data
dict
{ "proceeding": { "id": "12OmNAR1b0Z", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwlHSTo", "doi": "10.1109/CVPRW.2017.116", "title": "Nuclei Segmentation of Fluorescence Microscopy Images Using Three Dimensional Convolutional Neural Networks", "normalizedTitle": "Nuclei Segmentation of Fluorescence Microscopy Images Using Three Dimensional Convolutional Neural Networks", "abstract": "Fluorescence microscopy enables one to visualize subcellular structures of living tissue or cells in three dimensions. This is especially true for two-photon microscopy using near-infrared light which can image deeper into tissue. To characterize and analyze biological structures, nuclei segmentation is a prerequisite step. Due to the complexity and size of the image data sets, manual segmentation is prohibitive. This paper describes a fully 3D nuclei segmentation method using three dimensional convolutional neural networks. To train the network, synthetic volumes with corresponding labeled volumes are automatically generated. Our results from multiple data sets demonstrate that our method can successfully segment nuclei in 3D.", "abstracts": [ { "abstractType": "Regular", "content": "Fluorescence microscopy enables one to visualize subcellular structures of living tissue or cells in three dimensions. This is especially true for two-photon microscopy using near-infrared light which can image deeper into tissue. To characterize and analyze biological structures, nuclei segmentation is a prerequisite step. Due to the complexity and size of the image data sets, manual segmentation is prohibitive. This paper describes a fully 3D nuclei segmentation method using three dimensional convolutional neural networks. To train the network, synthetic volumes with corresponding labeled volumes are automatically generated. Our results from multiple data sets demonstrate that our method can successfully segment nuclei in 3D.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fluorescence microscopy enables one to visualize subcellular structures of living tissue or cells in three dimensions. This is especially true for two-photon microscopy using near-infrared light which can image deeper into tissue. To characterize and analyze biological structures, nuclei segmentation is a prerequisite step. Due to the complexity and size of the image data sets, manual segmentation is prohibitive. This paper describes a fully 3D nuclei segmentation method using three dimensional convolutional neural networks. To train the network, synthetic volumes with corresponding labeled volumes are automatically generated. Our results from multiple data sets demonstrate that our method can successfully segment nuclei in 3D.", "fno": "0733a834", "keywords": [ "Image Segmentation", "Three Dimensional Displays", "Two Dimensional Displays", "Training", "Electron Microscopy", "Fluorescence" ], "authors": [ { "affiliation": null, "fullName": "David Joon Ho", "givenName": "David Joon", "surname": "Ho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chichen Fu", "givenName": "Chichen", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paul Salama", "givenName": "Paul", "surname": "Salama", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kenneth W. Dunn", "givenName": "Kenneth W.", "surname": "Dunn", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Edward J. Delp", "givenName": "Edward J.", "surname": "Delp", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "834-842", "year": "2017", "issn": "2160-7516", "isbn": "978-1-5386-0733-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0733a828", "articleId": "12OmNAIvcYM", "__typename": "AdjacentArticleType" }, "next": { "fno": "0733a843", "articleId": "12OmNBRsVvy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2017/1324/0/132401a139", "title": "3D Segmentation,Visualization and Quantitative Analysis of Differentiation Activity for Mouse Embryonic Stem Cells using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a139/12OmNA0vnUP", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217827", "title": "Mitochondria segmentation in electron microscopy volumes using deep convolutional neural network", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217827/12OmNBTawxv", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109c508", "title": "3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109c508/12OmNwHhoZP", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2016/9919/0/07459169", "title": "Nuclei segmentation of fluorescence microscopy images based on midpoint analysis and marked point process", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2016/07459169/12OmNzmtWEO", "parentPublication": { "id": "proceedings/ssiai/2016/9919/0", "title": "2016 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c302", "title": "Three Dimensional Fluorescence Microscopy Image Synthesis and Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c302/17D45WGGoLP", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a299", "title": "[Regular Paper] Three-Dimensional Segmentation of Mouse Embryonic Stem Cell Nuclei for Quantitative Analysis of Differentiation Activity Using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a299/17D45WODasw", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b883", "title": "An Ensemble Learning and Slice Fusion Strategy for Three-Dimensional Nuclei Instance Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b883/1G571irYgPm", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093435", "title": "Star-convex Polyhedra for 3D Object Detection and Segmentation in Microscopy", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093435/1jPbBJZQVZ6", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2020/5745/0/09094614", "title": "Combined Detection and Segmentation of Cell Nuclei in Microscopy Images Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2020/09094614/1jVQF2BRBUQ", "parentPublication": { "id": "proceedings/ssiai/2020/5745/0", "title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d750", "title": "RCNN-SliceNet: A Slice and Cluster Approach for Nuclei Centroid Detection in Three-Dimensional Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d750/1yJYilRygHS", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzzxuxs", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "acronym": "icmtma", "groupId": "1002837", "volume": "2", "displayVolume": "2", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNxiKs4x", "doi": "10.1109/ICMTMA.2011.518", "title": "Raman Microscopy and Imaging in Pharmaceutical Applications", "normalizedTitle": "Raman Microscopy and Imaging in Pharmaceutical Applications", "abstract": "Raman Microscopy and imaging can be used for a wide range of applications, such as the chemical identification of particles and smallest contaminations, the analysis of the distribution of a multitude of different components in a complex mixture. In recent years, the applications of Raman Microscopy and imaging in the pharmaceutical world, including capsules, packaging, coatings, sample homogeneity analysis, chemical composition, and combinatorial chemistry, has increased and is projected to continue increasing. After an introduction to the basic principles of Raman Microscopy and imaging, the developments of these methods and the application of Raman Microscopy and imaging in Process Analytical Technologies (PAT), Active Pharmaceutical Ingredient determination (API), and drug discovery and development will be reviewed.", "abstracts": [ { "abstractType": "Regular", "content": "Raman Microscopy and imaging can be used for a wide range of applications, such as the chemical identification of particles and smallest contaminations, the analysis of the distribution of a multitude of different components in a complex mixture. In recent years, the applications of Raman Microscopy and imaging in the pharmaceutical world, including capsules, packaging, coatings, sample homogeneity analysis, chemical composition, and combinatorial chemistry, has increased and is projected to continue increasing. After an introduction to the basic principles of Raman Microscopy and imaging, the developments of these methods and the application of Raman Microscopy and imaging in Process Analytical Technologies (PAT), Active Pharmaceutical Ingredient determination (API), and drug discovery and development will be reviewed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Raman Microscopy and imaging can be used for a wide range of applications, such as the chemical identification of particles and smallest contaminations, the analysis of the distribution of a multitude of different components in a complex mixture. In recent years, the applications of Raman Microscopy and imaging in the pharmaceutical world, including capsules, packaging, coatings, sample homogeneity analysis, chemical composition, and combinatorial chemistry, has increased and is projected to continue increasing. After an introduction to the basic principles of Raman Microscopy and imaging, the developments of these methods and the application of Raman Microscopy and imaging in Process Analytical Technologies (PAT), Active Pharmaceutical Ingredient determination (API), and drug discovery and development will be reviewed.", "fno": "4296c943", "keywords": [ "Raman Spectroscopy", "Microscopy", "Imaging", "Pharmaceutical", "PAT", "API" ], "authors": [ { "affiliation": null, "fullName": "Zhen Tian", "givenName": "Zhen", "surname": "Tian", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nai-Ci Bing", "givenName": "Nai-Ci", "surname": "Bing", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li-li Xie", "givenName": "Li-li", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li-Jun Wang", "givenName": "Li-Jun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hao Yuan", "givenName": "Hao", "surname": "Yuan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmtma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-01-01T00:00:00", "pubType": "proceedings", "pages": "943-947", "year": "2011", "issn": null, "isbn": "978-0-7695-4296-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4296c939", "articleId": "12OmNqNXEqF", "__typename": "AdjacentArticleType" }, "next": { "fno": "4296c948", "articleId": "12OmNwx3Q9H", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2010/8306/0/05706622", "title": "Eigenspectra, a robust regression method for multiplexed Raman spectra analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706622/12OmNAgoV7v", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2012/2559/0/06392690", "title": "CWT-PLSR for quantitative analysis of Raman spectrum", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392690/12OmNwGZNGc", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460507", "title": "Finding discriminative features for Raman spectroscopy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460507/12OmNwkhThq", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2009/3595/0/3595a267", "title": "Applying Principle Component Analysis for Detecting Skin Damage Caused by Using Detergents: A Raman Spectroscopy Study", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a267/12OmNy6ZrWL", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120496", "title": "Probabilistic Partial Least Square Regression: A Robust Model for Quantitative Analysis of Raman Spectroscopy Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120496/12OmNyugyVg", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2008/3391/0/3391a633", "title": "Discrimination of Squamous Cell Carcinoma of the Oral Cavity Using Raman Spectroscopy and Chemometric Analysis", "doi": null, "abstractUrl": "/proceedings-article/icinis/2008/3391a633/12OmNzaQobl", "parentPublication": { "id": "proceedings/icinis/2008/3391/0", "title": "Intelligent Networks and Intelligent Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2009/3728/0/3728a493", "title": "Application of Raman Spectroscopy to Detecting Organic Contaminant in Water", "doi": null, "abstractUrl": "/proceedings-article/case/2009/3728a493/12OmNzayN7f", "parentPublication": { "id": "proceedings/case/2009/3728/0", "title": "2009 IITA International Conference on Control, Automation and Systems Engineering, CASE 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671772", "title": "Deep Learning Techniques for Unmixing of Hyperspectral Stimulated Raman Scattering Images", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671772/1A8gNnDdEkw", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671369", "title": "Cell Nuclei and Lipid Droplets Quantification in Stimulated Raman Images", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671369/1A8jqT4Nunu", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2022/9045/0/10103260", "title": "Spherical and Rod-shaped Gold Nanoparticles for Surface Enhanced Raman Spectroscopy", "doi": null, "abstractUrl": "/proceedings-article/sti/2022/10103260/1MBFgErR2uI", "parentPublication": { "id": "proceedings/sti/2022/9045/0", "title": "2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzVGcJp", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNz4BduY", "doi": "10.1109/BIBM.2011.37", "title": "Computer-Based Image Analysis of Liver Steatosis with Large-Scale Microscopy Imagery and Correlation with Magnetic Resonance Imaging Lipid Analysis", "normalizedTitle": "Computer-Based Image Analysis of Liver Steatosis with Large-Scale Microscopy Imagery and Correlation with Magnetic Resonance Imaging Lipid Analysis", "abstract": "Most pathology analyses and measurements are prevalently carried out by trained reviewers in both clinical and research settings. Therefore, the resulting outputs are inexorably biased by interpreters and degraded with poor reproducibility. In this paper, we propose a computerized image analysis paradigm enabling quantitative characterizations of steatosis areas in microscopy images of pediatric liver biopsies. With the same set of patients, we also acquired the lipid measurements from magnetic resonance imaging data analysis for correlation investigation. Our preliminary results suggest a high correlation between the steatosis areas quantized with microscopy images and the lipid percentages calculated from radiology imaging data. Additionally, we compared the per formance of the proposed analysis method with those of three certified pathologists and a popular commercial algorithm. The results suggest the superiority of our method to both human reviewers and the commercial method in terms of the steatosis lipid correlation strength. This demonstrates that the developed method is promising for generating quantitative and reliable analysis results to better support further liver disease study.", "abstracts": [ { "abstractType": "Regular", "content": "Most pathology analyses and measurements are prevalently carried out by trained reviewers in both clinical and research settings. Therefore, the resulting outputs are inexorably biased by interpreters and degraded with poor reproducibility. In this paper, we propose a computerized image analysis paradigm enabling quantitative characterizations of steatosis areas in microscopy images of pediatric liver biopsies. With the same set of patients, we also acquired the lipid measurements from magnetic resonance imaging data analysis for correlation investigation. Our preliminary results suggest a high correlation between the steatosis areas quantized with microscopy images and the lipid percentages calculated from radiology imaging data. Additionally, we compared the per formance of the proposed analysis method with those of three certified pathologists and a popular commercial algorithm. The results suggest the superiority of our method to both human reviewers and the commercial method in terms of the steatosis lipid correlation strength. This demonstrates that the developed method is promising for generating quantitative and reliable analysis results to better support further liver disease study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most pathology analyses and measurements are prevalently carried out by trained reviewers in both clinical and research settings. Therefore, the resulting outputs are inexorably biased by interpreters and degraded with poor reproducibility. In this paper, we propose a computerized image analysis paradigm enabling quantitative characterizations of steatosis areas in microscopy images of pediatric liver biopsies. With the same set of patients, we also acquired the lipid measurements from magnetic resonance imaging data analysis for correlation investigation. Our preliminary results suggest a high correlation between the steatosis areas quantized with microscopy images and the lipid percentages calculated from radiology imaging data. Additionally, we compared the per formance of the proposed analysis method with those of three certified pathologists and a popular commercial algorithm. The results suggest the superiority of our method to both human reviewers and the commercial method in terms of the steatosis lipid correlation strength. This demonstrates that the developed method is promising for generating quantitative and reliable analysis results to better support further liver disease study.", "fno": "06120462", "keywords": [ "Biomedical MRI", "Data Analysis", "Diseases", "Liver", "Medical Image Processing", "Paediatrics", "Computer Based Image Analysis", "Liver Steatosis", "Large Scale Microscopy Imagery", "Magnetic Resonance Imaging Lipid Data Analysis", "Pediatric Liver Biopsies", "Correlation Investigation", "Radiology Imaging Data", "Steatosis Lipid Correlation Strength", "Liver Disease Study", "Liver", "Lipidomics", "Shape", "Correlation", "Microscopy", "Radiology", "Image Segmentation", "Liver Steatosis Quantification", "Data Correlation", "Tissue Representation", "Large Scale Microscopy Image Analysis", "Parallel Computation" ], "authors": [ { "affiliation": null, "fullName": "Jun Kong", "givenName": "Jun", "surname": "Kong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael J. Lee", "givenName": "Michael J.", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pelin Bagci", "givenName": "Pelin", "surname": "Bagci", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Puneet Sharma", "givenName": "Puneet", "surname": "Sharma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Diego Martin", "givenName": "Diego", "surname": "Martin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "N. Volkan Adsay", "givenName": "N. Volkan", "surname": "Adsay", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Joel H. Saltz", "givenName": "Joel H.", "surname": "Saltz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alton B. Farris", "givenName": "Alton B.", "surname": "Farris", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "333-338", "year": "2011", "issn": null, "isbn": "978-1-4577-1799-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06120461", "articleId": "12OmNxw5Bxn", "__typename": "AdjacentArticleType" }, "next": { "fno": "06120463", "articleId": "12OmNy6HQXq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/at-equal/2010/8842/0/05663612", "title": "Application of a Therapeutic Education Program on Liver Steatosic Patients - A Standard Reproductive Biopsycho Behavioral Approach", "doi": null, "abstractUrl": "/proceedings-article/at-equal/2010/05663612/12OmNAle6TT", "parentPublication": { "id": "proceedings/at-equal/2010/8842/0", "title": "2010 Advanced Technologies for Enhancing Quality of Life (ATEQUAL 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a236", "title": "Image Enhancement of Routine Biopsies: A Case for Liver Tissue Detection", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a236/12OmNvAAto7", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732702", "title": "Using text mining to understand traditional Chinese medicine pathogenesis of nonalcoholic fatty liver disease", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732702/12OmNwp74Go", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2017/1710/0/1710a040", "title": "Measuring Steatosis in Liver Biopsies Using Machine Learning and Morphological Imaging", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a040/12OmNx6xHsh", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2004/8484/2/01326444", "title": "A GLRT and bootstrap approach to detection in magnetic resonance force microscopy", "doi": null, "abstractUrl": "/proceedings-article/icassp/2004/01326444/12OmNyr8Ymv", "parentPublication": { "id": "proceedings/icassp/2004/8484/2", "title": "2004 IEEE International Conference on Acoustics, Speech, and Signal Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a137", "title": "Effect of Conjugated Linoleic Acid on Metabolism and Lipogenic Gene Expression of Liver in Lactating Mice", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a137/12OmNzYeAPd", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671369", "title": "Cell Nuclei and Lipid Droplets Quantification in Stimulated Raman Images", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671369/1A8jqT4Nunu", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669290", "title": "Effects of Shugan Quzhi Capsule in treating different metabolic diseases based on network pharmacology and molecular docking", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669290/1A9WypwJPC8", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbe/2021/0099/0/009900a344", "title": "Grifola Frondosa Polysaccharides affects gut microbiota and lipid profiles depended on the molecular weight in mice", "doi": null, "abstractUrl": "/proceedings-article/icitbe/2021/009900a344/1AH7WwBoi8U", "parentPublication": { "id": "proceedings/icitbe/2021/0099/0", "title": "2021 International Conference on Information Technology and Biomedical Engineering (ICITBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995626", "title": "Mechanism of Qiwei Baizhu San in the Treatment of T2DM by Regulating Liver miRNA", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995626/1JC2FcRhWeI", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiru", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VsBTWj", "doi": "10.1109/CVPRW.2018.00306", "title": "Localization and Tracking in 4D Fluorescence Microscopy Imagery", "normalizedTitle": "Localization and Tracking in 4D Fluorescence Microscopy Imagery", "abstract": "3D fluorescence microscopy continues to pose challenging tasks with more experiments leading to identifying new physiological patterns in cells' life cycle and activity. It then falls on the hands of biologists to annotate this imagery which is laborious and time-consuming, especially with noisy images and hard to see and track patterns. Modeling of automation tasks that can handle depth-varying light conditions and noise, and other challenges inherent in 3D fluorescence microscopy often becomes complex and requires high processing power and memory. This paper presents an efficient methodology for the localization, classification, and tracking in fluorescence microscopy imagery by taking advantage of time sequential images in 4D data. We show the application of our proposed method on the challenging task of localizing and tracking microtubule fibers' bridge formation during the cell division of zebrafish embryos where we achieve 98% accuracy and 0.94 F1-score.", "abstracts": [ { "abstractType": "Regular", "content": "3D fluorescence microscopy continues to pose challenging tasks with more experiments leading to identifying new physiological patterns in cells' life cycle and activity. It then falls on the hands of biologists to annotate this imagery which is laborious and time-consuming, especially with noisy images and hard to see and track patterns. Modeling of automation tasks that can handle depth-varying light conditions and noise, and other challenges inherent in 3D fluorescence microscopy often becomes complex and requires high processing power and memory. This paper presents an efficient methodology for the localization, classification, and tracking in fluorescence microscopy imagery by taking advantage of time sequential images in 4D data. We show the application of our proposed method on the challenging task of localizing and tracking microtubule fibers' bridge formation during the cell division of zebrafish embryos where we achieve 98% accuracy and 0.94 F1-score.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D fluorescence microscopy continues to pose challenging tasks with more experiments leading to identifying new physiological patterns in cells' life cycle and activity. It then falls on the hands of biologists to annotate this imagery which is laborious and time-consuming, especially with noisy images and hard to see and track patterns. Modeling of automation tasks that can handle depth-varying light conditions and noise, and other challenges inherent in 3D fluorescence microscopy often becomes complex and requires high processing power and memory. This paper presents an efficient methodology for the localization, classification, and tracking in fluorescence microscopy imagery by taking advantage of time sequential images in 4D data. We show the application of our proposed method on the challenging task of localizing and tracking microtubule fibers' bridge formation during the cell division of zebrafish embryos where we achieve 98% accuracy and 0.94 F1-score.", "fno": "610000c371", "keywords": [ "Biology Computing", "Cellular Biophysics", "Fluorescence", "Image Sequences", "Optical Microscopy", "Depth Varying Light Conditions", "3 D Fluorescence Microscopy", "Fluorescence Microscopy Imagery", "Time Sequential Images", "Physiological Patterns", "Noisy Images", "Microtubule Fibers", "Zebrafish Embryos", "Cell Division", "Microscopy", "Three Dimensional Displays", "Bridges", "Two Dimensional Displays", "Task Analysis", "Embryo", "Image Segmentation" ], "authors": [ { "affiliation": null, "fullName": "Shahira Abousamra", "givenName": "Shahira", "surname": "Abousamra", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shai Adar", "givenName": "Shai", "surname": "Adar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Natalie Elia", "givenName": "Natalie", "surname": "Elia", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roy Shilkrot", "givenName": "Roy", "surname": "Shilkrot", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "2371-23718", "year": "2018", "issn": null, "isbn": "978-1-5386-6100-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "610000c362", "articleId": "17D45XDIXS5", "__typename": "AdjacentArticleType" }, "next": { "fno": "610000c380", "articleId": "17D45VTRoCD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2014/5209/0/5209a865", "title": "Three-Dimensional Deconvolution of Wide Field Microscopy with Sparse Priors: Application to Zebrafish Imagery", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209a865/12OmNweBUMk", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2017/0733/0/0733a834", "title": "Nuclei Segmentation of Fluorescence Microscopy Images Using Three Dimensional Convolutional Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a834/12OmNwlHSTo", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csbw/2005/2442/0/01540644", "title": "Registering Drosophila embryos at cellular resolution to build a quantitative 3D atlas of gene expression patterns and morphology", "doi": null, "abstractUrl": "/proceedings-article/csbw/2005/01540644/12OmNyTOskf", "parentPublication": { "id": "proceedings/csbw/2005/2442/0", "title": "2005 IEEE Computational Systems Bioinformatics Conference Workshops and Poster Abstracts", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ci/2013/3194/0/06855915", "title": "Quantitative Comparison of Two Particle Tracking Methods in Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/ci/2013/06855915/12OmNyaoDCM", "parentPublication": { "id": "proceedings/ci/2013/3194/0", "title": "2013 BRICS Congress on Computational Intelligence & 11th Brazilian Congress on Computational Intelligence (BRICS-CCI & CBIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000c302", "title": "Three Dimensional Fluorescence Microscopy Image Synthesis and Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000c302/17D45WGGoLP", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a299", "title": "[Regular Paper] Three-Dimensional Segmentation of Mouse Embryonic Stem Cell Nuclei for Quantitative Analysis of Differentiation Activity Using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a299/17D45WODasw", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d783", "title": "Physics-Enhanced Machine Learning for Virtual Fluorescence Microscopy", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d783/1BmEIpT8BCE", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1702", "title": "A Poisson-Gaussian Denoising Dataset With Real Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1702/1gyrxm4yoPm", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b087", "title": "Multi-Object Portion Tracking in 4D Fluorescence Microscopy Imagery With Deep Feature Maps", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b087/1iTvgxHPPjy", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900d750", "title": "RCNN-SliceNet: A Slice and Cluster Approach for Nuclei Centroid Detection in Three-Dimensional Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900d750/1yJYilRygHS", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir6", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WZZ7GJ", "doi": "10.1109/ICPR.2018.8546040", "title": "Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning", "normalizedTitle": "Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning", "abstract": "This paper develops a pattern recognition and machine learning system to localize cell colony subtypes in multi-label, phase-contrast microscopy images. A convolutional neural network is trained to recognize homogeneous cell colonies, and is used in a sliding-window patch based testing method to localize these homogeneous cell types within heterogeneous, multi-label images. The method is used to determine the effects of nicotine on induced pluripotent stem cells expressing the Huntington's disease phenotype. The results of the network are compared to those of an ECOC classifier trained on texture features. The ability of the network to localize cell phenotypes within heterogeneous colonies is visualized and the temporal behavior of stem cells is analyzed.", "abstracts": [ { "abstractType": "Regular", "content": "This paper develops a pattern recognition and machine learning system to localize cell colony subtypes in multi-label, phase-contrast microscopy images. A convolutional neural network is trained to recognize homogeneous cell colonies, and is used in a sliding-window patch based testing method to localize these homogeneous cell types within heterogeneous, multi-label images. The method is used to determine the effects of nicotine on induced pluripotent stem cells expressing the Huntington's disease phenotype. The results of the network are compared to those of an ECOC classifier trained on texture features. The ability of the network to localize cell phenotypes within heterogeneous colonies is visualized and the temporal behavior of stem cells is analyzed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper develops a pattern recognition and machine learning system to localize cell colony subtypes in multi-label, phase-contrast microscopy images. A convolutional neural network is trained to recognize homogeneous cell colonies, and is used in a sliding-window patch based testing method to localize these homogeneous cell types within heterogeneous, multi-label images. The method is used to determine the effects of nicotine on induced pluripotent stem cells expressing the Huntington's disease phenotype. The results of the network are compared to those of an ECOC classifier trained on texture features. The ability of the network to localize cell phenotypes within heterogeneous colonies is visualized and the temporal behavior of stem cells is analyzed.", "fno": "08546040", "keywords": [ "Cellular Biophysics", "Diseases", "Feedforward Neural Nets", "Image Classification", "Image Recognition", "Image Texture", "Learning Artificial Intelligence", "Pattern Recognition", "Multilabel Classification", "Stem Cell Microscopy Images", "Deep Learning", "Pattern Recognition", "Machine Learning System", "Cell Colony Subtypes", "Phase Contrast Microscopy Images", "Convolutional Neural Network", "Homogeneous Cell Colonies", "Sliding Window Patch Based Testing Method", "Homogeneous Cell Types", "Multilabel Images", "Huntingtons Disease Phenotype", "Cell Phenotypes", "Heterogeneous Colonies", "Pluripotent Stem Cells", "Stem Cells", "Image Segmentation", "Testing", "Diseases", "Feature Extraction", "Microscopy", "Training" ], "authors": [ { "affiliation": "Department of Bioengineering, University of California, Riverside Riverside, CA, 92521", "fullName": "Adam Witmer", "givenName": "Adam", "surname": "Witmer", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electrical and Computer, Engineering University of California, Riverside Riverside, CA, 92521", "fullName": "Bir Bhanu", "givenName": "Bir", "surname": "Bhanu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "1408-1413", "year": "2018", "issn": "1051-4651", "isbn": "978-1-5386-3788-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08546311", "articleId": "17D45Wt3Exr", "__typename": "AdjacentArticleType" }, "next": { "fno": "08545142", "articleId": "17D45WrVg4z", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2017/1324/0/132401a139", "title": "3D Segmentation,Visualization and Quantitative Analysis of Differentiation Activity for Mouse Embryonic Stem Cells using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a139/12OmNA0vnUP", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2011/4851/0/196", "title": "Symmetry-based presentation for stem-cell image segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2011/196/12OmNBsLP9U", "parentPublication": { "id": "proceedings/iccabs/2011/4851/0", "title": "2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbec/2016/2132/0/07458972", "title": "Stem Cell Proliferation and Differentiation through Capped Clay Nanotubes", "doi": null, "abstractUrl": "/proceedings-article/sbec/2016/07458972/12OmNxcvh5f", "parentPublication": { "id": "proceedings/sbec/2016/2132/0", "title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2016/3834/0/3834a222", "title": "Fluorescence Microscopy Image Processing and Visualization for Analyzing Cell Kinematics, Proliferation and Attachment in Mouse Embryonic Stem Cell Culture", "doi": null, "abstractUrl": "/proceedings-article/bibe/2016/3834a222/12OmNynsby6", "parentPublication": { "id": "proceedings/bibe/2016/3834/0", "title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004474", "title": "Machine learning and interactive visualization applied to TB-sized images of stem cells", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004474/12OmNzVGcAS", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2010/4304/2/4304b410", "title": "CSCB[TM]: China Stem Cell Bank Information Management System - An Intelligent System for Managing China Stem Cell Bank and Standard Quality Control", "doi": null, "abstractUrl": "/proceedings-article/gcis/2010/4304b410/12OmNzahcbF", "parentPublication": { "id": "proceedings/gcis/2010/4304/2", "title": "2010 Second WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2016/07/mco2016070070", "title": "Enabling Stem Cell Characterization from Large Microscopy Images", "doi": null, "abstractUrl": "/magazine/co/2016/07/mco2016070070/13rRUwcAqvA", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2022/8487/0/848700a174", "title": "MobileNetV2 Based Diagnosis and Grading of Limbal Stem Cell Deficiency", "doi": null, "abstractUrl": "/proceedings-article/bibe/2022/848700a174/1J6hGwHNgn6", "parentPublication": { "id": "proceedings/bibe/2022/8487/0", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/5555/01/10054500", "title": "Triplet-net Classification of Contiguous Stem Cell Microscopy Images", "doi": null, "abstractUrl": "/journal/tb/5555/01/10054500/1L8lK3OIIJa", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2021/4261/0/09635557", "title": "Automatic Estimation of Limbal Stem Cell Densities in Cultured Epithelial Cell Microscopy Imaging", "doi": null, "abstractUrl": "/proceedings-article/bibe/2021/09635557/1zmvwXcs2Ry", "parentPublication": { "id": "proceedings/bibe/2021/4261/0", "title": "2021 IEEE 21st International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmiarePQAg", "doi": "10.1109/ICPR48806.2021.9412641", "title": "Learning to segment clustered amoeboid cells from brightfield microscopy via multi-task learning with adaptive weight selection", "normalizedTitle": "Learning to segment clustered amoeboid cells from brightfield microscopy via multi-task learning with adaptive weight selection", "abstract": "Detecting and segmenting individual cells from microscopy images is critical to various life science applications. Traditional cell segmentation tools are often ill-suited for applications in brightfield microscopy due to poor contrast and intensity heterogeneity, and only a small subset are applicable to segment cells in a cluster. In this regard, we introduce a novel supervised technique for cell segmentation in a multitask learning paradigm. A combination of a multi-task loss, based on the region and cell boundary detection, is employed for an improved prediction efficiency of the network. The learning problem is posed in a novel min-max framework which enables adaptive estimation of the hyper-parameters in an automatic fashion. The region and cell boundary predictions are combined via morphological operations and active contour model to segment individual cells. The proposed methodology is particularly suited to segment touching cells from brightfield microscopy images without manual interventions. Quantitatively, we observe an overall Dice score of 0.93 on the validation set, which is an improvement of over 15.9% on a recent unsupervised method, and outperforms the popular supervised U-net algorithm by at least 5.8% on average.", "abstracts": [ { "abstractType": "Regular", "content": "Detecting and segmenting individual cells from microscopy images is critical to various life science applications. Traditional cell segmentation tools are often ill-suited for applications in brightfield microscopy due to poor contrast and intensity heterogeneity, and only a small subset are applicable to segment cells in a cluster. In this regard, we introduce a novel supervised technique for cell segmentation in a multitask learning paradigm. A combination of a multi-task loss, based on the region and cell boundary detection, is employed for an improved prediction efficiency of the network. The learning problem is posed in a novel min-max framework which enables adaptive estimation of the hyper-parameters in an automatic fashion. The region and cell boundary predictions are combined via morphological operations and active contour model to segment individual cells. The proposed methodology is particularly suited to segment touching cells from brightfield microscopy images without manual interventions. Quantitatively, we observe an overall Dice score of 0.93 on the validation set, which is an improvement of over 15.9% on a recent unsupervised method, and outperforms the popular supervised U-net algorithm by at least 5.8% on average.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Detecting and segmenting individual cells from microscopy images is critical to various life science applications. Traditional cell segmentation tools are often ill-suited for applications in brightfield microscopy due to poor contrast and intensity heterogeneity, and only a small subset are applicable to segment cells in a cluster. In this regard, we introduce a novel supervised technique for cell segmentation in a multitask learning paradigm. A combination of a multi-task loss, based on the region and cell boundary detection, is employed for an improved prediction efficiency of the network. The learning problem is posed in a novel min-max framework which enables adaptive estimation of the hyper-parameters in an automatic fashion. The region and cell boundary predictions are combined via morphological operations and active contour model to segment individual cells. The proposed methodology is particularly suited to segment touching cells from brightfield microscopy images without manual interventions. Quantitatively, we observe an overall Dice score of 0.93 on the validation set, which is an improvement of over 15.9% on a recent unsupervised method, and outperforms the popular supervised U-net algorithm by at least 5.8% on average.", "fno": "09412641", "keywords": [ "Biomedical Optical Imaging", "Cellular Biophysics", "Image Segmentation", "Learning Artificial Intelligence", "Medical Image Processing", "Segment Clustered Amoeboid Cells", "Adaptive Weight Selection", "Intensity Heterogeneity", "Segment Cells", "Cell Boundary Detection", "Learning Problem", "Adaptive Estimation", "Cell Boundary Predictions", "Segment Touching Cells", "Brightfield Microscopy Images", "Cell Segmentation Tools", "Image Segmentation", "Adaptation Models", "Adaptive Systems", "Microscopy", "Neural Networks", "Predictive Models", "Tools" ], "authors": [ { "affiliation": "Institut Pasteur,Bioimage Analysis Unit,Department of Cell Biology and Infection,Paris,France", "fullName": "Rituparna Sarkar", "givenName": "Rituparna", "surname": "Sarkar", "__typename": "ArticleAuthorType" }, { "affiliation": "Institut Pasteur,Bioimage Analysis Unit,Department of Cell Biology and Infection,Paris,France", "fullName": "Suvadip Mukherjee", "givenName": "Suvadip", "surname": "Mukherjee", "__typename": "ArticleAuthorType" }, { "affiliation": "Institut Pasteur,Bioimage Analysis Unit,Department of Cell Biology and Infection,Paris,France", "fullName": "Elisabeth Labruyère", "givenName": "Elisabeth", "surname": "Labruyère", "__typename": "ArticleAuthorType" }, { "affiliation": "Institut Pasteur,Bioimage Analysis Unit,Department of Cell Biology and Infection,Paris,France", "fullName": "Jean-Christophe Olivo-Marin", "givenName": "Jean-Christophe", "surname": "Olivo-Marin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "3845-3852", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412826", "articleId": "1tmhKme1oLC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09413091", "articleId": "1tmjBXBvjwY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibe/2017/1324/0/132401a139", "title": "3D Segmentation,Visualization and Quantitative Analysis of Differentiation Activity for Mouse Embryonic Stem Cells using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a139/12OmNA0vnUP", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572677", "title": "Counting clustered cells using distance mapping", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572677/12OmNrJAdMt", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2008/2174/0/04761746", "title": "Tracking of Arabidopsis thaliana root cells in time-lapse microscopy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04761746/12OmNxFsmLs", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/03/06963495", "title": "Extraction of Individual Filaments from 2D Confocal Microscopy Images of Flat Cells", "doi": null, "abstractUrl": "/journal/tb/2015/03/06963495/13rRUwIF6jt", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2017/1235/0/08457970", "title": "Detecting and Segmenting White Blood Cells in Microscopy Images of Thin Blood Smears", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457970/13xI8Aja7Di", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a299", "title": "[Regular Paper] Three-Dimensional Segmentation of Mouse Embryonic Stem Cell Nuclei for Quantitative Analysis of Differentiation Activity Using Time-Lapse Fluorescence Microscopy Images", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a299/17D45WODasw", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545249", "title": "Convolutional Features-Based CRF Graph Matching for Tracking of Densely Packed Cells", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545249/17D45WZZ7Dd", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546040", "title": "Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546040/17D45WZZ7GJ", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669774", "title": "Segmentation of Bacterial Cells in Biofilms Using an Overlapped Ellipse Fitting Technique", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669774/1A9VGuH48Fy", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2020/5745/0/09094614", "title": "Combined Detection and Segmentation of Cell Nuclei in Microscopy Images Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2020/09094614/1jVQF2BRBUQ", "parentPublication": { "id": "proceedings/ssiai/2020/5745/0", "title": "2020 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx8wTfL", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzcvDi", "doi": "10.1109/ICPR.2008.4760936", "title": "2. Image computing for digital pathology", "normalizedTitle": "2. Image computing for digital pathology", "abstract": "Summary form only given. Pathologists and cancer biologists rely on tissue and cellular analysis to study cancer expression, genetic profiles, and cellular morphology to understand the underlying basis for a disease and to grade the level of disease progression. Conventional analysis of tissue histology and sample cytology includes the steps of examination of the stained tissue or cell smear under a microscope, scoring the expression relative to the most highly expressing (densely stained) area on a predefined scale for normal, cancer, stromal regions based on the morphology of the tissue, estimating the percentage area of cancer tissue relative of normal and stroma, and multiplying the score by the percentage area of cancer region and converting to another predefined scale for statistical analyses. Most of this analysis is done manually or with limited tools to aid the scoring process. Over the last 5 years, automated and semi- automated microscope slide scanners have become available in the marketplace. These scanners rely on sophisticated microscopes and allow for the digitization of the entire sample at varying magnifications. This has led to the emergence of digital pathology and a growing amount of image data. Each sample digitized is typically of the order of 2.7 GB to 10 GB in size depending on the magnification of the digitizing system with an image size of 30,000 ? 30,000 pixels or larger. Further, current software and methods for automated scoring of tissue is very limited. This has led to an increased interest in identifying novel solutions to automated histology and cytology analysis. In order to achieve high computational accuracy with reasonable turnaround times, novel approaches from the data and resource management perspective are also required to address handling of image sizes outlined above. Two developments in computer industry make the current generation of scientists more likely to solve the performance challenges associated with the large image sizes. First, the emergence of multi-core processors allow for parallel processing within a single PC using of-the-shelf components. It is virtually impossible today to buy a PC that does not have at least two computational cores. Furthermore, all major manufacturers have announced processors containing four, eight and even sixteen cores for the next two years, providing an omnipresent potential for parallel processing on every desktop PC. Second, as of today, there is no reasonable size medical or research institution in the US not having a PC cluster in their computing arsenal. The next generation of digital pathology systems will require the ability to share and process data across disparate institutes. Hence, PC clusters would allow for parallelism by analyzing multiple images simultaneously. They would also offer an opportunity to speed up the analysis of a single image. However, exploiting the computational power of multi-core architectures and PC clusters requires modifications to existing, sequential image analysis codes and cautious evaluation of alternative and novel algorithms with respect to their potential for parallelism. This tutorial will provide an overview of the application domain and present an overview of the challenges. Specifically, opportunities for novel image analysis and pattern recognition algorithms that can leverage frameworks for shared and distributed parallel computing will be discussed along with examples from ongoing research in the labs of the instructors. Topics to be covered will include: 1) Overview of digital pathology 2) Applications and Challenges (Immunohistochemistry, H&E analysis, FISH, Alternate Image Modalities - Spectral Imaging, Histology, Cytology) 3) Architectural Developments (Multi-core, Networking, GPU processing, Storage) 4) Image Analysis Pipelines and Algorithms (Image Segmentation, Nuclei Detection, Morphometric Features, Karyometric Features, ...) 5) Performance implications (data management, exploiting multi-core processors, exploiting PC cluster) 6) Emerging trends and applications.", "abstracts": [ { "abstractType": "Regular", "content": "Summary form only given. Pathologists and cancer biologists rely on tissue and cellular analysis to study cancer expression, genetic profiles, and cellular morphology to understand the underlying basis for a disease and to grade the level of disease progression. Conventional analysis of tissue histology and sample cytology includes the steps of examination of the stained tissue or cell smear under a microscope, scoring the expression relative to the most highly expressing (densely stained) area on a predefined scale for normal, cancer, stromal regions based on the morphology of the tissue, estimating the percentage area of cancer tissue relative of normal and stroma, and multiplying the score by the percentage area of cancer region and converting to another predefined scale for statistical analyses. Most of this analysis is done manually or with limited tools to aid the scoring process. Over the last 5 years, automated and semi- automated microscope slide scanners have become available in the marketplace. These scanners rely on sophisticated microscopes and allow for the digitization of the entire sample at varying magnifications. This has led to the emergence of digital pathology and a growing amount of image data. Each sample digitized is typically of the order of 2.7 GB to 10 GB in size depending on the magnification of the digitizing system with an image size of 30,000 ? 30,000 pixels or larger. Further, current software and methods for automated scoring of tissue is very limited. This has led to an increased interest in identifying novel solutions to automated histology and cytology analysis. In order to achieve high computational accuracy with reasonable turnaround times, novel approaches from the data and resource management perspective are also required to address handling of image sizes outlined above. Two developments in computer industry make the current generation of scientists more likely to solve the performance challenges associated with the large image sizes. First, the emergence of multi-core processors allow for parallel processing within a single PC using of-the-shelf components. It is virtually impossible today to buy a PC that does not have at least two computational cores. Furthermore, all major manufacturers have announced processors containing four, eight and even sixteen cores for the next two years, providing an omnipresent potential for parallel processing on every desktop PC. Second, as of today, there is no reasonable size medical or research institution in the US not having a PC cluster in their computing arsenal. The next generation of digital pathology systems will require the ability to share and process data across disparate institutes. Hence, PC clusters would allow for parallelism by analyzing multiple images simultaneously. They would also offer an opportunity to speed up the analysis of a single image. However, exploiting the computational power of multi-core architectures and PC clusters requires modifications to existing, sequential image analysis codes and cautious evaluation of alternative and novel algorithms with respect to their potential for parallelism. This tutorial will provide an overview of the application domain and present an overview of the challenges. Specifically, opportunities for novel image analysis and pattern recognition algorithms that can leverage frameworks for shared and distributed parallel computing will be discussed along with examples from ongoing research in the labs of the instructors. Topics to be covered will include: 1) Overview of digital pathology 2) Applications and Challenges (Immunohistochemistry, H&E analysis, FISH, Alternate Image Modalities - Spectral Imaging, Histology, Cytology) 3) Architectural Developments (Multi-core, Networking, GPU processing, Storage) 4) Image Analysis Pipelines and Algorithms (Image Segmentation, Nuclei Detection, Morphometric Features, Karyometric Features, ...) 5) Performance implications (data management, exploiting multi-core processors, exploiting PC cluster) 6) Emerging trends and applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Summary form only given. Pathologists and cancer biologists rely on tissue and cellular analysis to study cancer expression, genetic profiles, and cellular morphology to understand the underlying basis for a disease and to grade the level of disease progression. Conventional analysis of tissue histology and sample cytology includes the steps of examination of the stained tissue or cell smear under a microscope, scoring the expression relative to the most highly expressing (densely stained) area on a predefined scale for normal, cancer, stromal regions based on the morphology of the tissue, estimating the percentage area of cancer tissue relative of normal and stroma, and multiplying the score by the percentage area of cancer region and converting to another predefined scale for statistical analyses. Most of this analysis is done manually or with limited tools to aid the scoring process. Over the last 5 years, automated and semi- automated microscope slide scanners have become available in the marketplace. These scanners rely on sophisticated microscopes and allow for the digitization of the entire sample at varying magnifications. This has led to the emergence of digital pathology and a growing amount of image data. Each sample digitized is typically of the order of 2.7 GB to 10 GB in size depending on the magnification of the digitizing system with an image size of 30,000 ? 30,000 pixels or larger. Further, current software and methods for automated scoring of tissue is very limited. This has led to an increased interest in identifying novel solutions to automated histology and cytology analysis. In order to achieve high computational accuracy with reasonable turnaround times, novel approaches from the data and resource management perspective are also required to address handling of image sizes outlined above. Two developments in computer industry make the current generation of scientists more likely to solve the performance challenges associated with the large image sizes. First, the emergence of multi-core processors allow for parallel processing within a single PC using of-the-shelf components. It is virtually impossible today to buy a PC that does not have at least two computational cores. Furthermore, all major manufacturers have announced processors containing four, eight and even sixteen cores for the next two years, providing an omnipresent potential for parallel processing on every desktop PC. Second, as of today, there is no reasonable size medical or research institution in the US not having a PC cluster in their computing arsenal. The next generation of digital pathology systems will require the ability to share and process data across disparate institutes. Hence, PC clusters would allow for parallelism by analyzing multiple images simultaneously. They would also offer an opportunity to speed up the analysis of a single image. However, exploiting the computational power of multi-core architectures and PC clusters requires modifications to existing, sequential image analysis codes and cautious evaluation of alternative and novel algorithms with respect to their potential for parallelism. This tutorial will provide an overview of the application domain and present an overview of the challenges. Specifically, opportunities for novel image analysis and pattern recognition algorithms that can leverage frameworks for shared and distributed parallel computing will be discussed along with examples from ongoing research in the labs of the instructors. Topics to be covered will include: 1) Overview of digital pathology 2) Applications and Challenges (Immunohistochemistry, H&E analysis, FISH, Alternate Image Modalities - Spectral Imaging, Histology, Cytology) 3) Architectural Developments (Multi-core, Networking, GPU processing, Storage) 4) Image Analysis Pipelines and Algorithms (Image Segmentation, Nuclei Detection, Morphometric Features, Karyometric Features, ...) 5) Performance implications (data management, exploiting multi-core processors, exploiting PC cluster) 6) Emerging trends and applications.", "fno": "04760936", "keywords": [ "Biology Computing", "Cancer", "Cellular Biophysics", "Medical Image Processing", "Parallel Processing", "Tissue Engineering", "Image Computing", "Digital Pathology", "Tissue Analysis", "Cellular Analysis", "Cancer Expression", "Genetic Profiles", "Cellular Morphology", "Disease Progression", "Cell Smear", "Cancer Tissue", "Statistical Analysis", "Digitizing System", "Automated Tissue Scoring", "Automated Histology", "Cytology Analysis", "Sequential Image Analysis Codes", "Pattern Recognition Algorithm", "Distributed Parallel Computing", "Pathology", "Image Analysis", "Cancer", "Parallel Processing", "Microscopy", "Morphology", "Diseases", "Concurrent Computing", "Clustering Algorithms", "Image Storage" ], "authors": [ { "affiliation": "University of Houston, USA", "fullName": "Shishir Shah", "givenName": "Shishir", "surname": "Shah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Edgar Gabriel", "givenName": "Edgar", "surname": "Gabriel", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2008-12-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": "1051-4651", "isbn": "978-1-4244-2174-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04760935", "articleId": "12OmNxuo0gy", "__typename": "AdjacentArticleType" }, "next": { "fno": "04760937", "articleId": "12OmNwnH4UD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sbec/2016/2132/0/07458983", "title": "DRAQ5 and Eosin as a Topical Fluorescent Analogue for H&E in Digital Pathology", "doi": null, "abstractUrl": "/proceedings-article/sbec/2016/07458983/12OmNARAnbY", "parentPublication": { "id": "proceedings/sbec/2016/2132/0", "title": "2016 32nd Southern Biomedical Engineering Conference (SBEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2016/3906/0/3906a099", "title": "Automated Quantitative Image Analysis of Hematoxylin-Eosin Staining Slides in Lymphoma Based on Hierarchical Kmeans Clustering", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a099/12OmNBKEysY", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209d269", "title": "The Contribution of Morphological Features in the Classification of Prostate Carcinoma in Digital Pathology Images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209d269/12OmNBp52tW", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hisb/2011/4407/0/4407a174", "title": "Acceleration of Two Point Correlation Function Calculation for Pathology Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/hisb/2011/4407a174/12OmNBubOUo", "parentPublication": { "id": "proceedings/hisb/2011/4407/0", "title": "Healthcare Informatics, Imaging and Systems Biology, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2010/5672/0/05452440", "title": "A Dynamic Parallel Approach to Recognize Tubular Breast Cancer for TMA Image Building", "doi": null, "abstractUrl": "/proceedings-article/pdp/2010/05452440/12OmNCeaPSM", "parentPublication": { "id": "proceedings/pdp/2010/5672/0", "title": "18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccicc/2016/3846/0/07862091", "title": "Segmentation of nuclei in digital pathology images", "doi": null, "abstractUrl": "/proceedings-article/iccicc/2016/07862091/12OmNvDZEUB", "parentPublication": { "id": "proceedings/iccicc/2016/3846/0", "title": "2016 IEEE 15th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061386", "title": "Interactive Histology of Large-Scale Biomedical Image Stacks", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061386/13rRUyoPSP1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0/661400b578", "title": "Automated Counting of Cells in Breast Cytology Images Using Level Set Method", "doi": null, "abstractUrl": "/proceedings-article/hpcc-smartcity-dss/2018/661400b578/183rAfb8rTO", "parentPublication": { "id": "proceedings/hpcc-smartcity-dss/2018/6614/0", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2022/9774/0/977400a159", "title": "Understanding the impact of image and input resolution on deep digital pathology patch classifiers", "doi": null, "abstractUrl": "/proceedings-article/crv/2022/977400a159/1GeCxPe6DII", "parentPublication": { "id": "proceedings/crv/2022/9774/0", "title": "2022 19th Conference on Robots and Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557792", "title": "Scope2Screen: Focus+Context Techniques for Pathology Tumor Assessment in Multivariate Image Data", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557792/1xquHxMLASQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx6g6nT", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNrNh0v7", "doi": "10.1109/BIBM.2017.8217719", "title": "Deep learning assessment of tumor proliferation in breast cancer histological images", "normalizedTitle": "Deep learning assessment of tumor proliferation in breast cancer histological images", "abstract": "Current analysis of tumor proliferation, the most salient breast cancer prognostic biomarker, is limited to subjective mitosis counting by pathologists in localized regions of tissue images. This study presents the first data-driven integrative approach to characterize the severity of tumor growth and spread on a categorical and molecular level, utilizing multiple biologically salient deep learning classifiers to develop a comprehensive prognostic model. Our approach achieves pathologist-level performance on three-class categorical tumor severity prediction. It additionally pioneers prediction of molecular expression data from a tissue image, obtaining a Spearman's rank correlation coefficient of 0.60 with ex vivo mean calculated RNA expression. Furthermore, our framework is applied to identify over two hundred unprecedented biomarkers critical to the accurate assessment of tumor proliferation, validating our proposed integrative pipeline as the first to holistically and objectively analyze histopathological images.", "abstracts": [ { "abstractType": "Regular", "content": "Current analysis of tumor proliferation, the most salient breast cancer prognostic biomarker, is limited to subjective mitosis counting by pathologists in localized regions of tissue images. This study presents the first data-driven integrative approach to characterize the severity of tumor growth and spread on a categorical and molecular level, utilizing multiple biologically salient deep learning classifiers to develop a comprehensive prognostic model. Our approach achieves pathologist-level performance on three-class categorical tumor severity prediction. It additionally pioneers prediction of molecular expression data from a tissue image, obtaining a Spearman's rank correlation coefficient of 0.60 with ex vivo mean calculated RNA expression. Furthermore, our framework is applied to identify over two hundred unprecedented biomarkers critical to the accurate assessment of tumor proliferation, validating our proposed integrative pipeline as the first to holistically and objectively analyze histopathological images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current analysis of tumor proliferation, the most salient breast cancer prognostic biomarker, is limited to subjective mitosis counting by pathologists in localized regions of tissue images. This study presents the first data-driven integrative approach to characterize the severity of tumor growth and spread on a categorical and molecular level, utilizing multiple biologically salient deep learning classifiers to develop a comprehensive prognostic model. Our approach achieves pathologist-level performance on three-class categorical tumor severity prediction. It additionally pioneers prediction of molecular expression data from a tissue image, obtaining a Spearman's rank correlation coefficient of 0.60 with ex vivo mean calculated RNA expression. Furthermore, our framework is applied to identify over two hundred unprecedented biomarkers critical to the accurate assessment of tumor proliferation, validating our proposed integrative pipeline as the first to holistically and objectively analyze histopathological images.", "fno": "08217719", "keywords": [ "Tumors", "Feature Extraction", "Breast Cancer", "Biomedical Imaging", "RNA", "Heating Systems" ], "authors": [ { "affiliation": "Department of Computer Science, Stanford University, Stanford, USA", "fullName": "Manan Shah", "givenName": "Manan", "surname": "Shah", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Pathology, Beth Israel Deaconess Medical Center, Boston, USA", "fullName": "Dayong Wang", "givenName": "Dayong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Pathology, Beth Israel Deaconess Medical Center, Boston, USA", "fullName": "Christopher Rubadue", "givenName": "Christopher", "surname": "Rubadue", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Pathology, Beth Israel Deaconess Medical Center, Boston, USA", "fullName": "David Suster", "givenName": "David", "surname": "Suster", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Pathology, Beth Israel Deaconess Medical Center, Boston, USA", "fullName": "Andrew Beck", "givenName": "Andrew", "surname": "Beck", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "600-603", "year": "2017", "issn": null, "isbn": "978-1-5090-3050-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08217718", "articleId": "12OmNyTfg7B", "__typename": "AdjacentArticleType" }, "next": { "fno": "08217720", "articleId": "12OmNxcMShw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2017/4881/0/4881a484", "title": "On Consolidated Predictive Model of the Natural History of Breast Cancer Considering Primary Tumor and Primary Distant Metastases Growth", "doi": null, "abstractUrl": "/proceedings-article/ichi/2017/4881a484/12OmNANkons", "parentPublication": { "id": "proceedings/ichi/2017/4881/0", "title": "2017 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223365", "title": "Registration and projection method of tumor region projection for breast cancer surgery", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223365/12OmNrAMEV7", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciibms/2017/6664/0/08279720", "title": "Modern microwave thermometry for breast cancer", "doi": null, "abstractUrl": "/proceedings-article/iciibms/2017/08279720/12OmNs59JQR", "parentPublication": { "id": "proceedings/iciibms/2017/6664/0", "title": "2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2014/7502/0/7502a115", "title": "Toward Genomic Based Personalized Mathematical Models for Breast Cancer Tumor Growth", "doi": null, "abstractUrl": "/proceedings-article/bibe/2014/7502a115/12OmNyO8tLO", "parentPublication": { "id": "proceedings/bibe/2014/7502/0", "title": "2014 IEEE International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2013/5118/0/5118a116", "title": "Shearlet-Based Ultrasound Texture Features for Classification of Breast Tumor", "doi": null, "abstractUrl": "/proceedings-article/icicse/2013/5118a116/12OmNzE54C4", "parentPublication": { "id": "proceedings/icicse/2013/5118/0", "title": "2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a051", "title": "Breast Cancer Detection and Classification Using Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a051/17PYEl27FS1", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669151", "title": "LncRNA PNKY is upregulated in breast cancer and promotes cell proliferation and EMT in breast cancer cells", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669151/1A9WhZQwxna", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2022/1008/0/10017667", "title": "Histological breast cancer classification using CNN and MLP based ensembles", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2022/10017667/1KJxvhKWHSg", "parentPublication": { "id": "proceedings/aiccsa/2022/1008/0", "title": "2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2019/5584/0/558400b482", "title": "An Integrating Analysis Reveals Key Regulatory Networks in Breast Cancer", "doi": null, "abstractUrl": "/proceedings-article/csci/2019/558400b482/1jdE165fhTi", "parentPublication": { "id": "proceedings/csci/2019/5584/0", "title": "2019 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/05/08691553", "title": "A Network-Based Comparison Between Molecular Apocrine Breast Cancer Tumor and Basal and Luminal Tumors by Joint Graphical Lasso", "doi": null, "abstractUrl": "/journal/tb/2020/05/08691553/1kepHe2WqZ2", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrNh0vw", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvmowMP", "doi": "10.1109/ICPR.2014.358", "title": "Masking Light Fields to Remove Partial Occlusion", "normalizedTitle": "Masking Light Fields to Remove Partial Occlusion", "abstract": "We address partial occlusion due to objects close to a micro lens-based light field camera. Partial occlusion degrades the quality of the image, and may obscure important details of the background scene. In order to remove the effects of partial occlusion post-capture, previous methods with traditional cameras have required the photographer to capture multiple, precisely registered, images under different settings. The use of a light field camera eliminates this requirement, as the camera simultaneously captures multiple views of the scene, making it possible to remove partial occlusion from a single image captured by a hand-held camera. Relative to past approaches for light field completion, we show significantly better performance for the small viewpoint changes inherent to a handheld light field camera, and avoid the need for time-domain data for occlusion estimation.", "abstracts": [ { "abstractType": "Regular", "content": "We address partial occlusion due to objects close to a micro lens-based light field camera. Partial occlusion degrades the quality of the image, and may obscure important details of the background scene. In order to remove the effects of partial occlusion post-capture, previous methods with traditional cameras have required the photographer to capture multiple, precisely registered, images under different settings. The use of a light field camera eliminates this requirement, as the camera simultaneously captures multiple views of the scene, making it possible to remove partial occlusion from a single image captured by a hand-held camera. Relative to past approaches for light field completion, we show significantly better performance for the small viewpoint changes inherent to a handheld light field camera, and avoid the need for time-domain data for occlusion estimation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We address partial occlusion due to objects close to a micro lens-based light field camera. Partial occlusion degrades the quality of the image, and may obscure important details of the background scene. In order to remove the effects of partial occlusion post-capture, previous methods with traditional cameras have required the photographer to capture multiple, precisely registered, images under different settings. The use of a light field camera eliminates this requirement, as the camera simultaneously captures multiple views of the scene, making it possible to remove partial occlusion from a single image captured by a hand-held camera. Relative to past approaches for light field completion, we show significantly better performance for the small viewpoint changes inherent to a handheld light field camera, and avoid the need for time-domain data for occlusion estimation.", "fno": "5209c053", "keywords": [ "Cameras", "Lenses", "Microoptics", "Apertures", "Rendering Computer Graphics", "Attenuation", "Gratings" ], "authors": [ { "affiliation": null, "fullName": "Scott McCloskey", "givenName": "Scott", "surname": "McCloskey", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "2053-2058", "year": "2014", "issn": "1051-4651", "isbn": "978-1-4799-5209-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5209c047", "articleId": "12OmNqNXEsZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "5209c059", "articleId": "12OmNB9t6kU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccp/2009/4534/0/05559010", "title": "Light field superresolution", "doi": null, "abstractUrl": "/proceedings-article/iccp/2009/05559010/12OmNBiygwn", "parentPublication": { "id": "proceedings/iccp/2009/4534/0", "title": "IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2015/8332/0/8332a001", "title": "Depth Fields: Extending Light Field Techniques to Time-of-Flight Imaging", "doi": null, "abstractUrl": "/proceedings-article/3dv/2015/8332a001/12OmNC943Ci", "parentPublication": { "id": "proceedings/3dv/2015/8332/0", "title": "2015 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a208", "title": "Bilayer Blind Deconvolution with the Light Field Camera", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a208/12OmNCbU2Zk", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2013/3022/0/3022a037", "title": "External Mask Based Depth and Light Field Camera", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2013/3022a037/12OmNCctfnA", "parentPublication": { "id": "proceedings/iccvw/2013/3022/0", "title": "2013 IEEE International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2014/5188/0/06831813", "title": "A switchable light field camera architecture with Angle Sensitive Pixels and dictionary-based sparse coding", "doi": null, "abstractUrl": "/proceedings-article/iccp/2014/06831813/12OmNCw3zaQ", "parentPublication": { "id": "proceedings/iccp/2014/5188/0", "title": "2014 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2017/2937/0/2937a014", "title": "Occlusion Robust Light Field Depth Estimation Using Segmentation Guided Bilateral Filtering", "doi": null, "abstractUrl": "/proceedings-article/ism/2017/2937a014/12OmNqGA5iK", "parentPublication": { "id": "proceedings/ism/2017/2937/0", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460391", "title": "Direct imaging with printed microlens arrays", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460391/12OmNs0TL48", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2017/0560/0/08026253", "title": "Multi-occlusion handling in depth estimation of light fields", "doi": null, "abstractUrl": "/proceedings-article/icmew/2017/08026253/12OmNx6xHnB", "parentPublication": { "id": "proceedings/icmew/2017/0560/0", "title": "2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/11/08007218", "title": "Occlusion Leak Compensation for Optical See-Through Displays Using a Single-Layer Transmissive Spatial Light Modulator", "doi": null, "abstractUrl": "/journal/tg/2017/11/08007218/13rRUxcbnHi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486458", "title": "Panoramic Light Field Video Acquisition", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486458/14jQfSC65rP", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwWorE", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwWozJ", "doi": "10.1109/ICCVW.2009.5457520", "title": "Single image focus editing", "normalizedTitle": "Single image focus editing", "abstract": "In this paper, we present a postprocessing approach to tackle the single image focus editing problem. In detail, the proposed method can accomplish the tasks of focus map estimation, image refocusing and defocusing. Given an image with a mixture of focused and defocused objects, we first detect the edges and then estimate the focus map based on the edge blurriness which is depicted explicitly with a well-parameterized model. The image refocusing problem is addressed in an elaborate blind deconvolution framework, where the image prior is modeled well by using both global and local constraints. Especially, we correct the defocused blurry edges to sharp ones with the aid of the parametric edge model and then render this cue as a novel local prior to ensure the sharpness of the refocused image. Experimental results demonstrate that the proposed approach performs well in producing different styles of realistic images from a single input by focus editing.