by ornithologists. Monitoring by conventional methods is ineffective and observers themselves interfere with the natural environment. Their presence has a distorting effect. For these reasons, we propose a monitoring system that minimizes human impact. We also expect that changing the method of observation will be more accurate in terms of monitoring the population and on the basis of long-term operation. The system will be able to predict the further evolution of endangered species. When observing bird areas, the aim is to minimize the impact of the implemented monitoring system to the nature. For this reason, we decided to use simple wireless sensors, which are able to evaluate acoustic speech of birds in the monitored area.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Currently, the monitoring of individual bird species is provided by using conventional methods, i.e. observation by ornithologists. Monitoring by conventional methods is ineffective and observers themselves interfere with the natural environment. Their presence has a distorting effect. For these reasons, we propose a monitoring system that minimizes human impact. We also expect that changing the method of observation will be more accurate in terms of monitoring the population and on the basis of long-term operation. The system will be able to predict the further evolution of endangered species. When observing bird areas, the aim is to minimize the impact of the implemented monitoring system to the nature. For this reason, we decided to use simple wireless sensors, which are able to evaluate acoustic speech of birds in the monitored area.",
"fno": "07405516",
"keywords": [
"Birds",
"Monitoring",
"Wireless Sensor Networks",
"Acoustics",
"Sociology",
"Statistics",
"Wireless Communication",
"Acoustic Signal",
"Distributed Sensor Network",
"Bird Species Monitoring"
],
"authors": [
{
"affiliation": "Department of Technical Cybernetics, Faculty of Management Science and Informatics, University of Žilina, Univerzitná 8215/1, 010 26 Žilina, Slovakia",
"fullName": "Michal Hodon",
"givenName": "Michal",
"surname": "Hodon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Technical Cybernetics, Faculty of Management Science and Informatics, University of Žilina, Univerzitná 8215/1, 010 26 Žilina, Slovakia",
"fullName": "Peter Sarafin",
"givenName": "Peter",
"surname": "Sarafin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Department of Technical Cybernetics, Faculty of Management Science and Informatics, University of Žilina, Univerzitná 8215/1, 010 26 Žilina, Slovakia",
"fullName": "Peter Sevcik",
"givenName": "Peter",
"surname": "Sevcik",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iscc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-07-01T00:00:00",
"pubType": "proceedings",
"pages": "198-203",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-7194-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07405515",
"articleId": "12OmNxvwoZi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07405517",
"articleId": "12OmNrkT7s4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/lcn/2008/2412/0/04664273",
"title": "Demonstration of bird species detection using an acoustic wireless sensor network",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2008/04664273/12OmNAOsMMy",
"parentPublication": {
"id": "proceedings/lcn/2008/2412/0",
"title": "2008 33rd IEEE Conference on Local Computer Networks (LCN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493a798",
"title": "Computer-Assisted Sampling of Acoustic Data for More Efficient Determination of Bird Species Richness",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a798/12OmNAY79bm",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2016/4459/0/4459a396",
"title": "Combining Visual and Acoustic Features for Bird Species Classification",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2016/4459a396/12OmNBdJ5jj",
"parentPublication": {
"id": "proceedings/ictai/2016/4459/0",
"title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2014/5209/0/5209b591",
"title": "Selection of Features in Accord with Population Drift",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2014/5209b591/12OmNwGZNIB",
"parentPublication": {
"id": "proceedings/icpr/2014/5209/0",
"title": "2014 22nd International Conference on Pattern Recognition (ICPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607576",
"title": "Bird species identification based on timbre and pitch features",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607576/12OmNwcl7Fu",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-icess/2011/4538/0/4538a875",
"title": "Discovering Abiotic Interactions between Bird Habitat and Water Quality through Ubiquitous Computing",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a875/12OmNxQOjyu",
"parentPublication": {
"id": "proceedings/hpcc-icess/2011/4538/0",
"title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2016/1269/0/07759992",
"title": "Identification of bird species from their singing",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2016/07759992/12OmNxwENpm",
"parentPublication": {
"id": "proceedings/iciev/2016/1269/0",
"title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327238",
"title": "Bird song recognition based on syllable pair histograms",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327238/12OmNyvY9uY",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcnw/2012/2130/0/06424060",
"title": "Wireless sensor network for habitat monitoring: A counting heuristic",
"doi": null,
"abstractUrl": "/proceedings-article/lcnw/2012/06424060/12OmNzC5Tik",
"parentPublication": {
"id": "proceedings/lcnw/2012/2130/0",
"title": "2012 IEEE 37th Annual Conference on Local Computer Networks (LCN 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNApcuab",
"title": "2006 18th International Conference on Pattern Recognition",
"acronym": "icpr",
"groupId": "1000545",
"volume": "3",
"displayVolume": "0",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzJbQXY",
"doi": "10.1109/ICPR.2006.426",
"title": "Data Mining Applied to Acoustic Bird Species Recognition",
"normalizedTitle": "Data Mining Applied to Acoustic Bird Species Recognition",
"abstract": "In this work we explore the application of data mining techniques to the problem of acoustic recognition of bird species. Most bird song analysis tools produce a large amount of spectral and temporal attributes from the acoustic signal. The identification of distinctive features has become critical in resource constrained applications such as habitat monitoring by sensor networks. Reducing computational requirements makes affordable to run a classifier on devices with power consumption constraints, such as nodes in a sensor network. Experimental results demonstrate that considerable dimensionality reduction can be achieved without significant loss in classification efficiency.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this work we explore the application of data mining techniques to the problem of acoustic recognition of bird species. Most bird song analysis tools produce a large amount of spectral and temporal attributes from the acoustic signal. The identification of distinctive features has become critical in resource constrained applications such as habitat monitoring by sensor networks. Reducing computational requirements makes affordable to run a classifier on devices with power consumption constraints, such as nodes in a sensor network. Experimental results demonstrate that considerable dimensionality reduction can be achieved without significant loss in classification efficiency.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this work we explore the application of data mining techniques to the problem of acoustic recognition of bird species. Most bird song analysis tools produce a large amount of spectral and temporal attributes from the acoustic signal. The identification of distinctive features has become critical in resource constrained applications such as habitat monitoring by sensor networks. Reducing computational requirements makes affordable to run a classifier on devices with power consumption constraints, such as nodes in a sensor network. Experimental results demonstrate that considerable dimensionality reduction can be achieved without significant loss in classification efficiency.",
"fno": "252130400",
"keywords": [],
"authors": [
{
"affiliation": "Tecnol?gico de Monterrey, Campus Estado de M?xico",
"fullName": "Erika Vilches",
"givenName": "Erika",
"surname": "Vilches",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tecnol?gico de Monterrey, Campus Estado de M?xico",
"fullName": "Ivan A. Escobar",
"givenName": "Ivan A.",
"surname": "Escobar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Tecnol?gico de Monterrey, Campus Estado de M?xico",
"fullName": "Edgar E. Vallejo",
"givenName": "Edgar E.",
"surname": "Vallejo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of California Los Angeles Los Angeles, CA",
"fullName": "Charles E. Taylor",
"givenName": "Charles E.",
"surname": "Taylor",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-08-01T00:00:00",
"pubType": "proceedings",
"pages": "400-403",
"year": "2006",
"issn": "1051-4651",
"isbn": "0-7695-2521-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "252130395",
"articleId": "12OmNBE7Mos",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "252130404",
"articleId": "12OmNyqRno8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/lcn/2008/2412/0/04664273",
"title": "Demonstration of bird species detection using an acoustic wireless sensor network",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2008/04664273/12OmNAOsMMy",
"parentPublication": {
"id": "proceedings/lcn/2008/2412/0",
"title": "2008 33rd IEEE Conference on Local Computer Networks (LCN)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2011/4589/0/4589a117",
"title": "Automatic Bird Species Identification for Large Number of Species",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2011/4589a117/12OmNAR1aSD",
"parentPublication": {
"id": "proceedings/ism/2011/4589/0",
"title": "2011 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2015/8493/0/8493a798",
"title": "Computer-Assisted Sampling of Acoustic Data for More Efficient Determination of Bird Species Richness",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2015/8493a798/12OmNAY79bm",
"parentPublication": {
"id": "proceedings/icdmw/2015/8493/0",
"title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2012/0227/1/06495122",
"title": "Automated Acoustic Classification of Bird Species from Real -Field Recordings",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2012/06495122/12OmNAg7k0Y",
"parentPublication": {
"id": "proceedings/ictai/2012/0227/1",
"title": "2012 IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ictai/2016/4459/0/4459a396",
"title": "Combining Visual and Acoustic Features for Bird Species Classification",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2016/4459a396/12OmNBdJ5jj",
"parentPublication": {
"id": "proceedings/ictai/2016/4459/0",
"title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2007/3033/0/30190513",
"title": "Targeting Input Data for Acoustic Bird Species Recognition Using Data Mining and HMMs",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2007/30190513/12OmNwFidbl",
"parentPublication": {
"id": "proceedings/icdmw/2007/3033/0",
"title": "Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2013/0015/0/06607576",
"title": "Bird species identification based on timbre and pitch features",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2013/06607576/12OmNwcl7Fu",
"parentPublication": {
"id": "proceedings/icme/2013/0015/0",
"title": "2013 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev/2016/1269/0/07759992",
"title": "Identification of bird species from their singing",
"doi": null,
"abstractUrl": "/proceedings-article/iciev/2016/07759992/12OmNxwENpm",
"parentPublication": {
"id": "proceedings/iciev/2016/1269/0",
"title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/5/01327238",
"title": "Bird song recognition based on syllable pair histograms",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01327238/12OmNyvY9uY",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/5",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicic/2007/2882/0/28820143",
"title": "Bird Species Recognition by Comparing the HMMs of the Syllables",
"doi": null,
"abstractUrl": "/proceedings-article/icicic/2007/28820143/12OmNzmtWv2",
"parentPublication": {
"id": "proceedings/icicic/2007/2882/0",
"title": "2007 Second International Conference on Innovative Computing, Information and Control",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvTBBbr",
"title": "2009 International Conference on Computational Science and Engineering",
"acronym": "cse",
"groupId": "1002115",
"volume": "4",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC2fGu0",
"doi": "10.1109/CSE.2009.458",
"title": "The Use of Online Videos in the 2008 U.S. Congressional Elections",
"normalizedTitle": "The Use of Online Videos in the 2008 U.S. Congressional Elections",
"abstract": "In a recent survey, 39% of Americans reported using the Web to access campaign materials for the 2008 primary elections. Assuming they are using popular search engines such as Google, it is important to investigate their search patterns and ensure that standards of fairness and balanced coverage are upheld in the results. In this paper, we offer an exploratory analysis of political online video data. This data was collected in the context of a broader project aimed at studying the effects of politically motivated spamming of webpages to manipulate their rankings within search engine results. Using online video parameters such as the submission date, number of views, ranking position, description keywords, political inclination of the submitter, the political message in the video, and commentsassociated with the video, we construct a picture of how online video medium was used during the last congressional political campaign. Our analysis takes into account three players: video providers (usually the campaigns or other interested parties), video consumers (the users), and search facilitators (Google and YouTube). The results indicate that online video coverage might be susceptible to technological bias that adds to the political biascommon in electoral campaigns. Educating the broader publicabout this inherent bias should be a common effort of the involved players and fairness advocacy groups.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In a recent survey, 39% of Americans reported using the Web to access campaign materials for the 2008 primary elections. Assuming they are using popular search engines such as Google, it is important to investigate their search patterns and ensure that standards of fairness and balanced coverage are upheld in the results. In this paper, we offer an exploratory analysis of political online video data. This data was collected in the context of a broader project aimed at studying the effects of politically motivated spamming of webpages to manipulate their rankings within search engine results. Using online video parameters such as the submission date, number of views, ranking position, description keywords, political inclination of the submitter, the political message in the video, and commentsassociated with the video, we construct a picture of how online video medium was used during the last congressional political campaign. Our analysis takes into account three players: video providers (usually the campaigns or other interested parties), video consumers (the users), and search facilitators (Google and YouTube). The results indicate that online video coverage might be susceptible to technological bias that adds to the political biascommon in electoral campaigns. Educating the broader publicabout this inherent bias should be a common effort of the involved players and fairness advocacy groups.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In a recent survey, 39% of Americans reported using the Web to access campaign materials for the 2008 primary elections. Assuming they are using popular search engines such as Google, it is important to investigate their search patterns and ensure that standards of fairness and balanced coverage are upheld in the results. In this paper, we offer an exploratory analysis of political online video data. This data was collected in the context of a broader project aimed at studying the effects of politically motivated spamming of webpages to manipulate their rankings within search engine results. Using online video parameters such as the submission date, number of views, ranking position, description keywords, political inclination of the submitter, the political message in the video, and commentsassociated with the video, we construct a picture of how online video medium was used during the last congressional political campaign. Our analysis takes into account three players: video providers (usually the campaigns or other interested parties), video consumers (the users), and search facilitators (Google and YouTube). The results indicate that online video coverage might be susceptible to technological bias that adds to the political biascommon in electoral campaigns. Educating the broader publicabout this inherent bias should be a common effort of the involved players and fairness advocacy groups.",
"fno": "3823e320",
"keywords": [
"Google Search",
"You Tube",
"2008 US Elections",
"Online Video",
"Technological Bias"
],
"authors": [
{
"affiliation": null,
"fullName": "Eni Mustafaraj",
"givenName": "Eni",
"surname": "Mustafaraj",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Panagiotis Takis Metaxas",
"givenName": "Panagiotis Takis",
"surname": "Metaxas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Catherine Grevet",
"givenName": "Catherine",
"surname": "Grevet",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cse",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-08-01T00:00:00",
"pubType": "proceedings",
"pages": "320-325",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3823-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3823e312",
"articleId": "12OmNwE9OBf",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3823e326",
"articleId": "12OmNzWx034",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ic2e/2016/1961/0/1961a172",
"title": "Exploring the Use of Tags for Georeplicated Content Placement",
"doi": null,
"abstractUrl": "/proceedings-article/ic2e/2016/1961a172/12OmNs0TL3l",
"parentPublication": {
"id": "proceedings/ic2e/2016/1961/0",
"title": "2016 IEEE International Conference on Cloud Engineering (IC2E)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2016/4571/0/4571a007",
"title": "Automated Coding of Political Video Ads for Political Science Research",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2016/4571a007/12OmNviZlzw",
"parentPublication": {
"id": "proceedings/ism/2016/4571/0",
"title": "2016 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2014/5877/0/06921619",
"title": "Online social media in the Syria conflict: Encompassing the extremes and the in-betweens",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2014/06921619/12OmNvzJG2s",
"parentPublication": {
"id": "proceedings/asonam/2014/5877/0",
"title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/passat-socialcom/2011/1931/0/06113109",
"title": "How (Not) to Predict Elections",
"doi": null,
"abstractUrl": "/proceedings-article/passat-socialcom/2011/06113109/12OmNyNzhxq",
"parentPublication": {
"id": "proceedings/passat-socialcom/2011/1931/0",
"title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2015/0379/0/0379a319",
"title": "Analysis and Transcoding Time Prediction of Online Videos",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2015/0379a319/12OmNyUnEIv",
"parentPublication": {
"id": "proceedings/ism/2015/0379/0",
"title": "2015 IEEE International Symposium on Multimedia (ISM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2016/2846/0/07752329",
"title": "An analysis of sentiments on facebook during the 2016 U.S. presidential election",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2016/07752329/12OmNzwZ6sA",
"parentPublication": {
"id": "proceedings/asonam/2016/2846/0",
"title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258165",
"title": "What's trending tomorrow, today: Using early adopters to discover popular posts on Tumblr",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258165/17D45Vu1TxP",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258161",
"title": "Online video ad measurement for political science research",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258161/17D45WHONkv",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icedeg/2019/1704/0/08734426",
"title": "Presidential Elections in Ecuador: Bot Presence in Twitter",
"doi": null,
"abstractUrl": "/proceedings-article/icedeg/2019/08734426/1aPuUUpy5La",
"parentPublication": {
"id": "proceedings/icedeg/2019/1704/0",
"title": "2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2020/1056/0/09381302",
"title": "Functional Analysis of the 2020 U.S. Elections on Twitter and Facebook using Machine Learning",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2020/09381302/1semBi1WgTK",
"parentPublication": {
"id": "proceedings/asonam/2020/1056/0",
"title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvlPkvm",
"title": "2011 International Workshop on Requirements Engineering for Electronic Voting Systems",
"acronym": "revote",
"groupId": "1800524",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCw3z6S",
"doi": "10.1109/REVOTE.2011.6045910",
"title": "Vote casting device with VV-SV-PAT for elections with complicated ballot papers",
"normalizedTitle": "Vote casting device with VV-SV-PAT for elections with complicated ballot papers",
"abstract": "Some ballots such as those for local elections in Germany contain more than 500 candidates, allow for more than 70 votes and the system allows voters to perform cumulative voting, vote splitting and crossing out of candidates which results in huge ballot papers containing only one race. As none of the existing electronic voting systems seem to be feasible for this kind of election we propose a new approach in this paper. The main idea is to have a vote casting device that does not store votes but only prints a summary of the selection voters made at device. This printout is put into the ballot box. In addition, to the human readable summary, the so called Voter Verifiable Summary of the Vote Paper Audit Trail (VV-SV-PAT) contains a 2D barcode which makes it easier to properly enter votes into the counting software. In addition, we propose an improvement for the counting software. With this approach we aim to support the actual procedure of vote casting and tallying by an accurate use of technology while at the same time preserving, or even improving, verifiability and usability compared to the traditional system.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Some ballots such as those for local elections in Germany contain more than 500 candidates, allow for more than 70 votes and the system allows voters to perform cumulative voting, vote splitting and crossing out of candidates which results in huge ballot papers containing only one race. As none of the existing electronic voting systems seem to be feasible for this kind of election we propose a new approach in this paper. The main idea is to have a vote casting device that does not store votes but only prints a summary of the selection voters made at device. This printout is put into the ballot box. In addition, to the human readable summary, the so called Voter Verifiable Summary of the Vote Paper Audit Trail (VV-SV-PAT) contains a 2D barcode which makes it easier to properly enter votes into the counting software. In addition, we propose an improvement for the counting software. With this approach we aim to support the actual procedure of vote casting and tallying by an accurate use of technology while at the same time preserving, or even improving, verifiability and usability compared to the traditional system.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Some ballots such as those for local elections in Germany contain more than 500 candidates, allow for more than 70 votes and the system allows voters to perform cumulative voting, vote splitting and crossing out of candidates which results in huge ballot papers containing only one race. As none of the existing electronic voting systems seem to be feasible for this kind of election we propose a new approach in this paper. The main idea is to have a vote casting device that does not store votes but only prints a summary of the selection voters made at device. This printout is put into the ballot box. In addition, to the human readable summary, the so called Voter Verifiable Summary of the Vote Paper Audit Trail (VV-SV-PAT) contains a 2D barcode which makes it easier to properly enter votes into the counting software. In addition, we propose an improvement for the counting software. With this approach we aim to support the actual procedure of vote casting and tallying by an accurate use of technology while at the same time preserving, or even improving, verifiability and usability compared to the traditional system.",
"fno": "06045910",
"keywords": [
"Bar Codes",
"Government Data Processing",
"Vote Casting Device",
"VV SV PAT",
"Complicated Ballot Paper Election",
"Germany",
"Cumulative Voting",
"Vote Splitting",
"Electronic Voting Systems",
"Human Readable Summary",
"Voter Verifiable Summary Of The Vote Paper Audit Trail",
"2 D Barcode",
"Counting Software",
"Nominations And Elections",
"Casting",
"Usability",
"Electronic Voting Systems",
"Monitoring",
"Proposals",
"Electronic Voting",
"Paper Audit Trail",
"Verifiability"
],
"authors": [
{
"affiliation": "SecUSo - Security, Usability and Society, Center for Advanced Security Research Darmstadt \\ Technische Universität Darmstadt, Darmstadt, Germany",
"fullName": "Melanie Volkamer",
"givenName": "Melanie",
"surname": "Volkamer",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "SecUSo - Security, Usability and Society, Center for Advanced Security Research Darmstadt \\ Technische Universität Darmstadt, Darmstadt, Germany",
"fullName": "Jurlind Budurushi",
"givenName": "Jurlind",
"surname": "Budurushi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "SecUSo - Security, Usability and Society, Center for Advanced Security Research Darmstadt \\ Technische Universität Darmstadt, Darmstadt, Germany",
"fullName": "Denise Demirel",
"givenName": "Denise",
"surname": "Demirel",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "revote",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1-8",
"year": "2011",
"issn": null,
"isbn": "978-1-4577-0953-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06045920",
"articleId": "12OmNCzb9vo",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06045911",
"articleId": "12OmNvTjZTj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/trustcom/2013/5022/0/5022b696",
"title": "Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2013/5022b696/12OmNALCNrQ",
"parentPublication": {
"id": "proceedings/trustcom/2013/5022/0",
"title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/waina/2015/1775/0/1775a293",
"title": "The Electronic Voting in the Presence of Rational Voters",
"doi": null,
"abstractUrl": "/proceedings-article/waina/2015/1775a293/12OmNBIWXCv",
"parentPublication": {
"id": "proceedings/waina/2015/1775/0",
"title": "2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom/2013/5022/0/5022a798",
"title": "Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2013/5022a798/12OmNBmf3bK",
"parentPublication": {
"id": "proceedings/trustcom/2013/5022/0",
"title": "2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/revote/2011/0953/0/06045912",
"title": "Vote verification through open standard: A roadmap",
"doi": null,
"abstractUrl": "/proceedings-article/revote/2011/06045912/12OmNBp52H5",
"parentPublication": {
"id": "proceedings/revote/2011/0953/0",
"title": "2011 International Workshop on Requirements Engineering for Electronic Voting Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/revote/2011/0953/0/06045913",
"title": "Ballot stuffing in a postal voting system",
"doi": null,
"abstractUrl": "/proceedings-article/revote/2011/06045913/12OmNqBKU4O",
"parentPublication": {
"id": "proceedings/revote/2011/0953/0",
"title": "2011 International Workshop on Requirements Engineering for Electronic Voting Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icccnt/2013/3926/0/06726801",
"title": "Implementation of authenticated and secure online voting system",
"doi": null,
"abstractUrl": "/proceedings-article/icccnt/2013/06726801/12OmNrAdsz3",
"parentPublication": {
"id": "proceedings/icccnt/2013/3926/0",
"title": "2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csf/2011/644/0/05992139",
"title": "Attacking and Fixing Helios: An Analysis of Ballot Secrecy",
"doi": null,
"abstractUrl": "/proceedings-article/csf/2011/05992139/12OmNscxj90",
"parentPublication": {
"id": "proceedings/csf/2011/644/0",
"title": "2011 IEEE 24th Computer Security Foundations Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2011/289/1/05750524",
"title": "A Multi-Candidates Electronic Election Scheme",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2011/05750524/12OmNzayNsk",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2004/01/j1038",
"title": "Secret-Ballot Receipts: True Voter-Verifiable Elections",
"doi": null,
"abstractUrl": "/magazine/sp/2004/01/j1038/13rRUxOdD6s",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isci/2021/0040/0/004000a047",
"title": "Verifiable receipt-free electronic voting system based on mask ballot",
"doi": null,
"abstractUrl": "/proceedings-article/isci/2021/004000a047/1Byed7IF4gU",
"parentPublication": {
"id": "proceedings/isci/2021/0040/0",
"title": "2021 IEEE 9th International Conference on Smart City and Informatization (iSCI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBcj5EB",
"title": "2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"acronym": "ipdpsw",
"groupId": "1800044",
"volume": "0",
"displayVolume": "0",
"year": "2018",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBRKwDr",
"doi": "10.1109/IPDPSW.2018.00050",
"title": "Sequence Alignment Through the Looking Glass",
"normalizedTitle": "Sequence Alignment Through the Looking Glass",
"abstract": "Rapid advances in sequencing technologies are producing genomic data on an unprecedented scale. The first, and often one of the most time consuming, step of genomic data analysis is sequence alignment, where sequenced reads must be aligned to a reference genome. Several years of research on alignment algorithms has led to the development of several state-of-the-art sequence aligners that can map tens of thousands of reads per second. In this work, we answer the question \"How do sequence aligners utilize modern processors?\" We examine four state-of-the-art aligners running on an Intel processor and identify that all aligners leave the processor substantially underutilized. We perform an in-depth microarchitectural analysis to explore the interaction between aligner software and processor hardware. We identify bottlenecks that lead to processor underutilization and discuss the implications of our analysis on next-generation sequence aligner design.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Rapid advances in sequencing technologies are producing genomic data on an unprecedented scale. The first, and often one of the most time consuming, step of genomic data analysis is sequence alignment, where sequenced reads must be aligned to a reference genome. Several years of research on alignment algorithms has led to the development of several state-of-the-art sequence aligners that can map tens of thousands of reads per second. In this work, we answer the question \"How do sequence aligners utilize modern processors?\" We examine four state-of-the-art aligners running on an Intel processor and identify that all aligners leave the processor substantially underutilized. We perform an in-depth microarchitectural analysis to explore the interaction between aligner software and processor hardware. We identify bottlenecks that lead to processor underutilization and discuss the implications of our analysis on next-generation sequence aligner design.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Rapid advances in sequencing technologies are producing genomic data on an unprecedented scale. The first, and often one of the most time consuming, step of genomic data analysis is sequence alignment, where sequenced reads must be aligned to a reference genome. Several years of research on alignment algorithms has led to the development of several state-of-the-art sequence aligners that can map tens of thousands of reads per second. In this work, we answer the question \"How do sequence aligners utilize modern processors?\" We examine four state-of-the-art aligners running on an Intel processor and identify that all aligners leave the processor substantially underutilized. We perform an in-depth microarchitectural analysis to explore the interaction between aligner software and processor hardware. We identify bottlenecks that lead to processor underutilization and discuss the implications of our analysis on next-generation sequence aligner design.",
"fno": "555501a257",
"keywords": [
"Bioinformatics",
"Data Analysis",
"Genomics",
"Aligner Software",
"Next Generation Sequence Aligner Design",
"Sequence Alignment",
"Sequencing Technologies",
"Genomic Data Analysis",
"Looking Glass",
"Unprecedented Scale",
"Intel Processor",
"In Depth Microarchitectural Analysis",
"Processor Hardware",
"Program Processors",
"Genomics",
"Bioinformatics",
"Microarchitecture",
"Hardware",
"Iron",
"Sequence Alignment",
"Genomics",
"Microarchitecture"
],
"authors": [
{
"affiliation": null,
"fullName": "Raja Appuswamy",
"givenName": "Raja",
"surname": "Appuswamy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jacques Fellay",
"givenName": "Jacques",
"surname": "Fellay",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Nimisha Chaturvedi",
"givenName": "Nimisha",
"surname": "Chaturvedi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipdpsw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2018-05-01T00:00:00",
"pubType": "proceedings",
"pages": "257-266",
"year": "2018",
"issn": null,
"isbn": "978-1-5386-5555-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "555501a247",
"articleId": "12OmNyOq4Wr",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "555501a267",
"articleId": "12OmNxA3Z1J",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isca/2018/5984/0/598401a069",
"title": "GenAx: A Genome Sequencing Accelerator",
"doi": null,
"abstractUrl": "/proceedings-article/isca/2018/598401a069/12OmNAXPy7R",
"parentPublication": {
"id": "proceedings/isca/2018/5984/0",
"title": "2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcc/2016/1853/0/07786171",
"title": "CS2A: A Compressed Suffix Array-Based Method for Short Read Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/dcc/2016/07786171/12OmNCdTeOi",
"parentPublication": {
"id": "proceedings/dcc/2016/1853/0",
"title": "2016 Data Compression Conference (DCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fccm/2016/2356/0/2356a032",
"title": "The SMEM Seeding Acceleration for DNA Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/fccm/2016/2356a032/12OmNxFsmwE",
"parentPublication": {
"id": "proceedings/fccm/2016/2356/0",
"title": "2016 IEEE 24th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2012/4676/0/4676c498",
"title": "Sequence Alignment on Massively Parallel Heterogeneous Systems",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2012/4676c498/12OmNyL0TKq",
"parentPublication": {
"id": "proceedings/ipdpsw/2012/4676/0",
"title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase-i-spa/2015/7952/3/07345647",
"title": "Scalable RNA Sequencing on Clusters of Multicore Processors",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2015/07345647/12OmNzIUfOL",
"parentPublication": {
"id": "trustcom-bigdatase-i-spa/2015/7952/3",
"title": "2015 IEEE Trustcom/BigDataSE/ISPA",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpcc-euc/2013/5088/0/06831934",
"title": "A FPGA-Based High Performance Acceleration Platform for the Next Generation Long Read Mapping",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-euc/2013/06831934/12OmNzdoMOl",
"parentPublication": {
"id": "proceedings/hpcc-euc/2013/5088/0",
"title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2014/05/06822570",
"title": "Accelerating the Next Generation Long Read Mapping with the FPGA-Based System",
"doi": null,
"abstractUrl": "/journal/tb/2014/05/06822570/13rRUxD9h3E",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2015/05/07010005",
"title": "Concurrent and Accurate Short Read Mapping on Multicore Processors",
"doi": null,
"abstractUrl": "/journal/tb/2015/05/07010005/13rRUxOdD6Q",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdpsw/2022/9747/0/974700a144",
"title": "Optimizing the Accuracy of Randomized Embedding for Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/ipdpsw/2022/974700a144/1Fu9wnVxLgY",
"parentPublication": {
"id": "proceedings/ipdpsw/2022/9747/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2019/1246/0/124600a451",
"title": "Accelerating Sequence Alignment to Graphs",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2019/124600a451/1cYhQ7fcl20",
"parentPublication": {
"id": "proceedings/ipdps/2019/1246/0",
"title": "2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBBhN9F",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"acronym": "cit",
"groupId": "1001306",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBTawvF",
"doi": "10.1109/CIT.2008.4594729",
"title": "A compressing method for genome sequence cluster using sequence alignment",
"normalizedTitle": "A compressing method for genome sequence cluster using sequence alignment",
"abstract": "After identifying the function of a protein, biologists produce new useful proteins by substituting some residues of the identified protein. These new proteins have high sequence homology (similarity). We define a sequence cluster as a cluster that is constituted of similar sequences. As another example of a sequence cluster, we consider a SNP (single nucleotide polymorphism) cluster. A SNP is a DNA sequence variation occurring when a single nucleotide in the genome (or other shared sequence) differs between members of a species (or between paired chromosomes in an individual). We suggest a new compressing technique for these sequence clusters using a sequence alignment method. We select a representative sequence which has a minimum sequence distance in the cluster by scanning distances of all sequences. The distances are obtained by calculating a sequence alignment score. The result of this sequence alignment is utilized to author conversion information called an edit-script between the two sequences. We only stored representative sequences and edit-scripts of each cluster into a database. Member sequences of each cluster can then be easily created using representative sequences and edit-scripts.",
"abstracts": [
{
"abstractType": "Regular",