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a postprocessing approach to tackle the single image focus editing problem. In detail, the proposed method can accomplish the tasks of focus map estimation, image refocusing and defocusing. Given an image with a mixture of focused and defocused objects, we first detect the edges and then estimate the focus map based on the edge blurriness which is depicted explicitly with a well-parameterized model. The image refocusing problem is addressed in an elaborate blind deconvolution framework, where the image prior is modeled well by using both global and local constraints. Especially, we correct the defocused blurry edges to sharp ones with the aid of the parametric edge model and then render this cue as a novel local prior to ensure the sharpness of the refocused image. Experimental results demonstrate that the proposed approach performs well in producing different styles of realistic images from a single input by focus editing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a postprocessing approach to tackle the single image focus editing problem. In detail, the proposed method can accomplish the tasks of focus map estimation, image refocusing and defocusing. Given an image with a mixture of focused and defocused objects, we first detect the edges and then estimate the focus map based on the edge blurriness which is depicted explicitly with a well-parameterized model. The image refocusing problem is addressed in an elaborate blind deconvolution framework, where the image prior is modeled well by using both global and local constraints. Especially, we correct the defocused blurry edges to sharp ones with the aid of the parametric edge model and then render this cue as a novel local prior to ensure the sharpness of the refocused image. Experimental results demonstrate that the proposed approach performs well in producing different styles of realistic images from a single input by focus editing.", "fno": "05457520", "keywords": [ "Deconvolution", "Image Restoration", "Postprocessing Approach", "Single Image Focus Editing Problem", "Image Refocusing", "Image Defocusing", "Focus Map Estimation", "Edge Blurriness", "Elaborate Blind Deconvolution", "Focusing", "Image Edge Detection", "Lenses", "Pixel", "Object Detection", "Deconvolution", "Cameras", "Conferences", "Rendering Computer Graphics", "Apertures" ], "authors": [ { "affiliation": "Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong", "fullName": "Wei Zhang", "givenName": null, "surname": "Wei Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong", "fullName": "Wai-Kuen Cham", "givenName": "Wai-Kuen", "surname": "Cham", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "1947-1954", "year": "2009", "issn": null, "isbn": "978-1-4244-4442-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05457519", "articleId": "12OmNBDgZ0f", "__typename": "AdjacentArticleType" }, "next": { "fno": "05457521", "articleId": "12OmNxRnvRj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dv/2016/5407/0/5407a592", "title": "Discriminative Filters for Depth from Defocus", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a592/12OmNCmpcHL", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2009/4534/0/05559008", "title": "The focused plenoptic camera", "doi": null, "abstractUrl": "/proceedings-article/iccp/2009/05559008/12OmNqI04FS", "parentPublication": { "id": "proceedings/iccp/2009/4534/0", "title": "IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1988/0862/0/00196282", "title": "Pyramid based depth from focus", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1988/00196282/12OmNvjgWCa", "parentPublication": { "id": "proceedings/cvpr/1988/0862/0", "title": "Proceedings CVPR '88: The Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206618", "title": "Planar orientation from blur gradients in a single image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206618/12OmNwDSdie", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2013/6463/0/06528302", "title": "Focal sweep videography with deformable optics", "doi": null, "abstractUrl": "/proceedings-article/iccp/2013/06528302/12OmNxUMHo6", "parentPublication": { "id": "proceedings/iccp/2013/6463/0", "title": "2013 IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2016/5407/0/5407a370", "title": "Video Depth-from-Defocus", "doi": null, "abstractUrl": "/proceedings-article/3dv/2016/5407a370/12OmNy5hRoj", "parentPublication": { "id": "proceedings/3dv/2016/5407/0", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccp/2009/4534/0/05559018", "title": "What are good apertures for defocus deblurring?", "doi": null, "abstractUrl": "/proceedings-article/iccp/2009/05559018/12OmNzWx050", "parentPublication": { "id": "proceedings/iccp/2009/4534/0", "title": "IEEE International Conference on Computational Photography (ICCP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a250", "title": "Focal Stack Representation and Focus Manipulation", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a250/17D45Xi9rWm", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsmt/2021/2063/0/206300a305", "title": "An algorithm for judging the depth of image defocusing used for automatic focusing", "doi": null, "abstractUrl": "/proceedings-article/iccsmt/2021/206300a305/1E2waPL7zj2", "parentPublication": { "id": "proceedings/iccsmt/2021/2063/0", "title": "2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9698", "title": "SpaceEdit: Learning a Unified Editing Space for Open-Domain Image Color Editing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9698/1H0NEEhuv7O", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3neuoHr8Y", "doi": "10.1109/CVPR42600.2020.00521", "title": "Single Image Reflection Removal With Physically-Based Training Images", "normalizedTitle": "Single Image Reflection Removal With Physically-Based Training Images", "abstract": "Recently, deep learning-based single image reflection separation methods have been exploited widely. To benefit the learning approach, a large number of training image pairs (i.e., with and without reflections) were synthesized in various ways, yet they are away from a physically-based direction. In this paper, physically based rendering is used for faithfully synthesizing the required training images, and a corresponding network structure and loss term are proposed. We utilize existing RGBD/RGB images to estimate meshes, then physically simulate the light transportation between meshes, glass, and lens with path tracing to synthesize training data, which successfully reproduce the spatially variant anisotropic visual effect of glass reflection. For guiding the separation better, we additionally consider a module, backtrack network (BT-net) for backtracking the reflections, which removes complicated ghosting, attenuation, blurred and defocused effect of glass/lens. This enables obtaining a priori information before having the distortion. The proposed method considering additional a priori information with physically simulated training data is validated with various real reflection images and shows visually pleasant and numerical advantages compared with state-of-the-art techniques.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, deep learning-based single image reflection separation methods have been exploited widely. To benefit the learning approach, a large number of training image pairs (i.e., with and without reflections) were synthesized in various ways, yet they are away from a physically-based direction. In this paper, physically based rendering is used for faithfully synthesizing the required training images, and a corresponding network structure and loss term are proposed. We utilize existing RGBD/RGB images to estimate meshes, then physically simulate the light transportation between meshes, glass, and lens with path tracing to synthesize training data, which successfully reproduce the spatially variant anisotropic visual effect of glass reflection. For guiding the separation better, we additionally consider a module, backtrack network (BT-net) for backtracking the reflections, which removes complicated ghosting, attenuation, blurred and defocused effect of glass/lens. This enables obtaining a priori information before having the distortion. The proposed method considering additional a priori information with physically simulated training data is validated with various real reflection images and shows visually pleasant and numerical advantages compared with state-of-the-art techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, deep learning-based single image reflection separation methods have been exploited widely. To benefit the learning approach, a large number of training image pairs (i.e., with and without reflections) were synthesized in various ways, yet they are away from a physically-based direction. In this paper, physically based rendering is used for faithfully synthesizing the required training images, and a corresponding network structure and loss term are proposed. We utilize existing RGBD/RGB images to estimate meshes, then physically simulate the light transportation between meshes, glass, and lens with path tracing to synthesize training data, which successfully reproduce the spatially variant anisotropic visual effect of glass reflection. For guiding the separation better, we additionally consider a module, backtrack network (BT-net) for backtracking the reflections, which removes complicated ghosting, attenuation, blurred and defocused effect of glass/lens. This enables obtaining a priori information before having the distortion. The proposed method considering additional a priori information with physically simulated training data is validated with various real reflection images and shows visually pleasant and numerical advantages compared with state-of-the-art techniques.", "fno": "716800f163", "keywords": [ "Image Colour Analysis", "Image Enhancement", "Image Restoration", "Learning Artificial Intelligence", "Lenses", "Rendering Computer Graphics", "Single Image Reflection Removal", "Physically Based Training Images", "Single Image Reflection Separation Methods", "Image Pairs", "Physically Based Rendering", "Required Training Images", "Spatially Variant Anisotropic Visual Effect", "Glass Reflection", "Physically Simulated Training Data", "Deep Learning", "RGBD RGB Images", "Backtrack Network", "BT Net", "Light Transportation", "Training", "Glass", "Rendering Computer Graphics", "Lenses", "Visual Effects", "Three Dimensional Displays", "Attenuation" ], "authors": [ { "affiliation": "Korea Advanced Institute of Science and Technology (KAIST)", "fullName": "Soomin Kim", "givenName": "Soomin", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Korea Advanced Institute of Science and Technology (KAIST)", "fullName": "Yuchi Huo", "givenName": "Yuchi", "surname": "Huo", "__typename": "ArticleAuthorType" }, { "affiliation": "Korea Advanced Institute of Science and Technology (KAIST)", "fullName": "Sung-Eui Yoon", "givenName": "Sung-Eui", "surname": "Yoon", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "5163-5172", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800f153", "articleId": "1m3nE7TQglW", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800f173", "articleId": "1m3nEX4Ksj6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2015/6964/0/07298939", "title": "Reflection removal using ghosting cues", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298939/12OmNxRF6XF", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2012/1226/0/002P1A02", "title": "A physically-based approach to reflection separation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2012/002P1A02/12OmNym2c5W", "parentPublication": { "id": "proceedings/cvpr/2012/1226/0", "title": "2012 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032d942", "title": "Benchmarking Single-Image Reflection Removal Algorithms", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032d942/12OmNzE54Kv", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2014/02/ttp2014020209", "title": "A Physically-Based Approach to Reflection Separation: From Physical Modeling to Constrained Optimization", "doi": null, "abstractUrl": "/journal/tp/2014/02/ttp2014020209/13rRUx0xQ0H", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e777", "title": "CRRN: Multi-scale Guided Concurrent Reflection Removal Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e777/17D45WK5Anl", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09760117", "title": "Benchmarking Single-Image Reflection Removal Algorithms", "doi": null, "abstractUrl": "/journal/tp/2023/02/09760117/1CHszkYnfLq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300i170", "title": "Single Image Reflection Removal Exploiting Misaligned Training Data and Network Enhancements", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300i170/1gyrxzmzVqE", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102937", "title": "Near-Infrared Image Guided Reflection Removal", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102937/1kwqX7YbUEE", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800d562", "title": "Single Image Reflection Removal Through Cascaded Refinement", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800d562/1m3nZMsOIP6", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100b886", "title": "Distilling Reflection Dynamics for Single-Image Reflection Removal", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100b886/1yNhYeHIVRS", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yNhksNMpkQ", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yNhVjPgGWY", "doi": "10.1109/ICCVW54120.2021.00081", "title": "Robust Interactive Semantic Segmentation of Pathology Images with Minimal User Input", "normalizedTitle": "Robust Interactive Semantic Segmentation of Pathology Images with Minimal User Input", "abstract": "From the simple measurement of tissue attributes in pathology workflow to designing an explainable diagnostic/prognostic AI tool, access to accurate semantic segmentation of tissue regions in histology images is a prerequisite. However, delineating different tissue regions manually is a laborious, time-consuming and costly task that requires expert knowledge. On the other hand, the state-of-the-art automatic deep learning models for semantic segmentation require lots of annotated training data and there are only a limited number of tissue region annotated images publicly available. To obviate this issue in computational pathology projects and collect large-scale region annotations efficiently, we propose an efficient interactive segmentation network that requires minimum input from the user to accurately annotate different tissue types in the histology image. The user is only required to draw a simple squiggle inside each region of interest so it will be used as the guiding signal for the model. To deal with the complex appearance and amorph geometry of different tissue regions we introduce several automatic and minimalistic guiding signal generation techniques that help the model to become robust against the variation in the user input. By experimenting on a dataset of breast cancer images, we show that not only does our proposed method speed up the interactive annotation process, it can also outperform the existing automatic and interactive region segmentation models.", "abstracts": [ { "abstractType": "Regular", "content": "From the simple measurement of tissue attributes in pathology workflow to designing an explainable diagnostic/prognostic AI tool, access to accurate semantic segmentation of tissue regions in histology images is a prerequisite. However, delineating different tissue regions manually is a laborious, time-consuming and costly task that requires expert knowledge. On the other hand, the state-of-the-art automatic deep learning models for semantic segmentation require lots of annotated training data and there are only a limited number of tissue region annotated images publicly available. To obviate this issue in computational pathology projects and collect large-scale region annotations efficiently, we propose an efficient interactive segmentation network that requires minimum input from the user to accurately annotate different tissue types in the histology image. The user is only required to draw a simple squiggle inside each region of interest so it will be used as the guiding signal for the model. To deal with the complex appearance and amorph geometry of different tissue regions we introduce several automatic and minimalistic guiding signal generation techniques that help the model to become robust against the variation in the user input. By experimenting on a dataset of breast cancer images, we show that not only does our proposed method speed up the interactive annotation process, it can also outperform the existing automatic and interactive region segmentation models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "From the simple measurement of tissue attributes in pathology workflow to designing an explainable diagnostic/prognostic AI tool, access to accurate semantic segmentation of tissue regions in histology images is a prerequisite. However, delineating different tissue regions manually is a laborious, time-consuming and costly task that requires expert knowledge. On the other hand, the state-of-the-art automatic deep learning models for semantic segmentation require lots of annotated training data and there are only a limited number of tissue region annotated images publicly available. To obviate this issue in computational pathology projects and collect large-scale region annotations efficiently, we propose an efficient interactive segmentation network that requires minimum input from the user to accurately annotate different tissue types in the histology image. The user is only required to draw a simple squiggle inside each region of interest so it will be used as the guiding signal for the model. To deal with the complex appearance and amorph geometry of different tissue regions we introduce several automatic and minimalistic guiding signal generation techniques that help the model to become robust against the variation in the user input. By experimenting on a dataset of breast cancer images, we show that not only does our proposed method speed up the interactive annotation process, it can also outperform the existing automatic and interactive region segmentation models.", "fno": "019100a674", "keywords": [ "Biological Tissues", "Cancer", "Image Segmentation", "Learning Artificial Intelligence", "Medical Image Processing", "Computational Pathology Projects", "Large Scale Region Annotations", "Efficient Interactive Segmentation Network", "Minimum Input", "Different Tissue Types", "Histology Image", "Different Tissue Regions", "Automatic Guiding Signal Generation Techniques", "Minimalistic Guiding Signal Generation Techniques", "Breast Cancer Images", "Interactive Annotation Process", "Existing Automatic Region Segmentation Models", "Interactive Region Segmentation Models", "Robust Interactive Semantic Segmentation", "Pathology Images", "Minimal User", "Simple Measurement", "Tissue Attributes", "Pathology Workflow", "Accurate Semantic Segmentation", "Tissue Region", "Laborious Time Consuming", "State Of The Art Automatic Deep Learning Models", "Annotated Training Data", "Geometry", "Deep Learning", "Image Segmentation", "Histopathology", "Annotations", "Computational Modeling", "Semantics" ], "authors": [ { "affiliation": "University of Warwick,Tissue Image Analytics Centre,Department of Computer Science,UK", "fullName": "Mostafa Jahanifar", "givenName": "Mostafa", "surname": "Jahanifar", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Warwick,Tissue Image Analytics Centre,Department of Computer Science,UK", "fullName": "Neda Zamani Tajeddin", "givenName": "Neda Zamani", "surname": "Tajeddin", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Warwick,Tissue Image Analytics Centre,Department of Computer Science,UK", "fullName": "Navid Alemi Koohbanani", "givenName": "Navid Alemi", "surname": "Koohbanani", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Warwick,Tissue Image Analytics Centre,Department of Computer Science,UK", "fullName": "Nasir Rajpoot", "givenName": "Nasir", "surname": "Rajpoot", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "674-683", "year": "2021", "issn": null, "isbn": "978-1-6654-0191-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "019100a664", "articleId": "1yNi88NsQNy", "__typename": "AdjacentArticleType" }, "next": { "fno": "019100a684", "articleId": "1yNhOw0McOQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2008/2174/0/04760936", "title": "2. Image computing for digital pathology", "doi": null, "abstractUrl": "/proceedings-article/icpr/2008/04760936/12OmNqzcvDi", "parentPublication": { "id": "proceedings/icpr/2008/2174/0", "title": "ICPR 2008 19th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669344", "title": "W-Net: A Two-Stage Convolutional Network for Nucleus Detection in Histopathology Image", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669344/1A9VyUaFfH2", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b834", "title": "Multi stain graph fusion for multimodal integration in pathology", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b834/1G5695QFm4o", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2022/8487/0/848700a091", "title": "Deep Multi-Scale U-Net Architecture and Label-Noise Robust Training Strategies for Histopathological Image Segmentation", "doi": null, "abstractUrl": "/proceedings-article/bibe/2022/848700a091/1J6hDwJ7Syk", "parentPublication": { "id": "proceedings/bibe/2022/8487/0", "title": "2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300i525", "title": "Robust Histopathology Image Analysis: To Label or to Synthesize?", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300i525/1gyrTqTHZoA", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412824", "title": "Classifying Breast Histopathology Images with a Ductal Instance-Oriented Pipeline", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412824/1tmiLcliN0Y", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700d337", "title": "Deep Active Learning for Joint Classification & Segmentation with Weak Annotator", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700d337/1uqGvzdF8B2", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100a648", "title": "A QuadTree Image Representation for Computational Pathology", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100a648/1yNhN9rrQ76", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100a684", "title": "Lizard: A Large-Scale Dataset for Colonic Nuclear Instance Segmentation and Classification", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100a684/1yNhOw0McOQ", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a522", "title": "Synthesis and Segmentation Method of Cross-Staining Style Nuclei Pathology Image Based on Adversarial Learning", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a522/1zxL0vbtBoQ", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRdb", "title": "2014 5th International Conference on Computing for Geospatial Research and Application (COM.Geo)", "acronym": "comgeo", "groupId": "1802838", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzYeAQE", "doi": "10.1109/COM.Geo.2014.15", "title": "A Spatiotemporal Interpolation Method Using Radial Basis Functions for Geospatiotemporal Big Data", "normalizedTitle": "A Spatiotemporal Interpolation Method Using Radial Basis Functions for Geospatiotemporal Big Data", "abstract": "This research designs and implements the Radial Basis Function (RBF) spatiotemporal interpolation method to assess the trend of daily PM2.5 concentration for the contiguous United States over the year of 2009, at both the census block group level and county level. This research also compares the performance of the RBF spatiotemporal interpolation with the Inverse Distance Weighting (IDW) spatiotemporal interpolation. Traditionally, when handling spatiotemporal interpolation, researchers tend to treat space and time separately and reduce the spatiotemporal interpolation problems to a sequence of snapshots of spatial interpolations. In this paper, PM2.5 data interpolation is conducted in the continuous space-time domain by integrating space and time simultaneously under the assumption that spatial and temporal dimensions are equally important when interpolating a continuous changing phenomenon in the space-time domain. The RBF-based spatiotemporal interpolation methods are evaluated by leave-one-out cross validation. More importantly, this study explores computational issues (computer processing speed) faced during implementation of spatiotemporal interpolation for huge data sets. Parallel programming techniques and an advanced data structure named k-d tree are adapted in this paper to address the computational challenges.", "abstracts": [ { "abstractType": "Regular", "content": "This research designs and implements the Radial Basis Function (RBF) spatiotemporal interpolation method to assess the trend of daily PM2.5 concentration for the contiguous United States over the year of 2009, at both the census block group level and county level. This research also compares the performance of the RBF spatiotemporal interpolation with the Inverse Distance Weighting (IDW) spatiotemporal interpolation. Traditionally, when handling spatiotemporal interpolation, researchers tend to treat space and time separately and reduce the spatiotemporal interpolation problems to a sequence of snapshots of spatial interpolations. In this paper, PM2.5 data interpolation is conducted in the continuous space-time domain by integrating space and time simultaneously under the assumption that spatial and temporal dimensions are equally important when interpolating a continuous changing phenomenon in the space-time domain. The RBF-based spatiotemporal interpolation methods are evaluated by leave-one-out cross validation. More importantly, this study explores computational issues (computer processing speed) faced during implementation of spatiotemporal interpolation for huge data sets. Parallel programming techniques and an advanced data structure named k-d tree are adapted in this paper to address the computational challenges.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This research designs and implements the Radial Basis Function (RBF) spatiotemporal interpolation method to assess the trend of daily PM2.5 concentration for the contiguous United States over the year of 2009, at both the census block group level and county level. This research also compares the performance of the RBF spatiotemporal interpolation with the Inverse Distance Weighting (IDW) spatiotemporal interpolation. Traditionally, when handling spatiotemporal interpolation, researchers tend to treat space and time separately and reduce the spatiotemporal interpolation problems to a sequence of snapshots of spatial interpolations. In this paper, PM2.5 data interpolation is conducted in the continuous space-time domain by integrating space and time simultaneously under the assumption that spatial and temporal dimensions are equally important when interpolating a continuous changing phenomenon in the space-time domain. The RBF-based spatiotemporal interpolation methods are evaluated by leave-one-out cross validation. More importantly, this study explores computational issues (computer processing speed) faced during implementation of spatiotemporal interpolation for huge data sets. Parallel programming techniques and an advanced data structure named k-d tree are adapted in this paper to address the computational challenges.", "fno": "06910112", "keywords": [ "Interpolation", "Spatiotemporal Phenomena", "Polynomials", "Splines Mathematics", "Mathematical Model", "Market Research", "Fine Particulate Matter PM 2 5", "Geospatiotemporal Big Data", "Spatiotemporal Interpolation", "Radial Basis Functions", "Inverse Distance Weighting", "Parallel Programming", "K D Tree", "Leave One Out Cross Validation" ], "authors": [ { "affiliation": null, "fullName": "Travis Losser", "givenName": "Travis", "surname": "Losser", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lixin Li", "givenName": "Lixin", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Reinhard Piltner", "givenName": "Reinhard", "surname": "Piltner", "__typename": "ArticleAuthorType" } ], "idPrefix": "comgeo", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-08-01T00:00:00", "pubType": "proceedings", "pages": "17-24", "year": "2014", "issn": null, "isbn": "978-1-4799-4321-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06910111", "articleId": "12OmNB8TU5k", "__typename": "AdjacentArticleType" }, "next": { "fno": "06910113", "articleId": "12OmNz5JBNr", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acssc/1993/4120/0/00342544", "title": "A closer look at the radial basis function (RBF) networks", "doi": null, "abstractUrl": "/proceedings-article/acssc/1993/00342544/12OmNB06l3q", "parentPublication": { "id": "proceedings/acssc/1993/4120/0", "title": "Proceedings of 27th Asilomar Conference on Signals, Systems and Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2016/4273/0/07870891", "title": "Representation of continuously changing data over time and space: Modeling the shape of spatiotemporal phenomena", "doi": null, "abstractUrl": "/proceedings-article/e-science/2016/07870891/12OmNs0C9Qf", "parentPublication": { "id": "proceedings/e-science/2016/4273/0", "title": "2016 IEEE 12th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2009/3813/0/3813a001", "title": "Hermite Interpolation of Implicit Surfaces with Radial Basis Functions", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2009/3813a001/12OmNx6g6iX", "parentPublication": { "id": "proceedings/sibgrapi/2009/3813/0", "title": "2009 XXII Brazilian Symposium on Computer Graphics and Image Processing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460708", "title": "Feature-aligned 4D spatiotemporal image registration", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460708/12OmNzUPpFB", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2018/9385/0/938500a174", "title": "Application of Radial Basis Function Interpolation for Content Aware Image Retargeting", "doi": null, "abstractUrl": "/proceedings-article/sitis/2018/938500a174/19RStc7wSNq", "parentPublication": { "id": "proceedings/sitis/2018/9385/0", "title": "2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020965", "title": "Spatiotemporal Interpolation of Ungauged River Discharge via Deep Kernel Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020965/1KfSPME72wM", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2019/4896/0/489600a987", "title": "Discovering Spatial Weighted Frequent Itemsets in Spatiotemporal Databases", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2019/489600a987/1gAwXHWaoAU", "parentPublication": { "id": "proceedings/icdmw/2019/4896/0", "title": "2019 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2020/6034/0/603400a055", "title": "Spatiotemporal Deep Learning Model for Citywide Air Pollution Interpolation and Prediction", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2020/603400a055/1jdDAeLv8FW", "parentPublication": { "id": "proceedings/bigcomp/2020/6034/0", "title": "2020 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800e725", "title": "A Spatiotemporal Volumetric Interpolation Network for 4D Dynamic Medical Image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800e725/1m3o6jEDHEY", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmHTcxfM7S", "doi": "10.1109/ICCV48922.2021.00444", "title": "Event Stream Super-Resolution via Spatiotemporal Constraint Learning", "normalizedTitle": "Event Stream Super-Resolution via Spatiotemporal Constraint Learning", "abstract": "Event cameras are bio-inspired sensors that respond to brightness changes asynchronously and output in the form of event streams instead of frame-based images. They own outstanding advantages compared with traditional cameras: higher temporal resolution, higher dynamic range, and lower power consumption. However, the spatial resolution of existing event cameras is insufficient and challenging to be enhanced at the hardware level while maintaining the asynchronous philosophy of circuit design. Therefore, it is imperative to explore the algorithm of event stream super-resolution, which is a non-trivial task due to the sparsity and strong spatio-temporal correlation of the events from an event camera. In this paper, we propose an end-to-end framework based on spiking neural network for event stream super-resolution, which can generate high-resolution (HR) event stream from the input low-resolution (LR) event stream. A spatiotemporal constraint learning mechanism is proposed to learn the spatial and temporal distributions of the event stream simultaneously. We validate our method on four large-scale datasets and the results show that our method achieves state-of-the-art performance. The satisfying results on two downstream applications, i.e. object classification and image reconstruction, further demonstrate the usability of our method. To prove the application potential of our method, we deploy it on a mobile platform. The high-quality HR event stream generated by our real-time system demonstrates the effectiveness and efficiency of our method.", "abstracts": [ { "abstractType": "Regular", "content": "Event cameras are bio-inspired sensors that respond to brightness changes asynchronously and output in the form of event streams instead of frame-based images. They own outstanding advantages compared with traditional cameras: higher temporal resolution, higher dynamic range, and lower power consumption. However, the spatial resolution of existing event cameras is insufficient and challenging to be enhanced at the hardware level while maintaining the asynchronous philosophy of circuit design. Therefore, it is imperative to explore the algorithm of event stream super-resolution, which is a non-trivial task due to the sparsity and strong spatio-temporal correlation of the events from an event camera. In this paper, we propose an end-to-end framework based on spiking neural network for event stream super-resolution, which can generate high-resolution (HR) event stream from the input low-resolution (LR) event stream. A spatiotemporal constraint learning mechanism is proposed to learn the spatial and temporal distributions of the event stream simultaneously. We validate our method on four large-scale datasets and the results show that our method achieves state-of-the-art performance. The satisfying results on two downstream applications, i.e. object classification and image reconstruction, further demonstrate the usability of our method. To prove the application potential of our method, we deploy it on a mobile platform. The high-quality HR event stream generated by our real-time system demonstrates the effectiveness and efficiency of our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Event cameras are bio-inspired sensors that respond to brightness changes asynchronously and output in the form of event streams instead of frame-based images. They own outstanding advantages compared with traditional cameras: higher temporal resolution, higher dynamic range, and lower power consumption. However, the spatial resolution of existing event cameras is insufficient and challenging to be enhanced at the hardware level while maintaining the asynchronous philosophy of circuit design. Therefore, it is imperative to explore the algorithm of event stream super-resolution, which is a non-trivial task due to the sparsity and strong spatio-temporal correlation of the events from an event camera. In this paper, we propose an end-to-end framework based on spiking neural network for event stream super-resolution, which can generate high-resolution (HR) event stream from the input low-resolution (LR) event stream. A spatiotemporal constraint learning mechanism is proposed to learn the spatial and temporal distributions of the event stream simultaneously. We validate our method on four large-scale datasets and the results show that our method achieves state-of-the-art performance. The satisfying results on two downstream applications, i.e. object classification and image reconstruction, further demonstrate the usability of our method. To prove the application potential of our method, we deploy it on a mobile platform. The high-quality HR event stream generated by our real-time system demonstrates the effectiveness and efficiency of our method.", "fno": "281200e460", "keywords": [ "Learning Systems", "Superresolution", "Neural Networks", "Streaming Media", "Cameras", "Real Time Systems", "Spatiotemporal Phenomena" ], "authors": [ { "affiliation": "Tsinghua University,BNRist, THUICBS, KLISS, School of Software,China", "fullName": "Siqi Li", "givenName": "Siqi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,BNRist, THUICBS, KLISS, School of Software,China", "fullName": "Yutong Feng", "givenName": "Yutong", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,Department of Automation,China", "fullName": "Yipeng Li", "givenName": "Yipeng", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Jilin University,College of Computer Science and Technology,China", "fullName": "Yu Jiang", "givenName": "Yu", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Huawei Technologies Canada Co., Ltd", "fullName": "Changqing Zou", "givenName": "Changqing", "surname": "Zou", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,BNRist, THUICBS, KLISS, School of Software,China", "fullName": "Yue Gao", "givenName": "Yue", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "4460-4469", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200e449", "articleId": "1BmH5akSNOg", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200e470", "articleId": "1BmFlZOO50Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2018/4886/0/488601b607", "title": "Fully-Coupled Two-Stream Spatiotemporal Networks for Extremely Low Resolution Action Recognition", "doi": null, "abstractUrl": "/proceedings-article/wacv/2018/488601b607/12OmNqJ8tu6", "parentPublication": { "id": "proceedings/wacv/2018/4886/0", "title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e862", "title": "EvIntSR-Net: Event Guided Multiple Latent Frames Reconstruction and Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e862/1BmG5NkgY0M", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b278", "title": "Adaptive Feature Consolidation Network for Burst Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b278/1G572ttqhuo", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i312", "title": "EventSR: From Asynchronous Events to Image Reconstruction, Restoration, and Super-Resolution via End-to-End Adversarial Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i312/1m3nlKznkWI", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428360", "title": "Face Super-Resolution Through Dual-Identity Constraint", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428360/1uim2oNv2Xm", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c683", "title": "Dual-Stream Fusion Network for Spatiotemporal Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c683/1uqGlWkmblK", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/11/09541012", "title": "Joint Framework for Single Image Reconstruction and Super-Resolution With an Event Camera", "doi": null, "abstractUrl": "/journal/tp/2022/11/09541012/1x3fNobsyZy", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a453", "title": "KernelNet: A Blind Super-Resolution Kernel Estimation Network", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a453/1yVzRwbSFYk", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h768", "title": "Turning Frequency to Resolution: Video Super-resolution via Event Cameras", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h768/1yeJ8QBIGCQ", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmNYf11MeQ", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "acronym": "cisai", "groupId": "1845584", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmOrPEdpO8", "doi": "10.1109/CISAI54367.2021.00142", "title": "Video Super Resolution Based on Motion Compensation", "normalizedTitle": "Video Super Resolution Based on Motion Compensation", "abstract": "An image super-resolution method and device provided by acquiring the captured video of the power equipment. The method according to the time sequence of the image frames in the video of the power equipment, extracts the appearance image of the power equipment, selects the reference image, obtains the target image, and obtains the motion vector of any pixel moving from the position coordinates in the target image to the position coordinates in the reference image. The reference images are input into the spatiotemporal sub-pixel convolution network, and then the two-dimensional super-resolution image is output, which improves the image clarity, and can image the moving power equipment with high resolution. In this paper We use time fusion strategy in the model of video SR. Our model constructs a motion compensation mechanism based on spatial transformation network. This mechanism can be trained jointly for video SR. The results obtained by our method are proved to be superior in peak signal to noise ratio (PSNR).", "abstracts": [ { "abstractType": "Regular", "content": "An image super-resolution method and device provided by acquiring the captured video of the power equipment. The method according to the time sequence of the image frames in the video of the power equipment, extracts the appearance image of the power equipment, selects the reference image, obtains the target image, and obtains the motion vector of any pixel moving from the position coordinates in the target image to the position coordinates in the reference image. The reference images are input into the spatiotemporal sub-pixel convolution network, and then the two-dimensional super-resolution image is output, which improves the image clarity, and can image the moving power equipment with high resolution. In this paper We use time fusion strategy in the model of video SR. Our model constructs a motion compensation mechanism based on spatial transformation network. This mechanism can be trained jointly for video SR. The results obtained by our method are proved to be superior in peak signal to noise ratio (PSNR).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An image super-resolution method and device provided by acquiring the captured video of the power equipment. The method according to the time sequence of the image frames in the video of the power equipment, extracts the appearance image of the power equipment, selects the reference image, obtains the target image, and obtains the motion vector of any pixel moving from the position coordinates in the target image to the position coordinates in the reference image. The reference images are input into the spatiotemporal sub-pixel convolution network, and then the two-dimensional super-resolution image is output, which improves the image clarity, and can image the moving power equipment with high resolution. In this paper We use time fusion strategy in the model of video SR. Our model constructs a motion compensation mechanism based on spatial transformation network. This mechanism can be trained jointly for video SR. The results obtained by our method are proved to be superior in peak signal to noise ratio (PSNR).", "fno": "069200a704", "keywords": [ "Image Resolution", "Motion Compensation", "Video Signal Processing", "Reference Image", "Target Image", "Spatiotemporal Sub Pixel Convolution Network", "Two Dimensional Super Resolution Image", "Image Clarity", "Moving Power Equipment", "Video SR", "Motion Compensation Mechanism", "Video Super Resolution", "Image Super Resolution Method", "Captured Video", "Image Frames", "Appearance Image", "Information Science", "PSNR", "Convolution", "Computational Modeling", "Superresolution", "Motion Compensation", "Spatiotemporal Phenomena", "Super Resolution", "Video Procession", "Motion Compensation" ], "authors": [ { "affiliation": "Yunnan Power Grid Materials Company Research Professorship Kunming,China", "fullName": "Jiyuan Chen", "givenName": "Jiyuan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Yunnan Power Grid Materials Company Research Professorship Kunming,China", "fullName": "Suping Guo", "givenName": "Suping", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Yunnan Power Grid Materials Company Research Professorship Kunming,China", "fullName": "Jun Deng", "givenName": "Jun", "surname": "Deng", "__typename": "ArticleAuthorType" }, { "affiliation": "Yunnan Power Grid Materials Company Research Professorship Kunming,China", "fullName": "Maolin Yang", "givenName": "Maolin", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Instrument Science and Engineering Harbin Institute of Technology Harbin,China", "fullName": "Feng Shen", "givenName": "Feng", "surname": "Shen", "__typename": "ArticleAuthorType" } ], "idPrefix": "cisai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "704-707", "year": "2021", "issn": null, "isbn": "978-1-6654-0692-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "069200a698", "articleId": "1BmOs7it4eQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "069200a708", "articleId": "1BmO0rQxgJ2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032e482", "title": "Detail-Revealing Deep Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032e482/12OmNyrIaze", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2018/4195/0/08551569", "title": "Video Super Resolution Based on Deep Convolution Neural Network With Two-Stage Motion Compensation", "doi": null, "abstractUrl": "/proceedings-article/icmew/2018/08551569/17D45W2WyyW", "parentPublication": { "id": "proceedings/icmew/2018/4195/0", "title": "2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e409", "title": "Omniscient Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e409/1BmFSVvNUo8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e791", "title": "Deep Blind Video Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e791/1BmJBhycJ7W", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600f962", "title": "BasicVSR++: Improving Video Super-Resolution with Enhanced Propagation and Alignment", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600f962/1H1kq191zva", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2022/6495/0/649500a218", "title": "Per-Channel Image Super Resolution", "doi": null, "abstractUrl": "/proceedings-article/sitis/2022/649500a218/1MeoJvVmo5G", "parentPublication": { "id": "proceedings/sitis/2022/6495/0", "title": "2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2021/4989/0/09455969", "title": "Ddan: A Deep Dual Attention Network For Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/icmew/2021/09455969/1uCgoMZKLg4", "parentPublication": { "id": "proceedings/icmew/2021/4989/0", "title": "2021 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c092", "title": "DynaVSR: Dynamic Adaptive Blind Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c092/1uqGF4TkFIA", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100d470", "title": "Temporal Kernel Consistency for Blind Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100d470/1yNi0xnqAko", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a166", "title": "NTIRE 2021 Challenge on Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a166/1yVzQIAkTDi", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H1kq191zva", "doi": "10.1109/CVPR52688.2022.00588", "title": "BasicVSR++: Improving Video Super-Resolution with Enhanced Propagation and Alignment", "normalizedTitle": "BasicVSR++: Improving Video Super-Resolution with Enhanced Propagation and Alignment", "abstract": "A recurrent structure is a popular framework choice for the task of video super-resolution. The state-of-the-art method BasicVSR adopts bidirectional propagation with feature alignment to effectively exploit information from the entire input video. In this study, we redesign BasicVsr by proposing second-order grid propagation and flow-guided deformable alignment. We show that by empowering the re-current framework with enhanced propagation and align-ment, one can exploit spatiotemporal information across misaligned video frames more effectively. The new components lead to an improved performance under a simi-lar computational constraint. In particular, our model Ba-sicVSR++ surpasses BasicVSR by a significant 0.82 dB in PSNR with similar number of parameters. BasicVSR++ is generalizable to other video restoration tasks, and obtains three champions and one first runner-up in NTIRE 2021 video restoration challenge.", "abstracts": [ { "abstractType": "Regular", "content": "A recurrent structure is a popular framework choice for the task of video super-resolution. The state-of-the-art method BasicVSR adopts bidirectional propagation with feature alignment to effectively exploit information from the entire input video. In this study, we redesign BasicVsr by proposing second-order grid propagation and flow-guided deformable alignment. We show that by empowering the re-current framework with enhanced propagation and align-ment, one can exploit spatiotemporal information across misaligned video frames more effectively. The new components lead to an improved performance under a simi-lar computational constraint. In particular, our model Ba-sicVSR++ surpasses BasicVSR by a significant 0.82 dB in PSNR with similar number of parameters. BasicVSR++ is generalizable to other video restoration tasks, and obtains three champions and one first runner-up in NTIRE 2021 video restoration challenge.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A recurrent structure is a popular framework choice for the task of video super-resolution. The state-of-the-art method BasicVSR adopts bidirectional propagation with feature alignment to effectively exploit information from the entire input video. In this study, we redesign BasicVsr by proposing second-order grid propagation and flow-guided deformable alignment. We show that by empowering the re-current framework with enhanced propagation and align-ment, one can exploit spatiotemporal information across misaligned video frames more effectively. The new components lead to an improved performance under a simi-lar computational constraint. In particular, our model Ba-sicVSR++ surpasses BasicVSR by a significant 0.82 dB in PSNR with similar number of parameters. BasicVSR++ is generalizable to other video restoration tasks, and obtains three champions and one first runner-up in NTIRE 2021 video restoration challenge.", "fno": "694600f962", "keywords": [ "Image Resolution", "Image Restoration", "Image Sequences", "Spatiotemporal Phenomena", "Video Signal Processing", "Enhanced Propagation", "Recurrent Structure", "Bidirectional Propagation", "Feature Alignment", "Entire Input Video", "Second Order Grid Propagation", "Flow Guided Deformable Alignment", "Recurrent Framework", "Spatiotemporal Information", "Misaligned Video Frames", "Computational Constraint", "Basic VSR", "Video Restoration Tasks", "NTIRE 2021 Video Restoration Challenge", "Video Superresolution", "Noise Figure 0 82 D B", "Computer Vision", "Computational Modeling", "Superresolution", "Spatiotemporal Phenomena", "Pattern Recognition", "Task Analysis" ], "authors": [ { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Kelvin C.K. Chan", "givenName": "Kelvin C.K.", "surname": "Chan", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Shangchen Zhou", "givenName": "Shangchen", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Xiangyu Xu", "givenName": "Xiangyu", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Nanyang Technological University,S-Lab", "fullName": "Chen Change Loy", "givenName": "Chen Change", "surname": "Loy", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "5962-5971", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H1kpXB2rHa", "name": "pcvpr202269460-09879156s1-mm_694600f962.zip", "size": "5.93 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09879156s1-mm_694600f962.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600f952", "articleId": "1H1i30rjMqs", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600f972", "articleId": "1H0KVvn99ug", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200e791", "title": "Deep Blind Video Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e791/1BmJBhycJ7W", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a704", "title": "Video Super Resolution Based on Motion Compensation", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a704/1BmOrPEdpO8", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900a776", "title": "Edge-enhanced Feature Distillation Network for Efficient Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900a776/1G56jvzghxK", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g043", "title": "Revisiting Temporal Alignment for Video Restoration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g043/1H0MSD0klYA", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600r7813", "title": "Memory-Augmented Non-Local Attention for Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600r7813/1H1kxqvXBCw", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600b766", "title": "Cross-Resolution Flow Propagation for Foveated Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600b766/1KxV3bSa3Fm", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/019100d470", "title": "Temporal Kernel Consistency for Blind Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/019100d470/1yNi0xnqAko", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a166", "title": "NTIRE 2021 Challenge on Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a166/1yVzQIAkTDi", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a471", "title": "EBSR: Feature Enhanced Burst Super-Resolution with Deformable Alignment", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a471/1yZ4ClkpCgM", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900e945", "title": "BasicVSR: The Search for Essential Components in Video Super-Resolution and Beyond", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900e945/1yeHV68qRz2", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Iz57jURAIg", "title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "acronym": "avss", "groupId": "9958946", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Iz59B0m2as", "doi": "10.1109/AVSS56176.2022.9959711", "title": "Dual Camera Based High Spatio-Temporal Resolution Video Generation For Wide Area Surveillance", "normalizedTitle": "Dual Camera Based High Spatio-Temporal Resolution Video Generation For Wide Area Surveillance", "abstract": "Wide area surveillance (WAS) requires high spatiotemporal resolution (HSTR) video for better precision. As an alternative to expensive WAS systems, low-cost hybrid imaging systems can be used. This paper presents the usage of multiple video feeds for the generation of HSTR video as an extension of reference based super resolution (RefSR). One feed captures video at high spatial resolution with low frame rate (HSLF) while the other captures low spatial resolution and high frame rate (LSHF) video simultaneously for the same scene. The main purpose is to create an HSTR video from the fusion of HSLF and LSHF videos. In this paper we propose an end-to-end trainable deep network that performs optical flow (OF) estimation and frame reconstruction by combining inputs from both video feeds. The proposed architecture provides significant improvement over existing video frame interpolation and RefSR techniques in terms of PSNR and SSIM metrics and can be deployed on drones with dual cameras.", "abstracts": [ { "abstractType": "Regular", "content": "Wide area surveillance (WAS) requires high spatiotemporal resolution (HSTR) video for better precision. As an alternative to expensive WAS systems, low-cost hybrid imaging systems can be used. This paper presents the usage of multiple video feeds for the generation of HSTR video as an extension of reference based super resolution (RefSR). One feed captures video at high spatial resolution with low frame rate (HSLF) while the other captures low spatial resolution and high frame rate (LSHF) video simultaneously for the same scene. The main purpose is to create an HSTR video from the fusion of HSLF and LSHF videos. In this paper we propose an end-to-end trainable deep network that performs optical flow (OF) estimation and frame reconstruction by combining inputs from both video feeds. The proposed architecture provides significant improvement over existing video frame interpolation and RefSR techniques in terms of PSNR and SSIM metrics and can be deployed on drones with dual cameras.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Wide area surveillance (WAS) requires high spatiotemporal resolution (HSTR) video for better precision. As an alternative to expensive WAS systems, low-cost hybrid imaging systems can be used. This paper presents the usage of multiple video feeds for the generation of HSTR video as an extension of reference based super resolution (RefSR). One feed captures video at high spatial resolution with low frame rate (HSLF) while the other captures low spatial resolution and high frame rate (LSHF) video simultaneously for the same scene. The main purpose is to create an HSTR video from the fusion of HSLF and LSHF videos. In this paper we propose an end-to-end trainable deep network that performs optical flow (OF) estimation and frame reconstruction by combining inputs from both video feeds. The proposed architecture provides significant improvement over existing video frame interpolation and RefSR techniques in terms of PSNR and SSIM metrics and can be deployed on drones with dual cameras.", "fno": "09959711", "keywords": [ "Cameras", "Deep Learning Artificial Intelligence", "Image Reconstruction", "Image Resolution", "Image Sensors", "Image Sequences", "Interpolation", "Video Signal Processing", "Video Surveillance", "Dual Cameras", "End To End Trainable Deep Network", "Frame Reconstruction", "High Frame Rate Video", "High Spatial Resolution", "High Spatio Temporal Resolution Video Generation", "HSLF", "HSTR Video", "Low Frame Rate", "Low Spatial Resolution", "Low Cost Hybrid Imaging Systems", "LSHF Videos", "Multiple Video", "Optical Flow Estimation", "Reference Based Super Resolution", "Video Frame Interpolation", "WAS Systems", "Wide Area Surveillance", "Measurement", "Interpolation", "Surveillance", "Superresolution", "Cameras", "Spatiotemporal Phenomena", "Feeds" ], "authors": [ { "affiliation": "Ozyegin University,Istanbul,Turkey,34794", "fullName": "H. Umut Suluhan", "givenName": "H. Umut", "surname": "Suluhan", "__typename": "ArticleAuthorType" }, { "affiliation": "Istanbul Medipol University,Istanbul,Turkey,34810", "fullName": "Hasan F. Ates", "givenName": "Hasan F.", "surname": "Ates", "__typename": "ArticleAuthorType" }, { "affiliation": "Istanbul Medipol University,Istanbul,Turkey,34810", "fullName": "Bahadir K. Gunturk", "givenName": "Bahadir K.", "surname": "Gunturk", "__typename": "ArticleAuthorType" } ], "idPrefix": "avss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2022", "issn": null, "isbn": "978-1-6654-6382-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09959170", "articleId": "1Iz5f7tXFgA", "__typename": "AdjacentArticleType" }, "next": { "fno": "09959415", "articleId": "1Iz5efqebmM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2005/9385/0/01577311", "title": "Dual-sensor camera for acquiring image sequences with different spatio-temporal resolution", "doi": null, "abstractUrl": "/proceedings-article/avss/2005/01577311/12OmNyuPLog", "parentPublication": { "id": "proceedings/avss/2005/9385/0", "title": "IEEE Conference on Advanced Video and Signal Based Surveillance, 2005.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2009/4442/0/05457481", "title": "Spatio-temporal image-based texture atlases for dynamic 3-D models", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2009/05457481/12OmNzTH0ZC", "parentPublication": { "id": "proceedings/iccvw/2009/4442/0", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b981", "title": "Dual-Camera Super-Resolution with Aligned Attention Modules", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b981/1BmIwutWSAM", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisai/2021/0692/0/069200a704", "title": "Video Super Resolution Based on Motion Compensation", "doi": null, "abstractUrl": "/proceedings-article/cisai/2021/069200a704/1BmOrPEdpO8", "parentPublication": { "id": "proceedings/cisai/2021/0692/0", "title": "2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100a771", "title": "Remote Video Surveillance", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a771/1EpKXmgv97y", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600c037", "title": "VideoINR: Learning Video Implicit Neural Representation for Continuous Space-Time Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600c037/1H0NznOewLe", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09052471", "title": "A Dual Camera System for High Spatiotemporal Resolution Video Acquisition", "doi": null, "abstractUrl": "/journal/tp/2021/10/09052471/1iFLGJyUQ1O", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c683", "title": "Dual-Stream Fusion Network for Spatiotemporal Video Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c683/1uqGlWkmblK", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a314", "title": "Efficient Space-time Video Super Resolution using Low-Resolution Flow and Mask Upsampling", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a314/1yJYpU0lK2Q", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbnrgXMly", "doi": "10.1109/WACV45572.2020.9093564", "title": "Cloud Removal in Satellite Images Using Spatiotemporal Generative Networks", "normalizedTitle": "Cloud Removal in Satellite Images Using Spatiotemporal Generative Networks", "abstract": "Satellite images hold great promise for continuous environmental monitoring and earth observation. Occlusions cast by clouds, however, can severely limit coverage, making ground information extraction more difficult. Existing pipelines typically perform cloud removal with simple temporal composites and hand-crafted filters. In contrast, we cast the problem of cloud removal as a conditional image synthesis challenge, and we propose a trainable spatiotemporal generator network (STGAN) to remove clouds. We train our model on a new large-scale spatiotemporal dataset that we construct, containing 97640 image pairs covering all continents. We demonstrate experimentally that the proposed STGAN model outperforms standard models and can generate realistic cloud-free images with high PSNR and SSIM values across a variety of atmospheric conditions, leading to improved performance in downstream tasks such as land cover classification.", "abstracts": [ { "abstractType": "Regular", "content": "Satellite images hold great promise for continuous environmental monitoring and earth observation. Occlusions cast by clouds, however, can severely limit coverage, making ground information extraction more difficult. Existing pipelines typically perform cloud removal with simple temporal composites and hand-crafted filters. In contrast, we cast the problem of cloud removal as a conditional image synthesis challenge, and we propose a trainable spatiotemporal generator network (STGAN) to remove clouds. We train our model on a new large-scale spatiotemporal dataset that we construct, containing 97640 image pairs covering all continents. We demonstrate experimentally that the proposed STGAN model outperforms standard models and can generate realistic cloud-free images with high PSNR and SSIM values across a variety of atmospheric conditions, leading to improved performance in downstream tasks such as land cover classification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Satellite images hold great promise for continuous environmental monitoring and earth observation. Occlusions cast by clouds, however, can severely limit coverage, making ground information extraction more difficult. Existing pipelines typically perform cloud removal with simple temporal composites and hand-crafted filters. In contrast, we cast the problem of cloud removal as a conditional image synthesis challenge, and we propose a trainable spatiotemporal generator network (STGAN) to remove clouds. We train our model on a new large-scale spatiotemporal dataset that we construct, containing 97640 image pairs covering all continents. We demonstrate experimentally that the proposed STGAN model outperforms standard models and can generate realistic cloud-free images with high PSNR and SSIM values across a variety of atmospheric conditions, leading to improved performance in downstream tasks such as land cover classification.", "fno": "09093564", "keywords": [ "Clouds", "Environmental Monitoring Geophysics", "Feature Extraction", "Geophysical Image Processing", "Image Classification", "Remote Sensing", "Terrain Mapping", "Hand Crafted Filters", "Cloud Removal", "Conditional Image Synthesis Challenge", "Trainable Spatiotemporal Generator Network", "Large Scale Spatiotemporal Dataset", "Image Pairs", "Realistic Cloud Free Images", "Satellite Images", "Spatiotemporal Generative Networks", "Continuous Environmental Monitoring", "Occlusions Cast", "Ground Information Extraction", "Temporal Composites", "Clouds", "Satellites", "Agriculture", "Spatiotemporal Phenomena", "Generators", "Feature Extraction", "Gallium Nitride" ], "authors": [ { "affiliation": "Stanford University,Computer Science Department", "fullName": "Vishnu Sarukkai", "givenName": "Vishnu", "surname": "Sarukkai", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University,Computer Science Department", "fullName": "Anirudh Jain", "givenName": "Anirudh", "surname": "Jain", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University,Computer Science Department", "fullName": "Burak Uzkent", "givenName": "Burak", "surname": "Uzkent", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University,Computer Science Department", "fullName": "Stefano Ermon", "givenName": "Stefano", "surname": "Ermon", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "1785-1794", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093593", "articleId": "1jPbcZZi2o8", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093471", "articleId": "1jPblzeImEo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733b533", "title": "Filmy Cloud Removal on Satellite Imagery with Multispectral Conditional Generative Adversarial Nets", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733b533/12OmNBpmDD0", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2015/9808/0/9808a248", "title": "Video Retargeting Based on Adaptive Spatiotemporal Saliency Mapping", "doi": null, "abstractUrl": "/proceedings-article/skg/2015/9808a248/12OmNz5JC6y", "parentPublication": { "id": "proceedings/skg/2015/9808/0", "title": "2015 11th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2014/2555/0/06816707", "title": "Interactive hierarchical tag clouds for summarizing spatiotemporal social contents", "doi": null, "abstractUrl": "/proceedings-article/icde/2014/06816707/12OmNz6iOxa", "parentPublication": { "id": "proceedings/icde/2014/2555/0", "title": "2014 IEEE 30th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b788", "title": "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detection and Shadow Removal", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b788/17D45VUZMVe", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546105", "title": "Staff line Removal using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546105/17D45WXIkAE", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2022/9548/0/954800a407", "title": "Cloud Removal in Satellite Imagery Using Adversarial Network and RGB-Optical Data Fusion", "doi": null, "abstractUrl": "/proceedings-article/mipr/2022/954800a407/1GvdciZfPzy", "parentPublication": { "id": "proceedings/mipr/2022/9548/0", "title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807296", "title": "GenerativeMap: Visualization and Exploration of Dynamic Density Maps via Generative Learning Model", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807296/1cG6usdi8aQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2019/0990/0/08909824", "title": "Cycle-Spinning GAN for Raindrop Removal from Images", "doi": null, "abstractUrl": "/proceedings-article/avss/2019/08909824/1febMy63o0o", "parentPublication": { "id": "proceedings/avss/2019/0990/0", "title": "2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300d858", "title": "3D Point Cloud Generative Adversarial Network Based on Tree Structured Graph Convolutions", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300d858/1hVllpVGDv2", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2020/5904/0/09103801", "title": "Patch-based Generative Adversarial Network for Single Image Haze Removal", "doi": null, "abstractUrl": "/proceedings-article/iccea/2020/09103801/1kesuRP2Guk", "parentPublication": { "id": "proceedings/iccea/2020/5904/0", "title": "2020 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1m3n9N02qgE", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1m3o6jEDHEY", "doi": "10.1109/CVPR42600.2020.00478", "title": "A Spatiotemporal Volumetric Interpolation Network for 4D Dynamic Medical Image", "normalizedTitle": "A Spatiotemporal Volumetric Interpolation Network for 4D Dynamic Medical Image", "abstract": "Dynamic medical images are often limited in its application due to the large radiation doses and longer image scanning and reconstruction times. Existing methods attempt to reduce the volume samples in the dynamic sequence by interpolating the volumes between the acquired samples. However, these methods are limited to either 2D images and/or are unable to support large but periodic variations in the functional motion between the image volume samples. In this paper, we present a spatiotemporal volumetric interpolation network (SVIN) designed for 4D dynamic medical images. SVIN introduces dual networks: the first is the spatiotemporal motion network that leverages the 3D convolutional neural network (CNN) for unsupervised parametric volumetric registration to derive spatiotemporal motion field from a pair of image volumes; the second is the sequential volumetric interpolation network, which uses the derived motion field to interpolate image volumes, together with a new regression-based module to characterize the periodic motion cycles in functional organ structures. We also introduce an adaptive multi-scale architecture to capture the volumetric large anatomy motions. Experimental results demonstrated that our SVIN outperformed state-of-the-art temporal medical interpolation methods and natural video interpolation method that has been extended to support volumetric images. Code is available at [1].", "abstracts": [ { "abstractType": "Regular", "content": "Dynamic medical images are often limited in its application due to the large radiation doses and longer image scanning and reconstruction times. Existing methods attempt to reduce the volume samples in the dynamic sequence by interpolating the volumes between the acquired samples. However, these methods are limited to either 2D images and/or are unable to support large but periodic variations in the functional motion between the image volume samples. In this paper, we present a spatiotemporal volumetric interpolation network (SVIN) designed for 4D dynamic medical images. SVIN introduces dual networks: the first is the spatiotemporal motion network that leverages the 3D convolutional neural network (CNN) for unsupervised parametric volumetric registration to derive spatiotemporal motion field from a pair of image volumes; the second is the sequential volumetric interpolation network, which uses the derived motion field to interpolate image volumes, together with a new regression-based module to characterize the periodic motion cycles in functional organ structures. We also introduce an adaptive multi-scale architecture to capture the volumetric large anatomy motions. Experimental results demonstrated that our SVIN outperformed state-of-the-art temporal medical interpolation methods and natural video interpolation method that has been extended to support volumetric images. Code is available at [1].", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Dynamic medical images are often limited in its application due to the large radiation doses and longer image scanning and reconstruction times. Existing methods attempt to reduce the volume samples in the dynamic sequence by interpolating the volumes between the acquired samples. However, these methods are limited to either 2D images and/or are unable to support large but periodic variations in the functional motion between the image volume samples. In this paper, we present a spatiotemporal volumetric interpolation network (SVIN) designed for 4D dynamic medical images. SVIN introduces dual networks: the first is the spatiotemporal motion network that leverages the 3D convolutional neural network (CNN) for unsupervised parametric volumetric registration to derive spatiotemporal motion field from a pair of image volumes; the second is the sequential volumetric interpolation network, which uses the derived motion field to interpolate image volumes, together with a new regression-based module to characterize the periodic motion cycles in functional organ structures. We also introduce an adaptive multi-scale architecture to capture the volumetric large anatomy motions. Experimental results demonstrated that our SVIN outperformed state-of-the-art temporal medical interpolation methods and natural video interpolation method that has been extended to support volumetric images. Code is available at [1].", "fno": "716800e725", "keywords": [ "Biomedical MRI", "Image Motion Analysis", "Image Reconstruction", "Image Registration", "Image Sequences", "Interpolation", "Medical Image Processing", "Neural Nets", "Spatiotemporal Phenomena", "Video Signal Processing", "Interpolate Image Volumes", "Derived Motion Field", "Sequential Volumetric Interpolation Network", "Spatiotemporal Motion Field", "Unsupervised Parametric Volumetric Registration", "3 D Convolutional Neural Network", "Spatiotemporal Motion Network", "Dual Networks", "Image Volume Samples", "Functional Motion", "Acquired Samples", "Dynamic Sequence", "Reconstruction Times", "Longer Image Scanning", "Dynamic Medical Images", "4 D Dynamic Medical Image", "Spatiotemporal Volumetric Interpolation Network", "Volumetric Images", "Natural Video Interpolation Method", "State Of The Art Temporal Medical Interpolation Methods", "SVIN", "Volumetric Large Anatomy Motions", "Periodic Motion Cycles", "Interpolation", "Spatiotemporal Phenomena", "Strain", "Dynamics", "Three Dimensional Displays", "Biomedical Optical Imaging" ], "authors": [ { "affiliation": "Institute for Medical Imaging Technology, School of Biomedical Engineering, Shanghai Jiao Tong University, China; School of Computer Science, University of Sydney, Australia", "fullName": "Yuyu Guo", "givenName": "Yuyu", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, University of Sydney, Australia", "fullName": "Lei Bi", "givenName": "Lei", "surname": "Bi", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, University of Sydney, Australia", "fullName": "Euijoon Ahn", "givenName": "Euijoon", "surname": "Ahn", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, University of Sydney, Australia", "fullName": "Dagan Feng", "givenName": "Dagan", "surname": "Feng", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Medical Imaging Technology, School of Biomedical Engineering, Shanghai Jiao Tong University, China", "fullName": "Qian Wang", "givenName": "Qian", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, University of Sydney, Australia", "fullName": "Jinman Kim", "givenName": "Jinman", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "4725-4734", "year": "2020", "issn": null, "isbn": "978-1-7281-7168-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "716800e715", "articleId": "1m3o2Uz2vok", "__typename": "AdjacentArticleType" }, "next": { "fno": "716800e735", "articleId": "1m3nQWg0aLS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2012/4797/0/4797a349", "title": "Role of Spatiotemporal Oriented Energy Features for Robust Visual Tracking in Video Surveillance", "doi": null, "abstractUrl": "/proceedings-article/avss/2012/4797a349/12OmNxFaLFz", "parentPublication": { "id": "proceedings/avss/2012/4797/0", "title": "2012 IEEE Ninth International Conference on Advanced Video and Signal-Based Surveillance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/comgeo/2014/4321/0/06910112", "title": "A Spatiotemporal Interpolation Method Using Radial Basis Functions for Geospatiotemporal Big Data", "doi": null, "abstractUrl": "/proceedings-article/comgeo/2014/06910112/12OmNzYeAQE", "parentPublication": { "id": "proceedings/comgeo/2014/4321/0", "title": "2014 5th International Conference on Computing for Geospatial Research and Application (COM.Geo)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2015/10/07010973", "title": "Spatiotemporal Directional Number Transitional Graph for Dynamic Texture Recognition", "doi": null, "abstractUrl": "/journal/tp/2015/10/07010973/13rRUwbs2ca", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/02/06894217", "title": "Space-Time Transfinite Interpolation of Volumetric Material Properties", "doi": null, "abstractUrl": "/journal/tg/2015/02/06894217/13rRUyoPSP7", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09745790", "title": "4D Atlas: Statistical Analysis of the Spatiotemporal Variability in Longitudinal 3D Shape Data", "doi": null, "abstractUrl": "/journal/tp/2023/02/09745790/1CbVkWyt0LC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020965", "title": "Spatiotemporal Interpolation of Ungauged River Discharge via Deep Kernel Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020965/1KfSPME72wM", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/07/08941308", "title": "Local Prediction Models for Spatiotemporal Volume Visualization", "doi": null, "abstractUrl": "/journal/tg/2021/07/08941308/1g1FWXBrTxe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09151354", "title": "Spatiotemporal Bundle Adjustment for Dynamic 3D Human Reconstruction in the Wild", "doi": null, "abstractUrl": "/journal/tp/2022/02/09151354/1lPCkW5UbPG", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412470", "title": "Residual Learning of Video Frame Interpolation Using Convolutional LSTM", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412470/1tmjTuxyKnS", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uiluGq0Oo8", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uilMLOlmaA", "doi": "10.1109/ICME51207.2021.9428231", "title": "STAE: A Spatiotemporal Auto-Encoder for High-Resolution Video Prediction", "normalizedTitle": "STAE: A Spatiotemporal Auto-Encoder for High-Resolution Video Prediction", "abstract": "Predicting high-resolution videos (≥ 256) is always a very difficult task in video prediction domain. To predict high-quality frames for high-resolution videos, both the challenging spatiotemporal representations and the computation resources are needed to be carefully considered. In this paper, we propose a SpatioTemporal Auto-Encoder for High-Resolution Video Prediction, which is named STAE. In our method, we first jointly utilize the spatial and temporal encoders to extract low-dimensional spatial and temporal features from the high-resolution video input, which can preserve the spatiotemporal information from the input and significantly reduce the computation load for the following modules. In addition, we design a SpatioTemporal Attention based Memory (STAM) to predict the spatiotemporal features for future frames using the encoded low-dimensional features. Then the predicted spatial and temporal features are decoded back to the high-dimensional data space using the spatial and temporal decoders. Finally, the predicted high-dimensional spatial and temporal representations are jointly utilized to predict the future frames. All modules in STAE are built on the basis of 3D neural networks to improve the local perception to videos. Experimental results show the proposed method outperforms diverse state-of-the-arts on widely used datasets and the computation load is relative low.", "abstracts": [ { "abstractType": "Regular", "content": "Predicting high-resolution videos (≥ 256) is always a very difficult task in video prediction domain. To predict high-quality frames for high-resolution videos, both the challenging spatiotemporal representations and the computation resources are needed to be carefully considered. In this paper, we propose a SpatioTemporal Auto-Encoder for High-Resolution Video Prediction, which is named STAE. In our method, we first jointly utilize the spatial and temporal encoders to extract low-dimensional spatial and temporal features from the high-resolution video input, which can preserve the spatiotemporal information from the input and significantly reduce the computation load for the following modules. In addition, we design a SpatioTemporal Attention based Memory (STAM) to predict the spatiotemporal features for future frames using the encoded low-dimensional features. Then the predicted spatial and temporal features are decoded back to the high-dimensional data space using the spatial and temporal decoders. Finally, the predicted high-dimensional spatial and temporal representations are jointly utilized to predict the future frames. All modules in STAE are built on the basis of 3D neural networks to improve the local perception to videos. Experimental results show the proposed method outperforms diverse state-of-the-arts on widely used datasets and the computation load is relative low.