"content": "After identifying the function of a protein, biologists produce new useful proteins by substituting some residues of the identified protein. These new proteins have high sequence homology (similarity). We define a sequence cluster as a cluster that is constituted of similar sequences. As another example of a sequence cluster, we consider a SNP (single nucleotide polymorphism) cluster. A SNP is a DNA sequence variation occurring when a single nucleotide in the genome (or other shared sequence) differs between members of a species (or between paired chromosomes in an individual). We suggest a new compressing technique for these sequence clusters using a sequence alignment method. We select a representative sequence which has a minimum sequence distance in the cluster by scanning distances of all sequences. The distances are obtained by calculating a sequence alignment score. The result of this sequence alignment is utilized to author conversion information called an edit-script between the two sequences. We only stored representative sequences and edit-scripts of each cluster into a database. Member sequences of each cluster can then be easily created using representative sequences and edit-scripts.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "After identifying the function of a protein, biologists produce new useful proteins by substituting some residues of the identified protein. These new proteins have high sequence homology (similarity). We define a sequence cluster as a cluster that is constituted of similar sequences. As another example of a sequence cluster, we consider a SNP (single nucleotide polymorphism) cluster. A SNP is a DNA sequence variation occurring when a single nucleotide in the genome (or other shared sequence) differs between members of a species (or between paired chromosomes in an individual). We suggest a new compressing technique for these sequence clusters using a sequence alignment method. We select a representative sequence which has a minimum sequence distance in the cluster by scanning distances of all sequences. The distances are obtained by calculating a sequence alignment score. The result of this sequence alignment is utilized to author conversion information called an edit-script between the two sequences. We only stored representative sequences and edit-scripts of each cluster into a database. Member sequences of each cluster can then be easily created using representative sequences and edit-scripts.",
"fno": "04594729",
"keywords": [
"DNA",
"Genetics",
"Image Coding",
"Image Representation",
"Image Sequences",
"Medical Image Processing",
"Compressing Method",
"Genome Sequence Cluster",
"Sequence Alignment",
"High Sequence Homology",
"Single Nucleotide Polymorphism",
"Genomes",
"Edit Script Conversion Information",
"Proteins",
"Distance Measurement",
"Matrices",
"Databases",
"DNA",
"Bioinformatics",
"Indexes"
],
"authors": [
{
"affiliation": "Database/Bioinformatics Laboratory, Chungbuk National University, Korea",
"fullName": "Kwang Su Jung",
"givenName": null,
"surname": "Kwang Su Jung",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Database/Bioinformatics Laboratory, Chungbuk National University, Korea",
"fullName": "Nam Hee Yu",
"givenName": null,
"surname": "Nam Hee Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Divison of IT, Hansei Univiersity, Korea",
"fullName": "Seung Jung Shin",
"givenName": null,
"surname": "Seung Jung Shin",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Database/Bioinformatics Laboratory, Chungbuk National University, Korea",
"fullName": "Keun Ho Ryu",
"givenName": null,
"surname": "Keun Ho Ryu",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "cit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "",
"year": "2008",
"issn": null,
"isbn": "978-1-4244-2357-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04594728",
"articleId": "12OmNyYDDEb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04594730",
"articleId": "12OmNwdtwes",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/isise/2008/3494/2/3494b683",
"title": "An Improved Ant Colony Algorithm for DNA Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/isise/2008/3494b683/12OmNBajTKC",
"parentPublication": {
"id": "proceedings/isise/2008/3494/2",
"title": "2008 International Symposium on Information Science and Engineering (ISISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibmw/2010/8303/0/05703803",
"title": "CORAL-M: Heuristic coding region alignment method for multiple genome sequences",
"doi": null,
"abstractUrl": "/proceedings-article/bibmw/2010/05703803/12OmNvD8Ryi",
"parentPublication": {
"id": "proceedings/bibmw/2010/8303/0",
"title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2016/4840/0/4840a391",
"title": "Study on the Relation between Virus and Host Cell by Alignment-Free Sequence Comparison",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2016/4840a391/12OmNyuPLkd",
"parentPublication": {
"id": "proceedings/cis/2016/4840/0",
"title": "2016 12th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2017/3800/0/3800a462",
"title": "RESTRAC: REference Sequence Based Space TRAnsformation for Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2017/3800a462/12OmNzZWbEp",
"parentPublication": {
"id": "proceedings/icdmw/2017/3800/0",
"title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2013/04/ttb2013040884",
"title": "A Knowledge-Based Multiple-Sequence Alignment Algorithm",
"doi": null,
"abstractUrl": "/journal/tb/2013/04/ttb2013040884/13rRUwIF67E",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pact/2019/3613/0/361300a459",
"title": "POSTER: BioSEAL: In-Memory Biological Sequence Alignment Accelerator for Large-Scale Genomic Data",
"doi": null,
"abstractUrl": "/proceedings-article/pact/2019/361300a459/1eLy3gHB8HK",
"parentPublication": {
"id": "proceedings/pact/2019/3613/0",
"title": "2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icict/2020/7283/0/728300a361",
"title": "Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S)",
"doi": null,
"abstractUrl": "/proceedings-article/icict/2020/728300a361/1jPb7N7qnok",
"parentPublication": {
"id": "proceedings/icict/2020/7283/0",
"title": "2020 3rd International Conference on Information and Computer Technologies (ICICT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2020/6215/0/09313429",
"title": "SLPal: Accelerating Long Sequence Alignment on Many-Core and Multi-Core Architectures",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2020/09313429/1qmg3yFdVio",
"parentPublication": {
"id": "proceedings/bibm/2020/6215/0",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicas/2020/9085/0/908500a156",
"title": "Application of Genome Sequence Based on Entropy Coding",
"doi": null,
"abstractUrl": "/proceedings-article/icicas/2020/908500a156/1sZ369Jp6kE",
"parentPublication": {
"id": "proceedings/icicas/2020/9085/0",
"title": "2020 International Conference on Intelligent Computing, Automation and Systems (ICICAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2022/06/09614999",
"title": "DiagAF: A More Accurate and Efficient Pre-Alignment Filter for Sequence Alignment",
"doi": null,
"abstractUrl": "/journal/tb/2022/06/09614999/1yygIpRMdS8",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNAWpylb",
"title": "2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum",
"acronym": "ipdpsw",
"groupId": "1800044",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyL0TKq",
"doi": "10.1109/IPDPSW.2012.311",
"title": "Sequence Alignment on Massively Parallel Heterogeneous Systems",
"normalizedTitle": "Sequence Alignment on Massively Parallel Heterogeneous Systems",
"abstract": "Bioinformatics is a quickly emerging area of science with many important applications to human life. Sequence alignment in various forms is one of the main instruments used in bioinformatics. This work is motivated by the ever-increasing amount of sequence data that requires more and more computation power for its processing. This task calls for new GPU-based systems and their higher computational potential and energy efficiency as compared to CPUs. We address the problem of facilitating faster sequence alignment using modern multi-GPU clusters. Our initial step was to develop a fast and scalable GPU exact short sequence aligner. We used matching algorithm with small memory footprint based on Burrows-Wheeler transform. We developed a mathematical model of computation and communication costs to find optimal memory partitioning strategy for index and queries. Our solution achieves 10 times speedup over previous implementation based on suffix array on one GPU and scales to multiple GPUs. Our next step will be to adapt the suggested data structure and performance model for multi-node multi-GPU approximate sequence alignment. It is also planned to use exact matching to detect common regions in large sequences and use it as an intermediate step in full-scale genome comparison.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Bioinformatics is a quickly emerging area of science with many important applications to human life. Sequence alignment in various forms is one of the main instruments used in bioinformatics. This work is motivated by the ever-increasing amount of sequence data that requires more and more computation power for its processing. This task calls for new GPU-based systems and their higher computational potential and energy efficiency as compared to CPUs. We address the problem of facilitating faster sequence alignment using modern multi-GPU clusters. Our initial step was to develop a fast and scalable GPU exact short sequence aligner. We used matching algorithm with small memory footprint based on Burrows-Wheeler transform. We developed a mathematical model of computation and communication costs to find optimal memory partitioning strategy for index and queries. Our solution achieves 10 times speedup over previous implementation based on suffix array on one GPU and scales to multiple GPUs. Our next step will be to adapt the suggested data structure and performance model for multi-node multi-GPU approximate sequence alignment. It is also planned to use exact matching to detect common regions in large sequences and use it as an intermediate step in full-scale genome comparison.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Bioinformatics is a quickly emerging area of science with many important applications to human life. Sequence alignment in various forms is one of the main instruments used in bioinformatics. This work is motivated by the ever-increasing amount of sequence data that requires more and more computation power for its processing. This task calls for new GPU-based systems and their higher computational potential and energy efficiency as compared to CPUs. We address the problem of facilitating faster sequence alignment using modern multi-GPU clusters. Our initial step was to develop a fast and scalable GPU exact short sequence aligner. We used matching algorithm with small memory footprint based on Burrows-Wheeler transform. We developed a mathematical model of computation and communication costs to find optimal memory partitioning strategy for index and queries. Our solution achieves 10 times speedup over previous implementation based on suffix array on one GPU and scales to multiple GPUs. Our next step will be to adapt the suggested data structure and performance model for multi-node multi-GPU approximate sequence alignment. It is also planned to use exact matching to detect common regions in large sequences and use it as an intermediate step in full-scale genome comparison.",
"fno": "4676c498",
"keywords": [
"Indexes",
"Graphics Processing Unit",
"Bioinformatics",
"Genomics",
"Performance Evaluation",
"Arrays",
"Complexity Theory",
"Burrows Wheeler Transform",
"GPU",
"Alignment"
],
"authors": [
{
"affiliation": null,
"fullName": "Aleksandr Drozd",
"givenName": "Aleksandr",
"surname": "Drozd",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Naoya Maruyama",
"givenName": "Naoya",
"surname": "Maruyama",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Satoshi Matsuoka",
"givenName": "Satoshi",
"surname": "Matsuoka",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ipdpsw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-05-01T00:00:00",
"pubType": "proceedings",
"pages": "2498-2501",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-0974-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4676c494",
"articleId": "12OmNylboND",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4676c502",
"articleId": "12OmNxFsmMC",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/sccompanion/2012/4956/0/4956b471",
"title": "Abstract: Multiple Pairwise Sequence Alignments with the Needleman-Wunsch Algorithm on GPU",
"doi": null,
"abstractUrl": "/proceedings-article/sccompanion/2012/4956b471/12OmNAnMuJR",
"parentPublication": {
"id": "proceedings/sccompanion/2012/4956/0",
"title": "2012 SC Companion: High Performance Computing, Networking Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isise/2008/3494/2/3494b683",
"title": "An Improved Ant Colony Algorithm for DNA Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/isise/2008/3494b683/12OmNBajTKC",
"parentPublication": {
"id": "proceedings/isise/2008/3494/2",
"title": "2008 International Symposium on Information Science and Engineering (ISISE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asap/2009/3732/0/3732a121",
"title": "MSA-CUDA: Multiple Sequence Alignment on Graphics Processing Units with CUDA",
"doi": null,
"abstractUrl": "/proceedings-article/asap/2009/3732a121/12OmNvq5jHD",
"parentPublication": {
"id": "proceedings/asap/2009/3732/0",
"title": "2009 20th IEEE International Conference on Application-specific Systems, Architectures and Processors",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sccompanion/2012/4956/0/4956b473",
"title": "Poster: Multiple Pairwise Sequence Alignments with the Needleman-Wunsch Algorithm on GPU",
"doi": null,
"abstractUrl": "/proceedings-article/sccompanion/2012/4956b473/12OmNwFzO2A",
"parentPublication": {
"id": "proceedings/sccompanion/2012/4956/0",
"title": "2012 SC Companion: High Performance Computing, Networking Storage and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccis/2011/4501/0/4501a018",
"title": "Accelerating Biological Sequence Alignment Algorithm on GPU with CUDA",
"doi": null,
"abstractUrl": "/proceedings-article/iccis/2011/4501a018/12OmNx5GU76",
"parentPublication": {
"id": "proceedings/iccis/2011/4501/0",
"title": "2011 International Conference on Computational and Information Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icit/2008/3513/0/3513a089",
"title": "Pairwise DNA Alignment with Sequence Specific Transition-Transversion Ratio Using Multiple Parameter Sets",
"doi": null,
"abstractUrl": "/proceedings-article/icit/2008/3513a089/12OmNxWLTmg",
"parentPublication": {
"id": "proceedings/icit/2008/3513/0",
"title": "2008 International Conference on Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccabs/2011/4851/0/226",
"title": "Efficient pairwise statistical significance estimation for local sequence alignment using GPU",
"doi": null,
"abstractUrl": "/proceedings-article/iccabs/2011/226/12OmNyLiutN",
"parentPublication": {
"id": "proceedings/iccabs/2011/4851/0",
"title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ahs/2009/3714/0/3714a439",
"title": "Performance Analysis of IBM Cell Broadband Engine on Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/ahs/2009/3714a439/12OmNz3bdBJ",
"parentPublication": {
"id": "proceedings/ahs/2009/3714/0",
"title": "Adaptive Hardware and Systems, NASA/ESA Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2010/01/ttc2010010029",
"title": "Network-on-Chip Hardware Accelerators for Biological Sequence Alignment",
"doi": null,
"abstractUrl": "/journal/tc/2010/01/ttc2010010029/13rRUwbaqU2",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2007/09/l1270",
"title": "Streaming Algorithms for Biological Sequence Alignment on GPUs",
"doi": null,
"abstractUrl": "/journal/td/2007/09/l1270/13rRUxBJhFb",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNyQYteY",
"title": "2017 IEEE 13th International Conference on e-Science (e-Science)",
"acronym": "e-science",
"groupId": "1001511",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzBOhAe",
"doi": "10.1109/eScience.2017.59",
"title": "Accelerating Genome Sequence Alignment on Hadoop on Lustre Environment",
"normalizedTitle": "Accelerating Genome Sequence Alignment on Hadoop on Lustre Environment",
"abstract": "Genome sequence alignment is one of the basic procedure of genome sequencing analysis pipeline and also one of the most time-consuming parts. Including BigBWA, a number of tools were proposed to accelerate genome sequence alignment by parallelizing computation with Hadoop technologies. However, HDFS incurs considerable I/O overhead. In this research, we propose a new sequence alignment tool adopting Hadoop on Lustre. Based on BigBWA, we removed data transfer overhead caused by HDFS and parallelized whole I/O steps. Experimental result shows that our solution is five times faster than original BigBWA in a ten-node Lustre based Hadoop cluster.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Genome sequence alignment is one of the basic procedure of genome sequencing analysis pipeline and also one of the most time-consuming parts. Including BigBWA, a number of tools were proposed to accelerate genome sequence alignment by parallelizing computation with Hadoop technologies. However, HDFS incurs considerable I/O overhead. In this research, we propose a new sequence alignment tool adopting Hadoop on Lustre. Based on BigBWA, we removed data transfer overhead caused by HDFS and parallelized whole I/O steps. Experimental result shows that our solution is five times faster than original BigBWA in a ten-node Lustre based Hadoop cluster.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Genome sequence alignment is one of the basic procedure of genome sequencing analysis pipeline and also one of the most time-consuming parts. Including BigBWA, a number of tools were proposed to accelerate genome sequence alignment by parallelizing computation with Hadoop technologies. However, HDFS incurs considerable I/O overhead. In this research, we propose a new sequence alignment tool adopting Hadoop on Lustre. Based on BigBWA, we removed data transfer overhead caused by HDFS and parallelized whole I/O steps. Experimental result shows that our solution is five times faster than original BigBWA in a ten-node Lustre based Hadoop cluster.",
"fno": "08109164",
"keywords": [
"Biology Computing",
"Cloud Computing",
"Data Handling",
"Genetics",
"Genomics",
"Message Passing",
"Parallel Processing",
"Public Domain Software",
"Genome Sequence Alignment",
"Genome Sequencing Analysis Pipeline",
"Sequence Alignment Tool",
"Lustre Environment",
"Big BWA",
"HDFS",
"I O Overhead",
"Ten Node Lustre Based Hadoop Cluster",
"Bioinformatics",
"Genomics",
"Tools",
"Pipelines",
"Acceleration",
"Sequential Analysis",
"Sequences",
"Genome Sequence Alignment",
"Next Generation Sequencing",
"Pipeline",
"Hadoop On Lustre",
"Parallel I O"
],
"authors": [
{
"affiliation": "Korea Inst. of Sci. & Technol. Inf., Daejeon, South Korea",
"fullName": "Eun-Kyu Byun",
"givenName": "Eun-Kyu",
"surname": "Byun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Korea Inst. of Sci. & Technol. Inf., Daejeon, South Korea",
"fullName": "Junehawk Lee",
"givenName": "Junehawk",
"surname": "Lee",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Korea Inst. of Sci. & Technol. Inf., Daejeon, South Korea",
"fullName": "Seok Jong Yu",
"givenName": "Seok Jong",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Korea Inst. of Sci. & Technol. Inf., Daejeon, South Korea",
"fullName": "Jae-Hyuck Kwak",
"givenName": "Jae-Hyuck",
"surname": "Kwak",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Korea Inst. of Sci. & Technol. Inf., Daejeon, South Korea",
"fullName": "Soonwook Hwang",
"givenName": "Soonwook",
"surname": "Hwang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "e-science",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-10-01T00:00:00",
"pubType": "proceedings",
"pages": "436-437",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2686-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08109163",
"articleId": "12OmNy49sE4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08109165",
"articleId": "12OmNC1Y5pn",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cluster/2017/2326/0/2326a661",
"title": "Accelerating Smith-Waterman Alignment Workload with Scalable Vector Computing",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2017/2326a661/12OmNBKmXfJ",
"parentPublication": {
"id": "proceedings/cluster/2017/2326/0",
"title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/issrew/2014/7377/0/7377a051",
"title": "Performability Comparison of Lustre and HDFS for MR Applications",
"doi": null,
"abstractUrl": "/proceedings-article/issrew/2014/7377a051/12OmNwF0BPn",
"parentPublication": {
"id": "proceedings/issrew/2014/7377/0",
"title": "2014 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cgc/2012/3027/0/06382892",
"title": "Hadoop-Based Genome Comparisons",
"doi": null,
"abstractUrl": "/proceedings-article/cgc/2012/06382892/12OmNwFid5s",
"parentPublication": {
"id": "proceedings/cgc/2012/3027/0",
"title": "2012 International Conference on Cloud and Green Computing (CGC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpads/2013/2081/0/2081a426",
"title": "Accelerating De Bruijn Graph-Based Genome Assembly for High-Throughput Short Read Data",
"doi": null,
"abstractUrl": "/proceedings-article/icpads/2013/2081a426/12OmNyQGS8J",
"parentPublication": {
"id": "proceedings/icpads/2013/2081/0",
"title": "2013 International Conference on Parallel and Distributed Systems (ICPADS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2018/5520/0/552000b216",
"title": "Scalable De Novo Genome Assembly Using Pregel",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2018/552000b216/14Fq0UEfx1Y",
"parentPublication": {
"id": "proceedings/icde/2018/5520/0",
"title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hpca/2019/1444/0/144400a359",
"title": "Darwin-WGA: A Co-processor Provides Increased Sensitivity in Whole Genome Alignments with High Speedup",
"doi": null,
"abstractUrl": "/proceedings-article/hpca/2019/144400a359/18M7Npxw84U",
"parentPublication": {
"id": "proceedings/hpca/2019/1444/0",
"title": "2019 IEEE International Symposium on High Performance Computer Architecture (HPCA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2019/2607/2/260702a183",
"title": "Modeling Genome Data Using Bidirectional LSTM",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2019/260702a183/1cYiotBhVoA",
"parentPublication": {
"id": "compsac/2019/2607/2",
"title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdcat/2019/2616/0/261600a041",
"title": "Accelerating Alignment for Short Reads Allowing Insertion of Gaps on Multi-Core Cluster",
"doi": null,
"abstractUrl": "/proceedings-article/pdcat/2019/261600a041/1iff1F08Tw4",
"parentPublication": {
"id": "proceedings/pdcat/2019/2616/0",
"title": "2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/mi/2020/05/09154510",
"title": "Accelerating Genome Analysis: A Primer on an Ongoing Journey",
"doi": null,
"abstractUrl": "/magazine/mi/2020/05/09154510/1lZzYVaH7lC",
"parentPublication": {
"id": "mags/mi",
"title": "IEEE Micro",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/micro/2020/7383/0/738300a951",
"title": "GenASM: A High-Performance, Low-Power Approximate String Matching Acceleration Framework for Genome Sequence Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/micro/2020/738300a951/1oFGCBpdTl6",
"parentPublication": {
"id": "proceedings/micro/2020/7383/0",
"title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1eLxZSVsOLC",
"title": "2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"acronym": "pact",
"groupId": "1000535",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1eLy3gHB8HK",
"doi": "10.1109/PACT.2019.00044",
"title": "POSTER: BioSEAL: In-Memory Biological Sequence Alignment Accelerator for Large-Scale Genomic Data",
"normalizedTitle": "POSTER: BioSEAL: In-Memory Biological Sequence Alignment Accelerator for Large-Scale Genomic Data",
"abstract": "Genome sequences contain hundreds of millions of DNA base pairs. Finding the degree of similarity between two genomes requires executing a compute-intensive dynamic programming algorithm, such as Smith-Waterman. Traditional von Neumann architectures have limited parallelism and cannot provide an efficient solution for large-scale genomic data. Approximate heuristic methods (e.g. BLAST) are commonly used. However, they are suboptimal and still compute-intensive. In this work, we present BioSEAL, a biological sequence alignment accelerator. BioSEAL is a massively parallel non-von Neumann processing-in-memory architecture for large-scale DNA and protein sequence alignment. BioSEAL is based on resistive content addressable memory, capable of energy-efficient and high-performance associative processing. We present an associative processing algorithm for entire database sequence alignment on BioSEAL and compare its performance and power consumption with state-of-art solutions. We show that BioSEAL can achieve up to 57x speedup and 156x better energy efficiency, compared with existing solutions for genome sequence alignment and protein sequence database search.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Genome sequences contain hundreds of millions of DNA base pairs. Finding the degree of similarity between two genomes requires executing a compute-intensive dynamic programming algorithm, such as Smith-Waterman. Traditional von Neumann architectures have limited parallelism and cannot provide an efficient solution for large-scale genomic data. Approximate heuristic methods (e.g. BLAST) are commonly used. However, they are suboptimal and still compute-intensive. In this work, we present BioSEAL, a biological sequence alignment accelerator. BioSEAL is a massively parallel non-von Neumann processing-in-memory architecture for large-scale DNA and protein sequence alignment. BioSEAL is based on resistive content addressable memory, capable of energy-efficient and high-performance associative processing. We present an associative processing algorithm for entire database sequence alignment on BioSEAL and compare its performance and power consumption with state-of-art solutions. We show that BioSEAL can achieve up to 57x speedup and 156x better energy efficiency, compared with existing solutions for genome sequence alignment and protein sequence database search.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Genome sequences contain hundreds of millions of DNA base pairs. Finding the degree of similarity between two genomes requires executing a compute-intensive dynamic programming algorithm, such as Smith-Waterman. Traditional von Neumann architectures have limited parallelism and cannot provide an efficient solution for large-scale genomic data. Approximate heuristic methods (e.g. BLAST) are commonly used. However, they are suboptimal and still compute-intensive. In this work, we present BioSEAL, a biological sequence alignment accelerator. BioSEAL is a massively parallel non-von Neumann processing-in-memory architecture for large-scale DNA and protein sequence alignment. BioSEAL is based on resistive content addressable memory, capable of energy-efficient and high-performance associative processing. We present an associative processing algorithm for entire database sequence alignment on BioSEAL and compare its performance and power consumption with state-of-art solutions. We show that BioSEAL can achieve up to 57x speedup and 156x better energy efficiency, compared with existing solutions for genome sequence alignment and protein sequence database search.",
"fno": "361300a459",
"keywords": [
"Bioinformatics",
"Biology Computing",
"Content Addressable Storage",
"DNA",
"Dynamic Programming",
"Genetics",
"Genomics",
"Molecular Biophysics",
"Proteins",
"Sequences",
"Approximate Heuristic Methods",
"Neumann Processing In Memory Architecture",
"Protein Sequence Alignment",
"Resistive Content Addressable Memory",
"High Performance Associative Processing",
"Associative Processing Algorithm",
"Entire Database Sequence Alignment",
"Energy Efficiency",
"Genome Sequence Alignment",
"Protein Sequence Database Search",
"Traditional Von Neumann Architectures",
"Compute Intensive Dynamic Programming Algorithm",
"DNA Base Pairs",
"Genome Sequences",
"Large Scale Genomic Data",
"In Memory Biological Sequence Alignment Accelerator",
"Bio SEAL",
"Bioinformatics",
"Genomics",
"Associative Processing",
"Databases",
"DNA",
"Proteins",
"Energy Efficiency",
"Processing In Memory",
"Memristors",
"Bioinformatics",
"Accelerator Architecture"
],
"authors": [
{
"affiliation": "Technion, Israel Institute of Technology",
"fullName": "Roman Kaplan",
"givenName": "Roman",
"surname": "Kaplan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Technion, Israel Institute of Technology",
"fullName": "Leonid Yavits",
"givenName": "Leonid",
"surname": "Yavits",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Technion, Israel Institute of Technology",
"fullName": "Ran Ginosar",
"givenName": "Ran",
"surname": "Ginosar",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "pact",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-09-01T00:00:00",
"pubType": "proceedings",
"pages": "459-460",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-3613-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "361300a457",
"articleId": "1eLy2UgIFlC",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "361300a461",
"articleId": "1eLy3tmaqe4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cluster/2017/2326/0/2326a661",
"title": "Accelerating Smith-Waterman Alignment Workload with Scalable Vector Computing",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2017/2326a661/12OmNBKmXfJ",
"parentPublication": {
"id": "proceedings/cluster/2017/2326/0",
"title": "2017 IEEE International Conference on Cluster Computing (CLUSTER)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cit/2008/2357/0/04594729",
"title": "A compressing method for genome sequence cluster using sequence alignment",
"doi": null,
"abstractUrl": "/proceedings-article/cit/2008/04594729/12OmNBTawvF",
"parentPublication": {
"id": "proceedings/cit/2008/2357/0",
"title": "2008 8th IEEE International Conference on Computer and Information Technology",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2015/7983/0/07367638",
"title": "Back translated peptide K-mer search and local alignment in large DNA sequence databases using BoND-SD-tree indexing",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2015/07367638/12OmNCfjep4",
"parentPublication": {
"id": "proceedings/bibe/2015/7983/0",
"title": "2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pdcat/2017/3151/0/315101a243",
"title": "A Parallel Pairwise Alignment with Pruning for Large Genomic Sequences",
"doi": null,
"abstractUrl": "/proceedings-article/pdcat/2017/315101a243/12OmNrkjVes",
"parentPublication": {
"id": "proceedings/pdcat/2017/3151/0",
"title": "2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/eait/2014/4272/0/4272a307",
"title": "A Genetic Approach with Controlled Crossover and Guided Mutation for Biological Sequence Alignment",
"doi": null,
"abstractUrl": "/proceedings-article/eait/2014/4272a307/12OmNwCaCvf",
"parentPublication": {
"id": "proceedings/eait/2014/4272/0",
"title": "2014 Fourth International Conference of Emerging Applications of Information Technology (EAIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2016/4840/0/4840a391",
"title": "Study on the Relation between Virus and Host Cell by Alignment-Free Sequence Comparison",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2016/4840a391/12OmNyuPLkd",
"parentPublication": {
"id": "proceedings/cis/2016/4840/0",
"title": "2016 12th International Conference on Computational Intelligence and Security (CIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2017/06/07501834",
"title": "A Survey of Software and Hardware Approaches to Performing Read Alignment in Next Generation Sequencing",
"doi": null,
"abstractUrl": "/journal/tb/2017/06/07501834/13rRUIM2VAj",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/mi/1995/02/m2070",
"title": "The AM3 Associative Processor",
"doi": null,
"abstractUrl": "/magazine/mi/1995/02/m2070/13rRUwIF663",
"parentPublication": {
"id": "mags/mi",
"title": "IEEE Micro",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2010/01/ttc2010010029",
"title": "Network-on-Chip Hardware Accelerators for Biological Sequence Alignment",
"doi": null,
"abstractUrl": "/journal/tc/2010/01/ttc2010010029/13rRUwbaqU2",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icict/2020/7283/0/728300a361",
"title": "Multiple Anchor Staged Alignment Algorithm – Sensitive (MASAA – S)",
"doi": null,
"abstractUrl": "/proceedings-article/icict/2020/728300a361/1jPb7N7qnok",
"parentPublication": {
"id": "proceedings/icict/2020/7283/0",
"title": "2020 3rd International Conference on Information and Computer Technologies (ICICT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1gAwR0WCegU",
"title": "2019 International Conference on Data Mining Workshops (ICDMW)",
"acronym": "icdmw",
"groupId": "1001620",
"volume": "0",
"displayVolume": "0",
"year": "2019",
"__typename": "ProceedingType"
},
"article": {
"id": "1gAwWQOl5eg",
"doi": "10.1109/ICDMW.2019.00139",
"title": "SeAlM: A Query Cache Optimization Technique for Next Generation Sequence Alignment",
"normalizedTitle": "SeAlM: A Query Cache Optimization Technique for Next Generation Sequence Alignment",
"abstract": "Genetic data from next-generation sequencing (NGS) technology is being produced at an ever increasing rate - already outpacing the well known Moore's Law. Due to this pace of NGS data generation, new methods are necessary in order to facilitate rapid sequence analysis at the enormous scale required. The need for such methods is further compounded by the dropping financial cost of sequencing, leading to the normalization of large-scale genome studies spanning entire populations. A key process in the genomic data analysis pipeline, and one that is often most time consuming, is read mapping or so-called alignment. This paper introduces Sequence Alignment Memorizer (SeAlM), a technique that reduces the number of redundant alignments to enable population-scale workloads. SeAlM uses a novel method for reordering alignment queries from multiple sources to create batches with increased likelihood of containing redundant queries that can be de-duplicated before alignment, while also ordering those batches to improve the ability to cache queries effectively. We show that our technique can improve the average throughput of alignment for a single human sample by 6.5% and a population of 10 human subjects by 13.6% -18.8% depending on the type of genetic data used.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Genetic data from next-generation sequencing (NGS) technology is being produced at an ever increasing rate - already outpacing the well known Moore's Law. Due to this pace of NGS data generation, new methods are necessary in order to facilitate rapid sequence analysis at the enormous scale required. The need for such methods is further compounded by the dropping financial cost of sequencing, leading to the normalization of large-scale genome studies spanning entire populations. A key process in the genomic data analysis pipeline, and one that is often most time consuming, is read mapping or so-called alignment. This paper introduces Sequence Alignment Memorizer (SeAlM), a technique that reduces the number of redundant alignments to enable population-scale workloads. SeAlM uses a novel method for reordering alignment queries from multiple sources to create batches with increased likelihood of containing redundant queries that can be de-duplicated before alignment, while also ordering those batches to improve the ability to cache queries effectively. We show that our technique can improve the average throughput of alignment for a single human sample by 6.5% and a population of 10 human subjects by 13.6% -18.8% depending on the type of genetic data used.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Genetic data from next-generation sequencing (NGS) technology is being produced at an ever increasing rate - already outpacing the well known Moore's Law. Due to this pace of NGS data generation, new methods are necessary in order to facilitate rapid sequence analysis at the enormous scale required. The need for such methods is further compounded by the dropping financial cost of sequencing, leading to the normalization of large-scale genome studies spanning entire populations. A key process in the genomic data analysis pipeline, and one that is often most time consuming, is read mapping or so-called alignment. This paper introduces Sequence Alignment Memorizer (SeAlM), a technique that reduces the number of redundant alignments to enable population-scale workloads. SeAlM uses a novel method for reordering alignment queries from multiple sources to create batches with increased likelihood of containing redundant queries that can be de-duplicated before alignment, while also ordering those batches to improve the ability to cache queries effectively. We show that our technique can improve the average throughput of alignment for a single human sample by 6.5% and a population of 10 human subjects by 13.6% -18.8% depending on the type of genetic data used.",
"fno": "489600a958",
"keywords": [
"Bioinformatics",
"Cache Storage",
"Data Analysis",
"Genetics",
"Genomics",
"Optimisation",
"Query Processing",
"Se Al M",
"Query Cache Optimization Technique",
"Genetic Data",
"Moores Law",
"NGS Data Generation",
"Genomic Data Analysis Pipeline",
"Next Generation Sequence Alignment",
"Sequence Alignment Memorizer",
"Genomics",
"Bioinformatics",
"Indexes",
"Sociology",
"Statistics",
"Sequential Analysis",
"Genomics Next Generation Sequencing Read Mapping Alignment Query Cache Optimization"
],
"authors": [
{
"affiliation": "University of Colorado, Denver",
"fullName": "Evan Stene",
"givenName": "Evan",
"surname": "Stene",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Colorado, Denver",
"fullName": "Farnoush Banaei-Kashani",
"givenName": "Farnoush",
"surname": "Banaei-Kashani",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdmw",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2019-11-01T00:00:00",
"pubType": "proceedings",
"pages": "958-965",
"year": "2019",
"issn": null,
"isbn": "978-1-7281-4896-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "489600a949",
"articleId": "1gAwXmzZENW",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "489600a966",
"articleId": "1gAwZJ3Rzu8",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/bibm/2016/1611/0/07822799",
"title": "Toward optimization-oriented NGS peak alignment within the context of Precision Medicine Initiative",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2016/07822799/12OmNCbU2TB",
"parentPublication": {
"id": "proceedings/bibm/2016/1611/0",
"title": "2016 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibmw/2010/8303/0/05703865",
"title": "A distributed system for fast alignment of next-generation sequencing data",
"doi": null,
"abstractUrl": "/proceedings-article/bibmw/2010/05703865/12OmNqAU6EK",
"parentPublication": {
"id": "proceedings/bibmw/2010/8303/0",
"title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217998",
"title": "Pysubsim-tree: A package for simulating tumor genomes according to tumor evolution history",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217998/12OmNroij8l",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2014/5669/0/06999128",
"title": "Quasispecies reconstruction based on vertex coloring algorithms",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2014/06999128/12OmNsd6vp2",
"parentPublication": {
"id": "proceedings/bibm/2014/5669/0",
"title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibm/2017/3050/0/08217654",
"title": "Noise cancellation for robust copy number variation detection using next generation sequencing data",
"doi": null,
"abstractUrl": "/proceedings-article/bibm/2017/08217654/12OmNwJPMV0",
"parentPublication": {
"id": "proceedings/bibm/2017/3050/0",
"title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2017/2686/0/08109164",
"title": "Accelerating Genome Sequence Alignment on Hadoop on Lustre Environment",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2017/08109164/12OmNzBOhAe",
"parentPublication": {
"id": "proceedings/e-science/2017/2686/0",
"title": "2017 IEEE 13th International Conference on e-Science (e-Science)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2017/06/07501834",
"title": "A Survey of Software and Hardware Approaches to Performing Read Alignment in Next Generation Sequencing",
"doi": null,
"abstractUrl": "/journal/tb/2017/06/07501834/13rRUIM2VAj",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2020/03/08462803",
"title": "Preprocessing Sequence Coverage Data for More Precise Detection of Copy Number Variations",
"doi": null,
"abstractUrl": "/journal/tb/2020/03/08462803/13w3lsuEzLO",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2022/11/09711928",
"title": "GANDAFL: Dataflow Acceleration for Short Read Alignment on NGS Data",
"doi": null,
"abstractUrl": "/journal/tc/2022/11/09711928/1AUknoTFk7m",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2021/12/09273234",
"title": "Genome Sequence Alignment - Design Space Exploration for Optimal Performance and Energy Architectures",
"doi": null,
"abstractUrl": "/journal/tc/2021/12/09273234/1pb9EXl36PS",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1qmfHK8AjMQ",
"title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1qmfVKcutfq",
"doi": "10.1109/BIBM49941.2020.9313475",
"title": "GenFooT: Genomic Footprint of mitochondrial sequence for Taxonomy classification",
"normalizedTitle": "GenFooT: Genomic Footprint of mitochondrial sequence for Taxonomy classification",
"abstract": "The annotation of the sequences plays an important role in the taxonomic characteristics, medical research, phylogenetic studies, etc. Most of the existing classification techniques focused on some distinct group of organisms and considered the specific fragments of genome sequence, such as particular gene or RNAs. Here, we introduce a novel representation of genome sequence in a 2D coordinate space and extract features from the 2D representation. These features are used to classify a set of species into different taxonomy ranks. We experiment our proposed method, GenFooT, on nine different datasets of genomic sequences of various organisms. Our experimental results indicate improved classification performance of the proposed features with both Linear discriminant analysis and Logistic regression classifiers. This study demonstrates that our proposed alignment-free method, GenFooT, is fast, accurate, and can be applied to the large-scale genomics studies.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The annotation of the sequences plays an important role in the taxonomic characteristics, medical research, phylogenetic studies, etc. Most of the existing classification techniques focused on some distinct group of organisms and considered the specific fragments of genome sequence, such as particular gene or RNAs. Here, we introduce a novel representation of genome sequence in a 2D coordinate space and extract features from the 2D representation. These features are used to classify a set of species into different taxonomy ranks. We experiment our proposed method, GenFooT, on nine different datasets of genomic sequences of various organisms. Our experimental results indicate improved classification performance of the proposed features with both Linear discriminant analysis and Logistic regression classifiers. This study demonstrates that our proposed alignment-free method, GenFooT, is fast, accurate, and can be applied to the large-scale genomics studies.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The annotation of the sequences plays an important role in the taxonomic characteristics, medical research, phylogenetic studies, etc. Most of the existing classification techniques focused on some distinct group of organisms and considered the specific fragments of genome sequence, such as particular gene or RNAs. Here, we introduce a novel representation of genome sequence in a 2D coordinate space and extract features from the 2D representation. These features are used to classify a set of species into different taxonomy ranks. We experiment our proposed method, GenFooT, on nine different datasets of genomic sequences of various organisms. Our experimental results indicate improved classification performance of the proposed features with both Linear discriminant analysis and Logistic regression classifiers. This study demonstrates that our proposed alignment-free method, GenFooT, is fast, accurate, and can be applied to the large-scale genomics studies.",
"fno": "09313475",
"keywords": [
"Bioinformatics",
"Feature Extraction",
"Genetics",
"Genomics",
"Linear Discriminant Analysis",
"Medical Computing",
"Molecular Biophysics",
"Pattern Classification",
"Regression Analysis",
"Genome Sequence",
"Particular Gene",
"2 D Coordinate Space",
"Different Taxonomy Ranks",
"Gen Foo T",
"Genomic Sequences",
"Organisms",
"Classification Performance",
"Large Scale Genomics Studies",
"Genomic Footprint",
"Mitochondrial Sequence",
"Taxonomy Classification",
"Existing Classification Techniques",
"Bioinformatics",
"Genomics",
"Taxonomy",
"Fungi",
"Two Dimensional Displays",
"Feature Extraction",
"DNA",
"Taxonomy Classification",
"Mitochondrial Genome",
"Genomic Footprint"
],
"authors": [
{
"affiliation": "Indian Institute of Technology,Department of Computer Science and Engineering,Kharagpur,India,721302",
"fullName": "Aritra Mahapatra",
"givenName": "Aritra",
"surname": "Mahapatra",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Indian Institute of Technology,Department of Computer Science and Engineering,Kharagpur,India,721302",
"fullName": "Jayanta Mukherjee",
"givenName": "Jayanta",
"surname": "Mukherjee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-12-01T00:00:00",
"pubType": "proceedings",
"pages": "88-91",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-6215-7",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09313185",
"articleId": "1qmfUw4iPgA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09313423",
"articleId": "1qmghJPbK3m",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cbms/2017/1710/0/1710a300",
"title": "Overlap Detection for a Genome Assembly Based on Genomic Signal Processing",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2017/1710a300/12OmNwvDQqF",
"parentPublication": {
"id": "proceedings/cbms/2017/1710/0",
"title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/passat-socialcom/2011/1931/0/06113275",
"title": "Using Private Matching for Securely Querying Genomic Sequences",
"doi": null,
"abstractUrl": "/proceedings-article/passat-socialcom/2011/06113275/12OmNzBwGuL",
"parentPublication": {
"id": "proceedings/passat-socialcom/2011/1931/0",
"title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2001/1423/0/00974417",
"title": "An XML application for genomic data interoperation",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2001/00974417/12OmNzlUKxP",
"parentPublication": {
"id": "proceedings/bibe/2001/1423/0",
"title": "Proceedings 2nd Annual IEEE International Symposium on Bioinformatics and Bioengineering (BIBE 2001)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tc/2017/03/07555354",
"title": "Framework for Supporting Genomic Operations",
"doi": null,
"abstractUrl": "/journal/tc/2017/03/07555354/13rRUwI5U7o",
"parentPublication": {
"id": "trans/tc",
"title": "IEEE Transactions on Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2017/06/07470248",
"title": "Benchmark Dataset for Whole Genome Sequence Compression",
"doi": null,
"abstractUrl": "/journal/tb/2017/06/07470248/13rRUxASutX",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bibe/2018/6217/0/247100a010",
"title": "Constructing the Relationship Tree of All Viruses via Whole Genomic Sequences",
"doi": null,
"abstractUrl": "/proceedings-article/bibe/2018/247100a010/17D45Vw15tg",
"parentPublication": {
"id": "proceedings/bibe/2018/6217/0",
"title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isvlsi/2022/6605/0/660500a283",
"title": "GenStore: In-Storage Filtering of Genomic Data for High-Performance and Energy-Efficient Genome Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/isvlsi/2022/660500a283/1HzBWIOBhy8",
"parentPublication": {
"id": "proceedings/isvlsi/2022/6605/0",
"title": "2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pact/2019/3613/0/361300a459",
"title": "POSTER: BioSEAL: In-Memory Biological Sequence Alignment Accelerator for Large-Scale Genomic Data",
"doi": null,
"abstractUrl": "/proceedings-article/pact/2019/361300a459/1eLy3gHB8HK",
"parentPublication": {
"id": "proceedings/pact/2019/3613/0",
"title": "2019 28th International Conference on Parallel Architectures and Compilation Techniques (PACT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2021/02/09057397",
"title": "Foretelling the Phenotype of a Genomic Sequence",
"doi": null,
"abstractUrl": "/journal/tb/2021/02/09057397/1iQaaTCCOuA",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicas/2020/9085/0/908500a156",
"title": "Application of Genome Sequence Based on Entropy Coding",
"doi": null,
"abstractUrl": "/proceedings-article/icicas/2020/908500a156/1sZ369Jp6kE",
"parentPublication": {
"id": "proceedings/icicas/2020/9085/0",
"title": "2020 International Conference on Intelligent Computing, Automation and Systems (ICICAS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNz2kqri",
"title": "2005 IEEE International Symposium on Signal Processing and Information Technology",
"acronym": "isspit",
"groupId": "1001026",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNAXxXeS",
"doi": "10.1109/ISSPIT.2005.1577214",
"title": "An efficient parameter selection criterion for image denoising",
"normalizedTitle": "An efficient parameter selection criterion for image denoising",
"abstract": "The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The performance of most image denoising systems depends on some parameters which should be set carefully based on noise distribution and its variance. As in some applications noise characteristics are unknown, in this research, a criterion which its minimization leads to the best parameter set up is introduced. The proposed criterion is evaluated for the wavelet shrinkage image denoising algorithm using the cross validation procedure. The criterion is tested for some different values of thresholds, and the output leading to the minimum criterion value is selected as the final denoised output. The resulting outputs of our method and the previous threshold selection scheme for the wavelet shrinkage, i.e. the median absolute difference (MAD), are compared. The objective and subjective test results show the improved efficiency of the proposed denoising algorithm.",
"fno": "01577214",
"keywords": [
"Median Absolute Difference",
"Parameter Selection Criterion",
"Image Denoising",
"Noise Distribution",
"Wavelet Shrinkage"
],
"authors": [
{
"affiliation": "Multimedia Res. Lab., Sharif Univ. of Technol., Tehran, Iran",
"fullName": "H. Pirsiavash",
"givenName": "H.",
"surname": "Pirsiavash",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "S. Kasaei",
"givenName": "S.",
"surname": "Kasaei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "F. Marvasti",
"givenName": "F.",
"surname": "Marvasti",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isspit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-12-01T00:00:00",
"pubType": "proceedings",
"pages": "872-877",
"year": "2005",
"issn": null,
"isbn": "0-7803-9313-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "01577213",
"articleId": "12OmNCzsKGb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "01577215",
"articleId": "12OmNAgY7nX",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cicn/2011/4587/0/4587a052",
"title": "A Novel Wavelet-Based Denoising Method of SAR Image Using Interscale Dependency",
"doi": null,
"abstractUrl": "/proceedings-article/cicn/2011/4587a052/12OmNCm7BFQ",
"parentPublication": {
"id": "proceedings/cicn/2011/4587/0",
"title": "Computational Intelligence and Communication Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aici/2010/4225/2/4225b082",
"title": "The Adaptive Bivariate Shrinkage Denoising Method",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2010/4225b082/12OmNCulYjZ",
"parentPublication": {
"id": "proceedings/aici/2010/4225/2",
"title": "Artificial Intelligence and Computational Intelligence, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ias/2009/3744/2/3744b497",
"title": "A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/ias/2009/3744b497/12OmNvBIRNv",
"parentPublication": {
"id": "proceedings/ias/2009/3744/2",
"title": "Information Assurance and Security, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2001/1330/0/13300172",
"title": "Adaptative Image Denoising in Scale-Space Using the Wavelet Transform",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2001/13300172/12OmNvTTcav",
"parentPublication": {
"id": "proceedings/sibgrapi/2001/1330/0",
"title": "Proceedings XIV Brazilian Symposium on Computer Graphics and Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/imsccs/2006/2581/1/25810220",
"title": "Research on a Denoising Method Based on Wavelet Packet Shrinkage for Pulp",
"doi": null,
"abstractUrl": "/proceedings-article/imsccs/2006/25810220/12OmNvlg8fl",
"parentPublication": {
"id": "proceedings/imsccs/2006/2581/1",
"title": "Computer and Computational Sciences, International Multi-Symposiums on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acssc/1997/8316/2/00679193",
"title": "Wavelet approaches to still image denoising",
"doi": null,
"abstractUrl": "/proceedings-article/acssc/1997/00679193/12OmNx5piSN",
"parentPublication": {
"id": "proceedings/acssc/1997/8316/2",
"title": "Conference Record of the Thirty-First Asilomar Conference on Signals, Systems and Computers (Cat. No.97CB36163)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sibgrapi/2009/3813/0/3813a156",
"title": "GSAShrink: A Novel Iterative Approach for Wavelet-Based Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/sibgrapi/2009/3813a156/12OmNyugyHV",
"parentPublication": {
"id": "proceedings/sibgrapi/2009/3813/0",
"title": "2009 XXII Brazilian Symposium on Computer Graphics and Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mediacom/2010/4136/0/4136a175",
"title": "The Application of Estimation Method Based on Improved Wavelet Coefficients for Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/mediacom/2010/4136a175/12OmNyv7mdz",
"parentPublication": {
"id": "proceedings/mediacom/2010/4136/0",
"title": "2010 International Conference on Multimedia Communications (Mediacom 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ijcnn/2000/0619/5/06195479",
"title": "A Simplified ICA Based Denoising Method",
"doi": null,
"abstractUrl": "/proceedings-article/ijcnn/2000/06195479/12OmNzG4gyG",
"parentPublication": {
"id": "proceedings/ijcnn/2000/0619/5",
"title": "Neural Networks, IEEE - INNS - ENNS International Joint Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997b616",
"title": "Shearlet-Based Adaptive Shrinkage Threshold for Image Denoising",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997b616/12OmNzvQHYL",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNxV4ivp",
"title": "Computer Science and Information Technology, International Association of",
"acronym": "iacsit-sc",
"groupId": "1002819",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBSjJ7c",
"doi": "10.1109/IACSIT-SC.2009.14",
"title": "Two Parameter Image Representation in 3D Biomedical Visualization with CT Images",
"normalizedTitle": "Two Parameter Image Representation in 3D Biomedical Visualization with CT Images",
"abstract": "Three space dimension model representation plays a key role in medical image processing, surgical plan decision, computer-aided diagnosis (CAD) and other medical activities. A three space dimension face model of biomedical visualization is proposed in the paper through two parameter image representation, which are based on these three facts: 1. three space dimension simple surface could be represented by two free parameters; 2. any three space dimension simple surface could be two smooth manifold in three space dimension embed problem; 3. simple surface visualization is one important aspects of biomedical visualization. Whithout extraction of the volume data from these images from computer computed tomography (CT), the method is accomplished through extraction of contours from these images and map these points into their two parameter space while their geometric properties are easy to be calculated and scale properties relationships between their three dimension space are also to be determined. Given the extraction algorithms of contours from these images and the map which the method used, geometric and scale relationship are listed in the paper as well as the implements of the method through numerical tests.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Three space dimension model representation plays a key role in medical image processing, surgical plan decision, computer-aided diagnosis (CAD) and other medical activities. A three space dimension face model of biomedical visualization is proposed in the paper through two parameter image representation, which are based on these three facts: 1. three space dimension simple surface could be represented by two free parameters; 2. any three space dimension simple surface could be two smooth manifold in three space dimension embed problem; 3. simple surface visualization is one important aspects of biomedical visualization. Whithout extraction of the volume data from these images from computer computed tomography (CT), the method is accomplished through extraction of contours from these images and map these points into their two parameter space while their geometric properties are easy to be calculated and scale properties relationships between their three dimension space are also to be determined. Given the extraction algorithms of contours from these images and the map which the method used, geometric and scale relationship are listed in the paper as well as the implements of the method through numerical tests.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Three space dimension model representation plays a key role in medical image processing, surgical plan decision, computer-aided diagnosis (CAD) and other medical activities. A three space dimension face model of biomedical visualization is proposed in the paper through two parameter image representation, which are based on these three facts: 1. three space dimension simple surface could be represented by two free parameters; 2. any three space dimension simple surface could be two smooth manifold in three space dimension embed problem; 3. simple surface visualization is one important aspects of biomedical visualization. Whithout extraction of the volume data from these images from computer computed tomography (CT), the method is accomplished through extraction of contours from these images and map these points into their two parameter space while their geometric properties are easy to be calculated and scale properties relationships between their three dimension space are also to be determined. Given the extraction algorithms of contours from these images and the map which the method used, geometric and scale relationship are listed in the paper as well as the implements of the method through numerical tests.",
"fno": "3653a506",
"keywords": [
"Parameter Image",
"Representation",
"3 D Biomedical Visualization"
],
"authors": [
{
"affiliation": null,
"fullName": "Jianmin Dong",
"givenName": "Jianmin",
"surname": "Dong",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Mingquan Zhou",
"givenName": "Mingquan",
"surname": "Zhou",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iacsit-sc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-04-01T00:00:00",
"pubType": "proceedings",
"pages": "506-509",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3653-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3653a501",
"articleId": "12OmNxX3uxA",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3653a510",
"articleId": "12OmNAQrYEu",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ieee-vis/2002/7498/0/7498jayarama",
"title": "A Radial Focus+Context Visualization for Multi-Dimensional Functions",
"doi": null,
"abstractUrl": "/proceedings-article/ieee-vis/2002/7498jayarama/12OmNCw3z94",
"parentPublication": {
"id": "proceedings/ieee-vis/2002/7498/0",
"title": "Visualization Conference, IEEE",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smc-it/2009/3637/0/3637a237",
"title": "Dspace: Real-Time 3D Visualization System for Spacecraft Dynamics Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/smc-it/2009/3637a237/12OmNwkR5vV",
"parentPublication": {
"id": "proceedings/smc-it/2009/3637/0",
"title": "2009 Third IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2008/3305/5/3305e650",
"title": "Pattern Recognition by DTW and Series Data Mining in 3D Stratum Modelling and 3D Visualization",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2008/3305e650/12OmNz61di2",
"parentPublication": {
"id": "proceedings/fskd/2008/3305/5",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icect/2009/3559/0/3559a516",
"title": "Application of Distributed Three-Dimension Visualization Technology in Civil Air-Defence Battle Simulation System",
"doi": null,
"abstractUrl": "/proceedings-article/icect/2009/3559a516/12OmNzUgdc3",
"parentPublication": {
"id": "proceedings/icect/2009/3559/0",
"title": "2009 International Conference on Electronic Computer Technology. ICECT 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122402",
"title": "Visualization of Parameter Space for Image Analysis",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122402/13rRUwd9CLJ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2014/06/mcg2014060016",
"title": "Using Global Illumination in Volume Visualization of Rheumatoid Arthritis CT Data",
"doi": null,
"abstractUrl": "/magazine/cg/2014/06/mcg2014060016/13rRUwvT9lI",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/1996/03/v0232",
"title": "A Digital Brain Atlas for Surgical Planning, Model-Driven Segmentation, and Teaching",
"doi": null,
"abstractUrl": "/journal/tg/1996/03/v0232/13rRUxly8Xr",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2018/12/08106712",
"title": "LMap: Shape-Preserving Local Mappings for Biomedical Visualization",
"doi": null,
"abstractUrl": "/journal/tg/2018/12/08106712/14H4WOGl0Ep",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258325",
"title": "Spatiotemporal visualization of traffic paths using color space time curve",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258325/17D45XeKgni",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2022/03/09790009",
"title": "Evaluating Representation Learning and Graph Layout Methods for Visualization",
"doi": null,
"abstractUrl": "/magazine/cg/2022/03/09790009/1E0NdVYxA8E",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBQ2VPc",
"title": "Asia International Conference on Modelling & Simulation",
"acronym": "ams",
"groupId": "1001723",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNBaBuT8",
"doi": "10.1109/AMS.2009.81",
"title": "Phase Space Point Disribution Parameter for Speech Recognition",
"normalizedTitle": "Phase Space Point Disribution Parameter for Speech Recognition",
"abstract": "This paper presents the method for extracting the Phase Space Point Distribution parameter for improving the accuracy of speech recognition systems. By utilizing nonlinear or chaotic signal processing techniques to extract time domain based phase space features, a method is suggested for speech recognition. It is experimentally proved the accuracy of speech recognition system can be improved by appending the time domain based PSPD parameters along with the conventional frequency domain parameters. The presented parameter is also proved invariant to the speaking style say prosody of speech.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents the method for extracting the Phase Space Point Distribution parameter for improving the accuracy of speech recognition systems. By utilizing nonlinear or chaotic signal processing techniques to extract time domain based phase space features, a method is suggested for speech recognition. It is experimentally proved the accuracy of speech recognition system can be improved by appending the time domain based PSPD parameters along with the conventional frequency domain parameters. The presented parameter is also proved invariant to the speaking style say prosody of speech.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents the method for extracting the Phase Space Point Distribution parameter for improving the accuracy of speech recognition systems. By utilizing nonlinear or chaotic signal processing techniques to extract time domain based phase space features, a method is suggested for speech recognition. It is experimentally proved the accuracy of speech recognition system can be improved by appending the time domain based PSPD parameters along with the conventional frequency domain parameters. The presented parameter is also proved invariant to the speaking style say prosody of speech.",
"fno": "3648a345",
"keywords": [
"Speech Recognition",
"Phase Space Point Distribution",
"Time Domain Parameter"
],
"authors": [
{
"affiliation": null,
"fullName": "N.S Sreekanth",
"givenName": "N.S",
"surname": "Sreekanth",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Supriya N. Pal",
"givenName": "Supriya N.",
"surname": "Pal",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Girish Arunjith",
"givenName": "Girish",
"surname": "Arunjith",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "N.K. Narayanan",
"givenName": "N.K.",
"surname": "Narayanan",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ams",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-05-01T00:00:00",
"pubType": "proceedings",
"pages": "345-347",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3648-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3648a341",
"articleId": "12OmNC3Xhpe",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3648a348",
"articleId": "12OmNAq3hNL",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icassp/2004/8484/1/01326040",
"title": "Joint frequency domain and reconstructed phase space features for speech recognition",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01326040/12OmNANTArK",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/1",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sicon/1993/1445/1/00515774",
"title": "Phase unwrapping methods for quadratic phase interpolation in voiced speech sythesis",
"doi": null,
"abstractUrl": "/proceedings-article/sicon/1993/00515774/12OmNAq3hxL",
"parentPublication": {
"id": "proceedings/sicon/1993/1445/1",
"title": "Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2012/2027/0/06266271",
"title": "The Performance of the Speaking Rate Parameter in Emotion Recognition from Speech",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2012/06266271/12OmNBVIUzZ",
"parentPublication": {
"id": "proceedings/icmew/2012/2027/0",
"title": "2012 IEEE International Conference on Multimedia & Expo Workshops (ICMEW 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cisis/2010/3967/0/3967a770",
"title": "Importance of Phase Information in Speech Enhancement",
"doi": null,
"abstractUrl": "/proceedings-article/cisis/2010/3967a770/12OmNBzAcmC",
"parentPublication": {
"id": "proceedings/cisis/2010/3967/0",
"title": "2010 International Conference on Complex, Intelligent and Software Intensive Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/1/01326080",
"title": "Speech enhancement by perceptual filter with sequential noise parameter estimation",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01326080/12OmNxAlA4P",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/1",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/1988/9999/0/00196504",
"title": "Speech recognition with continuous-parameter hidden Markov models",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/1988/00196504/12OmNxE2mJA",
"parentPublication": {
"id": "proceedings/icassp/1988/9999/0",
"title": "ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mmcs/1997/7819/0/00609787",
"title": "Speech recognition on MPEG/Audio encoded files",
"doi": null,
"abstractUrl": "/proceedings-article/mmcs/1997/00609787/12OmNxxdZAd",
"parentPublication": {
"id": "proceedings/mmcs/1997/7819/0",
"title": "Proceedings of IEEE International Conference on Multimedia Computing and Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icassp/2004/8484/1/01326050",
"title": "Importance of window shape for phase-only reconstruction of speech",
"doi": null,
"abstractUrl": "/proceedings-article/icassp/2004/01326050/12OmNySosGZ",
"parentPublication": {
"id": "proceedings/icassp/2004/8484/1",
"title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2016/7258/0/07552894",
"title": "A perceptually motivated approach via sparse and low-rank model for speech enhancement",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2016/07552894/12OmNz6iO5u",
"parentPublication": {
"id": "proceedings/icme/2016/7258/0",
"title": "2016 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2021/3864/0/09428157",
"title": "Cross-Domain Single-Channel Speech Enhancement Model with BI-Projection Fusion Module for Noise-Robust ASR",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2021/09428157/1uimbTzONIk",
"parentPublication": {
"id": "proceedings/icme/2021/3864/0",
"title": "2021 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNwDAC4L",
"title": "2006 IEEE Symposium On Visual Analytics Science And Technology",
"acronym": "vast",
"groupId": "1001630",
"volume": "0",
"displayVolume": "0",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvDZF4u",
"doi": "10.1109/VAST.2006.261425",
"title": "Semantic Image Browser: Bridging Information Visualization with Automated Intelligent Image Analysis",
"normalizedTitle": "Semantic Image Browser: Bridging Information Visualization with Automated Intelligent Image Analysis",
"abstract": "Browsing and retrieving images from large image collections are becoming common and important activities. Semantic image analysis techniques, which automatically detect high level semantic contents of images for annotation, are promising solutions toward this problem. However, few efforts have been made to convey the annotation results to users in an intuitive manner to enable effective image browsing and retrieval. There is also a lack of methods to monitor and evaluate the automatic image analysis algorithms due to the high dimensional nature of image data, features, and contents. In this paper, we propose a novel, scalable semantic image browser by applying existing information visualization techniques to semantic image analysis. This browser not only allows users to effectively browse and search in large image databases according to the semantic content of images, but also allows analysts to evaluate their annotation process through interactive visual exploration. The major visualization components of this browser are multi-dimensional scaling (MDS) based image layout, the value and relation (VaR) display that allows effective high dimensional visualization without dimension reduction, and a rich set of interaction tools such as search by sample images and content relationship detection. Our preliminary user study showed that the browser was easy to use and understand, and effective in supporting image browsing and retrieval tasks",
"abstracts": [
{
"abstractType": "Regular",
"content": "Browsing and retrieving images from large image collections are becoming common and important activities. Semantic image analysis techniques, which automatically detect high level semantic contents of images for annotation, are promising solutions toward this problem. However, few efforts have been made to convey the annotation results to users in an intuitive manner to enable effective image browsing and retrieval. There is also a lack of methods to monitor and evaluate the automatic image analysis algorithms due to the high dimensional nature of image data, features, and contents. In this paper, we propose a novel, scalable semantic image browser by applying existing information visualization techniques to semantic image analysis. This browser not only allows users to effectively browse and search in large image databases according to the semantic content of images, but also allows analysts to evaluate their annotation process through interactive visual exploration. The major visualization components of this browser are multi-dimensional scaling (MDS) based image layout, the value and relation (VaR) display that allows effective high dimensional visualization without dimension reduction, and a rich set of interaction tools such as search by sample images and content relationship detection. Our preliminary user study showed that the browser was easy to use and understand, and effective in supporting image browsing and retrieval tasks",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Browsing and retrieving images from large image collections are becoming common and important activities. Semantic image analysis techniques, which automatically detect high level semantic contents of images for annotation, are promising solutions toward this problem. However, few efforts have been made to convey the annotation results to users in an intuitive manner to enable effective image browsing and retrieval. There is also a lack of methods to monitor and evaluate the automatic image analysis algorithms due to the high dimensional nature of image data, features, and contents. In this paper, we propose a novel, scalable semantic image browser by applying existing information visualization techniques to semantic image analysis. This browser not only allows users to effectively browse and search in large image databases according to the semantic content of images, but also allows analysts to evaluate their annotation process through interactive visual exploration. The major visualization components of this browser are multi-dimensional scaling (MDS) based image layout, the value and relation (VaR) display that allows effective high dimensional visualization without dimension reduction, and a rich set of interaction tools such as search by sample images and content relationship detection. Our preliminary user study showed that the browser was easy to use and understand, and effective in supporting image browsing and retrieval tasks",
"fno": "04035765",
"keywords": [
"Data Visualisation",
"Image Retrieval",
"Interactive Systems",
"Semantic Image Browser",
"Information Visualization",
"Automated Intelligent Image Analysis",
"Image Retrieval",
"Semantic Image Analysis",
"Large Image Databases",
"Interactive Visual Exploration",
"Multidimensional Scaling Based Image Layout",
"Value And Relation Display",
"High Dimensional Visualization",
"Interaction Tools",
"Semantic Image Classification",
"Visual Analytics",
"Visualization",
"Image Analysis",
"Image Classification",
"Image Retrieval",
"Information Retrieval",
"Computerized Monitoring",
"Image Databases",
"Visual Analytics",
"Computer Science",
"Displays",
"Image Retrieval",
"Image Layout",
"Semantic Image Classification",
"Multi Dimensional Visualization",
"Visual Analytics",
"1 4 8 Image Processing And Computer Vision Scene Analysis Object Recognition",
"H 3 3 Information Storage And Retrieval Information Search And Retrieval Search Process",
"H 5 2 Information Interfaces And Presentation User Interfaces Graphical User Interfaces"
],
"authors": [
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, jyang13@uncc.edu",
"fullName": "Jing Yang",
"givenName": "Jing",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, jfan@uncc.edu",
"fullName": "Jianping Fan",
"givenName": "Jianping",
"surname": "Fan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, dhubball@uncc.edu",
"fullName": "Daniel Hubball",
"givenName": "Daniel",
"surname": "Hubball",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, ygao@uncc.edu",
"fullName": "Yuli Gao",
"givenName": "Yuli",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, hluo@uncc.edu",
"fullName": "Hangzai Luo",
"givenName": "Hangzai",
"surname": "Luo",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, University of North Carolina at Charlotte, ribarsky@uncc.edu",
"fullName": "William Ribarsky",
"givenName": "William",
"surname": "Ribarsky",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept of Computer Science, Worcester Polytechnic, Institute. matt@cs.wpi.edu",
"fullName": "Matthew Ward",
"givenName": "Matthew",
"surname": "Ward",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vast",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-10-01T00:00:00",
"pubType": "proceedings",
"pages": "191-198",
"year": "2006",
"issn": null,
"isbn": "1-4244-0591-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04035749",
"articleId": "12OmNzQzqgi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04035766",
"articleId": "12OmNxecRVy",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icsc/2011/4492/0/4492a201",
"title": "GO Visual Browser",
"doi": null,
"abstractUrl": "/proceedings-article/icsc/2011/4492a201/12OmNA0MZ7g",
"parentPublication": {
"id": "proceedings/icsc/2011/4492/0",
"title": "2011 IEEE Fifth International Conference on Semantic Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2017/0831/0/0831a182",
"title": "Visually Supporting Image Annotation Based on Visual Features and Ontologies",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2017/0831a182/12OmNAGw15i",
"parentPublication": {
"id": "proceedings/iv/2017/0831/0",
"title": "2017 21st International Conference Information Visualisation (IV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2010/4191/3/4191c326",
"title": "Bridging Semantic and Legacy Web Exploration: Orientation, Revisitation and Result Exploration Support",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2010/4191c326/12OmNAlvHwk",
"parentPublication": {
"id": "proceedings/wi-iat/2010/4191/2",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cdciem/2012/4639/0/4639a433",
"title": "Narrowing Semantic Gap in Content-based Image Retrieval",
"doi": null,
"abstractUrl": "/proceedings-article/cdciem/2012/4639a433/12OmNrEL2xo",
"parentPublication": {
"id": "proceedings/cdciem/2012/4639/0",
"title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cbms/2000/0484/0/04840235",
"title": "Integration of Intelligent Engines for a Large Scale Medical Image Database",
"doi": null,
"abstractUrl": "/proceedings-article/cbms/2000/04840235/12OmNvTBB3D",
"parentPublication": {
"id": "proceedings/cbms/2000/0484/0",
"title": "Proceedings 13th IEEE Symposium on Computer-Based Medical Systems. CBMS 2000",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2005/9331/0/01521732",
"title": "The Multimedian Concert-Video Browser",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2005/01521732/12OmNxeusZK",
"parentPublication": {
"id": "proceedings/icme/2005/9331/0",
"title": "2005 IEEE International Conference on Multimedia and Expo",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2009/3801/3/3801c425",
"title": "Ontology-Based Semantic Web Image Retrieval by Utilizing Textual and Visual Annotations",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2009/3801c425/12OmNyRPgCH",
"parentPublication": {
"id": "proceedings/wi-iat/2009/3801/3",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2011/4353/2/05751088",
"title": "Image Semantic Annotation Based on Gaussian Mixture Model",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2011/05751088/12OmNzTppI7",
"parentPublication": {
"id": "icicta/2011/4353/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pcspa/2010/4180/0/4180a281",
"title": "Real-Time Image Semantic Retrieval Based on VQ",
"doi": null,
"abstractUrl": "/proceedings-article/pcspa/2010/4180a281/12OmNzdoMZI",
"parentPublication": {
"id": "proceedings/pcspa/2010/4180/0",
"title": "Pervasive Computing, Signal Porcessing and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2007/03/i0394",
"title": "Supervised Learning of Semantic Classes for Image Annotation and Retrieval",
"doi": null,
"abstractUrl": "/journal/tp/2007/03/i0394/13rRUwghd63",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNAolGIV",
"title": "Intelligent Computation and Bio-Medical Instrumentation, International Conference on",
"acronym": "icbmi",
"groupId": "1800786",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy50ggh",
"doi": "10.1109/ICBMI.2011.19",