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Predicting high-resolution videos (≥ 256) is always a very difficult task in video prediction domain. To predict high-quality frames for high-resolution videos, both the challenging spatiotemporal representations and the computation resources are needed to be carefully considered. In this paper, we propose a SpatioTemporal Auto-Encoder for High-Resolution Video Prediction, which is named STAE. In our method, we first jointly utilize the spatial and temporal encoders to extract low-dimensional spatial and temporal features from the high-resolution video input, which can preserve the spatiotemporal information from the input and significantly reduce the computation load for the following modules. In addition, we design a SpatioTemporal Attention based Memory (STAM) to predict the spatiotemporal features for future frames using the encoded low-dimensional features. Then the predicted spatial and temporal features are decoded back to the high-dimensional data space using the spatial and temporal decoders. Finally, the predicted high-dimensional spatial and temporal representations are jointly utilized to predict the future frames. All modules in STAE are built on the basis of 3D neural networks to improve the local perception to videos. Experimental results show the proposed method outperforms diverse state-of-the-arts on widely used datasets and the computation load is relative low.", "fno": "09428231", "keywords": [ "Feature Extraction", "Neural Nets", "Spatiotemporal Phenomena", "Video Signal Processing", "Challenging Spatiotemporal Representations", "High Dimensional Data Space", "High Dimensional Spatial Representations", "High Quality Frames", "High Resolution Video Input", "High Resolution Video Prediction", "High Resolution Videos", "Low Dimensional Features", "Predicted Spatial", "Spatial Decoders", "Spatial Encoders", "Spatio Temporal Attention", "Spatiotemporal Auto Encoder", "Spatio Temporal Auto Encoder", "Spatiotemporal Features", "Spatiotemporal Information", "STAE", "Temporal Decoders", "Temporal Encoders", "Temporal Features", "Temporal Representations", "Video Prediction Domain", "Three Dimensional Displays", "Neural Networks", "Streaming Media", "Predictive Models", "Feature Extraction", "Spatiotemporal Phenomena", "Decoding", "Spatio Temporal Predictive Model", "Auto Encoder", "High Resolution", "Video Prediction" ], "authors": [ { "affiliation": "University of Chinese Academy of Sciences,Beijing,China", "fullName": "Zheng Chang", "givenName": "Zheng", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Chinese Academy of Sciences,Beijing,China", "fullName": "Xinfeng Zhang", "givenName": "Xinfeng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Institute of Digital Media,Beijing,China", "fullName": "Shanshe Wang", "givenName": "Shanshe", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Institute of Digital Media,Beijing,China", "fullName": "Siwei Ma", "givenName": "Siwei", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,Beijing,China", "fullName": "Yan Ye", "givenName": "Yan", "surname": "Ye", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Institute of Digital Media,Beijing,China", "fullName": "Wen Gao", "givenName": "Wen", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2021", "issn": null, "isbn": "978-1-6654-3864-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09428355", "articleId": "1uimg7WQXVC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09428461", "articleId": "1uilGCS5Bks", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2018/4886/0/488601b607", "title": "Fully-Coupled Two-Stream Spatiotemporal Networks for Extremely Low Resolution Action Recognition", "doi": null, "abstractUrl": "/proceedings-article/wacv/2018/488601b607/12OmNqJ8tu6", "parentPublication": { "id": "proceedings/wacv/2018/4886/0", "title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2023/02/09721618", "title": "High-Resolution Urban Flows Forecasting With Coarse-Grained Spatiotemporal Data", "doi": null, "abstractUrl": "/journal/ai/2023/02/09721618/1BhzGsasS3K", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200e460", "title": "Event Stream Super-Resolution via Spatiotemporal Constraint Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e460/1BmHTcxfM7S", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i168", "title": "Frequency-Aware Spatiotemporal Transformers for Video Inpainting Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i168/1BmKJkcuULK", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600n3926", "title": "STRPM: A Spatiotemporal Residual Predictive Model for High-Resolution Video Prediction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3926/1H1mJyi5Fmg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2022/02/08976084", "title": "Depression Level Prediction Using Deep Spatiotemporal Features and Multilayer Bi-LTSM", "doi": null, "abstractUrl": "/journal/ta/2022/02/08976084/1h0VOXTspe8", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/10/09052471", "title": "A Dual Camera System for High Spatiotemporal Resolution Video Acquisition", "doi": null, "abstractUrl": "/journal/tp/2021/10/09052471/1iFLGJyUQ1O", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2020/9074/0/907400a673", "title": "Dynamic-Static-based Spatiotemporal Multi-Graph Neural Networks for Passenger Flow Prediction", "doi": null, "abstractUrl": "/proceedings-article/icpads/2020/907400a673/1rvCuZPi9GM", "parentPublication": { "id": "proceedings/icpads/2020/9074/0", "title": "2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428209", "title": "Deep Neural Networks for End-to-End Spatiotemporal Video Quality Prediction and Aggregation", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428209/1uilzyL588E", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uqGdWlamUo", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1uqGlWkmblK", "doi": "10.1109/WACV48630.2021.00273", "title": "Dual-Stream Fusion Network for Spatiotemporal Video Super-Resolution", "normalizedTitle": "Dual-Stream Fusion Network for Spatiotemporal Video Super-Resolution", "abstract": "Visual data upsampling has been an important research topic for improving the perceptual quality and benefiting various computer vision applications. In recent years, we have witnessed remarkable progresses brought by the re-naissance of deep learning techniques for video or image super-resolution. However, most existing methods focus on advancing super-resolution at either spatial or temporal direction, i.e, to increase the spatial resolution or the video frame rate. In this paper, we instead turn to discuss both directions jointly and tackle the spatiotemporal upsampling problem. Our method is based on an important observation that: even the direct cascade of prior research in spatial and temporal super-resolution can achieve the spatiotemporal upsampling, changing orders for combining them would lead to results with a complementary property. Thus, we propose a dual-stream fusion network to adaptively fuse the intermediate results produced by two spatiotemporal up-sampling streams, where the first stream applies the spatial super-resolution followed by the temporal super-resolution, while the second one is with the reverse order of cascade. Extensive experiments verify the efficacy of the proposed method against several baselines. Moreover, we investigate various spatial and temporal upsampling methods as the basis in our two-stream model and demonstrate the flexibility with wide applicability of the proposed framework.", "abstracts": [ { "abstractType": "Regular", "content": "Visual data upsampling has been an important research topic for improving the perceptual quality and benefiting various computer vision applications. In recent years, we have witnessed remarkable progresses brought by the re-naissance of deep learning techniques for video or image super-resolution. However, most existing methods focus on advancing super-resolution at either spatial or temporal direction, i.e, to increase the spatial resolution or the video frame rate. In this paper, we instead turn to discuss both directions jointly and tackle the spatiotemporal upsampling problem. Our method is based on an important observation that: even the direct cascade of prior research in spatial and temporal super-resolution can achieve the spatiotemporal upsampling, changing orders for combining them would lead to results with a complementary property. Thus, we propose a dual-stream fusion network to adaptively fuse the intermediate results produced by two spatiotemporal up-sampling streams, where the first stream applies the spatial super-resolution followed by the temporal super-resolution, while the second one is with the reverse order of cascade. Extensive experiments verify the efficacy of the proposed method against several baselines. Moreover, we investigate various spatial and temporal upsampling methods as the basis in our two-stream model and demonstrate the flexibility with wide applicability of the proposed framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual data upsampling has been an important research topic for improving the perceptual quality and benefiting various computer vision applications. In recent years, we have witnessed remarkable progresses brought by the re-naissance of deep learning techniques for video or image super-resolution. However, most existing methods focus on advancing super-resolution at either spatial or temporal direction, i.e, to increase the spatial resolution or the video frame rate. In this paper, we instead turn to discuss both directions jointly and tackle the spatiotemporal upsampling problem. Our method is based on an important observation that: even the direct cascade of prior research in spatial and temporal super-resolution can achieve the spatiotemporal upsampling, changing orders for combining them would lead to results with a complementary property. Thus, we propose a dual-stream fusion network to adaptively fuse the intermediate results produced by two spatiotemporal up-sampling streams, where the first stream applies the spatial super-resolution followed by the temporal super-resolution, while the second one is with the reverse order of cascade. Extensive experiments verify the efficacy of the proposed method against several baselines. Moreover, we investigate various spatial and temporal upsampling methods as the basis in our two-stream model and demonstrate the flexibility with wide applicability of the proposed framework.", "fno": "047700c683", "keywords": [ "Computer Vision", "Image Fusion", "Image Resolution", "Image Sampling", "Learning Artificial Intelligence", "Video Signal Processing", "Spatiotemporal Video Super Resolution", "Visual Data Upsampling", "Computer Vision Applications", "Deep Learning Techniques", "Existing Methods Focus", "Advancing Super Resolution", "Spatial Direction", "Temporal Direction", "Spatial Resolution", "Video Frame Rate", "Spatiotemporal Upsampling Problem", "Important Observation", "Direct Cascade", "Temporal Super Resolution", "Dual Stream Fusion Network", "Up Sampling Streams", "Spatial Super Resolution", "Spatial Methods", "Temporal Upsampling Methods", "Two Stream Model", "Deep Learning", "Visualization", "Interpolation", "Computer Vision", "Fuses", "Conferences", "Superresolution" ], "authors": [ { "affiliation": "National Chiao Tung University", "fullName": "Min-Yuan Tseng", "givenName": "Min-Yuan", "surname": "Tseng", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Yen-Chung Chen", "givenName": "Yen-Chung", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Yi-Lun Lee", "givenName": "Yi-Lun", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Google", "fullName": "Wei-Sheng Lai", "givenName": "Wei-Sheng", "surname": "Lai", "__typename": "ArticleAuthorType" }, { "affiliation": "NEC Labs America", "fullName": "Yi-Hsuan Tsai", "givenName": "Yi-Hsuan", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": "National Chiao Tung University", "fullName": "Wei-Chen Chiu", "givenName": "Wei-Chen", "surname": "Chiu", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "2683-2692", "year": "2021", "issn": null, "isbn": "978-1-6654-0477-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "047700c673", "articleId": "1uqGueShP6E", "__typename": "AdjacentArticleType" }, "next": { "fno": "047700c693", "articleId": "1uqGHh2PwXe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200e460", "title": "Event Stream Super-Resolution via Spatiotemporal Constraint Learning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200e460/1BmHTcxfM7S", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b981", "title": "Dual-Camera Super-Resolution with Aligned Attention Modules", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b981/1BmIwutWSAM", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cacml/2022/8290/0/829000a588", "title": "Progressive Face Super-Resolution Reconstruction Network Based on Relational Modeling", "doi": null, "abstractUrl": "/proceedings-article/cacml/2022/829000a588/1FY1kYilglO", "parentPublication": { "id": "proceedings/cacml/2022/8290/0", "title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600c037", "title": "VideoINR: Learning Video Implicit Neural Representation for Continuous Space-Time Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600c037/1H0NznOewLe", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcat/2022/6090/0/609000a048", "title": "Enhanced Deep Learning Super-Resolution for Bathymetry Data", "doi": null, "abstractUrl": "/proceedings-article/bdcat/2022/609000a048/1Lu4d5cQVi0", "parentPublication": { "id": "proceedings/bdcat/2022/6090/0", "title": "2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b629", "title": "DualSR: Zero-Shot Dual Learning for Real-World Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b629/1uqGA1yJsFa", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552857", "title": "STNet: An End-to-End Generative Framework for Synthesizing Spatiotemporal Super-Resolution Volumes", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552857/1xibYEW20Vy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a314", "title": "Efficient Space-time Video Super Resolution using Low-Resolution Flow and Mask Upsampling", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a314/1yJYpU0lK2Q", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900a516", "title": "Variational AutoEncoder for Reference based Image Super-Resolution", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900a516/1yVA6BqL4Zy", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a466", "title": "Lightweight Image Super-Resolution via Dual Feature Aggregation Network", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a466/1ziPcnzFp8A", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvlPkDE", "title": "Proceedings Visualization '94", "acronym": "visual", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "1994", "__typename": "ProceedingType" }, "article": { "id": "12OmNroij7B", "doi": "10.1109/VISUAL.1994.346328", "title": "3D visualization of unsteady 2D airplane wake vortices", "normalizedTitle": "3D visualization of unsteady 2D airplane wake vortices", "abstract": "Air flowing around the wing tips of an airplane forms horizontal tornado-like vortices that can be dangerous to following aircraft. The dynamics of such vortices, including ground and atmospheric effects, can be predicted by numerical simulation, allowing the safety and capacity of airports to be improved. We introduce three-dimensional techniques for visualizing time-dependent, two-dimensional wake vortex computations, and the hazard strength of such vortices near the ground. We describe a vortex core tracing algorithm and a local tiling method to visualize the vortex evolution. The tiling method converts time-dependent, two-dimensional vortex cores into three-dimensional vortex tubes. Finally, a novel approach is used to calculate the induced rolling moment on the following airplane at each grid point within a region near the vortex tubes and thus allows three-dimensional visualization of the hazard strength of the vortices.<>", "abstracts": [ { "abstractType": "Regular", "content": "Air flowing around the wing tips of an airplane forms horizontal tornado-like vortices that can be dangerous to following aircraft. The dynamics of such vortices, including ground and atmospheric effects, can be predicted by numerical simulation, allowing the safety and capacity of airports to be improved. We introduce three-dimensional techniques for visualizing time-dependent, two-dimensional wake vortex computations, and the hazard strength of such vortices near the ground. We describe a vortex core tracing algorithm and a local tiling method to visualize the vortex evolution. The tiling method converts time-dependent, two-dimensional vortex cores into three-dimensional vortex tubes. Finally, a novel approach is used to calculate the induced rolling moment on the following airplane at each grid point within a region near the vortex tubes and thus allows three-dimensional visualization of the hazard strength of the vortices.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Air flowing around the wing tips of an airplane forms horizontal tornado-like vortices that can be dangerous to following aircraft. The dynamics of such vortices, including ground and atmospheric effects, can be predicted by numerical simulation, allowing the safety and capacity of airports to be improved. We introduce three-dimensional techniques for visualizing time-dependent, two-dimensional wake vortex computations, and the hazard strength of such vortices near the ground. We describe a vortex core tracing algorithm and a local tiling method to visualize the vortex evolution. The tiling method converts time-dependent, two-dimensional vortex cores into three-dimensional vortex tubes. Finally, a novel approach is used to calculate the induced rolling moment on the following airplane at each grid point within a region near the vortex tubes and thus allows three-dimensional visualization of the hazard strength of the vortices.", "fno": "00346328", "keywords": [ "Data Visualisation", "Aerospace Computing", "Digital Simulation", "Physics Computing", "Rendering Computer Graphics", "3 D Visualization", "Unsteady 2 D Airplane Wake Vortices", "Air Flow", "Wing Tips", "Airplane", "Horizontal Tornado Like Vortices", "Aircraft", "Atmospheric Effects", "Ground Effects", "Numerical Simulation", "Three Dimensional Techniques", "Visualization", "Two Dimensional Wake Vortex Computation", "Hazard Strength", "Vortex Core Tracing Algorithm", "Local Tiling Method", "Vortex Evolution", "Two Dimensional Vortex Cores", "Three Dimensional Vortex Tubes", "Induced Rolling Moment", "Three Dimensional Visualization", "Visualization", "Airplanes", "Hazards", "Aircraft", "Airports", "Skeleton", "Postal Services", "NASA", "Numerical Simulation", "Air Safety" ], "authors": [ { "affiliation": "Inst. for Comput. Applications in Sci. & Eng., NASA Langley Res. Center, Hampton, VA, USA", "fullName": "Kwan-Liu Ma", "givenName": null, "surname": "Kwan-Liu Ma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Z.C. Zheng", "givenName": "Z.C.", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "visual", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1994-01-01T00:00:00", "pubType": "proceedings", "pages": "124-131, CP13", "year": "1994", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00346327", "articleId": "12OmNAIvcXE", "__typename": "AdjacentArticleType" }, "next": { "fno": "00346329", "articleId": "12OmNx6PiB1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/visual/1994/6627/0/00346327", "title": "Vortex tubes in turbulent flows: identification, representation, reconstruction", "doi": null, "abstractUrl": "/proceedings-article/visual/1994/00346327/12OmNAIvcXE", "parentPublication": { "id": "proceedings/visual/1994/6627/0", "title": "Proceedings Visualization '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/real/1992/3195/0/00242654", "title": "The Airplane Information Management System: an integrated real-time flight-deck control system", "doi": null, "abstractUrl": "/proceedings-article/real/1992/00242654/12OmNrIJqxQ", "parentPublication": { "id": "proceedings/real/1992/3195/0", "title": "Proceedings Real-Time Systems Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2017/2820/0/2820a309", "title": "Aspects Regarding Airplane Propeller Flow Field Mathematical Model", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2017/2820a309/12OmNrMZpkx", "parentPublication": { "id": "proceedings/mcsi/2017/2820/0", "title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1999/1966/0/19660062", "title": "Numerical Simulation and Immersive Visualization of Hairpin Vortices", "doi": null, "abstractUrl": "/proceedings-article/sc/1999/19660062/12OmNvT2p7j", "parentPublication": { "id": "proceedings/sc/1999/1966/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061412", "title": "Visualizing Particle/Flow Structure Interactions in the Small Bronchial Tubes", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061412/13rRUB7a10V", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122088", "title": "Adaptive Extraction and Quantification of Geophysical Vortices", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122088/13rRUyeTVhX", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0/08029525", "title": "Industrial Big Data Visualization: A Case Study Using Flight Data Recordings to Discover the Factors Affecting the Airplane Fuel Efficiency", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-icess/2017/08029525/17D45Vw15vB", "parentPublication": { "id": "proceedings/trustcom-bigdatase-icess/2017/4906/0", "title": "2017 IEEE Trustcom/BigDataSE/ICESS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1999/1966/0/01592705", "title": "Numerical Simulation and Immersive Visualization of Hairpin Vortices", "doi": null, "abstractUrl": "/proceedings-article/sc/1999/01592705/1D85OmvXRV6", "parentPublication": { "id": "proceedings/sc/1999/1966/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09556604", "title": "Interactive Exploration of Physically-Observable Objective Vortices in Unsteady 2D Flow", "doi": null, "abstractUrl": "/journal/tg/2022/01/09556604/1xlvXSp8cco", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwKoZd7", "title": "2017 IEEE 7th Symposium on Large Data Analysis and Visualization (LDAV)", "acronym": "ldav", "groupId": "1800568", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzBwGrc", "doi": "10.1109/LDAV.2017.8231846", "title": "Task-based augmented merge trees with Fibonacci heaps", "normalizedTitle": "Task-based augmented merge trees with Fibonacci heaps", "abstract": "This paper presents a new algorithm for the fast, shared memory multi-core computation of augmented merge trees on triangulations. In contrast to most existing parallel algorithms, our technique computes augmented trees. This augmentation is required to enable the full extent of merge tree based applications, including data segmentation. Our approach completely revisits the traditional, sequential merge tree algorithm to re-formulate the computation as a set of independent local tasks based on Fibonacci heaps. This results in superior time performance in practice, in sequential as well as in parallel thanks to the OpenMP task runtime. In the context of augmented contour tree computation, we show that a direct usage of our merge tree procedure also results in superior time performance overall, both in sequential and parallel. We report performance numbers that compare our approach to reference sequential and multi-threaded implementations for the computation of augmented merge and contour trees. These experiments demonstrate the runtime efficiency of our approach as well as its scalability on common workstations. We demonstrate the utility of our approach in data segmentation applications. We also provide a lightweight VTK-based C++ implementation of our approach for reproduction purposes.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a new algorithm for the fast, shared memory multi-core computation of augmented merge trees on triangulations. In contrast to most existing parallel algorithms, our technique computes augmented trees. This augmentation is required to enable the full extent of merge tree based applications, including data segmentation. Our approach completely revisits the traditional, sequential merge tree algorithm to re-formulate the computation as a set of independent local tasks based on Fibonacci heaps. This results in superior time performance in practice, in sequential as well as in parallel thanks to the OpenMP task runtime. In the context of augmented contour tree computation, we show that a direct usage of our merge tree procedure also results in superior time performance overall, both in sequential and parallel. We report performance numbers that compare our approach to reference sequential and multi-threaded implementations for the computation of augmented merge and contour trees. These experiments demonstrate the runtime efficiency of our approach as well as its scalability on common workstations. We demonstrate the utility of our approach in data segmentation applications. We also provide a lightweight VTK-based C++ implementation of our approach for reproduction purposes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a new algorithm for the fast, shared memory multi-core computation of augmented merge trees on triangulations. In contrast to most existing parallel algorithms, our technique computes augmented trees. This augmentation is required to enable the full extent of merge tree based applications, including data segmentation. Our approach completely revisits the traditional, sequential merge tree algorithm to re-formulate the computation as a set of independent local tasks based on Fibonacci heaps. This results in superior time performance in practice, in sequential as well as in parallel thanks to the OpenMP task runtime. In the context of augmented contour tree computation, we show that a direct usage of our merge tree procedure also results in superior time performance overall, both in sequential and parallel. We report performance numbers that compare our approach to reference sequential and multi-threaded implementations for the computation of augmented merge and contour trees. These experiments demonstrate the runtime efficiency of our approach as well as its scalability on common workstations. We demonstrate the utility of our approach in data segmentation applications. We also provide a lightweight VTK-based C++ implementation of our approach for reproduction purposes.", "fno": "08231846", "keywords": [ "Algorithm Design And Analysis", "Data Analysis", "Data Visualization", "Feature Extraction", "Electronic Mail", "Runtime" ], "authors": [ { "affiliation": "Kitware SAS, Sorbonne Universites, UPMC Univ Paris 06, CNRS, LIP6 UMR7606, France", "fullName": "Charles Gueunet", "givenName": "Charles", "surname": "Gueunet", "__typename": "ArticleAuthorType" }, { "affiliation": "Sorbonne Universites, UPMC Univ Paris 06, CNRS, LIP6UMR7606, France", "fullName": "Pierre Fortin", "givenName": "Pierre", "surname": "Fortin", "__typename": "ArticleAuthorType" }, { "affiliation": "Kitware SAS, France", "fullName": "Julien Jomier", "givenName": "Julien", "surname": "Jomier", "__typename": "ArticleAuthorType" }, { "affiliation": "Sorbonne Universites, UPMC Univ Paris 06, CNRS, LIP6 UMR 7606, France", "fullName": "Julien Tierny", "givenName": "Julien", "surname": "Tierny", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "6-15", "year": "2017", "issn": null, "isbn": "978-1-5386-0617-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08231845", "articleId": "12OmNrkBwvF", "__typename": "AdjacentArticleType" }, "next": { "fno": "08231847", "articleId": "12OmNzyGHaa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ldav/2016/5659/0/07874333", "title": "Contour forests: Fast multi-threaded augmented contour trees", "doi": null, "abstractUrl": "/proceedings-article/ldav/2016/07874333/12OmNx9FhTQ", "parentPublication": { "id": "proceedings/ldav/2016/5659/0", "title": "2016 IEEE 6th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08481543", "title": "Edit Distance between Merge Trees", "doi": null, "abstractUrl": "/journal/tg/2020/03/08481543/146z4GS1UPK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/08/08637719", "title": "Task-Based Augmented Contour Trees with Fibonacci Heaps", "doi": null, "abstractUrl": "/journal/td/2019/08/08637719/17D45VsBU7G", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903344", "title": "Temporal Merge Tree Maps: A Topology-Based Static Visualization for Temporal Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903344/1GZooFK65GM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09920234", "title": "Principal Geodesic Analysis of Merge Trees (and Persistence Diagrams)", "doi": null, "abstractUrl": "/journal/tg/2023/02/09920234/1HxSnktOqgU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a029", "title": "A Deformation-based Edit Distance for Merge Trees", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a029/1J2XJrPDCgM", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a001", "title": "Fast Merge Tree Computation via SYCL", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a001/1J2XKMu23tu", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794553", "title": "A Structural Average of Labeled Merge Trees for Uncertainty Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794553/1fe7uYD8R68", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/08/09420248", "title": "Unordered Task-Parallel Augmented Merge Tree Construction", "doi": null, "abstractUrl": "/journal/tg/2021/08/09420248/1tdUMuQErm0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555911", "title": "Wasserstein Distances, Geodesics and Barycenters of Merge Trees", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555911/1xlvYjicn7i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J2XJb8ZJ9C", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "acronym": "topoinvis", "groupId": "1848466", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J2XJrPDCgM", "doi": "10.1109/TopoInVis57755.2022.00010", "title": "A Deformation-based Edit Distance for Merge Trees", "normalizedTitle": "A Deformation-based Edit Distance for Merge Trees", "abstract": "In scientific visualization, scalar fields are often compared through edit distances between their merge trees. Typical tasks include ensemble analysis, feature tracking and symmetry or periodicity detection. Tree edit distances represent how one tree can be transformed into another through a sequence of simple edit operations: relabeling, insertion and deletion of nodes. In this paper, we present a new set of edit operations working directly on the merge tree as an geometrical or topological object: the represented operations are deformation retractions and inverse transformations on merge trees, which stands in contrast to other methods working on branch decomposition trees. We present a quartic time algorithm for the new edit distance, which is branch decomposition-independent and a metric on the set of all merge trees.", "abstracts": [ { "abstractType": "Regular", "content": "In scientific visualization, scalar fields are often compared through edit distances between their merge trees. Typical tasks include ensemble analysis, feature tracking and symmetry or periodicity detection. Tree edit distances represent how one tree can be transformed into another through a sequence of simple edit operations: relabeling, insertion and deletion of nodes. In this paper, we present a new set of edit operations working directly on the merge tree as an geometrical or topological object: the represented operations are deformation retractions and inverse transformations on merge trees, which stands in contrast to other methods working on branch decomposition trees. We present a quartic time algorithm for the new edit distance, which is branch decomposition-independent and a metric on the set of all merge trees.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In scientific visualization, scalar fields are often compared through edit distances between their merge trees. Typical tasks include ensemble analysis, feature tracking and symmetry or periodicity detection. Tree edit distances represent how one tree can be transformed into another through a sequence of simple edit operations: relabeling, insertion and deletion of nodes. In this paper, we present a new set of edit operations working directly on the merge tree as an geometrical or topological object: the represented operations are deformation retractions and inverse transformations on merge trees, which stands in contrast to other methods working on branch decomposition trees. We present a quartic time algorithm for the new edit distance, which is branch decomposition-independent and a metric on the set of all merge trees.", "fno": "935400a029", "keywords": [ "Computational Geometry", "Data Visualisation", "Merging", "Trees Mathematics", "Branch Decomposition Trees", "Deformation Retractions", "Deformation Based Edit Distance", "Edit Operations", "Ensemble Analysis", "Feature Tracking", "Geometrical Object", "Inverse Transformations", "Merge Tree", "Node Deletion", "Node Insertion", "Node Relabeling", "Periodicity Detection", "Quartic Time Algorithm", "Scalar Fields", "Scientific Visualization", "Symmetry Detection", "Topological Object", "Tree Edit Distances", "Measurement", "Data Analysis", "Data Visualization", "Feature Extraction", "Task Analysis", "Strain", "Scalar Data", "Topological Data Analysis", "Merge Trees", "Edit Distance" ], "authors": [ { "affiliation": "TU Kaiserslautern", "fullName": "Florian Wetzels", "givenName": "Florian", "surname": "Wetzels", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Kaiserslautern", "fullName": "Christoph Garth", "givenName": "Christoph", "surname": "Garth", "__typename": "ArticleAuthorType" } ], "idPrefix": "topoinvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "29-38", "year": "2022", "issn": null, "isbn": "978-1-6654-9354-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J2XJp33vby", "name": "ptopoinvis202293540-09975820s1-mm_935400a029.zip", "size": "122 kB", "location": "https://www.computer.org/csdl/api/v1/extra/ptopoinvis202293540-09975820s1-mm_935400a029.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "935400a018", "articleId": "1J2XJI32OZi", "__typename": "AdjacentArticleType" }, "next": { "fno": "935400a039", "articleId": "1J2XLG1rYo8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ldav/2017/0617/0/08231846", "title": "Task-based augmented merge trees with Fibonacci heaps", "doi": null, "abstractUrl": "/proceedings-article/ldav/2017/08231846/12OmNzBwGrc", "parentPublication": { "id": "proceedings/ldav/2017/0617/0", "title": "2017 IEEE 7th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/03/08481543", "title": "Edit Distance between Merge Trees", "doi": null, "abstractUrl": "/journal/tg/2020/03/08481543/146z4GS1UPK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545613", "title": "Segmentation Edit Distance", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545613/17D45X0yjTI", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912347", "title": "Computing a Stable Distance on Merge Trees", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912347/1HeiTQ2soFO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a001", "title": "Fast Merge Tree Computation via SYCL", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a001/1J2XKMu23tu", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2022/5519/0/551900a686", "title": "&#x00D5;(n+poly(k))-time Algorithm for Bounded Tree Edit Distance", "doi": null, "abstractUrl": "/proceedings-article/focs/2022/551900a686/1JtvV8r0RnG", "parentPublication": { "id": "proceedings/focs/2022/5519/0", "title": "2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794553", "title": "A Structural Average of Labeled Merge Trees for Uncertainty Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794553/1fe7uYD8R68", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/08/09420248", "title": "Unordered Task-Parallel Augmented Merge Tree Construction", "doi": null, "abstractUrl": "/journal/tg/2021/08/09420248/1tdUMuQErm0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555911", "title": "Wasserstein Distances, Geodesics and Barycenters of Merge Trees", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555911/1xlvYjicn7i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/02/09585392", "title": "Comparative Analysis of Merge Trees Using Local Tree Edit Distance", "doi": null, "abstractUrl": "/journal/tg/2023/02/09585392/1y11d1nDEas", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeKpVhavUk", "doi": "10.1109/CVPR46437.2021.01651", "title": "Wasserstein Barycenter for Multi-Source Domain Adaptation", "normalizedTitle": "Wasserstein Barycenter for Multi-Source Domain Adaptation", "abstract": "Multi-source domain adaptation is a key technique that allows a model to be trained on data coming from various probability distribution. To overcome the challenges posed by this learning scenario, we propose a method for constructing an intermediate domain between sources and target domain, the Wasserstein Barycenter Transport (WBT). This method relies on the barycenter on Wasserstein spaces for aggregating the source probability distributions. Once the sources have been aggregated, they are transported to the target domain using standard Optimal Transport for Domain Adaptation framework. Additionally, we revisit previous single-source domain adaptation tasks in the context of multi-source scenario. In particular, we apply our algorithm to object and face recognition datasets. Moreover, to diversify the range of applications, we also examine the tasks of music genre recognition and music-speech discrimination. The experiments show that our method has similar performance with the existing state-of-the-art.", "abstracts": [ { "abstractType": "Regular", "content": "Multi-source domain adaptation is a key technique that allows a model to be trained on data coming from various probability distribution. To overcome the challenges posed by this learning scenario, we propose a method for constructing an intermediate domain between sources and target domain, the Wasserstein Barycenter Transport (WBT). This method relies on the barycenter on Wasserstein spaces for aggregating the source probability distributions. Once the sources have been aggregated, they are transported to the target domain using standard Optimal Transport for Domain Adaptation framework. Additionally, we revisit previous single-source domain adaptation tasks in the context of multi-source scenario. In particular, we apply our algorithm to object and face recognition datasets. Moreover, to diversify the range of applications, we also examine the tasks of music genre recognition and music-speech discrimination. The experiments show that our method has similar performance with the existing state-of-the-art.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Multi-source domain adaptation is a key technique that allows a model to be trained on data coming from various probability distribution. To overcome the challenges posed by this learning scenario, we propose a method for constructing an intermediate domain between sources and target domain, the Wasserstein Barycenter Transport (WBT). This method relies on the barycenter on Wasserstein spaces for aggregating the source probability distributions. Once the sources have been aggregated, they are transported to the target domain using standard Optimal Transport for Domain Adaptation framework. Additionally, we revisit previous single-source domain adaptation tasks in the context of multi-source scenario. In particular, we apply our algorithm to object and face recognition datasets. Moreover, to diversify the range of applications, we also examine the tasks of music genre recognition and music-speech discrimination. The experiments show that our method has similar performance with the existing state-of-the-art.", "fno": "450900q6780", "keywords": [ "Face Recognition", "Music", "Speech Processing", "Statistical Distributions", "Multisource Domain Adaptation", "Intermediate Domain", "Target Domain", "Wasserstein Barycenter Transport", "Wasserstein Spaces", "Source Probability Distributions", "Single Source Domain Adaptation", "Multisource Scenario", "Optimal Transport", "Face Recognition Dataset", "Object Recognition Dataset", "Music Genre Recognition", "Music Speech Discrimination", "Visualization", "Computer Vision", "Adaptation Models", "Face Recognition", "Probability Distribution", "Data Models", "Acoustics" ], "authors": [ { "affiliation": "Universidade Federal do Ceará,Fortaleza,Brazil", "fullName": "Eduardo Fernandes Montesuma", "givenName": "Eduardo Fernandes", "surname": "Montesuma", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal do Ceará,Fortaleza,Brazil", "fullName": "Fred Maurice Ngolè Mboula", "givenName": "Fred Maurice Ngolè", "surname": "Mboula", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "16780-16788", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeKpQvXGDe", "name": "pcvpr202145090-09577917s1-mm_450900q6780.zip", "size": "192 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09577917s1-mm_450900q6780.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900q6770", "articleId": "1yeLy6xFMly", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900q6789", "articleId": "1yeKm2YiUE0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2021/0126/0/09669383", "title": "Wasserstein-Distance-Based Multi-Source Adversarial Domain Adaptation for Emotion Recognition and Vigilance Estimation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669383/1A9WdKK4yly", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500b071", "title": "Coupled Training for Multi-Source Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500b071/1B13kyds3jG", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i958", "title": "Generalized Source-free Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i958/1BmGNO3lWDu", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859733", "title": "Discovering Domain Disentanglement for Generalized Multi-Source Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859733/1G9DVc8vmso", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956207", "title": "Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956207/1IHoOpEoniE", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300k0277", "title": "Sliced Wasserstein Discrepancy for Unsupervised Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300k0277/1gyrYacs8nK", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300b406", "title": "Moment Matching for Multi-Source Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300b406/1hQqw0xxRtu", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g499", "title": "Normalized Wasserstein for Mixture Distributions With Applications in Adversarial Learning and Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g499/1hVl7W0qz9m", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102756", "title": "Category-Level Adversarial Self-Ensembling for Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102756/1kwqPFnZte0", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/06/09160895", "title": "Iterative Refinement for Multi-Source Visual Domain Adaptation", "doi": null, "abstractUrl": "/journal/tk/2022/06/09160895/1m4yzbKri1i", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1IT0z7XBBgA", "title": "2022 IEEE 12th Symposium on Large Data Analysis and Visualization (LDAV)", "acronym": "ldav", "groupId": "9966414", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1IT0Ck3lBg4", "doi": "10.1109/LDAV57265.2022.9966403", "title": "Topological Analysis of Ensembles of Hydrodynamic Turbulent Flows An Experimental Study", "normalizedTitle": "Topological Analysis of Ensembles of Hydrodynamic Turbulent Flows An Experimental Study", "abstract": "This application paper presents a comprehensive experimental eval-uation of the suitability of Topological Data Analysis (TDA) for the quantitative comparison of turbulent flows. Specifically, our study documents the usage of the persistence diagram of the max-ima of flow enstrophy (an established vorticity indicator), for the topological representation of 180 ensemble members, generated by a coarse sampling of the parameter space of five numerical solvers. We document five main hypotheses reported by domain experts, describing their expectations regarding the variability of the flows generated by the distinct solver configurations. We contribute three evaluation protocols to assess the validation of the above hypothe-ses by two comparison measures: (i) a standard distance used in scientific imaging (the <tex>Z_$L_{2}$_Z</tex> norm) and (ii) an established topological distance between persistence diagrams (the <tex>Z_$L_{2}$_Z</tex> -Wasserstein metric). Extensive experiments on the input ensemble demonstrate the supe-riority of the topological distance (ii) to report as close to each other flows which are expected to be similar by domain experts, due to the configuration of their vortices. Overall, the insights reported by our study bring an experimental evidence of the suitability of TDA for representing and comparing turbulent flows, thereby providing to the fluid dynamics community confidence for its usage in future work. Also, our flow data and evaluation protocols provide to the TDA community an application-approved benchmark for the evaluation and design of further topological distances.", "abstracts": [ { "abstractType": "Regular", "content": "This application paper presents a comprehensive experimental eval-uation of the suitability of Topological Data Analysis (TDA) for the quantitative comparison of turbulent flows. Specifically, our study documents the usage of the persistence diagram of the max-ima of flow enstrophy (an established vorticity indicator), for the topological representation of 180 ensemble members, generated by a coarse sampling of the parameter space of five numerical solvers. We document five main hypotheses reported by domain experts, describing their expectations regarding the variability of the flows generated by the distinct solver configurations. We contribute three evaluation protocols to assess the validation of the above hypothe-ses by two comparison measures: (i) a standard distance used in scientific imaging (the <tex>$L_{2}$</tex> norm) and (ii) an established topological distance between persistence diagrams (the <tex>$L_{2}$</tex> -Wasserstein metric). Extensive experiments on the input ensemble demonstrate the supe-riority of the topological distance (ii) to report as close to each other flows which are expected to be similar by domain experts, due to the configuration of their vortices. Overall, the insights reported by our study bring an experimental evidence of the suitability of TDA for representing and comparing turbulent flows, thereby providing to the fluid dynamics community confidence for its usage in future work. Also, our flow data and evaluation protocols provide to the TDA community an application-approved benchmark for the evaluation and design of further topological distances.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This application paper presents a comprehensive experimental eval-uation of the suitability of Topological Data Analysis (TDA) for the quantitative comparison of turbulent flows. Specifically, our study documents the usage of the persistence diagram of the max-ima of flow enstrophy (an established vorticity indicator), for the topological representation of 180 ensemble members, generated by a coarse sampling of the parameter space of five numerical solvers. We document five main hypotheses reported by domain experts, describing their expectations regarding the variability of the flows generated by the distinct solver configurations. We contribute three evaluation protocols to assess the validation of the above hypothe-ses by two comparison measures: (i) a standard distance used in scientific imaging (the - norm) and (ii) an established topological distance between persistence diagrams (the - -Wasserstein metric). Extensive experiments on the input ensemble demonstrate the supe-riority of the topological distance (ii) to report as close to each other flows which are expected to be similar by domain experts, due to the configuration of their vortices. Overall, the insights reported by our study bring an experimental evidence of the suitability of TDA for representing and comparing turbulent flows, thereby providing to the fluid dynamics community confidence for its usage in future work. Also, our flow data and evaluation protocols provide to the TDA community an application-approved benchmark for the evaluation and design of further topological distances.", "fno": "09966403", "keywords": [ "Data Analysis", "Flow Visualisation", "Geophysical Fluid Dynamics", "Hydrodynamics", "Software Performance Evaluation", "Topology", "Turbulence", "Vortices", "Coarse Sampling", "Evaluation Protocols", "Flow Data", "Flow Enstrophy", "Hydrodynamic Turbulent Flows", "Numerical Solvers", "Parameter Space", "TDA Community", "Topological Data Analysis", "Topological Representation", "Vorticity Indicator", "Wasserstein Metric", "Protocols", "Data Analysis", "Three Dimensional Displays", "Computational Modeling", "Clustering Methods", "Hydrodynamics", "Numerical Models" ], "authors": [ { "affiliation": "CEA", "fullName": "Florent Nauleau", "givenName": "Florent", "surname": "Nauleau", "__typename": "ArticleAuthorType" }, { "affiliation": "CEA", "fullName": "Fabien Vivodtzev", "givenName": "Fabien", "surname": "Vivodtzev", "__typename": "ArticleAuthorType" }, { "affiliation": "CEA", "fullName": "Thibault Bridel-Bertomeu", "givenName": "Thibault", "surname": "Bridel-Bertomeu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bordeaux", "fullName": "Héloïse Beaugendre", "givenName": "Héloïse", "surname": "Beaugendre", "__typename": "ArticleAuthorType" }, { "affiliation": "CNRS", "fullName": "Julien Tierny", "givenName": "Julien", "surname": "Tierny", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-11", "year": "2022", "issn": null, "isbn": "978-1-6654-9156-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09966395", "articleId": "1IT0CzlpPHy", "__typename": "AdjacentArticleType" }, "next": { "fno": "09966394", "articleId": "1IT0D2NIYAE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2016/1437/0/1437b014", "title": "On Time-Series Topological Data Analysis: New Data and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b014/12OmNrnJ6W1", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a384", "title": "Visualizing Dynamic Gene Interactions to Reverse Engineer Gene Regulatory Networks Using Topological Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a384/12OmNwBT1sd", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/07/08249544", "title": "Sparse-TDA: Sparse Realization of Topological Data Analysis for Multi-Way Classification", "doi": null, "abstractUrl": "/journal/tk/2018/07/08249544/13rRUNvyafy", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/05/v1053", "title": "Understanding the Structure of the Turbulent Mixing Layer in Hydrodynamic Instabilities", "doi": null, "abstractUrl": "/journal/tg/2006/05/v1053/13rRUxBa5rN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805446", "title": "Vector Field Topology of Time-Dependent Flows in a Steady Reference Frame", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805446/1cG4GkzNRPG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a202", "title": "Visual Exploration of Circulation Rolls in Convective Heat Flows", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a202/1dlwrj2iD60", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944351", "title": "Topological Analysis of High Velocity Turbulent Flow", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944351/1grOFeq14Aw", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983312", "title": "Topological Data Analysis on Magnetic Resonance Image Biomarkers", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983312/1hgugr5x9ZK", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispds/2020/9668/0/966800a150", "title": "Exploration of Topological Data Analysis In 3D Printing", "doi": null, "abstractUrl": "/proceedings-article/ispds/2020/966800a150/1oRiWPcsMtW", "parentPublication": { "id": "proceedings/ispds/2020/9668/0", "title": "2020 International Conference on Information Science, Parallel and Distributed Systems (ISPDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378216", "title": "Topology Preserving Data Reduction for Computing Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378216/1s64J6qKBvW", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KfQshha0dW", "title": "2022 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "10020192", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KfRC2DMiJy", "doi": "10.1109/BigData55660.2022.10020423", "title": "Stable Topological Feature Vectors via Hermite Function Expansion on Persistence Curves", "normalizedTitle": "Stable Topological Feature Vectors via Hermite Function Expansion on Persistence Curves", "abstract": "Topological data analysis (TDA) is a rising field in the machine learning and has been proven useful in several scientific disciplines. Persistence diagrams are one of main tools in TDA. However, the space of persistence diagram lacks desirable structure for machine learning algorithms. Transforming the space of persistence diagrams into other space is therefore an active research area in TDA. The recently developed persistence framework transforms persistence diagrams into functions and has shown promising performance. In this article, we derive a grid-free representation of persistence curves that is efficient to compute and effective in machine learning tasks. Towards this end, we consider the coefficients of Hermite function expansion on persistence curves. The main contribution of this article is twofold. First, we find the explicit expression of the coefficients, derive their recursive relation for efficient computation, and prove the stability result. Second, we apply these coefficients on two classification problems in texture analysis, and sleep stages. We find that the performance is comparable with existing methods or in some cases outperforming the state-of-arts method.", "abstracts": [ { "abstractType": "Regular", "content": "Topological data analysis (TDA) is a rising field in the machine learning and has been proven useful in several scientific disciplines. Persistence diagrams are one of main tools in TDA. However, the space of persistence diagram lacks desirable structure for machine learning algorithms. Transforming the space of persistence diagrams into other space is therefore an active research area in TDA. The recently developed persistence framework transforms persistence diagrams into functions and has shown promising performance. In this article, we derive a grid-free representation of persistence curves that is efficient to compute and effective in machine learning tasks. Towards this end, we consider the coefficients of Hermite function expansion on persistence curves. The main contribution of this article is twofold. First, we find the explicit expression of the coefficients, derive their recursive relation for efficient computation, and prove the stability result. Second, we apply these coefficients on two classification problems in texture analysis, and sleep stages. We find that the performance is comparable with existing methods or in some cases outperforming the state-of-arts method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topological data analysis (TDA) is a rising field in the machine learning and has been proven useful in several scientific disciplines. Persistence diagrams are one of main tools in TDA. However, the space of persistence diagram lacks desirable structure for machine learning algorithms. Transforming the space of persistence diagrams into other space is therefore an active research area in TDA. The recently developed persistence framework transforms persistence diagrams into functions and has shown promising performance. In this article, we derive a grid-free representation of persistence curves that is efficient to compute and effective in machine learning tasks. Towards this end, we consider the coefficients of Hermite function expansion on persistence curves. The main contribution of this article is twofold. First, we find the explicit expression of the coefficients, derive their recursive relation for efficient computation, and prove the stability result. Second, we apply these coefficients on two classification problems in texture analysis, and sleep stages. We find that the performance is comparable with existing methods or in some cases outperforming the state-of-arts method.", "fno": "10020423", "keywords": [ "Data Analysis", "Feature Extraction", "Learning Artificial Intelligence", "Stability", "Topology", "Hermite Function Expansion", "Machine Learning Algorithms", "Persistence Diagram", "Stability Result", "Stable Topological Feature Vectors", "TDA", "Topological Data Analysis", "Machine Learning Algorithms", "Data Analysis", "Machine Learning", "Transforms", "Big Data", "Power System Stability", "Stability Analysis" ], "authors": [ { "affiliation": "AADS Eli Lilly and Company,Indianapolis,USA", "fullName": "Yu-Min Chung", "givenName": "Yu-Min", "surname": "Chung", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "5434-5443", "year": "2022", "issn": null, "isbn": "978-1-6654-8045-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10020836", "articleId": "1KfRY4lD3IQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "10021127", "articleId": "1KfR9CUF6rC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2014/5118/0/5118c003", "title": "Persistence-Based Structural Recognition", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118c003/12OmNAoUTq1", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2016/1437/0/1437b014", "title": "On Time-Series Topological Data Analysis: New Data and Opportunities", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2016/1437b014/12OmNrnJ6W1", "parentPublication": { "id": "proceedings/cvprw/2016/1437/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622175", "title": "Topological approaches to skin disease image analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622175/17D45XeKgnd", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2022/9156/0/09966403", "title": "Topological Analysis of Ensembles of Hydrodynamic Turbulent Flows An Experimental Study", "doi": null, "abstractUrl": "/proceedings-article/ldav/2022/09966403/1IT0Ck3lBg4", "parentPublication": { "id": "proceedings/ldav/2022/9156/0", "title": "2022 IEEE 12th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300g116", "title": "Polynomial Representation for Persistence Diagram", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300g116/1gyriRz1KnK", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150874", "title": "Smooth Summaries of Persistence Diagrams and Texture Classification", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150874/1lPH0I4ZRQY", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151070", "title": "PI-Net: A Deep Learning Approach to Extract Topological Persistence Images", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151070/1lPHfl0ffna", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222093", "title": "Localized Topological Simplification of Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222093/1nTrExzmT5e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412768", "title": "A Hybrid Metric based on Persistent Homology and its Application to Signal Classification", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412768/1tmhAJtw0yk", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2021/0191/0/1.91E163", "title": "Two-parameter Persistence for Images via Distance Transform", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2021/1.91E163/1yNii9dupuo", "parentPublication": { "id": "proceedings/iccvw/2021/0191/0", "title": "2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LKwzeGwAZa", "title": "2023 International Conference on Computing, Networking and Communications (ICNC)", "acronym": "icnc", "groupId": "10073968", "volume": "0", "displayVolume": "0", "year": "2023", "__typename": "ProceedingType" }, "article": { "id": "1LKwEhgRbQ4", "doi": "10.1109/ICNC57223.2023.10074146", "title": "Evaluating Generative Adversarial Networks: A Topological Approach", "normalizedTitle": "Evaluating Generative Adversarial Networks: A Topological Approach", "abstract": "Generative adversarial networks (GANs) are an approach to generative modelling using deep learning methods, such as convolution neural networks. Evaluating the performance of GANs has been a challenging task. In this paper, we will show how concepts from algebraic topology, and in particular persistent homology can be used for comparing the geometric and topological features of the latent manifold of real data with those of generated ones. We built a Vietoris-Rips complex to present persistence diagrams. As an evaluating metric between two diagrams of manifolds, we apply a framework which is a reformulation of the Wasserstein distance as an Optimal transport problem, called the WOT Distance. We compare the WOT Distance with the other topological structure metrics, Geometric score (GS) and Topological Distance (TD) on various data sets. Evaluation results demonstrate that our method achieves superior performance in GANs learning.", "abstracts": [ { "abstractType": "Regular", "content": "Generative adversarial networks (GANs) are an approach to generative modelling using deep learning methods, such as convolution neural networks. Evaluating the performance of GANs has been a challenging task. In this paper, we will show how concepts from algebraic topology, and in particular persistent homology can be used for comparing the geometric and topological features of the latent manifold of real data with those of generated ones. We built a Vietoris-Rips complex to present persistence diagrams. As an evaluating metric between two diagrams of manifolds, we apply a framework which is a reformulation of the Wasserstein distance as an Optimal transport problem, called the WOT Distance. We compare the WOT Distance with the other topological structure metrics, Geometric score (GS) and Topological Distance (TD) on various data sets. Evaluation results demonstrate that our method achieves superior performance in GANs learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generative adversarial networks (GANs) are an approach to generative modelling using deep learning methods, such as convolution neural networks. Evaluating the performance of GANs has been a challenging task. In this paper, we will show how concepts from algebraic topology, and in particular persistent homology can be used for comparing the geometric and topological features of the latent manifold of real data with those of generated ones. We built a Vietoris-Rips complex to present persistence diagrams. As an evaluating metric between two diagrams of manifolds, we apply a framework which is a reformulation of the Wasserstein distance as an Optimal transport problem, called the WOT Distance. We compare the WOT Distance with the other topological structure metrics, Geometric score (GS) and Topological Distance (TD) on various data sets. Evaluation results demonstrate that our method achieves superior performance in GANs learning.", "fno": "10074146", "keywords": [ "Algebra", "Convolutional Neural Nets", "Deep Learning Artificial Intelligence", "Geometry", "Topology", "Algebraic Topology", "Convolution Neural Networks", "Deep Learning", "GAN Learning", "Generative Adversarial Networks", "Generative Modelling", "Geometric Features", "Latent Manifold", "Persistence Diagrams", "Persistent Homology", "Topological Approach", "Topological Features", "Topological Structure Metrics", "Vietoris Rips Complex", "Wasserstein Distance As An Optimal Transport Problem", "WOT Distance", "Measurement", "Manifolds", "Training", "Analytical Models", "Network Topology", "Computational Modeling", "Generative Adversarial Networks", "Evaluation Metrics", "Topological Data Analysis", "Persistent Homology" ], "authors": [ { "affiliation": "Toronto Metropolitan University,Department of Computer Science,Toronto,Canada", "fullName": "Narges Alipourjeddi", "givenName": "Narges", "surname": "Alipourjeddi", "__typename": "ArticleAuthorType" }, { "affiliation": "Toronto Metropolitan University,Department of Computer Science,Toronto,Canada", "fullName": "Ali Miri", "givenName": "Ali", "surname": "Miri", "__typename": "ArticleAuthorType" } ], "idPrefix": "icnc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2023-02-01T00:00:00", "pubType": "proceedings", "pages": "202-206", "year": "2023", "issn": null, "isbn": "978-1-6654-5719-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10074070", "articleId": "1LKwHMcmWWY", "__typename": "AdjacentArticleType" }, "next": { "fno": "10074454", "articleId": "1LKwEI9VmKY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aipr/2017/1235/0/08457952", "title": "Generative Adversarial Networks for Classification", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457952/13xI8AQ5AJ6", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486440", "title": "Densely Stacked Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486440/14jQfSnkWGs", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545881", "title": "MMGAN: Manifold-Matching Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000j455", "title": "ST-GAN: Spatial Transformer Generative Adversarial Networks for Image Compositing", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000j455/17D45XacGkf", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2018/9306/0/08707431", "title": "On Evaluating Video-based Generative Adversarial Networks (GANs)", "doi": null, "abstractUrl": "/proceedings-article/aipr/2018/08707431/19ZKYvI47BK", "parentPublication": { "id": "proceedings/aipr/2018/9306/0", "title": "2018 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a295", "title": "Evaluating and Explaining Generative Adversarial Networks for Continual Learning under Concept Drift", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a295/1AjSMykOQEg", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g353", "title": "Gradient Normalization for Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g353/1BmILJHle2A", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956292", "title": "Label Geometry Aware Discriminator for Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956292/1IHqBHRVHNe", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/03/09165932", "title": "SphereGAN: Sphere Generative Adversarial Network Based on Geometric Moment Matching and its Applications", "doi": null, "abstractUrl": "/journal/tp/2022/03/09165932/1mevSGtbazC", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412727", "title": "AVAE: Adversarial Variational Auto Encoder", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412727/1tmiJl4aMUw", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxTEiSt", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNCbCrKh", "doi": "10.1109/PACIFICVIS.2016.7465267", "title": "Multilayer graph edge bundling", "normalizedTitle": "Multilayer graph edge bundling", "abstract": "Many real world information can be represented by a graph with a set of nodes interconnected with each other by multiple type of relations called edge layers (e.g., social network, biological data). Edge bundling techniques have been proposed to solve cluttering issue for standard graphs while few efforts were done to deal with the similar issue for multilayer graphs. In multilayer graphs scenario, not only the clutter induced by large amount of edges is a problem but also the fact that different type of edges can overlap each other making useless the final visualization. In this paper we introduce a new multilayer graph edge bundling technique that firstly produces a preliminary edge bundling independently of the different edge layers and then deals with the specificity of multilayer graphs where more than one type of edges can be routed on the same bundle. The proposed visualization is tested on a real world case study and the outcomes point out the ability of our proposal to discover patterns present in the data.", "abstracts": [ { "abstractType": "Regular", "content": "Many real world information can be represented by a graph with a set of nodes interconnected with each other by multiple type of relations called edge layers (e.g., social network, biological data). Edge bundling techniques have been proposed to solve cluttering issue for standard graphs while few efforts were done to deal with the similar issue for multilayer graphs. In multilayer graphs scenario, not only the clutter induced by large amount of edges is a problem but also the fact that different type of edges can overlap each other making useless the final visualization. In this paper we introduce a new multilayer graph edge bundling technique that firstly produces a preliminary edge bundling independently of the different edge layers and then deals with the specificity of multilayer graphs where more than one type of edges can be routed on the same bundle. The proposed visualization is tested on a real world case study and the outcomes point out the ability of our proposal to discover patterns present in the data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many real world information can be represented by a graph with a set of nodes interconnected with each other by multiple type of relations called edge layers (e.g., social network, biological data). Edge bundling techniques have been proposed to solve cluttering issue for standard graphs while few efforts were done to deal with the similar issue for multilayer graphs. In multilayer graphs scenario, not only the clutter induced by large amount of edges is a problem but also the fact that different type of edges can overlap each other making useless the final visualization. In this paper we introduce a new multilayer graph edge bundling technique that firstly produces a preliminary edge bundling independently of the different edge layers and then deals with the specificity of multilayer graphs where more than one type of edges can be routed on the same bundle. The proposed visualization is tested on a real world case study and the outcomes point out the ability of our proposal to discover patterns present in the data.", "fno": "07465267", "keywords": [ "I 3 3 Computer Graphics Picture Image Generation Line And Curve Generation" ], "authors": [ { "affiliation": "LaBRI, Université de Bordeaux, France", "fullName": "Romain Bourqui", "givenName": "Romain", "surname": "Bourqui", "__typename": "ArticleAuthorType" }, { "affiliation": "IRSTEA-UMR TETIS, Montpellier, France", "fullName": "Dino Ienco", "givenName": "Dino", "surname": "Ienco", "__typename": "ArticleAuthorType" }, { "affiliation": "LIRMM - Université Paul Valéry, Montpellier, France", "fullName": "Arnaud Sallaberry", "givenName": "Arnaud", "surname": "Sallaberry", "__typename": "ArticleAuthorType" }, { "affiliation": "LIRMM Université de Montpellier, France", "fullName": "Pascal Poncelet", "givenName": "Pascal", "surname": "Poncelet", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-04-01T00:00:00", "pubType": "proceedings", "pages": "184-188", "year": "2016", "issn": "2165-8773", "isbn": "978-1-5090-1451-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07465266", "articleId": "12OmNwsNRfs", "__typename": "AdjacentArticleType" }, "next": { "fno": "07465268", "articleId": "12OmNCga1Ul", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156354", "title": "Attribute-driven edge bundling for general graphs with applications in trail analysis", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156354/12OmNCaLEnG", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571244", "title": "3D Edge Bundling for Geographical Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571244/12OmNqzu6LL", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a466", "title": "Research on Network Simplification by Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a466/12OmNyQpgKZ", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2013/5049/0/5049a028", "title": "Edge Bundling by Rapidly-Exploring Random Trees", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a028/12OmNz5s0F9", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a094", "title": "On Edge Bundling and Node Layout for Mutually Connected Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a094/12OmNzwZ6qg", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/05/ttg2012050810", "title": "Ambiguity-Free Edge-Bundling for Interactive Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2012/05/ttg2012050810/13rRUxASuby", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122354", "title": "Divided Edge Bundling for Directional Network Data", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122354/13rRUzpzeB1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz61dBt", "title": "2010 14th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzu6LL", "doi": "10.1109/IV.2010.53", "title": "3D Edge Bundling for Geographical Data Visualization", "normalizedTitle": "3D Edge Bundling for Geographical Data Visualization", "abstract": "Visualization of graphs containing many nodes and edges efficiently is quite challenging since representations generally suffer from visual clutter induced by the large amount of edge crossings and node-edge overlaps. That problem becomes even more important when nodes positions are fixed, such as in geography were nodes positions are set according to geographical coordinates. Edge bundling techniques can help to solve this issue by visually merging edges along common routes but it can also help to reveal high-level edge patterns in the network and therefore to understand its overall organization. In this paper, we present a generalization of [18] to reduce the clutter in a 3D representation by routing edges into bundles as well as a GPU-based rendering method to emphasize bundles densities while preserving edge color. To visualize geographical networks in the context of the globe, we also provide a new technique allowing to bundle edges around and not across it.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization of graphs containing many nodes and edges efficiently is quite challenging since representations generally suffer from visual clutter induced by the large amount of edge crossings and node-edge overlaps. That problem becomes even more important when nodes positions are fixed, such as in geography were nodes positions are set according to geographical coordinates. Edge bundling techniques can help to solve this issue by visually merging edges along common routes but it can also help to reveal high-level edge patterns in the network and therefore to understand its overall organization. In this paper, we present a generalization of [18] to reduce the clutter in a 3D representation by routing edges into bundles as well as a GPU-based rendering method to emphasize bundles densities while preserving edge color. To visualize geographical networks in the context of the globe, we also provide a new technique allowing to bundle edges around and not across it.