"title": "Scale Parameter of Schrödinger Transform of Image",
"normalizedTitle": "Scale Parameter of Schrödinger Transform of Image",
"abstract": "In the paper, scale parameter of Schrödinger transform of image is discussed. First, the experiments show Schrödinger transformation of image can be seen as the result of primitive image shrinking inside and spreading outward at the center of object, like as interference wave, and the bigger the parameter a is, the more obvious the interference is, on the other hand, contour curves of object in the transformed image are similar to contour curves of object in the original image. Then, we explain the parameter a is the scale parameter of Schrödinger transform of image. Finally, we investigate the relation between propagation distance and the scale parameter a, size of image and object.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In the paper, scale parameter of Schrödinger transform of image is discussed. First, the experiments show Schrödinger transformation of image can be seen as the result of primitive image shrinking inside and spreading outward at the center of object, like as interference wave, and the bigger the parameter a is, the more obvious the interference is, on the other hand, contour curves of object in the transformed image are similar to contour curves of object in the original image. Then, we explain the parameter a is the scale parameter of Schrödinger transform of image. Finally, we investigate the relation between propagation distance and the scale parameter a, size of image and object.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In the paper, scale parameter of Schrödinger transform of image is discussed. First, the experiments show Schrödinger transformation of image can be seen as the result of primitive image shrinking inside and spreading outward at the center of object, like as interference wave, and the bigger the parameter a is, the more obvious the interference is, on the other hand, contour curves of object in the transformed image are similar to contour curves of object in the original image. Then, we explain the parameter a is the scale parameter of Schrödinger transform of image. Finally, we investigate the relation between propagation distance and the scale parameter a, size of image and object.",
"fno": "4623a050",
"keywords": [
"Schrodinger Transform Of Image",
"Potential Function",
"Scale Parameter"
],
"authors": [
{
"affiliation": null,
"fullName": "Liantang Lou",
"givenName": "Liantang",
"surname": "Lou",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hua Zeng",
"givenName": "Hua",
"surname": "Zeng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Wenliang Gao",
"givenName": "Wenliang",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Lingling Li",
"givenName": "Lingling",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icbmi",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "50-55",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4623-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4623a046",
"articleId": "12OmNy49sRO",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4623a056",
"articleId": "12OmNy314eE",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/hpcc-icess/2011/4538/0/4538a893",
"title": "A Geometry-Distortion Resistant Image Detection System Based on Log-Polar Transform and Scale Invariant Feature Transform",
"doi": null,
"abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a893/12OmNAolGOo",
"parentPublication": {
"id": "proceedings/hpcc-icess/2011/4538/0",
"title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icicta/2010/4077/2/4077c876",
"title": "Parameter Selection for Segmentation in Object-Oriented Classification of Remotely Sensed Imagery",
"doi": null,
"abstractUrl": "/proceedings-article/icicta/2010/4077c876/12OmNBqv2bd",
"parentPublication": {
"id": "proceedings/icicta/2010/4077/2",
"title": "Intelligent Computation Technology and Automation, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ism/2012/4875/0/4875a153",
"title": "EDContours: High-Speed Parameter-Free Contour Detector Using EDPF",
"doi": null,
"abstractUrl": "/proceedings-article/ism/2012/4875a153/12OmNrIrPgP",
"parentPublication": {
"id": "proceedings/ism/2012/4875/0",
"title": "2012 IEEE International Symposium on Multimedia",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icetet/2010/4246/0/4246a134",
"title": "Redundancy Discrete Wavelet Transform and Contourlet Transform for Multimodality Medical Image Fusion with Quantitative Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/icetet/2010/4246a134/12OmNrNh0AR",
"parentPublication": {
"id": "proceedings/icetet/2010/4246/0",
"title": "Emerging Trends in Engineering & Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cmc/2010/3989/2/3989b329",
"title": "Parameter Estimation of Hybrid DS/FH Spread Spectrum Signals Using S Transform with an Asymmetrical Window",
"doi": null,
"abstractUrl": "/proceedings-article/cmc/2010/3989b329/12OmNwErpEJ",
"parentPublication": {
"id": "proceedings/cmc/2010/3989/2",
"title": "Communications and Mobile Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mmit/2008/3556/0/3556a353",
"title": "A New Image Compression Algorithm Based on Multi-scale Transform",
"doi": null,
"abstractUrl": "/proceedings-article/mmit/2008/3556a353/12OmNyTfg5K",
"parentPublication": {
"id": "proceedings/mmit/2008/3556/0",
"title": "MultiMedia and Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fgcns/2008/3546/3/3546c023",
"title": "Novel Parameter Estimation Method for Chirp Signals Using Bowtie Chirplet and Discrete Fractional Fourier Transform",
"doi": null,
"abstractUrl": "/proceedings-article/fgcns/2008/3546c023/12OmNz5JBN8",
"parentPublication": {
"id": "proceedings/fgcns/2008/3546/3",
"title": "Future Generation Communication and Networking Symposia, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isecs/2009/3643/2/3643b048",
"title": "Optical Image Encryption Scheme Based on Multiple-parameter Random Fractional Fourier Transform",
"doi": null,
"abstractUrl": "/proceedings-article/isecs/2009/3643b048/12OmNzRqdFg",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122402",
"title": "Visualization of Parameter Space for Image Analysis",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122402/13rRUwd9CLJ",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/1992/12/i1157",
"title": "The Multiple Window Parameter Transform",
"doi": null,
"abstractUrl": "/journal/tp/1992/12/i1157/13rRUytF42n",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqG0SXL",
"title": "Web Information Systems and Applications Conference",
"acronym": "wisa",
"groupId": "1003022",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNrJAed0",
"doi": "10.1109/WISA.2010.20",
"title": "Mining Hot Topics from Free-Text Customer Reviews—An LDA-Based Approach",
"normalizedTitle": "Mining Hot Topics from Free-Text Customer Reviews—An LDA-Based Approach",
"abstract": "This study examines how the Latent Dirichlet Allocation (LDA) model combined with natural language processing techniques can be used to identify hot topics from free-text customer reviews. To verify the validity of the proposed approach, 21 580 restaurant reviews are collected. Each review is viewed as a probabilistic mixture of latent topics and each topic is treated as a probability distribution over words in a vocabulary. Parameters are estimated with Gibbs sampling, and the hot topics with top words are acquired. The experiments show that this approach could produce satisfactory results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This study examines how the Latent Dirichlet Allocation (LDA) model combined with natural language processing techniques can be used to identify hot topics from free-text customer reviews. To verify the validity of the proposed approach, 21 580 restaurant reviews are collected. Each review is viewed as a probabilistic mixture of latent topics and each topic is treated as a probability distribution over words in a vocabulary. Parameters are estimated with Gibbs sampling, and the hot topics with top words are acquired. The experiments show that this approach could produce satisfactory results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This study examines how the Latent Dirichlet Allocation (LDA) model combined with natural language processing techniques can be used to identify hot topics from free-text customer reviews. To verify the validity of the proposed approach, 21 580 restaurant reviews are collected. Each review is viewed as a probabilistic mixture of latent topics and each topic is treated as a probability distribution over words in a vocabulary. Parameters are estimated with Gibbs sampling, and the hot topics with top words are acquired. The experiments show that this approach could produce satisfactory results.",
"fno": "4193a085",
"keywords": [
"Latent Dirichlet Allocatio",
"Hot Topic Detection",
"User Reviews",
"Gibbs Sampling"
],
"authors": [
{
"affiliation": null,
"fullName": "Chuanming Yu",
"givenName": "Chuanming",
"surname": "Yu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Xiaoqing Zhang",
"givenName": "Xiaoqing",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Huiting Luo",
"givenName": "Huiting",
"surname": "Luo",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wisa",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-08-01T00:00:00",
"pubType": "proceedings",
"pages": "85-89",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4193-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4193a079",
"articleId": "12OmNvjyxWV",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4193a090",
"articleId": "12OmNzX6csX",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ialp/2010/4288/0/4288a195",
"title": "Topic-Driven Multi-document Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/ialp/2010/4288a195/12OmNBSjJ6X",
"parentPublication": {
"id": "proceedings/ialp/2010/4288/0",
"title": "Asian Language Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2009/3872/0/3872b227",
"title": "Automatic Labeling of Topics",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2009/3872b227/12OmNvk7JLW",
"parentPublication": {
"id": "proceedings/isda/2009/3872/0",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a055",
"title": "Validating the Use of Topic Models for Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a055/12OmNwIHoAd",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2011/4520/0/4520b210",
"title": "Searching OCR'ed Text: An LDA Based Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2011/4520b210/12OmNxRF71X",
"parentPublication": {
"id": "proceedings/icdar/2011/4520/0",
"title": "2011 International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wism/2009/3817/0/3817a103",
"title": "Chinese Hot Topic Extraction Based on Web Log",
"doi": null,
"abstractUrl": "/proceedings-article/wism/2009/3817a103/12OmNyk2ZZK",
"parentPublication": {
"id": "proceedings/wism/2009/3817/0",
"title": "Web Information Systems and Mining, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997b437",
"title": "Netnews Bursty Hot Topic Detection Based on Bursty Features",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997b437/12OmNylsZOz",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a065",
"title": "Estimating the Optimal Number of Latent Concepts in Source Code Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a065/12OmNzE54Fg",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/1/3496a697",
"title": "Name Disambiguation Boosted by Latent Topics from Web Directories",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496a697/12OmNzd7baU",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a148",
"title": "Sequential Latent Dirichlet Allocation: Discover Underlying Topic Structures within a Document",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a148/12OmNzdGnxE",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/3/3496c529",
"title": "Modelling User Behaviour for Web Recommendation Using LDA Model",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496c529/12OmNzkuKHY",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/3",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqI04I8",
"title": "Intelligent Systems Design and Applications, International Conference on",
"acronym": "isda",
"groupId": "1001454",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvk7JLW",
"doi": "10.1109/ISDA.2009.165",
"title": "Automatic Labeling of Topics",
"normalizedTitle": "Automatic Labeling of Topics",
"abstract": "An algorithm for the automatic labeling of topics accordingly to a hierarchy is presented. Its main ingredients are a set of similarity measures and a set of topic labeling rules. The labeling rules are specifically designed to find the most agreed labels between the given topic and the hierarchy. The hierarchy is obtained from the Google Directory service, extracted via an ad-hoc developed software procedure and expanded through the use of the OpenOffice English Thesaurus. The performance of the proposed algorithm is investigated by using a document corpus consisting of 33,801 documents and a dictionary consisting of 111,795 words. The results are encouraging, while particularly interesting and significant labeling cases emerged",
"abstracts": [
{
"abstractType": "Regular",
"content": "An algorithm for the automatic labeling of topics accordingly to a hierarchy is presented. Its main ingredients are a set of similarity measures and a set of topic labeling rules. The labeling rules are specifically designed to find the most agreed labels between the given topic and the hierarchy. The hierarchy is obtained from the Google Directory service, extracted via an ad-hoc developed software procedure and expanded through the use of the OpenOffice English Thesaurus. The performance of the proposed algorithm is investigated by using a document corpus consisting of 33,801 documents and a dictionary consisting of 111,795 words. The results are encouraging, while particularly interesting and significant labeling cases emerged",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "An algorithm for the automatic labeling of topics accordingly to a hierarchy is presented. Its main ingredients are a set of similarity measures and a set of topic labeling rules. The labeling rules are specifically designed to find the most agreed labels between the given topic and the hierarchy. The hierarchy is obtained from the Google Directory service, extracted via an ad-hoc developed software procedure and expanded through the use of the OpenOffice English Thesaurus. The performance of the proposed algorithm is investigated by using a document corpus consisting of 33,801 documents and a dictionary consisting of 111,795 words. The results are encouraging, while particularly interesting and significant labeling cases emerged",
"fno": "3872b227",
"keywords": [
"Automatic Topic Labeling",
"Topics Tree",
"Latent Dirichlet Allocation"
],
"authors": [
{
"affiliation": null,
"fullName": "Davide Magatti",
"givenName": "Davide",
"surname": "Magatti",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Silvia Calegari",
"givenName": "Silvia",
"surname": "Calegari",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Davide Ciucci",
"givenName": "Davide",
"surname": "Ciucci",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fabio Stella",
"givenName": "Fabio",
"surname": "Stella",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isda",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-11-01T00:00:00",
"pubType": "proceedings",
"pages": "1227-1232",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3872-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3872b221",
"articleId": "12OmNzG4gty",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3872b233",
"articleId": "12OmNrHB1Xk",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wisa/2010/4193/0/4193a085",
"title": "Mining Hot Topics from Free-Text Customer Reviews—An LDA-Based Approach",
"doi": null,
"abstractUrl": "/proceedings-article/wisa/2010/4193a085/12OmNrJAed0",
"parentPublication": {
"id": "proceedings/wisa/2010/4193/0",
"title": "Web Information Systems and Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2010/8719/1/87190095",
"title": "Software traceability with topic modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2010/87190095/12OmNrMZplW",
"parentPublication": {
"id": "proceedings/icse/2010/8719/1",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a055",
"title": "Validating the Use of Topic Models for Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a055/12OmNwIHoAd",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsm/2012/2313/0/06405278",
"title": "Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers?",
"doi": null,
"abstractUrl": "/proceedings-article/icsm/2012/06405278/12OmNyFU74Q",
"parentPublication": {
"id": "proceedings/icsm/2012/2313/0",
"title": "2012 28th IEEE International Conference on Software Maintenance (ICSM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a711",
"title": "Dirichlet Mixture Allocation for Multiclass Document Collections Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a711/12OmNyQYtum",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a065",
"title": "Estimating the Optimal Number of Latent Concepts in Source Code Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a065/12OmNzE54Fg",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/stil/2009/3945/0/3945a191",
"title": "Towards the Automatic Learning of Ontologies",
"doi": null,
"abstractUrl": "/proceedings-article/stil/2009/3945a191/12OmNzJbR1s",
"parentPublication": {
"id": "proceedings/stil/2009/3945/0",
"title": "Information and Human Language Technology, Brazilian Symposium in",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/1/3496a697",
"title": "Name Disambiguation Boosted by Latent Topics from Web Directories",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496a697/12OmNzd7baU",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2008/3495/0/3495a813",
"title": "An Application of Latent Dirichlet Allocation to Analyzing Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2008/3495a813/12OmNzmclWX",
"parentPublication": {
"id": "proceedings/icmla/2008/3495/0",
"title": "2008 Seventh International Conference on Machine Learning and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2012/06/ttk2012061134",
"title": "Weakly Supervised Joint Sentiment-Topic Detection from Text",
"doi": null,
"abstractUrl": "/journal/tk/2012/06/ttk2012061134/13rRUxDqS8I",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNwJPMXl",
"title": "2012 IEEE International Conference on Bioinformatics and Biomedicine",
"acronym": "bibm",
"groupId": "1001586",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwE9ODe",
"doi": "10.1109/BIBM.2012.6392645",
"title": "Modeling semantic influence for biomedicai research topics using MeSH hierarchy",
"normalizedTitle": "Modeling semantic influence for biomedicai research topics using MeSH hierarchy",
"abstract": "In this work, we model how biomedicai topics influence one another, given they are organized in a topic hierarchy, MeSH, in which the edges capture a parent-child/subsumption relationship among topics. This information enables studying influence of topics from a semantic perspective, which might be very important in analyzing topic evolution and is missing from the current literature. We first define a burst-based action for topics, which models upward momentum in popularity (or \"elevated occurrences\" of the topics), and use it to define two types of influence: accumulation influence and propagation influence. We then propose a model of influence between topics, and develop an efficient algorithm (TIPS) to identify influential topics. Experiments show that our model is successful at identifying influential topics and the algorithm is very efficient.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this work, we model how biomedicai topics influence one another, given they are organized in a topic hierarchy, MeSH, in which the edges capture a parent-child/subsumption relationship among topics. This information enables studying influence of topics from a semantic perspective, which might be very important in analyzing topic evolution and is missing from the current literature. We first define a burst-based action for topics, which models upward momentum in popularity (or \"elevated occurrences\" of the topics), and use it to define two types of influence: accumulation influence and propagation influence. We then propose a model of influence between topics, and develop an efficient algorithm (TIPS) to identify influential topics. Experiments show that our model is successful at identifying influential topics and the algorithm is very efficient.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this work, we model how biomedicai topics influence one another, given they are organized in a topic hierarchy, MeSH, in which the edges capture a parent-child/subsumption relationship among topics. This information enables studying influence of topics from a semantic perspective, which might be very important in analyzing topic evolution and is missing from the current literature. We first define a burst-based action for topics, which models upward momentum in popularity (or \"elevated occurrences\" of the topics), and use it to define two types of influence: accumulation influence and propagation influence. We then propose a model of influence between topics, and develop an efficient algorithm (TIPS) to identify influential topics. Experiments show that our model is successful at identifying influential topics and the algorithm is very efficient.",
"fno": "06392645",
"keywords": [
"Me SH",
"Bursts",
"Social Influence",
"Topic Hierarchies"
],
"authors": [
{
"affiliation": "IBM T.J. Watson Research, Yorktown Heights, NY",
"fullName": "Dan He",
"givenName": "Dan",
"surname": "He",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "bibm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-10-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-2559-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06392644",
"articleId": "12OmNAP1Z1J",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06392646",
"articleId": "12OmNyYDDAG",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/trustcom/2012/4745/0/4745a640",
"title": "Evaluating User Community Influence in Online Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom/2012/4745a640/12OmNqAU6CE",
"parentPublication": {
"id": "proceedings/trustcom/2012/4745/0",
"title": "2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/1/3496a343",
"title": "A Wavelet-Based Model to Recognize High-Quality Topics on Web Forum",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496a343/12OmNrJiCFa",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2009/3872/0/3872b227",
"title": "Automatic Labeling of Topics",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2009/3872b227/12OmNvk7JLW",
"parentPublication": {
"id": "proceedings/isda/2009/3872/0",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2011/4409/0/4409a251",
"title": "Twitter Trending Topic Classification",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2011/4409a251/12OmNxEjY5g",
"parentPublication": {
"id": "proceedings/icdmw/2011/4409/0",
"title": "2011 IEEE 11th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2009/3689/0/3689a344",
"title": "Dynamic and Static Influence Models on Starbucks Networks",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2009/3689a344/12OmNxuFBnA",
"parentPublication": {
"id": "proceedings/asonam/2009/3689/0",
"title": "2009 International Conference on Advances in Social Network Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/skg/2009/3810/0/3810a416",
"title": "Semantic Shift Detection in Semantic Web",
"doi": null,
"abstractUrl": "/proceedings-article/skg/2009/3810a416/12OmNy3RRKz",
"parentPublication": {
"id": "proceedings/skg/2009/3810/0",
"title": "Semantics, Knowledge and Grid, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dasc/2009/3929/0/3929a859",
"title": "Research of Summarization Extraction in Multiple Topics Document",
"doi": null,
"abstractUrl": "/proceedings-article/dasc/2009/3929a859/12OmNzZmZnX",
"parentPublication": {
"id": "proceedings/dasc/2009/3929/0",
"title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2016/07/07434634",
"title": "Personalized Influential Topic Search via Social Network Summarization",
"doi": null,
"abstractUrl": "/journal/tk/2016/07/07434634/13rRUIM2VHu",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122412",
"title": "TextFlow: Towards Better Understanding of Evolving Topics in Text",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122412/13rRUxYrbUE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2018/5520/0/552000b569",
"title": "OCTOPUS: An Online Topic-Aware Influence Analysis System for Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2018/552000b569/14Fq12vlceF",
"parentPublication": {
"id": "proceedings/icde/2018/5520/0",
"title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzcxZpW",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"acronym": "scam",
"groupId": "1000715",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwIHoAd",
"doi": "10.1109/SCAM.2010.13",
"title": "Validating the Use of Topic Models for Software Evolution",
"normalizedTitle": "Validating the Use of Topic Models for Software Evolution",
"abstract": "Topics are collections of words that co-occur frequently in a text corpus. Topics have been found to be effective tools for describing the major themes spanning a corpus. Using such topics to describe the evolution of a software system’s source code promises to be extremely useful for development tasks such as maintenance and re-engineering. However, no one has yet examined whether these automatically discovered topics accurately describe the evolution of source code, and thus it is not clear whether topic models are a suitable tool for this task. In this paper, we take a first step towards deter-mining the suitability of topic models in the analysis of software evolution by performing a qualitative case study on 12 releases of JHot Draw, a well studied and documented system. We define and compute various metrics on the identified topics and manually investigate how the metrics evolve over time. We find that topic evolutions are characterizable through spikes and drops in their metric values, and that the large majority of these spikes and drops are indeed caused by actual change activity in the source code. We are thus encouraged by the use of topic models as a tool for analyzing the evolution of software.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Topics are collections of words that co-occur frequently in a text corpus. Topics have been found to be effective tools for describing the major themes spanning a corpus. Using such topics to describe the evolution of a software system’s source code promises to be extremely useful for development tasks such as maintenance and re-engineering. However, no one has yet examined whether these automatically discovered topics accurately describe the evolution of source code, and thus it is not clear whether topic models are a suitable tool for this task. In this paper, we take a first step towards deter-mining the suitability of topic models in the analysis of software evolution by performing a qualitative case study on 12 releases of JHot Draw, a well studied and documented system. We define and compute various metrics on the identified topics and manually investigate how the metrics evolve over time. We find that topic evolutions are characterizable through spikes and drops in their metric values, and that the large majority of these spikes and drops are indeed caused by actual change activity in the source code. We are thus encouraged by the use of topic models as a tool for analyzing the evolution of software.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Topics are collections of words that co-occur frequently in a text corpus. Topics have been found to be effective tools for describing the major themes spanning a corpus. Using such topics to describe the evolution of a software system’s source code promises to be extremely useful for development tasks such as maintenance and re-engineering. However, no one has yet examined whether these automatically discovered topics accurately describe the evolution of source code, and thus it is not clear whether topic models are a suitable tool for this task. In this paper, we take a first step towards deter-mining the suitability of topic models in the analysis of software evolution by performing a qualitative case study on 12 releases of JHot Draw, a well studied and documented system. We define and compute various metrics on the identified topics and manually investigate how the metrics evolve over time. We find that topic evolutions are characterizable through spikes and drops in their metric values, and that the large majority of these spikes and drops are indeed caused by actual change activity in the source code. We are thus encouraged by the use of topic models as a tool for analyzing the evolution of software.",
"fno": "4178a055",
"keywords": [
"Software Evolution",
"Topic Modeling",
"Latent Dirichlet Allocation"
],
"authors": [
{
"affiliation": null,
"fullName": "Stephen W. Thomas",
"givenName": "Stephen W.",
"surname": "Thomas",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bram Adams",
"givenName": "Bram",
"surname": "Adams",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ahmed E. Hassan",
"givenName": "Ahmed E.",
"surname": "Hassan",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dorothea Blostein",
"givenName": "Dorothea",
"surname": "Blostein",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "scam",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-09-01T00:00:00",
"pubType": "proceedings",
"pages": "55-64",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4178-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4178a043",
"articleId": "12OmNvqmUEZ",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4178a065",
"articleId": "12OmNzE54Fg",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ictai/2011/4596/0/4596a936",
"title": "TopicView: Visually Comparing Topic Models of Text Collections",
"doi": null,
"abstractUrl": "/proceedings-article/ictai/2011/4596a936/12OmNArKSif",
"parentPublication": {
"id": "proceedings/ictai/2011/4596/0",
"title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ialp/2010/4288/0/4288a195",
"title": "Topic-Driven Multi-document Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/ialp/2010/4288a195/12OmNBSjJ6X",
"parentPublication": {
"id": "proceedings/ialp/2010/4288/0",
"title": "Asian Language Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2010/8719/1/87190095",
"title": "Software traceability with topic modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2010/87190095/12OmNrMZplW",
"parentPublication": {
"id": "proceedings/icse/2010/8719/1",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2009/3872/0/3872b227",
"title": "Automatic Labeling of Topics",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2009/3872b227/12OmNvk7JLW",
"parentPublication": {
"id": "proceedings/isda/2009/3872/0",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wism/2009/3817/0/3817a168",
"title": "Subtopic Based Topic Evolution Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/wism/2009/3817a168/12OmNy3iFlV",
"parentPublication": {
"id": "proceedings/wism/2009/3817/0",
"title": "Web Information Systems and Mining, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a711",
"title": "Dirichlet Mixture Allocation for Multiclass Document Collections Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a711/12OmNyQYtum",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a065",
"title": "Estimating the Optimal Number of Latent Concepts in Source Code Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a065/12OmNzE54Fg",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmla/2008/3495/0/3495a813",
"title": "An Application of Latent Dirichlet Allocation to Analyzing Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/icmla/2008/3495a813/12OmNzmclWX",
"parentPublication": {
"id": "proceedings/icmla/2008/3495/0",
"title": "2008 Seventh International Conference on Machine Learning and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2012/06/ttk2012061134",
"title": "Weakly Supervised Joint Sentiment-Topic Detection from Text",
"doi": null,
"abstractUrl": "/journal/tk/2012/06/ttk2012061134/13rRUxDqS8I",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122412",
"title": "TextFlow: Towards Better Understanding of Evolving Topics in Text",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122412/13rRUxYrbUE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNC17hWj",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"acronym": "wi-iat",
"groupId": "1001411",
"volume": "3",
"displayVolume": "3",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx57HNW",
"doi": "10.1109/WI-IAT.2012.159",
"title": "Research on Mining Common Concern via Infinite Topic Modelling",
"normalizedTitle": "Research on Mining Common Concern via Infinite Topic Modelling",
"abstract": "This paper focuses on mining common concern among different textual data sources and analyzing their own eigen topics via infinite topic modelling. By incorporating non-parametric Bayesian approaches, our work achieves a good performance and better accords with the reality by avoiding restrictive assumptions. We proposed extended processes of Dirichlet process(DP) -- bidirectional stick-breaking process and multi-branches process -- based on strick-breaking construction to model multiple sequences of probability measures in one process rather than simply combine several DPs. On the basis of this new perspective of DP, we discover the common topics and eigen topics via infinite topic modelling in a simple way without setting topic number. The experiments are carried out on three corpora of BBC news, about the UK, the US and China forum respectively. The results present the common concern of these three districts and their eigen interests in other aspects.",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper focuses on mining common concern among different textual data sources and analyzing their own eigen topics via infinite topic modelling. By incorporating non-parametric Bayesian approaches, our work achieves a good performance and better accords with the reality by avoiding restrictive assumptions. We proposed extended processes of Dirichlet process(DP) -- bidirectional stick-breaking process and multi-branches process -- based on strick-breaking construction to model multiple sequences of probability measures in one process rather than simply combine several DPs. On the basis of this new perspective of DP, we discover the common topics and eigen topics via infinite topic modelling in a simple way without setting topic number. The experiments are carried out on three corpora of BBC news, about the UK, the US and China forum respectively. The results present the common concern of these three districts and their eigen interests in other aspects.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper focuses on mining common concern among different textual data sources and analyzing their own eigen topics via infinite topic modelling. By incorporating non-parametric Bayesian approaches, our work achieves a good performance and better accords with the reality by avoiding restrictive assumptions. We proposed extended processes of Dirichlet process(DP) -- bidirectional stick-breaking process and multi-branches process -- based on strick-breaking construction to model multiple sequences of probability measures in one process rather than simply combine several DPs. On the basis of this new perspective of DP, we discover the common topics and eigen topics via infinite topic modelling in a simple way without setting topic number. The experiments are carried out on three corpora of BBC news, about the UK, the US and China forum respectively. The results present the common concern of these three districts and their eigen interests in other aspects.",
"fno": "4880c180",
"keywords": [
"News",
"Infinite Topic Modelling",
"Hierarchical Dirichlet Process",
"Common Concern"
],
"authors": [
{
"affiliation": null,
"fullName": "Yishu Miao",
"givenName": "Yishu",
"surname": "Miao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Chunping Li",
"givenName": "Chunping",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Qiang Ding",
"givenName": "Qiang",
"surname": "Ding",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Li Li",
"givenName": "Li",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wi-iat",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-12-01T00:00:00",
"pubType": "proceedings",
"pages": "180-184",
"year": "2012",
"issn": null,
"isbn": "978-1-4673-6057-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4880c175",
"articleId": "12OmNwBBqep",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4880c185",
"articleId": "12OmNAkEU2I",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ialp/2010/4288/0/4288a195",
"title": "Topic-Driven Multi-document Summarization",
"doi": null,
"abstractUrl": "/proceedings-article/ialp/2010/4288a195/12OmNBSjJ6X",
"parentPublication": {
"id": "proceedings/ialp/2010/4288/0",
"title": "Asian Language Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2011/4408/0/4408a141",
"title": "Learning Dirichlet Processes from Partially Observed Groups",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2011/4408a141/12OmNC943By",
"parentPublication": {
"id": "proceedings/icdm/2011/4408/0",
"title": "2011 IEEE 11th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icm/2011/4522/1/4522a367",
"title": "Topic Feature Extraction of Chinese News Title",
"doi": null,
"abstractUrl": "/proceedings-article/icm/2011/4522a367/12OmNqFrGzR",
"parentPublication": {
"id": "icm/2011/4522/1",
"title": "Information Technology, Computer Engineering and Management Sciences, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/nswctc/2009/3610/2/3610b683",
"title": "A Topic Detection Method Based on Bicharacteristic Vectors",
"doi": null,
"abstractUrl": "/proceedings-article/nswctc/2009/3610b683/12OmNqGiu8B",
"parentPublication": {
"id": "proceedings/nswctc/2009/3610/2",
"title": "Networks Security, Wireless Communications and Trusted Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2010/8719/1/87190095",
"title": "Software traceability with topic modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2010/87190095/12OmNrMZplW",
"parentPublication": {
"id": "proceedings/icse/2010/8719/1",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a055",
"title": "Validating the Use of Topic Models for Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a055/12OmNwIHoAd",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/3/4880c195",
"title": "Ranking Documents with Query-Topic Sensitivity",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880c195/12OmNwseEY5",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2011/4409/0/4409a251",
"title": "Twitter Trending Topic Classification",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2011/4409a251/12OmNxEjY5g",
"parentPublication": {
"id": "proceedings/icdmw/2011/4409/0",
"title": "2011 IEEE 11th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2011/4408/0/4408a260",
"title": "Generating Breakpoint-based Timeline Overview for News Topic Retrospection",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2011/4408a260/12OmNznkJTX",
"parentPublication": {
"id": "proceedings/icdm/2011/4408/0",
"title": "2011 IEEE 11th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2012/06/ttk2012061134",
"title": "Weakly Supervised Joint Sentiment-Topic Detection from Text",
"doi": null,
"abstractUrl": "/journal/tk/2012/06/ttk2012061134/13rRUxDqS8I",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzTH0FY",
"title": "2011 IEEE 11th International Conference on Data Mining",
"acronym": "icdm",
"groupId": "1000179",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx8fi9v",
"doi": "10.1109/ICDM.2011.148",
"title": "Tracking and Connecting Topics via Incremental Hierarchical Dirichlet Processes",
"normalizedTitle": "Tracking and Connecting Topics via Incremental Hierarchical Dirichlet Processes",
"abstract": "Much research has been devoted to topic detection from text, but one major challenge has not been addressed: revealing the rich relationships that exist among the detected topics. Finding such relationships is important since many applications are interested in how topics come into being, how they develop, grow, disintegrate, and finally disappear. In this paper, we present a novel method that reveals the connections between topics discovered from the text data. Specifically, our method focuses on how one topic splits into multiple topics, and how multiple topics merge into one topic. We adopt the hierarchical Dirichlet process (HDP) model, and propose an incremental Gibbs sampling algorithm to incrementally derive and refine the labels of clusters. We then characterize the splitting and merging patterns among clusters based on how labels change. We propose a global analysis process that focuses on cluster splitting and merging, and a finer granularity analysis process that helps users to better understand the content of the clusters and the evolution patterns. We also develop a visualization process to present the results.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Much research has been devoted to topic detection from text, but one major challenge has not been addressed: revealing the rich relationships that exist among the detected topics. Finding such relationships is important since many applications are interested in how topics come into being, how they develop, grow, disintegrate, and finally disappear. In this paper, we present a novel method that reveals the connections between topics discovered from the text data. Specifically, our method focuses on how one topic splits into multiple topics, and how multiple topics merge into one topic. We adopt the hierarchical Dirichlet process (HDP) model, and propose an incremental Gibbs sampling algorithm to incrementally derive and refine the labels of clusters. We then characterize the splitting and merging patterns among clusters based on how labels change. We propose a global analysis process that focuses on cluster splitting and merging, and a finer granularity analysis process that helps users to better understand the content of the clusters and the evolution patterns. We also develop a visualization process to present the results.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Much research has been devoted to topic detection from text, but one major challenge has not been addressed: revealing the rich relationships that exist among the detected topics. Finding such relationships is important since many applications are interested in how topics come into being, how they develop, grow, disintegrate, and finally disappear. In this paper, we present a novel method that reveals the connections between topics discovered from the text data. Specifically, our method focuses on how one topic splits into multiple topics, and how multiple topics merge into one topic. We adopt the hierarchical Dirichlet process (HDP) model, and propose an incremental Gibbs sampling algorithm to incrementally derive and refine the labels of clusters. We then characterize the splitting and merging patterns among clusters based on how labels change. We propose a global analysis process that focuses on cluster splitting and merging, and a finer granularity analysis process that helps users to better understand the content of the clusters and the evolution patterns. We also develop a visualization process to present the results.",
"fno": "4408b056",
"keywords": [
"Hierarchical Dirichlet Processes",
"Incremental Gibbs Sampling",
"Clustering",
"Mixture Models"
],
"authors": [
{
"affiliation": null,
"fullName": "Zekai J. Gao",
"givenName": "Zekai J.",
"surname": "Gao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yangqiu Song",
"givenName": "Yangqiu",
"surname": "Song",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shixia Liu",
"givenName": "Shixia",
"surname": "Liu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Haixun Wang",
"givenName": "Haixun",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Hao Wei",
"givenName": "Hao",
"surname": "Wei",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yang Chen",
"givenName": "Yang",
"surname": "Chen",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Weiwei Cui",
"givenName": "Weiwei",
"surname": "Cui",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icdm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1056-1061",
"year": "2011",
"issn": "1550-4786",
"isbn": "978-0-7695-4408-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4408b050",
"articleId": "12OmNyqRnk3",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4408b062",
"articleId": "12OmNynJMVl",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2011/4408/0/4408a141",
"title": "Learning Dirichlet Processes from Partially Observed Groups",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2011/4408a141/12OmNC943By",
"parentPublication": {
"id": "proceedings/icdm/2011/4408/0",
"title": "2011 IEEE 11th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wisa/2010/4193/0/4193a085",
"title": "Mining Hot Topics from Free-Text Customer Reviews—An LDA-Based Approach",
"doi": null,
"abstractUrl": "/proceedings-article/wisa/2010/4193a085/12OmNrJAed0",
"parentPublication": {
"id": "proceedings/wisa/2010/4193/0",
"title": "Web Information Systems and Applications Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2009/3872/0/3872b227",
"title": "Automatic Labeling of Topics",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2009/3872b227/12OmNvk7JLW",
"parentPublication": {
"id": "proceedings/isda/2009/3872/0",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/3/4880c180",
"title": "Research on Mining Common Concern via Infinite Topic Modelling",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880c180/12OmNx57HNW",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a711",
"title": "Dirichlet Mixture Allocation for Multiclass Document Collections Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a711/12OmNyQYtum",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a148",
"title": "Sequential Latent Dirichlet Allocation: Discover Underlying Topic Structures within a Document",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a148/12OmNzdGnxE",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2013/05/ttp2013051051",
"title": "An Incremental DPMM-Based Method for Trajectory Clustering, Modeling, and Retrieval",
"doi": null,
"abstractUrl": "/journal/tp/2013/05/ttp2013051051/13rRUILtJAX",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2006/08/k0993",
"title": "Unsupervised Selection of a Finite Dirichlet Mixture Model: An MML-Based Approach",
"doi": null,
"abstractUrl": "/journal/tk/2006/08/k0993/13rRUNvyafm",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2010/06/ttp2010060996",
"title": "Hierarchical Bayesian Modeling of Topics in Time-Stamped Documents",
"doi": null,
"abstractUrl": "/journal/tp/2010/06/ttp2010060996/13rRUxBa5yE",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122412",
"title": "TextFlow: Towards Better Understanding of Evolving Topics in Text",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122412/13rRUxYrbUE",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNCdk2YF",
"title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)",
"acronym": "icalt",
"groupId": "1000009",
"volume": "0",
"displayVolume": "0",
"year": "2013",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxdm4Dr",
"doi": "10.1109/ICALT.2013.21",
"title": "A Tool for Visualizing Topic Evolution in Large Text Collections",
"normalizedTitle": "A Tool for Visualizing Topic Evolution in Large Text Collections",
"abstract": "Topic evolution in text data has become a flourishing frontier in the text mining community. Yet with the increasing number of texts, it is important and challenging to understand how topics evolve. In this paper, we introduce a tool to analyze various evolution patterns that emerge from multiple texts based on combination of topic modeling and visualization techniques. By mining topic hierarchical relationship and evolutionary trend, the tool provides three visualization views along with interactive functionality that enables users to understand the topic evolution in a flexible and easily way. Experiment on real dataset has shown that the developed tool is effective to visualizing meaningful topic evolution in large text collections.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Topic evolution in text data has become a flourishing frontier in the text mining community. Yet with the increasing number of texts, it is important and challenging to understand how topics evolve. In this paper, we introduce a tool to analyze various evolution patterns that emerge from multiple texts based on combination of topic modeling and visualization techniques. By mining topic hierarchical relationship and evolutionary trend, the tool provides three visualization views along with interactive functionality that enables users to understand the topic evolution in a flexible and easily way. Experiment on real dataset has shown that the developed tool is effective to visualizing meaningful topic evolution in large text collections.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Topic evolution in text data has become a flourishing frontier in the text mining community. Yet with the increasing number of texts, it is important and challenging to understand how topics evolve. In this paper, we introduce a tool to analyze various evolution patterns that emerge from multiple texts based on combination of topic modeling and visualization techniques. By mining topic hierarchical relationship and evolutionary trend, the tool provides three visualization views along with interactive functionality that enables users to understand the topic evolution in a flexible and easily way. Experiment on real dataset has shown that the developed tool is effective to visualizing meaningful topic evolution in large text collections.",
"fno": "5009a053",
"keywords": [
"Data Visualization",
"Visualization",
"Market Research",
"Resource Management",
"Conferences",
"Educational Institutions",
"Data Models",
"Interaction Design",
"Topic Evolution",
"Visualization",
"Hierarchical Latent Dirichlet Allocation"
],
"authors": [
{
"affiliation": null,
"fullName": "Feipeng Sun",
"givenName": "Feipeng",
"surname": "Sun",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yanyan Li",
"givenName": "Yanyan",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Zhiqiang Zhang",
"givenName": "Zhiqiang",
"surname": "Zhang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icalt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2013-07-01T00:00:00",
"pubType": "proceedings",
"pages": "53-54",
"year": "2013",
"issn": null,
"isbn": "978-0-7695-5009-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "5009a050",
"articleId": "12OmNylKAKD",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "5009a055",
"articleId": "12OmNyGtjml",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/asonam/2013/2240/0/06785782",
"title": "TopicFlow: Visualizing topic alignment of Twitter data over time",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2013/06785782/12OmNB1wkKk",
"parentPublication": {
"id": "proceedings/asonam/2013/2240/0",
"title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2009/3733/0/3733a149",
"title": "Topic-Based Coordination for Visual Analysis of Evolving Document Collections",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2009/3733a149/12OmNBhpS9v",
"parentPublication": {
"id": "proceedings/iv/2009/3733/0",
"title": "2009 13th International Conference Information Visualisation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icebe/2014/6563/0/6563a089",
"title": "Collaborative Topic Modeling for Text Tensors",
"doi": null,
"abstractUrl": "/proceedings-article/icebe/2014/6563a089/12OmNCh0Pb3",
"parentPublication": {
"id": "proceedings/icebe/2014/6563/0",
"title": "2014 IEEE 11th International Conference on e-Business Engineering (ICEBE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/uic-atc-scalcom/2015/7211/0/07518392",
"title": "Modeling of Research Topic Evolution Associated with Social Networks of Researchers",
"doi": null,
"abstractUrl": "/proceedings-article/uic-atc-scalcom/2015/07518392/12OmNxFsmJa",
"parentPublication": {
"id": "proceedings/uic-atc-scalcom/2015/7211/0",
"title": "2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icbk/2017/3120/0/3120a315",
"title": "Modeling Topic Evolution in Social Media Short Texts",
"doi": null,
"abstractUrl": "/proceedings-article/icbk/2017/3120a315/12OmNy2rS0U",
"parentPublication": {
"id": "proceedings/icbk/2017/3120/0",
"title": "2017 IEEE International Conference on Big Knowledge (ICBK)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2014/6227/0/07042493",
"title": "Serendip: Topic model-driven visual exploration of text corpora",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2014/07042493/12OmNzC5Tn8",
"parentPublication": {
"id": "proceedings/vast/2014/6227/0",
"title": "2014 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/cg/2016/04/mcg2016040008",
"title": "Topic- and Time-Oriented Visual Text Analysis",
"doi": null,
"abstractUrl": "/magazine/cg/2016/04/mcg2016040008/13rRUx0xPpt",
"parentPublication": {
"id": "mags/cg",
"title": "IEEE Computer Graphics and Applications",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iscbi/2018/9450/0/945000a079",
"title": "Evaluation of the Dirichlet Process Multinomial Mixture Model for Short-Text Topic Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/iscbi/2018/945000a079/18jXwP0j8ys",
"parentPublication": {
"id": "proceedings/iscbi/2018/9450/0",
"title": "2018 6th International Symposium on Computational and Business Intelligence (ISCBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsc/2021/1815/0/181500a315",
"title": "Dynamic Topic Model for Tracking Topic Evolution and Measuring Popularity of Scientific Literature",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2021/181500a315/1CuiadNOBcA",
"parentPublication": {
"id": "proceedings/dsc/2021/1815/0",
"title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icceai/2022/6803/0/680300a437",
"title": "Topic Detection of Multi-feature Fusion in the Financial Field",
"doi": null,
"abstractUrl": "/proceedings-article/icceai/2022/680300a437/1FUVP0NZPwc",
"parentPublication": {
"id": "proceedings/icceai/2022/6803/0",
"title": "2022 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqOffxL",
"title": "2008 Seventh International Conference on Machine Learning and Applications",
"acronym": "icmla",
"groupId": "1001544",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzmclWX",
"doi": "10.1109/ICMLA.2008.47",
"title": "An Application of Latent Dirichlet Allocation to Analyzing Software Evolution",
"normalizedTitle": "An Application of Latent Dirichlet Allocation to Analyzing Software Evolution",
"abstract": "We develop and apply unsupervised statistical topic models, in particular Latent Dirichlet Allocation, to identify functional components of source code and study their evolution over multiple project versions. We present results for two large, open source Java projects, Eclipse and Argo UML, which are well-known and well-studied within the software mining community. Our results demonstrate the effectiveness of probabilistic topic models in automatically summarizing the temporal dynamics of software concerns, with direct application to project management and program understanding.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We develop and apply unsupervised statistical topic models, in particular Latent Dirichlet Allocation, to identify functional components of source code and study their evolution over multiple project versions. We present results for two large, open source Java projects, Eclipse and Argo UML, which are well-known and well-studied within the software mining community. Our results demonstrate the effectiveness of probabilistic topic models in automatically summarizing the temporal dynamics of software concerns, with direct application to project management and program understanding.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We develop and apply unsupervised statistical topic models, in particular Latent Dirichlet Allocation, to identify functional components of source code and study their evolution over multiple project versions. We present results for two large, open source Java projects, Eclipse and Argo UML, which are well-known and well-studied within the software mining community. Our results demonstrate the effectiveness of probabilistic topic models in automatically summarizing the temporal dynamics of software concerns, with direct application to project management and program understanding.",
"fno": "3495a813",
"keywords": [
"Topic Models",
"Software Evolution",
"Software Mining",
"Latent Dirichlet Allocation"
],
"authors": [
{
"affiliation": null,
"fullName": "Erik Linstead",
"givenName": "Erik",
"surname": "Linstead",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Cristina Lopes",
"givenName": "Cristina",
"surname": "Lopes",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Pierre Baldi",
"givenName": "Pierre",
"surname": "Baldi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icmla",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-12-01T00:00:00",
"pubType": "proceedings",
"pages": "813-818",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3495-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3495a808",
"articleId": "12OmNynJMKG",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3495a819",
"articleId": "12OmNz6iOtA",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdm/2011/4408/0/4408a141",
"title": "Learning Dirichlet Processes from Partially Observed Groups",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2011/4408a141/12OmNC943By",
"parentPublication": {
"id": "proceedings/icdm/2011/4408/0",
"title": "2011 IEEE 11th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icse/2010/8719/1/87190095",
"title": "Software traceability with topic modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icse/2010/87190095/12OmNrMZplW",
"parentPublication": {
"id": "proceedings/icse/2010/8719/1",
"title": "Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isda/2009/3872/0/3872b227",
"title": "Automatic Labeling of Topics",
"doi": null,
"abstractUrl": "/proceedings-article/isda/2009/3872b227/12OmNvk7JLW",
"parentPublication": {
"id": "proceedings/isda/2009/3872/0",
"title": "Intelligent Systems Design and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a055",
"title": "Validating the Use of Topic Models for Software Evolution",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a055/12OmNwIHoAd",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/3/4880c306",
"title": "Semi-Supervised Latent Dirichlet Allocation and Its Application for Document Classification",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880c306/12OmNy3149i",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a711",
"title": "Dirichlet Mixture Allocation for Multiclass Document Collections Modeling",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a711/12OmNyQYtum",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scam/2010/4178/0/4178a065",
"title": "Estimating the Optimal Number of Latent Concepts in Source Code Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/scam/2010/4178a065/12OmNzE54Fg",
"parentPublication": {
"id": "proceedings/scam/2010/4178/0",
"title": "2010 10th IEEE Working Conference on Source Code Analysis and Manipulation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2008/3496/1/3496a697",
"title": "Name Disambiguation Boosted by Latent Topics from Web Directories",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2008/3496a697/12OmNzd7baU",
"parentPublication": {
"id": "proceedings/wi-iat/2008/3496/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a148",
"title": "Sequential Latent Dirichlet Allocation: Discover Underlying Topic Structures within a Document",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a148/12OmNzdGnxE",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wcre/2008/3429/0/3429a155",
"title": "Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation",
"doi": null,
"abstractUrl": "/proceedings-article/wcre/2008/3429a155/12OmNzfXaue",
"parentPublication": {
"id": "proceedings/wcre/2008/3429/0",
"title": "2008 15th Working Conference on Reverse Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNz2TCub",
"title": "Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)",
"acronym": "icas-icns",
"groupId": "1001508",
"volume": "0",
"displayVolume": "0",
"year": "2005",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNB836Tg",
"doi": "10.1109/ICAS-ICNS.2005.69",
"title": "Network Anomaly Detection Using Time Series Analysis",
"normalizedTitle": "Network Anomaly Detection Using Time Series Analysis",
"abstract": "This paper presents a method of detecting network anomalies by analyzing the abrupt change of time series data obtained from Management Information Base (MIB) variables. The method applies the Auto- Regressive (AR) process to model the abrupt change of time series data, and performs sequential hypothesis test to detect the anomalies. With time correlation and location correlation, the method determines not only the presence of anomalous activity, but also its occurring time and location. The experimental results show that the proposed method performs well in detecting the traffic-related Anomalies",
"abstracts": [
{
"abstractType": "Regular",
"content": "This paper presents a method of detecting network anomalies by analyzing the abrupt change of time series data obtained from Management Information Base (MIB) variables. The method applies the Auto- Regressive (AR) process to model the abrupt change of time series data, and performs sequential hypothesis test to detect the anomalies. With time correlation and location correlation, the method determines not only the presence of anomalous activity, but also its occurring time and location. The experimental results show that the proposed method performs well in detecting the traffic-related Anomalies",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "This paper presents a method of detecting network anomalies by analyzing the abrupt change of time series data obtained from Management Information Base (MIB) variables. The method applies the Auto- Regressive (AR) process to model the abrupt change of time series data, and performs sequential hypothesis test to detect the anomalies. With time correlation and location correlation, the method determines not only the presence of anomalous activity, but also its occurring time and location. The experimental results show that the proposed method performs well in detecting the traffic-related Anomalies",
"fno": "24500042",
"keywords": [],
"authors": [
{
"affiliation": "East China University of Science and Technology",
"fullName": "Qingtao Wu",
"givenName": "Qingtao",
"surname": "Wu",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "East China University of Science and Technology",
"fullName": "Zhiqing Shao",
"givenName": "Zhiqing",
"surname": "Shao",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icas-icns",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2005-10-01T00:00:00",
"pubType": "proceedings",
"pages": "42",
"year": "2005",
"issn": null,
"isbn": "0-7695-2450-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "24500041",
"articleId": "12OmNyv7m1L",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "24500043",
"articleId": "12OmNyo1o4R",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icoin/2012/0251/0/06164419",
"title": "Time series anomaly detection using recessive subsequence",
"doi": null,
"abstractUrl": "/proceedings-article/icoin/2012/06164419/12OmNxVlTHd",
"parentPublication": {
"id": "proceedings/icoin/2012/0251/0",
"title": "2012 International Conference on Information Networking (ICOIN 2012)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2017/3800/0/3800b090",
"title": "Dependency Anomaly Detection for Heterogeneous Time Series: A Granger-Lasso Approach",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2017/3800b090/12OmNzUgdij",
"parentPublication": {
"id": "proceedings/icdmw/2017/3800/0",
"title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smartiot/2018/8543/0/854300a129",
"title": "RADM:Real-Time Anomaly Detection in Multivariate Time Series Based on Bayesian Network",
"doi": null,
"abstractUrl": "/proceedings-article/smartiot/2018/854300a129/13HFz3dT8c2",
"parentPublication": {
"id": "proceedings/smartiot/2018/8543/0",
"title": "2018 IEEE International Conference on Smart Internet of Things (SmartIoT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b342",
"title": "Anomaly Detection in Time Series with Robust Variational Quasi-Recurrent Autoencoders",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b342/1FwFHiAvnGM",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300d202",
"title": "Time Series Anomaly Detection Toolkit for Data Scientist",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300d202/1FwFK7zDScE",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isspit/2019/5341/0/09001882",
"title": "Evaluating the Impact of Feature Selection Methods on SNMP-MIB Interface Parameters to Accurately Detect Network Anomalies",
"doi": null,
"abstractUrl": "/proceedings-article/isspit/2019/09001882/1hHMfsDvc0o",
"parentPublication": {
"id": "proceedings/isspit/2019/5341/0",
"title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iciev-&-icivpr/2020/9331/0/09306570",
"title": "Anomaly Detection using Variational Autoencoder with Spectrum Analysis for Time Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306570/1qcifoz0rQc",
"parentPublication": {
"id": "proceedings/iciev-&-icivpr/2020/9331/0",
"title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09378139",
"title": "TadGAN: Time Series Anomaly Detection Using Generative Adversarial Networks",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09378139/1s64CPQKkA8",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400c225",
"title": "DAEMON: Unsupervised Anomaly Detection and Interpretation for Multivariate Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400c225/1uGXwqDJSg0",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smds/2021/0058/0/005800a142",
"title": "Track Before Detect: A Novel Approach For Unsupervised Anomaly Detection In Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/smds/2021/005800a142/1yeQvCFJDtS",
"parentPublication": {
"id": "proceedings/smds/2021/0058/0",
"title": "2021 IEEE International Conference on Smart Data Services (SMDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvjgWMZ",
"title": "2008 12th International Conference Information Visualisation",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNC1Y5kv",
"doi": "10.1109/IV.2008.65",
"title": "Similarity-Based Visualization of Time Series Collections: An Application to Analysis of Streamflows",
"normalizedTitle": "Similarity-Based Visualization of Time Series Collections: An Application to Analysis of Streamflows",
"abstract": "Time series analysis poses many challenges to professionals in a wide range of domains. Several visualization solutions have been proposed for exploratory tasks on time series collections. For large data sets, however, current techniques fail to provide a global view that supports a good association between groups of similar time series. We employ fast multidimensional projection techniques to create concise visual representations of a collection of time series. The whole collection can be viewed in a two-dimensional graph-based representation that provides a starting point for further exploration and detailed analysis. The projections employ distance metrics to compare the series and generate a layout that attempts to group those with similar behavior. We illustrate the approach on a real data set containing streamflows describing the behavior of hydroelectric power plants in Brazil.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Time series analysis poses many challenges to professionals in a wide range of domains. Several visualization solutions have been proposed for exploratory tasks on time series collections. For large data sets, however, current techniques fail to provide a global view that supports a good association between groups of similar time series. We employ fast multidimensional projection techniques to create concise visual representations of a collection of time series. The whole collection can be viewed in a two-dimensional graph-based representation that provides a starting point for further exploration and detailed analysis. The projections employ distance metrics to compare the series and generate a layout that attempts to group those with similar behavior. We illustrate the approach on a real data set containing streamflows describing the behavior of hydroelectric power plants in Brazil.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Time series analysis poses many challenges to professionals in a wide range of domains. Several visualization solutions have been proposed for exploratory tasks on time series collections. For large data sets, however, current techniques fail to provide a global view that supports a good association between groups of similar time series. We employ fast multidimensional projection techniques to create concise visual representations of a collection of time series. The whole collection can be viewed in a two-dimensional graph-based representation that provides a starting point for further exploration and detailed analysis. The projections employ distance metrics to compare the series and generate a layout that attempts to group those with similar behavior. We illustrate the approach on a real data set containing streamflows describing the behavior of hydroelectric power plants in Brazil.",
"fno": "3268a280",
"keywords": [],
"authors": [
{
"affiliation": null,
"fullName": "Aretha Barbosa Alencar",
"givenName": "Aretha Barbosa",
"surname": "Alencar",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Fernando Vieira Paulovich",
"givenName": "Fernando Vieira",
"surname": "Paulovich",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Rosane Minghim",
"givenName": "Rosane",
"surname": "Minghim",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Marinho Gomes de Andrade Filho",
"givenName": "Marinho Gomes de Andrade",
"surname": "Filho",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Maria Cristina Ferreira de Oliveira",
"givenName": "Maria Cristina Ferreira de",
"surname": "Oliveira",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-07-01T00:00:00",
"pubType": "proceedings",
"pages": "280-286",
"year": "2008",
"issn": "1550-6037",
"isbn": "978-0-7695-3268-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3268a273",
"articleId": "12OmNyVerZM",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3268a287",
"articleId": "12OmNAWpyw7",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fskd/2009/3735/1/3735a286",
"title": "Similarity Analysis on Nonstationary Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735a286/12OmNBcAGOh",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/1",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cis/2011/4584/0/4584b357",
"title": "Similarity Matching over Uncertain Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/cis/2011/4584b357/12OmNqH9hdK",
"parentPublication": {
"id": "proceedings/cis/2011/4584/0",
"title": "2011 Seventh International Conference on Computational Intelligence and Security",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2006/2570/0/25700149",
"title": "Threshold Similarity Queries in Large Time Series Databases",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2006/25700149/12OmNx76TAU",
"parentPublication": {
"id": "proceedings/icde/2006/2570/0",
"title": "22nd International Conference on Data Engineering (ICDE'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmecg/2010/8507/0/05628635",
"title": "The Similarity of Multivariate Time Series and Its Application",
"doi": null,
"abstractUrl": "/proceedings-article/icmecg/2010/05628635/12OmNxVlTIO",
"parentPublication": {
"id": "proceedings/icmecg/2010/8507/0",
"title": "2010 Fourth International Conference on Management of E-Commerce and E-Government (ICMeCG 2010)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/1999/0071/0/00710410",
"title": "On Similarity-Based Queries for Time Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/icde/1999/00710410/12OmNyaGeIj",
"parentPublication": {
"id": "proceedings/icde/1999/0071/0",
"title": "Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mines/2010/4258/0/4258a861",
"title": "Similarity Matching Algorithm of Multiple Granularities Time-Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/mines/2010/4258a861/12OmNzUxOk3",
"parentPublication": {
"id": "proceedings/mines/2010/4258/0",
"title": "Multimedia Information Networking and Security, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/1/3336a584",
"title": "Multiple Radar Time Series Similarity Matching Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336a584/12OmNzWx03S",
"parentPublication": {
"id": "proceedings/csse/2008/3336/1",
"title": "Computer Science and Software Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dcabes/2015/6593/0/6593a435",
"title": "A Similarity Model Based on Trend for Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/dcabes/2015/6593a435/12OmNzlUKn7",
"parentPublication": {
"id": "proceedings/dcabes/2015/6593/0",
"title": "2015 14th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2010/11/ttk2010111609",
"title": "Dictionary-Based Compression for Long Time-Series Similarity",
"doi": null,
"abstractUrl": "/journal/tk/2010/11/ttk2010111609/13rRUB7a1gh",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2016/01/07172543",
"title": "Similarity Measure Selection for Clustering Time Series Databases",
"doi": null,
"abstractUrl": "/journal/tk/2016/01/07172543/13rRUxD9gYc",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBhpS6F",
"title": "2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing",
"acronym": "synasc",
"groupId": "1001577",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvB9FzP",
"doi": "10.1109/SYNASC.2011.35",
"title": "Using Exploratory Data Analysis for Fraud Elicitation through Supervised Learning",
"normalizedTitle": "Using Exploratory Data Analysis for Fraud Elicitation through Supervised Learning",
"abstract": "Outlier detection is a relevant problem for many domains, among which for detection of fraudulent behavior. Exploratory Data Analysis techniques are known to be very useful for highlighting patterns and deviations in data through visual representations. Less explored is the feasibility of using them to build learning models for outlier detection, which can be applied automatically to classify data without human intervention. In this paper we propose a method that uses one Exploratory Data Analysis technique -- Andrews curves -- in order to produce a classifier, which we applied to a real dataset, extracted from an online auction site, obtaining positive results regarding elicitation of fraudulent behavior.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Outlier detection is a relevant problem for many domains, among which for detection of fraudulent behavior. Exploratory Data Analysis techniques are known to be very useful for highlighting patterns and deviations in data through visual representations. Less explored is the feasibility of using them to build learning models for outlier detection, which can be applied automatically to classify data without human intervention. In this paper we propose a method that uses one Exploratory Data Analysis technique -- Andrews curves -- in order to produce a classifier, which we applied to a real dataset, extracted from an online auction site, obtaining positive results regarding elicitation of fraudulent behavior.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Outlier detection is a relevant problem for many domains, among which for detection of fraudulent behavior. Exploratory Data Analysis techniques are known to be very useful for highlighting patterns and deviations in data through visual representations. Less explored is the feasibility of using them to build learning models for outlier detection, which can be applied automatically to classify data without human intervention. In this paper we propose a method that uses one Exploratory Data Analysis technique -- Andrews curves -- in order to produce a classifier, which we applied to a real dataset, extracted from an online auction site, obtaining positive results regarding elicitation of fraudulent behavior.",
"fno": "4630a251",
"keywords": [
"Outlier Detection",
"Supervised Learning",
"Exploratory Data Analysis",
"Fraud Elicitation"
],
"authors": [
{
"affiliation": null,
"fullName": "Vinicius Almendra",
"givenName": "Vinicius",
"surname": "Almendra",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Bianca Roman",
"givenName": "Bianca",
"surname": "Roman",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "synasc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-09-01T00:00:00",
"pubType": "proceedings",
"pages": "251-254",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4630-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4630a247",
"articleId": "12OmNzEVRXc",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4630a255",
"articleId": "12OmNzdoMLF",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/synasc/2011/4630/0/4630a168",
"title": "A Supervised Learning Process to Elicit Fraud Cases in Online Auction Sites",
"doi": null,
"abstractUrl": "/proceedings-article/synasc/2011/4630a168/12OmNAo45J9",
"parentPublication": {
"id": "proceedings/synasc/2011/4630/0",
"title": "2011 13th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2012/4925/0/4925a332",
"title": "Evaluating Fraud Detection Algorithms Using an Auction Data Generator",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2012/4925a332/12OmNqAU6A4",
"parentPublication": {
"id": "proceedings/icdmw/2012/4925/0",
"title": "2012 IEEE 12th International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/jcai/2009/3615/0/3615a353",
"title": "Research on Credit Card Fraud Detection Model Based on Distance Sum",
"doi": null,
"abstractUrl": "/proceedings-article/jcai/2009/3615a353/12OmNvUaNq7",
"parentPublication": {
"id": "proceedings/jcai/2009/3615/0",
"title": "2009 International Joint Conference on Artificial Intelligence (JCAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cerma/2011/4563/0/4563a041",
"title": "Outlier Detection Applying an Innovative User Transaction Modeling with Automatic Explanation",
"doi": null,
"abstractUrl": "/proceedings-article/cerma/2011/4563a041/12OmNvkpkRx",
"parentPublication": {
"id": "proceedings/cerma/2011/4563/0",
"title": "Electronics, Robotics and Automotive Mechanics Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2009/3895/0/3895a139",
"title": "Unsupervised Class Separation of Multivariate Data through Cumulative Variance-Based Ranking",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2009/3895a139/12OmNwD1pQj",
"parentPublication": {
"id": "proceedings/icdm/2009/3895/0",
"title": "2009 Ninth IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/1/3735a520",
"title": "Rough-Based Semi-supervised Outlier Detection",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735a520/12OmNy6qfIS",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/1",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dbta/2009/3604/0/3604a295",
"title": "Research on Credit Card Fraud Detection Model Based on Similar Coefficient Sum",
"doi": null,
"abstractUrl": "/proceedings-article/dbta/2009/3604a295/12OmNzWfp9W",
"parentPublication": {
"id": "proceedings/dbta/2009/3604/0",