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization of graphs containing many nodes and edges efficiently is quite challenging since representations generally suffer from visual clutter induced by the large amount of edge crossings and node-edge overlaps. That problem becomes even more important when nodes positions are fixed, such as in geography were nodes positions are set according to geographical coordinates. Edge bundling techniques can help to solve this issue by visually merging edges along common routes but it can also help to reveal high-level edge patterns in the network and therefore to understand its overall organization. In this paper, we present a generalization of [18] to reduce the clutter in a 3D representation by routing edges into bundles as well as a GPU-based rendering method to emphasize bundles densities while preserving edge color. To visualize geographical networks in the context of the globe, we also provide a new technique allowing to bundle edges around and not across it.", "fno": "05571244", "keywords": [ "Data Visualisation", "Geography", "Graph Theory", "Rendering Computer Graphics", "Geographical Data Visualization", "3 D Edge Bundling Techniques", "GPU Based Rendering Method", "Edge Color", "Rendering Computer Graphics", "Clutter", "Routing", "Three Dimensional Displays", "Data Visualization", "Color", "Visualization", "Edge Bundled Visualization", "Geographical Data" ], "authors": [ { "affiliation": null, "fullName": "Antoine Lambert", "givenName": "Antoine", "surname": "Lambert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Romain Bourqui", "givenName": "Romain", "surname": "Bourqui", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Auber", "givenName": "David", "surname": "Auber", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "329-335", "year": "2010", "issn": "1550-6037", "isbn": "978-1-4244-7846-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05571243", "articleId": "12OmNvrdI4Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "05571237", "articleId": "12OmNqJHFJh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2014/2874/0/2874a057", "title": "An Edge-Bundling Layout for Interactive Parallel Coordinates", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a057/12OmNwEJ0Cx", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a466", "title": "Research on Network Simplification by Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a466/12OmNyQpgKZ", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192715", "title": "BiSet: Semantic Edge Bundling with Biclusters for Sensemaking", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192715/13rRUNvgz9T", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061277", "title": "Geometry-Based Edge Clustering for Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061277/13rRUNvyakF", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122364", "title": "Skeleton-Based Edge Bundling for Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122364/13rRUxjyX3W", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122354", "title": "Divided Edge Bundling for Directional Network Data", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122354/13rRUzpzeB1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2023/01/09599491", "title": "Visual Analysis of Multidimensional Big Data: A Scalable Lightweight Bundling Method for Parallel Coordinates", "doi": null, "abstractUrl": "/journal/bd/2023/01/09599491/1yeC5mmD996", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWf", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNwEJ0Cx", "doi": "10.1109/PacificVis.2014.40", "title": "An Edge-Bundling Layout for Interactive Parallel Coordinates", "normalizedTitle": "An Edge-Bundling Layout for Interactive Parallel Coordinates", "abstract": "Parallel Coordinates is an often used visualization method for multidimensional data sets. Its main challenges for large data sets are visual clutter and over plotting which hamper the recognition of patterns in the data. We present an edge-bundling method using density-based clustering for each dimension. This reduces clutter and provides a faster overview of clusters and trends. Moreover, it allows rendering the clustered lines using polygons, decreasing rendering time remarkably. In addition, we design interactions to support multidimensional clustering with this method. A user study shows improvements over the classic parallel coordinates plot in two user tasks: correlation estimation and subset tracing.", "abstracts": [ { "abstractType": "Regular", "content": "Parallel Coordinates is an often used visualization method for multidimensional data sets. Its main challenges for large data sets are visual clutter and over plotting which hamper the recognition of patterns in the data. We present an edge-bundling method using density-based clustering for each dimension. This reduces clutter and provides a faster overview of clusters and trends. Moreover, it allows rendering the clustered lines using polygons, decreasing rendering time remarkably. In addition, we design interactions to support multidimensional clustering with this method. A user study shows improvements over the classic parallel coordinates plot in two user tasks: correlation estimation and subset tracing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Parallel Coordinates is an often used visualization method for multidimensional data sets. Its main challenges for large data sets are visual clutter and over plotting which hamper the recognition of patterns in the data. We present an edge-bundling method using density-based clustering for each dimension. This reduces clutter and provides a faster overview of clusters and trends. Moreover, it allows rendering the clustered lines using polygons, decreasing rendering time remarkably. In addition, we design interactions to support multidimensional clustering with this method. A user study shows improvements over the classic parallel coordinates plot in two user tasks: correlation estimation and subset tracing.", "fno": "2874a057", "keywords": [ "Strips", "Layout", "Image Color Analysis", "Visualization", "Data Visualization", "Rendering Computer Graphics", "Clutter", "Picture Image Generation Line And Curve Generation" ], "authors": [ { "affiliation": null, "fullName": "Gregorio Palmas", "givenName": "Gregorio", "surname": "Palmas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Myroslav Bachynskyi", "givenName": "Myroslav", "surname": "Bachynskyi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antti Oulasvirta", "givenName": "Antti", "surname": "Oulasvirta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hans Peter Seidel", "givenName": "Hans Peter", "surname": "Seidel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tino Weinkauf", "givenName": "Tino", "surname": "Weinkauf", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-03-01T00:00:00", "pubType": "proceedings", "pages": "57-64", "year": "2014", "issn": null, "isbn": "978-1-4799-2874-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2874a049", "articleId": "12OmNwpoFGP", "__typename": "AdjacentArticleType" }, "next": { "fno": "2874a065", "articleId": "12OmNyoiYWP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2014/4103/0/4103a007", "title": "Spectral-Based Contractible Parallel Coordinates", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a007/12OmNCgrDcV", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2010/6685/0/05429608", "title": "Interactive local clustering operations for high dimensional data in parallel coordinates", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2010/05429608/12OmNqzu6Is", "parentPublication": { "id": "proceedings/pacificvis/2010/6685/0", "title": "2010 IEEE Pacific Visualization Symposium (PacificVis 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571244", "title": "3D Edge Bundling for Geographical Data Visualization", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571244/12OmNqzu6LL", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a466", "title": "Research on Network Simplification by Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a466/12OmNyQpgKZ", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156379", "title": "Clutter-aware label layout", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156379/12OmNyY4rqE", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933706", "title": "Slope-Dependent Rendering of Parallel Coordinates to Reduce Density Distortion and Ghost Clusters", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933706/1fTgJ8ktWak", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2023/01/09599491", "title": "Visual Analysis of Multidimensional Big Data: A Scalable Lightweight Bundling Method for Parallel Coordinates", "doi": null, "abstractUrl": "/journal/bd/2023/01/09599491/1yeC5mmD996", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCeaPZI", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "acronym": "dsc", "groupId": "1815424", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQpgKZ", "doi": "10.1109/DSC.2016.95", "title": "Research on Network Simplification by Edge Bundling", "normalizedTitle": "Research on Network Simplification by Edge Bundling", "abstract": "Node occlusion and edge congestion problems, which are caused by the increasing scale and complexity of network, had become a hot spot in network visualization research. To solve the visual clutter problem in network, edges close to each other in network were bundled by curving them. A segmental forced-directed algorithm (FDA) simplification model and a community based compatible edge bundling network model were proposed and improved. To solve the problem of excessive bending of some edges in segmental FDA bundling model, network was divided into different communities by CNM cluster algorithm. Experimental result shows that the bundling simplification algorithm introduced above has a wide applicability, and network visualized by this algorithm has good visual effect and readability.", "abstracts": [ { "abstractType": "Regular", "content": "Node occlusion and edge congestion problems, which are caused by the increasing scale and complexity of network, had become a hot spot in network visualization research. To solve the visual clutter problem in network, edges close to each other in network were bundled by curving them. A segmental forced-directed algorithm (FDA) simplification model and a community based compatible edge bundling network model were proposed and improved. To solve the problem of excessive bending of some edges in segmental FDA bundling model, network was divided into different communities by CNM cluster algorithm. Experimental result shows that the bundling simplification algorithm introduced above has a wide applicability, and network visualized by this algorithm has good visual effect and readability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Node occlusion and edge congestion problems, which are caused by the increasing scale and complexity of network, had become a hot spot in network visualization research. To solve the visual clutter problem in network, edges close to each other in network were bundled by curving them. A segmental forced-directed algorithm (FDA) simplification model and a community based compatible edge bundling network model were proposed and improved. To solve the problem of excessive bending of some edges in segmental FDA bundling model, network was divided into different communities by CNM cluster algorithm. Experimental result shows that the bundling simplification algorithm introduced above has a wide applicability, and network visualized by this algorithm has good visual effect and readability.", "fno": "1192a466", "keywords": [ "Interpolation", "Algorithm Design And Analysis", "Clustering Algorithms", "Force", "Visualization", "Clutter", "Layout", "Simplification", "Network Visualization", "Edge Bundling", "Cluster Algorithm", "Segmental Force Directed Algorithm" ], "authors": [ { "affiliation": null, "fullName": "Yao Zhonghua", "givenName": "Yao", "surname": "Zhonghua", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wu Lingda", "givenName": "Wu", "surname": "Lingda", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-06-01T00:00:00", "pubType": "proceedings", "pages": "466-472", "year": "2016", "issn": null, "isbn": "978-1-5090-1192-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1192a462", "articleId": "12OmNAlvHAb", "__typename": "AdjacentArticleType" }, "next": { "fno": "1192a473", "articleId": "12OmNAs2tpV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2010/7846/0/05571226", "title": "An Application of Edge Bundling Techniques to the Visualization of Media Analysis Results", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571226/12OmNAThXUv", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156354", "title": "Attribute-driven edge bundling for general graphs with applications in trail analysis", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156354/12OmNCaLEnG", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a057", "title": "An Edge-Bundling Layout for Interactive Parallel Coordinates", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a057/12OmNwEJ0Cx", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2013/5049/0/5049a028", "title": "Edge Bundling by Rapidly-Exploring Random Trees", "doi": null, "abstractUrl": "/proceedings-article/iv/2013/5049a028/12OmNz5s0F9", "parentPublication": { "id": "proceedings/iv/2013/5049/0", "title": "2013 17th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031594", "title": "FFTEB: Edge bundling of huge graphs by the Fast Fourier Transform", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031594/12OmNzuZUEs", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a094", "title": "On Edge Bundling and Node Layout for Mutually Connected Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a094/12OmNzwZ6qg", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807234", "title": "Interactive Structure-aware Blending of Diverse Edge Bundling Visualizations", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807234/1cG6kigQUVO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzl3WWZ", "title": "2013 17th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNz5s0F9", "doi": "10.1109/IV.2013.4", "title": "Edge Bundling by Rapidly-Exploring Random Trees", "normalizedTitle": "Edge Bundling by Rapidly-Exploring Random Trees", "abstract": "We introduce a technique for bundling edges in graphs where a hierarchical organization of the vertices is not available. Instead of applying time-complex force-directed edge bundling, we adopt the concept of Rapidly-Exploring Random Trees (RRTs). We use RRTs for fast computation of a hierarchical space organization that is independent of the spatial structure of the graph layout. Due to this independency, edge bundling can be applied to any graph layout and even allows us to define spatial obstacles through which no bundles may lead. Furthermore, when adding or removing graph nodes and edges on-the-fly, the bundling structure remains stable, which cannot be guaranteed for force-directed bundling. The main benefit of RRT bundling is its high efficiency, supporting interactive exploration. We rely on the low runtime complexity for a new interaction technique for visual clutter reduction in node-link diagrams that we refer to as the RRT edge bundling lens.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a technique for bundling edges in graphs where a hierarchical organization of the vertices is not available. Instead of applying time-complex force-directed edge bundling, we adopt the concept of Rapidly-Exploring Random Trees (RRTs). We use RRTs for fast computation of a hierarchical space organization that is independent of the spatial structure of the graph layout. Due to this independency, edge bundling can be applied to any graph layout and even allows us to define spatial obstacles through which no bundles may lead. Furthermore, when adding or removing graph nodes and edges on-the-fly, the bundling structure remains stable, which cannot be guaranteed for force-directed bundling. The main benefit of RRT bundling is its high efficiency, supporting interactive exploration. We rely on the low runtime complexity for a new interaction technique for visual clutter reduction in node-link diagrams that we refer to as the RRT edge bundling lens.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a technique for bundling edges in graphs where a hierarchical organization of the vertices is not available. Instead of applying time-complex force-directed edge bundling, we adopt the concept of Rapidly-Exploring Random Trees (RRTs). We use RRTs for fast computation of a hierarchical space organization that is independent of the spatial structure of the graph layout. Due to this independency, edge bundling can be applied to any graph layout and even allows us to define spatial obstacles through which no bundles may lead. Furthermore, when adding or removing graph nodes and edges on-the-fly, the bundling structure remains stable, which cannot be guaranteed for force-directed bundling. The main benefit of RRT bundling is its high efficiency, supporting interactive exploration. We rely on the low runtime complexity for a new interaction technique for visual clutter reduction in node-link diagrams that we refer to as the RRT edge bundling lens.", "fno": "5049a028", "keywords": [ "Rapidly Exploring Random Tree", "Edge Bundling", "Graph", "Node Link Diagram" ], "authors": [ { "affiliation": null, "fullName": "Michael Burch", "givenName": "Michael", "surname": "Burch", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hansjorg Schmauder", "givenName": "Hansjorg", "surname": "Schmauder", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Daniel Weiskopf", "givenName": "Daniel", "surname": "Weiskopf", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-07-01T00:00:00", "pubType": "proceedings", "pages": "28-35", "year": "2013", "issn": "1550-6037", "isbn": "978-0-7695-5049-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5049a019", "articleId": "12OmNs0C9MQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "5049a036", "articleId": "12OmNvnwVmm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2016/1451/0/07465267", "title": "Multilayer graph edge bundling", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2016/07465267/12OmNCbCrKh", "parentPublication": { "id": "proceedings/pacificvis/2016/1451/0", "title": "2016 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07364046", "title": "Texture-based edge bundling: A web-based approach for interactively visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364046/12OmNro0Idz", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2012/4818/0/4818a052", "title": "Parallelized Force-Directed Edge Bundling on the GPU", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2012/4818a052/12OmNvxbhO5", "parentPublication": { "id": "proceedings/dcabes/2012/4818/0", "title": "2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a466", "title": "Research on Network Simplification by Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a466/12OmNyQpgKZ", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2008/3326/0/3326a672", "title": "Density Avoided Sampling: An Intelligent Sampling Technique for Rapidly-Exploring Random Trees", "doi": null, "abstractUrl": "/proceedings-article/his/2008/3326a672/12OmNyUFfK2", "parentPublication": { "id": "proceedings/his/2008/3326/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122354", "title": "Divided Edge Bundling for Directional Network Data", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122354/13rRUzpzeB1", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2019/9151/0/08730688", "title": "Scene Context-aware Rapidly-exploring Random Trees for Global Path Planning", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2019/08730688/1aDSNMihE6k", "parentPublication": { "id": "proceedings/percom-workshops/2019/9151/0", "title": "2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2020/8468/0/846800a053", "title": "A Distributed Algorithm for Force Directed Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2020/846800a053/1pZ0Ti8Eb4s", "parentPublication": { "id": "proceedings/ldav/2020/8468/0", "title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdVh2r", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzuZUEs", "doi": "10.1109/PACIFICVIS.2017.8031594", "title": "FFTEB: Edge bundling of huge graphs by the Fast Fourier Transform", "normalizedTitle": "FFTEB: Edge bundling of huge graphs by the Fast Fourier Transform", "abstract": "Edge bundling techniques provide a visual simplification of cluttered graph drawings or trail sets. While many bundling techniques exist, only few recent ones can handle large datasets and also allow selective bundling based on edge attributes. We present a new technique that improves on both above points, in terms of increasing both the scalability and computational speed of bundling, while keeping the quality of the results on par with state-of-the-art techniques. For this, we shift the bundling process from the image space to the spectral (frequency) space, thereby increasing computational speed. We address scalability by proposing a data streaming process that allows bundling of extremely large datasets with limited GPU memory. We demonstrate our technique on several real-world datasets and by comparing it with state-of-the-art bundling methods.", "abstracts": [ { "abstractType": "Regular", "content": "Edge bundling techniques provide a visual simplification of cluttered graph drawings or trail sets. While many bundling techniques exist, only few recent ones can handle large datasets and also allow selective bundling based on edge attributes. We present a new technique that improves on both above points, in terms of increasing both the scalability and computational speed of bundling, while keeping the quality of the results on par with state-of-the-art techniques. For this, we shift the bundling process from the image space to the spectral (frequency) space, thereby increasing computational speed. We address scalability by proposing a data streaming process that allows bundling of extremely large datasets with limited GPU memory. We demonstrate our technique on several real-world datasets and by comparing it with state-of-the-art bundling methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Edge bundling techniques provide a visual simplification of cluttered graph drawings or trail sets. While many bundling techniques exist, only few recent ones can handle large datasets and also allow selective bundling based on edge attributes. We present a new technique that improves on both above points, in terms of increasing both the scalability and computational speed of bundling, while keeping the quality of the results on par with state-of-the-art techniques. For this, we shift the bundling process from the image space to the spectral (frequency) space, thereby increasing computational speed. We address scalability by proposing a data streaming process that allows bundling of extremely large datasets with limited GPU memory. We demonstrate our technique on several real-world datasets and by comparing it with state-of-the-art bundling methods.", "fno": "08031594", "keywords": [ "Image Edge Detection", "Graphics Processing Units", "Kernel", "Convolution", "Scalability", "Fourier Transforms", "Clutter", "I 3 3 Computing Methodologies Computer Graphics Picture Image Generation", "I 3 6 Computing Methodologies Computer Graphics Methodology And Techniques" ], "authors": [ { "affiliation": "DEVI - ENAC, Toulouse, France", "fullName": "Antoine Lhuillier", "givenName": "Antoine", "surname": "Lhuillier", "__typename": "ArticleAuthorType" }, { "affiliation": "DEVI - ENAC, Toulouse, France", "fullName": "Christophe Hurter", "givenName": "Christophe", "surname": "Hurter", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute Johann Bernoulli, University of Groningen, Netherlands", "fullName": "Alexandru Telea", "givenName": "Alexandru", "surname": "Telea", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "190-199", "year": "2017", "issn": "2165-8773", "isbn": "978-1-5090-5738-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08031593", "articleId": "12OmNBRKwBs", "__typename": "AdjacentArticleType" }, "next": { "fno": "08031595", "articleId": "12OmNs0C9DQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2015/6879/0/07156354", "title": "Attribute-driven edge bundling for general graphs with applications in trail analysis", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156354/12OmNCaLEnG", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07364046", "title": "Texture-based edge bundling: A web-based approach for interactively visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07364046/12OmNro0Idz", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2013/4797/0/06596126", "title": "Smooth bundling of large streaming and sequence graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2013/06596126/12OmNscfI0r", "parentPublication": { "id": "proceedings/pacificvis/2013/4797/0", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742389", "title": "Multilevel agglomerative edge bundling for visualizing large graphs", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742389/12OmNxj233Y", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a094", "title": "On Edge Bundling and Node Layout for Mutually Connected Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a094/12OmNzwZ6qg", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539373", "title": "Towards Unambiguous Edge Bundling: Investigating Confluent Drawings for Network Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539373/13rRUwcS1CZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/12/07374742", "title": "CUBu: Universal Real-Time Bundling for Large Graphs", "doi": null, "abstractUrl": "/journal/tg/2016/12/07374742/13rRUwgQpDx", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2020/8468/0/846800a053", "title": "A Distributed Algorithm for Force Directed Edge Bundling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2020/846800a053/1pZ0Ti8Eb4s", "parentPublication": { "id": "proceedings/ldav/2020/8468/0", "title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552919", "title": "Edge-Path Bundling: A Less Ambiguous Edge Bundling Approach", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552919/1xibXgJW32U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2023/01/09599491", "title": "Visual Analysis of Multidimensional Big Data: A Scalable Lightweight Bundling Method for Parallel Coordinates", "doi": null, "abstractUrl": "/journal/bd/2023/01/09599491/1yeC5mmD996", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxzMnU0", "title": "2011 15th International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBbHF8", "doi": "10.1109/IV.2011.28", "title": "Listening to Managers: A Study about Visualizations in Corporate Presentations", "normalizedTitle": "Listening to Managers: A Study about Visualizations in Corporate Presentations", "abstract": "This paper presents a study about the use of visualizations in corporate presentations. We interviewed nine executive managers of a leading technology company about how they create business presentations for different meetings and different audiences. Thereby, we focused on which visualization types they normally use and whether they would accept new forms of visualizations such as information graphics, which are currently very popular. Due to the explorative character of the study, we used the grounded theory approach. Results show that design principles or effective visualizations are not known to the most interviewees. The interviewees rated corporate design, use of master layout, and templates higher than individually designed slides. The most popular visualization types managers use in presentations are bar and pie charts. The term \"information graphic\" was not known. Our conclusion leads to the following hypothesis: If a company wants to change or improve its communication, it will have to become aware of the power of visual storytelling and start an \"iconic turn\".", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a study about the use of visualizations in corporate presentations. We interviewed nine executive managers of a leading technology company about how they create business presentations for different meetings and different audiences. Thereby, we focused on which visualization types they normally use and whether they would accept new forms of visualizations such as information graphics, which are currently very popular. Due to the explorative character of the study, we used the grounded theory approach. Results show that design principles or effective visualizations are not known to the most interviewees. The interviewees rated corporate design, use of master layout, and templates higher than individually designed slides. The most popular visualization types managers use in presentations are bar and pie charts. The term \"information graphic\" was not known. Our conclusion leads to the following hypothesis: If a company wants to change or improve its communication, it will have to become aware of the power of visual storytelling and start an \"iconic turn\".", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a study about the use of visualizations in corporate presentations. We interviewed nine executive managers of a leading technology company about how they create business presentations for different meetings and different audiences. Thereby, we focused on which visualization types they normally use and whether they would accept new forms of visualizations such as information graphics, which are currently very popular. Due to the explorative character of the study, we used the grounded theory approach. Results show that design principles or effective visualizations are not known to the most interviewees. The interviewees rated corporate design, use of master layout, and templates higher than individually designed slides. The most popular visualization types managers use in presentations are bar and pie charts. The term \"information graphic\" was not known. Our conclusion leads to the following hypothesis: If a company wants to change or improve its communication, it will have to become aware of the power of visual storytelling and start an \"iconic turn\".", "fno": "06004064", "keywords": [ "Business Graphics", "Data Visualisation", "Technical Presentation", "Corporate Presentation Visualizations", "Business Presentations", "Visualization Types", "Information Graphics", "Grounded Theory Approach", "Corporate Design", "Master Layout", "Bar Chart", "Pie Chart", "Visual Storytelling", "Iconic Turn", "Visualization", "Companies", "Interviews", "Layout", "Corporate Presentation", "Business Visualization", "Information Graphic", "Design Process", "Corporate Design", "Visual Language", "Visual Storytelling" ], "authors": [ { "affiliation": null, "fullName": "Wibke Weber", "givenName": "Wibke", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ralph Tille", "givenName": "Ralph", "surname": "Tille", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-07-01T00:00:00", "pubType": "proceedings", "pages": "343-348", "year": "2011", "issn": "1550-6037", "isbn": "978-1-4577-0868-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06004063", "articleId": "12OmNCdk2zw", "__typename": "AdjacentArticleType" }, "next": { "fno": "06004065", "articleId": "12OmNBa2iC0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cccm/2008/3290/1/3290a659", "title": "Research on the Evolution of Corporate Culture Based on Naming Game", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a659/12OmNBQC8bT", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539550", "title": "Specifying Generic Multimedia 3D Visualizations and Temporal Presentations from Database Queries", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539550/12OmNqNos6R", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2010/7846/0/05571231", "title": "Choosing Knowledge Visualizations to Augment Cognition: The Managers' View", "doi": null, "abstractUrl": "/proceedings-article/iv/2010/05571231/12OmNxuXcA3", "parentPublication": { "id": "proceedings/iv/2010/7846/0", "title": "2010 14th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b275", "title": "Preparing for the Future -- How Managers Perceive, Interpret, and Assess the Impact of Digital Technologies for Business", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b275/12OmNzZWbKE", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08233127", "title": "Atom: A Grammar for Unit Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/12/08233127/14H4WLzSYsE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09916137", "title": "Revisiting the Design Patterns of Composite Visualizations", "doi": null, "abstractUrl": "/journal/tg/5555/01/09916137/1HojAjSAGNq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a290", "title": "Top managers&#x2019; foreign experience and corporate R&#x0026; D investment: based linear regression analysis", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a290/1tV9bU5aAda", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2020/9144/0/914400a001", "title": "Corporate strategy, Information transparency and Debt cost based on regression model", "doi": null, "abstractUrl": "/proceedings-article/icemme/2020/914400a001/1tV9qfT5Mo8", "parentPublication": { "id": "proceedings/icemme/2020/9144/0", "title": "2020 2nd International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552192", "title": "From Jam Session to Recital: Synchronous Communication and Collaboration Around Data in Organizations", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552192/1xic6Zrane0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/03/09615008", "title": "Explaining With Examples: Lessons Learned From Crowdsourced Introductory Description of Information Visualizations", "doi": null, "abstractUrl": "/journal/tg/2023/03/09615008/1yyho082gEw", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAndiq9", "title": "2013 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNwCJON7", "doi": "10.1109/PacificVis.2013.6596147", "title": "On the faithfulness of graph visualizations", "normalizedTitle": "On the faithfulness of graph visualizations", "abstract": "Readability criteria have been commonly used to measure the quality of graph visualizations. In this paper we argue that readability criteria, while necessary, are not sufficient. We propose a new kind of criterion, generically termed faithfulness, for evaluating graph layout methods. We propose a general model for quantifying faithfulness, and contrast it with the well established readability criteria. We use examples of multidimensional scaling, edge bundling and several other visualization metaphors (including matrix-based and map-based visualizations) to illustrate faithfulness.", "abstracts": [ { "abstractType": "Regular", "content": "Readability criteria have been commonly used to measure the quality of graph visualizations. In this paper we argue that readability criteria, while necessary, are not sufficient. We propose a new kind of criterion, generically termed faithfulness, for evaluating graph layout methods. We propose a general model for quantifying faithfulness, and contrast it with the well established readability criteria. We use examples of multidimensional scaling, edge bundling and several other visualization metaphors (including matrix-based and map-based visualizations) to illustrate faithfulness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Readability criteria have been commonly used to measure the quality of graph visualizations. In this paper we argue that readability criteria, while necessary, are not sufficient. We propose a new kind of criterion, generically termed faithfulness, for evaluating graph layout methods. We propose a general model for quantifying faithfulness, and contrast it with the well established readability criteria. We use examples of multidimensional scaling, edge bundling and several other visualization metaphors (including matrix-based and map-based visualizations) to illustrate faithfulness.", "fno": "06596147", "keywords": [ "Data Visualisation", "Graph Theory", "Matrix Algebra", "Readability Criteria", "Graph Visualization Quality", "Graph Layout Methods", "Multidimensional Scaling", "Edge Bundling", "Visualization Metaphors", "Map Based Visualizations", "Matrix Based Visualisation", "Data Visualization", "Layout", "Measurement", "Visualization", "Data Models", "Computational Modeling", "Animation", "Faithfulness", "Readability", "Task", "Change Faithfulness" ], "authors": [ { "affiliation": "The School of Information Technologies, The University of Sydney, Australia", "fullName": "Quan Nguyen", "givenName": "Quan", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "The School of Information Technologies, The University of Sydney, Australia", "fullName": "Peter Eades", "givenName": "Peter", "surname": "Eades", "__typename": "ArticleAuthorType" }, { "affiliation": "The School of Information Technologies, The University of Sydney, Australia", "fullName": "Seok-Hee Hong", "givenName": "Seok-Hee", "surname": "Hong", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-02-01T00:00:00", "pubType": "proceedings", "pages": "209-216", "year": "2013", "issn": "2165-8765", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06596146", "articleId": "12OmNzsJ7ya", "__typename": "AdjacentArticleType" }, "next": { "fno": "06596148", "articleId": "12OmNBE7MqY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pacificvis/2017/5738/0/08031607", "title": "dNNG: Quality metrics and layout for neighbourhood faithfulness", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031607/12OmNxvwoZW", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/09/07061477", "title": "Learning Visualizations by Analogy: Promoting Visual Literacy through Visualization Morphing", "doi": null, "abstractUrl": "/journal/tg/2015/09/07061477/13rRUxlgxTm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/12/08233127", "title": "Atom: A Grammar for Unit Visualizations", "doi": null, "abstractUrl": "/journal/tg/2018/12/08233127/14H4WLzSYsE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vizsec/2018/8194/0/08709181", "title": "An Empirical Study on Perceptually Masking Privacy in Graph Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vizsec/2018/08709181/19ZL2eLPBfO", "parentPublication": { "id": "proceedings/vizsec/2018/8194/0", "title": "2018 IEEE Symposium on Visualization for Cyber Security (VizSec)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a051", "title": "dGG, dRNG, DSC: New Degree-based Shape-based Faithfulness Metrics for Large and Complex Graph Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a051/1E2wj8PptTi", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09916137", "title": "Revisiting the Design Patterns of Composite Visualizations", "doi": null, "abstractUrl": "/journal/tg/5555/01/09916137/1HojAjSAGNq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09987696", "title": "Automorphism Faithfulness Metrics for Symmetric Graph Drawings", "doi": null, "abstractUrl": "/journal/tg/5555/01/09987696/1J7ROVH0hpu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809845", "title": "OD Morphing: Balancing Simplicity with Faithfulness for OD Bundling", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809845/1cHEdqR4dHO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09229072", "title": "MobileVisFixer: Tailoring Web Visualizations for Mobile Phones Leveraging an Explainable Reinforcement Learning Framework", "doi": null, "abstractUrl": "/journal/tg/2021/02/09229072/1o3nzeZgQTe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09556579", "title": "STRATISFIMAL LAYOUT: A modular optimization model for laying out layered node-link network visualizations", "doi": null, "abstractUrl": "/journal/tg/2022/01/09556579/1xlw0LJ4OTm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBTawmS", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "1997", "__typename": "ProceedingType" }, "article": { "id": "12OmNwEJ10t", "doi": "10.1109/INFVIS.1997.636718", "title": "H3: laying out large directed graphs in 3D hyperbolic space", "normalizedTitle": "H3: laying out large directed graphs in 3D hyperbolic space", "abstract": "We present the H3 layout technique for drawing large directed graphs as node-link diagrams in 3D hyperbolic space. We can lay out much larger structures than can be handled using traditional techniques for drawing general graphs because we assume a hierarchical nature of the data. We impose a hierarchy on the graph by using domain-specific knowledge to find an appropriate spanning tree. Links which are not part of the spanning tree do not influence the layout but can be selectively drawn by user request. The volume of hyperbolic 3-space increases exponentially, as opposed to the familiar geometric increase of euclidean 3-space. We exploit this exponential amount of room by computing the layout according to the hyperbolic metric. We optimize the cone tree layout algorithm for 3D hyperbolic space by placing children on a hemisphere around the cone mouth instead of on its perimeter. Hyperbolic navigation affords a Focus+Context view of the structure with minimal visual clutter. We have successfully laid out hierarchies of over 20,000 nodes. Our implementation accommodates navigation through graphs too large to be rendered interactively by allowing the user to explicitly prune or expand subtrees.", "abstracts": [ { "abstractType": "Regular", "content": "We present the H3 layout technique for drawing large directed graphs as node-link diagrams in 3D hyperbolic space. We can lay out much larger structures than can be handled using traditional techniques for drawing general graphs because we assume a hierarchical nature of the data. We impose a hierarchy on the graph by using domain-specific knowledge to find an appropriate spanning tree. Links which are not part of the spanning tree do not influence the layout but can be selectively drawn by user request. The volume of hyperbolic 3-space increases exponentially, as opposed to the familiar geometric increase of euclidean 3-space. We exploit this exponential amount of room by computing the layout according to the hyperbolic metric. We optimize the cone tree layout algorithm for 3D hyperbolic space by placing children on a hemisphere around the cone mouth instead of on its perimeter. Hyperbolic navigation affords a Focus+Context view of the structure with minimal visual clutter. We have successfully laid out hierarchies of over 20,000 nodes. Our implementation accommodates navigation through graphs too large to be rendered interactively by allowing the user to explicitly prune or expand subtrees.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present the H3 layout technique for drawing large directed graphs as node-link diagrams in 3D hyperbolic space. We can lay out much larger structures than can be handled using traditional techniques for drawing general graphs because we assume a hierarchical nature of the data. We impose a hierarchy on the graph by using domain-specific knowledge to find an appropriate spanning tree. Links which are not part of the spanning tree do not influence the layout but can be selectively drawn by user request. The volume of hyperbolic 3-space increases exponentially, as opposed to the familiar geometric increase of euclidean 3-space. We exploit this exponential amount of room by computing the layout according to the hyperbolic metric. We optimize the cone tree layout algorithm for 3D hyperbolic space by placing children on a hemisphere around the cone mouth instead of on its perimeter. Hyperbolic navigation affords a Focus+Context view of the structure with minimal visual clutter. We have successfully laid out hierarchies of over 20,000 nodes. Our implementation accommodates navigation through graphs too large to be rendered interactively by allowing the user to explicitly prune or expand subtrees.", "fno": "81890002", "keywords": [ "Directed Graphs Large Directed Graphs 3 D Hyperbolic Space H 3 Layout Technique Graph Drawing Node Link Diagrams Hierarchical Data Domain Specific Knowledge Spanning Tree Euclidean 3 Space Optimization Cone Tree Layout Algorithm Hyperbolic Navigation Visual Clutter Subtree Pruning Data Visualization" ], "authors": [ { "affiliation": "Stanford Univ., CA, USA", "fullName": "T. Munzner", "givenName": "T.", "surname": "Munzner", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1997-10-01T00:00:00", "pubType": "proceedings", "pages": "2", "year": "1997", "issn": null, "isbn": "0-8186-8189-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00636794", "articleId": "1h0Jt1gK27m", "__typename": "AdjacentArticleType" }, "next": { "fno": "81890011", "articleId": "12OmNyQGS8i", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrF2DIa", "title": "2017 21st International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyO8tVY", "doi": "10.1109/iV.2017.64", "title": "Sketch-Based Interactions for Untangling of Force-Directed Graphs", "normalizedTitle": "Sketch-Based Interactions for Untangling of Force-Directed Graphs", "abstract": "The exploration of moderately dense networks is used in various challenges of visual data analysis. Frequently, the solutions lay in graph drawing, based on automatic force-directed layout, which results in a spontaneous and irreproducible node-link diagram. Currently available approaches to improve its readability are generally oriented to finite rendering without providing to the analyst handy tools for post-layout manipulations. Enabling indirect manual control on visualizations through multi-step menus may appear difficult to learn and use. Thus, this problem requires a more intuitive way of solving. This paper presents an original toolset for user-guided refinement of the force-directed graph layout, with a bias on pen-centric sketching techniques.", "abstracts": [ { "abstractType": "Regular", "content": "The exploration of moderately dense networks is used in various challenges of visual data analysis. Frequently, the solutions lay in graph drawing, based on automatic force-directed layout, which results in a spontaneous and irreproducible node-link diagram. Currently available approaches to improve its readability are generally oriented to finite rendering without providing to the analyst handy tools for post-layout manipulations. Enabling indirect manual control on visualizations through multi-step menus may appear difficult to learn and use. Thus, this problem requires a more intuitive way of solving. This paper presents an original toolset for user-guided refinement of the force-directed graph layout, with a bias on pen-centric sketching techniques.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The exploration of moderately dense networks is used in various challenges of visual data analysis. Frequently, the solutions lay in graph drawing, based on automatic force-directed layout, which results in a spontaneous and irreproducible node-link diagram. Currently available approaches to improve its readability are generally oriented to finite rendering without providing to the analyst handy tools for post-layout manipulations. Enabling indirect manual control on visualizations through multi-step menus may appear difficult to learn and use. Thus, this problem requires a more intuitive way of solving. This paper presents an original toolset for user-guided refinement of the force-directed graph layout, with a bias on pen-centric sketching techniques.", "fno": "0831a288", "keywords": [ "Data Analysis", "Data Visualisation", "Directed Graphs", "Human Computer Interaction", "Interactive Systems", "Rendering Computer Graphics", "User Interfaces", "Graph Drawing", "Spontaneous Node Link Diagram", "Irreproducible Node Link Diagram", "Post Layout Manipulations", "Graph Layout", "Pen Centric Sketching Techniques", "Visual Data Analysis", "Sketch Based Interactions", "Force Directed Graph Untangling", "Automatic Force Directed Layout", "Finite Rendering", "Visualizations", "Layout", "Visualization", "Data Visualization", "Tools", "Collaboration", "Data Visualization", "Human Centered Computing", "User Interface Design", "Graph Exploration", "User Generated Layout", "Pen Centric And Sketch Based Interaction" ], "authors": [ { "affiliation": null, "fullName": "Vladimir Guchev", "givenName": "Vladimir", "surname": "Guchev", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cristina Gena", "givenName": "Cristina", "surname": "Gena", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "288-291", "year": "2017", "issn": "2375-0138", "isbn": "978-1-5386-0831-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0831a281", "articleId": "12OmNzmLxRg", "__typename": "AdjacentArticleType" }, "next": { "fno": "0831a292", "articleId": "12OmNvwTGGv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2012/4771/0/4771a124", "title": "Force-directed Graph Visualization with Pre-positioning - Improving Convergence Time and Quality of Layout", "doi": null, "abstractUrl": "/proceedings-article/iv/2012/4771a124/12OmNBiygtD", "parentPublication": { "id": "proceedings/iv/2012/4771/0", "title": "2012 16th International Conference on Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2017/1042/0/1042a382", "title": "Exploiting GPUs for Fast Force-Directed Visualization of Large-Scale Networks", "doi": null, "abstractUrl": "/proceedings-article/icpp/2017/1042a382/12OmNrnJ6UM", "parentPublication": { "id": "proceedings/icpp/2017/1042/0", "title": "2017 46th International Conference on Parallel Processing (ICPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2012/2599/0/06341510", "title": "Scalable Force Directed Graph Layout Algorithms Using Fast Multipole Methods", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2012/06341510/12OmNx3HI8B", "parentPublication": { "id": "proceedings/ispdc/2012/2599/0", "title": "2012 11th International Symposium on Parallel and Distributed Computing (ISPDC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/04/08462766", "title": "A Distributed Multilevel Force-Directed Algorithm", "doi": null, "abstractUrl": "/journal/td/2019/04/08462766/13w3lontbPQ", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2018/9125/0/912500a139", "title": "Snapshot Visualization of Complex Graphs with Force-Directed Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icbk/2018/912500a139/17D45VsBU1x", "parentPublication": { "id": "proceedings/icbk/2018/9125/0", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a081", "title": "Untangling Force-Directed Layouts Using Persistent Homology", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a081/1J2XKiZs7xS", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a166", "title": "Performance Comparisons between Force-Directed Algorithms on Structured Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a166/1ap5yKzxg9G", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807379", "title": "Persistent Homology Guided Force-Directed Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944364", "title": "Force-Directed Graph Layouts by Edge Sampling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944364/1grOFicLl9S", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a328", "title": "Exploring Time-Series Through Force-Directed Timelines", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a328/1rSR9aLY29W", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzQhP77", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "1996", "__typename": "ProceedingType" }, "article": { "id": "12OmNANBZq3", "doi": "10.1109/CVPR.1996.517080", "title": "Graph matching by graduated assignment", "normalizedTitle": "Graph matching by graduated assignment", "abstract": "A new algorithm for graph matching, which uses graduated assignment is presented, along with experimental results demonstrating large improvements in speed and accuracy over previous techniques. The softassign, a novel constraint satisfaction technique, is applied to a new graph matching energy function that uses a robust, sparse distance measure between the links of the two graphs. The softassign, which has emerged out of the neural network/statistical physics framework enforces two-way (assignment) constraints without the use of penalty terms. The algorithm's low order computational complexity [0(lm), where l and m are the number of links in the two graphs] compares favorably with most competing approaches. The method, not restricted to any special class of graph, is applied to subgraph isomorphism, weighted graph matching, and attributed relational graph matching. Experiments on graphs generated from images and on randomly generated graphs, including benchmarks against a relation labeling algorithm and an algorithm employing Potts glass dynamics are reported. Over twenty-five thousand experiments were conducted. No comparable results have been reported by any other graph matching algorithm before in the research literature.", "abstracts": [ { "abstractType": "Regular", "content": "A new algorithm for graph matching, which uses graduated assignment is presented, along with experimental results demonstrating large improvements in speed and accuracy over previous techniques. The softassign, a novel constraint satisfaction technique, is applied to a new graph matching energy function that uses a robust, sparse distance measure between the links of the two graphs. The softassign, which has emerged out of the neural network/statistical physics framework enforces two-way (assignment) constraints without the use of penalty terms. The algorithm's low order computational complexity [0(lm), where l and m are the number of links in the two graphs] compares favorably with most competing approaches. The method, not restricted to any special class of graph, is applied to subgraph isomorphism, weighted graph matching, and attributed relational graph matching. Experiments on graphs generated from images and on randomly generated graphs, including benchmarks against a relation labeling algorithm and an algorithm employing Potts glass dynamics are reported. Over twenty-five thousand experiments were conducted. No comparable results have been reported by any other graph matching algorithm before in the research literature.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A new algorithm for graph matching, which uses graduated assignment is presented, along with experimental results demonstrating large improvements in speed and accuracy over previous techniques. The softassign, a novel constraint satisfaction technique, is applied to a new graph matching energy function that uses a robust, sparse distance measure between the links of the two graphs. The softassign, which has emerged out of the neural network/statistical physics framework enforces two-way (assignment) constraints without the use of penalty terms. The algorithm's low order computational complexity [0(lm), where l and m are the number of links in the two graphs] compares favorably with most competing approaches. The method, not restricted to any special class of graph, is applied to subgraph isomorphism, weighted graph matching, and attributed relational graph matching. Experiments on graphs generated from images and on randomly generated graphs, including benchmarks against a relation labeling algorithm and an algorithm employing Potts glass dynamics are reported. Over twenty-five thousand experiments were conducted. No comparable results have been reported by any other graph matching algorithm before in the research literature.", "fno": "72580239", "keywords": [ "Computational Complexity Pattern Matching Graph Theory Graph Matching Graduated Assignment Softassign Constraint Satisfaction Graph Matching Energy Function Computational Complexity Subgraph Isomorphism Weighted Graph Matching Attributed Relational Graph Matching" ], "authors": [ { "affiliation": "Dept. of Comput. Sci., Yale Univ., New Haven, CT, USA", "fullName": "S. Gold", "givenName": "S.", "surname": "Gold", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. Sci., Yale Univ., New Haven, CT, USA", "fullName": "A. Rangarajan", "givenName": "A.", "surname": "Rangarajan", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1996-06-01T00:00:00", "pubType": "proceedings", "pages": "239", "year": "1996", "issn": "1063-6919", "isbn": "0-8186-7258-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "72580231", "articleId": "12OmNyfdOOL", "__typename": "AdjacentArticleType" }, "next": { "fno": "72580245", "articleId": "12OmNBSjJ1s", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx3HI1q", "title": "2015 8th International Conference on Database Theory and Application (DTA)", "acronym": "dta", "groupId": "1812364", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNvBIRPs", "doi": "10.1109/DTA.2015.8", "title": "Graph Pattern Matching through Model Checking", "normalizedTitle": "Graph Pattern Matching through Model Checking", "abstract": "Graph pattern matching is a hot spot in the big data era, which is to find answer graphs matching a given query graph in a data graph of graph databases. &#x201C;Matching&#x201D; means two graphs satisfy some relation, such as isomorphism, simulation, bisimulation, etc. Since there are seldom algorithms for the subgraph bisimulation, our work commits to solve the graph pattern matching problem involving bisimulation relations through the model checking technology. We characterize query graphs by modal formulas. By model checking the formulas in the data graphs, the answer graphs bisimilar to the query graphs can be discovered. We add <sub>*</sub> to basic modal logic language resulting in ML + <sub>*</sub> language, and add r* to form ML + <sub>*</sub> formulas. Then a theorem which states that ML + <sub>*</sub> formulas characterize finite directed graphs modulo bisimulation is put forward. Furthermore, we list steps to find answer graphs bisimilar to a query graph.", "abstracts": [ { "abstractType": "Regular", "content": "Graph pattern matching is a hot spot in the big data era, which is to find answer graphs matching a given query graph in a data graph of graph databases. &#x201C;Matching&#x201D; means two graphs satisfy some relation, such as isomorphism, simulation, bisimulation, etc. Since there are seldom algorithms for the subgraph bisimulation, our work commits to solve the graph pattern matching problem involving bisimulation relations through the model checking technology. We characterize query graphs by modal formulas. By model checking the formulas in the data graphs, the answer graphs bisimilar to the query graphs can be discovered. We add <sub>*</sub> to basic modal logic language resulting in ML + <sub>*</sub> language, and add r* to form ML + <sub>*</sub> formulas. Then a theorem which states that ML + <sub>*</sub> formulas characterize finite directed graphs modulo bisimulation is put forward. Furthermore, we list steps to find answer graphs bisimilar to a query graph.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph pattern matching is a hot spot in the big data era, which is to find answer graphs matching a given query graph in a data graph of graph databases. “Matching” means two graphs satisfy some relation, such as isomorphism, simulation, bisimulation, etc. Since there are seldom algorithms for the subgraph bisimulation, our work commits to solve the graph pattern matching problem involving bisimulation relations through the model checking technology. We characterize query graphs by modal formulas. By model checking the formulas in the data graphs, the answer graphs bisimilar to the query graphs can be discovered. We add * to basic modal logic language resulting in ML + * language, and add r* to form ML + * formulas. Then a theorem which states that ML + * formulas characterize finite directed graphs modulo bisimulation is put forward. Furthermore, we list steps to find answer graphs bisimilar to a query graph.", "fno": "9849a001", "keywords": [ "Big Data", "Directed Graphs", "Formal Logic", "Formal Verification", "Pattern Matching", "Graph Pattern Matching", "Big Data", "Graph Databases", "Subgraph Bisimulation", "Bisimulation Relations", "Model Checking Technology", "Query Graphs", "Modal Formulas", "Data Graphs", "Modal Logic Language", "ML Language", "ML Formulas", "Finite Directed Graphs Modulo Bisimulation", "Model Checking", "Pattern Matching", "Databases", "Big Data", "Topology", "Arrays", "Computer Science", "Graph Pattern Matching", "Modal Formula", "Bisimulation", "Model Checking", "Query Processing", "Graph Database" ], "authors": [ { "affiliation": "Hubei Province Key Lab. of Intell. Inf. Process. & Real-time Ind. Syst., Wuhan Univ. of Sci. & Technol., Wuhan, China", "fullName": "Rui Qiao", "givenName": "Rui", "surname": "Qiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Software, Huazhong Univ. of Sci., Wuhan, China", "fullName": "Xiaolei Zhong", "givenName": "Xiaolei", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": "Coll. of Manage., Wuhan Univ. of Sci. & Technol., Wuhan, China", "fullName": "Ling Zhang", "givenName": "Ling", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Hubei Province Key Lab. of Intell. Inf. Process. & Real-time Ind. Syst., Wuhan Univ. of Sci. & Technol., Wuhan, China", "fullName": "Heng He", "givenName": "Heng", "surname": "He", "__typename": "ArticleAuthorType" } ], "idPrefix": "dta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2015", "issn": null, "isbn": "978-1-4673-9849-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9849z009", "articleId": "12OmNC2xhFP", "__typename": "AdjacentArticleType" }, "next": { "fno": "9849a006", "articleId": "12OmNz2TCJE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/1996/7258/0/72580239", "title": "Graph matching by graduated assignment", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1996/72580239/12OmNANBZq3", "parentPublication": { "id": "proceedings/cvpr/1996/7258/0", "title": "Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2013/5072/0/5072a250", "title": "A Framework for Fast Graph-Based Pattern Matching in Conceptual Models", "doi": null, "abstractUrl": "/proceedings-article/cbi/2013/5072a250/12OmNBsuea0", "parentPublication": { "id": "proceedings/cbi/2013/5072/0", "title": "2013 IEEE 15th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363958", "title": "Scalable storage structure for pattern matching on big graph data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363958/12OmNCvLXWO", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsaa/2016/5206/0/07796892", "title": "Pattern Matching Trajectories for Investigative Graph Searches", "doi": null, "abstractUrl": "/proceedings-article/dsaa/2016/07796892/12OmNwc3wyY", "parentPublication": { "id": "proceedings/dsaa/2016/5206/0", "title": "2016 IEEE 3rd International Conference on Data Science and Advanced Analytics (DSAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/06/08233149", "title": "MCS-GPM: Multi-Constrained Simulation Based Graph Pattern Matching in Contextual Social Graphs", "doi": null, "abstractUrl": "/journal/tk/2018/06/08233149/13rRUx0geql", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2011/07/ttk2011071006", "title": "Graph Pattern Matching: A Join/Semijoin Approach", "doi": null, "abstractUrl": "/journal/tk/2011/07/ttk2011071006/13rRUyfbwr3", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbk/2021/3858/0/385800a102", "title": "Intuitionistic Fuzzy Requirements Aggregation for Graph Pattern Matching with Group Decision Makers", "doi": null, "abstractUrl": "/proceedings-article/icbk/2021/385800a102/1A9X1ZjYSnC", "parentPublication": { "id": "proceedings/icbk/2021/3858/0", "title": "2021 IEEE International Conference on Big Knowledge (ICBK)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/10/08967169", "title": "Time-Respecting Flow Graph Pattern Matching on Temporal Graphs", "doi": null, "abstractUrl": "/journal/tk/2021/10/08967169/1gPjvcZBZYs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101806", "title": "Updates-Aware Graph Pattern based Node Matching", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101806/1kaMBhQkxA4", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2020/9998/0/999800b418", "title": "GraphPi: High Performance Graph Pattern Matching through Effective Redundancy Elimination", "doi": null, "abstractUrl": "/proceedings-article/sc/2020/999800b418/1oeOUwk6F9u", "parentPublication": { "id": "proceedings/sc/2020/9998/0/", "title": "2020 SC20: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzBOhX7", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwHQB6n", "doi": "10.1109/ICDE.2015.7113411", "title": "DaVinci: Data-driven visual interface construction for subgraph search in graph databases", "normalizedTitle": "DaVinci: Data-driven visual interface construction for subgraph search in graph databases", "abstract": "Due to the complexity of graph query languages, the need for visual query interfaces that can reduce the burden of query formulation is fundamental to the spreading of graph data management tools to a wider community. Despite the significant progress towards building such query interfaces to simplify visual subgraph query formulation task, construction of current generation visual interfaces is not data-driven. That is, it does not exploit the underlying data graphs to automatically generate the contents of various panels in the interface. Such data-driven construction has several benefits such as superior support for subgraph query formulation and portability of the interface across different graph databases. In this demonstration, we present a novel data-driven visual subgraph query interface construction engine called DaVinci. Specifically, it automatically generates from the underlying database two key components of the visual interface to aid subgraph query formulation, namely canned patterns and node labels.", "abstracts": [ { "abstractType": "Regular", "content": "Due to the complexity of graph query languages, the need for visual query interfaces that can reduce the burden of query formulation is fundamental to the spreading of graph data management tools to a wider community. Despite the significant progress towards building such query interfaces to simplify visual subgraph query formulation task, construction of current generation visual interfaces is not data-driven. That is, it does not exploit the underlying data graphs to automatically generate the contents of various panels in the interface. Such data-driven construction has several benefits such as superior support for subgraph query formulation and portability of the interface across different graph databases. In this demonstration, we present a novel data-driven visual subgraph query interface construction engine called DaVinci. Specifically, it automatically generates from the underlying database two key components of the visual interface to aid subgraph query formulation, namely canned patterns and node labels.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Due to the complexity of graph query languages, the need for visual query interfaces that can reduce the burden of query formulation is fundamental to the spreading of graph data management tools to a wider community. Despite the significant progress towards building such query interfaces to simplify visual subgraph query formulation task, construction of current generation visual interfaces is not data-driven. That is, it does not exploit the underlying data graphs to automatically generate the contents of various panels in the interface. Such data-driven construction has several benefits such as superior support for subgraph query formulation and portability of the interface across different graph databases. In this demonstration, we present a novel data-driven visual subgraph query interface construction engine called DaVinci. Specifically, it automatically generates from the underlying database two key components of the visual interface to aid subgraph query formulation, namely canned patterns and node labels.", "fno": "07113411", "keywords": [ "Visualization", "Visual Databases", "Generators", "Linear Programming", "Database Languages", "Query Processing" ], "authors": [ { "affiliation": "School of Electronics Engineering and Computer Science, Peking University, China", "fullName": "Jinbo Zhang", "givenName": "Jinbo", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering, Nanyang Technological University, Singapore", "fullName": "Sourav S Bhowmick", "givenName": "Sourav S", "surname": "Bhowmick", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Engineering, Nanyang Technological University, Singapore", "fullName": "Hong H. Nguyen", "givenName": "Hong H.", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Hong Kong Baptist University, Hong Kong", "fullName": "Byron Choi", "givenName": "Byron", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Information Systems, Singapore Management University, Singapore", "fullName": "Feida Zhu", "givenName": "Feida", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-04-01T00:00:00", "pubType": "proceedings", "pages": "1500-1503", "year": "2015", "issn": null, "isbn": "978-1-4799-7964-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07113410", "articleId": "12OmNxT56CS", "__typename": "AdjacentArticleType" }, "next": { "fno": "07113412", "articleId": "12OmNxwWoSX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sccc/1997/8052/0/80520227", "title": "A graphical user interface for object-oriented database", "doi": null, "abstractUrl": "/proceedings-article/sccc/1997/80520227/12OmNB9KHwZ", "parentPublication": { "id": "proceedings/sccc/1997/8052/0", "title": "Proceedings 17th International Conference of the Chilean Computer Science Society", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1995/7045/0/70450021", "title": "A visual interface for querying a CASE repository", "doi": null, "abstractUrl": "/proceedings-article/vl/1995/70450021/12OmNx0A7GE", "parentPublication": { "id": "proceedings/vl/1995/7045/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113406", "title": "ViSual: An HCI-inspired simulator for blending visual subgraph query construction and processing", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113406/12OmNxGSmeI", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/adl/1997/8010/0/80100036", "title": "Query By Templates: A Generalized Approach for Visual Query Formulation for Text Dominated Databases", "doi": null, "abstractUrl": "/proceedings-article/adl/1997/80100036/12OmNxVV5TQ", "parentPublication": { "id": "proceedings/adl/1997/8010/0", "title": "Advances in Digital Libraries Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uidis/1999/0262/0/02620064", "title": "Query Formulation from High-Level Concepts for Relational Databases", "doi": null, "abstractUrl": "/proceedings-article/uidis/1999/02620064/12OmNzSyChn", "parentPublication": { "id": "proceedings/uidis/1999/0262/0", "title": "User Interfaces to Data Intensive Systems, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/08/07891560", "title": "VISUAL: Simulation of Visual Subgraph Query Formulation to Enable Automated Performance Benchmarking", "doi": null, "abstractUrl": "/journal/tk/2017/08/07891560/13rRUIIVldc", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/2014/04/06583915", "title": "Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases", "doi": null, "abstractUrl": "/journal/sc/2014/04/06583915/13rRUILtJiS", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/01/07390046", "title": "A Visual Interface for Querying Heterogeneous Phylogenetic Databases", "doi": null, "abstractUrl": "/journal/tb/2017/01/07390046/13rRUytnsVq", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b666", "title": "An Indexing Framework for Efficient Visual Exploratory Subgraph Search in Graph Databases", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b666/1aDSS2TysF2", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a220", "title": "Scaling Up Subgraph Query Processing with Efficient Subgraph Matching", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a220/1aDSWRCnFEA", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNywfKyw", "title": "Multimedia and Ubiquitous Engineering, International Conference on", "acronym": "mue", "groupId": "1001875", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxETaaF", "doi": "10.1109/MUE.2009.67", "title": "A Directed Labeled Graph Frequent Pattern Mining Algorithm Based on Minimum Code", "normalizedTitle": "A Directed Labeled Graph Frequent Pattern Mining Algorithm Based on Minimum Code", "abstract": "Most of existing frequent subgraph mining algorithms are used to deal with undirected unlabeled marked graph. A few of them aim at directed graph or labeled graph. But in the real world ,a lot of connections have direction and label,so directed labeled graph mining is more meaningful. Now we are analyzing a financial network which can be modeled by a directed weighted graph. We are interested in the patterns which are frequent.The graph pattern means a uniform expression of graphs which has different marked nodes but same structure. In our application we consider direction and weight as part of the pattern. It’s different from subgraph because subgraph mining consider the labels of nodes. This paper proposes a new algorithm mSpan for directed labeled graph frequent pattern mining. Based on FP-growth, the algorithm gets a minimum edge code and an abstract node code sequence to indentify a directed graph pattern uniquely through minimum extension. It can solve the graph pattern isomorphic problem and the redundant extension problem. The experiment shows that mSpan can mine all frequent directed, labeled graph patterns.", "abstracts": [ { "abstractType": "Regular", "content": "Most of existing frequent subgraph mining algorithms are used to deal with undirected unlabeled marked graph. A few of them aim at directed graph or labeled graph. But in the real world ,a lot of connections have direction and label,so directed labeled graph mining is more meaningful. Now we are analyzing a financial network which can be modeled by a directed weighted graph. We are interested in the patterns which are frequent.The graph pattern means a uniform expression of graphs which has different marked nodes but same structure. In our application we consider direction and weight as part of the pattern. It’s different from subgraph because subgraph mining consider the labels of nodes. This paper proposes a new algorithm mSpan for directed labeled graph frequent pattern mining. Based on FP-growth, the algorithm gets a minimum edge code and an abstract node code sequence to indentify a directed graph pattern uniquely through minimum extension. It can solve the graph pattern isomorphic problem and the redundant extension problem. The experiment shows that mSpan can mine all frequent directed, labeled graph patterns.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most of existing frequent subgraph mining algorithms are used to deal with undirected unlabeled marked graph. A few of them aim at directed graph or labeled graph. But in the real world ,a lot of connections have direction and label,so directed labeled graph mining is more meaningful. Now we are analyzing a financial network which can be modeled by a directed weighted graph. We are interested in the patterns which are frequent.The graph pattern means a uniform expression of graphs which has different marked nodes but same structure. In our application we consider direction and weight as part of the pattern. It’s different from subgraph because subgraph mining consider the labels of nodes. This paper proposes a new algorithm mSpan for directed labeled graph frequent pattern mining. Based on FP-growth, the algorithm gets a minimum edge code and an abstract node code sequence to indentify a directed graph pattern uniquely through minimum extension. It can solve the graph pattern isomorphic problem and the redundant extension problem. The experiment shows that mSpan can mine all frequent directed, labeled graph patterns.", "fno": "3658a353", "keywords": [ "Frequent Pattern Mining", "Labeled Directed Graph", "Minimum Code" ], "authors": [ { "affiliation": null, "fullName": "Yuhua Li", "givenName": "Yuhua", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Quan Lin", "givenName": "Quan", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gang Zhong", "givenName": "Gang", "surname": "Zhong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dongsheng Duan", "givenName": "Dongsheng", "surname": "Duan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yanan Jin", "givenName": "Yanan", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei Bi", "givenName": "Wei", "surname": "Bi", "__typename": "ArticleAuthorType" } ], "idPrefix": "mue", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "353-359", "year": "2009", "issn": null, "isbn": "978-0-7695-3658-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3658a347", "articleId": "12OmNy9Prko", "__typename": "AdjacentArticleType" }, "next": { "fno": "3658a360", "articleId": "12OmNwtEEDD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icde/2004/2065/0/20650091", "title": "Mining Frequent Labeled and Partially Labeled Graph Patterns", "doi": null, "abstractUrl": "/proceedings-article/icde/2004/20650091/12OmNB9bvk9", "parentPublication": { "id": "proceedings/icde/2004/2065/0", "title": "Proceedings. 