"title": "2009 First International Workshop on Database Technology and Applications, DBTA",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tq/2009/04/ttq2009040309",
"title": "BLAST-SSAHA Hybridization for Credit Card Fraud Detection",
"doi": null,
"abstractUrl": "/journal/tq/2009/04/ttq2009040309/13rRUyYBlhZ",
"parentPublication": {
"id": "trans/tq",
"title": "IEEE Transactions on Dependable and Secure Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icps/2022/7022/0/702200a099",
"title": "Credit Card Fraud Identification Using Logistic Regression and Local Outlier Factor",
"doi": null,
"abstractUrl": "/proceedings-article/icps/2022/702200a099/1IbRGN9sGAg",
"parentPublication": {
"id": "proceedings/icps/2022/7022/0",
"title": "2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/trustcom-bigdatase/2019/2777/0/277700a280",
"title": "Credit Card Fraud Detection in E-Commerce",
"doi": null,
"abstractUrl": "/proceedings-article/trustcom-bigdatase/2019/277700a280/1ezRuL25XRC",
"parentPublication": {
"id": "proceedings/trustcom-bigdatase/2019/2777/0",
"title": "2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzy7uOF",
"title": "Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004.",
"acronym": "iv",
"groupId": "1000370",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNx7ouXx",
"doi": "10.1109/IV.2004.1320138",
"title": "A Usability Framework for the Design and Evaluation of an Exploratory Geovisualization Environment",
"normalizedTitle": "A Usability Framework for the Design and Evaluation of an Exploratory Geovisualization Environment",
"abstract": "The exploration of large geospatial data for finding patterns and understanding underlying processes is one of the challenges in geovisualization research. New methods are needed for effective extraction of patterns and appropriate visualization tools are necessary to support knowledge construction throughout the exploration process. Based on an approach to combine visual and computational methods, a visualization environment has been developed to support visual data mining and knowledge discovery tasks. This environment integrates non-geographic information spaces with maps and other graphics that allow users to explore patterns and attribute relationships. The development of the tool intends to facilitate knowledge construction using a number of steps that underline data mining and knowledge discovery methodology. In order to investigate the effectiveness of the design concept, an empirical usability testing is planed to assess the tool's ability to meet user performance and satisfaction. In this test, different options of map-based and interactive visualizations of the output of a Self-Organizing Map (SOM) are used to explore a socio-demographic dataset. The study emphasizes the knowledge discovery process based on exploratory tasks and visualization operations. This paper describes the usability framework used to guide the design, and examines key aspects of the evaluation of such visual-computational environment.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The exploration of large geospatial data for finding patterns and understanding underlying processes is one of the challenges in geovisualization research. New methods are needed for effective extraction of patterns and appropriate visualization tools are necessary to support knowledge construction throughout the exploration process. Based on an approach to combine visual and computational methods, a visualization environment has been developed to support visual data mining and knowledge discovery tasks. This environment integrates non-geographic information spaces with maps and other graphics that allow users to explore patterns and attribute relationships. The development of the tool intends to facilitate knowledge construction using a number of steps that underline data mining and knowledge discovery methodology. In order to investigate the effectiveness of the design concept, an empirical usability testing is planed to assess the tool's ability to meet user performance and satisfaction. In this test, different options of map-based and interactive visualizations of the output of a Self-Organizing Map (SOM) are used to explore a socio-demographic dataset. The study emphasizes the knowledge discovery process based on exploratory tasks and visualization operations. This paper describes the usability framework used to guide the design, and examines key aspects of the evaluation of such visual-computational environment.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The exploration of large geospatial data for finding patterns and understanding underlying processes is one of the challenges in geovisualization research. New methods are needed for effective extraction of patterns and appropriate visualization tools are necessary to support knowledge construction throughout the exploration process. Based on an approach to combine visual and computational methods, a visualization environment has been developed to support visual data mining and knowledge discovery tasks. This environment integrates non-geographic information spaces with maps and other graphics that allow users to explore patterns and attribute relationships. The development of the tool intends to facilitate knowledge construction using a number of steps that underline data mining and knowledge discovery methodology. In order to investigate the effectiveness of the design concept, an empirical usability testing is planed to assess the tool's ability to meet user performance and satisfaction. In this test, different options of map-based and interactive visualizations of the output of a Self-Organizing Map (SOM) are used to explore a socio-demographic dataset. The study emphasizes the knowledge discovery process based on exploratory tasks and visualization operations. This paper describes the usability framework used to guide the design, and examines key aspects of the evaluation of such visual-computational environment.",
"fno": "21770153",
"keywords": [
"Exploratory Visualization",
"Visual Data Mining",
"Knowledge Discovery",
"Self Organizing Map"
],
"authors": [
{
"affiliation": "International Institute for Geoinformation Science and Earth Observation (ITC), The Netherlands",
"fullName": "Etien L. Koua",
"givenName": "Etien L.",
"surname": "Koua",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "International Institute for Geoinformation Science and Earth Observation (ITC), The Netherlands",
"fullName": "Menno-Jan Kraak",
"givenName": "Menno-Jan",
"surname": "Kraak",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iv",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-07-01T00:00:00",
"pubType": "proceedings",
"pages": "153-158",
"year": "2004",
"issn": "1093-9547",
"isbn": "0-7695-2177-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "21770145",
"articleId": "12OmNwMXnqt",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "21770159",
"articleId": "12OmNxwENxI",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/his/2004/2291/0/22910098",
"title": "Knowledge Discovery with SOM Networks in Financial Investment Strategy",
"doi": null,
"abstractUrl": "/proceedings-article/his/2004/22910098/12OmNBO3KaD",
"parentPublication": {
"id": "proceedings/his/2004/2291/0",
"title": "Hybrid Intelligent Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/socpar/2009/3879/0/3879a254",
"title": "An Artificial Neural Network Model for Multi Dimension Reduction and Data Structure Exploration",
"doi": null,
"abstractUrl": "/proceedings-article/socpar/2009/3879a254/12OmNBlFQWz",
"parentPublication": {
"id": "proceedings/socpar/2009/3879/0",
"title": "Soft Computing and Pattern Recognition, International Conference of",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bife/2010/4116/0/4116a024",
"title": "Self-Organizing Map for Clustering Algorithms in Programming Codes",
"doi": null,
"abstractUrl": "/proceedings-article/bife/2010/4116a024/12OmNvrdI2j",
"parentPublication": {
"id": "proceedings/bife/2010/4116/0",
"title": "2010 Third International Conference on Business Intelligence and Financial Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bmei/2008/3118/2/3118b506",
"title": "Speech Visualization based on Robust Self-organizing Map (RSOM) for the Hearing Impaired",
"doi": null,
"abstractUrl": "/proceedings-article/bmei/2008/3118b506/12OmNwdtwjR",
"parentPublication": {
"id": "proceedings/bmei/2008/3118/2",
"title": "BioMedical Engineering and Informatics, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/apvis/2007/0808/0/04126211",
"title": "Visualization and analysis of email networks",
"doi": null,
"abstractUrl": "/proceedings-article/apvis/2007/04126211/12OmNyOHFYh",
"parentPublication": {
"id": "proceedings/apvis/2007/0808/0",
"title": "Asia-Pacific Symposium on Visualisation 2007",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iv/2003/1988/0/19880086",
"title": "Visual Analysis based on Algorithmic Classification",
"doi": null,
"abstractUrl": "/proceedings-article/iv/2003/19880086/12OmNyuPL1k",
"parentPublication": {
"id": "proceedings/iv/2003/1988/0",
"title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csie/2009/3507/4/3507d126",
"title": "How Emergent Self Organizing Maps Can Help Counter Domestic Violence",
"doi": null,
"abstractUrl": "/proceedings-article/csie/2009/3507d126/12OmNzUxO60",
"parentPublication": {
"id": "proceedings/csie/2009/3507/4",
"title": "Computer Science and Information Engineering, World Congress on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2009/3902/0/3902a217",
"title": "Understanding Climate Change Patterns with Multivariate Geovisualization",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2009/3902a217/12OmNzvhvN1",
"parentPublication": {
"id": "proceedings/icdmw/2009/3902/0",
"title": "2009 IEEE International Conference on Data Mining Workshops",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tb/2007/02/n0163",
"title": "Poisson-Based Self-Organizing Feature Maps and Hierarchical Clustering for Serial Analysis of Gene Expression Data",
"doi": null,
"abstractUrl": "/journal/tb/2007/02/n0163/13rRUxAASZr",
"parentPublication": {
"id": "trans/tb",
"title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122422",
"title": "Exploratory Analysis of Time-Series with ChronoLenses",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122422/13rRUxASuGf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNvpNIpw",
"title": "2015 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"acronym": "vast",
"groupId": "1001630",
"volume": "0",
"displayVolume": "0",
"year": "2015",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyqRnab",
"doi": "10.1109/VAST.2015.7347684",
"title": "Sequencing of categorical time series",
"normalizedTitle": "Sequencing of categorical time series",
"abstract": "Exploring and comparing categorical time series and finding temporal patterns are complex tasks in the field of time series data mining. Although different analysis approaches exist, these tasks remain challenging, especially when numerous time series are considered at once. We propose a visual analysis approach that supports exploring such data by ordering time series in meaningful ways. We provide interaction techniques to steer the automated arrangement and to allow users to investigate patterns in detail.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Exploring and comparing categorical time series and finding temporal patterns are complex tasks in the field of time series data mining. Although different analysis approaches exist, these tasks remain challenging, especially when numerous time series are considered at once. We propose a visual analysis approach that supports exploring such data by ordering time series in meaningful ways. We provide interaction techniques to steer the automated arrangement and to allow users to investigate patterns in detail.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Exploring and comparing categorical time series and finding temporal patterns are complex tasks in the field of time series data mining. Although different analysis approaches exist, these tasks remain challenging, especially when numerous time series are considered at once. We propose a visual analysis approach that supports exploring such data by ordering time series in meaningful ways. We provide interaction techniques to steer the automated arrangement and to allow users to investigate patterns in detail.",
"fno": "07347684",
"keywords": [
"I 5 3 Clustering Algorithm Similarity Measures",
"H 5 2 Information Interfaces And Presentation User Interfaces Graphical User Interfaces GUI"
],
"authors": [
{
"affiliation": "University of Rostock, Germany",
"fullName": "Christian Richter",
"givenName": "Christian",
"surname": "Richter",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Rostock, Germany",
"fullName": "Martin Luboschik",
"givenName": "Martin",
"surname": "Luboschik",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Rostock, Germany",
"fullName": "Martin Rohlig",
"givenName": "Martin",
"surname": "Rohlig",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Rostock, Germany",
"fullName": "Heidrun Schumann",
"givenName": "Heidrun",
"surname": "Schumann",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "vast",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2015-10-01T00:00:00",
"pubType": "proceedings",
"pages": "213-214",
"year": "2015",
"issn": null,
"isbn": "978-1-4673-9783-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "07347683",
"articleId": "12OmNBKmXm4",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "07347685",
"articleId": "12OmNznkK2t",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icde/2006/2570/0/25700115",
"title": "Mining Dense Periodic Patterns in Time Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2006/25700115/12OmNAQJzSA",
"parentPublication": {
"id": "proceedings/icde/2006/2570/0",
"title": "22nd International Conference on Data Engineering (ICDE'06)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2002/1754/0/17540099",
"title": "Unsupervised Segmentation of Categorical Time Series into Episodes",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2002/17540099/12OmNBCqbDz",
"parentPublication": {
"id": "proceedings/icdm/2002/1754/0",
"title": "2002 IEEE International Conference on Data Mining, 2002. Proceedings.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/1999/0071/0/00710106",
"title": "Efficient Mining of Partial Periodic Patterns in Time Series Database",
"doi": null,
"abstractUrl": "/proceedings-article/icde/1999/00710106/12OmNBOllnA",
"parentPublication": {
"id": "proceedings/icde/1999/0071/0",
"title": "Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2016/5661/0/07883518",
"title": "Shape grammar extraction for efficient query-by-sketch pattern matching in long time series",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2016/07883518/12OmNyRg4mj",
"parentPublication": {
"id": "proceedings/vast/2016/5661/0",
"title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccsit/2009/4519/0/05234775",
"title": "Time series representation for anomaly detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccsit/2009/05234775/12OmNzSyCjH",
"parentPublication": {
"id": "proceedings/iccsit/2009/4519/0",
"title": "Computer Science and Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vast/2015/9783/0/07347688",
"title": "Trending pool: Visual analytics for trending event compositions for time-series categorical log data",
"doi": null,
"abstractUrl": "/proceedings-article/vast/2015/07347688/12OmNzZmZuP",
"parentPublication": {
"id": "proceedings/vast/2015/9783/0",
"title": "2015 IEEE Conference on Visual Analytics Science and Technology (VAST)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2005/07/k0875",
"title": "Periodicity Detection in Time Series Databases",
"doi": null,
"abstractUrl": "/journal/tk/2005/07/k0875/13rRUwdrdL0",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/06/06975152",
"title": "Scalable Classification of Repetitive Time Series Through Frequencies of Local Polynomials",
"doi": null,
"abstractUrl": "/journal/tk/2015/06/06975152/13rRUxDIthH",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iri/2022/6603/0/660300a027",
"title": "NLP Based Anomaly Detection for Categorical Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/iri/2022/660300a027/1GvdSPfmo7e",
"parentPublication": {
"id": "proceedings/iri/2022/6603/0",
"title": "2022 IEEE 23rd International Conference on Information Reuse and Integration for Data Science (IRI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2023/7578/0/757800a269",
"title": "Temporal Convolutional Network-Based Time-Series Segmentation",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2023/757800a269/1LFLAQcKyWs",
"parentPublication": {
"id": "proceedings/bigcomp/2023/7578/0",
"title": "2023 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBhpS6N",
"title": "2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)",
"acronym": "iih-msp",
"groupId": "1001543",
"volume": "0",
"displayVolume": "0",
"year": "2008",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzE54DZ",
"doi": "10.1109/IIH-MSP.2008.339",
"title": "Research on Communication Constellation Simulation Based on Exploratory Analysis",
"normalizedTitle": "Research on Communication Constellation Simulation Based on Exploratory Analysis",
"abstract": "The simulation of communication constellation for phase 0/A has a lot of uncertainty factors. Exploratory analysis faces high level system demonstration. By examining the consequence of uncertainty, exploratory analysis explores all kinds of abilities and strategies of the system, to grasp the essential factors and gain a broad understanding of problem domain before dipping into details. In the methodology point of view, this paper explores the simulation of communication constellation, and presents a kind of exploratory analysis frame, establishing the groundwork for the future research on communication constellation simulation and system optimization.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The simulation of communication constellation for phase 0/A has a lot of uncertainty factors. Exploratory analysis faces high level system demonstration. By examining the consequence of uncertainty, exploratory analysis explores all kinds of abilities and strategies of the system, to grasp the essential factors and gain a broad understanding of problem domain before dipping into details. In the methodology point of view, this paper explores the simulation of communication constellation, and presents a kind of exploratory analysis frame, establishing the groundwork for the future research on communication constellation simulation and system optimization.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The simulation of communication constellation for phase 0/A has a lot of uncertainty factors. Exploratory analysis faces high level system demonstration. By examining the consequence of uncertainty, exploratory analysis explores all kinds of abilities and strategies of the system, to grasp the essential factors and gain a broad understanding of problem domain before dipping into details. In the methodology point of view, this paper explores the simulation of communication constellation, and presents a kind of exploratory analysis frame, establishing the groundwork for the future research on communication constellation simulation and system optimization.",
"fno": "3278b498",
"keywords": [
"Communication Constellation Simulation",
"Exploratory Analysis"
],
"authors": [
{
"affiliation": null,
"fullName": "Ying Yang",
"givenName": "Ying",
"surname": "Yang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Ying-Hua Li",
"givenName": "Ying-Hua",
"surname": "Li",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Yong Li",
"givenName": "Yong",
"surname": "Li",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iih-msp",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2008-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1498-1500",
"year": "2008",
"issn": null,
"isbn": "978-0-7695-3278-3",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3278b561",
"articleId": "12OmNBvkdnK",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3278b503",
"articleId": "12OmNqJZgDi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/aina/2003/1906/0/19060551",
"title": "On the Blind Carrier Phase Estimation for Large QAM Constellation",
"doi": null,
"abstractUrl": "/proceedings-article/aina/2003/19060551/12OmNAsBFMY",
"parentPublication": {
"id": "proceedings/aina/2003/1906/0",
"title": "17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kam/2009/3888/2/3888b139",
"title": "Virtual Actor and Its Behavior Simulation Based on Exploratory Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/kam/2009/3888b139/12OmNBTawnz",
"parentPublication": {
"id": "proceedings/kam/2009/3888/2",
"title": "Knowledge Acquisition and Modeling, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/acssc/1988/9999/1/00753965",
"title": "Performance Of The Radon Transform Method For Constellation Identification",
"doi": null,
"abstractUrl": "/proceedings-article/acssc/1988/00753965/12OmNC8MsyC",
"parentPublication": {
"id": "proceedings/acssc/1988/9999/1",
"title": "Twenty-Second Asilomar Conference on Signals, Systems and Computers",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031c974",
"title": "Research on the Incomplete Constellation GPS Positioning Algorithm Aided by Altitude",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031c974/12OmNqBKTXD",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chinacom/2011/0100/0/06158313",
"title": "Study on Orthogonal IGSO global communication satellite constellation",
"doi": null,
"abstractUrl": "/proceedings-article/chinacom/2011/06158313/12OmNxEByZu",
"parentPublication": {
"id": "proceedings/chinacom/2011/0100/0",
"title": "2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/chinacom/2014/5970/0/07054302",
"title": "Signal constellation design for intensity modulated free-space optical communications",
"doi": null,
"abstractUrl": "/proceedings-article/chinacom/2014/07054302/12OmNxecS9X",
"parentPublication": {
"id": "proceedings/chinacom/2014/5970/0",
"title": "2014 9th International Conference on Communications and Networking in China (CHINACOM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ausctw/2005/9007/0/01624230",
"title": "Performance of nonuniform M-ary QAM constellation on nonlinear channels",
"doi": null,
"abstractUrl": "/proceedings-article/ausctw/2005/01624230/12OmNypIYzx",
"parentPublication": {
"id": "proceedings/ausctw/2005/9007/0",
"title": "Proceedings. 6th Australian Communications Theory Workshop 2005",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/lcn/2010/8387/0/p745sulyman",
"title": "A two-stage constellation partition algorithm for reduced-complexity MIMO-MLD systems",
"doi": null,
"abstractUrl": "/proceedings-article/lcn/2010/p745sulyman/12OmNzaQof2",
"parentPublication": {
"id": "proceedings/lcn/2010/8387/0",
"title": "IEEE Local Computer Network Conference",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icftic/2022/2195/0/10075303",
"title": "Research on Modulation Recognition Method of Single Carrier Signal Based on Lightweight Network",
"doi": null,
"abstractUrl": "/proceedings-article/icftic/2022/10075303/1LRlnW32bny",
"parentPublication": {
"id": "proceedings/icftic/2022/2195/0",
"title": "2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icisce/2020/6406/0/640600b259",
"title": "Self-learning Constellation Mapping Method Based on Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icisce/2020/640600b259/1x3kChQPGyk",
"parentPublication": {
"id": "proceedings/icisce/2020/6406/0",
"title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNBezSEu",
"title": "2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)",
"acronym": "isspit",
"groupId": "1001026",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzZWbFx",
"doi": "10.1109/ISSPIT.2017.8388663",
"title": "A visual analytics approach for exploration of high-dimensional time series based on neighbor-joining tree",
"normalizedTitle": "A visual analytics approach for exploration of high-dimensional time series based on neighbor-joining tree",
"abstract": "High-dimensional time series analysis through visual techniques poses many challenges due to the visualization solutions proposed until now for exploratory tasks are not well-oriented to high volume of data. When the data sets grow large, the visual alternatives do not allow for a good association between similar time series. With the aim to increase more alternatives, we introduce a visual analytic approach based on Neighbor-Joining similarity tree. The proposed approach internally consists of five time series dimension reduction techniques widely used, two well-known similarity measures and interaction mechanisms to do exploratory analysis of high-dimensional time series data interactively.",
"abstracts": [
{
"abstractType": "Regular",
"content": "High-dimensional time series analysis through visual techniques poses many challenges due to the visualization solutions proposed until now for exploratory tasks are not well-oriented to high volume of data. When the data sets grow large, the visual alternatives do not allow for a good association between similar time series. With the aim to increase more alternatives, we introduce a visual analytic approach based on Neighbor-Joining similarity tree. The proposed approach internally consists of five time series dimension reduction techniques widely used, two well-known similarity measures and interaction mechanisms to do exploratory analysis of high-dimensional time series data interactively.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "High-dimensional time series analysis through visual techniques poses many challenges due to the visualization solutions proposed until now for exploratory tasks are not well-oriented to high volume of data. When the data sets grow large, the visual alternatives do not allow for a good association between similar time series. With the aim to increase more alternatives, we introduce a visual analytic approach based on Neighbor-Joining similarity tree. The proposed approach internally consists of five time series dimension reduction techniques widely used, two well-known similarity measures and interaction mechanisms to do exploratory analysis of high-dimensional time series data interactively.",
"fno": "08388663",
"keywords": [
"Time Series Analysis",
"Visualization",
"Dimensionality Reduction",
"Euclidean Distance",
"Signal Processing Algorithms",
"Discrete Wavelet Transforms",
"Signal Processing"
],
"authors": [
{
"affiliation": "Universidad Nacional, de San Agustín, Arequipa, Peru",
"fullName": "Roberto Rodriguez Urquiaga",
"givenName": "Roberto Rodriguez",
"surname": "Urquiaga",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad La Salle, Arequipa, Peru",
"fullName": "Ana Maria Cuadros Valdivia",
"givenName": "Ana Maria Cuadros",
"surname": "Valdivia",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Universidad Nacional, de San Agustín, Arequipa, Peru",
"fullName": "Reynaldo Alfonte Zapana",
"givenName": "Reynaldo Alfonte",
"surname": "Zapana",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isspit",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "325-330",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-4662-5",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08388662",
"articleId": "12OmNyv7mcU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08388664",
"articleId": "12OmNzlly0A",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icdmw/2017/3800/0/3800a025",
"title": "Distance and Density Clustering for Time Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2017/3800a025/12OmNApLGQv",
"parentPublication": {
"id": "proceedings/icdmw/2017/3800/0",
"title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2004/06/k0669",
"title": "Skyline Index for Time Series Data",
"doi": null,
"abstractUrl": "/journal/tk/2004/06/k0669/13rRUwvT9gF",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2020/01/08528881",
"title": "Massively Distributed Time Series Indexing and Querying",
"doi": null,
"abstractUrl": "/journal/tk/2020/01/08528881/17D45WXIkCZ",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bdva/2018/9194/0/08534025",
"title": "Towards Visual Exploration of Large Temporal Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/bdva/2018/08534025/17D45XoXP4N",
"parentPublication": {
"id": "proceedings/bdva/2018/9194/0",
"title": "2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/itme/2018/7744/0/774400a817",
"title": "Feature-Based Dividing Symbolic Time Series Representation for Streaming Data Processing",
"doi": null,
"abstractUrl": "/proceedings-article/itme/2018/774400a817/17D45Xq6dC9",
"parentPublication": {
"id": "proceedings/itme/2018/7744/0",
"title": "2018 9th International Conference on Information Technology in Medicine and Education (ITME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2023/06/09756854",
"title": "Efficient Range and kNN Twin Subsequence Search in Time Series",
"doi": null,
"abstractUrl": "/journal/tk/2023/06/09756854/1Cxv5xOVQOs",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/e-science/2022/6124/0/612400a204",
"title": "Automatic Versioning of Time Series Datasets: a FAIR Algorithmic Approach",
"doi": null,
"abstractUrl": "/proceedings-article/e-science/2022/612400a204/1J6hxKuMwSc",
"parentPublication": {
"id": "proceedings/e-science/2022/6124/0",
"title": "2022 IEEE 18th International Conference on e-Science (e-Science)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09006471",
"title": "Understanding Data Similarity in Large-Scale Scientific Datasets",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09006471/1hJrJFsQkNi",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pacificvis/2021/3931/0/393100a051",
"title": "NetScatter: Visual analytics of multivariate time series with a hybrid of dynamic and static variable relationships",
"doi": null,
"abstractUrl": "/proceedings-article/pacificvis/2021/393100a051/1tTtrcoidWg",
"parentPublication": {
"id": "proceedings/pacificvis/2021/3931/0",
"title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigdataservice/2021/3483/0/348300a190",
"title": "A Similarity Measurement for Multivariate Time Series Based on Variable Clustering",
"doi": null,
"abstractUrl": "/proceedings-article/bigdataservice/2021/348300a190/1xNNqRvqFbO",
"parentPublication": {
"id": "proceedings/bigdataservice/2021/3483/0",
"title": "2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1qcibXBSvDi",
"title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)",
"acronym": "iciev-&-icivpr",
"groupId": "1802578",
"volume": "0",
"displayVolume": "0",
"year": "2020",
"__typename": "ProceedingType"
},
"article": {
"id": "1qcifoz0rQc",
"doi": "10.1109/ICIEVicIVPR48672.2020.9306570",
"title": "Anomaly Detection using Variational Autoencoder with Spectrum Analysis for Time Series Data",
"normalizedTitle": "Anomaly Detection using Variational Autoencoder with Spectrum Analysis for Time Series Data",
"abstract": "Uncertainty is an ever present challenge in life. To meet this challenge in data analysis, we propose a method for detecting anomalies in data. This method, based in part on Variational Autoencoder, identifies spiking raw data by means of spectrum analysis. Time series data are examined in the frequency domain to enhance the detection of anomalies. In this paper, we have used the standard data sets to validate the proposed method. Experimental results show that the comparison of the frequency domain with the original data for anomaly detection can improve validity and accuracy on all criteria. Therefore, analysis of time series data by combining Variational Autoencoder and frequency domain spectrum methods can effectively detect anomalies. Contribution- We have proposed an anomaly detection method based on the time series data analysis by combining Variational Autoencoder and Spectrum analysis, and have benchmarked the method with reference to recent related research.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Uncertainty is an ever present challenge in life. To meet this challenge in data analysis, we propose a method for detecting anomalies in data. This method, based in part on Variational Autoencoder, identifies spiking raw data by means of spectrum analysis. Time series data are examined in the frequency domain to enhance the detection of anomalies. In this paper, we have used the standard data sets to validate the proposed method. Experimental results show that the comparison of the frequency domain with the original data for anomaly detection can improve validity and accuracy on all criteria. Therefore, analysis of time series data by combining Variational Autoencoder and frequency domain spectrum methods can effectively detect anomalies. Contribution- We have proposed an anomaly detection method based on the time series data analysis by combining Variational Autoencoder and Spectrum analysis, and have benchmarked the method with reference to recent related research.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Uncertainty is an ever present challenge in life. To meet this challenge in data analysis, we propose a method for detecting anomalies in data. This method, based in part on Variational Autoencoder, identifies spiking raw data by means of spectrum analysis. Time series data are examined in the frequency domain to enhance the detection of anomalies. In this paper, we have used the standard data sets to validate the proposed method. Experimental results show that the comparison of the frequency domain with the original data for anomaly detection can improve validity and accuracy on all criteria. Therefore, analysis of time series data by combining Variational Autoencoder and frequency domain spectrum methods can effectively detect anomalies. Contribution- We have proposed an anomaly detection method based on the time series data analysis by combining Variational Autoencoder and Spectrum analysis, and have benchmarked the method with reference to recent related research.",
"fno": "09306570",
"keywords": [
"Frequency Domain Analysis",
"Image Coding",
"Time Series",
"Standard Data Sets",
"Frequency Domain Spectrum Methods",
"Anomaly Detection Method",
"Time Series Data Analysis",
"Spectrum Analysis",
"Raw Data",
"Variational Autoencoder",
"Time Frequency Analysis",
"Data Analysis",
"Uncertainty",
"Time Series Analysis",
"Anomaly Detection",
"Spectral Analysis",
"Standards",
"Anomaly Detection",
"Variational Autoencoder",
"Time Series Data"
],
"authors": [
{
"affiliation": "Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology,Fukuoka,Japan",
"fullName": "Umaporn Yokkampon",
"givenName": "Umaporn",
"surname": "Yokkampon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology,Fukuoka,Japan",
"fullName": "Sakmongkon Chumkamon",
"givenName": "Sakmongkon",
"surname": "Chumkamon",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The City College of New York,Department of Computer Science,New York,USA",
"fullName": "Abbe Mowshowitz",
"givenName": "Abbe",
"surname": "Mowshowitz",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology,Fukuoka,Japan",
"fullName": "Eiji Hayashi",
"givenName": "Eiji",
"surname": "Hayashi",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "iciev-&-icivpr",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2020-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1-6",
"year": "2020",
"issn": null,
"isbn": "978-1-7281-9331-1",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09306573",
"articleId": "1qcifGUp82I",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09306522",
"articleId": "1qcidNRZyRq",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/dsc/2018/4210/0/421001a680",
"title": "The Feature Representation Ability of Variational AutoEncoder",
"doi": null,
"abstractUrl": "/proceedings-article/dsc/2018/421001a680/12OmNxGAKWa",
"parentPublication": {
"id": "proceedings/dsc/2018/4210/0",
"title": "2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2012/4905/0/4905b074",
"title": "Granger Causality for Time-Series Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2012/4905b074/12OmNzYwccd",
"parentPublication": {
"id": "proceedings/icdm/2012/4905/0",
"title": "2012 IEEE 12th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/bigcomp/2019/7789/0/08679157",
"title": "Learning Representations from Healthcare Time Series Data for Unsupervised Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/bigcomp/2019/08679157/18Xkk8Mm0b6",
"parentPublication": {
"id": "proceedings/bigcomp/2019/7789/0",
"title": "2019 IEEE International Conference on Big Data and Smart Computing (BigComp)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csase/2022/2632/0/09759613",
"title": "Internet Routing Anomaly Detection Using LSTM Based Autoencoder",
"doi": null,
"abstractUrl": "/proceedings-article/csase/2022/09759613/1CRw9IsTQic",
"parentPublication": {
"id": "proceedings/csase/2022/2632/0",
"title": "2022 International Conference on Computer Science and Software Engineering (CSASE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2022/0883/0/088300b342",
"title": "Anomaly Detection in Time Series with Robust Variational Quasi-Recurrent Autoencoders",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2022/088300b342/1FwFHiAvnGM",
"parentPublication": {
"id": "proceedings/icde/2022/0883/0",
"title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccv/2019/4803/0/480300b705",
"title": "Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection",
"doi": null,
"abstractUrl": "/proceedings-article/iccv/2019/480300b705/1hQqhllN2zm",
"parentPublication": {
"id": "proceedings/iccv/2019/4803/0",
"title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsac/2020/7303/0/730300a334",
"title": "RVAE-ABFA : Robust Anomaly Detection for HighDimensional Data Using Variational Autoencoder",
"doi": null,
"abstractUrl": "/proceedings-article/compsac/2020/730300a334/1nkDmoUN7AQ",
"parentPublication": {
"id": "proceedings/compsac/2020/7303/0",
"title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdmw/2020/9012/0/901200a543",
"title": "Anomaly Detection of Periodic Multivariate Time Series under High Acquisition Frequency Scene in IoT",
"doi": null,
"abstractUrl": "/proceedings-article/icdmw/2020/901200a543/1rgGn4JIlB6",
"parentPublication": {
"id": "proceedings/icdmw/2020/9012/0",
"title": "2020 International Conference on Data Mining Workshops (ICDMW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2020/6251/0/09378192",
"title": "An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on Time-Series Data",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2020/09378192/1s64sjOqXBK",
"parentPublication": {
"id": "proceedings/big-data/2020/6251/0",
"title": "2020 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2021/9184/0/918400c225",
"title": "DAEMON: Unsupervised Anomaly Detection and Interpretation for Multivariate Time Series",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2021/918400c225/1uGXwqDJSg0",
"parentPublication": {
"id": "proceedings/icde/2021/9184/0",
"title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "1vF12OhpdAc",
"title": "2021 International Conference on Information and Digital Technologies (IDT)",
"acronym": "idt",
"groupId": "1802716",
"volume": "0",
"displayVolume": "0",
"year": "2021",
"__typename": "ProceedingType"
},
"article": {
"id": "1vF195NjF3a",
"doi": "10.1109/IDT52577.2021.9497578",
"title": "Exploratory analysis of the fire statistics using automatic time series decomposition",
"normalizedTitle": "Exploratory analysis of the fire statistics using automatic time series decomposition",
"abstract": "The aim of the work was to determine the possibility of using software based on machine learning technologies at the stage of exploratory analysis of data on the situation with fires in settlements, to assess the possibility of using the results obtained earlier by other researchers. Exploratory analysis of data and comparative assessment with results from other sources was carried out.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The aim of the work was to determine the possibility of using software based on machine learning technologies at the stage of exploratory analysis of data on the situation with fires in settlements, to assess the possibility of using the results obtained earlier by other researchers. Exploratory analysis of data and comparative assessment with results from other sources was carried out.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The aim of the work was to determine the possibility of using software based on machine learning technologies at the stage of exploratory analysis of data on the situation with fires in settlements, to assess the possibility of using the results obtained earlier by other researchers. Exploratory analysis of data and comparative assessment with results from other sources was carried out.",
"fno": "09497578",
"keywords": [
"Data Analysis",
"Emergency Management",
"Learning Artificial Intelligence",
"Time Series",
"Data Exploratory Analysis",
"Fire Statistics",
"Automatic Time Series Decomposition",
"Machine Learning",
"Comparative Assessment",
"Analytical Models",
"Data Analysis",
"Additives",
"Time Series Analysis",
"Data Visualization",
"Machine Learning",
"Market Research",
"Emergency Situation",
"Data Mining",
"Exploratory Analysis",
"Time Series",
"Forecasting",
"Fire Statistics"
],
"authors": [
{
"affiliation": "The Educational Establishment “Belarusian State University of Informatics and Radioelectronics”,Minsk,Belarus",
"fullName": "M.M. Tatur",
"givenName": "M.M.",
"surname": "Tatur",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "State Educational Establishment “University of Civil Protection of the Ministry for Emergency Situations of the Republic of Belarus”,Minsk,Belarus",
"fullName": "A.G. Ivanitskiy",
"givenName": "A.G.",
"surname": "Ivanitskiy",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "The Educational Establishment “Belarusian State University of Informatics and Radioelectronics”,Minsk,Belarus",
"fullName": "V.M. Prorovsky",
"givenName": "V.M.",
"surname": "Prorovsky",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "University of Zilina,Faculty of Management Science and Informatics,Zilina,Slovakia",
"fullName": "Miroslav Kvassay",
"givenName": "Miroslav",
"surname": "Kvassay",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "idt",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2021-06-01T00:00:00",
"pubType": "proceedings",
"pages": "152-155",
"year": "2021",
"issn": null,
"isbn": "978-1-6654-3692-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "09497521",
"articleId": "1vF17mEjfXi",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "09497581",
"articleId": "1vF169LC6u4",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/msr/2017/1544/0/07962397",
"title": "A Time Series Analysis of TravisTorrent Builds: To Everything There Is a Season",
"doi": null,
"abstractUrl": "/proceedings-article/msr/2017/07962397/12OmNAR1aRl",
"parentPublication": {
"id": "proceedings/msr/2017/1544/0",
"title": "2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2015/9926/0/07363993",
"title": "Forecast UPC-level FMCG demand, Part I: Exploratory analysis and visualization",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2015/07363993/12OmNBtCCDh",
"parentPublication": {
"id": "proceedings/big-data/2015/9926/0",
"title": "2015 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/taai/2017/4203/0/4203a042",
"title": "Strengthening Data Linkage to Improve Visualization System for Exploratory Analysis",
"doi": null,
"abstractUrl": "/proceedings-article/taai/2017/4203a042/12OmNvSbBEb",
"parentPublication": {
"id": "proceedings/taai/2017/4203/0",
"title": "2017 Conference on Technologies and Applications of Artificial Intelligence (TAAI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icitcs/2013/2845/0/06717783",
"title": "A Real-Time Fire Detection and Notification System Based on Computer Vision",
"doi": null,
"abstractUrl": "/proceedings-article/icitcs/2013/06717783/12OmNvkpl9x",
"parentPublication": {
"id": "proceedings/icitcs/2013/2845/0",
"title": "2013 International Conference on IT Convergence and Security (ICITCS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/hicss/1994/5090/3/00323337",
"title": "An exploratory study of hypermedia support for problem decomposition",
"doi": null,
"abstractUrl": "/proceedings-article/hicss/1994/00323337/12OmNypIYFt",
"parentPublication": {
"id": "proceedings/hicss/1994/5090/5",
"title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2013/12/ttg2013122257",
"title": "MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation",
"doi": null,
"abstractUrl": "/journal/tg/2013/12/ttg2013122257/13rRUwInuWu",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122422",
"title": "Exploratory Analysis of Time-Series with ChronoLenses",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122422/13rRUxASuGf",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/5555/01/10105521",
"title": "STD: A Seasonal-Trend-Dispersion Decomposition of Time Series",
"doi": null,
"abstractUrl": "/journal/tk/5555/01/10105521/1MtgpqtYFyM",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mlbdbi/2020/9638/0/963800a150",
"title": "Time Series and Multiple Regression Analysis PM10 with Missing Filling",
"doi": null,
"abstractUrl": "/proceedings-article/mlbdbi/2020/963800a150/1rxhw0tveCY",
"parentPublication": {
"id": "proceedings/mlbdbi/2020/9638/0",
"title": "2020 2nd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icphds/2021/2594/0/259400a055",
"title": "A Model For Precisely Locate And Predict Trends For Forest Fire",
"doi": null,
"abstractUrl": "/proceedings-article/icphds/2021/259400a055/1ymINXKf4f6",
"parentPublication": {
"id": "proceedings/icphds/2021/2594/0",
"title": "2021 International Conference on Public Health and Data Science (ICPHDS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": null,
"article": {
"id": "12OmNAio70g",
"doi": "10.1109/ISDEA.2010.279",
"title": "Complex Event Detection for Long Process",
"normalizedTitle": "Complex Event Detection for Long Process",
"abstract": "The traditional CED (Complex Event Detection) methods were achieved in memory by creating a data structure. But the memory will become a choke-point for the huge data structure when orienting long process and numerous data. So large amounts of data must be stored in external memory, and transferred to memory when needed. In this paper, we present TSH (Hash by object ID based on time slice model) storage strategy and instance map structure to ensure small I/O cost when transferring instances needed to memory. In addition, we also propose an incremental method to accelerate the matching process. Finally, the validity of the methods presented in this paper is proved by experiments on simulated data sets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The traditional CED (Complex Event Detection) methods were achieved in memory by creating a data structure. But the memory will become a choke-point for the huge data structure when orienting long process and numerous data. So large amounts of data must be stored in external memory, and transferred to memory when needed. In this paper, we present TSH (Hash by object ID based on time slice model) storage strategy and instance map structure to ensure small I/O cost when transferring instances needed to memory. In addition, we also propose an incremental method to accelerate the matching process. Finally, the validity of the methods presented in this paper is proved by experiments on simulated data sets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The traditional CED (Complex Event Detection) methods were achieved in memory by creating a data structure. But the memory will become a choke-point for the huge data structure when orienting long process and numerous data. So large amounts of data must be stored in external memory, and transferred to memory when needed. In this paper, we present TSH (Hash by object ID based on time slice model) storage strategy and instance map structure to ensure small I/O cost when transferring instances needed to memory. In addition, we also propose an incremental method to accelerate the matching process. Finally, the validity of the methods presented in this paper is proved by experiments on simulated data sets.",
"fno": "4212a457",
"keywords": [
"Storage Management",
"Data Analysis",
"Data Structures",
"Pattern Matching",
"Complex Event Detection",
"Data Structure",
"External Memory",
"Memory Transfer",
"TSH Model Strategy",
"Object ID",
"Time Slice Model",
"Instance Map Structure",
"Incremental Method",
"Arrays",
"Event Detection",
"Data Models",
"Radiofrequency Identification",
"Qualifications",
"Acceleration",
"Incremental Method",
"Complex Event Detection",
"Long Process",
"Memory Limited"
],
"authors": [],
"idPrefix": "isdea",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "457-460",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4212-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4212a452",
"articleId": "12OmNrJAe2s",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4212a461",
"articleId": "12OmNvnwViW",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/etcs/2010/3987/1/3987a429",
"title": "Complex Event Processing Engine for Large Volume of RFID Data",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2010/3987a429/12OmNAQrYE4",
"parentPublication": {
"id": "proceedings/etcs/2010/3987/1",
"title": "Education Technology and Computer Science, International Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2009/3823/1/3823a056",
"title": "Event-Driven Approach for Logic-Based Complex Event Processing",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2009/3823a056/12OmNARiM24",
"parentPublication": {
"id": "cse/2009/3823/1",
"title": "2009 International Conference on Computational Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/iccit/2008/3407/1/3407b121",
"title": "Complex Event Processing in RFID Middleware: A Three Layer Perspective",
"doi": null,
"abstractUrl": "/proceedings-article/iccit/2008/3407b121/12OmNBhHtfc",
"parentPublication": {
"id": "iccit/2008/3407/1",
"title": "Convergence Information Technology, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/qsic/2009/3828/0/3828a325",
"title": "Reuse Strategies in Distributed Complex Event Detection",
"doi": null,
"abstractUrl": "/proceedings-article/qsic/2009/3828a325/12OmNBpmDFv",
"parentPublication": {
"id": "proceedings/qsic/2009/3828/0",
"title": "Quality Software, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/scc/2010/4126/0/4126a466",
"title": "Using Complex Event Processing for Dynamic Business Process Adaptation",
"doi": null,
"abstractUrl": "/proceedings-article/scc/2010/4126a466/12OmNrEL2Ap",
"parentPublication": {
"id": "proceedings/scc/2010/4126/0",
"title": "2010 IEEE International Conference on Services Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icss/2013/4972/0/4972a181",
"title": "A Process Mashup Model Based on Complex Event Processing",
"doi": null,
"abstractUrl": "/proceedings-article/icss/2013/4972a181/12OmNvoWUX8",
"parentPublication": {
"id": "proceedings/icss/2013/4972/0",
"title": "Service Sciences, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ccp/2011/4528/0/4528a275",
"title": "A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing",
"doi": null,
"abstractUrl": "/proceedings-article/ccp/2011/4528a275/12OmNwudQRc",
"parentPublication": {
"id": "proceedings/ccp/2011/4528/0",
"title": "Data Compression, Communications and Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/3pgcic/2010/4237/0/4237a521",
"title": "Complex Event Processing over Uncertain Data Streams",
"doi": null,
"abstractUrl": "/proceedings-article/3pgcic/2010/4237a521/12OmNyfdOWE",
"parentPublication": {
"id": "proceedings/3pgcic/2010/4237/0",
"title": "P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/5/3336j396",
"title": "Research and Design of RFID Data Processing Model Based on Complex Event Processing",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336j396/12OmNyk2ZVN",
"parentPublication": {
"id": "proceedings/csse/2008/3336/5",
"title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sose/2016/2253/0/2253a172",
"title": "Complex Event Detection in Video Streams",
"doi": null,
"abstractUrl": "/proceedings-article/sose/2016/2253a172/12OmNzXnNB2",
"parentPublication": {
"id": "proceedings/sose/2016/2253/0",
"title": "2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNs0kyrq",
"title": "2006 Winter Simulation Conference",
"acronym": "wsc",
"groupId": "1000674",
"volume": "0",
"displayVolume": "0",
"year": "2006",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNvHY2EI",
"doi": "10.1109/WSC.2006.323188",
"title": "Incremental Checkpointing with Application to Distributed Discrete Event Simulation",
"normalizedTitle": "Incremental Checkpointing with Application to Distributed Discrete Event Simulation",
"abstract": "Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremental checkpointing mechanism. It requires to record only the state changes and not the complete state. After the creation of a checkpoint, state changes are logged incrementally as records in memory, with which an application can spontaneously roll back later. This incrementalism allows us to implement checkpointing with high performance. Only small constant time is required for checkpoint creation and state recording. Rollback requires linear time in the number of recorded state changes, which is bounded by the number of state variables times the number of checkpoints. We implement a Java source transformer that automatically converts an existing application into a behavior-preserving one with checkpointing functionality. This transformation is application-independent and application-transparent. A wide range of applications can benefit from this technique. Currently, it has been used for distributed discrete event simulation using the time warp technique",
"abstracts": [
{
"abstractType": "Regular",
"content": "Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremental checkpointing mechanism. It requires to record only the state changes and not the complete state. After the creation of a checkpoint, state changes are logged incrementally as records in memory, with which an application can spontaneously roll back later. This incrementalism allows us to implement checkpointing with high performance. Only small constant time is required for checkpoint creation and state recording. Rollback requires linear time in the number of recorded state changes, which is bounded by the number of state variables times the number of checkpoints. We implement a Java source transformer that automatically converts an existing application into a behavior-preserving one with checkpointing functionality. This transformation is application-independent and application-transparent. A wide range of applications can benefit from this technique. Currently, it has been used for distributed discrete event simulation using the time warp technique",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Checkpointing is widely used in robust fault-tolerant applications. We present an efficient incremental checkpointing mechanism. It requires to record only the state changes and not the complete state. After the creation of a checkpoint, state changes are logged incrementally as records in memory, with which an application can spontaneously roll back later. This incrementalism allows us to implement checkpointing with high performance. Only small constant time is required for checkpoint creation and state recording. Rollback requires linear time in the number of recorded state changes, which is bounded by the number of state variables times the number of checkpoints. We implement a Java source transformer that automatically converts an existing application into a behavior-preserving one with checkpointing functionality. This transformation is application-independent and application-transparent. A wide range of applications can benefit from this technique. Currently, it has been used for distributed discrete event simulation using the time warp technique",
"fno": "04117712",
"keywords": [
"Time Warp Technique",
"Incremental Checkpointing",
"Distributed Discrete Event Simulation",
"State Recording",
"Java Source Transformer"
],
"authors": [
{
"affiliation": "Dept. of Electr. Eng.&Comput. Sci., California Univ., Berkeley, CA",
"fullName": "T.H. Feng",
"givenName": "T.H.",
"surname": "Feng",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Dept. of Electr. Eng.&Comput. Sci., California Univ., Berkeley, CA",
"fullName": "E.A. Lee",
"givenName": "E.A.",
"surname": "Lee",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "wsc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2006-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1004-1011",
"year": "2006",
"issn": null,
"isbn": "1-4244-0500-9",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "04117711",
"articleId": "12OmNyVes7m",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "04117713",
"articleId": "12OmNwDACzi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/ipdps/2006/0054/0/01639368",
"title": "Cooperative checkpointing theory",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2006/01639368/12OmNAKuoRQ",
"parentPublication": {
"id": "proceedings/ipdps/2006/0054/0",
"title": "Proceedings 20th IEEE International Parallel & Distributed Processing Symposium",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cluster/2005/9485/0/04154139",
"title": "Adaptive Checkpointing for Master-Worker Style Parallelism",
"doi": null,
"abstractUrl": "/proceedings-article/cluster/2005/04154139/12OmNC2OSLM",
"parentPublication": {
"id": "proceedings/cluster/2005/9485/0",
"title": "2005 IEEE International Conference on Cluster Computing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsn/2000/0707/0/07070061",
"title": "Efficient Incremental Checkpointing of Java Programs",
"doi": null,
"abstractUrl": "/proceedings-article/dsn/2000/07070061/12OmNrHSD07",
"parentPublication": {
"id": "proceedings/dsn/2000/0707/0",
"title": "Proceeding International Conference on Dependable Systems and Networks. DSN 2000",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/candar/2017/2087/0/2087a389",
"title": "An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter Tuning",
"doi": null,
"abstractUrl": "/proceedings-article/candar/2017/2087a389/12OmNvSKNQX",
"parentPublication": {
"id": "proceedings/candar/2017/2087/0",
"title": "2017 Fifth International Symposium on Computing and Networking (CANDAR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/pads/1996/7539/0/75390070",
"title": "Transparent Incremental State Saving in Time Warp Parallel Discrete Event Simulation",
"doi": null,
"abstractUrl": "/proceedings-article/pads/1996/75390070/12OmNxG1yTv",
"parentPublication": {
"id": "proceedings/pads/1996/7539/0",
"title": "Proceedings of Symposium on Parallel and Distributed Tools",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spdp/1996/7683/0/76830572",
"title": "On Staggered Checkpointing",
"doi": null,
"abstractUrl": "/proceedings-article/spdp/1996/76830572/12OmNyY4roC",
"parentPublication": {
"id": "proceedings/spdp/1996/7683/0",
"title": "Parallel and Distributed Processing, IEEE Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/1998/10/l0947",
"title": "An Analytical Model for Hybrid Checkpointing in Time Warp Distributed Simulation",
"doi": null,
"abstractUrl": "/journal/td/1998/10/l0947/13rRUxOdDcv",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/td/2018/12/08372629",
"title": "Coalescing and Deduplicating Incremental Checkpoint Files for Restore-Express Multi-Level Checkpointing",
"doi": null,
"abstractUrl": "/journal/td/2018/12/08372629/17D45Wt3EwC",
"parentPublication": {
"id": "trans/td",
"title": "IEEE Transactions on Parallel & Distributed Systems",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipdps/2022/8106/0/810600a751",
"title": "Compiler-Directed Incremental Checkpointing for Low Latency GPU Preemption",
"doi": null,
"abstractUrl": "/proceedings-article/ipdps/2022/810600a751/1F1VVBWBYmA",
"parentPublication": {
"id": "proceedings/ipdps/2022/8106/0",
"title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNwCJOX8",
"title": "2011 IEEE Fifth International Conference on Semantic Computing",
"acronym": "icsc",
"groupId": "1001356",
"volume": "0",
"displayVolume": "0",
"year": "2011",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNwvDQtF",
"doi": "10.1109/ICSC.2011.91",
"title": "Summarizing Large News Video Archives by Event Ranking",
"normalizedTitle": "Summarizing Large News Video Archives by Event Ranking",
"abstract": "We present an approach to extract and rank important events in large news video archives. Our approach relies on the assumption that frequent patterns occurring in the large video datasets might correspond to important events. We propose a method to automatically find, analyze, and associate frequent patterns to events in the video datasets. This problem is challenging because: firstly, the event boundary is unknown and large variations in illumination, camera motion, occlusions, and text overlays make it difficult to select appropriate features for event representation. Secondly, the number of frequent patterns is usually large, a method to rank them is required for applications such as recommendation and summarization. Thirdly, large datasets require scalable methods to handle. The novelty of the proposed method is that temporal information is used to rank frequent patterns and that scalable methods from video processing and data mining are integrated seamlessly to handle large datasets. Experimental results on 2,768 news video programs (approx. 1,400 hours of video) broadcast by NHK from 2001 to 2008 show that the method can find important events for summarization and is scalable on large datasets.",
"abstracts": [
{
"abstractType": "Regular",
"content": "We present an approach to extract and rank important events in large news video archives. Our approach relies on the assumption that frequent patterns occurring in the large video datasets might correspond to important events. We propose a method to automatically find, analyze, and associate frequent patterns to events in the video datasets. This problem is challenging because: firstly, the event boundary is unknown and large variations in illumination, camera motion, occlusions, and text overlays make it difficult to select appropriate features for event representation. Secondly, the number of frequent patterns is usually large, a method to rank them is required for applications such as recommendation and summarization. Thirdly, large datasets require scalable methods to handle. The novelty of the proposed method is that temporal information is used to rank frequent patterns and that scalable methods from video processing and data mining are integrated seamlessly to handle large datasets. Experimental results on 2,768 news video programs (approx. 1,400 hours of video) broadcast by NHK from 2001 to 2008 show that the method can find important events for summarization and is scalable on large datasets.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "We present an approach to extract and rank important events in large news video archives. Our approach relies on the assumption that frequent patterns occurring in the large video datasets might correspond to important events. We propose a method to automatically find, analyze, and associate frequent patterns to events in the video datasets. This problem is challenging because: firstly, the event boundary is unknown and large variations in illumination, camera motion, occlusions, and text overlays make it difficult to select appropriate features for event representation. Secondly, the number of frequent patterns is usually large, a method to rank them is required for applications such as recommendation and summarization. Thirdly, large datasets require scalable methods to handle. The novelty of the proposed method is that temporal information is used to rank frequent patterns and that scalable methods from video processing and data mining are integrated seamlessly to handle large datasets. Experimental results on 2,768 news video programs (approx. 1,400 hours of video) broadcast by NHK from 2001 to 2008 show that the method can find important events for summarization and is scalable on large datasets.",
"fno": "4492a228",
"keywords": [
"Event Mining",
"Event Ranking",
"Frequent Pattern Mining",
"Video Summarization"
],
"authors": [
{
"affiliation": null,
"fullName": "Duy-Dinh Le",
"givenName": "Duy-Dinh",
"surname": "Le",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Shin'ichi Satoh",
"givenName": "Shin'ichi",
"surname": "Satoh",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icsc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2011-09-01T00:00:00",
"pubType": "proceedings",
"pages": "228-234",
"year": "2011",
"issn": null,
"isbn": "978-0-7695-4492-2",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4492a224",
"articleId": "12OmNzayNCF",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4492a235",
"articleId": "12OmNypIYFi",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/fskd/2008/3305/2/3305b620",
"title": "VTK: Vertical Mining of Top-Rank-K Frequent Patterns",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2008/3305b620/12OmNAP1Z1A",
"parentPublication": {
"id": "fskd/2008/3305/2",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/2/3735b430",
"title": "Discovery of Core-Nodes in Event-Based Social Networks",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735b430/12OmNCbkQA5",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/2",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kse/2011/4567/0/4567a062",
"title": "An Efficient Algorithm for Discovering Maximum Length Frequent Itemsets",
"doi": null,
"abstractUrl": "/proceedings-article/kse/2011/4567a062/12OmNqG0T0h",
"parentPublication": {
"id": "proceedings/kse/2011/4567/0",
"title": "Knowledge and Systems Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2008/2570/0/04607725",
"title": "Event detection in tennis matches based on video data mining",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2008/04607725/12OmNqGRGkL",
"parentPublication": {
"id": "proceedings/icme/2008/2570/0",
"title": "2008 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2012/4905/0/4905a605",
"title": "Efficient Episode Mining of Dynamic Event Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2012/4905a605/12OmNvmG7Xt",
"parentPublication": {
"id": "proceedings/icdm/2012/4905/0",
"title": "2012 IEEE 12th International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2010/4256/0/4256a138",
"title": "PGLCM: Efficient Parallel Mining of Closed Frequent Gradual Itemsets",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2010/4256a138/12OmNzaQobp",
"parentPublication": {
"id": "proceedings/icdm/2010/4256/0",
"title": "2010 IEEE International Conference on Data Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/dsde/2010/3958/0/3958a029",
"title": "A Survey of Algorithms in FCIM",
"doi": null,
"abstractUrl": "/proceedings-article/dsde/2010/3958a029/12OmNzcPAIx",
"parentPublication": {
"id": "proceedings/dsde/2010/3958/0",
"title": "Data Storage and Data Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/smap/2008/3444/0/3444a069",
"title": "A Logic Framework for Sports Video Summarization Using Text-Based Semantic Annotation",
"doi": null,
"abstractUrl": "/proceedings-article/smap/2008/3444a069/12OmNzl3WRL",
"parentPublication": {
"id": "proceedings/smap/2008/3444/0",
"title": "2008 Third International Workshop on Semantic Media Adaptation and Personalization",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2011/09/ttk2011091388",
"title": "Efficient Algorithms for Summarizing Graph Patterns",
"doi": null,
"abstractUrl": "/journal/tk/2011/09/ttk2011091388/13rRUxNW1Uc",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2022/8045/0/10020243",
"title": "Event Time Extraction from Japanese News Archives",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2022/10020243/1KfRaOCGWCk",
"parentPublication": {
"id": "proceedings/big-data/2022/8045/0",
"title": "2022 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNwcl7K3",
"title": "2010 Third International Symposium on Information Processing",
"acronym": "isip",
"groupId": "1001769",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNy7h3dF",
"doi": "10.1109/ISIP.2010.112",
"title": "Chinese News Event 5W1H Elements Extraction Using Semantic Role Labeling",
"normalizedTitle": "Chinese News Event 5W1H Elements Extraction Using Semantic Role Labeling",
"abstract": "To relieve \"News Information Overload\", classification, summarization and recommendation techniques have been proposed. However, these techniques fail to provide sufficient semantic information about news events. In this paper, considering5W1H (Who, What, Whom, When, Where and How), the full list of elements of a news article, we propose a novel approach to extract event semantic elements. The approach comprises a key event identification step and an event element extraction step. We first use machine learning method to identify the key events of Chinese news stories. Then we employ semantic role labeling (SRL) enhanced by heuristic rules to extract event 5W1Helements. A prototype system is implemented based on proposed approach. Extensive experiments on real online news data sets confirm the reasonability and feasibility of our approach.",
"abstracts": [
{
"abstractType": "Regular",
"content": "To relieve \"News Information Overload\", classification, summarization and recommendation techniques have been proposed. However, these techniques fail to provide sufficient semantic information about news events. In this paper, considering5W1H (Who, What, Whom, When, Where and How), the full list of elements of a news article, we propose a novel approach to extract event semantic elements. The approach comprises a key event identification step and an event element extraction step. We first use machine learning method to identify the key events of Chinese news stories. Then we employ semantic role labeling (SRL) enhanced by heuristic rules to extract event 5W1Helements. A prototype system is implemented based on proposed approach. Extensive experiments on real online news data sets confirm the reasonability and feasibility of our approach.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "To relieve \"News Information Overload\", classification, summarization and recommendation techniques have been proposed. However, these techniques fail to provide sufficient semantic information about news events. In this paper, considering5W1H (Who, What, Whom, When, Where and How), the full list of elements of a news article, we propose a novel approach to extract event semantic elements. The approach comprises a key event identification step and an event element extraction step. We first use machine learning method to identify the key events of Chinese news stories. Then we employ semantic role labeling (SRL) enhanced by heuristic rules to extract event 5W1Helements. A prototype system is implemented based on proposed approach. Extensive experiments on real online news data sets confirm the reasonability and feasibility of our approach.",
"fno": "4261a484",
"keywords": [
"Event Extraction",
"Semantic Role Labeling",
"5 W 1 H"
],
"authors": [
{
"affiliation": null,
"fullName": "Wei Wang",
"givenName": "Wei",
"surname": "Wang",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dongyan Zhao",
"givenName": "Dongyan",
"surname": "Zhao",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Dong Wang",
"givenName": "Dong",
"surname": "Wang",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "isip",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-10-01T00:00:00",
"pubType": "proceedings",
"pages": "484-489",
"year": "2010",
"issn": null,
"isbn": "978-0-7695-4261-4",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4261a481",
"articleId": "12OmNxjjEiK",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4261a490",
"articleId": "12OmNBWi6MD",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/wi-iat/2011/4513/3/4513c205",
"title": "A Corpus-Based Method to Improve Feature-Based Semantic Role Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2011/4513c205/12OmNAR1b01",
"parentPublication": {
"id": "proceedings/wi-iat/2011/4513/3",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icis/2016/0806/0/07550911",
"title": "The research on event extraction of Chinese news based on subject elements",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2016/07550911/12OmNAoDhW2",
"parentPublication": {
"id": "proceedings/icis/2016/0806/0",
"title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/kam/2009/3888/1/3888a351",
"title": "Research of Applying Chain Conditional Random Fields to Semantic Role Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/kam/2009/3888a351/12OmNBlofVs",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wnis/2009/3901/0/3901a263",
"title": "Chinese Nominal Entity Recognition with Semantic Role Labeling",
"doi": null,
"abstractUrl": "/proceedings-article/wnis/2009/3901a263/12OmNC3XhkC",
"parentPublication": {
"id": "proceedings/wnis/2009/3901/0",
"title": "Wireless Networks and Information Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2009/3801/3/3801c259",
"title": "Automatic Labeling of Semantic Role on Chinese FrameNet Using Conditional Random Fields",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2009/3801c259/12OmNx19jSj",
"parentPublication": {
"id": "proceedings/wi-iat/2009/3801/3",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icece/2010/4031/0/4031a583",
"title": "Chinese Semantic Role Labeling with Hierarchical Semantic Knowledge",
"doi": null,
"abstractUrl": "/proceedings-article/icece/2010/4031a583/12OmNx57HOl",
"parentPublication": {
"id": "proceedings/icece/2010/4031/0",
"title": "Electrical and Control Engineering, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ijcbs/2009/3739/0/3739a584",
"title": "Semantic Role Labeling Based on Dependency Tree with Multi-features",
"doi": null,
"abstractUrl": "/proceedings-article/ijcbs/2009/3739a584/12OmNx8OurX",
"parentPublication": {
"id": "proceedings/ijcbs/2009/3739/0",
"title": "2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fskd/2009/3735/6/3735f437",
"title": "Syntactic and Semantic Role Labeling for Chinese FrameNet Based on Cascaded Conditional Random Fields",
"doi": null,
"abstractUrl": "/proceedings-article/fskd/2009/3735f437/12OmNyKJipc",
"parentPublication": {
"id": "proceedings/fskd/2009/3735/6",
"title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2012/4880/3/4880c127",
"title": "Chinese Semantic Role Labeling Based on Genetic Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2012/4880c127/12OmNyr8Yya",
"parentPublication": {
"id": "proceedings/wi-iat/2012/4880/1",
"title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/aici/2010/4225/1/4225a378",
"title": "Automatic Semantic Role Labeling for Chinese Comparative Sentences Based on Hybrid Patterns",
"doi": null,
"abstractUrl": "/proceedings-article/aici/2010/4225a378/12OmNzlD9cA",
"parentPublication": {
"id": "proceedings/aici/2010/4225/1",
"title": "Artificial Intelligence and Computational Intelligence, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNzgNXZq",
"title": "Networked Computing and Advanced Information Management, International Conference on",
"acronym": "ncm",
"groupId": "1002957",
"volume": "0",
"displayVolume": "0",
"year": "2009",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNyUWR6c",
"doi": "10.1109/NCM.2009.151",
"title": "Applying an Enhanced Algorithm for Mining Incremental Updates on an Egyptian Newspaper Website",
"normalizedTitle": "Applying an Enhanced Algorithm for Mining Incremental Updates on an Egyptian Newspaper Website",
"abstract": "Abstract—This paper presents new approaches for analyzing Egyptian Newspaper websites and presenting the most interesting topics that attract the largest portion of reading population to their newspaper website. The paper also presents techniques used for text and news mining. We first start with topic detection and tracking techniques to collect the reader website navigation data for the various topics then we use the proposed incremental algorithm (PIA), our previously published algorithm that was implemented in our previous researches, for mining of the news database. The paper concludes with significant results for identifying the readers trends, thus can dynamically display the most expected and required headline topics to the reader. The paper discovers also the most important topics for the users. Moreover, the paper had a significant effect for guiding the newspaper for the appropriate method for modifying its website to be dynamic according to the user interests specified by the association rules algorithm. We believe that this work had high impact in increasing the number of visitors for the newspaper website and attracting the reader's attention.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Abstract—This paper presents new approaches for analyzing Egyptian Newspaper websites and presenting the most interesting topics that attract the largest portion of reading population to their newspaper website. The paper also presents techniques used for text and news mining. We first start with topic detection and tracking techniques to collect the reader website navigation data for the various topics then we use the proposed incremental algorithm (PIA), our previously published algorithm that was implemented in our previous researches, for mining of the news database. The paper concludes with significant results for identifying the readers trends, thus can dynamically display the most expected and required headline topics to the reader. The paper discovers also the most important topics for the users. Moreover, the paper had a significant effect for guiding the newspaper for the appropriate method for modifying its website to be dynamic according to the user interests specified by the association rules algorithm. We believe that this work had high impact in increasing the number of visitors for the newspaper website and attracting the reader's attention.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Abstract—This paper presents new approaches for analyzing Egyptian Newspaper websites and presenting the most interesting topics that attract the largest portion of reading population to their newspaper website. The paper also presents techniques used for text and news mining. We first start with topic detection and tracking techniques to collect the reader website navigation data for the various topics then we use the proposed incremental algorithm (PIA), our previously published algorithm that was implemented in our previous researches, for mining of the news database. The paper concludes with significant results for identifying the readers trends, thus can dynamically display the most expected and required headline topics to the reader. The paper discovers also the most important topics for the users. Moreover, the paper had a significant effect for guiding the newspaper for the appropriate method for modifying its website to be dynamic according to the user interests specified by the association rules algorithm. We believe that this work had high impact in increasing the number of visitors for the newspaper website and attracting the reader's attention.",
"fno": "3769b131",
"keywords": [
"Newspaper Website Mining",
"Proposed Incremental Algorithm PIA"
],
"authors": [
{
"affiliation": null,
"fullName": "Laila Mohamed El Fangary",
"givenName": "Laila Mohamed El",
"surname": "Fangary",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ncm",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2009-08-01T00:00:00",
"pubType": "proceedings",
"pages": "1131-1135",
"year": "2009",
"issn": null,
"isbn": "978-0-7695-3769-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "3769b203",
"articleId": "12OmNAoUTyU",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "3769b136",
"articleId": "12OmNz4SOx5",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icis/2010/4147/0/4147a301",
"title": "The Impact of Website Attractiveness, Consumer-Website Identification, and Website Trustworthiness on Purchase Intention",