20th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1999/0409/0/04090299", "title": "The Directed Steiner Network Problem is Tractable for a Constant Number of Terminals", "doi": null, "abstractUrl": "/proceedings-article/focs/1999/04090299/12OmNBOllmq", "parentPublication": { "id": "proceedings/focs/1999/0409/0", "title": "40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031a846", "title": "Diconnected Components Kernel of Directed Graph", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031a846/12OmNqBtj3D", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1996/7594/0/75940292", "title": "Approximating minimum-size k-connected spanning subgraphs via matching", "doi": null, "abstractUrl": "/proceedings-article/focs/1996/75940292/12OmNxE2mXF", "parentPublication": { "id": "proceedings/focs/1996/7594/0", "title": "Proceedings of 37th Conference on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apvis/2007/0808/0/04126219", "title": "Directed graphs and rectangular layouts", "doi": null, "abstractUrl": "/proceedings-article/apvis/2007/04126219/12OmNy3RRw8", "parentPublication": { "id": "proceedings/apvis/2007/0808/0", "title": "Asia-Pacific Symposium on Visualisation 2007", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/1983/08/01676323", "title": "A Design for Directed Graphs with Minimum Diameter", "doi": null, "abstractUrl": "/journal/tc/1983/08/01676323/13rRUwd9CEX", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2004/01/v0046", "title": "Combining Hierarchy and Energy Drawing Directed Graphs", "doi": null, "abstractUrl": "/journal/tg/2004/01/v0046/13rRUwgQpDf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/09/ttk2010091203", "title": "Mining Frequent Subgraph Patterns from Uncertain Graph Data", "doi": null, "abstractUrl": "/journal/tk/2010/09/ttk2010091203/13rRUyoPSPr", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2022/2055/0/205500b147", "title": "Minimum Cuts in Directed Graphs via Partial Sparsification", "doi": null, "abstractUrl": "/proceedings-article/focs/2022/205500b147/1BtfxsqIX6w", "parentPublication": { "id": "proceedings/focs/2022/2055/0", "title": "2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvkYx7I", "title": "2009 IEEE 25th International Conference on Data Engineering", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyPQ4yV", "doi": "10.1109/ICDE.2009.132", "title": "Continuous Subgraph Pattern Search over Graph Streams", "normalizedTitle": "Continuous Subgraph Pattern Search over Graph Streams", "abstract": "Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network traffic data, and pattern matching over users' visiting logs. However, most of the existing work focuses on search over static graph databases while in many real applications graphs are changing over time. In this paper we investigate a new problem on continuous subgraph pattern search under the situation where multiple target graphs are constantly changing in a stream style, namely the subgraph pattern search over graph streams. Obviously the proposed problem is a continuous join between query patterns and graph streams where the join predicate is the existence of subgraph isomorphism. Due to the NP-completeness of subgraph isomorphism checking, to achieve the real time monitoring of the existence of certain subgraph patterns, we would like to avoid using subgraph isomorphism verification to find the exact query-stream subgraph isomorphic pairs but to offer an approximate answer that could report all probable pairs without missing any of the actual answer pairs. In this paper we propose a light-weight yet effective feature structure called Node-Neighbor Tree to filter false candidate query-stream pairs. To reduce the computational cost, we further project the feature structures into a numerical vector space and conduct dominant relationship checking in the projected space. We propose two methods to efficiently check dominant relationships and substantiate our methods with extensive experiments.", "abstracts": [ { "abstractType": "Regular", "content": "Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network traffic data, and pattern matching over users' visiting logs. However, most of the existing work focuses on search over static graph databases while in many real applications graphs are changing over time. In this paper we investigate a new problem on continuous subgraph pattern search under the situation where multiple target graphs are constantly changing in a stream style, namely the subgraph pattern search over graph streams. Obviously the proposed problem is a continuous join between query patterns and graph streams where the join predicate is the existence of subgraph isomorphism. Due to the NP-completeness of subgraph isomorphism checking, to achieve the real time monitoring of the existence of certain subgraph patterns, we would like to avoid using subgraph isomorphism verification to find the exact query-stream subgraph isomorphic pairs but to offer an approximate answer that could report all probable pairs without missing any of the actual answer pairs. In this paper we propose a light-weight yet effective feature structure called Node-Neighbor Tree to filter false candidate query-stream pairs. To reduce the computational cost, we further project the feature structures into a numerical vector space and conduct dominant relationship checking in the projected space. We propose two methods to efficiently check dominant relationships and substantiate our methods with extensive experiments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network traffic data, and pattern matching over users' visiting logs. However, most of the existing work focuses on search over static graph databases while in many real applications graphs are changing over time. In this paper we investigate a new problem on continuous subgraph pattern search under the situation where multiple target graphs are constantly changing in a stream style, namely the subgraph pattern search over graph streams. Obviously the proposed problem is a continuous join between query patterns and graph streams where the join predicate is the existence of subgraph isomorphism. Due to the NP-completeness of subgraph isomorphism checking, to achieve the real time monitoring of the existence of certain subgraph patterns, we would like to avoid using subgraph isomorphism verification to find the exact query-stream subgraph isomorphic pairs but to offer an approximate answer that could report all probable pairs without missing any of the actual answer pairs. In this paper we propose a light-weight yet effective feature structure called Node-Neighbor Tree to filter false candidate query-stream pairs. To reduce the computational cost, we further project the feature structures into a numerical vector space and conduct dominant relationship checking in the projected space. We propose two methods to efficiently check dominant relationships and substantiate our methods with extensive experiments.", "fno": "3545a393", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Changliang Wang", "givenName": "Changliang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lei Chen", "givenName": "Lei", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-03-01T00:00:00", "pubType": "proceedings", "pages": "393-404", "year": "2009", "issn": "1084-4627", "isbn": "978-0-7695-3545-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3545a381", "articleId": "12OmNz61dv4", "__typename": "AdjacentArticleType" }, "next": { "fno": "3545a405", "articleId": "12OmNASraAU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpads/2016/4457/0/4457b118", "title": "Towards Scalable Subgraph Pattern Matching over Big Graphs on MapReduce", "doi": null, "abstractUrl": "/proceedings-article/icpads/2016/4457b118/12OmNAoDi4O", "parentPublication": { "id": "proceedings/icpads/2016/4457/0", "title": "2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840996", "title": "Distributed exact subgraph matching in small diameter dynamic graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840996/12OmNyYm2pz", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/01/07374671", "title": "On the Variable Ordering in Subgraph Isomorphism Algorithms", "doi": null, "abstractUrl": "/journal/tb/2017/01/07374671/13rRUxBa5vM", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2003/04/01209024", "title": "The Subgraph Bisimulation Problem", "doi": null, "abstractUrl": "/journal/tk/2003/04/01209024/13rRUxly8Tj", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/08/ttk2010081093", "title": "Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams", "doi": null, "abstractUrl": "/journal/tk/2010/08/ttk2010081093/13rRUxly9el", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2018/5035/0/08622100", "title": "A Chronological Edge-Driven Approach to Temporal Subgraph Isomorphism", "doi": null, "abstractUrl": "/proceedings-article/big-data/2018/08622100/17D45WrVgeP", "parentPublication": { "id": "proceedings/big-data/2018/5035/0", "title": "2018 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b082", "title": "Time Constrained Continuous Subgraph Search Over Streaming Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b082/1aDSRF46kDe", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a220", "title": "Scaling Up Subgraph Query Processing with Efficient Subgraph Matching", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a220/1aDSWRCnFEA", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006538", "title": "Applications of Structural Equivalence to Subgraph Isomorphism on Multichannel Multigraphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006538/1hJsicBYsJW", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/09/09248627", "title": "Space-Efficient Subgraph Search Over Streaming Graph With Timing Order Constraint", "doi": null, "abstractUrl": "/journal/tk/2022/09/09248627/1otZZXG7oEE", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxX3uMf", "title": "2011 International Conference on Document Analysis and Recognition", "acronym": "icdar", "groupId": "1000219", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNzX6cm2", "doi": "10.1109/ICDAR.2011.178", "title": "Subgraph Spotting through Explicit Graph Embedding: An Application to Content Spotting in Graphic Document Images", "normalizedTitle": "Subgraph Spotting through Explicit Graph Embedding: An Application to Content Spotting in Graphic Document Images", "abstract": "We present a method for spotting a subgraph in a graph repository. Subgraph spotting is a very interesting research problem for various application domains where the use of a relational data structure is mandatory. Our proposed method accomplishes subgraph spotting through graph embedding. We achieve automatic indexation of a graph repository during off-line learning phase, where we (i) break the graphs into 2-node sub graphs (a.k.a. cliques of order 2), which are primitive building-blocks of a graph, (ii) embed the 2-node sub graphs into feature vectors by employing our recently proposed explicit graph embedding technique, (iii) cluster the feature vectors in classes by employing a classic agglomerative clustering technique, (iv) build an index for the graph repository and (v) learn a Bayesian network classifier. The subgraph spotting is achieved during the on-line querying phase, where we (i) break the query graph into 2-node sub graphs, (ii) embed them into feature vectors, (iii) employ the Bayesian network classifier for classifying the query 2-node sub graphs and (iv) retrieve the respective graphs by looking-up in the index of the graph repository. The graphs containing all query 2-node sub graphs form the set of result graphs for the query. Finally, we employ the adjacency matrix of each result graph along with a score function, for spotting the query graph in it. The proposed subgraph spotting method is equally applicable to a wide range of domains, offering ease of query by example (QBE) and granularity of focused retrieval. Experimental results are presented for graphs generated from two repositories of electronic and architectural document images.", "abstracts": [ { "abstractType": "Regular", "content": "We present a method for spotting a subgraph in a graph repository. Subgraph spotting is a very interesting research problem for various application domains where the use of a relational data structure is mandatory. Our proposed method accomplishes subgraph spotting through graph embedding. We achieve automatic indexation of a graph repository during off-line learning phase, where we (i) break the graphs into 2-node sub graphs (a.k.a. cliques of order 2), which are primitive building-blocks of a graph, (ii) embed the 2-node sub graphs into feature vectors by employing our recently proposed explicit graph embedding technique, (iii) cluster the feature vectors in classes by employing a classic agglomerative clustering technique, (iv) build an index for the graph repository and (v) learn a Bayesian network classifier. The subgraph spotting is achieved during the on-line querying phase, where we (i) break the query graph into 2-node sub graphs, (ii) embed them into feature vectors, (iii) employ the Bayesian network classifier for classifying the query 2-node sub graphs and (iv) retrieve the respective graphs by looking-up in the index of the graph repository. The graphs containing all query 2-node sub graphs form the set of result graphs for the query. Finally, we employ the adjacency matrix of each result graph along with a score function, for spotting the query graph in it. The proposed subgraph spotting method is equally applicable to a wide range of domains, offering ease of query by example (QBE) and granularity of focused retrieval. Experimental results are presented for graphs generated from two repositories of electronic and architectural document images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a method for spotting a subgraph in a graph repository. Subgraph spotting is a very interesting research problem for various application domains where the use of a relational data structure is mandatory. Our proposed method accomplishes subgraph spotting through graph embedding. We achieve automatic indexation of a graph repository during off-line learning phase, where we (i) break the graphs into 2-node sub graphs (a.k.a. cliques of order 2), which are primitive building-blocks of a graph, (ii) embed the 2-node sub graphs into feature vectors by employing our recently proposed explicit graph embedding technique, (iii) cluster the feature vectors in classes by employing a classic agglomerative clustering technique, (iv) build an index for the graph repository and (v) learn a Bayesian network classifier. The subgraph spotting is achieved during the on-line querying phase, where we (i) break the query graph into 2-node sub graphs, (ii) embed them into feature vectors, (iii) employ the Bayesian network classifier for classifying the query 2-node sub graphs and (iv) retrieve the respective graphs by looking-up in the index of the graph repository. The graphs containing all query 2-node sub graphs form the set of result graphs for the query. Finally, we employ the adjacency matrix of each result graph along with a score function, for spotting the query graph in it. The proposed subgraph spotting method is equally applicable to a wide range of domains, offering ease of query by example (QBE) and granularity of focused retrieval. Experimental results are presented for graphs generated from two repositories of electronic and architectural document images.", "fno": "4520a870", "keywords": [ "Subgraph Spotting", "Explicit Graph Embedding", "Graphics Recognition", "Content Spotting", "Focused Retrieval" ], "authors": [ { "affiliation": null, "fullName": "Muhammad Muzzamil Luqman", "givenName": "Muhammad Muzzamil", "surname": "Luqman", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jean-Yves Ramel", "givenName": "Jean-Yves", "surname": "Ramel", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Josep Lladós", "givenName": "Josep", "surname": "Lladós", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thierry Brouard", "givenName": "Thierry", "surname": "Brouard", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "870-874", "year": "2011", "issn": "1520-5363", "isbn": "978-0-7695-4520-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4520a864", "articleId": "12OmNBSjIXC", "__typename": "AdjacentArticleType" }, "next": { "fno": "4520a875", "articleId": "12OmNwE9OVe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2010/4138/0/4138a248", "title": "COSI: Cloud Oriented Subgraph Identification in Massive Social Networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2010/4138a248/12OmNAsk4z8", "parentPublication": { "id": "proceedings/asonam/2010/4138/0", "title": "2010 International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109d420", "title": "A Content Spotting System for Line Drawing Graphic Document Images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109d420/12OmNBKW9Iu", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2013/4909/0/06544867", "title": "Ontology-based subgraph querying", "doi": null, "abstractUrl": "/proceedings-article/icde/2013/06544867/12OmNs5rkU5", "parentPublication": { "id": "proceedings/icde/2013/4909/0", "title": "2013 29th IEEE International Conference on Data Engineering (ICDE 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2010/4221/0/4221a283", "title": "Hand-Drawn Symbol Spotting Using Semi-definite Programming Based Sub-graph Matching", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2010/4221a283/12OmNvT2oML", "parentPublication": { "id": "proceedings/icfhr/2010/4221/0", "title": "Frontiers in Handwriting Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2015/1805/0/07333829", "title": "One-shot field spotting on colored forms using subgraph isomorphism", "doi": null, "abstractUrl": "/proceedings-article/icdar/2015/07333829/12OmNz61drN", "parentPublication": { "id": "proceedings/icdar/2015/1805/0", "title": "2015 13th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2009/3895/0/3895a239", "title": "Efficient Discovery of Frequent Correlated Subgraph Pairs", "doi": null, "abstractUrl": "/proceedings-article/icdm/2009/3895a239/12OmNzxPTMV", "parentPublication": { "id": "proceedings/icdm/2009/3895/0", "title": "2009 Ninth IEEE International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2000/02/k0307", "title": "Efficient Subgraph Isomorphism Detection: A Decomposition Approach", "doi": null, "abstractUrl": "/journal/tk/2000/02/k0307/13rRUwdIOV4", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/08/ttk2010081093", "title": "Continuous Subgraph Pattern Search over Certain and Uncertain Graph Streams", "doi": null, "abstractUrl": "/journal/tk/2010/08/ttk2010081093/13rRUxly9el", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2010/09/ttk2010091203", "title": "Mining Frequent Subgraph Patterns from Uncertain Graph Data", "doi": null, "abstractUrl": "/journal/tk/2010/09/ttk2010091203/13rRUyoPSPr", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a220", "title": "Scaling Up Subgraph Query Processing with Efficient Subgraph Matching", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a220/1aDSWRCnFEA", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FwF6rOD2ec", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1FwBCyhqyXK", "doi": "10.1109/ICDE53745.2022.00285", "title": "VICS-GNN: A Visual Interactive System for Community Search via Graph Neural Network", "normalizedTitle": "VICS-GNN: A Visual Interactive System for Community Search via Graph Neural Network", "abstract": "Community Search, which locates the desired sub-graph containing the query node, is a fundamental operation in network analysis. Most of the existing systems rely on pre-defined rules to find the community, while we argue that the target community is always specific for different purposes and the pre-defined rules may not be suitable. In this work, we demonstrate VICS-GNN, a Visual Interactive system for Community Search via graph Neural Network. VICS-GNN provides end users with a flexible, user-friendly front end to manage and explore the sub-graph around the query node, allows users labeling nodes to guide G NN models in learning community rules by combining content and structural features, and locates the community interactively and iteratively. In the demonstration, demo visitors will be invited to experience the VICS-GNN system using real-world data from Wikipedia and Sina Weibo to feel how convenient and intuitive it is to help with community search.", "abstracts": [ { "abstractType": "Regular", "content": "Community Search, which locates the desired sub-graph containing the query node, is a fundamental operation in network analysis. Most of the existing systems rely on pre-defined rules to find the community, while we argue that the target community is always specific for different purposes and the pre-defined rules may not be suitable. In this work, we demonstrate VICS-GNN, a Visual Interactive system for Community Search via graph Neural Network. VICS-GNN provides end users with a flexible, user-friendly front end to manage and explore the sub-graph around the query node, allows users labeling nodes to guide G NN models in learning community rules by combining content and structural features, and locates the community interactively and iteratively. In the demonstration, demo visitors will be invited to experience the VICS-GNN system using real-world data from Wikipedia and Sina Weibo to feel how convenient and intuitive it is to help with community search.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Community Search, which locates the desired sub-graph containing the query node, is a fundamental operation in network analysis. Most of the existing systems rely on pre-defined rules to find the community, while we argue that the target community is always specific for different purposes and the pre-defined rules may not be suitable. In this work, we demonstrate VICS-GNN, a Visual Interactive system for Community Search via graph Neural Network. VICS-GNN provides end users with a flexible, user-friendly front end to manage and explore the sub-graph around the query node, allows users labeling nodes to guide G NN models in learning community rules by combining content and structural features, and locates the community interactively and iteratively. In the demonstration, demo visitors will be invited to experience the VICS-GNN system using real-world data from Wikipedia and Sina Weibo to feel how convenient and intuitive it is to help with community search.", "fno": "088300d150", "keywords": [ "Graph Theory", "Interactive Systems", "Learning Artificial Intelligence", "Neural Nets", "Social Networking Online", "Visual Interactive System", "Community Search", "Graph Neural Network", "Desired Sub Graph", "Query Node", "Network Analysis", "Pre Defined Rules", "Target Community", "Community Rules", "VICS GNN System", "Visualization", "Interactive Systems", "Conferences", "Network Analyzers", "Encyclopedias", "Data Engineering", "Graph Neural Networks", "Interactive Community Search", "Graph Neural Network", "Visualization", "Social Network" ], "authors": [ { "affiliation": "Peking University,Computer Science Department,Beijing,China", "fullName": "Jiazun Chen", "givenName": "Jiazun", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,Computer Science Department,Beijing,China", "fullName": "Jun Gao", "givenName": "Jun", "surname": "Gao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "3150-3153", "year": "2022", "issn": null, "isbn": "978-1-6654-0883-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "088300d146", "articleId": "1FwBC1MDLHO", "__typename": "AdjacentArticleType" }, "next": { "fno": "088300d154", "articleId": "1FwFyTlRMTC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2021/2398/0/239800b421", "title": "Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b421/1Aqx6oOoaLm", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcomp/2022/2197/0/219700a108", "title": "Graph Neural Networks with Stability and Discernability", "doi": null, "abstractUrl": "/proceedings-article/bigcomp/2022/219700a108/1BYIEhM2D6w", "parentPublication": { "id": "proceedings/bigcomp/2022/2197/0", "title": "2022 IEEE International Conference on Big Data and Smart Computing (BigComp)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c168", "title": "PSP: Progressive Space Pruning for Efficient Graph Neural Architecture Search", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c168/1FwBFGYgBji", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300d012", "title": "BA-GNN: On Learning Bias-Aware Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300d012/1FwFIuf82iI", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09910382", "title": "Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network against Adversarial Attacks", "doi": null, "abstractUrl": "/journal/tq/5555/01/09910382/1Hcjw6oR19S", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a231", "title": "CC-GNN: A Community and Contraction-based Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a231/1KpCGX7nMmk", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10056291", "title": "Automated Graph Neural Network Search Under Federated Learning Framework", "doi": null, "abstractUrl": "/journal/tk/5555/01/10056291/1L8lLxJDhcs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/5555/01/10112632", "title": "CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection", "doi": null, "abstractUrl": "/journal/ec/5555/01/10112632/1MIcUrQUr1S", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377860", "title": "Self-supervised Hierarchical Graph Neural Network for Graph Representation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377860/1s64M5Jpm5a", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552902", "title": "Interactive Visual Pattern Search on Graph Data via Graph Representation Learning", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552902/1xic4qsF8zK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KpChQa9kQ0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KpCwhzN9m0", "doi": "10.1109/ICDM54844.2022.00137", "title": "Improving Graph Representation Learning with Distribution Preserving", "normalizedTitle": "Improving Graph Representation Learning with Distribution Preserving", "abstract": "Graph neural network (GNN) is effective to model graphs for distributed representations of nodes and an entire graph. Recently, research on the expressive power of GNN attracted growing attention. A highly expressive GNN has the ability to generate discriminative graph representations. However, in the end-to-end training process for a certain graph learning task, an expressive GNN could generate graph representations overfitting the training data for the target task but losing information important for the model generalization, thus reducing the generalizability. In this paper, we propose Distribution Preserving GNN (DP-GNN), a GNN framework that can improve the generalizability of expressive GNN models by preserving several kinds of distribution information in graph representations and node representations. Besides the generalizability, by applying an expressive GNN backbone, DP-GNN can also have high expressive power. We evaluate the proposed DP-GNN framework on multiple benchmark datasets for graph classification tasks. The experimental results demonstrate that our model achieves state-of-the-art performances.", "abstracts": [ { "abstractType": "Regular", "content": "Graph neural network (GNN) is effective to model graphs for distributed representations of nodes and an entire graph. Recently, research on the expressive power of GNN attracted growing attention. A highly expressive GNN has the ability to generate discriminative graph representations. However, in the end-to-end training process for a certain graph learning task, an expressive GNN could generate graph representations overfitting the training data for the target task but losing information important for the model generalization, thus reducing the generalizability. In this paper, we propose Distribution Preserving GNN (DP-GNN), a GNN framework that can improve the generalizability of expressive GNN models by preserving several kinds of distribution information in graph representations and node representations. Besides the generalizability, by applying an expressive GNN backbone, DP-GNN can also have high expressive power. We evaluate the proposed DP-GNN framework on multiple benchmark datasets for graph classification tasks. The experimental results demonstrate that our model achieves state-of-the-art performances.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph neural network (GNN) is effective to model graphs for distributed representations of nodes and an entire graph. Recently, research on the expressive power of GNN attracted growing attention. A highly expressive GNN has the ability to generate discriminative graph representations. However, in the end-to-end training process for a certain graph learning task, an expressive GNN could generate graph representations overfitting the training data for the target task but losing information important for the model generalization, thus reducing the generalizability. In this paper, we propose Distribution Preserving GNN (DP-GNN), a GNN framework that can improve the generalizability of expressive GNN models by preserving several kinds of distribution information in graph representations and node representations. Besides the generalizability, by applying an expressive GNN backbone, DP-GNN can also have high expressive power. We evaluate the proposed DP-GNN framework on multiple benchmark datasets for graph classification tasks. The experimental results demonstrate that our model achieves state-of-the-art performances.", "fno": "509900b095", "keywords": [ "Graph Neural Networks", "Learning Artificial Intelligence", "Pattern Classification", "Discriminative Graph Representations", "Distribution Information", "Distribution Preserving GNN", "DP GNN Framework", "End To End Training Process", "Expressive GNN Backbone", "Expressive GNN Models", "Generalizability", "Graph Classification Tasks", "Graph Neural Network", "Graph Representation Learning", "Highly Expressive GNN", "Model Generalization", "Model Graphs", "Node Representations", "Training", "Representation Learning", "Training Data", "Benchmark Testing", "Multitasking", "Data Models", "Graph Neural Networks", "Graph Neural Network", "Graph Representation", "Multi Task Learning", "Generalizability", "Expressive Power" ], "authors": [ { "affiliation": "Northwestern University,Feiberg School of Medicine,Department of Preventive Medicine,Chicago,USA", "fullName": "Chengsheng Mao", "givenName": "Chengsheng", "surname": "Mao", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University,Feiberg School of Medicine,Department of Preventive Medicine,Chicago,USA", "fullName": "Yuan Luo", "givenName": "Yuan", "surname": "Luo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1095-1100", "year": "2022", "issn": null, "isbn": "978-1-6654-5099-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "509900b089", "articleId": "1KpCF87kpTW", "__typename": "AdjacentArticleType" }, "next": { "fno": "509900b101", "articleId": "1KpCAqnF5oQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2021/2427/0/242700a711", "title": "Graph Representation Learning with Adaptive Mixtures", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a711/1AjSScPavni", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09839432", "title": "OOD-GNN: Out-of-Distribution Generalized Graph Neural Network", "doi": null, "abstractUrl": "/journal/tk/5555/01/09839432/1Fisq5OcXeg", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09896198", "title": "Distribution Knowledge Embedding for Graph Pooling", "doi": null, "abstractUrl": "/journal/tk/5555/01/09896198/1GP3HhSsAZa", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a682", "title": "Improving Graph Neural Network with Learnable Permutation Pooling", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a682/1KBqVtM9e5W", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020299", "title": "Temporal Graph Representation Learning via Maximal Cliques", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020299/1KfRMAqO2wE", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a783", "title": "Multi-Relational Graph Neural Architecture Search with Fine-grained Message Passing", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a783/1KpCC81QEXC", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a231", "title": "CC-GNN: A Community and Contraction-based Graph Neural Network", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a231/1KpCGX7nMmk", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a432", "title": "Tree Structure-Aware Graph Representation Learning via Integrated Hierarchical Aggregation and Relational Metric Learning", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a432/1r54H2s0tu8", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09508847", "title": "Propagation Enhanced Neural Message Passing for Graph Representation Learning", "doi": null, "abstractUrl": "/journal/tk/2023/02/09508847/1vQzgmatX6E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/03/09547743", "title": "Automated Unsupervised Graph Representation Learning", "doi": null, "abstractUrl": "/journal/tk/2023/03/09547743/1x9TrFN3TRS", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1r54vmgaSyY", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1r54H2s0tu8", "doi": "10.1109/ICDM50108.2020.00052", "title": "Tree Structure-Aware Graph Representation Learning via Integrated Hierarchical Aggregation and Relational Metric Learning", "normalizedTitle": "Tree Structure-Aware Graph Representation Learning via Integrated Hierarchical Aggregation and Relational Metric Learning", "abstract": "While Graph Neural Network (GNN) has shown superiority in learning node representations of homogeneous graphs, leveraging GNN on heterogeneous graphs remains a challenging problem. The dominating reason is that GNN learns node representations by aggregating neighbors' information regardless of node types. Some work is proposed to alleviate such issue by exploiting relations or meta-path to sample neighbors with distinct categories, then use attention mechanism to learn different importance for different categories. However, one limitation is that the learned representations for different types of nodes should own different feature spaces, while all the above work still project node representations into one feature space. Moreover, after exploring massive heterogeneous graphs, we identify a fact that multiple nodes with the same type always connect to a node with another type, which reveals the many-to-one schema, a.k.a. the hierarchical tree structure. But all the above work cannot preserve such tree structure, since the exact multi-hop path correlation from neighbors to the target node would be erased through aggregation. Therefore, to overcome the limitations of the literature, we propose T-GNN, a tree structure-aware graph neural network model for graph representation learning. Specifically, the proposed T-GNN consists of two modules: (1) the integrated hierarchical aggregation module and (2) the relational metric learning module. The integrated hierarchical aggregation module aims to preserve the tree structure by combining GNN with gated recurrent unit to integrate the hierarchical and sequential neighborhood information on the tree structure to node representations. The relational metric learning module aims to preserve the heterogeneity by embedding each type of nodes into a type-specific space with distinct distribution based on similarity metrics. In this way, our proposed T-GNN is capable of simultaneously preserving the heterogeneity and the tree structure inherent in heterogeneous graphs. Finally, we conduct extensive experiments to show the outstanding performance of T-GNN in tasks of node clustering and classification, inductive node clustering and classification, and link prediction.", "abstracts": [ { "abstractType": "Regular", "content": "While Graph Neural Network (GNN) has shown superiority in learning node representations of homogeneous graphs, leveraging GNN on heterogeneous graphs remains a challenging problem. The dominating reason is that GNN learns node representations by aggregating neighbors' information regardless of node types. Some work is proposed to alleviate such issue by exploiting relations or meta-path to sample neighbors with distinct categories, then use attention mechanism to learn different importance for different categories. However, one limitation is that the learned representations for different types of nodes should own different feature spaces, while all the above work still project node representations into one feature space. Moreover, after exploring massive heterogeneous graphs, we identify a fact that multiple nodes with the same type always connect to a node with another type, which reveals the many-to-one schema, a.k.a. the hierarchical tree structure. But all the above work cannot preserve such tree structure, since the exact multi-hop path correlation from neighbors to the target node would be erased through aggregation. Therefore, to overcome the limitations of the literature, we propose T-GNN, a tree structure-aware graph neural network model for graph representation learning. Specifically, the proposed T-GNN consists of two modules: (1) the integrated hierarchical aggregation module and (2) the relational metric learning module. The integrated hierarchical aggregation module aims to preserve the tree structure by combining GNN with gated recurrent unit to integrate the hierarchical and sequential neighborhood information on the tree structure to node representations. The relational metric learning module aims to preserve the heterogeneity by embedding each type of nodes into a type-specific space with distinct distribution based on similarity metrics. In this way, our proposed T-GNN is capable of simultaneously preserving the heterogeneity and the tree structure inherent in heterogeneous graphs. Finally, we conduct extensive experiments to show the outstanding performance of T-GNN in tasks of node clustering and classification, inductive node clustering and classification, and link prediction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "While Graph Neural Network (GNN) has shown superiority in learning node representations of homogeneous graphs, leveraging GNN on heterogeneous graphs remains a challenging problem. The dominating reason is that GNN learns node representations by aggregating neighbors' information regardless of node types. Some work is proposed to alleviate such issue by exploiting relations or meta-path to sample neighbors with distinct categories, then use attention mechanism to learn different importance for different categories. However, one limitation is that the learned representations for different types of nodes should own different feature spaces, while all the above work still project node representations into one feature space. Moreover, after exploring massive heterogeneous graphs, we identify a fact that multiple nodes with the same type always connect to a node with another type, which reveals the many-to-one schema, a.k.a. the hierarchical tree structure. But all the above work cannot preserve such tree structure, since the exact multi-hop path correlation from neighbors to the target node would be erased through aggregation. Therefore, to overcome the limitations of the literature, we propose T-GNN, a tree structure-aware graph neural network model for graph representation learning. Specifically, the proposed T-GNN consists of two modules: (1) the integrated hierarchical aggregation module and (2) the relational metric learning module. The integrated hierarchical aggregation module aims to preserve the tree structure by combining GNN with gated recurrent unit to integrate the hierarchical and sequential neighborhood information on the tree structure to node representations. The relational metric learning module aims to preserve the heterogeneity by embedding each type of nodes into a type-specific space with distinct distribution based on similarity metrics. In this way, our proposed T-GNN is capable of simultaneously preserving the heterogeneity and the tree structure inherent in heterogeneous graphs. Finally, we conduct extensive experiments to show the outstanding performance of T-GNN in tasks of node clustering and classification, inductive node clustering and classification, and link prediction.", "fno": "831600a432", "keywords": [ "Graph Theory", "Learning Artificial Intelligence", "Neural Nets", "Trees Mathematics", "Tree Structure Aware Graph Representation Learning", "Node Representations", "Homogeneous Graphs", "Node Types", "Learned Representations", "Different Feature Spaces", "Massive Heterogeneous Graphs", "Multiple Nodes", "Hierarchical Tree Structure", "Target Node", "T GNN", "Tree Structure Aware Graph Neural Network Model", "Integrated Hierarchical Aggregation Module", "Relational Metric Learning Module", "Type Specific Space", "Tree Structure Inherent", "Inductive Node Clustering", "Classification", "Correlation", "Logic Gates", "Extraterrestrial Measurements", "Graph Neural Networks", "Space Exploration", "Data Mining", "Task Analysis", "Graph Neural Network Graph Representation Learning Metric Learning Heterogeneous Graph" ], "authors": [ { "affiliation": "Computer Network Information Center, CAS. University of Chinese Academy of Sciences.", "fullName": "Ziyue Qiao", "givenName": "Ziyue", "surname": "Qiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Central Florida, Orlando", "fullName": "Pengyang Wang", "givenName": "Pengyang", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Central Florida, Orlando", "fullName": "Yanjie Fu", "givenName": "Yanjie", "surname": "Fu", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Network Information Center, Chinese Academy of Sciences, Beijing", "fullName": "Yi Du", "givenName": "Yi", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba DAMO Academy, Alibaba Group, China", "fullName": "Pengfei Wang", "givenName": "Pengfei", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Network Information Center, Chinese Academy of Sciences, Beijing", "fullName": "Yuanchun Zhou", "givenName": "Yuanchun", "surname": "Zhou", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "432-441", "year": "2020", "issn": null, "isbn": "978-1-7281-8316-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "831600a422", "articleId": "1r54HE5hcGs", "__typename": "AdjacentArticleType" }, "next": { "fno": "831600a442", "articleId": "1r54GQx8BUc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032b453", "title": "Adaptive RNN Tree for Large-Scale Human Action Recognition", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032b453/12OmNCeK2pg", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498318", "title": "Indexing multi-metric data", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498318/12OmNvDI3PU", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2013/5108/0/5108a001", "title": "Tree-Like Structure in Large Social and Information Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2013/5108a001/12OmNzaQoEw", "parentPublication": { "id": "proceedings/icdm/2013/5108/0", "title": "2013 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/09/08027090", "title": "Sharable and Individual Multi-View Metric Learning", "doi": null, "abstractUrl": "/journal/tp/2018/09/08027090/13rRUwbs2cc", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2017/02/07447693", "title": "A Characterization of Minimum Spanning Tree-Like Metric Spaces", "doi": null, "abstractUrl": "/journal/tb/2017/02/07447693/13rRUxASuz9", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020299", "title": "Temporal Graph Representation Learning via Maximal Cliques", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020299/1KfRMAqO2wE", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900a783", "title": "Multi-Relational Graph Neural Architecture Search with Fine-grained Message Passing", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900a783/1KpCC81QEXC", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900b095", "title": "Improving Graph Representation Learning with Distribution Preserving", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900b095/1KpCwhzN9m0", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/01/09415142", "title": "Higher-Order Attribute-Enhancing Heterogeneous Graph Neural Networks", "doi": null, "abstractUrl": "/journal/tk/2023/01/09415142/1t2icqiqsak", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/02/09508847", "title": "Propagation Enhanced Neural Message Passing for Graph Representation Learning", "doi": null, "abstractUrl": "/journal/tk/2023/02/09508847/1vQzgmatX6E", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyNQSGU", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "acronym": "grc", "groupId": "1001626", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvSbBBZ", "doi": "10.1109/GRC.2014.6982839", "title": "On semantic evaluation of text clustering algorithms", "normalizedTitle": "On semantic evaluation of text clustering algorithms", "abstract": "In this paper, we investigate the problem of quality analysis of clustering results using semantic annotations given by experts. In previous work we proposed a novel approach to construction of evaluation measure, called SEE (Semantic Evaluation by Exploration), which is an extension of the existing methods such as Rand Index or Normalized Mutual Information. In this paper we present some further extensions as well as some theoretical properties of the of the proposed measure. We illustrate the proposed evaluation method on documents in INFONA document retrieval system. We compare different search result clustering algorithms using the proposed measure.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we investigate the problem of quality analysis of clustering results using semantic annotations given by experts. In previous work we proposed a novel approach to construction of evaluation measure, called SEE (Semantic Evaluation by Exploration), which is an extension of the existing methods such as Rand Index or Normalized Mutual Information. In this paper we present some further extensions as well as some theoretical properties of the of the proposed measure. We illustrate the proposed evaluation method on documents in INFONA document retrieval system. We compare different search result clustering algorithms using the proposed measure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we investigate the problem of quality analysis of clustering results using semantic annotations given by experts. In previous work we proposed a novel approach to construction of evaluation measure, called SEE (Semantic Evaluation by Exploration), which is an extension of the existing methods such as Rand Index or Normalized Mutual Information. In this paper we present some further extensions as well as some theoretical properties of the of the proposed measure. We illustrate the proposed evaluation method on documents in INFONA document retrieval system. We compare different search result clustering algorithms using the proposed measure.", "fno": "06982839", "keywords": [ "Clustering Algorithms", "Semantics", "Decision Trees", "Mutual Information", "Indexes", "Approximation Algorithms" ], "authors": [ { "affiliation": "Institute of Mathematics, The University of Warsaw, Banacha 2, 02-097, Warsaw Poland", "fullName": "Sinh Hoa Nguyen", "givenName": "Sinh Hoa", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Mathematics, The University of Warsaw, Banacha 2, 02-097, Warsaw Poland", "fullName": "Wojciech Swieboda", "givenName": "Wojciech", "surname": "Swieboda", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute of Mathematics, The University of Warsaw, Banacha 2, 02-097, Warsaw Poland", "fullName": "Hung Son Nguyen", "givenName": "Hung Son", "surname": "Nguyen", "__typename": "ArticleAuthorType" } ], "idPrefix": "grc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "224-229", "year": "2014", "issn": null, "isbn": "978-1-4799-5464-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06982838", "articleId": "12OmNBKW9JK", "__typename": "AdjacentArticleType" }, "next": { "fno": "06982840", "articleId": "12OmNzXnNwE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cis/2012/4896/0/4896a103", "title": "Class Assignment Algorithms for Performance Measure of Clustering Algorithms", "doi": null, "abstractUrl": "/proceedings-article/cis/2012/4896a103/12OmNAio72s", "parentPublication": { "id": "proceedings/cis/2012/4896/0", "title": "2012 Eighth International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscmi/2015/9819/0/9819a064", "title": "A Short Survey on Data Clustering Algorithms", "doi": null, "abstractUrl": "/proceedings-article/iscmi/2015/9819a064/12OmNBQC8cM", "parentPublication": { "id": "proceedings/iscmi/2015/9819/0", "title": "2015 Second International Conference on Soft Computing and Machine Intelligence (ISCMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2014/5721/0/06974853", "title": "Investigation of Latent Semantic Analysis for Clustering of Czech News Articles", "doi": null, "abstractUrl": "/proceedings-article/dexa/2014/06974853/12OmNvSbBx2", "parentPublication": { "id": "proceedings/dexa/2014/5721/0", "title": "2014 25th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2009/3902/0/3902a477", "title": "A WordNet-Based Semantic Model for Enhancing Text Clustering", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2009/3902a477/12OmNwErpzI", "parentPublication": { "id": "proceedings/icdmw/2009/3902/0", "title": "2009 IEEE International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbrn/2012/4823/0/4823a049", "title": "A Comparison of External Clustering Evaluation Indices in the Context of Imbalanced Data Sets", "doi": null, "abstractUrl": "/proceedings-article/sbrn/2012/4823a049/12OmNwlHT0N", "parentPublication": { "id": "proceedings/sbrn/2012/4823/0", "title": "Neural Networks, Brazilian Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2014/6572/0/6572a272", "title": "An Entropy-Based Subspace Clustering Algorithm for Categorical Data", "doi": null, "abstractUrl": "/proceedings-article/ictai/2014/6572a272/12OmNyGbIip", "parentPublication": { "id": "proceedings/ictai/2014/6572/0", "title": "2014 IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2014/5464/0/06982800", "title": "Text clustering using fuzzy neighborhood and evaluation of clusters", "doi": null, "abstractUrl": "/proceedings-article/grc/2014/06982800/12OmNzGlRA2", "parentPublication": { "id": "proceedings/grc/2014/5464/0", "title": "2014 IEEE International Conference on Granular Computing (GrC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/enic/2016/3455/0/07838063", "title": "Development and Research of the Text Messages Semantic Clustering Methodology", "doi": null, "abstractUrl": "/proceedings-article/enic/2016/07838063/12OmNzt0IKw", "parentPublication": { "id": "proceedings/enic/2016/3455/0", "title": "2016 Third European Network Intelligence Conference (ENIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07420667", "title": "hc-OTU: A Fast and Accurate Method for Clustering Operational Taxonomic Units Based on Homopolymer Compaction", "doi": null, "abstractUrl": "/journal/tb/2018/02/07420667/13rRUxASuoc", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcabes/2020/9724/0/972400a226", "title": "An Entropy evaluation method of hierarchical clustering", "doi": null, "abstractUrl": "/proceedings-article/dcabes/2020/972400a226/1pq9UDHoSre", "parentPublication": { "id": "proceedings/dcabes/2020/9724/0", "title": "2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBOll8c", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "acronym": "asonam", "groupId": "1002866", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzXFoCU", "doi": "10.1145/2808797.2808803", "title": "GraphExploiter: Creation, visualization and algorithms on graphs", "normalizedTitle": "GraphExploiter: Creation, visualization and algorithms on graphs", "abstract": "We present GraphExploiter, a tool to import, visualize and manage data by representing them in a graph structure. The aim of this platform is (i) to facilitate the creation of graphs from real data sets, (ii) to propose an efficient tool of scalable visualization and (iii) to allow a user to import easily its own graph algorithms to the platform.", "abstracts": [ { "abstractType": "Regular", "content": "We present GraphExploiter, a tool to import, visualize and manage data by representing them in a graph structure. The aim of this platform is (i) to facilitate the creation of graphs from real data sets, (ii) to propose an efficient tool of scalable visualization and (iii) to allow a user to import easily its own graph algorithms to the platform.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present GraphExploiter, a tool to import, visualize and manage data by representing them in a graph structure. The aim of this platform is (i) to facilitate the creation of graphs from real data sets, (ii) to propose an efficient tool of scalable visualization and (iii) to allow a user to import easily its own graph algorithms to the platform.", "fno": "07403630", "keywords": [ "Data Visualization", "Databases", "Clustering Algorithms", "Loading", "Libraries", "Random Access Memory", "Heuristic Algorithms" ], "authors": [ { "affiliation": "Université de Lyon, CNRS, Université Lyon 1, LIRIS, UMR5205, F-69621, France", "fullName": "Victor Lequay", "givenName": "Victor", "surname": "Lequay", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Lyon, CNRS, Université Lyon 1, LIRIS, UMR5205, F-69621, France", "fullName": "Alexis Ringot", "givenName": "Alexis", "surname": "Ringot", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Lyon, CNRS, Université Lyon 1, LIRIS, UMR5205, F-69621, France", "fullName": "Mohammed Haddad", "givenName": "Mohammed", "surname": "Haddad", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Lyon, CNRS, Université Lyon 1, LIRIS, UMR5205, F-69621, France", "fullName": "Brice Effantin", "givenName": "Brice", "surname": "Effantin", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Lyon, CNRS, Université Lyon 1, LIRIS, UMR5205, F-69621, France", "fullName": "Hamamache Kheddouci", "givenName": "Hamamache", "surname": "Kheddouci", "__typename": "ArticleAuthorType" } ], "idPrefix": "asonam", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-08-01T00:00:00", "pubType": "proceedings", "pages": "765-767", "year": "2015", "issn": null, "isbn": "978-1-4503-3854-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07403629", "articleId": "12OmNvAiSkz", "__typename": "AdjacentArticleType" }, "next": { "fno": "07403631", "articleId": "12OmNvDZF1g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/pact/2014/2809/0/07855947", "title": "Processing big data graphs on memory-restricted systems", "doi": null, "abstractUrl": "/proceedings-article/pact/2014/07855947/12OmNBOlltt", "parentPublication": { "id": "proceedings/pact/2014/2809/0", "title": "2014 23rd International Conference on Parallel Architecture and Compilation (PACT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2015/8649/0/8649a799", "title": "A Hybrid Approach to Processing Big Data Graphs on Memory-Restricted Systems", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2015/8649a799/12OmNBtUdGe", "parentPublication": { "id": "proceedings/ipdps/2015/8649/0", "title": "2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2015/8676/0/07176217", "title": "The application of graph algorithms: A reference mapping tool", "doi": null, "abstractUrl": "/proceedings-article/snpd/2015/07176217/12OmNyfdOJK", "parentPublication": { "id": "proceedings/snpd/2015/8676/0", "title": "2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sees/2012/1853/0/06225491", "title": "A dynamic detective method against ROP attack on ARM platform", "doi": null, "abstractUrl": "/proceedings-article/sees/2012/06225491/12OmNzC5T6V", "parentPublication": { "id": "proceedings/sees/2012/1853/0", "title": "2012 2nd International Workshop on Software Engineering for Embedded Systems (SEES)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2016/2179/0/2179a009", "title": "The Visualization of Large Graphs Accelerated by the Parallel Nearest Neighbors Algorithm", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2016/2179a009/12OmNzaQon7", "parentPublication": { "id": "proceedings/bigmm/2016/2179/0", "title": "2016 IEEE Second International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a230", "title": "Dynamic Graph Visualization on Different Temporal Granularities", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a230/12OmNzxPTGk", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2018/03/08070346", "title": "Parallel Algorithm for Incremental Betweenness Centrality on Large Graphs", "doi": null, "abstractUrl": "/journal/td/2018/03/08070346/13rRUwjGoLu", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2018/5520/0/552000b585", "title": "VizCS: Online Searching and Visualizing Communities in Dynamic Graphs", "doi": null, "abstractUrl": "/proceedings-article/icde/2018/552000b585/14Fq0XvEPkh", "parentPublication": { "id": "proceedings/icde/2018/5520/0", "title": "2018 IEEE 34th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a706", "title": "Self-Organizing Map-Based Graph Clustering and Visualization on Streaming Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a706/1KBr2NnqGk0", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09005704", "title": "Algorithms on Compressed Time-Evolving Graphs", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09005704/1hJsC6fO9Ec", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirG", "title": "2018 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VsBU1x", "doi": "10.1109/ICBK.2018.00026", "title": "Snapshot Visualization of Complex Graphs with Force-Directed Algorithms", "normalizedTitle": "Snapshot Visualization of Complex Graphs with Force-Directed Algorithms", "abstract": "Force-directed algorithms are widely used for visualizing graphs. However, these algorithms are computationally expensive in producing good quality layouts for complex graphs. The layout quality is largely influenced by execution time and methods' input parameters especially for large complex graphs. The snapshots of visualization generated from these algorithms are useful in presenting the current view or a past state of an information on timeslices. Therefore, researchers often need to make a trade-off between the quality of visualization and the selection of appropriate force-directed algorithms. In this paper, we evaluate the quality of snapshots generated from 7 force-directed algorithms in terms of number of edge crossing and the standard deviations of edge length. Our experimental results showed that KK, FA2 and DH algorithms cannot produce satisfactory visualizations for large graphs within the time limit. KK-MS-DS algorithm can process large and planar graphs but it does not perform well for graphs with low average degrees. KK-MS algorithm produces better visualizations for sparse and non-clustered graphs than KK-MS-DS algorithm.", "abstracts": [ { "abstractType": "Regular", "content": "Force-directed algorithms are widely used for visualizing graphs. However, these algorithms are computationally expensive in producing good quality layouts for complex graphs. The layout quality is largely influenced by execution time and methods' input parameters especially for large complex graphs. The snapshots of visualization generated from these algorithms are useful in presenting the current view or a past state of an information on timeslices. Therefore, researchers often need to make a trade-off between the quality of visualization and the selection of appropriate force-directed algorithms. In this paper, we evaluate the quality of snapshots generated from 7 force-directed algorithms in terms of number of edge crossing and the standard deviations of edge length. Our experimental results showed that KK, FA2 and DH algorithms cannot produce satisfactory visualizations for large graphs within the time limit. KK-MS-DS algorithm can process large and planar graphs but it does not perform well for graphs with low average degrees. KK-MS algorithm produces better visualizations for sparse and non-clustered graphs than KK-MS-DS algorithm.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Force-directed algorithms are widely used for visualizing graphs. However, these algorithms are computationally expensive in producing good quality layouts for complex graphs. The layout quality is largely influenced by execution time and methods' input parameters especially for large complex graphs. The snapshots of visualization generated from these algorithms are useful in presenting the current view or a past state of an information on timeslices. Therefore, researchers often need to make a trade-off between the quality of visualization and the selection of appropriate force-directed algorithms. In this paper, we evaluate the quality of snapshots generated from 7 force-directed algorithms in terms of number of edge crossing and the standard deviations of edge length. Our experimental results showed that KK, FA2 and DH algorithms cannot produce satisfactory visualizations for large graphs within the time limit. KK-MS-DS algorithm can process large and planar graphs but it does not perform well for graphs with low average degrees. KK-MS algorithm produces better visualizations for sparse and non-clustered graphs than KK-MS-DS algorithm.", "fno": "912500a139", "keywords": [ "Data Visualisation", "Graph Theory", "Snapshot Visualization", "Complex Graphs", "Appropriate Force Directed Algorithms", "DH Algorithms", "KK MS DS Algorithm", "Planar Graphs", "Sparse Graphs", "Nonclustered Graphs", "Gravity", "Visualization", "Data Visualization", "Layout", "Springs", "Clustering Algorithms", "Snapshot Visualization Time Constrained Execution Complex Structured Graphs Force Directed Algorithms" ], "authors": [ { "affiliation": null, "fullName": "Se-Hang Cheong", "givenName": "Se-Hang", "surname": "Cheong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yain-Whar Si", "givenName": "Yain-Whar", "surname": "Si", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "139-145", "year": "2018", "issn": null, "isbn": "978-1-5386-9125-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "912500a131", "articleId": "17D45Xq6dBd", "__typename": "AdjacentArticleType" }, "next": { "fno": "912500a146", "articleId": "17D45XeKgtl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2016/8942/0/8942a069", "title": "Drawing Clustered Graphs Using Stress Majorization and Force-Directed Placements", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a069/12OmNrMHOnz", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a013", "title": "Drawing Large Weighted Graphs Using Clustered Force-Directed Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a013/12OmNro0I3Y", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2012/2599/0/06341510", "title": "Scalable Force Directed Graph Layout Algorithms Using Fast Multipole Methods", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2012/06341510/12OmNx3HI8B", "parentPublication": { "id": "proceedings/ispdc/2012/2599/0", "title": "2012 11th International Symposium on Parallel and Distributed Computing (ISPDC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2017/0831/0/0831a288", "title": "Sketch-Based Interactions for Untangling of Force-Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a288/12OmNyO8tVY", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a094", "title": "On Edge Bundling and Node Layout for Mutually Connected Directed Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a094/12OmNzwZ6qg", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a166", "title": "Performance Comparisons between Force-Directed Algorithms on Structured Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a166/1ap5yKzxg9G", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807379", "title": "Persistent Homology Guided Force-Directed Graph Layouts", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807379/1cG6h8OkgJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2019/2605/0/08944364", "title": "Force-Directed Graph Layouts by Edge Sampling", "doi": null, "abstractUrl": "/proceedings-article/ldav/2019/08944364/1grOFicLl9S", "parentPublication": { "id": "proceedings/ldav/2019/2605/0", "title": "2019 IEEE 9th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a442", "title": "Force2Vec: Parallel Force-Directed Graph Embedding", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a442/1r54GQx8BUc", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2021/3931/0/393100a146", "title": "Sublinear-Time Attraction Force Computation for Large Complex Graph Drawing", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2021/393100a146/1tTtrX8Ij72", "parentPublication": { "id": "proceedings/pacificvis/2021/3931/0", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1s645BaTzVu", "title": "2020 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1s64cbHE8Ao", "doi": "10.1109/BigData50022.2020.9378261", "title": "Inventory Based Recommendation Algorithms", "normalizedTitle": "Inventory Based Recommendation Algorithms", "abstract": "We propose two recommendation algorithms for e-commerce with supply limits, a scenario that has not been intensively studied in the literature. One algorithm is a linear programming-based algorithm that uses historical data to approximate customer arrival patterns and generate shadow prices for inventories. The price of inventory can be introduced to existing recommendation algorithms to obtain adjusted rankings for recommendation. The other algorithm balances expected revenue and inventory consumption, and it uses a simple penalty function to reduce the chance of recommending low-inventory-level products. Both algorithms are suitable for online recommendation systems for grocery stores with both online and offline channels, and can incorporate the features of perishable products, which need to be sold within limited time. Both algorithms are tested in a simulation using estimated parameters from Freshippo, a supermarket owned by the Alibaba Group. The numerical results show that both algorithms can generate higher sales volume and higher revenue.", "abstracts": [ { "abstractType": "Regular", "content": "We propose two recommendation algorithms for e-commerce with supply limits, a scenario that has not been intensively studied in the literature. One algorithm is a linear programming-based algorithm that uses historical data to approximate customer arrival patterns and generate shadow prices for inventories. The price of inventory can be introduced to existing recommendation algorithms to obtain adjusted rankings for recommendation. The other algorithm balances expected revenue and inventory consumption, and it uses a simple penalty function to reduce the chance of recommending low-inventory-level products. Both algorithms are suitable for online recommendation systems for grocery stores with both online and offline channels, and can incorporate the features of perishable products, which need to be sold within limited time. Both algorithms are tested in a simulation using estimated parameters from Freshippo, a supermarket owned by the Alibaba Group. The numerical results show that both algorithms can generate higher sales volume and higher revenue.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose two recommendation algorithms for e-commerce with supply limits, a scenario that has not been intensively studied in the literature. One algorithm is a linear programming-based algorithm that uses historical data to approximate customer arrival patterns and generate shadow prices for inventories. The price of inventory can be introduced to existing recommendation algorithms to obtain adjusted rankings for recommendation. The other algorithm balances expected revenue and inventory consumption, and it uses a simple penalty function to reduce the chance of recommending low-inventory-level products. Both algorithms are suitable for online recommendation systems for grocery stores with both online and offline channels, and can incorporate the features of perishable products, which need to be sold within limited time. Both algorithms are tested in a simulation using estimated parameters from Freshippo, a supermarket owned by the Alibaba Group. The numerical results show that both algorithms can generate higher sales volume and higher revenue.", "fno": "09378261", "keywords": [ "Electronic Commerce", "Inventory Management", "Linear Programming", "Pricing", "Recommender Systems", "Sales Management", "Approximate Customer Arrival Patterns", "Recommendation Algorithms", "Algorithm Balances", "Low Inventory Level Products", "Online Recommendation Systems", "Linear Programming Based Algorithm", "Heuristic Algorithms", "Big Data", "Programming", "Approximation Algorithms", "Product Design", "Numerical Models", "Quality Assessment", "E Commerce", "Top K Recommendation", "Robust Ranking", "Linear Programming" ], "authors": [ { "affiliation": "Shanghai Jiao Tong University,Antai College of Economics and Management,Shanghai,China", "fullName": "Du Chen", "givenName": "Du", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,Hangzhou,China", "fullName": "Yuming Deng", "givenName": "Yuming", "surname": "Deng", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,Hangzhou,China", "fullName": "Guangrui Ma", "givenName": "Guangrui", "surname": "Ma", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,Hangzhou,China", "fullName": "Hao Ge", "givenName": "Hao", "surname": "Ge", "__typename": "ArticleAuthorType" }, { "affiliation": "Alibaba Group,Hangzhou,China", "fullName": "Yunwei Qi", "givenName": "Yunwei", "surname": "Qi", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,Antai College of Economics and Management,Shanghai,China", "fullName": "Ying Rong", "givenName": "Ying", "surname": "Rong", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,Antai College of Economics and Management,Shanghai,China", "fullName": "Xun Zhang", "givenName": "Xun", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,Antai College of Economics and Management,Shanghai,China", "fullName": "Huan Zheng", "givenName": "Huan", "surname": "Zheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "617-622", "year": "2020", "issn": null, "isbn": "978-1-7281-6251-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09377976", "articleId": "1s64aNCVK5q", "__typename": "AdjacentArticleType" }, "next": { "fno": "09378338", "articleId": "1s64qDapxx6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cluster/2015/6598/0/6598a494", "title": "An FPGA-Based Accelerator for Neighborhood-Based Collaborative Filtering Recommendation Algorithms", "doi": null, "abstractUrl": "/proceedings-article/cluster/2015/6598a494/12OmNCyBXi4", "parentPublication": { "id": "proceedings/cluster/2015/6598/0", "title": "2015 IEEE International Conference on Cluster Computing (CLUSTER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2013/2138/0/5070a152", "title": "Movie Recommendation Based on Graph Traversal Algorithms", "doi": null, "abstractUrl": "/proceedings-article/dexa/2013/5070a152/12OmNqBbHF2", "parentPublication": { "id": "proceedings/dexa/2013/2138/0", "title": "2013 24th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/incos/2011/4579/0/4579a857", "title": "Recommendation System Based on Competing Algorithms", "doi": null, "abstractUrl": "/proceedings-article/incos/2011/4579a857/12OmNwK7ocD", "parentPublication": { "id": "proceedings/incos/2011/4579/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isbim/2008/3560/2/3560b373", "title": "Incentive Mechanism of Supply Chain Inventory Management Based on Information Sharing", "doi": null, "abstractUrl": "/proceedings-article/isbim/2008/3560b373/12OmNwKGAp8", "parentPublication": { "id": "proceedings/isbim/2008/3560/2", "title": "Business and Information Management, International Seminar on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijcss/2011/4421/0/4421a262", "title": "Seat Inventory Control Based on Dual Directional Diversion of Demands", "doi": null, "abstractUrl": "/proceedings-article/ijcss/2011/4421a262/12OmNxdVgZ1", "parentPublication": { "id": "proceedings/ijcss/2011/4421/0", "title": "Service Sciences, International Joint Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2016/2628/0/2628a515", "title": "Predicting Inventory Shipments of Oracle EBS Systems", "doi": null, "abstractUrl": "/proceedings-article/scc/2016/2628a515/12OmNyL0TJu", "parentPublication": { "id": "proceedings/scc/2016/2628/0", "title": "2016 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccpqt/2022/7020/0/702000a142", "title": "A Collaborative Filtering Recommendation Method Combining Approximation Algorithms", "doi": null, "abstractUrl": "/proceedings-article/ccpqt/2022/702000a142/1Iiu4iPqnza", "parentPublication": { "id": "proceedings/ccpqt/2022/7020/0", "title": "2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2019/5141/0/514100a168", "title": "Switching Strategy of Recommendation Algorithms in Online Dating Platform", "doi": null, "abstractUrl": "/proceedings-article/cbd/2019/514100a168/1fw1Mrdvjfq", "parentPublication": { "id": "proceedings/cbd/2019/5141/0", "title": "2019 Seventh International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicas/2020/9085/0/908500a377", "title": "Comparing Recommendation Algorithms in Session-based E-commerce Sites", "doi": null, "abstractUrl": "/proceedings-article/icicas/2020/908500a377/1sZ2XiIUKw8", "parentPublication": { "id": "proceedings/icicas/2020/9085/0", "title": "2020 International Conference on Intelligent Computing, Automation and Systems (ICICAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552925", "title": "An Evaluation-Focused Framework for Visualization Recommendation Algorithms", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552925/1xibWnPGM5a", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1sZ2WzX7nxe", "title": "2020 International Conference on Intelligent Computing, Automation and Systems (ICICAS)", "acronym": "icicas", "groupId": "1836184", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1sZ2XiIUKw8", "doi": "10.1109/ICICAS51530.2020.00085", "title": "Comparing Recommendation Algorithms in Session-based E-commerce Sites", "normalizedTitle": "Comparing Recommendation Algorithms in Session-based E-commerce Sites", "abstract": "Recommender systems have become widely used in various website applications. With the integration of deep learning and recommender systems, the classic Session-based Recommender System (SRS) appears, which can obtain implicit feedback from explicit interactions. Some scholars have pro-posed many effective recommendation algorithms to provide better recommendation service in SRS. In order to compare the performance of these session-based recommendation algorithms, we consider a simple E-commerce SRS scenario and choose four representative session-based recommendation algorithms in this paper. Then we do some evaluation experiments. The experimental results show that the combination of local preferences and global preferences will improve the recommendation performance significantly, and for GNNs and RNN s in session recommendation based on deep learning, we also conclude that the prediction effect of GNN s is slightly superior to RNN s on long sessions.", "abstracts": [ { "abstractType": "Regular", "content": "Recommender systems have become widely used in various website applications. With the integration of deep learning and recommender systems, the classic Session-based Recommender System (SRS) appears, which can obtain implicit feedback from explicit interactions. Some scholars have pro-posed many effective recommendation algorithms to provide better recommendation service in SRS. In order to compare the performance of these session-based recommendation algorithms, we consider a simple E-commerce SRS scenario and choose four representative session-based recommendation algorithms in this paper. Then we do some evaluation experiments. The experimental results show that the combination of local preferences and global preferences will improve the recommendation performance significantly, and for GNNs and RNN s in session recommendation based on deep learning, we also conclude that the prediction effect of GNN s is slightly superior to RNN s on long sessions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recommender systems have become widely used in various website applications. With the integration of deep learning and recommender systems, the classic Session-based Recommender System (SRS) appears, which can obtain implicit feedback from explicit interactions. Some scholars have pro-posed many effective recommendation algorithms to provide better recommendation service in SRS. In order to compare the performance of these session-based recommendation algorithms, we consider a simple E-commerce SRS scenario and choose four representative session-based recommendation algorithms in this paper. Then we do some evaluation experiments. The experimental results show that the combination of local preferences and global preferences will improve the recommendation performance significantly, and for GNNs and RNN s in session recommendation based on deep learning, we also conclude that the prediction effect of GNN s is slightly superior to RNN s on long sessions.", "fno": "908500a377", "keywords": [ "Deep Learning Artificial Intelligence", "Electronic Commerce", "Recommender Systems", "Recurrent Neural Nets", "Web Sites", "Web Site Applications", "Deep Learning", "Recommendation Service", "E Commerce SRS", "Session Based Recommender System", "Session Based E Commerce Sites", "GNN", "RNN", "Deep Learning", "Automation", "Prediction Algorithms", "Recommender Systems", "SRS", "Session Based Recommendation Algorithms" ], "authors": [ { "affiliation": "TravelSky Technology Limited, Beijing Engineering Research Center of Civil Aviation Big Data, and Key Laboratory of Intelligent Passenger Service of Civil Aviation-CAAC,Beijing,China", "fullName": "Mingtian Peng", "givenName": "Mingtian", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science Beijing Institute of Technology,Beijing,China", "fullName": "Jiahe Zhang", "givenName": "Jiahe", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science Beijing Institute of Technology,Beijing,China", "fullName": "Shilin Wen", "givenName": "Shilin", "surname": "Wen", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer Science Beijing Institute of Technology,Beijing,China", "fullName": "Chi Harold Liu", "givenName": "Chi Harold", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicas", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "377-380", "year": "2020", "issn": null, "isbn": "978-1-7281-9085-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "908500a372", "articleId": "1sZ2WL80e2I", "__typename": "AdjacentArticleType" }, "next": { "fno": "908500a381", "articleId": "1sZ31NDe2ys", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2018/9288/0/928800b323", "title": "Recommendation with Hybrid Interest Model", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b323/18jXIq8cnCg", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2021/2427/0/242700a001", "title": "Incorporating Adjacent User Modeling into Session-based Recommendation with Graph Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2021/242700a001/1AjSEUSbuak", "parentPublication": { "id": "proceedings/icdmw/2021/2427/0", "title": "2021 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/09920176", "title": "Modeling Tradeoffs Using Preference-Based Feedback in Session-Based Recommender Systems", "doi": null, "abstractUrl": "/journal/ai/5555/01/09920176/1HxSqxBqawU", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2022/5351/0/535100a673", "title": "Global Feature Extraction Graph Neural Networks for Session Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2022/535100a673/1KYt4YkFNpS", "parentPublication": { "id": "proceedings/icnisc/2022/5351/0", "title": "2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068595", "title": "Session-based News Recommendation from Temporal User Commenting Dynamics", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068595/1LKx4aI5GPC", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/06/08901999", "title": "POLAR++: Active One-Shot Personalized Article Recommendation", "doi": null, "abstractUrl": "/journal/tk/2021/06/08901999/1eYN71t0OpW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09073208", "title": "Phrase-Guided Attention Web Article Recommendation for Next Clicks and Views", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09073208/1jjAf5VwCju", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2020/8786/0/878600a126", "title": "POEM: Position Order Enhanced Model for Session-based Recommendation Service", "doi": null, "abstractUrl": "/proceedings-article/icws/2020/878600a126/1pLJHHJsSKQ", "parentPublication": { "id": "proceedings/icws/2020/8786/0", "title": "2020 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400c447", "title": "Learnings from a Retail Recommendation System on Billions of Interactions at bol.com", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400c447/1uGXtBGAzEA", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaa/2021/3730/0/373000a209", "title": "Recommender Systems in e-Commerce", "doi": null, "abstractUrl": "/proceedings-article/icaa/2021/373000a209/1zL1Frmharm", "parentPublication": { "id": "proceedings/icaa/2021/3730/0", "title": "2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVM", "title": "Proceedings 17th Annual IEEE Symposium on Logic in Computer Science", "acronym": "lics", "groupId": "1000420", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNqBKU1N", "doi": "10.1109/LICS.2002.1029814", "title": "Tree-Like Counterexamples in Model Checking", "normalizedTitle": "Tree-Like Counterexamples in Model Checking", "abstract": "Counterexamples for specification violations provide engineers with important debugging information. Although counterexamples are considered one of the main advantages of model checking, state-of the art model checkers are restricted to relatively simple counterexamples, and surprisingly little research effort has been put into counterexamples. In this paper, we introduce a new general framework for counterexamples. The paper has three main contributions: (i) We determine the general form of ACTL counterexamples. To this end, we investigate the notion of counterexample and show that a large class of temporal logics beyond ACTL admits counterexamples with a simple tree-like transition relation. We show that the existence of tree-like counterexamples is related to a universal fragment of extended branching time logic based on !", "abstracts": [ { "abstractType": "Regular", "content": "Counterexamples for specification violations provide engineers with important debugging information. Although counterexamples are considered one of the main advantages of model checking, state-of the art model checkers are restricted to relatively simple counterexamples, and surprisingly little research effort has been put into counterexamples. In this paper, we introduce a new general framework for counterexamples. The paper has three main contributions: (i) We determine the general form of ACTL counterexamples. To this end, we investigate the notion of counterexample and show that a large class of temporal logics beyond ACTL admits counterexamples with a simple tree-like transition relation. We show that the existence of tree-like counterexamples is related to a universal fragment of extended branching time logic based on !", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Counterexamples for specification violations provide engineers with important debugging information. Although counterexamples are considered one of the main advantages of model checking, state-of the art model checkers are restricted to relatively simple counterexamples, and surprisingly little research effort has been put into counterexamples. In this paper, we introduce a new general framework for counterexamples. The paper has three main contributions: (i) We determine the general form of ACTL counterexamples. To this end, we investigate the notion of counterexample and show that a large class of temporal logics beyond ACTL admits counterexamples with a simple tree-like transition relation. We show that the existence of tree-like counterexamples is related to a universal fragment of extended branching time logic based on !", "fno": "14830019", "keywords": [], "authors": [ { "affiliation": "Carnegie Mellon University", "fullName": "Edmund Clarke", "givenName": "Edmund", "surname": "Clarke", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Wisconsin", "fullName": "Somesh Jha", "givenName": "Somesh", "surname": "Jha", "__typename": "ArticleAuthorType" }, { "affiliation": "Broadcom COM", "fullName": "Yuan Lu", "givenName": "Yuan", "surname": "Lu", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität Wien", "fullName": "Helmut Veith", "givenName": "Helmut", "surname": "Veith", "__typename": "ArticleAuthorType" } ], "idPrefix": "lics", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-07-01T00:00:00", "pubType": "proceedings", "pages": "19", "year": "2002", "issn": "1043-6871", "isbn": "0-7695-1483-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "14830007", "articleId": "12OmNxecSa0", "__typename": "AdjacentArticleType" }, "next": { "fno": "14830030", "articleId": "12OmNvDqsAZ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icst/2015/7125/0/07102606", "title": "Show Me New Counterexamples: A Path-Based Approach", "doi": null, "abstractUrl": "/proceedings-article/icst/2015/07102606/12OmNwD1pOa", "parentPublication": { "id": "proceedings/icst/2015/7125/0", "title": "2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmcad/2007/3023/0/30230173", "title": "Checking Safety by Inductive Generalization of Counterexamples to Induction", "doi": null, "abstractUrl": "/proceedings-article/fmcad/2007/30230173/12OmNwErpCN", "parentPublication": { "id": "proceedings/fmcad/2007/3023/0", "title": "Formal Methods in Computer Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmcad/2007/3023/0/30230077", "title": "Induction in CEGAR for Detecting Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/fmcad/2007/30230077/12OmNwoxSdh", "parentPublication": { "id": "proceedings/fmcad/2007/3023/0", "title": "Formal Methods in Computer Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2007/1381/0/04397277", "title": "Computation of minimal counterexamples by using black box techniques and symbolic methods", "doi": null, "abstractUrl": "/proceedings-article/iccad/2007/04397277/12OmNyY4rmj", "parentPublication": { "id": "proceedings/iccad/2007/1381/0", "title": "2007 IEEE/ACM International Conference on Computer Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/qest/2009/3808/0/3808a197", "title": "Generation of Counterexamples for Model Checking of Markov Decision Processes", "doi": null, "abstractUrl": "/proceedings-article/qest/2009/3808a197/12OmNyaGeLJ", "parentPublication": { "id": "proceedings/qest/2009/3808/0", "title": "Quantitative Evaluation of Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2008/3446/0/3446a369", "title": "Iterative Model Fixing with Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/apsec/2008/3446a369/12OmNzYwceL", "parentPublication": { "id": "proceedings/apsec/2008/3446/0", "title": "2008 15th Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2013/3073/0/06606566", "title": "Detecting spurious counterexamples efficiently in abstract model checking", "doi": null, "abstractUrl": "/proceedings-article/icse/2013/06606566/12OmNzsrwpc", "parentPublication": { "id": "proceedings/icse/2013/3073/0", "title": "2013 35th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sefm/2008/3437/0/3437a053", "title": "Cheap and Small Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/sefm/2008/3437a053/12OmNzwHvbj", "parentPublication": { "id": "proceedings/sefm/2008/3437/0", "title": "2008 Sixth IEEE International Conference on Software Engineering and Formal Methods", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2014/12/06895263", "title": "Making CEGAR More Efficient in Software Model Checking", "doi": null, "abstractUrl": "/journal/ts/2014/12/06895263/13rRUx0xQ1f", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2019/2231/0/223100a047", "title": "Extracting Counterexamples from Transitive-Closure-Based Model Checking", "doi": null, "abstractUrl": "/proceedings-article/mise/2019/223100a047/1ehBurPhGkU", "parentPublication": { "id": "proceedings/mise/2019/2231/0", "title": "2019 IEEE/ACM 11th International Workshop on Modelling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1lgooNNL7Xy", "title": "2013 20th Asia-Pacific Software Engineering Conference (APSEC)", "acronym": "apsec", "groupId": "1000681", "volume": "2", "displayVolume": "2", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxA3Z6a", "doi": "10.1109/APSEC.2013.128", "title": "A Practical Study of Debugging Using Model Checking", "normalizedTitle": "A Practical Study of Debugging Using Model Checking", "abstract": "Debugging is one of the most time-consuming tasks in software development. The application of a model-checking technique in debugging has strong potential to solve this problem. Here, lessons learned through our practical experiences with POM/MC are discussed. The aim of this proposed hypothesis-based method of debugging is not only to reproduce a failure as counterexamples, but also to obtain a counterexample that is useful for detecting the fault or the cause of the failure. One of the characteristics of the proposed approach is that it degenerates a source code in order to clarify the fault. An example of this degeneration shows that the method is useful for fault analysis and avoidance of the \"state-explosion\" problem. Furthermore, the characteristics of debugging using POM/MC are explained from the viewpoint of debugging hypotheses.", "abstracts": [ { "abstractType": "Regular", "content": "Debugging is one of the most time-consuming tasks in software development. The application