"doi": null,
"abstractUrl": "/proceedings-article/icis/2010/4147a301/12OmNAObbA7",
"parentPublication": {
"id": "proceedings/icis/2010/4147/0",
"title": "Computer and Information Science, ACIS International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/spire/2000/0746/0/07460055",
"title": "Experiment Analysis in Newspaper Topic Detection",
"doi": null,
"abstractUrl": "/proceedings-article/spire/2000/07460055/12OmNAndin8",
"parentPublication": {
"id": "proceedings/spire/2000/0746/0",
"title": "String Processing and Information Retrieval, International Symposium on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2009/3725/0/3725a621",
"title": "Google Newspaper Search ",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2009/3725a621/12OmNBpmDDf",
"parentPublication": {
"id": "proceedings/icdar/2009/3725/0",
"title": "2009 10th International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icetc/2009/3609/0/3609a339",
"title": "Newspaper Vendor Sales Prediction Using Artificial Neural Networks",
"doi": null,
"abstractUrl": "/proceedings-article/icetc/2009/3609a339/12OmNBrlPCB",
"parentPublication": {
"id": "proceedings/icetc/2009/3609/0",
"title": "2009 International Conference on Education Technology and Computer, ICETC 2009",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdar/2011/4520/0/4520a394",
"title": "Performance Evaluation of Algorithms for Newspaper Article Identification",
"doi": null,
"abstractUrl": "/proceedings-article/icdar/2011/4520a394/12OmNrY3LpU",
"parentPublication": {
"id": "proceedings/icdar/2011/4520/0",
"title": "2011 International Conference on Document Analysis and Recognition",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csse/2008/3336/5/3336i358",
"title": "The Study of BSC in Newspaper Based on Knowledge Management",
"doi": null,
"abstractUrl": "/proceedings-article/csse/2008/3336i358/12OmNvA1h5d",
"parentPublication": {
"id": "proceedings/csse/2008/3336/5",
"title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icee/2010/3997/0/3997a078",
"title": "A New Framework on Website Evaluation",
"doi": null,
"abstractUrl": "/proceedings-article/icee/2010/3997a078/12OmNvAiSwM",
"parentPublication": {
"id": "proceedings/icee/2010/3997/0",
"title": "International Conference on E-Business and E-Government",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/compsym/2016/3438/0/07858508",
"title": "Advertisement Detection, Segmentation, and Classification for Newspaper Images and Website Snapshots",
"doi": null,
"abstractUrl": "/proceedings-article/compsym/2016/07858508/12OmNx2QUFM",
"parentPublication": {
"id": "proceedings/compsym/2016/3438/0",
"title": "2016 International Computer Symposium (ICS)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isads/1997/7783/0/77830247",
"title": "Proposal and Development of an Autonomous Decentralized System for Newspaper Production",
"doi": null,
"abstractUrl": "/proceedings-article/isads/1997/77830247/12OmNzBOiep",
"parentPublication": {
"id": "proceedings/isads/1997/7783/0",
"title": "Proceedings of the Third International Symposium on Autonomous Decentralized Systems. ISADS 97",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "mags/sp/2012/04/msp2012040091",
"title": "The State of Website Security",
"doi": null,
"abstractUrl": "/magazine/sp/2012/04/msp2012040091/13rRUwI5U10",
"parentPublication": {
"id": "mags/sp",
"title": "IEEE Security & Privacy",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNARRYu4",
"title": "16th IEEE International Conference on Tools with Artificial Intelligence",
"acronym": "ictai",
"groupId": "1000763",
"volume": "0",
"displayVolume": "0",
"year": "2004",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNzcxZ1e",
"doi": "10.1109/ICTAI.2004.65",
"title": "Giving Temporal Order to News Corpus",
"normalizedTitle": "Giving Temporal Order to News Corpus",
"abstract": "In this investigation, we propose a new mechanism to give temporal order to a news article in a form of timestamps. Here we learn temporal data in advance to extract ordering by means of incremental clustering and then we estimate most likely order to news text. In this work, we examine TDT2 vorpus and we show how well our approach works by some experiments.",
"abstracts": [
{
"abstractType": "Regular",
"content": "In this investigation, we propose a new mechanism to give temporal order to a news article in a form of timestamps. Here we learn temporal data in advance to extract ordering by means of incremental clustering and then we estimate most likely order to news text. In this work, we examine TDT2 vorpus and we show how well our approach works by some experiments.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "In this investigation, we propose a new mechanism to give temporal order to a news article in a form of timestamps. Here we learn temporal data in advance to extract ordering by means of incremental clustering and then we estimate most likely order to news text. In this work, we examine TDT2 vorpus and we show how well our approach works by some experiments.",
"fno": "22360208",
"keywords": [
"TDT",
"Stream Data",
"Incremental Clustering",
"Timestamp Estimation"
],
"authors": [
{
"affiliation": "Hosei University",
"fullName": "Hiroshi Uejima",
"givenName": "Hiroshi",
"surname": "Uejima",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Hosei University",
"fullName": "Takao Miura",
"givenName": "Takao",
"surname": "Miura",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Sanno University",
"fullName": "Isamu Shioya",
"givenName": "Isamu",
"surname": "Shioya",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "ictai",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2004-11-01T00:00:00",
"pubType": "proceedings",
"pages": "208-215",
"year": "2004",
"issn": "1082-3409",
"isbn": "0-7695-2236-X",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "22360202",
"articleId": "12OmNzdGnsa",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "22360216",
"articleId": "12OmNBE7Mqj",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icme/2004/8603/2/01394401",
"title": "A hierarchical approach to story segmentation of large broadcast news video corpus",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394401/12OmNAKM04m",
"parentPublication": {
"id": "proceedings/icme/2004/8603/2",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2015/9618/1/9618a409",
"title": "Online Temporal Summarization of News Events",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2015/9618a409/12OmNvmXJ6Q",
"parentPublication": {
"id": "proceedings/wi-iat/2015/9618/1",
"title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmcs/1997/7819/0/78190526",
"title": "A System for Customized News Delivery from Video Archives",
"doi": null,
"abstractUrl": "/proceedings-article/icmcs/1997/78190526/12OmNxxNbUZ",
"parentPublication": {
"id": "proceedings/icmcs/1997/7819/0",
"title": "Multimedia Computing and Systems, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/semapro/2009/3833/0/3833a098",
"title": "The Valid Ontology: A Simple OWL Temporal Versioning Framework",
"doi": null,
"abstractUrl": "/proceedings-article/semapro/2009/3833a098/12OmNyYm2C4",
"parentPublication": {
"id": "proceedings/semapro/2009/3833/0",
"title": "Advances in Semantic Processing, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2004/8603/2/01394309",
"title": "Cluster-temporal browsing of large news video databases",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2004/01394309/12OmNzC5Tdm",
"parentPublication": {
"id": "proceedings/icme/2004/8603/2",
"title": "2004 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cse/2011/4477/0/4477a392",
"title": "Temporal Association Rules Mining in T-databases Using Pipeline Technique",
"doi": null,
"abstractUrl": "/proceedings-article/cse/2011/4477a392/12OmNzC5Tfi",
"parentPublication": {
"id": "proceedings/cse/2011/4477/0",
"title": "2011 14th IEEE International Conference on Computational Science and Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2022/5661/0/10068595",
"title": "Session-based News Recommendation from Temporal User Commenting Dynamics",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2022/10068595/1LKx4aI5GPC",
"parentPublication": {
"id": "proceedings/asonam/2022/5661/0",
"title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2019/7474/0/747400c143",
"title": "Rule-Based Entity Resolution on Database with Hidden Temporal Information (Extended Abstract)",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2019/747400c143/1aDT0qMso5a",
"parentPublication": {
"id": "proceedings/icde/2019/7474/0",
"title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2019/0858/0/09005459",
"title": "News Recommender System Considering Temporal Dynamics and News Taxonomy",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2019/09005459/1hJrOK44qSA",
"parentPublication": {
"id": "proceedings/big-data/2019/0858/0",
"title": "2019 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/cvpr/2021/4509/0/450900i361",
"title": "Temporal Action Segmentation from Timestamp Supervision",
"doi": null,
"abstractUrl": "/proceedings-article/cvpr/2021/450900i361/1yeLUyPRbFu",
"parentPublication": {
"id": "proceedings/cvpr/2021/4509/0",
"title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "17D45VtKipN",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"acronym": "big-data",
"groupId": "1802964",
"volume": "0",
"displayVolume": "0",
"year": "2017",
"__typename": "ProceedingType"
},
"article": {
"id": "17D45Wuc350",
"doi": "10.1109/BigData.2017.8258133",
"title": "Event detection from time-series streams using directional change and dynamic thresholds",
"normalizedTitle": "Event detection from time-series streams using directional change and dynamic thresholds",
"abstract": "Event Detection from data streams is challenging due to the characteristics of such streams, where data elements arrive in real-time and at high velocity, as well as being streams of unbounded size, even more it is not possible to backtrack over the past arrived data elements or review and keep track of the entire history. Financial time-series streams are a source of financial data (tick data) at fine time scales. In this research, we aim to detect events occurring within time-series streams, and our approach utilises the Directional Change Approach, which summarizes price movements based on a given threshold to detect events. In this paper, we propose a dynamic threshold definition method to be used for detecting the directional change events. The threshold is calculated on a daily basis based on previous day price transitions and the current day opening price. An experiment was run for more than 30 weeks to detect the occurring directional change events on a time-series stream, with one minute data flow levels (one minute frequency) to test our threshold definition method against different fixed threshold values. The detected events were evaluated against news headlines published regarding the studied share on the same day the event was found. The results revealed that a daily dynamic calculated threshold more accurately detected events than different static fixed threshold values.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Event Detection from data streams is challenging due to the characteristics of such streams, where data elements arrive in real-time and at high velocity, as well as being streams of unbounded size, even more it is not possible to backtrack over the past arrived data elements or review and keep track of the entire history. Financial time-series streams are a source of financial data (tick data) at fine time scales. In this research, we aim to detect events occurring within time-series streams, and our approach utilises the Directional Change Approach, which summarizes price movements based on a given threshold to detect events. In this paper, we propose a dynamic threshold definition method to be used for detecting the directional change events. The threshold is calculated on a daily basis based on previous day price transitions and the current day opening price. An experiment was run for more than 30 weeks to detect the occurring directional change events on a time-series stream, with one minute data flow levels (one minute frequency) to test our threshold definition method against different fixed threshold values. The detected events were evaluated against news headlines published regarding the studied share on the same day the event was found. The results revealed that a daily dynamic calculated threshold more accurately detected events than different static fixed threshold values.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Event Detection from data streams is challenging due to the characteristics of such streams, where data elements arrive in real-time and at high velocity, as well as being streams of unbounded size, even more it is not possible to backtrack over the past arrived data elements or review and keep track of the entire history. Financial time-series streams are a source of financial data (tick data) at fine time scales. In this research, we aim to detect events occurring within time-series streams, and our approach utilises the Directional Change Approach, which summarizes price movements based on a given threshold to detect events. In this paper, we propose a dynamic threshold definition method to be used for detecting the directional change events. The threshold is calculated on a daily basis based on previous day price transitions and the current day opening price. An experiment was run for more than 30 weeks to detect the occurring directional change events on a time-series stream, with one minute data flow levels (one minute frequency) to test our threshold definition method against different fixed threshold values. The detected events were evaluated against news headlines published regarding the studied share on the same day the event was found. The results revealed that a daily dynamic calculated threshold more accurately detected events than different static fixed threshold values.",
"fno": "08258133",
"keywords": [
"Real Time Systems",
"Cognition",
"Event Detection",
"Electronic Mail",
"Timing",
"Market Research",
"Computer Science"
],
"authors": [
{
"affiliation": "School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK",
"fullName": "Nora Alkhamees",
"givenName": "Nora",
"surname": "Alkhamees",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK",
"fullName": "Maria Fasli",
"givenName": "Maria",
"surname": "Fasli",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "big-data",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2017-12-01T00:00:00",
"pubType": "proceedings",
"pages": "1882-1891",
"year": "2017",
"issn": null,
"isbn": "978-1-5386-2715-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "08258132",
"articleId": "17D45WLdYSb",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "08258134",
"articleId": "17D45WGGoMP",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/big-data/2016/9005/0/07840781",
"title": "Event detection from social network streams using frequent pattern mining with dynamic support values",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2016/07840781/12OmNrkT7GD",
"parentPublication": {
"id": "proceedings/big-data/2016/9005/0",
"title": "2016 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/mdm/2017/3932/0/07962460",
"title": "Discovering Evolving Moving Object Groups from Massive-Scale Trajectory Streams",
"doi": null,
"abstractUrl": "/proceedings-article/mdm/2017/07962460/12OmNz5JC7h",
"parentPublication": {
"id": "proceedings/mdm/2017/3932/0",
"title": "2017 18th IEEE International Conference on Mobile Data Management (MDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icde/2017/6543/0/6543b387",
"title": "BEAMS: Bounded Event Detection in Graph Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icde/2017/6543b387/12OmNzmLxDR",
"parentPublication": {
"id": "proceedings/icde/2017/6543/0",
"title": "2017 IEEE 33rd International Conference on Data Engineering (ICDE)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tk/2015/11/07124472",
"title": "Indexing Evolving Events from Tweet Streams",
"doi": null,
"abstractUrl": "/journal/tk/2015/11/07124472/13rRUxNW1ZK",
"parentPublication": {
"id": "trans/tk",
"title": "IEEE Transactions on Knowledge & Data Engineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sera/2018/5886/0/08477229",
"title": "An Overview of Event Based Directional Change for Algorithmic Trading",
"doi": null,
"abstractUrl": "/proceedings-article/sera/2018/08477229/144U9bp5Zbs",
"parentPublication": {
"id": "proceedings/sera/2018/5886/0",
"title": "2018 IEEE 16th International Conference on Software Engineering Research, Management and Applications (SERA)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icdm/2018/9159/0/08594949",
"title": "Volatility Drift Prediction for Transactional Data Streams",
"doi": null,
"abstractUrl": "/proceedings-article/icdm/2018/08594949/17D45VW8br2",
"parentPublication": {
"id": "proceedings/icdm/2018/9159/0",
"title": "2018 IEEE International Conference on Data Mining (ICDM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258453",
"title": "Developing sustainable trading strategies using directional changes with high frequency data",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258453/17D45WLdYRL",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/big-data/2017/2715/0/08258019",
"title": "Event pattern discovery by keywords in graph streams",
"doi": null,
"abstractUrl": "/proceedings-article/big-data/2017/08258019/17D45Wc1IHY",
"parentPublication": {
"id": "proceedings/big-data/2017/2715/0",
"title": "2017 IEEE International Conference on Big Data (Big Data)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/edoc/2018/4139/0/413900a123",
"title": "Real-Time Data Mining for Event Streams",
"doi": null,
"abstractUrl": "/proceedings-article/edoc/2018/413900a123/17D45XDIXTQ",
"parentPublication": {
"id": "proceedings/edoc/2018/4139/0",
"title": "2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wi-iat/2020/1924/0/192400a818",
"title": "Trend Following with Contrarian Strategy and Firefly Optimization Algorithm",
"doi": null,
"abstractUrl": "/proceedings-article/wi-iat/2020/192400a818/1uHhtdVFPAk",
"parentPublication": {
"id": "proceedings/wi-iat/2020/1924/0",
"title": "2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNx19jVJ",
"title": "15th IEEE International Conference on Program Comprehension (ICPC '07)",
"acronym": "icpc",
"groupId": "1003168",
"volume": "0",
"displayVolume": "0",
"year": "2007",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNCeaPU1",
"doi": "10.1109/ICPC.2007.10",
"title": "Assessing the Comprehension of UML Class Diagrams via Eye Tracking",
"normalizedTitle": "Assessing the Comprehension of UML Class Diagrams via Eye Tracking",
"abstract": "Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtrusive manner as users performed various comprehension tasks on UML class diagrams. The goal of the study is to identify specific characteristics of UML class diagrams, such as layout, color, and stereotype usage that are most effective for supporting a given task. Results indicate subjects have a variation in the eye movements (i.e., how the subjects navigate the diagram) depending on their UML expertise and software-design ability to solve the given task. Layouts with additional semantic information about the design were found to be most effective and the use of class stereotypes seems to play a substantial role in comprehension of these diagrams.",
"abstracts": [
{
"abstractType": "Regular",
"content": "Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtrusive manner as users performed various comprehension tasks on UML class diagrams. The goal of the study is to identify specific characteristics of UML class diagrams, such as layout, color, and stereotype usage that are most effective for supporting a given task. Results indicate subjects have a variation in the eye movements (i.e., how the subjects navigate the diagram) depending on their UML expertise and software-design ability to solve the given task. Layouts with additional semantic information about the design were found to be most effective and the use of class stereotypes seems to play a substantial role in comprehension of these diagrams.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "Eye-tracking equipment is used to assess how well a subject comprehends UML class diagrams. The results of a study are presented in which eye movements are captured in a non-obtrusive manner as users performed various comprehension tasks on UML class diagrams. The goal of the study is to identify specific characteristics of UML class diagrams, such as layout, color, and stereotype usage that are most effective for supporting a given task. Results indicate subjects have a variation in the eye movements (i.e., how the subjects navigate the diagram) depending on their UML expertise and software-design ability to solve the given task. Layouts with additional semantic information about the design were found to be most effective and the use of class stereotypes seems to play a substantial role in comprehension of these diagrams.",
"fno": "28600113",
"keywords": [],
"authors": [
{
"affiliation": "Kent State University",
"fullName": "Shehnaaz Yusuf",
"givenName": "Shehnaaz",
"surname": "Yusuf",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Kent State University",
"fullName": "Huzefa Kagdi",
"givenName": "Huzefa",
"surname": "Kagdi",
"__typename": "ArticleAuthorType"
},
{
"affiliation": "Kent State University",
"fullName": "Jonathan I. Maletic",
"givenName": "Jonathan I.",
"surname": "Maletic",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2007-06-01T00:00:00",
"pubType": "proceedings",
"pages": "113-122",
"year": "2007",
"issn": "1063-6897",
"isbn": "0-7695-2860-0",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "28600103",
"articleId": "12OmNrJAe1H",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "28600123",
"articleId": "12OmNCf1Dqe",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/vissoft/2005/9540/0/01684295",
"title": "Interactive Exploration of UML Sequence Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2005/01684295/12OmNAWH9Be",
"parentPublication": {
"id": "proceedings/vissoft/2005/9540/0",
"title": "2005 3rd IEEE International Workshop on Visualizing Software for Understanding and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpc/2008/3176/0/3176a093",
"title": "Data Model Comprehension: An Empirical Comparison of ER and UML Class Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/icpc/2008/3176a093/12OmNAsTgVo",
"parentPublication": {
"id": "proceedings/icpc/2008/3176/0",
"title": "International Conference on Program Comprehension",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csmr/2008/2157/0/04493312",
"title": "Assessing the Support of ER and UML Class Diagrams during Maintenance Activities on Data Models",
"doi": null,
"abstractUrl": "/proceedings-article/csmr/2008/04493312/12OmNs0TKGy",
"parentPublication": {
"id": "proceedings/csmr/2008/2157/0",
"title": "2008 12th European Conference on Software Maintenance and Reengineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/csmr/2013/4948/0/4948a367",
"title": "An Early Investigation on the Contribution of Class and Sequence Diagrams in Source Code Comprehension",
"doi": null,
"abstractUrl": "/proceedings-article/csmr/2013/4948a367/12OmNvHY2F4",
"parentPublication": {
"id": "proceedings/csmr/2013/4948/0",
"title": "2013 17th European Conference on Software Maintenance and Reengineering",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpc/2009/3998/0/05090055",
"title": "An empirical study on the comprehension of stereotyped UML class diagram layouts",
"doi": null,
"abstractUrl": "/proceedings-article/icpc/2009/05090055/12OmNvHY2Fb",
"parentPublication": {
"id": "proceedings/icpc/2009/3998/0",
"title": "2009 IEEE 17th International Conference on Program Comprehension (ICPC 2009)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wift/1998/0081/0/00810102",
"title": "Reasoning with UML Class Diagrams",
"doi": null,
"abstractUrl": "/proceedings-article/wift/1998/00810102/12OmNwqx49w",
"parentPublication": {
"id": "proceedings/wift/1998/0081/0",
"title": "Industrial-Strength Formal Specification Techniques, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/wpc/2005/2254/0/22540317",
"title": "On Evaluating the Layout of UML Class Diagrams for Program Comprehension",
"doi": null,
"abstractUrl": "/proceedings-article/wpc/2005/22540317/12OmNxEjXXP",
"parentPublication": {
"id": "proceedings/wpc/2005/2254/0",
"title": "Proceedings. 13th International Workshop on Program Comprehension",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsm/2011/0663/0/06080828",
"title": "Empirical assessment of UML class diagram layouts based on architectural importance",
"doi": null,
"abstractUrl": "/proceedings-article/icsm/2011/06080828/12OmNxw5Bo3",
"parentPublication": {
"id": "proceedings/icsm/2011/0663/0",
"title": "2011 27th IEEE International Conference on Software Maintenance (ICSM)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/vissoft/2002/1662/0/16620013",
"title": "UML Collaboration Diagram Syntax: An Empirical Study of Comprehension",
"doi": null,
"abstractUrl": "/proceedings-article/vissoft/2002/16620013/12OmNzX6cf7",
"parentPublication": {
"id": "proceedings/vissoft/2002/1662/0",
"title": "Proceedings First International Workshop on Visualizing Software for Understanding and Analysis",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqAU6tk",
"title": "International Conference on Program Comprehension",
"acronym": "icpc",
"groupId": "1003168",
"volume": "0",
"displayVolume": "0",
"year": "2010",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxFJXSp",
"doi": "10.1109/ICPC.2010.41",
"title": "An Eye Tracking Study on camelCase and under_score Identifier Styles",
"normalizedTitle": "An Eye Tracking Study on camelCase and under_score Identifier Styles",
"abstract": "An empirical study to determine if identifier-naming conventions (i.e., camelCase and under_score) affect code comprehension is presented. An eye tracker is used to capture quantitative data from human subjects during an experiment. The intent of this study is to replicate a previous study published at ICPC 2009 (Binkley et al.) that used a timed response test method to acquire data. The use of eye-tracking equipment gives additional insight and overcomes some limitations of traditional data gathering techniques. Similarities and differences between the two studies are discussed. One main difference is that subjects were trained mainly in the underscore style and were all programmers. While results indicate no difference in accuracy between the two styles, subjects recognize identifiers in the underscore style more quickly.",
"abstracts": [
{
"abstractType": "Regular",
"content": "An empirical study to determine if identifier-naming conventions (i.e., camelCase and under_score) affect code comprehension is presented. An eye tracker is used to capture quantitative data from human subjects during an experiment. The intent of this study is to replicate a previous study published at ICPC 2009 (Binkley et al.) that used a timed response test method to acquire data. The use of eye-tracking equipment gives additional insight and overcomes some limitations of traditional data gathering techniques. Similarities and differences between the two studies are discussed. One main difference is that subjects were trained mainly in the underscore style and were all programmers. While results indicate no difference in accuracy between the two styles, subjects recognize identifiers in the underscore style more quickly.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "An empirical study to determine if identifier-naming conventions (i.e., camelCase and under_score) affect code comprehension is presented. An eye tracker is used to capture quantitative data from human subjects during an experiment. The intent of this study is to replicate a previous study published at ICPC 2009 (Binkley et al.) that used a timed response test method to acquire data. The use of eye-tracking equipment gives additional insight and overcomes some limitations of traditional data gathering techniques. Similarities and differences between the two studies are discussed. One main difference is that subjects were trained mainly in the underscore style and were all programmers. While results indicate no difference in accuracy between the two styles, subjects recognize identifiers in the underscore style more quickly.",
"fno": "4113a196",
"keywords": [
"Identifier Styles",
"Eye Tracking Study",
"Code Readability"
],
"authors": [
{
"affiliation": null,
"fullName": "Bonita Sharif",
"givenName": "Bonita",
"surname": "Sharif",
"__typename": "ArticleAuthorType"
},
{
"affiliation": null,
"fullName": "Jonathan I. Maletic",
"givenName": "Jonathan I.",
"surname": "Maletic",
"__typename": "ArticleAuthorType"
}
],
"idPrefix": "icpc",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2010-06-01T00:00:00",
"pubType": "proceedings",
"pages": "196-205",
"year": "2010",
"issn": "1063-6897",
"isbn": "978-0-7695-4113-6",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "4113a192",
"articleId": "12OmNz5s0F6",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "4113a206",
"articleId": "12OmNwE9Oz3",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/cicsyn/2011/4482/0/4482a001",
"title": "Study of the Eye-tracking Methods Based on Video",
"doi": null,
"abstractUrl": "/proceedings-article/cicsyn/2011/4482a001/12OmNCcKQt2",
"parentPublication": {
"id": "proceedings/cicsyn/2011/4482/0",
"title": "Computational Intelligence, Communication Systems and Networks, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/fg/2000/0580/0/05800110",
"title": "Dual-State Parametric Eye Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/fg/2000/05800110/12OmNvTBB2i",
"parentPublication": {
"id": "proceedings/fg/2000/0580/0",
"title": "Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/etcs/2009/3557/2/3557c865",
"title": "Eye Tracking Based on Grey Prediction",
"doi": null,
"abstractUrl": "/proceedings-article/etcs/2009/3557c865/12OmNwvDQuB",
"parentPublication": {
"id": null,
"title": null,
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icalt/2011/4346/0/4346a386",
"title": "No Evidence of Correlation among Felder-Silverman's Learning Styles, Visual Memory and Visualization Styles",
"doi": null,
"abstractUrl": "/proceedings-article/icalt/2011/4346a386/12OmNxFJXM7",
"parentPublication": {
"id": "proceedings/icalt/2011/4346/0",
"title": "Advanced Learning Technologies, IEEE International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ett/2009/3936/0/3936a102",
"title": "How Feedback Intervention Affects the Performance of Self-Efficacy: An Eye Movement Study",
"doi": null,
"abstractUrl": "/proceedings-article/ett/2009/3936a102/12OmNxZ2Gji",
"parentPublication": {
"id": "proceedings/ett/2009/3936/0",
"title": "Education Technology and Training, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icsssm/2005/8971/1/01499470",
"title": "Web page viewing behavior of users: an eye-tracking study",
"doi": null,
"abstractUrl": "/proceedings-article/icsssm/2005/01499470/12OmNy5R3Gs",
"parentPublication": {
"id": "proceedings/icsssm/2005/8971/1",
"title": "2005 International Conference on Services Systems and Services Management",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icpr/2010/4109/0/4109a209",
"title": "Multispectral Eye Detection: A Preliminary Study",
"doi": null,
"abstractUrl": "/proceedings-article/icpr/2010/4109a209/12OmNy5hRkf",
"parentPublication": {
"id": "proceedings/icpr/2010/4109/0",
"title": "Pattern Recognition, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/asonam/2011/4375/0/4375a722",
"title": "Assessing Media Relevance via Eye Tracking",
"doi": null,
"abstractUrl": "/proceedings-article/asonam/2011/4375a722/12OmNyOq50H",
"parentPublication": {
"id": "proceedings/asonam/2011/4375/0",
"title": "2011 International Conference on Advances in Social Networks Analysis and Mining",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/ipcc/2005/9027/0/01494236",
"title": "Using eye tracking to address limitations in think-aloud protocol",
"doi": null,
"abstractUrl": "/proceedings-article/ipcc/2005/01494236/12OmNzUPpAh",
"parentPublication": {
"id": "proceedings/ipcc/2005/9027/0",
"title": "2005 IEEE International Professional Communication Conference (IPCC)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tg/2011/12/ttg2011122440",
"title": "Evaluation of Traditional, Orthogonal, and Radial Tree Diagrams by an Eye Tracking Study",
"doi": null,
"abstractUrl": "/journal/tg/2011/12/ttg2011122440/13rRUwI5U7W",
"parentPublication": {
"id": "trans/tg",
"title": "IEEE Transactions on Visualization & Computer Graphics",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
{
"proceeding": {
"id": "12OmNqyUUIi",
"title": "Design, Automation & Test in Europe Conference & Exhibition",
"acronym": "date",
"groupId": "1000198",
"volume": "0",
"displayVolume": "0",
"year": "2012",
"__typename": "ProceedingType"
},
"article": {
"id": "12OmNxRF76Q",
"doi": "10.1109/DATE.2012.6176492",
"title": "Low-power embedded system for real-time correction of fish-eye automotive cameras",
"normalizedTitle": "Low-power embedded system for real-time correction of fish-eye automotive cameras",
"abstract": "The design and the implementation of a flexible and cost-effective embedded system for real-time correction of fish-eye automotive cameras is presented. Nowadays many car manufacturers already introduced on-board video systems, equipped with fish-eye lens, to provide the driver a better view of the so-called blind zones. A fish-eye lens achieves a larger field of view (FOV) but, on the other hand, causes distortion, both radial and tangential, of the images projected on the image sensor. Since radial distortion is noticeable and dangerous, a real-time system for its correction is presented, whose low-power, low-cost and flexibility features are suitable for automotive applications.",
"abstracts": [
{
"abstractType": "Regular",
"content": "The design and the implementation of a flexible and cost-effective embedded system for real-time correction of fish-eye automotive cameras is presented. Nowadays many car manufacturers already introduced on-board video systems, equipped with fish-eye lens, to provide the driver a better view of the so-called blind zones. A fish-eye lens achieves a larger field of view (FOV) but, on the other hand, causes distortion, both radial and tangential, of the images projected on the image sensor. Since radial distortion is noticeable and dangerous, a real-time system for its correction is presented, whose low-power, low-cost and flexibility features are suitable for automotive applications.",
"__typename": "ArticleAbstractType"
}
],
"normalizedAbstract": "The design and the implementation of a flexible and cost-effective embedded system for real-time correction of fish-eye automotive cameras is presented. Nowadays many car manufacturers already introduced on-board video systems, equipped with fish-eye lens, to provide the driver a better view of the so-called blind zones. A fish-eye lens achieves a larger field of view (FOV) but, on the other hand, causes distortion, both radial and tangential, of the images projected on the image sensor. Since radial distortion is noticeable and dangerous, a real-time system for its correction is presented, whose low-power, low-cost and flexibility features are suitable for automotive applications.",
"fno": "06176492",
"keywords": [
"Lenses",
"Automotive Components",
"Driver Information Systems",
"Embedded Systems",
"Image Sensors",
"Image Distortion",
"Fish Eye Automotive Camera",
"Embedded System",
"On Board Video System",
"Fish Eye Lens",
"Field Of View",
"Image Sensor",
"Radial Distortion",
"Real Time System",
"Blind Zone",
"FOV",
"Cameras",
"Real Time Systems",
"Lenses",
"Streaming Media",
"Automotive Applications",
"Table Lookup",
"Blind Zones",
"Fish Eye Camera",
"Video Automotive Assistance Systems",
"Real Time Image Processing",
"Distortion Correction",
"Radial Distortion",
"Fish Eye Lens"
],
"authors": [],
"idPrefix": "date",
"isOpenAccess": false,
"showRecommendedArticles": true,
"showBuyMe": true,
"hasPdf": true,
"pubDate": "2012-03-01T00:00:00",
"pubType": "proceedings",
"pages": "340-341",
"year": "2012",
"issn": "1530-1591",
"isbn": "978-1-4577-2145-8",
"notes": null,
"notesType": null,
"__typename": "ArticleType"
},
"webExtras": [],
"adjacentArticles": {
"previous": {
"fno": "06176458",
"articleId": "12OmNzA6GL7",
"__typename": "AdjacentArticleType"
},
"next": {
"fno": "06176473",
"articleId": "12OmNB8kI0Q",
"__typename": "AdjacentArticleType"
},
"__typename": "AdjacentArticlesType"
},
"recommendedArticles": [
{
"id": "proceedings/icip/1994/6952/2/00413669",
"title": "Depth estimation using stereo fish-eye lenses",
"doi": null,
"abstractUrl": "/proceedings-article/icip/1994/00413669/12OmNBfqG59",
"parentPublication": {
"id": "proceedings/icip/1994/6952/2",
"title": "Proceedings of 1st International Conference on Image Processing",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/sensordevices/2010/4094/0/4094a073",
"title": "A Stereovision Sensor for Forest Inventories",
"doi": null,
"abstractUrl": "/proceedings-article/sensordevices/2010/4094a073/12OmNBtUdIg",
"parentPublication": {
"id": "proceedings/sensordevices/2010/4094/0",
"title": "Sensor Device Technologies and Applications, International Conference on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icmew/2014/4717/0/06890553",
"title": "Human detection in fish-eye images using HOG-based detectors over rotated windows",
"doi": null,
"abstractUrl": "/proceedings-article/icmew/2014/06890553/12OmNrkBwlf",
"parentPublication": {
"id": "proceedings/icmew/2014/4717/0",
"title": "2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icnc/2009/3736/5/3736e293",
"title": "Rejecting Mismatches between Fish-Eye Camera Images by RVM",
"doi": null,
"abstractUrl": "/proceedings-article/icnc/2009/3736e293/12OmNvDI41y",
"parentPublication": {
"id": "proceedings/icnc/2009/3736/5",
"title": "2009 Fifth International Conference on Natural Computation",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/omnivis/2002/1629/0/16290060",
"title": "Panoramic Mosaicing with a 180? Field of View Lens",
"doi": null,
"abstractUrl": "/proceedings-article/omnivis/2002/16290060/12OmNzfXazT",
"parentPublication": {
"id": "proceedings/omnivis/2002/1629/0",
"title": "Omnidirectional Vision, Workshop on",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/isuvr/2008/3259/0/3259a041",
"title": "Real Time Light Source Estimation Using a Fish-Eye Lens with ND Filters",
"doi": null,
"abstractUrl": "/proceedings-article/isuvr/2008/3259a041/12OmNzgwmPp",
"parentPublication": {
"id": "proceedings/isuvr/2008/3259/0",
"title": "International Symposium on Ubiquitous Virtual Reality",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2010/12/ttp2010122289",
"title": "Equidistant Fish-Eye Calibration and Rectification by Vanishing Point Extraction",
"doi": null,
"abstractUrl": "/journal/tp/2010/12/ttp2010122289/13rRUwj7cq8",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "trans/tp/2006/08/i1335",
"title": "A Generic Camera Model and Calibration Method for Conventional, Wide-Angle, and Fish-Eye Lenses",
"doi": null,
"abstractUrl": "/journal/tp/2006/08/i1335/13rRUyv53Gt",
"parentPublication": {
"id": "trans/tp",
"title": "IEEE Transactions on Pattern Analysis & Machine Intelligence",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
},
{
"id": "proceedings/icme/2018/1737/0/08486542",
"title": "A Method to Generate Ghost-Free HDR Images in 360 Degree Cameras with Dual Fish-Eye Lens",
"doi": null,
"abstractUrl": "/proceedings-article/icme/2018/08486542/14jQfS42dQ5",
"parentPublication": {
"id": "proceedings/icme/2018/1737/0",
"title": "2018 IEEE International Conference on Multimedia and Expo (ICME)",
"__typename": "ParentPublication"
},
"__typename": "RecommendedArticleType"
}
],
"articleVideos": []
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.