of a model-checking technique in debugging has strong potential to solve this problem. Here, lessons learned through our practical experiences with POM/MC are discussed. The aim of this proposed hypothesis-based method of debugging is not only to reproduce a failure as counterexamples, but also to obtain a counterexample that is useful for detecting the fault or the cause of the failure. One of the characteristics of the proposed approach is that it degenerates a source code in order to clarify the fault. An example of this degeneration shows that the method is useful for fault analysis and avoidance of the \"state-explosion\" problem. Furthermore, the characteristics of debugging using POM/MC are explained from the viewpoint of debugging hypotheses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Debugging is one of the most time-consuming tasks in software development. The application of a model-checking technique in debugging has strong potential to solve this problem. Here, lessons learned through our practical experiences with POM/MC are discussed. The aim of this proposed hypothesis-based method of debugging is not only to reproduce a failure as counterexamples, but also to obtain a counterexample that is useful for detecting the fault or the cause of the failure. One of the characteristics of the proposed approach is that it degenerates a source code in order to clarify the fault. An example of this degeneration shows that the method is useful for fault analysis and avoidance of the \"state-explosion\" problem. Furthermore, the characteristics of debugging using POM/MC are explained from the viewpoint of debugging hypotheses.", "fno": "2144b134", "keywords": [ "Analytical Models", "Debugging", "Model Checking", "Software", "Adaptation Models", "Solid Modeling", "Explosions", "Software Engineering", "Debug", "Model Checking", "Model Extraction", "Program Oriented Modeling" ], "authors": [ { "affiliation": "Yokohama Res. Lab., Hitachi Ltd., Yokohama, Japan", "fullName": "Hideto Ogawa", "givenName": "Hideto", "surname": "Ogawa", "__typename": "ArticleAuthorType" }, { "affiliation": "Yokohama Res. Lab., Hitachi Ltd., Yokohama, Japan", "fullName": "Makoto Ichii", "givenName": "Makoto", "surname": "Ichii", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Comput. & Inf. Eng., Nippon Inst. of Technol., Saitama, Japan", "fullName": "Fumihiko Kumeno", "givenName": "Fumihiko", "surname": "Kumeno", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Inf. Sci., Japan Adv. Inst. of Sci. & Technol., Nomi, Japan", "fullName": "Toshiaki Aoki", "givenName": "Toshiaki", "surname": "Aoki", "__typename": "ArticleAuthorType" } ], "idPrefix": "apsec", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-12-01T00:00:00", "pubType": "proceedings", "pages": "134-139", "year": "2013", "issn": "1530-1362", "isbn": "978-1-4799-2144-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2144b129", "articleId": "12OmNAZfxGl", "__typename": "AdjacentArticleType" }, "next": { "fno": "2144b140", "articleId": "12OmNxvO09D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ipdps/2015/8649/0/8649a473", "title": "A Scalable Prescriptive Parallel Debugging Model", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2015/8649a473/12OmNAS9zqx", "parentPublication": { "id": "proceedings/ipdps/2015/8649/0", "title": "2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/depcos-relcomex/2009/3674/0/3674a229", "title": "Model-Based Diagnostic Using Model Checking", "doi": null, "abstractUrl": "/proceedings-article/depcos-relcomex/2009/3674a229/12OmNBIWXEx", "parentPublication": { "id": "proceedings/depcos-relcomex/2009/3674/0", "title": "Dependability of Computer Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsacw/2011/4459/0/4459a512", "title": "Debugging Debugging", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2011/4459a512/12OmNBQTJlU", "parentPublication": { "id": "proceedings/compsacw/2011/4459/0", "title": "2011 IEEE 35th Annual Computer Software and Applications Conference Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbesc/2015/0182/0/0182a096", "title": "Fault Localization in Multi-threaded C Programs Using Bounded Model Checking", "doi": null, "abstractUrl": "/proceedings-article/sbesc/2015/0182a096/12OmNCy2L4d", "parentPublication": { "id": "proceedings/sbesc/2015/0182/0", "title": "2015 Brazilian Symposium on Computing Systems Engineering (SBESC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2008/2187/0/04639316", "title": "Evaluating Models for Model-Based Debugging", "doi": null, "abstractUrl": "/proceedings-article/ase/2008/04639316/12OmNro0I25", "parentPublication": { "id": "proceedings/ase/2008/2187/0", "title": "2008 23rd IEEE/ACM International Conference on Automated Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2015/6564/2/6564b232", "title": "Concolic Metamorphic Debugging", "doi": null, "abstractUrl": "/proceedings-article/compsac/2015/6564b232/12OmNwKoZbo", "parentPublication": { "id": "compsac/2015/6564/2", "title": "2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/2012/4891/0/4891a308", "title": "A Rule-based Automated Approach for Extracting Models from Source Code", "doi": null, "abstractUrl": "/proceedings-article/wcre/2012/4891a308/12OmNxwncla", "parentPublication": { "id": "proceedings/wcre/2012/4891/0", "title": "2012 19th Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2019/2508/0/250800a502", "title": "Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/ase/2019/250800a502/1gysSl3c8lq", "parentPublication": { "id": "proceedings/ase/2019/2508/0", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a844", "title": "Debugging Declarative Models in Alloy", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a844/1oqKM2xcyBi", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2020/6768/0/676800a907", "title": "On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems", "doi": null, "abstractUrl": "/proceedings-article/ase/2020/676800a907/1pP3IGGU5IA", "parentPublication": { "id": "proceedings/ase/2020/6768/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBkfRg6", "title": "Formal Engineering Methods, International Conference on", "acronym": "icfem", "groupId": "1000291", "volume": "0", "displayVolume": "0", "year": "1998", "__typename": "ProceedingType" }, "article": { "id": "12OmNxzuMHi", "doi": "10.1109/ICFEM.1998.730569", "title": "Using Model Checking to Generate Tests from Specifications", "normalizedTitle": "Using Model Checking to Generate Tests from Specifications", "abstract": "We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a slight variation on a given model. The operators define a form of mutation analysis at the level of the model checker specification. A model checker generates counterexamples which distinguish the variations from the original specification. The counterexamples can easily be turned into complete test cases, that is, with inputs and expected results. We define two classes of operators: those that produce test cases from which a correct implementation must differ, and those that produce test cases with which it must agree.There are substantial advantages to combining a model checker with mutation analysis. First, test case generation is automatic; each counterexample is a complete test case. Second, in sharp contrast to program-based mutation analysis, equivalent mutant identification is also automatic. We apply our method to an example specification and evaluate the resulting test sets with coverage metrics on a Java implementation.", "abstracts": [ { "abstractType": "Regular", "content": "We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a slight variation on a given model. The operators define a form of mutation analysis at the level of the model checker specification. A model checker generates counterexamples which distinguish the variations from the original specification. The counterexamples can easily be turned into complete test cases, that is, with inputs and expected results. We define two classes of operators: those that produce test cases from which a correct implementation must differ, and those that produce test cases with which it must agree.There are substantial advantages to combining a model checker with mutation analysis. First, test case generation is automatic; each counterexample is a complete test case. Second, in sharp contrast to program-based mutation analysis, equivalent mutant identification is also automatic. We apply our method to an example specification and evaluate the resulting test sets with coverage metrics on a Java implementation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a slight variation on a given model. The operators define a form of mutation analysis at the level of the model checker specification. A model checker generates counterexamples which distinguish the variations from the original specification. The counterexamples can easily be turned into complete test cases, that is, with inputs and expected results. We define two classes of operators: those that produce test cases from which a correct implementation must differ, and those that produce test cases with which it must agree.There are substantial advantages to combining a model checker with mutation analysis. First, test case generation is automatic; each counterexample is a complete test case. Second, in sharp contrast to program-based mutation analysis, equivalent mutant identification is also automatic. We apply our method to an example specification and evaluate the resulting test sets with coverage metrics on a Java implementation.", "fno": "91980046", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Paul E. Ammann", "givenName": "Paul E.", "surname": "Ammann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Paul E. Black", "givenName": "Paul E.", "surname": "Black", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "William Majurski", "givenName": "William", "surname": "Majurski", "__typename": "ArticleAuthorType" } ], "idPrefix": "icfem", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "1998-12-01T00:00:00", "pubType": "proceedings", "pages": "46", "year": "1998", "issn": null, "isbn": "0-8186-9198-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "91980036", "articleId": "12OmNAQanxF", "__typename": "AdjacentArticleType" }, "next": { "fno": "91980056", "articleId": "12OmNBbaH9C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvTBBcb", "title": "2013 35th International Conference on Software Engineering (ICSE)", "acronym": "icse", "groupId": "1000691", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNzsrwpc", "doi": "10.1109/ICSE.2013.6606566", "title": "Detecting spurious counterexamples efficiently in abstract model checking", "normalizedTitle": "Detecting spurious counterexamples efficiently in abstract model checking", "abstract": "Abstraction is one of the most important strategies for dealing with the state space explosion problem in model checking. With an abstract model, the state space is largely reduced, however, a counterexample found in such a model that does not satisfy the desired property may not exist in the concrete model. Therefore, how to check whether a reported counterexample is spurious is a key problem in the abstraction-refinement loop. Particularly, there are often thousands of millions of states in systems of industrial scale, how to check spurious counterexamples in these systems practically is a significant problem. In this paper, by re-analyzing spurious counterexamples, a new formal definition of spurious path is given. Based on it, efficient algorithms for detecting spurious counterexamples are presented. By the new algorithms, when dealing with infinite counterexamples, the finite prefix to be analyzed will be polynomially shorter than the one dealt by the existing algorithm. Moreover, in practical terms, the new algorithms can naturally be parallelized that makes multi-core processors contributes more in spurious counterexample checking. In addition, by the new algorithms, the state resulting in a spurious path (false state) that is hidden shallower will be reported earlier. Hence, as long as a false state is detected, lots of iterations for detecting all the false states will be avoided. Experimental results show that the new algorithms perform well along with the growth of system scale.", "abstracts": [ { "abstractType": "Regular", "content": "Abstraction is one of the most important strategies for dealing with the state space explosion problem in model checking. With an abstract model, the state space is largely reduced, however, a counterexample found in such a model that does not satisfy the desired property may not exist in the concrete model. Therefore, how to check whether a reported counterexample is spurious is a key problem in the abstraction-refinement loop. Particularly, there are often thousands of millions of states in systems of industrial scale, how to check spurious counterexamples in these systems practically is a significant problem. In this paper, by re-analyzing spurious counterexamples, a new formal definition of spurious path is given. Based on it, efficient algorithms for detecting spurious counterexamples are presented. By the new algorithms, when dealing with infinite counterexamples, the finite prefix to be analyzed will be polynomially shorter than the one dealt by the existing algorithm. Moreover, in practical terms, the new algorithms can naturally be parallelized that makes multi-core processors contributes more in spurious counterexample checking. In addition, by the new algorithms, the state resulting in a spurious path (false state) that is hidden shallower will be reported earlier. Hence, as long as a false state is detected, lots of iterations for detecting all the false states will be avoided. Experimental results show that the new algorithms perform well along with the growth of system scale.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstraction is one of the most important strategies for dealing with the state space explosion problem in model checking. With an abstract model, the state space is largely reduced, however, a counterexample found in such a model that does not satisfy the desired property may not exist in the concrete model. Therefore, how to check whether a reported counterexample is spurious is a key problem in the abstraction-refinement loop. Particularly, there are often thousands of millions of states in systems of industrial scale, how to check spurious counterexamples in these systems practically is a significant problem. In this paper, by re-analyzing spurious counterexamples, a new formal definition of spurious path is given. Based on it, efficient algorithms for detecting spurious counterexamples are presented. By the new algorithms, when dealing with infinite counterexamples, the finite prefix to be analyzed will be polynomially shorter than the one dealt by the existing algorithm. Moreover, in practical terms, the new algorithms can naturally be parallelized that makes multi-core processors contributes more in spurious counterexample checking. In addition, by the new algorithms, the state resulting in a spurious path (false state) that is hidden shallower will be reported earlier. Hence, as long as a false state is detected, lots of iterations for detecting all the false states will be avoided. Experimental results show that the new algorithms perform well along with the growth of system scale.", "fno": "06606566", "keywords": [ "Formal Verification", "Parallel Algorithms", "Spurious Counterexample Detection", "Abstract Model Checking", "State Space Explosion Problem", "Abstraction Refinement Loop", "Formal Spurious Path Definition", "Finite Prefix", "Multicore Processor", "Spurious Counterexample Checking", "Parallel Algorithm", "Abstracts", "Model Checking", "Concrete", "Polynomials", "Color", "Integrated Circuit Modeling", "Algorithm Design And Analysis", "Model Checking", "Formal Verification", "Abstraction", "Refinement", "Parallel Algorithm" ], "authors": [ { "affiliation": "ICTT and ISN Laboratory, Xidian University, Xi'an, 710071, P.R. China", "fullName": "Cong Tian", "givenName": "Cong", "surname": "Tian", "__typename": "ArticleAuthorType" }, { "affiliation": "ICTT and ISN Laboratory, Xidian University, Xi'an, 710071, P.R. China", "fullName": "Zhenhua Duan", "givenName": "Zhenhua", "surname": "Duan", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-05-01T00:00:00", "pubType": "proceedings", "pages": "202-211", "year": "2013", "issn": "0270-5257", "isbn": "978-1-4673-3073-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06606565", "articleId": "12OmNzBwGs8", "__typename": "AdjacentArticleType" }, "next": { "fno": "06606567", "articleId": "12OmNy1SFCQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/lics/2002/1483/0/14830019", "title": "Tree-Like Counterexamples in Model Checking", "doi": null, "abstractUrl": "/proceedings-article/lics/2002/14830019/12OmNqBKU1N", "parentPublication": { "id": "proceedings/lics/2002/1483/0", "title": "Proceedings 17th Annual IEEE Symposium on Logic in Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2003/7983/0/01227515", "title": "Abstract model checking infinite state systems", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2003/01227515/12OmNvTBB6l", "parentPublication": { "id": "proceedings/aiccsa/2003/7983/0", "title": "ACS/IEEE International Conference on Computer Systems and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fmcad/2007/3023/0/30230077", "title": "Induction in CEGAR for Detecting Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/fmcad/2007/30230077/12OmNwoxSdh", "parentPublication": { "id": "proceedings/fmcad/2007/3023/0", "title": "Formal Methods in Computer Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2009/3641/0/3641a927", "title": "Automatic Construction of Complete Abstraction by Abstract Interpretation", "doi": null, "abstractUrl": "/proceedings-article/icis/2009/3641a927/12OmNyQYtri", "parentPublication": { "id": "proceedings/icis/2009/3641/0", "title": "Computer and Information Science, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/qest/2009/3808/0/3808a197", "title": "Generation of Counterexamples for Model Checking of Markov Decision Processes", "doi": null, "abstractUrl": "/proceedings-article/qest/2009/3808a197/12OmNyaGeLJ", "parentPublication": { "id": "proceedings/qest/2009/3808/0", "title": "Quantitative Evaluation of Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apsec/2008/3446/0/3446a369", "title": "Iterative Model Fixing with Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/apsec/2008/3446a369/12OmNzYwceL", "parentPublication": { "id": "proceedings/apsec/2008/3446/0", "title": "2008 15th Asia-Pacific Software Engineering Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sefm/2008/3437/0/3437a053", "title": "Cheap and Small Counterexamples", "doi": null, "abstractUrl": "/proceedings-article/sefm/2008/3437a053/12OmNzwHvbj", "parentPublication": { "id": "proceedings/sefm/2008/3437/0", "title": "2008 Sixth IEEE International Conference on Software Engineering and Formal Methods", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2014/12/06895263", "title": "Making CEGAR More Efficient in Software Model Checking", "doi": null, "abstractUrl": "/journal/ts/2014/12/06895263/13rRUx0xQ1f", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2009/02/tts2009020241", "title": "Counterexample Generation in Probabilistic Model Checking", "doi": null, "abstractUrl": "/journal/ts/2009/02/tts2009020241/13rRUyeCkbZ", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2019/2231/0/223100a047", "title": "Extracting Counterexamples from Transitive-Closure-Based Model Checking", "doi": null, "abstractUrl": "/proceedings-article/mise/2019/223100a047/1ehBurPhGkU", "parentPublication": { "id": "proceedings/mise/2019/2231/0", "title": "2019 IEEE/ACM 11th International Workshop on Modelling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gysRccRbB6", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gysWnvE26Q", "doi": "10.1109/ASE.2019.00059", "title": "Model Checking Embedded Control Software using OS-in-the-Loop CEGAR", "normalizedTitle": "Model Checking Embedded Control Software using OS-in-the-Loop CEGAR", "abstract": "Verification of multitasking embedded software requires taking into account its underlying operating system w.r.t. its scheduling policy and handling of task priorities in order to achieve a higher degree of accuracy. However, such comprehensive verification of multitasking embedded software together with its underlying operating system is very costly and impractical. To reduce the verification cost while achieving the desired accuracy, we propose a variant of CEGAR, named OiL-CEGAR (OS-in-the-Loop Counterexample-Guided Abstraction Refinement), where a composition of a formal OS model and an abstracted application program is used for comprehensive verification and is successively refined using the counterexamples generated from the composition model. The refinement process utilizes the scheduling information in the counterexample, which acts as a mini-OS to check the executability of the counterexample trace on the concrete program. Our experiments using a prototype implementation of OiL-CEGAR show that OiL-CEGAR greatly improves the accuracy and efficiency of property checking in this domain. It automatically removed all false alarms and accomplished property checking within an average of 476 seconds over a set of multitasking programs, whereas model checking using existing approaches over the same set of programs either showed an accuracy of under 11.1% or was unable to finish the verification due to timeout.", "abstracts": [ { "abstractType": "Regular", "content": "Verification of multitasking embedded software requires taking into account its underlying operating system w.r.t. its scheduling policy and handling of task priorities in order to achieve a higher degree of accuracy. However, such comprehensive verification of multitasking embedded software together with its underlying operating system is very costly and impractical. To reduce the verification cost while achieving the desired accuracy, we propose a variant of CEGAR, named OiL-CEGAR (OS-in-the-Loop Counterexample-Guided Abstraction Refinement), where a composition of a formal OS model and an abstracted application program is used for comprehensive verification and is successively refined using the counterexamples generated from the composition model. The refinement process utilizes the scheduling information in the counterexample, which acts as a mini-OS to check the executability of the counterexample trace on the concrete program. Our experiments using a prototype implementation of OiL-CEGAR show that OiL-CEGAR greatly improves the accuracy and efficiency of property checking in this domain. It automatically removed all false alarms and accomplished property checking within an average of 476 seconds over a set of multitasking programs, whereas model checking using existing approaches over the same set of programs either showed an accuracy of under 11.1% or was unable to finish the verification due to timeout.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Verification of multitasking embedded software requires taking into account its underlying operating system w.r.t. its scheduling policy and handling of task priorities in order to achieve a higher degree of accuracy. However, such comprehensive verification of multitasking embedded software together with its underlying operating system is very costly and impractical. To reduce the verification cost while achieving the desired accuracy, we propose a variant of CEGAR, named OiL-CEGAR (OS-in-the-Loop Counterexample-Guided Abstraction Refinement), where a composition of a formal OS model and an abstracted application program is used for comprehensive verification and is successively refined using the counterexamples generated from the composition model. The refinement process utilizes the scheduling information in the counterexample, which acts as a mini-OS to check the executability of the counterexample trace on the concrete program. Our experiments using a prototype implementation of OiL-CEGAR show that OiL-CEGAR greatly improves the accuracy and efficiency of property checking in this domain. It automatically removed all false alarms and accomplished property checking within an average of 476 seconds over a set of multitasking programs, whereas model checking using existing approaches over the same set of programs either showed an accuracy of under 11.1% or was unable to finish the verification due to timeout.", "fno": "250800a565", "keywords": [ "C Language", "Embedded Systems", "Formal Specification", "Multiprogramming", "Operating Systems Computers", "Program Verification", "Scheduling", "OS In The Loop CEGAR", "Embedded Software", "Operating System", "Scheduling Policy", "Task Priorities", "Comprehensive Verification", "Verification Cost", "OS In The Loop Counterexample Guided Abstraction Refinement", "Formal OS Model", "Abstracted Application Program", "Composition Model", "Refinement Process", "Scheduling Information", "Mini OS", "Counterexample Trace", "Concrete Program", "Oi L CEGAR Show", "Property Checking", "Multitasking Programs", "Model Checking Embedded Control Software", "Oi L CEGAR", "Time 476 0 S", "Task Analysis", "Multitasking", "Kernel", "Model Checking", "Embedded Software", "CEGAR", "Embedded OS", "Multitasking" ], "authors": [ { "affiliation": "Kyungpook National University", "fullName": "Dongwoo Kim", "givenName": "Dongwoo", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyungpook National University", "fullName": "Yunja Choi", "givenName": "Yunja", "surname": "Choi", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "565-576", "year": "2019", "issn": null, "isbn": "978-1-7281-2508-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250800a552", "articleId": "1gysUVqh1Fm", "__typename": "AdjacentArticleType" }, "next": { "fno": "250800a577", "articleId": "1gysTrfbkMo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/issre/2011/4568/0/4568a200", "title": "Safety Analysis of Trampoline OS Using Model Checking: An Experience Report", "doi": null, "abstractUrl": "/proceedings-article/issre/2011/4568a200/12OmNB0X8tD", "parentPublication": { "id": "proceedings/issre/2011/4568/0", "title": "2011 IEEE 22nd International Symposium on Software Reliability Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2014/5054/0/5054a714", "title": "Service Reconfiguration Architecture Based on Probabilistic Modeling Checking", "doi": null, "abstractUrl": "/proceedings-article/icws/2014/5054a714/12OmNBQTJfX", "parentPublication": { "id": "proceedings/icws/2014/5054/0", "title": "2014 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tase/2012/4751/0/4751a245", "title": "Executing Model Checking Counterexamples in Simulink", "doi": null, "abstractUrl": "/proceedings-article/tase/2012/4751a245/12OmNqyUUKt", "parentPublication": { "id": "proceedings/tase/2012/4751/0", "title": "2012 Sixth International Symposium on Theoretical Aspects of Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rtoss/1994/5710/0/00292564", "title": "Using SDL in embedded systems design: a tool for generating real-time OS pSOS based embedded systems applications software", "doi": null, "abstractUrl": "/proceedings-article/rtoss/1994/00292564/12OmNynJMNH", "parentPublication": { "id": "proceedings/rtoss/1994/5710/0", "title": "Proceedings of 11th IEEE Workshop on Real-Time Operating Systems and Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a250", "title": "Poster: Accelerating Counterexample Detection in Software Model Checking", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a250/13bd1h03qO5", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2014/12/06895263", "title": "Making CEGAR More Efficient in Software Model Checking", "doi": null, "abstractUrl": "/journal/ts/2014/12/06895263/13rRUx0xQ1f", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2018/2666/1/266601a799", "title": "Model Check of Real-time Property of Embedded Assembly Program Using CEGAR", "doi": null, "abstractUrl": "/proceedings-article/compsac/2018/266601a799/144U9bsvaKs", "parentPublication": { "id": "proceedings/compsac/2018/2666/2", "title": "2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100a536", "title": "Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100a536/1EmseTA4Te0", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/04/09186032", "title": "Efficient Summary Reuse for Software Regression Verification", "doi": null, "abstractUrl": "/journal/ts/2022/04/09186032/1mP2ZJsDM8E", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/06/09548839", "title": "A Survey of GPU Multitasking Methods Supported by Hardware Architecture", "doi": null, "abstractUrl": "/journal/td/2022/06/09548839/1xeSp9v5xDy", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1s6586p6LFS", "title": "2020 25th International Conference on Engineering of Complex Computer Systems (ICECCS)", "acronym": "iceccs", "groupId": "1000271", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1s658RjsOoU", "doi": "10.1109/ICECCS51672.2020.00008", "title": "Visual counterexample explanation for model checking with OERITTE", "normalizedTitle": "Visual counterexample explanation for model checking with OERITTE", "abstract": "Despite being one of the most reliable approaches for ensuring system correctness, model checking requires auxiliary tools to fully avail. In this work, we tackle the issue of its results being hard to interpret and present OERITTE, a tool for automatic visual counterexample explanation for function block diagrams. To learn what went wrong, the user can inspect a parse tree of the violated LTL formula and a table view of a counterexample, where important variables are highlighted. Then, on the function block diagram of the system under verification, they can receive a visualization of causality relationships between the calculated values of interest and intermediate results or inputs of the function block diagram. Thus, OERITTE serves to decrease formal model and specification debugging efforts along with making model checking more utilizable for complex industrial systems.", "abstracts": [ { "abstractType": "Regular", "content": "Despite being one of the most reliable approaches for ensuring system correctness, model checking requires auxiliary tools to fully avail. In this work, we tackle the issue of its results being hard to interpret and present OERITTE, a tool for automatic visual counterexample explanation for function block diagrams. To learn what went wrong, the user can inspect a parse tree of the violated LTL formula and a table view of a counterexample, where important variables are highlighted. Then, on the function block diagram of the system under verification, they can receive a visualization of causality relationships between the calculated values of interest and intermediate results or inputs of the function block diagram. Thus, OERITTE serves to decrease formal model and specification debugging efforts along with making model checking more utilizable for complex industrial systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Despite being one of the most reliable approaches for ensuring system correctness, model checking requires auxiliary tools to fully avail. In this work, we tackle the issue of its results being hard to interpret and present OERITTE, a tool for automatic visual counterexample explanation for function block diagrams. To learn what went wrong, the user can inspect a parse tree of the violated LTL formula and a table view of a counterexample, where important variables are highlighted. Then, on the function block diagram of the system under verification, they can receive a visualization of causality relationships between the calculated values of interest and intermediate results or inputs of the function block diagram. Thus, OERITTE serves to decrease formal model and specification debugging efforts along with making model checking more utilizable for complex industrial systems.", "fno": "855800a001", "keywords": [ "Data Visualisation", "Program Debugging", "Program Verification", "Trees Mathematics", "Model Checking", "OERITTE", "Reliable Approaches", "System Correctness", "Auxiliary Tools", "Automatic Visual Counterexample Explanation", "Function Block Diagram", "Violated LTL Formula", "Formal Model", "Complex Industrial Systems", "Specification Debugging Efforts", "Parse Tree", "Causality Relationships Visualization", "Visualization", "Analytical Models", "Computational Modeling", "Tools", "Model Checking", "Data Models", "Finite Element Analysis", "User Friendly Model Checking", "Counterexample Explanation", "Counterexample Visualization" ], "authors": [ { "affiliation": "Aalto University,Department of Electrical Engineering and Automation,Espoo,Finland", "fullName": "Polina Ovsiannikova", "givenName": "Polina", "surname": "Ovsiannikova", "__typename": "ArticleAuthorType" }, { "affiliation": "Aalto University,Department of Electrical Engineering and Automation,Espoo,Finland", "fullName": "Igor Buzhinsky", "givenName": "Igor", "surname": "Buzhinsky", "__typename": "ArticleAuthorType" }, { "affiliation": "VTT Technical Research Centre of Finland Ltd.,Espoo,Finland", "fullName": "Antti Pakonen", "givenName": "Antti", "surname": "Pakonen", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer and Space Engineering, Lulea Tekniska Universitet,Department of Computer Science,Sweden", "fullName": "Valeriy Vyatkin", "givenName": "Valeriy", "surname": "Vyatkin", "__typename": "ArticleAuthorType" } ], "idPrefix": "iceccs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2020", "issn": null, "isbn": "978-1-7281-8558-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "855800z012", "articleId": "1s658YTO8VO", "__typename": "AdjacentArticleType" }, "next": { "fno": "855800a011", "articleId": "1s6592vcsiA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cmc/2009/3501/3/3501c401", "title": "Symbolic Model Checking for Three Valued Logic", "doi": null, "abstractUrl": "/proceedings-article/cmc/2009/3501c401/12OmNBTs7Bz", "parentPublication": { "id": "proceedings/cmc/2009/3501/3", "title": "2009 WRI International Conference on Communications and Mobile Computing. CMC 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asp-dac/2004/2543/0/25430412", "title": "Model Checking on State Transition Diagram", "doi": null, "abstractUrl": "/proceedings-article/asp-dac/2004/25430412/12OmNBrlPyt", "parentPublication": { "id": "proceedings/asp-dac/2004/2543/0", "title": "Asia and South Pacific Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2014/4860/0/06912161", "title": "Research on generation of testing data in hybrid method of model checking and testing", "doi": null, "abstractUrl": "/proceedings-article/icis/2014/06912161/12OmNwHz07A", "parentPublication": { "id": "proceedings/icis/2014/4860/0", "title": "2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/2/3336c210", "title": "Counterexample Generation for Probabilistic Timed Automata Model Checking", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336c210/12OmNzd7bam", "parentPublication": { "id": "proceedings/csse/2008/3336/6", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a250", "title": "Poster: Accelerating Counterexample Detection in Software Model Checking", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a250/13bd1h03qO5", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2009/02/tts2009020241", "title": "Counterexample Generation in Probabilistic Model Checking", "doi": null, "abstractUrl": "/journal/ts/2009/02/tts2009020241/13rRUyeCkbZ", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/06/08708934", "title": "Debugging of Behavioural Models using Counterexample Analysis", "doi": null, "abstractUrl": "/journal/ts/2021/06/08708934/19Q3oSkS2je", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/formalise/2022/9287/0/928700a012", "title": "Counting Bugs in Behavioural Models using Counterexample Analysis", "doi": null, "abstractUrl": "/proceedings-article/formalise/2022/928700a012/1EmsMh8BsdO", "parentPublication": { "id": "proceedings/formalise/2022/9287/0", "title": "2022 IEEE/ACM 10th International Conference on Formal Methods in Software Engineering (FormaliSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mise/2019/2231/0/223100a047", "title": "Extracting Counterexamples from Transitive-Closure-Based Model Checking", "doi": null, "abstractUrl": "/proceedings-article/mise/2019/223100a047/1ehBurPhGkU", "parentPublication": { "id": "proceedings/mise/2019/2231/0", "title": "2019 IEEE/ACM 11th International Workshop on Modelling in Software Engineering (MiSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552899", "title": "Visual Analysis of Hyperproperties for Understanding Model Checking Results", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552899/1xicaOuuM8w", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18jXxWg9hao", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "1001620", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18jXA8K5fLG", "doi": "10.1109/ICDMW.2018.00154", "title": "Hubness as a Case of Technical Algorithmic Bias in Music Recommendation", "normalizedTitle": "Hubness as a Case of Technical Algorithmic Bias in Music Recommendation", "abstract": "This paper tries to bring the problem of technical algorithmic bias to the attention of the high-dimensional data mining community. A system suffering from algorithmic bias results in systematic unfair treatment of certain users or data, with technical algorithmic bias arising specifically from technical constraints. We illustrate this problem, which so far has been neglected in high-dimensional data mining, for a real world music recommendation system. Due to a problem of measuring distances in high dimensional spaces, songs closer to the center of all data are recommended over and over again, while songs far from the center are not recommended at all. We show that these so-called hub songs do not carry a specific semantic meaning and that deleting them from the data base promotes other songs to hub songs being recommended disturbingly often as a consequence. We argue that it is the ethical responsibility of data mining researchers to care about the fairness of their algorithms in high-dimensional spaces.", "abstracts": [ { "abstractType": "Regular", "content": "This paper tries to bring the problem of technical algorithmic bias to the attention of the high-dimensional data mining community. A system suffering from algorithmic bias results in systematic unfair treatment of certain users or data, with technical algorithmic bias arising specifically from technical constraints. We illustrate this problem, which so far has been neglected in high-dimensional data mining, for a real world music recommendation system. Due to a problem of measuring distances in high dimensional spaces, songs closer to the center of all data are recommended over and over again, while songs far from the center are not recommended at all. We show that these so-called hub songs do not carry a specific semantic meaning and that deleting them from the data base promotes other songs to hub songs being recommended disturbingly often as a consequence. We argue that it is the ethical responsibility of data mining researchers to care about the fairness of their algorithms in high-dimensional spaces.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper tries to bring the problem of technical algorithmic bias to the attention of the high-dimensional data mining community. A system suffering from algorithmic bias results in systematic unfair treatment of certain users or data, with technical algorithmic bias arising specifically from technical constraints. We illustrate this problem, which so far has been neglected in high-dimensional data mining, for a real world music recommendation system. Due to a problem of measuring distances in high dimensional spaces, songs closer to the center of all data are recommended over and over again, while songs far from the center are not recommended at all. We show that these so-called hub songs do not carry a specific semantic meaning and that deleting them from the data base promotes other songs to hub songs being recommended disturbingly often as a consequence. We argue that it is the ethical responsibility of data mining researchers to care about the fairness of their algorithms in high-dimensional spaces.", "fno": "928800b062", "keywords": [ "Data Mining", "Music", "Recommender Systems", "Technical Algorithmic Bias", "Technical Constraints", "Hub Songs", "High Dimensional Data Mining", "Music Recommendation System", "Data Mining", "Music", "Recommender Systems", "Signal Processing Algorithms", "Machine Learning Algorithms", "Data Models", "Computational Modeling", "Hubness Technical Algorithmic Bias Algorithmic Fairness Ethical Responsibility" ], "authors": [ { "affiliation": null, "fullName": "Arthur Flexer", "givenName": "Arthur", "surname": "Flexer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Monika Dörfler", "givenName": "Monika", "surname": "Dörfler", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jan Schlüter", "givenName": "Jan", "surname": "Schlüter", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thomas Grill", "givenName": "Thomas", "surname": "Grill", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1062-1069", "year": "2018", "issn": null, "isbn": "978-1-5386-9288-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "928800b054", "articleId": "18rqu7pdOPm", "__typename": "AdjacentArticleType" }, "next": { "fno": "928800b070", "articleId": "18jXJeeGr8k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2015/7082/0/07177504", "title": "Content-based music recommendation using underlying music preference structure", "doi": null, "abstractUrl": "/proceedings-article/icme/2015/07177504/12OmNy2rRVt", "parentPublication": { "id": "proceedings/icme/2015/7082/0", "title": "2015 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2016/1192/0/1192a614", "title": "Ranking-Based Music Recommendation in Online Music Radios", "doi": null, "abstractUrl": "/proceedings-article/dsc/2016/1192a614/12OmNyY4rwQ", "parentPublication": { "id": "proceedings/dsc/2016/1192/0", "title": "2016 IEEE First International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fairware/2018/5746/0/574601a038", "title": "IEEE P7003TM Standard for Algorithmic Bias Considerations", "doi": null, "abstractUrl": "/proceedings-article/fairware/2018/574601a038/13l5NX3CPwl", "parentPublication": { "id": "proceedings/fairware/2018/5746/0", "title": "2018 IEEE/ACM International Workshop on Software Fairness (FairWare)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a201", "title": "Tag-Based Personalized Music Recommendation", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a201/17D45Wc1II5", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2007/2755/0/04076547", "title": "Facilitating Mobile Music Sharing and Social Interaction with Push!Music", "doi": null, "abstractUrl": "/proceedings-article/hicss/2007/04076547/17D45X7VTfd", "parentPublication": { "id": "proceedings/hicss/2007/2755/0", "title": "2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc/2017/3790/0/379001b091", "title": "When and What Music Will You Listen To? Fine-Grained Time-Aware Music Recommendation", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc/2017/379001b091/17D45Xh13qm", "parentPublication": { "id": "proceedings/ispa-iucc/2017/3790/0", "title": "2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2022/9755/0/975500a443", "title": "Music Recommendation Method for Time-Series Emotions from Lyrics Using Valence-Arousal-Dominance Model", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2022/975500a443/1GU6PCbKF8I", "parentPublication": { "id": "proceedings/iiai-aai/2022/9755/0", "title": "2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2020/7303/0/730300b189", "title": "An Empirical Study on Algorithmic Bias", "doi": null, "abstractUrl": "/proceedings-article/compsac/2020/730300b189/1nkDnrMZ8J2", "parentPublication": { "id": "proceedings/compsac/2020/7303/0", "title": "2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a022", "title": "Visualization of Correlations Between Places of Music Listening and Acoustic Features", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a022/1rSRdJGEl0I", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1B12qxm4NaM", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "acronym": "wacvw", "groupId": "1806264", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1B12r8N8LMk", "doi": "10.1109/WACVW54805.2022.00047", "title": "Algorithmic Fairness in Face Morphing Attack Detection", "normalizedTitle": "Algorithmic Fairness in Face Morphing Attack Detection", "abstract": "Face morphing attacks can compromise Face Recognition System (FRS) by exploiting their vulnerability. Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks. MAD algorithms, as any other algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discriminatory results. While the promising MAD algorithms are tested for robustness, there is no study comprehensively bench-marking their behaviour against various ethnicities. In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms. We attempt to better understand the influence of ethnic bias on MAD algorithms and to this extent, we study the performance of MAD algorithms on a newly created dataset consisting of four different ethnic groups. With Extensive experiments using six different S-MAD techniques, we first present benchmark of detection performance and then measure the quantitative value of the algorithmic fairness for each of them using Fairness Discrepancy Rate (FDR). The results indicate the lack of fairness on all six different SMAD methods when trained and tested on different ethnic groups suggesting the need for reliable MAD approaches to mitigate the algorithmic bias.", "abstracts": [ { "abstractType": "Regular", "content": "Face morphing attacks can compromise Face Recognition System (FRS) by exploiting their vulnerability. Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks. MAD algorithms, as any other algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discriminatory results. While the promising MAD algorithms are tested for robustness, there is no study comprehensively bench-marking their behaviour against various ethnicities. In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms. We attempt to better understand the influence of ethnic bias on MAD algorithms and to this extent, we study the performance of MAD algorithms on a newly created dataset consisting of four different ethnic groups. With Extensive experiments using six different S-MAD techniques, we first present benchmark of detection performance and then measure the quantitative value of the algorithmic fairness for each of them using Fairness Discrepancy Rate (FDR). The results indicate the lack of fairness on all six different SMAD methods when trained and tested on different ethnic groups suggesting the need for reliable MAD approaches to mitigate the algorithmic bias.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Face morphing attacks can compromise Face Recognition System (FRS) by exploiting their vulnerability. Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks. MAD algorithms, as any other algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discriminatory results. While the promising MAD algorithms are tested for robustness, there is no study comprehensively bench-marking their behaviour against various ethnicities. In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms. We attempt to better understand the influence of ethnic bias on MAD algorithms and to this extent, we study the performance of MAD algorithms on a newly created dataset consisting of four different ethnic groups. With Extensive experiments using six different S-MAD techniques, we first present benchmark of detection performance and then measure the quantitative value of the algorithmic fairness for each of them using Fairness Discrepancy Rate (FDR). The results indicate the lack of fairness on all six different SMAD methods when trained and tested on different ethnic groups suggesting the need for reliable MAD approaches to mitigate the algorithmic bias.", "fno": "582400a410", "keywords": [ "Biometrics Access Control", "Face Recognition", "Face Recognition System", "Face Morphing Attack Detection Techniques", "Ethnic Origins", "Promising MAD Algorithms", "Algorithmic Fairness", "Ethnic Groups", "Detection Performance", "Reliable MAD", "Algorithmic Bias", "Face Morphing Attacks", "S MAD Techniques", "Single Image Based Morph Attack Detection Algorithms", "Fairness Discrepancy Rate", "Measurement", "Ethics", "Protocols", "Law", "Face Recognition", "Conferences", "Training Data" ], "authors": [ { "affiliation": "Norwegian University of Science and Technology (NTNU),Norway", "fullName": "Raghavendra Ramachandra", "givenName": "Raghavendra", "surname": "Ramachandra", "__typename": "ArticleAuthorType" }, { "affiliation": "Norwegian University of Science and Technology (NTNU),Norway", "fullName": "Kiran Raja", "givenName": "Kiran", "surname": "Raja", "__typename": "ArticleAuthorType" }, { "affiliation": "Norwegian University of Science and Technology (NTNU),Norway", "fullName": "Christoph Busch", "givenName": "Christoph", "surname": "Busch", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-01-01T00:00:00", "pubType": "proceedings", "pages": "410-418", "year": "2022", "issn": null, "isbn": "978-1-6654-5824-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "582400a400", "articleId": "1B12wixZckg", "__typename": "AdjacentArticleType" }, "next": { "fno": "582400a419", "articleId": "1B12AV0ECZ2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2013/0703/0/06636641", "title": "Using face morphing to protect privacy", "doi": null, "abstractUrl": "/proceedings-article/avss/2013/06636641/12OmNz2C1zs", "parentPublication": { "id": "proceedings/avss/2013/0703/0", "title": "2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2018/03/msp2018030034", "title": "A Harm-Reduction Framework for Algorithmic Fairness", "doi": null, "abstractUrl": "/magazine/sp/2018/03/msp2018030034/13rRUwI5TW0", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486607", "title": "Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486607/14jQfQ20k5v", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2022/5824/0/582400a321", "title": "OTB-morph: One-Time Biometrics via Morphing applied to Face Templates", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2022/582400a321/1B12zrgOqAg", "parentPublication": { "id": "proceedings/wacvw/2022/5824/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceitsa/2021/1300/0/130000a393", "title": "A Benchmark Database for the Comparison of Face Morphing Detection Methods", "doi": null, "abstractUrl": "/proceedings-article/iceitsa/2021/130000a393/1B2HARjys2k", "parentPublication": { "id": "proceedings/iceitsa/2021/1300/0", "title": "2021 International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900b605", "title": "Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900b605/1G56u2WswuY", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956395", "title": "Incremental Training of Face Morphing Detectors", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956395/1IHovut7o8o", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2022/6382/0/09959348", "title": "MASK-MORPH: Does Morphing of Custom 3D Face Masks Threatens the Face Recognition Systems?", "doi": null, "abstractUrl": "/proceedings-article/avss/2022/09959348/1Iz5cOQOoYE", "parentPublication": { "id": "proceedings/avss/2022/6382/0", "title": "2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2023/2056/0/205600a683", "title": "A Principal Component Analysis-Based Approach for Single Morphing Attack Detection", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2023/205600a683/1Kzz3jtZFn2", "parentPublication": { "id": "proceedings/wacvw/2023/2056/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2021/4456/0/445600a110", "title": "Assuring Fairness of Algorithmic Decision Making", "doi": null, "abstractUrl": "/proceedings-article/icstw/2021/445600a110/1tYs5u4t1Sg", "parentPublication": { "id": "proceedings/icstw/2021/4456/0", "title": "2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1E2wnV0YUP6", "title": "2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "acronym": "icstw", "groupId": "1001791", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1E2wsmd5wn6", "doi": "10.1109/ICSTW55395.2022.00030", "title": "A Combinatorial Approach to Fairness Testing of Machine Learning Models", "normalizedTitle": "A Combinatorial Approach to Fairness Testing of Machine Learning Models", "abstract": "Machine Learning (ML) models could exhibit biased behavior, or algorithmic discrimination, resulting in unfair or discriminatory outcomes. The bias in the ML model could emanate from various factors such as the training dataset, the choice of the ML algorithm, or the hyperparameters used to train the ML model. In addition to evaluating the model&#x2019;s correctness, it is essential to test ML models for fair and unbiased behavior. In this paper, we present a combinatorial testing-based approach to perform fairness testing of ML models. Our approach is model agnostic and evaluates fairness violations of a pre-trained ML model in a two-step process. In the first step, we create an input parameter model from the training data set and then use the model to generate a t-way test set. In the second step, for each test, we modify the value of one or more protected attributes to see if we could find fairness violations. We performed an experimental evaluation of the proposed approach using ML models trained with tabular datasets. The results suggest that the proposed approach can successfully identify fairness violations in pre-trained ML models.", "abstracts": [ { "abstractType": "Regular", "content": "Machine Learning (ML) models could exhibit biased behavior, or algorithmic discrimination, resulting in unfair or discriminatory outcomes. The bias in the ML model could emanate from various factors such as the training dataset, the choice of the ML algorithm, or the hyperparameters used to train the ML model. In addition to evaluating the model&#x2019;s correctness, it is essential to test ML models for fair and unbiased behavior. In this paper, we present a combinatorial testing-based approach to perform fairness testing of ML models. Our approach is model agnostic and evaluates fairness violations of a pre-trained ML model in a two-step process. In the first step, we create an input parameter model from the training data set and then use the model to generate a t-way test set. In the second step, for each test, we modify the value of one or more protected attributes to see if we could find fairness violations. We performed an experimental evaluation of the proposed approach using ML models trained with tabular datasets. The results suggest that the proposed approach can successfully identify fairness violations in pre-trained ML models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Machine Learning (ML) models could exhibit biased behavior, or algorithmic discrimination, resulting in unfair or discriminatory outcomes. The bias in the ML model could emanate from various factors such as the training dataset, the choice of the ML algorithm, or the hyperparameters used to train the ML model. In addition to evaluating the model’s correctness, it is essential to test ML models for fair and unbiased behavior. In this paper, we present a combinatorial testing-based approach to perform fairness testing of ML models. Our approach is model agnostic and evaluates fairness violations of a pre-trained ML model in a two-step process. In the first step, we create an input parameter model from the training data set and then use the model to generate a t-way test set. In the second step, for each test, we modify the value of one or more protected attributes to see if we could find fairness violations. We performed an experimental evaluation of the proposed approach using ML models trained with tabular datasets. The results suggest that the proposed approach can successfully identify fairness violations in pre-trained ML models.", "fno": "962800a094", "keywords": [ "Belief Networks", "Learning Artificial Intelligence", "Program Testing", "Fairness Testing", "Machine Learning Models", "Training Dataset", "ML Algorithm", "Test ML Models", "Combinatorial Testing Based Approach", "Model Agnostic", "Fairness Violations", "Pre Trained ML Model", "Input Parameter Model", "Training Data Set", "Training", "Software Testing", "Machine Learning Algorithms", "Conferences", "Training Data", "Machine Learning", "Data Models", "Fairness Testing", "Algorithmic Discrimination", "Bias Detection", "Testing Model Bias", "Testing ML Model", "Combinatorial Testing" ], "authors": [ { "affiliation": "The University of Texas at Arlington,Dept. of Computer Science and Engineering,Arlington,Texas,USA,76019", "fullName": "Ankita Ramjibhai Patel", "givenName": "Ankita Ramjibhai", "surname": "Patel", "__typename": "ArticleAuthorType" }, { "affiliation": "Virginia Tech,Commonwealth Cyber Initiative (CCI),Arlington,Virginia,USA,22203", "fullName": "Jaganmohan Chandrasekaran", "givenName": "Jaganmohan", "surname": "Chandrasekaran", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Texas at Arlington,Dept. of Computer Science and Engineering,Arlington,Texas,USA,76019", "fullName": "Yu Lei", "givenName": "Yu", "surname": "Lei", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology,Information Technology Laboratory,Gaithersburg,Maryland,USA,20899", "fullName": "Raghu N. Kacker", "givenName": "Raghu N.", "surname": "Kacker", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology,Information Technology Laboratory,Gaithersburg,Maryland,USA,20899", "fullName": "D. Richard Kuhn", "givenName": "D. Richard", "surname": "Kuhn", "__typename": "ArticleAuthorType" } ], "idPrefix": "icstw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-04-01T00:00:00", "pubType": "proceedings", "pages": "94-101", "year": "2022", "issn": "2159-4848", "isbn": "978-1-6654-9628-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "962800a087", "articleId": "1E2wq2LpEVG", "__typename": "AdjacentArticleType" }, "next": { "fno": "962800a102", "articleId": "1E2wpjedhe0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/ts/2022/12/09678017", "title": "<sc>Astraea</sc>: Grammar-Based Fairness Testing", "doi": null, "abstractUrl": "/journal/ts/2022/12/09678017/1A4Sz68iffO", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100c215", "title": "Training Data Debugging for the Fairness of Machine Learning Software", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100c215/1Ems8oaogRa", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2022/9221/0/922100a909", "title": "Fairness-aware Configuration of Machine Learning Libraries", "doi": null, "abstractUrl": "/proceedings-article/icse/2022/922100a909/1Ems8z4OnOU", "parentPublication": { "id": "proceedings/icse/2022/9221/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020293", "title": "Entity Matching with AUC-Based Fairness", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020293/1KfQZw7vUGY", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2019/1736/0/173600a125", "title": "Testing Machine Learning Algorithms for Balanced Data Usage", "doi": null, "abstractUrl": "/proceedings-article/icst/2019/173600a125/1aDT7McqAWQ", "parentPublication": { "id": "proceedings/icst/2019/1736/0", "title": "2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006487", "title": "FAE: A Fairness-Aware Ensemble Framework", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006487/1hJs9UFeh1u", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/01/09000651", "title": "Machine Learning Testing: Survey, Landscapes and Horizons", "doi": null, "abstractUrl": "/journal/ts/2022/01/09000651/1hx2HVjPVVm", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a121", "title": "Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a121/1r54mhPqDni", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377894", "title": "BeFair: Addressing Fairness in the Banking Sector", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377894/1s64OBfBrwI", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2021/4456/0/445600a081", "title": "Combinatorial Testing Metrics for Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/icstw/2021/445600a081/1tYsa1caaRO", "parentPublication": { "id": "proceedings/icstw/2021/4456/0", "title": "2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J9BjbjnEFq", "title": "2022 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "9973807", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J9BkYzzrHi", "doi": "10.1109/TREX57753.2022.00005", "title": "How Do Algorithmic Fairness Metrics Align with Human Judgement? A Mixed-Initiative System for Contextualized Fairness Assessment", "normalizedTitle": "How Do Algorithmic Fairness Metrics Align with Human Judgement? A Mixed-Initiative System for Contextualized Fairness Assessment", "abstract": "Fairness evaluation presents a challenging problem in machine learning, and is usually restricted to the exploration of various metrics that attempt to quantify algorithmic fairness. However, due to cultural and perceptual biases, such metrics are often not powerful enough to accurately capture what people perceive as fair or unfair. To close the gap between human judgement and automated fairness evaluation, we develop a mixed-initiative system named FairAlign, where laypeople assess the fairness of different classification models by analyzing expressive and interactive visualizations of data. Using the aggregated qualitative feedback, data scientists and machine learning experts can examine the similarities and the differences between predefined fairness metrics and human judgement in a contextualized setting. To validate the utility of our system, we conducted a small study on a socially relevant classification task, where six people were asked to assess the fairness of multiple prediction models using the provided visualizations. The results show that our platform is able to give valuable guidance for model evaluation in case of otherwise contradicting and indecisive metrics for algorithmic fairness.", "abstracts": [ { "abstractType": "Regular", "content": "Fairness evaluation presents a challenging problem in machine learning, and is usually restricted to the exploration of various metrics that attempt to quantify algorithmic fairness. However, due to cultural and perceptual biases, such metrics are often not powerful enough to accurately capture what people perceive as fair or unfair. To close the gap between human judgement and automated fairness evaluation, we develop a mixed-initiative system named FairAlign, where laypeople assess the fairness of different classification models by analyzing expressive and interactive visualizations of data. Using the aggregated qualitative feedback, data scientists and machine learning experts can examine the similarities and the differences between predefined fairness metrics and human judgement in a contextualized setting. To validate the utility of our system, we conducted a small study on a socially relevant classification task, where six people were asked to assess the fairness of multiple prediction models using the provided visualizations. The results show that our platform is able to give valuable guidance for model evaluation in case of otherwise contradicting and indecisive metrics for algorithmic fairness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fairness evaluation presents a challenging problem in machine learning, and is usually restricted to the exploration of various metrics that attempt to quantify algorithmic fairness. However, due to cultural and perceptual biases, such metrics are often not powerful enough to accurately capture what people perceive as fair or unfair. To close the gap between human judgement and automated fairness evaluation, we develop a mixed-initiative system named FairAlign, where laypeople assess the fairness of different classification models by analyzing expressive and interactive visualizations of data. Using the aggregated qualitative feedback, data scientists and machine learning experts can examine the similarities and the differences between predefined fairness metrics and human judgement in a contextualized setting. To validate the utility of our system, we conducted a small study on a socially relevant classification task, where six people were asked to assess the fairness of multiple prediction models using the provided visualizations. The results show that our platform is able to give valuable guidance for model evaluation in case of otherwise contradicting and indecisive metrics for algorithmic fairness.", "fno": "935600a001", "keywords": [ "Data Analysis", "Data Visualisation", "Interactive Systems", "Learning Artificial Intelligence", "Pattern Classification", "Algorithmic Fairness Metrics Align", "Classification Models", "Contextualized Fairness Assessment", "Fair Align", "Fairness Evaluation", "Human Judgement", "Indecisive Metrics", "Interactive Data Visualizations", "Machine Learning", "Mixed Initiative System", "Measurement", "Analytical Models", "Visual Analytics", "Machine Learning", "Predictive Models", "Prediction Algorithms", "Data Models", "Algorithmic Fairness", "Fairness Assessment", "Fair Align", "Visual Analytics System", "Human Judgement", "Mixed Initiative", "Contextualized Fairness" ], "authors": [ { "affiliation": "ETH Zürich,Switzerland", "fullName": "Rareş Constantin", "givenName": "Rareş", "surname": "Constantin", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,Switzerland", "fullName": "Moritz Dück", "givenName": "Moritz", "surname": "Dück", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,Switzerland", "fullName": "Anton Alexandrov", "givenName": "Anton", "surname": "Alexandrov", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,Switzerland", "fullName": "Patrik Matošević", "givenName": "Patrik", "surname": "Matošević", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,Switzerland", "fullName": "Daphna Keidar", "givenName": "Daphna", "surname": "Keidar", "__typename": "ArticleAuthorType" }, { "affiliation": "ETH Zürich,Switzerland", "fullName": "Mennatallah El-Assady", "givenName": "Mennatallah", "surname": "El-Assady", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2022", "issn": null, "isbn": "978-1-6654-9356-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J9BkUVCK9W", "name": "ptrex202293560-09974353s1-mm_935600a001.zip", "size": "3.48 MB", "location": "https://www.computer.org/csdl/api/v1/extra/ptrex202293560-09974353s1-mm_935600a001.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "935600z007", "articleId": "1J9BluhfDs4", "__typename": "AdjacentArticleType" }, "next": { "fno": "935600a008", "articleId": "1J9BkDHcAz6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2012/4752/0/06400540", "title": "Exploring the impact of emotion on visual judgement", "doi": null, "abstractUrl": "/proceedings-article/vast/2012/06400540/12OmNBsue40", "parentPublication": { "id": "proceedings/vast/2012/4752/0", "title": "2012 IEEE Conference on Visual Analytics Science and Technology (VAST 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08454489", "title": "Patterns and Pace: Quantifying Diverse Exploration Behavior with Visualizations on the Web", "doi": null, "abstractUrl": "/journal/tg/2019/01/08454489/17D45W1Oa3s", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b036", "title": "Promoting Fairness through Hyperparameter Optimization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b036/1Aqxjv09GOA", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a065", "title": "FairFuse: Interactive Visual Support for Fair Consensus Ranking", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a065/1J6haP1jUt2", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdcat/2022/6090/0/609000a284", "title": "Accuracy-Fairness Tradeoff in Parole Decision Predictions: A Preliminary Analysis", "doi": null, "abstractUrl": "/proceedings-article/bdcat/2022/609000a284/1Lu4cxKaLAs", "parentPublication": { "id": "proceedings/bdcat/2022/6090/0", "title": "2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/10097603", "title": "Fairness in Graph Mining: A Survey", "doi": null, "abstractUrl": "/journal/tk/5555/01/10097603/1M9lHGqR5oA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2021/04/09113719", "title": "Fairness in Deep Learning: A Computational Perspective", "doi": null, "abstractUrl": "/magazine/ex/2021/04/09113719/1kxX3DBw7pC", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378025", "title": "Fairness Metrics: A Comparative Analysis", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378025/1s64Cs28ZWw", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552229", "title": "FairRankVis: A Visual Analytics Framework for Exploring Algorithmic Fairness in Graph Mining Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552229/1xic387kwVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2021/2067/0/206700a006", "title": "Communicating Performance of Regression Models Using Visualization in Pharmacovigilance", "doi": null, "abstractUrl": "/proceedings-article/vahc/2021/206700a006/1z0ylclGF6E", "parentPublication": { "id": "proceedings/vahc/2021/2067/0", "title": "2021 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JezJxTlu8M", "title": "2022 IEEE Visualization in Data Science (VDS)", "acronym": "vds", "groupId": "9982289", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JezJPxSJHy", "doi": "10.1109/VDS57266.2022.00008", "title": "BiaScope: Visual Unfairness Diagnosis for Graph Embeddings", "normalizedTitle": "BiaScope: Visual Unfairness Diagnosis for Graph Embeddings", "abstract": "The issue of bias (i.e., systematic unfairness) in machine learning models has recently attracted the attention of both researchers and practitioners. For the graph mining community in particular, an important goal toward algorithmic fairness is to detect and mitigate bias incorporated into graph embeddings since they are commonly used in human-centered applications, e.g., social-media recommendations. However, simple analytical methods for detecting bias typically involve aggregate statistics which do not reveal the sources of unfairness. Instead, visual methods can provide a holistic fairness characterization of graph embeddings and help uncover the causes of observed bias. In this work, we present BIAS<inf>COPE</inf>, an interactive visualization tool that supports end-to-end visual unfairness diagnosis for graph embeddings. The tool is the product of a design study in collaboration with domain experts. It allows the user to (i) visually compare two embeddings with respect to fairness, (ii) locate nodes or graph communities that are unfairly embedded, and (iii) understand the source of bias by interactively linking the relevant embedding subspace with the corresponding graph topology. Experts&#x2019; feedback confirms that our tool is effective at detecting and diagnosing unfairness. Thus, we envision our tool both as a companion for researchers in designing their algorithms as well as a guide for practitioners who use off-the-shelf graph embeddings.", "abstracts": [ { "abstractType": "Regular", "content": "The issue of bias (i.e., systematic unfairness) in machine learning models has recently attracted the attention of both researchers and practitioners. For the graph mining community in particular, an important goal toward algorithmic fairness is to detect and mitigate bias incorporated into graph embeddings since they are commonly used in human-centered applications, e.g., social-media recommendations. However, simple analytical methods for detecting bias typically involve aggregate statistics which do not reveal the sources of unfairness. Instead, visual methods can provide a holistic fairness characterization of graph embeddings and help uncover the causes of observed bias. In this work, we present BIAS<inf>COPE</inf>, an interactive visualization tool that supports end-to-end visual unfairness diagnosis for graph embeddings. The tool is the product of a design study in collaboration with domain experts. It allows the user to (i) visually compare two embeddings with respect to fairness, (ii) locate nodes or graph communities that are unfairly embedded, and (iii) understand the source of bias by interactively linking the relevant embedding subspace with the corresponding graph topology. Experts&#x2019; feedback confirms that our tool is effective at detecting and diagnosing unfairness. Thus, we envision our tool both as a companion for researchers in designing their algorithms as well as a guide for practitioners who use off-the-shelf graph embeddings.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The issue of bias (i.e., systematic unfairness) in machine learning models has recently attracted the attention of both researchers and practitioners. For the graph mining community in particular, an important goal toward algorithmic fairness is to detect and mitigate bias incorporated into graph embeddings since they are commonly used in human-centered applications, e.g., social-media recommendations. However, simple analytical methods for detecting bias typically involve aggregate statistics which do not reveal the sources of unfairness. Instead, visual methods can provide a holistic fairness characterization of graph embeddings and help uncover the causes of observed bias. In this work, we present BIASCOPE, an interactive visualization tool that supports end-to-end visual unfairness diagnosis for graph embeddings. The tool is the product of a design study in collaboration with domain experts. It allows the user to (i) visually compare two embeddings with respect to fairness, (ii) locate nodes or graph communities that are unfairly embedded, and (iii) understand the source of bias by interactively linking the relevant embedding subspace with the corresponding graph topology. Experts’ feedback confirms that our tool is effective at detecting and diagnosing unfairness. Thus, we envision our tool both as a companion for researchers in designing their algorithms as well as a guide for practitioners who use off-the-shelf graph embeddings.", "fno": "572100a027", "keywords": [ "Data Mining", "Data Visualisation", "Graph Theory", "Learning Artificial Intelligence", "Recommender Systems", "Social Networking Online", "Corresponding Graph Topology", "End To End Visual Unfairness Diagnosis", "Graph Communities", "Graph Mining Community", "Interactive Visualization Tool", "Observed Bias", "Off The Shelf Graph Embeddings", "Relevant Embedding Subspace", "Systematic Unfairness", "Visual Methods", "Visualization", "Machine Learning Algorithms", "Systematics", "Data Visualization", "Collaboration", "Machine Learning", "Topology", "Graph Embeddings", "Network Visualization", "Algorithmic Fairness" ], "authors": [ { "affiliation": "Northeastern University,Khoury College of Computer Sciences", "fullName": "Agapi Rissaki", "givenName": "Agapi", "surname": "Rissaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Khoury College of Computer Sciences", "fullName": "Bruno Scarone", "givenName": "Bruno", "surname": "Scarone", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Khoury College of Computer Sciences", "fullName": "David Liu", "givenName": "David", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Khoury College of Computer Sciences", "fullName": "Aditeya Pandey", "givenName": "Aditeya", "surname": "Pandey", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Network Science Institute", "fullName": "Brennan Klein", "givenName": "Brennan", "surname": "Klein", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Network Science Institute", "fullName": "Tina Eliassi-Rad", "givenName": "Tina", "surname": "Eliassi-Rad", "__typename": "ArticleAuthorType" }, { "affiliation": "Northeastern University,Khoury College of Computer Sciences", "fullName": "Michelle A. Borkin", "givenName": "Michelle A.", "surname": "Borkin", "__typename": "ArticleAuthorType" } ], "idPrefix": "vds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "27-36", "year": "2022", "issn": null, "isbn": "978-1-6654-5721-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1JezJLnRmsU", "name": "pvds202257210-09980579s1-mm_572100a027.zip", "size": "6.59 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvds202257210-09980579s1-mm_572100a027.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "572100a017", "articleId": "1JezLDABVYs", "__typename": "AdjacentArticleType" }, "next": { "fno": "572100a037", "articleId": "1JezKXQ9OQ8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2017/2715/0/08258232", "title": "Evaluating the quality of graph embeddings via topological feature reconstruction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258232/17D45XDIXOG", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b050", "title": "Constructing Graph Node Embeddings via Discrimination of Similarity Distributions", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b050/18jXE9FJ85y", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b054", "title": "Fair Graph Auto-Encoder for Unbiased Graph Representations with Wasserstein Distance", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b054/1Aqx0kSXblS", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300b783", "title": "Triplet-Aware Scene Graph Embeddings", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300b783/1i5mEq1Ubfy", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09132694", "title": "Role-Based Graph Embeddings", "doi": null, "abstractUrl": "/journal/tk/2022/05/09132694/1l8sM2wFJAs", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ickg/2020/8156/0/09194502", "title": "Unfairness Discovery and Prevention For Few-Shot Regression", "doi": null, "abstractUrl": "/proceedings-article/ickg/2020/09194502/1n2nhlyIU12", "parentPublication": { "id": "proceedings/ickg/2020/8156/0", "title": "2020 IEEE International Conference on Knowledge Graph (ICKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2020/1056/0/09381459", "title": "Bias in Knowledge Graph Embeddings", "doi": null, "abstractUrl": "/proceedings-article/asonam/2020/09381459/1semDiX9648", "parentPublication": { "id": "proceedings/asonam/2020/1056/0", "title": "2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2021/4066/0/406600a973", "title": "Distributed Training of Embeddings using Graph Analytics", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2021/406600a973/1uOwdGbHq5a", "parentPublication": { "id": "proceedings/ipdps/2021/4066/0", "title": "2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552229", "title": "FairRankVis: A Visual Analytics Framework for Exploring Algorithmic Fairness in Graph Mining Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552229/1xic387kwVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/03/09645324", "title": "FairDrop: Biased Edge Dropout for Enhancing Fairness in Graph Representation Learning", "doi": null, "abstractUrl": "/journal/ai/2022/03/09645324/1zc6IyRAgfK", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1r54vmgaSyY", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1r54IOsHM0o", "doi": "10.1109/ICDM50108.2020.00027", "title": "Metric-Free Individual Fairness with Cooperative Contextual Bandits", "normalizedTitle": "Metric-Free Individual Fairness with Cooperative Contextual Bandits", "abstract": "Data mining algorithms are increasingly used in automated decision making across all walks of daily life. Unfortunately, as reported in several studies these algorithms learn bias from data and environment leading to unequitable and unfair solutions. To mitigate bias in machine learning, different formalizations of fairness have been proposed that can be categorized into group fairness and individual fairness. Group fairness requires that different groups should be treated similarly which might be unfair to some individuals within a group. On the other hand, individual fairness requires that similar individuals be treated similarly. However, individual fairness remains understudied due to its reliance on problem-specific similarity metric. We propose a metric-free individual fairness and a cooperative contextual bandits (CCB) algorithm. The CCB algorithm utilizes fairness as a reward and attempts to maximize it. The advantage of treating fairness as a reward is that the fairness criterion does not need to be differentiable. The proposed algorithm is tested on multiple real-world benchmark datasets. The results show the effectiveness of the proposed algorithm at mitigating bias and at achieving both individual and group fairness.", "abstracts": [ { "abstractType": "Regular", "content": "Data mining algorithms are increasingly used in automated decision making across all walks of daily life. Unfortunately, as reported in several studies these algorithms learn bias from data and environment leading to unequitable and unfair solutions. To mitigate bias in machine learning, different formalizations of fairness have been proposed that can be categorized into group fairness and individual fairness. Group fairness requires that different groups should be treated similarly which might be unfair to some individuals within a group. On the other hand, individual fairness requires that similar individuals be treated similarly. However, individual fairness remains understudied due to its reliance on problem-specific similarity metric. We propose a metric-free individual fairness and a cooperative contextual bandits (CCB) algorithm. The CCB algorithm utilizes fairness as a reward and attempts to maximize it. The advantage of treating fairness as a reward is that the fairness criterion does not need to be differentiable. The proposed algorithm is tested on multiple real-world benchmark datasets. The results show the effectiveness of the proposed algorithm at mitigating bias and at achieving both individual and group fairness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data mining algorithms are increasingly used in automated decision making across all walks of daily life. Unfortunately, as reported in several studies these algorithms learn bias from data and environment leading to unequitable and unfair solutions. To mitigate bias in machine learning, different formalizations of fairness have been proposed that can be categorized into group fairness and individual fairness. Group fairness requires that different groups should be treated similarly which might be unfair to some individuals within a group. On the other hand, individual fairness requires that similar individuals be treated similarly. However, individual fairness remains understudied due to its reliance on problem-specific similarity metric. We propose a metric-free individual fairness and a cooperative contextual bandits (CCB) algorithm. The CCB algorithm utilizes fairness as a reward and attempts to maximize it. The advantage of treating fairness as a reward is that the fairness criterion does not need to be differentiable. The proposed algorithm is tested on multiple real-world benchmark datasets. The results show the effectiveness of the proposed algorithm at mitigating bias and at achieving both individual and group fairness.", "fno": "831600a182", "keywords": [ "Data Mining", "Decision Making", "Learning Artificial Intelligence", "Fairness Criterion", "Group Fairness", "Metric Free Individual Fairness", "Data Mining Algorithms", "Similar Individuals", "Problem Specific Similarity Metric", "Contextual Bandits Algorithm", "CCB Algorithm", "Measurement", "Machine Learning Algorithms", "Stochastic Processes", "Machine Learning", "Information Retrieval", "Data Mining", "Recommender Systems", "Decision Making", "Contextual Bandits", "Fair Machine Learning" ], "authors": [ { "affiliation": "George Mason University", "fullName": "Qian Hu", "givenName": "Qian", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "George Mason University", "fullName": "Huzefa Rangwala", "givenName": "Huzefa", "surname": "Rangwala", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "182-191", "year": "2020", "issn": null, "isbn": "978-1-7281-8316-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "831600a172", "articleId": "1r54DYuFFDi", "__typename": "AdjacentArticleType" }, "next": { "fno": "831600a192", "articleId": "1r54x6NbK4o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "mags/sp/2018/03/msp2018030034", "title": "A Harm-Reduction Framework for Algorithmic Fairness", "doi": null, "abstractUrl": "/magazine/sp/2018/03/msp2018030034/13rRUwI5TW0", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800b062", "title": "Hubness as a Case of Technical Algorithmic Bias in Music Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800b062/18jXA8K5fLG", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b054", "title": "Fair Graph Auto-Encoder for Unbiased Graph Representations with Wasserstein Distance", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b054/1Aqx0kSXblS", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a155", "title": "Empirical analysis of fairness-aware data segmentation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a155/1KBr1DULT0Y", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020588", "title": "InfoFair: Information-Theoretic Intersectional Fairness", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020588/1KfRBGkyZTa", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2022/5661/0/10068703", "title": "Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding", "doi": null, "abstractUrl": "/proceedings-article/asonam/2022/10068703/1LKwYNVY4mc", "parentPublication": { "id": "proceedings/asonam/2022/5661/0", "title": "2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377894", "title": "BeFair: Addressing Fairness in the Banking Sector", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377894/1s64OBfBrwI", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2021/0132/0/013200a554", "title": "Fairness in Healthcare AI", "doi": null, "abstractUrl": "/proceedings-article/ichi/2021/013200a554/1xIOUB6uynm", "parentPublication": { "id": "proceedings/ichi/2021/0132/0", "title": "2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552229", "title": "FairRankVis: A Visual Analytics Framework for Exploring Algorithmic Fairness in Graph Mining Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552229/1xic387kwVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2021/3414/0/341400a017", "title": "Accuracy and Fairness in Pupil Detection Algorithm", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2021/341400a017/1zpELcTTDH2", "parentPublication": { "id": "proceedings/bigmm/2021/3414/0", "title": "2021 IEEE Seventh International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1s645BaTzVu", "title": "2020 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1s64OBfBrwI", "doi": "10.1109/BigData50022.2020.9377894", "title": "BeFair: Addressing Fairness in the Banking Sector", "normalizedTitle": "BeFair: Addressing Fairness in the Banking Sector", "abstract": "Algorithmic bias mitigation has been one of the most difficult conundrums for the data science community and Machine Learning (ML) experts. Over several years, there have appeared enormous efforts in the field of fairness in ML. Despite the progress toward identifying biases and designing fair algorithms, translating them into the industry remains a major challenge. In this paper, we present the initial results of an industrial open innovation project in the banking sector: we propose a general roadmap for fairness in ML and the implementation of a toolkit called BeFair that helps to identify and mitigate bias. Results show that training a model without explicit constraints may lead to bias exacerbation in the predictions.", "abstracts": [ { "abstractType": "Regular", "content": "Algorithmic bias mitigation has been one of the most difficult conundrums for the data science community and Machine Learning (ML) experts. Over several years, there have appeared enormous efforts in the field of fairness in ML. Despite the progress toward identifying biases and designing fair algorithms, translating them into the industry remains a major challenge. In this paper, we present the initial results of an industrial open innovation project in the banking sector: we propose a general roadmap for fairness in ML and the implementation of a toolkit called BeFair that helps to identify and mitigate bias. Results show that training a model without explicit constraints may lead to bias exacerbation in the predictions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Algorithmic bias mitigation has been one of the most difficult conundrums for the data science community and Machine Learning (ML) experts. Over several years, there have appeared enormous efforts in the field of fairness in ML. Despite the progress toward identifying biases and designing fair algorithms, translating them into the industry remains a major challenge. In this paper, we present the initial results of an industrial open innovation project in the banking sector: we propose a general roadmap for fairness in ML and the implementation of a toolkit called BeFair that helps to identify and mitigate bias. Results show that training a model without explicit constraints may lead to bias exacerbation in the predictions.", "fno": "09377894", "keywords": [ "Bank Data Processing", "Learning Artificial Intelligence", "Be Fair", "Banking Sector", "Algorithmic Bias Mitigation", "Data Science Community", "Fair Algorithms", "Industrial Open Innovation Project", "Bias Exacerbation", "Fairness", "Machine Learning", "Measurement", "Training", "Technological Innovation", "Machine Learning Algorithms", "Banking", "Big Data", "Predictive Models", "Machine Learning", "Banking", "Fairness", "Bias", "Discrimination" ], "authors": [ { "affiliation": "Data Science and Artificial Intelligence, Intesa Sanpaolo,Turin,Italy", "fullName": "Alessandro Castelnovo", "givenName": "Alessandro", "surname": "Castelnovo", "__typename": "ArticleAuthorType" }, { "affiliation": "Data Science and Artificial Intelligence, Intesa Sanpaolo,Turin,Italy", "fullName": "Riccardo Crupi", "givenName": "Riccardo", "surname": "Crupi", "__typename": "ArticleAuthorType" }, { "affiliation": "European Regulatory and Public Affairs, Intesa Sanpaolo,Turin,Italy", "fullName": "Giulia Del Gamba", "givenName": "Giulia Del", "surname": "Gamba", "__typename": "ArticleAuthorType" }, { "affiliation": "Data Science and Artificial Intelligence, Intesa Sanpaolo,Turin,Italy", "fullName": "Greta Greco", "givenName": "Greta", "surname": "Greco", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Laboratories of Europe,London,UK", "fullName": "Aisha Naseer", "givenName": "Aisha", "surname": "Naseer", "__typename": "ArticleAuthorType" }, { "affiliation": "Data Science and Artificial Intelligence, Intesa Sanpaolo,Turin,Italy", "fullName": "Daniele Regoli", "givenName": "Daniele", "surname": "Regoli", "__typename": "ArticleAuthorType" }, { "affiliation": "Fujitsu Laboratories of Europe,London,UK", "fullName": "Beatriz San Miguel Gonzalez", "givenName": "Beatriz San", "surname": "Miguel Gonzalez", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "3652-3661", "year": "2020", "issn": null, "isbn": "978-1-7281-6251-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09378476", "articleId": "1s64fWpjBVC", "__typename": "AdjacentArticleType" }, "next": { "fno": "09378025", "articleId": "1s64Cs28ZWw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icee/2010/3997/0/3997d668", "title": "An Empirical Study of the Relationship among the Structural Dimensions of Service Fairness in the Banking Service", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997d668/12OmNwNeYzI", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/12/09678017", "title": "<sc>Astraea</sc>: Grammar-Based Fairness Testing", "doi": null, "abstractUrl": "/journal/ts/2022/12/09678017/1A4Sz68iffO", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800b036", "title": "Promoting Fairness through Hyperparameter Optimization", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800b036/1Aqxjv09GOA", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b397", "title": "Analysis of the Application of Big Data in Banking Sector", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b397/1BBzcPno2K4", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icstw/2022/9628/0/962800a094", "title": "A Combinatorial Approach to Fairness Testing of Machine Learning Models", "doi": null, "abstractUrl": "/proceedings-article/icstw/2022/962800a094/1E2wsmd5wn6", "parentPublication": { "id": "proceedings/icstw/2022/9628/0", "title": "2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021090", "title": "Boosting Demographic Fairness of Face Attribute Classifiers via Latent Adversarial Representations", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021090/1KfQKzAOacw", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020293", "title": "Entity Matching with AUC-Based Fairness", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020293/1KfQZw7vUGY", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020694", "title": "Impact Of Missing Data Imputation On The Fairness And Accuracy Of Graph Node Classifiers", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020694/1KfRLHeoreM", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/assic/2022/6109/0/10088355", "title": "Challenges In Applying Artificial Intelligence In Banking Sector: A Scientometric Review", "doi": null, "abstractUrl": "/proceedings-article/assic/2022/10088355/1M4rNd0AiUE", "parentPublication": { "id": "proceedings/assic/2022/6109/0", "title": "2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b837", "title": "On the Reform of the Course of Monetary Banking in the Context of Internet Finance", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b837/1tzz8pHJrNe", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yg1aPExbYQ", "title": "2021 IEEE European Symposium on Security and Privacy (EuroS&P)", "acronym": "euros&p", "groupId": "1813044", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yg1gS8yxq0", "doi": "10.1109/EuroSP51992.2021.00028", "title": "On the Privacy Risks of Algorithmic Fairness", "normalizedTitle": "On the Privacy Risks of Algorithmic Fairness", "abstract": "Algorithmic fairness and privacy are essential pillars of trustworthy machine learning. Fair machine learning aims at minimizing discrimination against protected groups by, for example, imposing a constraint on models to equalize their behavior across different groups. This can subsequently change the influence of training data points on the fair model, in a disproportionate way. We study how this can change the information leakage of the model about its training data. We analyze the privacy risks of group fairness (e.g., equalized odds) through the lens of membership inference attacks: inferring whether a data point is used for training a model. We show that fairness comes at the cost of privacy, and this cost is not distributed equally: the information leakage of fair models increases significantly on the unprivileged subgroups, which are the ones for whom we need fair learning. We show that the more biased the training data is, the higher the privacy cost of achieving fairness for the unprivileged subgroups will be. We provide comprehensive empirical analysis for general machine learning algorithms.", "abstracts": [ { "abstractType": "Regular", "content": "Algorithmic fairness and privacy are essential pillars of trustworthy machine learning. Fair machine learning aims at minimizing discrimination against protected groups by, for example, imposing a constraint on models to equalize their behavior across different groups. This can subsequently change the influence of training data points on the fair model, in a disproportionate way. We study how this can change the information leakage of the model about its training data. We analyze the privacy risks of group fairness (e.g., equalized odds) through the lens of membership inference attacks: inferring whether a data point is used for training a model. We show that fairness comes at the cost of privacy, and this cost is not distributed equally: the information leakage of fair models increases significantly on the unprivileged subgroups, which are the ones for whom we need fair learning. We show that the more biased the training data is, the higher the privacy cost of achieving fairness for the unprivileged subgroups will be. We provide comprehensive empirical analysis for general machine learning algorithms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Algorithmic fairness and privacy are essential pillars of trustworthy machine learning. Fair machine learning aims at minimizing discrimination against protected groups by, for example, imposing a constraint on models to equalize their behavior across different groups. This can subsequently change the influence of training data points on the fair model, in a disproportionate way. We study how this can change the information leakage of the model about its training data. We analyze the privacy risks of group fairness (e.g., equalized odds) through the lens of membership inference attacks: inferring whether a data point is used for training a model. We show that fairness comes at the cost of privacy, and this cost is not distributed equally: the information leakage of fair models increases significantly on the unprivileged subgroups, which are the ones for whom we need fair learning. We show that the more biased the training data is, the higher the privacy cost of achieving fairness for the unprivileged subgroups will be. We provide comprehensive empirical analysis for general machine learning algorithms.", "fno": "149100a292", "keywords": [ "Data Privacy", "Inference Mechanisms", "Learning Artificial Intelligence", "Trustworthy Machine Learning", "Fair Machine Learning", "Minimizing Discrimination", "Protected Groups", "Training Data Points", "Fair Model", "Information Leakage", "Privacy Risks", "Group Fairness", "Equalized Odds", "Membership Inference Attacks", "Data Point", "Fair Learning", "Privacy Cost", "General Machine Learning Algorithms", "Algorithmic Fairness", "Essential Pillars", "Training", "Privacy", "Data Privacy", "Machine Learning Algorithms", "Costs", "Training Data", "Machine Learning", "Trustworthy Machine Learning", "Group Fairness", "Data Privacy", "Membership Inference Attacks" ], "authors": [ { "affiliation": "National University of Singapore (NUS),Department of Computer Science", "fullName": "Hongyan Chang", "givenName": "Hongyan", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "National University of Singapore (NUS),Department of Computer Science", "fullName": "Reza Shokri", "givenName": "Reza", "surname": "Shokri", "__typename": "ArticleAuthorType" } ], "idPrefix": "euros&p", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "292-303", "year": "2021", "issn": null, "isbn": "978-1-6654-1491-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "149100a272", "articleId": "1yg1eK2PSyA", "__typename": "AdjacentArticleType" }, "next": { "fno": "149100a304", "articleId": "1yg1fQ9ZTMs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdmw/2012/4925/0/4925a378", "title": "Considerations on Fairness-Aware Data Mining", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a378/12OmNyQYt1r", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/sp/2022/05/09802763", "title": "Data Privacy and Trustworthy Machine Learning", "doi": null, "abstractUrl": "/magazine/sp/2022/05/09802763/1Eo1yAtFfMs", "parentPublication": { "id": "mags/sp", "title": "IEEE Security & Privacy", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2022/9356/0/935600a001", "title": "How Do Algorithmic Fairness Metrics Align with Human Judgement? A Mixed-Initiative System for Contextualized Fairness Assessment", "doi": null, "abstractUrl": "/proceedings-article/trex/2022/935600a001/1J9BkYzzrHi", "parentPublication": { "id": "proceedings/trex/2022/9356/0", "title": "2022 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a155", "title": "Empirical analysis of fairness-aware data segmentation", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a155/1KBr1DULT0Y", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020717", "title": "Nondiscriminating Dropout Prediction beyond Algorithmic Fairness: Ensuring Coverage in Preprocessing Pipelines", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020717/1KfQUmVRKh2", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2020/11/09098045", "title": "Towards Fair and Privacy-Preserving Federated Deep Models", "doi": null, "abstractUrl": "/journal/td/2020/11/09098045/1k0Ls1xbs64", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/04/09117188", "title": "Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination", "doi": null, "abstractUrl": "/journal/tk/2022/04/09117188/1kGfwTyLZbq", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2020/2903/0/09101635", "title": "An Intersectional Definition of Fairness", "doi": null, "abstractUrl": "/proceedings-article/icde/2020/09101635/1kaMMvf0Ptu", "parentPublication": { "id": "proceedings/icde/2020/2903/0", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/06/09158374", "title": "More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence", "doi": null, "abstractUrl": "/journal/tk/2022/06/09158374/1m1eAPbg4JW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378043", "title": "FairFL: A Fair Federated Learning Approach to Reducing Demographic Bias in Privacy-Sensitive Classification Models", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378043/1s64d2joMfK", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvStcUp", "title": "2009 IEEE Symposium on Visual Analytics Science and Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "1HJyHYJk7eg", "doi": "10.1109/VAST.2009.5333023", "title": "Connecting the dots in visual analysis", "normalizedTitle": "Connecting the dots in visual analysis", "abstract": "During visual analysis, users must often connect insights discovered at various points of time. This process is often called &#x201C;connecting the dots.&#x201D; When analysts interactively explore complex datasets over multiple sessions, they may uncover a large number of findings. As a result, it is often difficult for them to recall the past insights, views and concepts that are most relevant to their current line of inquiry. This challenge is even more difficult during collaborative analysis tasks where they need to find connections between their own discoveries and insights found by others. In this paper, we describe a context-based retrieval algorithm to identify notes, views and concepts from users' past analyses that are most relevant to a view or a note based on their line of inquiry. We then describe a related notes recommendation feature that surfaces the most relevant items to the user as they work based on this algorithm. We have implemented this recommendation feature in HARVEST, a web based visual analytic system. We evaluate the related notes recommendation feature of HARVEST through a case study and discuss the implications of our approach.", "abstracts": [ { "abstractType": "Regular", "content": "During visual analysis, users must often connect insights discovered at various points of time. This process is often called &#x201C;connecting the dots.&#x201D; When analysts interactively explore complex datasets over multiple sessions, they may uncover a large number of findings. As a result, it is often difficult for them to recall the past insights, views and concepts that are most relevant to their current line of inquiry. This challenge is even more difficult during collaborative analysis tasks where they need to find connections between their own discoveries and insights found by others. In this paper, we describe a context-based retrieval algorithm to identify notes, views and concepts from users' past analyses that are most relevant to a view or a note based on their line of inquiry. We then describe a related notes recommendation feature that surfaces the most relevant items to the user as they work based on this algorithm. We have implemented this recommendation feature in HARVEST, a web based visual analytic system. We evaluate the related notes recommendation feature of HARVEST through a case study and discuss the implications of our approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "During visual analysis, users must often connect insights discovered at various points of time. This process is often called “connecting the dots.” When analysts interactively explore complex datasets over multiple sessions, they may uncover a large number of findings. As a result, it is often difficult for them to recall the past insights, views and concepts that are most relevant to their current line of inquiry. This challenge is even more difficult during collaborative analysis tasks where they need to find connections between their own discoveries and insights found by others. In this paper, we describe a context-based retrieval algorithm to identify notes, views and concepts from users' past analyses that are most relevant to a view or a note based on their line of inquiry. We then describe a related notes recommendation feature that surfaces the most relevant items to the user as they work based on this algorithm. We have implemented this recommendation feature in HARVEST, a web based visual analytic system. We evaluate the related notes recommendation feature of HARVEST through a case study and discuss the implications of our approach.", "fno": "05333023", "keywords": [ "Information Filtering", "Information Retrieval", "Visual Analysis", "Collaborative Analysis Task", "Context Based Retrieval Algorithm", "Recommendation Feature", "Harvest System", "Web Based Visual Analytic System", "Connecting The Dots Process", "Datasets Exploration", "Joining Processes", "Algorithm Design And Analysis", "Information Retrieval", "Visual Analytics", "Information Analysis", "Data Visualization", "Collaboration", "Context Modeling", "Heuristic Algorithms", "Tag Clouds" ], "authors": [ { "affiliation": "Eindhoven University of Technology, The Netherlands", "fullName": "Yedendra B. Shrinivasan", "givenName": "Yedendra B.", "surname": "Shrinivasan", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research, USA", "fullName": "David Gotz", "givenName": "David", "surname": "Gotz", "__typename": "ArticleAuthorType" }, { "affiliation": "IBM Research, USA", "fullName": "Jie Lu", "givenName": "Jie", "surname": "Lu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": false, "pubDate": "2009-10-01T00:00:00", "pubType": "proceedings", "pages": "123-130", "year": "2009", "issn": null, "isbn": "978-1-4244-5283-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05332610", "articleId": "1nzzfoyEvTi", "__typename": "AdjacentArticleType" }, "next": { "fno": "05335376", "articleId": "12OmNwc3wsF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iat/2015/9618/3/9618c251", "title": "NewsOpinionSummarizer: A Visualization and Predictive System for Opinion Pieces in Online News", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618c251/12OmNAoUToZ", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/3", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2003/7961/2/01264692", "title": "Over-arching concepts in K12 science education: connecting the dots", "doi": null, "abstractUrl": "/proceedings-article/fie/2003/01264692/12OmNAsTgTl", "parentPublication": { "id": "proceedings/fie/2003/7961/2", "title": "33rd Annual Frontiers in Education, 2003. FIE 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdva/2015/7343/0/07314304", "title": "Visual Analytics of Gene Sets Comparison", "doi": null, "abstractUrl": "/proceedings-article/bdva/2015/07314304/12OmNC3FGdO", "parentPublication": { "id": "proceedings/bdva/2015/7343/0", "title": "2015 Big Data Visual Analytics (BDVA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403627", "title": "EmoViz: Mining the world's interest through emotion analysis", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403627/12OmNxX3uDT", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2016/9041/0/9041a302", "title": "The \"Concept Cloud\": Supporting Collaborative Knowledge Construction Based on Semantic Extraction from Learner-Generated Artefacts", "doi": null, "abstractUrl": "/proceedings-article/icalt/2016/9041a302/12OmNxwWoUN", "parentPublication": { "id": "proceedings/icalt/2016/9041/0", "title": "2016 IEEE 16th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a051", "title": "Lyrics Word Clouds", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a051/12OmNzT7Orr", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2016/5661/0/07883520", "title": "Visual analysis and coding of data-rich user behavior", "doi": null, "abstractUrl": "/proceedings-article/vast/2016/07883520/12OmNzXFoyS", "parentPublication": { "id": "proceedings/vast/2016/5661/0", "title": "2016 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192685", "title": "CiteRivers: Visual Analytics of Citation Patterns", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192685/13rRUwd9CG5", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192633", "title": "Visual Analysis and Dissemination of Scientific Literature Collections with SurVis", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192633/13rRUwwJWFP", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2013/07/mco2013070030", "title": "Visual Analytics Support for Intelligence Analysis", "doi": null, "abstractUrl": "/magazine/co/2013/07/mco2013070030/13rRUxD9h0P", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6hnO7Gnao", "title": "2022 IEEE 18th International Conference on e-Science (e-Science)", "acronym": "e-science", "groupId": "9973400", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hpa8Fh8k", "doi": "10.1109/eScience55777.2022.00073", "title": "PiMS: A Pre-ML Labelling Tool", "normalizedTitle": "PiMS: A Pre-ML Labelling Tool", "abstract": "Machine Learning (ML) techniques in clinical decision support systems are scarce due to the limited availability of clinically validated and labelled training data sets. We present a framework to (1) enable quality controls at data submission toward ML appropriate data, (2) provide in-situ algorithm assessments, and (3) prepare dataframes for ML training and robust stochastic analysis. We developed and evaluated PiMS (Pandemic Intervention and Monitoring Systems): a remote monitoring solution for patients that are Covid-positive. The system was trialled at two hospitals in Melbourne, Australia (Alfred Health and Monash Health) involving 109 patients and 15 clinicians.", "abstracts": [ { "abstractType": "Regular", "content": "Machine Learning (ML) techniques in clinical decision support systems are scarce due to the limited availability of clinically validated and labelled training data sets. We present a framework to (1) enable quality controls at data submission toward ML appropriate data, (2) provide in-situ algorithm assessments, and (3) prepare dataframes for ML training and robust stochastic analysis. We developed and evaluated PiMS (Pandemic Intervention and Monitoring Systems): a remote monitoring solution for patients that are Covid-positive. The system was trialled at two hospitals in Melbourne, Australia (Alfred Health and Monash Health) involving 109 patients and 15 clinicians.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Machine Learning (ML) techniques in clinical decision support systems are scarce due to the limited availability of clinically validated and labelled training data sets. We present a framework to (1) enable quality controls at data submission toward ML appropriate data, (2) provide in-situ algorithm assessments, and (3) prepare dataframes for ML training and robust stochastic analysis. We developed and evaluated PiMS (Pandemic Intervention and Monitoring Systems): a remote monitoring solution for patients that are Covid-positive. The system was trialled at two hospitals in Melbourne, Australia (Alfred Health and Monash Health) involving 109 patients and 15 clinicians.", "fno": "612400a431", "keywords": [ "Data Handling", "Decision Support Systems", "Diseases", "Epidemics", "Health Care", "Hospitals", "Learning Artificial Intelligence", "Medical Information Systems", "Patient Monitoring", "Quality Control", "Australia", "Clinical Decision Support Systems", "Data Submission", "Hospital", "In Situ Algorithm Assessments", "Labelled Training Data Sets", "Machine Learning Technique", "Melbourne", "ML Appropriate Data", "ML Training", "Pandemic Intervention And Monitoring Systems", "Pi MS", "Pre ML Labelling Tool", "Remote Monitoring Solution", "Robust Stochastic Analysis", "Decision Support Systems", "Training", "Machine Learning Algorithms", "Pandemics", "Hospitals", "Training Data", "Quality Control", "Clinical Decision Support Systems CDSS", "ML Labelling", "Triaging Algorithm", "Human In The Loop Validation" ], "authors": [ { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Irini Logothetis", "givenName": "Irini", "surname": "Logothetis", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Scott Barnett", "givenName": "Scott", "surname": "Barnett", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Leonard Hoon", "givenName": "Leonard", "surname": "Hoon", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Srikanth Thudumu", "givenName": "Srikanth", "surname": "Thudumu", "__typename": "ArticleAuthorType" }, { "affiliation": "Emergency and Trauma Centre, Alfred Health,Melbourne,VIC,Australia", "fullName": "Joseph Mathew", "givenName": "Joseph", "surname": "Mathew", "__typename": "ArticleAuthorType" }, { "affiliation": "Emergency and Trauma Centre, Alfred Health,Melbourne,VIC,Australia", "fullName": "Carl Luckhoff", "givenName": "Carl", "surname": "Luckhoff", "__typename": "ArticleAuthorType" }, { "affiliation": "Emergency and Trauma Centre, Alfred Health,Melbourne,VIC,Australia", "fullName": "Gerard O'Reilly", "givenName": "Gerard", "surname": "O'Reilly", "__typename": "ArticleAuthorType" }, { "affiliation": "Scale Facilitation,New York,United States of America", "fullName": "David Collard", "givenName": "David", "surname": "Collard", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Rajesh Vasa", "givenName": "Rajesh", "surname": "Vasa", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2I2), Deakin University,Geelong,VIC,Australia", "fullName": "Kon Mouzakis", "givenName": "Kon", "surname": "Mouzakis", "__typename": "ArticleAuthorType" }, { "affiliation": "Emergency and Trauma Centre, Alfred Health,Melbourne,VIC,Australia", "fullName": "Mark Fitzgerald", "givenName": "Mark", "surname": "Fitzgerald", "__typename": "ArticleAuthorType" } ], "idPrefix": "e-science", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "431-432", "year": "2022", "issn": null, "isbn": "978-1-6654-6124-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "612400a429", "articleId": "1J6hs2p2yMo", "__typename": "AdjacentArticleType" }, "next": { "fno": "612400a433", "articleId": "1J6hpoUEPSw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icisa/2014/4443/0/06847467", "title": "Statistical Analysis of ML-Based Paraphrase Detectors with Lexical Similarity Metrics", "doi": null, "abstractUrl": "/proceedings-article/icisa/2014/06847467/12OmNBTs7zm", "parentPublication": { "id": "proceedings/icisa/2014/4443/0", "title": "2014 International Conference on Information Science and Applications (ICISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2012/4749/0/4749a187", "title": "Joint ML and MMSE Estimation Based Signal Detection for MIMO-OFDM Radio over Fiber System", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2012/4749a187/12OmNBVrjji", "parentPublication": { "id": "proceedings/hpcc-icess/2012/4749/0", "title": "High Performance Computing and Communication &amp; IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismvl/2015/1777/0/1777a115", "title": "A Novel Weighted Hierarchical Adaptive Voting Ensemble Machine Learning Method for Breast Cancer Detection", "doi": null, "abstractUrl": "/proceedings-article/ismvl/2015/1777a115/12OmNCcKQyS", "parentPublication": { "id": "proceedings/ismvl/2015/1777/0", "title": "2015 IEEE International Symposium on Multiple-Valued Logic (ISMVL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ict4m/2016/4521/0/4521a160", "title": "Development Decision Support System of Choosing Medicine Using TOPSIS Method (Case Study: RSIA Tiara)", "doi": null, "abstractUrl": "/proceedings-article/ict4m/2016/4521a160/12OmNx4gUnZ", "parentPublication": { "id": "proceedings/ict4m/2016/4521/0", "title": "2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258038", "title": "The ML test score: A rubric for ML production readiness and technical debt reduction", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258038/17D45W9KVKr", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671860", "title": "DeepTrack: An ML-based Approach to Health Disparity Identification and Determinant Tracking for Improving Pandemic Health Care", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671860/1A8ho4bOUBa", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669649", "title": "A FHIR-compliant Application for Multi-Site and Multi-Modality Pediatric Scoliosis Patient Rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669649/1A9VARziWHK", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/2022/9558/0/09806108", "title": "Deep Reinforcement Learning Approach for Emergency Response Management", "doi": null, "abstractUrl": "/proceedings-article/iscv/2022/09806108/1EBWsFpkLuM", "parentPublication": { "id": "proceedings/iscv/2022/9558/0", "title": "2022 International Conference on Intelligent Systems and Computer Vision (ISCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/transai/2021/3412/0/341200a064", "title": "A Smart Framework for Automatically Analyzing Electrocardiograms", "doi": null, "abstractUrl": "/proceedings-article/transai/2021/341200a064/1xNNwWHuxDa", "parentPublication": { "id": "proceedings/transai/2021/3412/0", "title": "2021 Third International Conference on Transdisciplinary AI (TransAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555810", "title": "VBridge: Connecting the Dots Between Features and Data to Explain Healthcare Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555810/1xlw2uJhEXe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MIgQdQKHtu", "title": "2022 Workshop on Visual Analytics in Healthcare (VAHC)", "acronym": "vahc", "groupId": "1826204", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1MIgSlSuYw0", "doi": "10.1109/VAHC57815.2022.10108523", "title": "Evaluation of Data Visualizations for an Electronic Patient Preferences Tool for Older Adults Diagnosed with Hematologic Malignancies", "normalizedTitle": "Evaluation of Data Visualizations for an Electronic Patient Preferences Tool for Older Adults Diagnosed with Hematologic Malignancies", "abstract": "Patients diagnosed with hematologic malignancies account for 10&#x0025; of cancer related deaths. The growth of treatment options for hematologic malignancies has led to increased focus on treatment decision-making. However, little research has been done integrating patient-generated data and shared decision making to facilitate patient-clinician collaboration and understand patient preferences in cancer care. Our study aims to develop and evaluate data visualizations to support an electronic healthcare tool (EHT) to facilitate patient understanding of treatment outcomes using human-centered design methods. Data visualizations were developed and updated based on feedback from healthy volunteers, older adults with hematologic malignancies (patients), caregivers, and clinicians. We conducted a content analysis on the qualitative data gathered from participants. Our findings showed that users preferred easy to understand visualizations with simple, explanatory text compared to visualizations that were not immediately intuitive. Users also preferred visualizations that were more reflective of the individual&#x0027;s cancer treatment rather than a comparison to the patient population. Iterative improvements were made to the visualizations to reflect user feedback and will be used to inform the next iteration of visualizations for user testing in the clinic. This paper demonstrates the benefit of human- and user-centered design to iterate on data visualizations used to support a patient preference tool.", "abstracts": [ { "abstractType": "Regular", "content": "Patients diagnosed with hematologic malignancies account for 10&#x0025; of cancer related deaths. The growth of treatment options for hematologic malignancies has led to increased focus on treatment decision-making. However, little research has been done integrating patient-generated data and shared decision making to facilitate patient-clinician collaboration and understand patient preferences in cancer care. Our study aims to develop and evaluate data visualizations to support an electronic healthcare tool (EHT) to facilitate patient understanding of treatment outcomes using human-centered design methods. Data visualizations were developed and updated based on feedback from healthy volunteers, older adults with hematologic malignancies (patients), caregivers, and clinicians. We conducted a content analysis on the qualitative data gathered from participants. Our findings showed that users preferred easy to understand visualizations with simple, explanatory text compared to visualizations that were not immediately intuitive. Users also preferred visualizations that were more reflective of the individual&#x0027;s cancer treatment rather than a comparison to the patient population. Iterative improvements were made to the visualizations to reflect user feedback and will be used to inform the next iteration of visualizations for user testing in the clinic. This paper demonstrates the benefit of human- and user-centered design to iterate on data visualizations used to support a patient preference tool.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Patients diagnosed with hematologic malignancies account for 10% of cancer related deaths. The growth of treatment options for hematologic malignancies has led to increased focus on treatment decision-making. However, little research has been done integrating patient-generated data and shared decision making to facilitate patient-clinician collaboration and understand patient preferences in cancer care. Our study aims to develop and evaluate data visualizations to support an electronic healthcare tool (EHT) to facilitate patient understanding of treatment outcomes using human-centered design methods. Data visualizations were developed and updated based on feedback from healthy volunteers, older adults with hematologic malignancies (patients), caregivers, and clinicians. We conducted a content analysis on the qualitative data gathered from participants. Our findings showed that users preferred easy to understand visualizations with simple, explanatory text compared to visualizations that were not immediately intuitive. Users also preferred visualizations that were more reflective of the individual's cancer treatment rather than a comparison to the patient population. Iterative improvements were made to the visualizations to reflect user feedback and will be used to inform the next iteration of visualizations for user testing in the clinic. This paper demonstrates the benefit of human- and user-centered design to iterate on data visualizations used to support a patient preference tool.", "fno": "10108523", "keywords": [ "Visual Analytics", "Decision Making", "User Centered Design", "Sociology", "Data Visualization", "Iterative Methods", "Older Adults", "Data Visualization", "User Centered Design", "Patient Preference", "Patient Centered Care", "Electronic Healthcare Tool", "Oncology" ], "authors": [ { "affiliation": "UNC-Chapel Hill", "fullName": "Elizabeth Kwong", "givenName": "Elizabeth", "surname": "Kwong", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "Amy Cole", "givenName": "Amy", "surname": "Cole", "__typename": "ArticleAuthorType" }, { "affiliation": "Mercer University", "fullName": "Amro Khasawneh", "givenName": "Amro", "surname": "Khasawneh", "__typename": "ArticleAuthorType" }, { "affiliation": "Duke University", "fullName": "Carl Mhina", "givenName": "Carl", "surname": "Mhina", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "Lukasz Mazur", "givenName": "Lukasz", "surname": "Mazur", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "Karthik Adapa", "givenName": "Karthik", "surname": "Adapa", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC Lineberger Comprehensive Cancer Center", "fullName": "Daniel R. Richardson", "givenName": "Daniel R.", "surname": "Richardson", "__typename": "ArticleAuthorType" } ], "idPrefix": "vahc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2022", "issn": null, "isbn": "979-8-3503-0103-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10108519", "articleId": "1MIgTbk9v8Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "10108524", "articleId": "1MIgT1UPOQo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iri/2015/6656/0/6656a229", "title": "Building an Effective Classification Model for Breast Cancer Patient Response Data", "doi": null, "abstractUrl": "/proceedings-article/iri/2015/6656a229/12OmNApLGsB", "parentPublication": { "id": "proceedings/iri/2015/6656/0", "title": "2015 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/achi/2009/3529/0/3529a375", "title": "Using an Error Detection Strategy for Improving Web Accessibility for Older Adults", "doi": null, "abstractUrl": "/proceedings-article/achi/2009/3529a375/12OmNvlPkFZ", "parentPublication": { "id": "proceedings/achi/2009/3529/0", "title": "International Conference on Advances in Computer-Human Interaction", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2008/03/mso2008030016", "title": "Requirements Elicitation with and for Older Adults", "doi": null, "abstractUrl": "/magazine/so/2008/03/mso2008030016/13rRUwh80F8", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539638", "title": "PROACT: Iterative Design of a Patient-Centered Visualization for Effective Prostate Cancer Health Risk Communication", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539638/13rRUxYINfk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09705086", "title": "Stress Detection during Motor Activity: Comparing Neurophysiological Indices in Older Adults", "doi": null, "abstractUrl": "/journal/ta/5555/01/09705086/1AIHTlQqVoY", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09684685", "title": "Artificial Emotional Intelligence in Socially Assistive Robots for Older Adults: A Pilot Study", "doi": null, "abstractUrl": "/journal/ta/5555/01/09684685/1AgmkaKnJyE", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ec/2023/01/09799772", "title": "Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults&#x2019; Functional Profile", "doi": null, "abstractUrl": "/journal/ec/2023/01/09799772/1Ehoc0361Jm", "parentPublication": { "id": "trans/ec", "title": "IEEE Transactions on Emerging Topics in Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2022/7000/0/700000a225", "title": "Towards a Decision Support Tool to Prescribe Recreation for Older Adults in Social Isolation (RxOSI)", "doi": null, "abstractUrl": "/proceedings-article/re/2022/700000a225/1HBKs114vfi", "parentPublication": { "id": "proceedings/re/2022/7000/0", "title": "2022 IEEE 30th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/rew/2022/6000/0/600000a057", "title": "Understanding IT-related Well-being, Aging and Health Needs of Older Adults with Crowd-Requirements Engineering", "doi": null, "abstractUrl": "/proceedings-article/rew/2022/600000a057/1HCVadRJ4ru", "parentPublication": { "id": "proceedings/rew/2022/6000/0", "title": "2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a698", "title": "Designing a Mixed Reality Cognitive Orthosis to Support Independence of Older Adults from the Dementia Continuum", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a698/1J7WdfA4x44", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHkEttbVOE", "title": "2019 8th Brazilian Conference on Intelligent Systems (BRACIS)", "acronym": "bracis", "groupId": "1803430", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHkH71PDFu", "doi": "10.1109/BRACIS.2019.00088", "title": "Argumentation-Based Agents that Explain Their Decisions", "normalizedTitle": "Argumentation-Based Agents that Explain Their Decisions", "abstract": "Explainable Artificial Intelligence (XAI) systems, including intelligent agents, must be able to explain their internal decisions, behaviours and reasoning that produce their choices to the humans (or other systems) with which they interact. In this paper, we focus on how an extended model of BDI (Beliefs-Desires-Intentions) agents can be able to generate explanations about their reasoning, specifically, about the goals he decides to commit to. Our proposal is based on argumentation theory, we use arguments to represent the reasons that lead an agent to make a decision and use argumentation semantics to determine acceptable arguments (reasons). We propose two types of explanations: the partial one and the complete one. We apply our proposal to a scenario of rescue robots.", "abstracts": [ { "abstractType": "Regular", "content": "Explainable Artificial Intelligence (XAI) systems, including intelligent agents, must be able to explain their internal decisions, behaviours and reasoning that produce their choices to the humans (or other systems) with which they interact. In this paper, we focus on how an extended model of BDI (Beliefs-Desires-Intentions) agents can be able to generate explanations about their reasoning, specifically, about the goals he decides to commit to. Our proposal is based on argumentation theory, we use arguments to represent the reasons that lead an agent to make a decision and use argumentation semantics to determine acceptable arguments (reasons). We propose two types of explanations: the partial one and the complete one. We apply our proposal to a scenario of rescue robots.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Explainable Artificial Intelligence (XAI) systems, including intelligent agents, must be able to explain their internal decisions, behaviours and reasoning that produce their choices to the humans (or other systems) with which they interact. In this paper, we focus on how an extended model of BDI (Beliefs-Desires-Intentions) agents can be able to generate explanations about their reasoning, specifically, about the goals he decides to commit to. Our proposal is based on argumentation theory, we use arguments to represent the reasons that lead an agent to make a decision and use argumentation semantics to determine acceptable arguments (reasons). We propose two types of explanations: the partial one and the complete one. We apply our proposal to a scenario of rescue robots.", "fno": "425300a467", "keywords": [ "Inference Mechanisms", "Multi Agent Systems", "Argumentation Based Agents", "Explainable Artificial Intelligence Systems", "XAI", "Intelligent Agents", "BDI Agents", "Argumentation Theory", "Argumentation Semantics", "Beliefs Desires Intentions Agents", "Rescue Robots", "Multi Agent Systems", "Inference Mechanisms", "Intelligent Agents", "Rescue Robots", "Artificial Intelligence", "Decision Making", "Intelligent Agents", "Explainable Agency", "Argumentation" ], "authors": [ { "affiliation": "Federal University of Technology of Parana", "fullName": "Mariela Morveli Espinoza", "givenName": "Mariela", "surname": "Morveli Espinoza", "__typename": "ArticleAuthorType" }, { "affiliation": "IFPR, Paranavai, Brazil", "fullName": "Ayslan T. Possebom", "givenName": "Ayslan T.", "surname": "Possebom", "__typename": "ArticleAuthorType" }, { "affiliation": "CPGEI, UTFPR, Curitiba, Brazil", "fullName": "César A. Tacla", "givenName": "César A.", "surname": "Tacla", "__typename": "ArticleAuthorType" } ], "idPrefix": "bracis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "467-472", "year": "2019", "issn": null, "isbn": "978-1-7281-4253-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "425300a461", "articleId": "1fHkLLt7Mw8", "__typename": "AdjacentArticleType" }, "next": { "fno": "425300a473", "articleId": "1fHkMGFiuw8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bracis/2015/0016/0/0016a110", "title": "Merging Argumentation Systems", "doi": null, "abstractUrl": "/proceedings-article/bracis/2015/0016a110/12OmNAYGlo0", "parentPublication": { "id": "proceedings/bracis/2015/0016/0", "title": "2015 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2017/3191/0/3191a051", "title": "Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews", "doi": null, "abstractUrl": "/proceedings-article/re/2017/3191a051/12OmNAYGlsa", "parentPublication": { "id": "proceedings/re/2017/3191/0", "title": "2017 IEEE 25th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2016/4459/0/4459a190", "title": "On Learning Abstract Argumentation Graphs from Bivalent Statement Labellings", "doi": null, "abstractUrl": "/proceedings-article/ictai/2016/4459a190/12OmNAlvI9w", "parentPublication": { "id": "proceedings/ictai/2016/4459/0", "title": "2016 IEEE 28th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2010/6522/0/05452705", "title": "Ontology alignment argumentation with mutual dependency between arguments and mappings", "doi": null, "abstractUrl": "/proceedings-article/icdew/2010/05452705/12OmNApcub8", "parentPublication": { "id": "proceedings/icdew/2010/6522/0", "title": "2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mse/2000/0933/0/09330352", "title": "Human-Computer Interface for Collaborative Argumentation", "doi": null, "abstractUrl": "/proceedings-article/mse/2000/09330352/12OmNqFa5oO", "parentPublication": { "id": "proceedings/mse/2000/0933/0", "title": "Microelectronics Systems Education, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2013/2972/0/06735304", "title": "From Preferences over Arguments to Preferences over Attacks in Abstract Argumentation: A Comparative Study", "doi": null, "abstractUrl": "/proceedings-article/ictai/2013/06735304/12OmNwwuDRt", "parentPublication": { "id": "proceedings/ictai/2013/2972/0", "title": "2013 IEEE 25th International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2013/5145/2/5145b080", "title": "Explaining Argumentation over Alignment Agreements", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2013/5145b080/12OmNz2kqr8", "parentPublication": { "id": "proceedings/wi-iat/2013/5145/2", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/repa/2011/1022/0/06046723", "title": "Capturing transparency-related requirements patterns through argumentation", "doi": null, "abstractUrl": "/proceedings-article/repa/2011/06046723/12OmNzE54GD", "parentPublication": { "id": "proceedings/repa/2011/1022/0", "title": "2011 The First International Workshop On Requirements Patterns (RePa'11)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/1/4077a493", "title": "An Argumentation-Based Interaction Model and its Algorithms in Multi-agent System", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077a493/12OmNzlUKg0", "parentPublication": { "id": "proceedings/icicta/2010/4077/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2021/02/09329042", "title": "A Basic Framework for Explanations in Argumentation", "doi": null, "abstractUrl": "/magazine/ex/2021/02/09329042/1qxNLdplkli", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hgtR5xF6VO", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hguccNTnfG", "doi": "10.1109/BIBM47256.2019.8983360", "title": "Patient Activity Monitoring Based on Real-Time Location Data", "normalizedTitle": "Patient Activity Monitoring Based on Real-Time Location Data", "abstract": "We present our patient activity monitoring system with the aim of aiding informed clinical decision-making that encourages early and progressive ambulation (EPA). EPA has been shown to reduce the risk of many serious complications experienced by hospitalized patients. To achieve our goal, we employed a preexisting real-time location system (RTLS). We developed algorithms which leverage the data from an RTLS to determine the distance traveled, average velocity, time in zones-of-interest, and inactivity of patients to accurately inform clinicians of patient activities.", "abstracts": [ { "abstractType": "Regular", "content": "We present our patient activity monitoring system with the aim of aiding informed clinical decision-making that encourages early and progressive ambulation (EPA). EPA has been shown to reduce the risk of many serious complications experienced by hospitalized patients. To achieve our goal, we employed a preexisting real-time location system (RTLS). We developed algorithms which leverage the data from an RTLS to determine the distance traveled, average velocity, time in zones-of-interest, and inactivity of patients to accurately inform clinicians of patient activities.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present our patient activity monitoring system with the aim of aiding informed clinical decision-making that encourages early and progressive ambulation (EPA). EPA has been shown to reduce the risk of many serious complications experienced by hospitalized patients. To achieve our goal, we employed a preexisting real-time location system (RTLS). We developed algorithms which leverage the data from an RTLS to determine the distance traveled, average velocity, time in zones-of-interest, and inactivity of patients to accurately inform clinicians of patient activities.", "fno": "08983360", "keywords": [ "Decision Making", "Health Care", "Hospitals", "Medical Information Systems", "Patient Monitoring", "Patient Treatment", "Real Time Location System", "RTLS", "Real Time Location Data", "Patient Activity Monitoring System", "Clinical Decision Making", "Early Ambulation", "Progressive Ambulation", "EPA", "Hospitalized Patients", "Hospitals", "Conferences", "Decision Making", "Real Time Systems", "Cultural Differences", "Biomedical Monitoring", "Bioinformatics", "Activity Monitoring", "Ambulation", "Healthcare Patient Monitoring", "Indoor Location", "Localization", "Real Time Location System", "RFID", "RTLS", "Ultra Wideband" ], "authors": [ { "affiliation": "University of Texas at Dallas,Dept. of Electrical & Computer Engineering,Richardson,Texas,USA", "fullName": "Alec M. Steele", "givenName": "Alec M.", "surname": "Steele", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Texas at Dallas,Dept. of Electrical & Computer Engineering,Richardson,Texas,USA", "fullName": "Mehrdad Nourani", "givenName": "Mehrdad", "surname": "Nourani", "__typename": "ArticleAuthorType" }, { "affiliation": "Geriatric Research, Edu., and Clinical Center, Central Arkansas Veterans Healthcare System,Little Rock,Arkansas,USA", "fullName": "Melinda M. Bopp", "givenName": "Melinda M.", "surname": "Bopp", "__typename": "ArticleAuthorType" }, { "affiliation": "Geriatric Research, Education, and Clinical Center, Central Arkansas Veterans Healthcare System,Little Rock,Arkansas,USA", "fullName": "Tanya S. Taylor", "givenName": "Tanya S.", "surname": "Taylor", "__typename": "ArticleAuthorType" }, { "affiliation": "Geriatric Research, Education, and Clinical Center, Central Arkansas Veterans Healthcare System,Little Rock,Arkansas,USA", "fullName": "Dennis H. Sullivan", "givenName": "Dennis H.", "surname": "Sullivan", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "1244-1246", "year": "2019", "issn": null, "isbn": "978-1-7281-1867-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08983263", "articleId": "1hgtZCiFEqY", "__typename": "AdjacentArticleType" }, "next": { "fno": "08983172", "articleId": "1hgtSJKFVO8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2013/5004/0/5004a648", "title": "Research on Countermeasures of Patient Privacy Protection", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a648/12OmNqzu6Ob", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispan-fcst-iscc/2017/0840/0/0840a414", "title": "An IoT Approach to Personalised Remote Monitoring and Management of Epilepsy", "doi": null, "abstractUrl": "/proceedings-article/ispan-fcst-iscc/2017/0840a414/12OmNrJ11Gh", "parentPublication": { "id": "proceedings/ispan-fcst-iscc/2017/0840/0", "title": "2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ficloudw/2017/3281/0/3281a178", "title": "Continuous Ambulatory Peritoneal Dialysis: Business Intelligence Applied to Patient Monitoring: CAPD Study and Statistics", "doi": null, "abstractUrl": "/proceedings-article/ficloudw/2017/3281a178/12OmNvqmUCQ", "parentPublication": { "id": "proceedings/ficloudw/2017/3281/0", "title": "2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2017/4722/0/4722a090", "title": "Patient Identity Verification Based on Physiological Signal Fusion", "doi": null, "abstractUrl": "/proceedings-article/chase/2017/4722a090/12OmNyFU6Xe", "parentPublication": { "id": "proceedings/chase/2017/4722/0", "title": "2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2015/9548/0/9548a282", "title": "Comparison of Patient Empowerment Frameworks", "doi": null, "abstractUrl": "/proceedings-article/ichi/2015/9548a282/12OmNzt0IMh", "parentPublication": { "id": "proceedings/ichi/2015/9548/0", "title": "2015 International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881308", "title": "Monitoring Patient Activity during Chemotherapy with Wearable Fitness Devices", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881308/12OmNzy7uN5", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a384", "title": "Patient Portal Adoption, Use, and Satisfaction among U.S. Adults in Late-stage COVID-19 Pandemic", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a384/1GvdF0U7lDO", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006148", "title": "Using hospital administrative data to infer patient-patient contact via the consistent co-presence algorithm", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006148/1hJs7Ii6FxK", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374362", "title": "A Multi-Modal Approach to Patient Activity Monitoring", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374362/1rUIWNdRqta", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/idt/2021/3692/0/09497599", "title": "Remote Patient Monitoring: A Promising Digital Health Frontier", "doi": null, "abstractUrl": "/proceedings-article/idt/2021/09497599/1vF187qIx2w", "parentPublication": { "id": "proceedings/idt/2021/3692/0", "title": "2021 International Conference on Information and Digital Technologies (IDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yQB4Fmf7vq", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "acronym": "trex", "groupId": "1839664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yQB6pOqNNK", "doi": "10.1109/TREX53765.2021.00014", "title": "How to deal with Uncertainty in Machine Learning for Medical Imaging?", "normalizedTitle": "How to deal with Uncertainty in Machine Learning for Medical Imaging?", "abstract": "Recently, machine learning is massively on the rise in medical applications providing the ability to predict diseases, plan treatment and monitor progress. Still, the use in a clinical context of this technology is rather rare, mostly due to the missing trust of clinicians. In this position paper, we aim to show how uncertainty is introduced in the machine learning process when applying it to medical imaging at multiple points and how this influences the decision-making process of clinicians in machine learning approaches. Based on this knowledge, we aim to refine the guidelines for trust in visual analytics to assist clinicians in using and understanding systems that are based on machine learning.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, machine learning is massively on the rise in medical applications providing the ability to predict diseases, plan treatment and monitor progress. Still, the use in a clinical context of this technology is rather rare, mostly due to the missing trust of clinicians. In this position paper, we aim to show how uncertainty is introduced in the machine learning process when applying it to medical imaging at multiple points and how this influences the decision-making process of clinicians in machine learning approaches. Based on this knowledge, we aim to refine the guidelines for trust in visual analytics to assist clinicians in using and understanding systems that are based on machine learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, machine learning is massively on the rise in medical applications providing the ability to predict diseases, plan treatment and monitor progress. Still, the use in a clinical context of this technology is rather rare, mostly due to the missing trust of clinicians. In this position paper, we aim to show how uncertainty is introduced in the machine learning process when applying it to medical imaging at multiple points and how this influences the decision-making process of clinicians in machine learning approaches. Based on this knowledge, we aim to refine the guidelines for trust in visual analytics to assist clinicians in using and understanding systems that are based on machine learning.", "fno": "181700a052", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Making", "Diseases", "Learning Artificial Intelligence", "Medical Image Processing", "Medical Imaging", "Medical Applications", "Machine Learning Process", "Machine Learning Approaches", "Uncertainty", "Visual Analytics", "Conferences", "Decision Making", "Machine Learning", "Medical Services", "Monitoring", "Machine Learning Techniques", "Medicine", "Uncertainty Visualization" ], "authors": [ { "affiliation": "Leipzig University", "fullName": "Christina Gillmann", "givenName": "Christina", "surname": "Gillmann", "__typename": "ArticleAuthorType" }, { "affiliation": "Leipzig University Medical Centre", "fullName": "Dorothee Saur", "givenName": "Dorothee", "surname": "Saur", "__typename": "ArticleAuthorType" }, { "affiliation": "Leipzig University", "fullName": "Gerik Scheuermann", "givenName": "Gerik", "surname": "Scheuermann", "__typename": "ArticleAuthorType" } ], "idPrefix": "trex", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "52-58", "year": "2021", "issn": null, "isbn": "978-1-6654-1817-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "181700a045", "articleId": "1yQB6KjO9oI", "__typename": "AdjacentArticleType" }, "next": { "fno": "181700a059", "articleId": "1yQB68HFOIE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/incos/2010/4278/0/4278a238", "title": "Medical Optimal Decision Making under Uncertainty without Assuming Independence of Symptoms", "doi": null, "abstractUrl": "/proceedings-article/incos/2010/4278a238/12OmNBOCWbW", "parentPublication": { "id": "proceedings/incos/2010/4278/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192716", "title": "The Role of Uncertainty, Awareness, and Trust in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192716/13rRUxlgxTo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a612", "title": "Integrating Medical Code Descriptions and Building Text Classification Models for Diagnostic Decision Support", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a612/1GvdvKjK66Q", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcrait/2022/8192/0/819200a202", "title": "Medical Imaging Analysis using Computer-Assisted Technologies", "doi": null, "abstractUrl": "/proceedings-article/gcrait/2022/819200a202/1Hcn75GXXji", "parentPublication": { "id": "proceedings/gcrait/2022/8192/0", "title": "2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995345", "title": "KdINet: Knowledge-driven Interpretable Network for Medical Imaging Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995345/1JC2UAkt3cQ", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/06/08907502", "title": "CMed: Crowd Analytics for Medical Imaging Data", "doi": null, "abstractUrl": "/journal/tg/2021/06/08907502/1f75Tv9969i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2020/9429/0/942900a189", "title": "Assessment of Medical Reports Uncertainty through Topic Modeling and Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/cbms/2020/942900a189/1mLMkWxH4mA", "parentPublication": { "id": "proceedings/cbms/2020/9429/0", "title": "2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374365", "title": "Machine Learning Based Clinical Decision Support and Clinician Trust", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374365/1rUIXSTum4M", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2021/4121/0/412100a503", "title": "On Cost-Sensitive Calibrated Uncertainty in Deep Learning: An application on COVID-19 detection", "doi": null, "abstractUrl": "/proceedings-article/cbms/2021/412100a503/1vb8RiXvmVy", "parentPublication": { "id": "proceedings/cbms/2021/4121/0", "title": "2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09555810", "title": "VBridge: Connecting the Dots Between Features and Data to Explain Healthcare Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09555810/1xlw2uJhEXe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir9", "title": "2018 22nd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XeKgvR", "doi": "10.1109/iV.2018.00021", "title": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "normalizedTitle": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "abstract": "Treemap is one of the most well-known and used techniques for data analysis in InfoVis. However, it still presents some challenges concerning data representation, such as small items, a large number of hierarchies limiting the visual space, few options for visual data representation (restricted to size, color, label), and others. Thus, this paper presents an InfoVis tool that allows the analysis of multidimensional data using treemaps with glyphs, once they represent more data visually combined visual variables. Besides that, considering treemap scenarios with small area items, an algorithm was developed to analyze which part of the glyph the application should draw since parts of the glyph can still provide useful information. In this way, the glyphs become adaptative to available space. The application has a multilabel decision tree technique that decides which part of the glyph should appear. Visualization specialists supplied the training data through a system that showed a diverse range of glyphs' representations. The system varied the glyph's size, the number and the value of the visible visual variables and registered the response of specialists in the training data. Finally, this paper presents images using the treemap with adaptive glyphs approach versos treemap+glyphs and showed that the adaptive approach clears information clutter when treemap items are small.", "abstracts": [ { "abstractType": "Regular", "content": "Treemap is one of the most well-known and used techniques for data analysis in InfoVis. However, it still presents some challenges concerning data representation, such as small items, a large number of hierarchies limiting the visual space, few options for visual data representation (restricted to size, color, label), and others. Thus, this paper presents an InfoVis tool that allows the analysis of multidimensional data using treemaps with glyphs, once they represent more data visually combined visual variables. Besides that, considering treemap scenarios with small area items, an algorithm was developed to analyze which part of the glyph the application should draw since parts of the glyph can still provide useful information. In this way, the glyphs become adaptative to available space. The application has a multilabel decision tree technique that decides which part of the glyph should appear. Visualization specialists supplied the training data through a system that showed a diverse range of glyphs' representations. The system varied the glyph's size, the number and the value of the visible visual variables and registered the response of specialists in the training data. Finally, this paper presents images using the treemap with adaptive glyphs approach versos treemap+glyphs and showed that the adaptive approach clears information clutter when treemap items are small.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Treemap is one of the most well-known and used techniques for data analysis in InfoVis. However, it still presents some challenges concerning data representation, such as small items, a large number of hierarchies limiting the visual space, few options for visual data representation (restricted to size, color, label), and others. Thus, this paper presents an InfoVis tool that allows the analysis of multidimensional data using treemaps with glyphs, once they represent more data visually combined visual variables. Besides that, considering treemap scenarios with small area items, an algorithm was developed to analyze which part of the glyph the application should draw since parts of the glyph can still provide useful information. In this way, the glyphs become adaptative to available space. The application has a multilabel decision tree technique that decides which part of the glyph should appear. Visualization specialists supplied the training data through a system that showed a diverse range of glyphs' representations. The system varied the glyph's size, the number and the value of the visible visual variables and registered the response of specialists in the training data. Finally, this paper presents images using the treemap with adaptive glyphs approach versos treemap+glyphs and showed that the adaptive approach clears information clutter when treemap items are small.", "fno": "720200a058", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Trees", "Data Analysis", "Visual Space", "Visual Data Representation", "Info Vis Tool", "Multilabel Decision Tree Technique", "Training Data", "Multidimensional Data Visualization", "Treemap Glyphs", "Visualization", "Data Visualization", "Layout", "Image Color Analysis", "Shape", "Tools", "Task Analysis", "Glyph Treemap Decision Tree" ], "authors": [ { "affiliation": null, "fullName": "Anderson Gregorio Marques Soares", "givenName": "Anderson Gregorio Marques", "surname": "Soares", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Diego Hortencio dos Santos", "givenName": "Diego Hortencio", "surname": "dos Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cleyton Luiz Ramos Barbosa", "givenName": "Cleyton Luiz Ramos", "surname": "Barbosa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aruanda Simoes Gonçalves", "givenName": "Aruanda Simoes", "surname": "Gonçalves", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Carlos Gustavo Resque dos Santos", "givenName": "Carlos Gustavo Resque", "surname": "dos Santos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bianchi Serique Meiguins", "givenName": "Bianchi Serique", "surname": "Meiguins", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Elvis Thermo Carvalho Miranda", "givenName": "Elvis Thermo Carvalho", "surname": "Miranda", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "58-63", "year": "2018", "issn": null, "isbn": "978-1-5386-7202-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720200a056", "articleId": "17D45WIXbR0", "__typename": "AdjacentArticleType" }, "next": { "fno": "720200a064", "articleId": "17D45VsBU24", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scivis/2015/9785/0/07429504", "title": "3D superquadric glyphs for visualizing myocardial motion", "doi": null, "abstractUrl": "/proceedings-article/scivis/2015/07429504/12OmNrIaemh", "parentPublication": { "id": "proceedings/scivis/2015/9785/0", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532140", "title": "Multivariate glyphs for multi-object clusters", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532140/12OmNyjccAB", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/07/07445239", "title": "A Systematic Review of Experimental Studies on Data Glyphs", "doi": null, "abstractUrl": "/journal/tg/2017/07/07445239/13rRUNvgz4m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875973", "title": "The Influence of Contour on Similarity Perception of Star Glyphs", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875973/13rRUwhHcQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1996/03/v0266", "title": "Glyphs for Visualizing Uncertainty in Vector Fields", "doi": null, "abstractUrl": "/journal/tg/1996/03/v0266/13rRUxly8SN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09930144", "title": "Out of the Plane: Flower Vs. Star Glyphs to Support High-Dimensional Exploration in Two-Dimensional Embeddings", "doi": null, "abstractUrl": "/journal/tg/5555/01/09930144/1HMOX2J2VMY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a157", "title": "Evaluation of Effectiveness of Glyphs to Enhance ChronoView", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a157/1cMF9mvWMFO", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09067088", "title": "AgentVis: Visual Analysis of Agent Behavior With Hierarchical Glyphs", "doi": null, "abstractUrl": "/journal/tg/2021/09/09067088/1j1lyTz50k0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a242", "title": "A summarization glyph for sets of unreadable visual items in treemaps", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a242/1rSRaQV3b3y", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557223", "title": "GlyphCreator: Towards Example-based Automatic Generation of Circular Glyphs", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557223/1xlvZajdjmo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMF8oE0kI8", "title": "2019 23rd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF9mvWMFO", "doi": "10.1109/IV.2019.00035", "title": "Evaluation of Effectiveness of Glyphs to Enhance ChronoView", "normalizedTitle": "Evaluation of Effectiveness of Glyphs to Enhance ChronoView", "abstract": "ChronoView is a visualization method of representing periodic features of the occurrence of events. It expresses a set of time stamps in the position on a plane. Although ChronoView offers high space efficiency, it can generate ambiguous representations. To solve this problem, glyphs have been exploited as ChronoView markers. This paper explains a user study conducted to investigate the effectiveness of the Star Glyph and Ring Glyph. The study shows that glyphs contribute to an accurate reading of temporal features. It also shows that Star Glyph and Ring Glyph have different features. It is clear that, whereas Ring Glyph dominates the time range reading, Star Glyph dominates the comparison of frequencies in the unit of time.", "abstracts": [ { "abstractType": "Regular", "content": "ChronoView is a visualization method of representing periodic features of the occurrence of events. It expresses a set of time stamps in the position on a plane. Although ChronoView offers high space efficiency, it can generate ambiguous representations. To solve this problem, glyphs have been exploited as ChronoView markers. This paper explains a user study conducted to investigate the effectiveness of the Star Glyph and Ring Glyph. The study shows that glyphs contribute to an accurate reading of temporal features. It also shows that Star Glyph and Ring Glyph have different features. It is clear that, whereas Ring Glyph dominates the time range reading, Star Glyph dominates the comparison of frequencies in the unit of time.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "ChronoView is a visualization method of representing periodic features of the occurrence of events. It expresses a set of time stamps in the position on a plane. Although ChronoView offers high space efficiency, it can generate ambiguous representations. To solve this problem, glyphs have been exploited as ChronoView markers. This paper explains a user study conducted to investigate the effectiveness of the Star Glyph and Ring Glyph. The study shows that glyphs contribute to an accurate reading of temporal features. It also shows that Star Glyph and Ring Glyph have different features. It is clear that, whereas Ring Glyph dominates the time range reading, Star Glyph dominates the comparison of frequencies in the unit of time.", "fno": "283800a157", "keywords": [ "Data Visualisation", "Set Theory", "Glyphs", "Star Glyph", "Ring Glyph", "Temporal Features", "Time Range Reading", "Visualization Method", "Periodic Features", "Time Stamps Set", "Chronoview Markers", "Data Visualization", "Clocks", "Face", "Time Frequency Analysis", "Visualization", "Spirals", "Shape", "Temporal Data Event Data Chrono View Glyph Data Visualization" ], "authors": [ { "affiliation": "University of Tsukuba", "fullName": "Yasuhiro Anzai", "givenName": "Yasuhiro", "surname": "Anzai", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tsukuba", "fullName": "Kazuo Misue", "givenName": "Kazuo", "surname": "Misue", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "157-162", "year": "2019", "issn": null, "isbn": "978-1-7281-2838-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "283800a151", "articleId": "1cMFcqwGM5q", "__typename": "AdjacentArticleType" }, "next": { "fno": "283800a163", "articleId": "1cMFc4aDtWo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scivis/2015/9785/0/07429504", "title": "3D superquadric glyphs for visualizing myocardial motion", "doi": null, "abstractUrl": "/proceedings-article/scivis/2015/07429504/12OmNrIaemh", "parentPublication": { "id": "proceedings/scivis/2015/9785/0", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900020", "title": "An Interactive 3D Integration of Parallel Coordinates and Star Glyphs", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900020/12OmNzkMlUx", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/07/07445239", "title": "A Systematic Review of Experimental Studies on Data Glyphs", "doi": null, "abstractUrl": "/journal/tg/2017/07/07445239/13rRUNvgz4m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875973", "title": "The Influence of Contour on Similarity Perception of Star Glyphs", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875973/13rRUwhHcQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1996/03/v0266", "title": "Glyphs for Visualizing Uncertainty in Vector Fields", "doi": null, "abstractUrl": "/journal/tg/1996/03/v0266/13rRUxly8SN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a058", "title": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a058/17D45XeKgvR", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09930144", "title": "Out of the Plane: Flower Vs. Star Glyphs to Support High-Dimensional Exploration in Two-Dimensional Embeddings", "doi": null, "abstractUrl": "/journal/tg/5555/01/09930144/1HMOX2J2VMY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933656", "title": "Evaluating Ordering Strategies of Star Glyph Axes", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933656/1fTgJ3IVtjq", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09067088", "title": "AgentVis: Visual Analysis of Agent Behavior With Hierarchical Glyphs", "doi": null, "abstractUrl": "/journal/tg/2021/09/09067088/1j1lyTz50k0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557223", "title": "GlyphCreator: Towards Example-based Automatic Generation of Circular Glyphs", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557223/1xlvZajdjmo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrkjVqA", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "acronym": "scivis", "groupId": "1811924", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNrIaemh", "doi": "10.1109/SciVis.2015.7429504", "title": "3D superquadric glyphs for visualizing myocardial motion", "normalizedTitle": "3D superquadric glyphs for visualizing myocardial motion", "abstract": "Various cardiac diseases can be diagnosed by the analysis of myocardial motion. Relevant biomarkers are radial, longitudinal, and rotational velocities of the cardiac muscle computed locally from MR images. We designed a visual encoding that maps these three attributes to glyph shapes according to a barycentric space formed by 3D superquadric glyphs. The glyphs show aggregated myocardial motion information following the AHA model and are displayed in a respective 3D layout.", "abstracts": [ { "abstractType": "Regular", "content": "Various cardiac diseases can be diagnosed by the analysis of myocardial motion. Relevant biomarkers are radial, longitudinal, and rotational velocities of the cardiac muscle computed locally from MR images. We designed a visual encoding that maps these three attributes to glyph shapes according to a barycentric space formed by 3D superquadric glyphs. The glyphs show aggregated myocardial motion information following the AHA model and are displayed in a respective 3D layout.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Various cardiac diseases can be diagnosed by the analysis of myocardial motion. Relevant biomarkers are radial, longitudinal, and rotational velocities of the cardiac muscle computed locally from MR images. We designed a visual encoding that maps these three attributes to glyph shapes according to a barycentric space formed by 3D superquadric glyphs. The glyphs show aggregated myocardial motion information following the AHA model and are displayed in a respective 3D layout.", "fno": "07429504", "keywords": [ "Shape", "Myocardium", "Three Dimensional Displays", "Visualization", "Heart", "Tensile Stress" ], "authors": [ { "affiliation": "FraunhoferMEVIS, Jacobs University Bremen", "fullName": "Teodora Chitiboi", "givenName": "Teodora", "surname": "Chitiboi", "__typename": "ArticleAuthorType" }, { "affiliation": "Fraunhofer MEVIS", "fullName": "Mathias Neugebauer", "givenName": "Mathias", "surname": "Neugebauer", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Susanne Schnell", "givenName": "Susanne", "surname": "Schnell", "__typename": "ArticleAuthorType" }, { "affiliation": "Northwestern University", "fullName": "Michael Markl", "givenName": "Michael", "surname": "Markl", "__typename": "ArticleAuthorType" }, { "affiliation": "Jacobs University Bremen", "fullName": "Lars Linsen", "givenName": "Lars", "surname": "Linsen", "__typename": "ArticleAuthorType" } ], "idPrefix": "scivis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "143-144", "year": "2015", "issn": null, "isbn": "978-1-4673-9785-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07429503", "articleId": "12OmNz5JCbt", "__typename": "AdjacentArticleType" }, "next": { "fno": "07429505", "articleId": "12OmNrYlmLV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgiv/2016/0811/0/0811a115", "title": "Analysis of Regional Deformation of the Heart's Left Ventricle Using Curvature Values with Hotelling T2 Metric", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2016/0811a115/12OmNAQanvx", "parentPublication": { "id": "proceedings/cgiv/2016/0811/0", "title": "2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a183", "title": "Research Hotspots Analysis of Myocardial Infarction and Biomarker by PubMed", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a183/12OmNBQTJfZ", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2016/8985/0/8985a001", "title": "Extraction of Myocardial Fibrosis from MR Using Fuzzy Soft Thresholding Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2016/8985a001/12OmNwnH4Sq", "parentPublication": { "id": "proceedings/iiai-aai/2016/8985/0", "title": "2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2012/0430/0/06386354", "title": "Dynamic spatiotemporal warping for the detection and location of myocardial infarctions", "doi": null, "abstractUrl": "/proceedings-article/case/2012/06386354/12OmNxw5B7j", "parentPublication": { "id": "proceedings/case/2012/0430/0", "title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2017/1710/0/1710a133", "title": "Neural Networks Modelling after Myocardial Infarction in Rats", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a133/12OmNzAoi0F", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2014/4103/0/4103a336", "title": "Computer-Assisted Myocardial Perfusion Assessment", "doi": null, "abstractUrl": "/proceedings-article/iv/2014/4103a336/12OmNzUPpeX", "parentPublication": { "id": "proceedings/iv/2014/4103/0", "title": "2014 18th International Conference on Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061595", "title": "Superquadric Glyphs for Symmetric Second-Order Tensors", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061595/13rRUxZzAhA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acit/2018/0385/0/08672695", "title": "Study of Myocardial Infarction Versus ECG ST Segment and Cardiac Marker Enzyme, High Sensitive Troponin Testing", "doi": null, "abstractUrl": "/proceedings-article/acit/2018/08672695/18IplMcU3C0", "parentPublication": { "id": "proceedings/acit/2018/0385/0", "title": "2018 International Arab Conference on Information Technology (ACIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10039678", "title": "SequenceMorph: A Unified Unsupervised Learning Framework for Motion Tracking on Cardiac Image Sequences", "doi": null, "abstractUrl": "/journal/tp/5555/01/10039678/1KzzZKqUKGY", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/07/08967163", "title": "Visualization of 3D Stress Tensor Fields Using Superquadric Glyphs on Displacement Streamlines", "doi": null, "abstractUrl": "/journal/tg/2021/07/08967163/1gPjyn904OA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWf", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNy2agTd", "doi": "10.1109/PacificVis.2014.13", "title": "Non-overlapping Aggregated Multivariate Glyphs for Moving Objects", "normalizedTitle": "Non-overlapping Aggregated Multivariate Glyphs for Moving Objects", "abstract": "In moving object visualization, objects and their attributes are commonly represented by glyphs on a geographic map. In areas on the map densely populated by these objects, visual clutter and occlusion of glyphs occur. We propose a method to solve this problem by partitioning the set of all objects into subsets that are each visualized using an aggregated multivariate glyph that shows the distribution of several attributes of its objects, such as heading, type and velocity. We choose the combination of subsets and glyph design such that the glyphs do not overlap and the number of subsets is approximately maximal. The partition is maintained and updated while the objects move. We use examples from the maritime domain, but our method is applicable to a wider range of dynamic data. Through a user study we find that, for a set of representative tasks, our method does not perform significantly worse than competitive visualizations with respect to correctness. Furthermore, it performs significantly better for density comparison tasks in high density data sets. We also find that the participants of the user study have a preference for our method.", "abstracts": [ { "abstractType": "Regular", "content": "In moving object visualization, objects and their attributes are commonly represented by glyphs on a geographic map. In areas on the map densely populated by these objects, visual clutter and occlusion of glyphs occur. We propose a method to solve this problem by partitioning the set of all objects into subsets that are each visualized using an aggregated multivariate glyph that shows the distribution of several attributes of its objects, such as heading, type and velocity. We choose the combination of subsets and glyph design such that the glyphs do not overlap and the number of subsets is approximately maximal. The partition is maintained and updated while the objects move. We use examples from the maritime domain, but our method is applicable to a wider range of dynamic data. Through a user study we find that, for a set of representative tasks, our method does not perform significantly worse than competitive visualizations with respect to correctness. Furthermore, it performs significantly better for density comparison tasks in high density data sets. We also find that the participants of the user study have a preference for our method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In moving object visualization, objects and their attributes are commonly represented by glyphs on a geographic map. In areas on the map densely populated by these objects, visual clutter and occlusion of glyphs occur. We propose a method to solve this problem by partitioning the set of all objects into subsets that are each visualized using an aggregated multivariate glyph that shows the distribution of several attributes of its objects, such as heading, type and velocity. We choose the combination of subsets and glyph design such that the glyphs do not overlap and the number of subsets is approximately maximal. The partition is maintained and updated while the objects move. We use examples from the maritime domain, but our method is applicable to a wider range of dynamic data. Through a user study we find that, for a set of representative tasks, our method does not perform significantly worse than competitive visualizations with respect to correctness. Furthermore, it performs significantly better for density comparison tasks in high density data sets. We also find that the participants of the user study have a preference for our method.", "fno": "2874a017", "keywords": [ "Data Visualization", "Visualization", "Clutter", "Trajectory", "Merging", "Lenses", "Standards", "Computer Graphics Picture Image Generation", "Glyph Based Techniques Primary Keyword", "Scalability Issues" ], "authors": [ { "affiliation": "Dept. of Math. & Comput. Sci., Eindhoven Univ. of Technol., Eindhoven, Netherlands", "fullName": "Roeland Scheepens", "givenName": "Roeland", "surname": "Scheepens", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Math. & Comput. Sci., Eindhoven Univ. of Technol., Eindhoven, Netherlands", "fullName": "Huub Van De Wetering", "givenName": "Huub", "surname": "Van De Wetering", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Math. & Comput. Sci., Eindhoven Univ. of Technol., Eindhoven, Netherlands", "fullName": "Jarke J. Van Wijk", "givenName": "Jarke J.", "surname": "Van Wijk", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-03-01T00:00:00", "pubType": "proceedings", "pages": "17-24", "year": "2014", "issn": null, "isbn": "978-1-4799-2874-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2874a009", "articleId": "12OmNvjQ8PN", "__typename": "AdjacentArticleType" }, "next": { "fno": "2874a025", "articleId": "12OmNwO5M1k", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infvis/2005/9464/0/01532140", "title": "Multivariate glyphs for multi-object clusters", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532140/12OmNqyDjpz", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scivis/2015/9785/0/07429504", "title": "3D superquadric glyphs for visualizing myocardial motion", "doi": null, "abstractUrl": "/proceedings-article/scivis/2015/07429504/12OmNrIaemh", "parentPublication": { "id": "proceedings/scivis/2015/9785/0", "title": "2015 IEEE Scientific Visualization Conference (SciVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900019", "title": "Multivariate Glyphs for Multi-Object Clusters", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900019/12OmNxE2n28", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532140", "title": "Multivariate glyphs for multi-object clusters", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532140/12OmNyjccAB", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08047300", "title": "Cluster-Based Visual Abstraction for Multivariate Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2018/09/08047300/13rRUILLkvy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09905624", "title": "On-Tube Attribute Visualization for Multivariate Trajectory Data", "doi": null, "abstractUrl": "/journal/tg/2023/01/09905624/1H2l6ksKN5S", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a157", "title": "Evaluation of Effectiveness of Glyphs to Enhance ChronoView", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a157/1cMF9mvWMFO", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/07/08967163", "title": "Visualization of 3D Stress Tensor Fields Using Superquadric Glyphs on Displacement Streamlines", "doi": null, "abstractUrl": "/journal/tg/2021/07/08967163/1gPjyn904OA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09067088", "title": "AgentVis: Visual Analysis of Agent Behavior With Hierarchical Glyphs", "doi": null, "abstractUrl": "/journal/tg/2021/09/09067088/1j1lyTz50k0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557223", "title": "GlyphCreator: Towards Example-based Automatic Generation of Circular Glyphs", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557223/1xlvZajdjmo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbU3aM", "title": "Proceedings Sixth International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNykTNmv", "doi": "10.1109/IV.2002.1028750", "title": "Sound Glyphs Representing Inheritance Relationships", "normalizedTitle": "Sound Glyphs Representing Inheritance Relationships", "abstract": "An auralization technique for representing inheritance relationships in an object-oriented programming language is proposed. The inheritance relationships are represented by inclusion relationships of sound passages, which are called sound glyphs. A prototype system using this technique can assign unique sound glyphs to all classes in Java 2 Standard Edition version 1.2.2 whose class library has more than 1,500 classes and constitutes a practical class hierarchy. Experiments with three types of sound glyphs were conducted, in which accuracy with one type of sound glyph of about 71% was obtained, a level more than twice that expected for random answers. This shows that sound glyphs can help one to recognize relationships among classes. Since a sound glyph is transient, we need to use not only the sound glyph but also textual representation in order to understand the meaning of a class. Sound glyphs can be used with visual representations because they have different modalities. The features of sound glyphs are discussed.", "abstracts": [ { "abstractType": "Regular", "content": "An auralization technique for representing inheritance relationships in an object-oriented programming language is proposed. The inheritance relationships are represented by inclusion relationships of sound passages, which are called sound glyphs. A prototype system using this technique can assign unique sound glyphs to all classes in Java 2 Standard Edition version 1.2.2 whose class library has more than 1,500 classes and constitutes a practical class hierarchy. Experiments with three types of sound glyphs were conducted, in which accuracy with one type of sound glyph of about 71% was obtained, a level more than twice that expected for random answers. This shows that sound glyphs can help one to recognize relationships among classes. Since a sound glyph is transient, we need to use not only the sound glyph but also textual representation in order to understand the meaning of a class. Sound glyphs can be used with visual representations because they have different modalities. The features of sound glyphs are discussed.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An auralization technique for representing inheritance relationships in an object-oriented programming language is proposed. The inheritance relationships are represented by inclusion relationships of sound passages, which are called sound glyphs. A prototype system using this technique can assign unique sound glyphs to all classes in Java 2 Standard Edition version 1.2.2 whose class library has more than 1,500 classes and constitutes a practical class hierarchy. Experiments with three types of sound glyphs were conducted, in which accuracy with one type of sound glyph of about 71% was obtained, a level more than twice that expected for random answers. This shows that sound glyphs can help one to recognize relationships among classes. Since a sound glyph is transient, we need to use not only the sound glyph but also textual representation in order to understand the meaning of a class. Sound glyphs can be used with visual representations because they have different modalities. The features of sound glyphs are discussed.", "fno": "16560010", "keywords": [], "authors": [ { "affiliation": "National Institute of Multimedia Education", "fullName": "Noritaka Osawa", "givenName": "Noritaka", "surname": "Osawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-07-01T00:00:00", "pubType": "proceedings", "pages": "10", "year": "2002", "issn": "1093-9547", "isbn": "0-7695-1656-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "16560003", "articleId": "12OmNzEmFGv", "__typename": "AdjacentArticleType" }, "next": { "fno": "16560016", "articleId": "12OmNxGAKT5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2006/2602/0/26020575", "title": "Tactile Glyphs for Palpation of Relationships", "doi": null, "abstractUrl": "/proceedings-article/iv/2006/26020575/12OmNwKGAo8", "parentPublication": { "id": "proceedings/iv/2006/2602/0", "title": "Tenth International Conference on Information Visualisation (IV'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/2000/0840/0/08400081", "title": "Generation and Evaluation of Glyphs Representing Superclass-Subclass Relationships", "doi": null, "abstractUrl": "/proceedings-article/vl/2000/08400081/12OmNylboyX", "parentPublication": { "id": "proceedings/vl/2000/0840/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/07/07445239", "title": "A Systematic Review of Experimental Studies on Data Glyphs", "doi": null, "abstractUrl": "/journal/tg/2017/07/07445239/13rRUNvgz4m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875973", "title": "The Influence of Contour on Similarity Perception of Star Glyphs", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875973/13rRUwhHcQV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1996/03/v0266", "title": "Glyphs for Visualizing Uncertainty in Vector Fields", "doi": null, "abstractUrl": "/journal/tg/1996/03/v0266/13rRUxly8SN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/08/ttg2013081331", "title": "Representing Flow Patterns by Using Streamlines with Glyphs", "doi": null, "abstractUrl": "/journal/tg/2013/08/ttg2013081331/13rRUxly9dT", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a058", "title": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a058/17D45XeKgvR", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2019/2838/0/283800a157", "title": "Evaluation of Effectiveness of Glyphs to Enhance ChronoView", "doi": null, "abstractUrl": "/proceedings-article/iv/2019/283800a157/1cMF9mvWMFO", "parentPublication": { "id": "proceedings/iv/2019/2838/0", "title": "2019 23rd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09067088", "title": "AgentVis: Visual Analysis of Agent Behavior With Hierarchical Glyphs", "doi": null, "abstractUrl": "/journal/tg/2021/09/09067088/1j1lyTz50k0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09557223", "title": "GlyphCreator: Towards Example-based Automatic Generation of Circular Glyphs", "doi": null, "abstractUrl": "/journal/tg/2022/01/09557223/1xlvZajdjmo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKir9", "title": "2018 22nd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XDIXSv", "doi": "10.1109/iV.2018.00023", "title": "The Many-Faced Plot: Strategy for Automatic Glyph Generation", "normalizedTitle": "The Many-Faced Plot: Strategy for Automatic Glyph Generation", "abstract": "Despite some authors stating that data-relatedness helps interpretation, glyphs are often used unrelated to the represented data. In order to automatically produce data-related glyphs, a large visual repository is required, as well as, image structure suitable for data representation. In this paper, we propose a strategy that fulfills the two requirements and allows the production of glyphs related to the data thematic (literal and metaphorical). We compare used approach with current glyph techniques and discuss the results.", "abstracts": [ { "abstractType": "Regular", "content": "Despite some authors stating that data-relatedness helps interpretation, glyphs are often used unrelated to the represented data. In order to automatically produce data-related glyphs, a large visual repository is required, as well as, image structure suitable for data representation. In this paper, we propose a strategy that fulfills the two requirements and allows the production of glyphs related to the data thematic (literal and metaphorical). We compare used approach with current glyph techniques and discuss the results.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Despite some authors stating that data-relatedness helps interpretation, glyphs are often used unrelated to the represented data. In order to automatically produce data-related glyphs, a large visual repository is required, as well as, image structure suitable for data representation. In this paper, we propose a strategy that fulfills the two requirements and allows the production of glyphs related to the data thematic (literal and metaphorical). We compare used approach with current glyph techniques and discuss the results.", "fno": "720200a071", "keywords": [ "Data Structures", "Data Visualisation", "Many Faced Plot", "Automatic Glyph Generation", "Data Related Glyphs", "Visual Repository", "Data Representation", "Image Structure", "Data Visualization", "Visualization", "Semantics", "Shape", "Tools", "Automobiles", "Data Glyphs", "Chernoff Faces", "Information Visualization", "Emoji" ], "authors": [ { "affiliation": null, "fullName": "João Miguel Cunha", "givenName": "João Miguel", "surname": "Cunha", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Evgheni Polisciuc", "givenName": "Evgheni", "surname": "Polisciuc", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pedro Martins", "givenName": "Pedro", "surname": "Martins", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Penousal Machado", "givenName": "Penousal", "surname": "Machado", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "71-77", "year": "2018", "issn": null, "isbn": "978-1-5386-7202-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "720200a064", "articleId": "17D45VsBU24", "__typename": "AdjacentArticleType" }, "next": { "fno": "720200a078", "articleId": "17D45Vw15wB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2017/3586/1/3586a597", "title": "Glyph-Based Data Augmentation for Accurate Kanji Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a597/12OmNC1Y5lk", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539643", "title": "GlyphLens: View-Dependent Occlusion Management in the Interactive Glyph Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539643/13rRUwInvJk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192722", "title": "Glyph-Based Comparative Visualization for Diffusion Tensor Fields", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192722/13rRUx0gefn", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/02/mcg2017020031", "title": "Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances", "doi": null, "abstractUrl": "/magazine/cg/2017/02/mcg2017020031/13rRUxjyX9G", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/08/08611113", "title": "MARVisT: Authoring Glyph-Based Visualization in Mobile Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2020/08/08611113/17D45Wuc367", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a058", "title": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a058/17D45XeKgvR", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/10002316", "title": "Evaluating Glyph Design for Showing Large-Magnitude-Range Quantum Spins", "doi": null, "abstractUrl": "/journal/tg/5555/01/10002316/1JtvHc3BND2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933656", "title": "Evaluating Ordering Strategies of Star Glyph Axes", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933656/1fTgJ3IVtjq", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/09/09067088", "title": "AgentVis: Visual Analysis of Agent Behavior With Hierarchical Glyphs", "doi": null, "abstractUrl": "/journal/tg/2021/09/09067088/1j1lyTz50k0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a242", "title": "A summarization glyph for sets of unreadable visual items in treemaps", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a242/1rSRaQV3b3y", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rSR7vfukX6", "title": "2020 24th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1rSRaQV3b3y", "doi": "10.1109/IV51561.2020.00047", "title": "A summarization glyph for sets of unreadable visual items in treemaps", "normalizedTitle": "A summarization glyph for sets of unreadable visual items in treemaps", "abstract": "The use of glyphs in data visualization aims to create a visual object that represents a data set through a set of graphic representations. Even though glyphs can help visualization techniques increase visual data representation, this approach sometimes can suffer from large amounts of data, making the glyph susceptible to perception errors of its visual variables. The grids and geomaps layouts are the most common layouts used with glyphs. However, when a more complex arrangement is considered, such as a treemap layout, the problem is even more challenging, as the small and variable areas directly influence glyph readability. Thus, this article proposes a summarization glyph to replace a set of treemap items whose areas are tiny, and that consequently would not be suitable for a glyph of their own. The proposed glyph enables data analysts to have some useful insights about the data in the overview exploration. The summarization glyph is a stacked bar chart representing the data dimensions of the tiny items. A decision tree trained on user perception tests selects the glyphs with low readability, deciding if they are kept, or included in the summarization glyph.", "abstracts": [ { "abstractType": "Regular", "content": "The use of glyphs in data visualization aims to create a visual object that represents a data set through a set of graphic representations. Even though glyphs can help visualization techniques increase visual data representation, this approach sometimes can suffer from large amounts of data, making the glyph susceptible to perception errors of its visual variables. The grids and geomaps layouts are the most common layouts used with glyphs. However, when a more complex arrangement is considered, such as a treemap layout, the problem is even more challenging, as the small and variable areas directly influence glyph readability. Thus, this article proposes a summarization glyph to replace a set of treemap items whose areas are tiny, and that consequently would not be suitable for a glyph of their own. The proposed glyph enables data analysts to have some useful insights about the data in the overview exploration. The summarization glyph is a stacked bar chart representing the data dimensions of the tiny items. A decision tree trained on user perception tests selects the glyphs with low readability, deciding if they are kept, or included in the summarization glyph.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of glyphs in data visualization aims to create a visual object that represents a data set through a set of graphic representations. Even though glyphs can help visualization techniques increase visual data representation, this approach sometimes can suffer from large amounts of data, making the glyph susceptible to perception errors of its visual variables. The grids and geomaps layouts are the most common layouts used with glyphs. However, when a more complex arrangement is considered, such as a treemap layout, the problem is even more challenging, as the small and variable areas directly influence glyph readability. Thus, this article proposes a summarization glyph to replace a set of treemap items whose areas are tiny, and that consequently would not be suitable for a glyph of their own. The proposed glyph enables data analysts to have some useful insights about the data in the overview exploration. The summarization glyph is a stacked bar chart representing the data dimensions of the tiny items. A decision tree trained on user perception tests selects the glyphs with low readability, deciding if they are kept, or included in the summarization glyph.", "fno": "913400a242", "keywords": [ "Data Analysis", "Data Visualisation", "Decision Trees", "Set Theory", "Summarization Glyph", "Unreadable Visual Items", "Data Visualization", "Visual Object", "Visualization Techniques", "Visual Data Representation", "Visual Variables", "Glyph Readability", "Treemap Items", "Data Analysts", "Data Dimensions", "Graphic Representations", "Decision Tree", "Visualization", "Layout", "Data Visualization", "Decision Trees", "Bars", "Glyph", "Treemap", "Decision Tree", "Summary Visualization" ], "authors": [ { "affiliation": "Federal University of Pará,Computer Science Graduate Program,Belém,PA,Brazil", "fullName": "Alexandre Henrique Ichihara Pires", "givenName": "Alexandre", "surname": "Henrique Ichihara Pires", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Pará,Computer Science Graduate Program,Belém,PA,Brazil", "fullName": "Rodrigo Santos do Amor Divino Lima", "givenName": "Rodrigo", "surname": "Santos do Amor Divino Lima", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Pará,Computer Science Graduate Program,Belém,PA,Brazil", "fullName": "Carlos Gustavo Resque dos Santos", "givenName": "Carlos", "surname": "Gustavo Resque dos Santos", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Pará,Computer Science Graduate Program,Belém,PA,Brazil", "fullName": "Bianchi Serique Meiguins", "givenName": "Bianchi", "surname": "Serique Meiguins", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal Rural University of Amazonia,Campus Capanema,PA,Brazil", "fullName": "Anderson Gregório Marques Soares", "givenName": "Anderson", "surname": "Gregório Marques Soares", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "242-247", "year": "2020", "issn": null, "isbn": "978-1-7281-9134-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "913400a236", "articleId": "1rSR7y0mRfW", "__typename": "AdjacentArticleType" }, "next": { "fno": "913400a248", "articleId": "1rSR9vG2u4w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpc/2016/1428/0/07503713", "title": "Glyph-based software component identification", "doi": null, "abstractUrl": "/proceedings-article/icpc/2016/07503713/12OmNzBOi67", "parentPublication": { "id": "proceedings/icpc/2016/1428/0", "title": "2016 IEEE 24th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/27900007", "title": "Voronoi Treemaps", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/27900007/12OmNzSyCdf", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019841", "title": "Stable Treemaps via Local Moves", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019841/13rRUIJcWlt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/07/07445239", "title": "A Systematic Review of Experimental Studies on Data Glyphs", "doi": null, "abstractUrl": "/journal/tg/2017/07/07445239/13rRUNvgz4m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07539643", "title": "GlyphLens: View-Dependent Occlusion Management in the Interactive Glyph Visualization", "doi": null, "abstractUrl": "/journal/tg/2017/01/07539643/13rRUwInvJk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2017/02/mcg2017020031", "title": "Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances", "doi": null, "abstractUrl": "/magazine/cg/2017/02/mcg2017020031/13rRUxjyX9G", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1286", "title": "Visualizing Changes of Hierarchical Data using Treemaps", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1286/13rRUy0qnLA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a071", "title": "The Many-Faced Plot: Strategy for Automatic Glyph Generation", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a071/17D45XDIXSv", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a058", "title": "Visualizing Multidimensional Data in Treemaps with Adaptive Glyphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a058/17D45XeKgvR", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933656", "title": "Evaluating Ordering Strategies of Star Glyph Axes", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933656/1fTgJ3IVtjq", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmLmd75nZS", "doi": "10.1109/ICCV48922.2021.00732", "title": "Scribble-Supervised Semantic Segmentation by Uncertainty Reduction on Neural Representation and Self-Supervision on Neural Eigenspace", "normalizedTitle": "Scribble-Supervised Semantic Segmentation by Uncertainty Reduction on Neural Representation and Self-Supervision on Neural Eigenspace", "abstract": "Scribble-supervised semantic segmentation has gained much attention recently for its promising performance without high-quality annotations. Due to the lack of supervision, confident and consistent predictions are usually hard to obtain. Typically, people handle these problems by either adopting an auxiliary task with the well-labeled dataset or incorporating a graphical model with additional requirements on scribble annotations. Instead, this work aims to achieve semantic segmentation by scribble annotations directly without extra information and other limitations. Specifically, we propose holistic operations, including minimizing entropy and a network embedded random walk on the neural representation to reduce uncertainty. Given the probabilistic transition matrix of a random walk, we further train the network with self-supervision on its neural eigenspace to impose consistency on predictions between related images. Comprehensive experiments and ablation studies verify the proposed approach, which demonstrates superiority over others; it is even comparable to some full-label supervised ones and works well when scribbles are randomly shrunk or dropped.", "abstracts": [ { "abstractType": "Regular", "content": "Scribble-supervised semantic segmentation has gained much attention recently for its promising performance without high-quality annotations. Due to the lack of supervision, confident and consistent predictions are usually hard to obtain. Typically, people handle these problems by either adopting an auxiliary task with the well-labeled dataset or incorporating a graphical model with additional requirements on scribble annotations. Instead, this work aims to achieve semantic segmentation by scribble annotations directly without extra information and other limitations. Specifically, we propose holistic operations, including minimizing entropy and a network embedded random walk on the neural representation to reduce uncertainty. Given the probabilistic transition matrix of a random walk, we further train the network with self-supervision on its neural eigenspace to impose consistency on predictions between related images. Comprehensive experiments and ablation studies verify the proposed approach, which demonstrates superiority over others; it is even comparable to some full-label supervised ones and works well when scribbles are randomly shrunk or dropped.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scribble-supervised semantic segmentation has gained much attention recently for its promising performance without high-quality annotations. Due to the lack of supervision, confident and consistent predictions are usually hard to obtain. Typically, people handle these problems by either adopting an auxiliary task with the well-labeled dataset or incorporating a graphical model with additional requirements on scribble annotations. Instead, this work aims to achieve semantic segmentation by scribble annotations directly without extra information and other limitations. Specifically, we propose holistic operations, including minimizing entropy and a network embedded random walk on the neural representation to reduce uncertainty. Given the probabilistic transition matrix of a random walk, we further train the network with self-supervision on its neural eigenspace to impose consistency on predictions between related images. Comprehensive experiments and ablation studies verify the proposed approach, which demonstrates superiority over others; it is even comparable to some full-label supervised ones and works well when scribbles are randomly shrunk or dropped.", "fno": "281200h396", "keywords": [ "Visualization", "Image Segmentation", "Computer Vision", "Uncertainty", "Graphical Models", "Annotations", "Semantics", "Segmentation", "Grouping And Shape", "Scene Analysis And Understanding", "Transfer Low Shot Semi Unsupervised Learning" ], "authors": [ { "affiliation": "Shandong University,China", "fullName": "Zhiyi Pan", "givenName": "Zhiyi", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,China", "fullName": "Peng Jiang", "givenName": "Peng", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,China", "fullName": "Yunhai Wang", "givenName": "Yunhai", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University,China", "fullName": "Changhe Tu", "givenName": "Changhe", "surname": "Tu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Leeds,UK", "fullName": "Anthony G. Cohn", "givenName": "Anthony G.", "surname": "Cohn", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "7396-7405", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200h386", "articleId": "1BmFbFiX4qY", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200h406", "articleId": "1BmJQr9AR6E", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2016/8851/0/8851d159", "title": "ScribbleSup: Scribble-Supervised Convolutional Networks for Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851d159/12OmNy49sIV", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000e981", "title": "Learning Pixel-Level Semantic Affinity with Image-Level Supervision for Weakly Supervised Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e981/17D45VObpNz", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5334", "title": "Scribble-Supervised Semantic Segmentation Inference", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5334/1BmExU7zzk4", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5529", "title": "Spatial Uncertainty-Aware Semi-Supervised Crowd Counting", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5529/1BmKQ2RWgHm", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600c687", "title": "Scribble-Supervised LiDAR Semantic Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600c687/1H1hDMLXody", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600q6979", "title": "Weakly But Deeply Supervised Occlusion-Reasoned Parametric Road Layouts", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600q6979/1H1i1hkAan6", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1646", "title": "CycleMix: A Holistic Strategy for Medical Image Segmentation from Scribble Supervision", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1646/1H1j8SLn3Jm", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800m2543", "title": "Weakly-Supervised Salient Object Detection via Scribble Annotations", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800m2543/1m3okCcsve0", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c452", "title": "A Weakly Supervised Consistency-based Learning Method for COVID-19 Segmentation in CT Images", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c452/1uqGpTs7oA0", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09645239", "title": "Modeling the Background for Incremental and Weakly-Supervised Semantic Segmentation", "doi": null, "abstractUrl": "/journal/tp/2022/12/09645239/1zc6xZ7Dp3a", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kRSe09ZlTO", "title": "2020 Nicograph International (NicoInt)", "acronym": "nicoint", "groupId": "1814784", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kRSeLifK00", "doi": "10.1109/NicoInt50878.2020.00022", "title": "Visualization of Individual Variation of Multiple Annotators Working on Training Datasets for Machine Learning", "normalizedTitle": "Visualization of Individual Variation of Multiple Annotators Working on Training Datasets for Machine Learning", "abstract": "Quality of training datasets is essential for the quality of machine learning. Machine learning projects often invite multiple workers for these annotation tasks for training dataset creation. It is important to observe on what types of contents multiple workers make different annotations, or which workers often make abnormal annotations, to guarantee the quality of training datasets. This paper presents a tool for the visualization of abnormality of annotations by multiple workers. The tool generates a matrix of abnormality of annotations for each of the images by each of the workers and displays as a heatmap. This paper introduces an example using a training dataset where estimated ages are annotated to 7,748 pictures of human faces by eight workers.", "abstracts": [ { "abstractType": "Regular", "content": "Quality of training datasets is essential for the quality of machine learning. Machine learning projects often invite multiple workers for these annotation tasks for training dataset creation. It is important to observe on what types of contents multiple workers make different annotations, or which workers often make abnormal annotations, to guarantee the quality of training datasets. This paper presents a tool for the visualization of abnormality of annotations by multiple workers. The tool generates a matrix of abnormality of annotations for each of the images by each of the workers and displays as a heatmap. This paper introduces an example using a training dataset where estimated ages are annotated to 7,748 pictures of human faces by eight workers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Quality of training datasets is essential for the quality of machine learning. Machine learning projects often invite multiple workers for these annotation tasks for training dataset creation. It is important to observe on what types of contents multiple workers make different annotations, or which workers often make abnormal annotations, to guarantee the quality of training datasets. This paper presents a tool for the visualization of abnormality of annotations by multiple workers. The tool generates a matrix of abnormality of annotations for each of the images by each of the workers and displays as a heatmap. This paper introduces an example using a training dataset where estimated ages are annotated to 7,748 pictures of human faces by eight workers.", "fno": "09122371", "keywords": [ "Data Visualisation", "Image Annotation", "Learning Artificial Intelligence", "Machine Learning", "Annotator Visualization", "Heatmap", "Dataset Creation Training", "Image Annotation", "Training", "Heating Systems", "Visualization", "Annotations", "Machine Learning", "Task Analysis", "Faces", "Machine Learning", "Training Data", "Visualization" ], "authors": [ { "affiliation": "Ochanomizu University,Tokyo,Japan", "fullName": "Takayuki Itoh", "givenName": "Takayuki", "surname": "Itoh", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University,Tokyo,Japan", "fullName": "Ayana Murakami", "givenName": "Ayana", "surname": "Murakami", "__typename": "ArticleAuthorType" } ], "idPrefix": "nicoint", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-06-01T00:00:00", "pubType": "proceedings", "pages": "74-77", "year": "2020", "issn": null, "isbn": "978-1-7281-8771-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09122334", "articleId": "1kRSepRxq80", "__typename": "AdjacentArticleType" }, "next": { "fno": "09122333", "articleId": "1kRSff500fK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2021/0126/0/09669676", "title": "Robust Pathological Detector Training Method on Sparsely Annotated Datasets via Spatial Cues", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669676/1A9VIlAV26I", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a280", "title": "Crowdsourcing with Self-paced Workers", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a280/1AqxdMZeTVS", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a539", "title": "Truth Discovery in Sequence Labels from Crowds", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a539/1AqxozQqwNi", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2021/5841/0/584100a047", "title": "Weakly Supervised Crowdsourcing Learning Based on Adversarial Consensus", "doi": null, "abstractUrl": "/proceedings-article/csci/2021/584100a047/1EpLu9TlLj2", "parentPublication": { "id": "proceedings/csci/2021/5841/0", "title": "2021 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a085", "title": "Observation and Visualization of Subjectivity-based Annotation Tasks", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a085/1KaH4xh3bLq", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2023/8263/0/826300a073", "title": "An Approach for Fusing Two Training-Datasets with Partially Overlapping Classes", "doi": null, "abstractUrl": "/proceedings-article/icsc/2023/826300a073/1LFKPH87sJ2", "parentPublication": { "id": "proceedings/icsc/2023/8263/0", "title": "2023 IEEE 17th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09286557", "title": "Graphonomy: Universal Image Parsing via Graph Reasoning and Transfer", "doi": null, "abstractUrl": "/journal/tp/2022/05/09286557/1poqXeO2yqs", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2021/0424/0/09431006", "title": "Keynote: Training with imperfect and weak labels", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2021/09431006/1tROPwcXRmM", "parentPublication": { "id": "proceedings/percom-workshops/2021/0424/0", "title": "2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428220", "title": "Toward Effective Automated Content Analysis via Crowdsourcing", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428220/1uilvjGCl1u", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552887", "title": "Examining Effort in 1D Uncertainty Communication Using Individual Differences in Working Memory and NASA-TLX", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552887/1xibWySUs4U", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yylaxRHvDW", "title": "2021 9th International Conference on Affective Computing and Intelligent Interaction (ACII)", "acronym": "acii", "groupId": "1002992", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yylaKqSpH2", "doi": "10.1109/ACII52823.2021.9597425", "title": "Estimating continuous affect with label uncertainty", "normalizedTitle": "Estimating continuous affect with label uncertainty", "abstract": "Continuous affect estimation is a problem where there is an inherent uncertainty and subjectivity in the labels that accompany data samples &#x2013; typically, datasets use the average of multiple annotations or self-reporting to obtain ground truth labels. In this work, we propose a method for uncertainty-aware continuous affect estimation, that models explicitly the uncertainty of the ground truth label as a uni-variate Gaussian with mean equal to the ground truth label, and unknown variance. For each sample, the proposed neural network estimates not only the value of the target label (valence and arousal in our case), but also the variance. The network is trained with a loss that is defined as the KL-divergence between the estimation (valence/arousal) and the Gaussian around the ground truth. We show that, in two affect recognition problems with real data, the estimated variances are correlated with measures of uncertainty/error in the labels that are extracted either by considering multiple annotations of the data, or by manually cleaning the dataset.", "abstracts": [ { "abstractType": "Regular", "content": "Continuous affect estimation is a problem where there is an inherent uncertainty and subjectivity in the labels that accompany data samples &#x2013; typically, datasets use the average of multiple annotations or self-reporting to obtain ground truth labels. In this work, we propose a method for uncertainty-aware continuous affect estimation, that models explicitly the uncertainty of the ground truth label as a uni-variate Gaussian with mean equal to the ground truth label, and unknown variance. For each sample, the proposed neural network estimates not only the value of the target label (valence and arousal in our case), but also the variance. The network is trained with a loss that is defined as the KL-divergence between the estimation (valence/arousal) and the Gaussian around the ground truth. We show that, in two affect recognition problems with real data, the estimated variances are correlated with measures of uncertainty/error in the labels that are extracted either by considering multiple annotations of the data, or by manually cleaning the dataset.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Continuous affect estimation is a problem where there is an inherent uncertainty and subjectivity in the labels that accompany data samples – typically, datasets use the average of multiple annotations or self-reporting to obtain ground truth labels. In this work, we propose a method for uncertainty-aware continuous affect estimation, that models explicitly the uncertainty of the ground truth label as a uni-variate Gaussian with mean equal to the ground truth label, and unknown variance. For each sample, the proposed neural network estimates not only the value of the target label (valence and arousal in our case), but also the variance. The network is trained with a loss that is defined as the KL-divergence between the estimation (valence/arousal) and the Gaussian around the ground truth. We show that, in two affect recognition problems with real data, the estimated variances are correlated with measures of uncertainty/error in the labels that are extracted either by considering multiple annotations of the data, or by manually cleaning the dataset.", "fno": "09597425", "keywords": [ "Emotion Recognition", "Gaussian Processes", "Neural Nets", "Label Uncertainty", "Data Samples", "Multiple Annotations", "Ground Truth Label", "Uncertainty Aware Continuous Affect Estimation", "Variances Estimation", "Neural Network Estimation", "KL Divergence", "Affect Recognition Problem", "Affective Computing", "Uncertainty", "Annotations", "Face Recognition", "Measurement Uncertainty", "Neural Networks", "Estimation", "Affect Estimation", "Uncertainty", "Noisy Labels" ], "authors": [ { "affiliation": "Queen Mary, University of London,School of Electronic Engineering and Computer Science,London,United Kingdom", "fullName": "Niki Maria Foteinopoulou", "givenName": "Niki Maria", "surname": "Foteinopoulou", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary, University of London,School of Electronic Engineering and Computer Science,London,United Kingdom", "fullName": "Christos Tzelepis", "givenName": "Christos", "surname": "Tzelepis", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary, University of London,School of Electronic Engineering and Computer Science,London,United Kingdom", "fullName": "Ioannis Patras", "givenName": "Ioannis", "surname": "Patras", "__typename": "ArticleAuthorType" } ], "idPrefix": "acii", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2021", "issn": null, "isbn": "978-1-6654-0019-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09597440", "articleId": "1yylelPtnB6", "__typename": "AdjacentArticleType" }, "next": { "fno": "09597430", "articleId": "1yylcxYWVUY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2018/2335/0/233501a166", "title": "Harnessing Label Uncertainty to Improve Modeling: An Application to Student Engagement Recognition", "doi": null, "abstractUrl": "/proceedings-article/fg/2018/233501a166/12OmNxX3uEA", "parentPublication": { "id": "proceedings/fg/2018/2335/0", "title": "2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2014/5118/0/5118b837", "title": "Head Pose Estimation Based on Multivariate Label Distribution", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2014/5118b837/12OmNzC5T6g", "parentPublication": { "id": "proceedings/cvpr/2014/5118/0", "title": "2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/10/07964762", "title": "Disambiguation-Free Partial Label Learning", "doi": null, "abstractUrl": "/journal/tk/2017/10/07964762/13rRUIJcWlN", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0481", "title": "Unimodal-Concentrated Loss: Fully Adaptive Label Distribution Learning for Ordinal Regression", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0481/1H1n3sTx7A4", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2022/5908/0/09953816", "title": "Label Uncertainty Modeling and Prediction for Speech Emotion Recognition using t-Distributions", "doi": null, "abstractUrl": "/proceedings-article/acii/2022/09953816/1IAK4xAkyFa", "parentPublication": { "id": "proceedings/acii/2022/5908/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlccim/2022/9858/0/985800a478", "title": "Noisy Label Rectification Using Weighted Fusion for Deep Unsupervised Salient Object Detection", "doi": null, "abstractUrl": "/proceedings-article/mlccim/2022/985800a478/1IAKxkFFcAg", "parentPublication": { "id": "proceedings/mlccim/2022/9858/0", "title": "2022 International Conference on Machine Learning, Cloud Computing and Intelligent Mining (MLCCIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600d213", "title": "Automated Detection of Label Errors in Semantic Segmentation Datasets via Deep Learning and Uncertainty Quantification", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600d213/1L8qnBPlbK8", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aciiw/2022/5490/0/10085994", "title": "Do Minority Views in Perceptual Evaluations Affect Confidence of Speech Emotion Classifiers?", "doi": null, "abstractUrl": "/proceedings-article/aciiw/2022/10085994/1M661GHWeRi", "parentPublication": { "id": "proceedings/aciiw/2022/5490/0", "title": "2022 10th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2020/12/08735768", "title": "Capturing Joint Label Distribution for Multi-Label Classification Through Adversarial Learning", "doi": null, "abstractUrl": "/journal/tk/2020/12/08735768/1aNNPpljxzG", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2022/05/09122440", "title": "CMAL: Cost-Effective Multi-Label Active Learning by Querying Subexamples", "doi": null, "abstractUrl": "/journal/tk/2022/05/09122440/1kRRvncJNao", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SW5", "title": "Computer Graphics and Applications, Pacific Conference on", "acronym": "pg", "groupId": "1000130", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNBf94Yd", "doi": "10.1109/PCCGA.2001.962870", "title": "Stream Bubbles for Steady Flow Visualization", "normalizedTitle": "Stream Bubbles for Steady Flow Visualization", "abstract": "This paper introduces a new relatively inexpensive technique -- Stream bubbles for 3D flow visualization. The physical analogy to this technique are bubbles that can be observed in nature with different shapes and varying speeds. A stream bubble is a surface, defined by a small set of vertices, advected through a flow field. It can easily manifest flow features like twist, stretch, expansion and rotation.Upon encountering an obstacle, stream bubbles will automatically erode and/or split in an intuitively geometric way. For highly divergent and vortical fields, it can also break apart based on the aspect ratio of the bounding volume. When two or more stream bubbles meet, no explicit merge operation is needed since the surfaces will simply intersect each other to form a composite surface.No effort is made to make the intersection smooth. Stream bubbles may be of different sizes. Larger bubbles give a coarse global view of the flow structure, while smaller ones give a more accurate depiction. In addition, our interface provides an interactive, multi-resolution visualization environment facilitated with an animated or step-by-step playback function.", "abstracts": [ { "abstractType": "Regular", "content": "This paper introduces a new relatively inexpensive technique -- Stream bubbles for 3D flow visualization. The physical analogy to this technique are bubbles that can be observed in nature with different shapes and varying speeds. A stream bubble is a surface, defined by a small set of vertices, advected through a flow field. It can easily manifest flow features like twist, stretch, expansion and rotation.Upon encountering an obstacle, stream bubbles will automatically erode and/or split in an intuitively geometric way. For highly divergent and vortical fields, it can also break apart based on the aspect ratio of the bounding volume. When two or more stream bubbles meet, no explicit merge operation is needed since the surfaces will simply intersect each other to form a composite surface.No effort is made to make the intersection smooth. Stream bubbles may be of different sizes. Larger bubbles give a coarse global view of the flow structure, while smaller ones give a more accurate depiction. In addition, our interface provides an interactive, multi-resolution visualization environment facilitated with an animated or step-by-step playback function.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper introduces a new relatively inexpensive technique -- Stream bubbles for 3D flow visualization. The physical analogy to this technique are bubbles that can be observed in nature with different shapes and varying speeds. A stream bubble is a surface, defined by a small set of vertices, advected through a flow field. It can easily manifest flow features like twist, stretch, expansion and rotation.Upon encountering an obstacle, stream bubbles will automatically erode and/or split in an intuitively geometric way. For highly divergent and vortical fields, it can also break apart based on the aspect ratio of the bounding volume. When two or more stream bubbles meet, no explicit merge operation is needed since the surfaces will simply intersect each other to form a composite surface.No effort is made to make the intersection smooth. Stream bubbles may be of different sizes. Larger bubbles give a coarse global view of the flow structure, while smaller ones give a more accurate depiction. In addition, our interface provides an interactive, multi-resolution visualization environment facilitated with an animated or step-by-step playback function.", "fno": "12270169", "keywords": [], "authors": [ { "affiliation": "University of California, Santa Cruz", "fullName": "Bing Zhang", "givenName": "Bing", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, Santa Cruz", "fullName": "Alex Pang", "givenName": "Alex", "surname": "Pang", "__typename": "ArticleAuthorType" } ], "idPrefix": "pg", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-10-01T00:00:00", "pubType": "proceedings", "pages": "0169", "year": "2001", "issn": null, "isbn": "0-7695-1227-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "12270160", "articleId": "12OmNxvwp1G", "__typename": "AdjacentArticleType" }, "next": { "fno": "12270180", "articleId": "12OmNywOWMk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFul", "title": "2014 18th International Conference on Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNx8Ouzu", "doi": "10.1109/IV.2014.34", "title": "Directional Aggregate Visualization of Large Scale Movement Data", "normalizedTitle": "Directional Aggregate Visualization of Large Scale Movement Data", "abstract": "Widespread use of GPS terminals has made it possible to collect geospatial movement data, and visualization is an effective method to understand such data. However, for large scale movement analysis, because the data set includes complex movements of individuals, it is difficult to understand using naive visualization methods. In order to solve this problem, we developed a visualization technique that can represent large scale movement data in an aggregate manner. This visualization technique has two representations: \"amoeba representation\" and \"amoeba colony representation.\" Amoeba representation represents the distance moved from a point in any direction with map scale in a geographical space, and amoeba colony representation represents movements over a wide geographical space.", "abstracts": [ { "abstractType": "Regular", "content": "Widespread use of GPS terminals has made it possible to collect geospatial movement data, and visualization is an effective method to understand such data. However, for large scale movement analysis, because the data set includes complex movements of individuals, it is difficult to understand using naive visualization methods. In order to solve this problem, we developed a visualization technique that can represent large scale movement data in an aggregate manner. This visualization technique has two representations: \"amoeba representation\" and \"amoeba colony representation.\" Amoeba representation represents the distance moved from a point in any direction with map scale in a geographical space, and amoeba colony representation represents movements over a wide geographical space.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Widespread use of GPS terminals has made it possible to collect geospatial movement data, and visualization is an effective method to understand such data. However, for large scale movement analysis, because the data set includes complex movements of individuals, it is difficult to understand using naive visualization methods. In order to solve this problem, we developed a visualization technique that can represent large scale movement data in an aggregate manner. This visualization technique has two representations: \"amoeba representation\" and \"amoeba colony representation.\" Amoeba representation represents the distance moved from a point in any direction with map scale in a geographical space, and amoeba colony representation represents movements over a wide geographical space.", "fno": "4103a196", "keywords": [ "Data Visualization", "Aggregates", "Visualization", "Clutter", "Shape", "Vectors", "Geospatial Analysis", "Aggregation", "Movement Data", "Origin And Destination", "Flow Visualization", "People Flow", "Movement Analysis" ], "authors": [ { "affiliation": null, "fullName": "Yuuki Hyougo", "givenName": "Yuuki", "surname": "Hyougo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kazuo Misue", "givenName": "Kazuo", "surname": "Misue", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiro Tanaka", "givenName": "Jiro", "surname": "Tanaka", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "196-201", "year": "2014", "issn": "1550-6037", "isbn": "978-1-4799-4103-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4103a189", "articleId": "12OmNqG0SLA", "__typename": "AdjacentArticleType" }, "next": { "fno": "4103a202", "articleId": "12OmNwxlrhT", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657128", "title": "Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657128/12OmNrGb2e4", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2014/4116/0/4116a448", "title": "GPU Accelerated Nature Inspired Methods for Modelling Large Scale Bi-directional Pedestrian Movement", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2014/4116a448/12OmNvJXeyV", "parentPublication": { "id": "proceedings/ipdpsw/2014/4116/0", "title": "2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2015/9926/0/07363802", "title": "Visual analysis of bi-directional movement behavior", "doi": null, "abstractUrl": "/proceedings-article/big-data/2015/07363802/12OmNwpoFAQ", "parentPublication": { "id": "proceedings/big-data/2015/9926/0", "title": "2015 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1996/3673/0/36730389", "title": "Directional Flow Visualization of Vector Fields", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1996/36730389/12OmNyrIas8", "parentPublication": { "id": "proceedings/ieee-vis/1996/3673/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2018/7377/0/737700a163", "title": "Visualization of Memory Map Information in Embedded System Design", "doi": null, "abstractUrl": "/proceedings-article/dsd/2018/737700a163/17D45VVho5j", "parentPublication": { "id": "proceedings/dsd/2018/7377/0", "title": "2018 21st Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440039", "title": "Visual Abstraction of Large Scale Geospatial Origin-Destination Movement Data", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440039/17D45WaTknI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/10/08673661", "title": "Eiffel: Evolutionary Flow Map for Influence Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/10/08673661/18LF7Q1L3na", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a921", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a921/1I0bT76v0hq", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2022/9007/0/900700a280", "title": "Visualization Tool for Comparative Analysis of Seabird Movement Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2022/900700a280/1KaH5N5YOK4", "parentPublication": { "id": "proceedings/iv/2022/9007/0", "title": "2022 26th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2022/5444/0/544400a921", "title": "Boosting Performance Optimization with Interactive Data Movement Visualization", "doi": null, "abstractUrl": "/proceedings-article/sc/2022/544400a921/1L07kMpoeLm", "parentPublication": { "id": "proceedings/sc/2022/5444/0/", "title": "SC22: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "14qdcP8Ivdx", "title": "2018 21st Euromicro Conference on Digital System Design (DSD)", "acronym": "dsd", "groupId": "1000208", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45VVho5j", "doi": "10.1109/DSD.2018.00040", "title": "Visualization of Memory Map Information in Embedded System Design", "normalizedTitle": "Visualization of Memory Map Information in Embedded System Design", "abstract": "Data compression is a common requirement for displaying large amounts of information. The goal is to reduce visual clutter. The approach given in this paper uses an analysis of a data set to construct a visual representation. The visualization is compressed using the address ranges of the memory structure. This method produces a compressed version of the initial visualization, retaining the same information as the original. The presented method has been implemented as a Memory Designer tool for ASIC, FPGA and embedded systems using IP-XACT. The Memory Designer is a user-friendly tool for model based embedded system design, providing access and adjustment of the memory layout from a single view, complementing the \"programmer's view\" to the system.", "abstracts": [ { "abstractType": "Regular", "content": "Data compression is a common requirement for displaying large amounts of information. The goal is to reduce visual clutter. The approach given in this paper uses an analysis of a data set to construct a visual representation. The visualization is compressed using the address ranges of the memory structure. This method produces a compressed version of the initial visualization, retaining the same information as the original. The presented method has been implemented as a Memory Designer tool for ASIC, FPGA and embedded systems using IP-XACT. The Memory Designer is a user-friendly tool for model based embedded system design, providing access and adjustment of the memory layout from a single view, complementing the \"programmer's view\" to the system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data compression is a common requirement for displaying large amounts of information. The goal is to reduce visual clutter. The approach given in this paper uses an analysis of a data set to construct a visual representation. The visualization is compressed using the address ranges of the memory structure. This method produces a compressed version of the initial visualization, retaining the same information as the original. The presented method has been implemented as a Memory Designer tool for ASIC, FPGA and embedded systems using IP-XACT. The Memory Designer is a user-friendly tool for model based embedded system design, providing access and adjustment of the memory layout from a single view, complementing the \"programmer's view\" to the system.", "fno": "737700a163", "keywords": [ "Application Specific Integrated Circuits", "Data Compression", "Data Visualisation", "Embedded Systems", "Field Programmable Gate Arrays", "User Friendly Tool", "Embedded System Design", "Memory Layout", "Data Compression", "Common Requirement", "Visual Clutter", "Visual Representation", "Memory Structure", "Memory Map Information", "Memory Designer Tool", "ASIC", "FPGA", "IP XACT", "Data Visualization", "Visualization", "Clutter", "Tools", "Embedded Systems", "Filtering", "Data Visualization", "Display Space", "Compression", "Filtering", "Memory Structure" ], "authors": [ { "affiliation": null, "fullName": "Mikko Teuho", "givenName": "Mikko", "surname": "Teuho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Esko Pekkarinen", "givenName": "Esko", "surname": "Pekkarinen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Timo Hämäläinen", "givenName": "Timo", "surname": "Hämäläinen", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "163-166", "year": "2018", "issn": null, "isbn": "978-1-5386-7377-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "737700a159", "articleId": "17D45XuDNGN", "__typename": "AdjacentArticleType" }, "next": { "fno": "737700a167", "articleId": "17D45WHONli", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dsd/2010/4171/0/4171a011", "title": "Visualization of Multi-objective Design Space Exploration for Embedded Systems", "doi": null, "abstractUrl": "/proceedings-article/dsd/2010/4171a011/12OmNBU1jFy", "parentPublication": { "id": "proceedings/dsd/2010/4171/0", "title": "2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2008/3348/0/3348a255", "title": "A Static Trigger Wear-Leveling Strategy for Flash Memory In Embedded System", "doi": null, "abstractUrl": "/proceedings-article/sec/2008/3348a255/12OmNxecRXF", "parentPublication": { "id": "proceedings/sec/2008/3348/0", "title": "Embedded Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hsc/2001/364/0/00924647", "title": "HW/SW partitioning of an embedded instruction memory decompressor", "doi": null, "abstractUrl": "/proceedings-article/hsc/2001/00924647/12OmNy3AgCX", "parentPublication": { "id": "proceedings/hsc/2001/364/0", "title": "Proceedings of IEEE 9th International Workshop on Hardware Software C-Design/CASHE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/codes/2001/2360/0/23600036", "title": "HW/SW Partitioning of an Embedded Instruction Memory Decompressor", "doi": null, "abstractUrl": "/proceedings-article/codes/2001/23600036/12OmNyY4rhK", "parentPublication": { "id": "proceedings/codes/2001/2360/0", "title": "Hardware/Software Co-Design, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fdl/2009/9999/0/05404036", "title": "IP-XACT components with abstract time characterization", "doi": null, "abstractUrl": "/proceedings-article/fdl/2009/05404036/12OmNzaQoJQ", "parentPublication": { "id": "proceedings/fdl/2009/9999/0", "title": "2009 Forum on Specification & Design Languages (FDL 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2017/2146/0/2146a155", "title": "Analysis and Visualization of Product Memory Layout in IP-XACT", "doi": null, "abstractUrl": "/proceedings-article/dsd/2017/2146a155/12OmNzdoMUj", "parentPublication": { "id": "proceedings/dsd/2017/2146/0", "title": "2017 Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1999/2634/0/26340140", "title": "Memory Exploration for Low Power, Embedded Systems", "doi": null, "abstractUrl": "/proceedings-article/dac/1999/26340140/12OmNzw8j2H", "parentPublication": { "id": "proceedings/dac/1999/2634/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/10/08673661", "title": "Eiffel: Evolutionary Flow Map for Influence Graph Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/10/08673661/18LF7Q1L3na", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/codes/2001/2360/0/00924647", "title": "HW/SW partitioning of an embedded instruction memory decompressor", "doi": null, "abstractUrl": "/proceedings-article/codes/2001/00924647/1MEXnrOX03u", "parentPublication": { "id": "proceedings/codes/2001/2360/0", "title": "Hardware/Software Co-Design, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1fHjLZRncQ0", "title": "2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)", "acronym": "dsc", "groupId": "1815424", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1fHjOmQsZPi", "doi": "10.1109/DSC.2019.00036", "title": "Visualization of the Non-Dominated Solutions in Many-Objective Optimization", "normalizedTitle": "Visualization of the Non-Dominated Solutions in Many-Objective Optimization", "abstract": "The high dimensionality of many-objective optimization makes it difficult to represent the relationships between objectives and solutions of such problems. The overlapping and visual confusion problems occur when mapping high-dimensional solution sets to two-dimensional planes in the conventional parallel coordinate plots, which adds difficulty for decision maker choosing a preference solution. This paper introduces a visualization method for many-objective optimization non-dominated solution sets based on fuzzy theory and electromagnetic field clustering. The fuzzy theory is used to classify the non-dominated solution set, and each rating grade denotes the preference degree of decision maker. Visual clustering is conducted by electromagnetic field clustering, the solutions in the same cluster attract each other while solutions between clusters are mutually exclusive. The distribution structure of preference solution is highlighted through brightness gradient enhancement to optimize the visual perception. The experimental results show that the visualization plot of the proposed method is more clear and intuitive than the original plot, which is convenient for decision makers to discover the pattern of solution sets and make final decisions.", "abstracts": [ { "abstractType": "Regular", "content": "The high dimensionality of many-objective optimization makes it difficult to represent the relationships between objectives and solutions of such problems. The overlapping and visual confusion problems occur when mapping high-dimensional solution sets to two-dimensional planes in the conventional parallel coordinate plots, which adds difficulty for decision maker choosing a preference solution. This paper introduces a visualization method for many-objective optimization non-dominated solution sets based on fuzzy theory and electromagnetic field clustering. The fuzzy theory is used to classify the non-dominated solution set, and each rating grade denotes the preference degree of decision maker. Visual clustering is conducted by electromagnetic field clustering, the solutions in the same cluster attract each other while solutions between clusters are mutually exclusive. The distribution structure of preference solution is highlighted through brightness gradient enhancement to optimize the visual perception. The experimental results show that the visualization plot of the proposed method is more clear and intuitive than the original plot, which is convenient for decision makers to discover the pattern of solution sets and make final decisions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The high dimensionality of many-objective optimization makes it difficult to represent the relationships between objectives and solutions of such problems. The overlapping and visual confusion problems occur when mapping high-dimensional solution sets to two-dimensional planes in the conventional parallel coordinate plots, which adds difficulty for decision maker choosing a preference solution. This paper introduces a visualization method for many-objective optimization non-dominated solution sets based on fuzzy theory and electromagnetic field clustering. The fuzzy theory is used to classify the non-dominated solution set, and each rating grade denotes the preference degree of decision maker. Visual clustering is conducted by electromagnetic field clustering, the solutions in the same cluster attract each other while solutions between clusters are mutually exclusive. The distribution structure of preference solution is highlighted through brightness gradient enhancement to optimize the visual perception. The experimental results show that the visualization plot of the proposed method is more clear and intuitive than the original plot, which is convenient for decision makers to discover the pattern of solution sets and make final decisions.", "fno": "452800a188", "keywords": [ "Data Visualisation", "Decision Making", "Fuzzy Set Theory", "Interactive Systems", "Pareto Optimisation", "Pattern Clustering", "Overlapping Confusion Problems", "Visual Confusion Problems", "Mapping High Dimensional Solution Sets", "Two Dimensional Planes", "Conventional Parallel Coordinate Plots", "Decision Maker", "Preference Solution", "Visualization Method", "Many Objective Optimization Nondominated Solution Sets", "Fuzzy Theory", "Electromagnetic Field Clustering", "Preference Degree", "Visual Clustering", "Visual Perception", "Visualization Plot", "Visualization", "Optimization", "Data Visualization", "Electromagnetic Fields", "Clutter", "Clustering Methods", "Systems Simulation", "Visualization Parallel Coordinate Plot Fuzzy Theory Electromagnetic Field Clustering" ], "authors": [ { "affiliation": "Science and Technology on Complex Electronic System Simulation Laboratory, Space Engineering University", "fullName": "Minghui Xiong", "givenName": "Minghui", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": "Science and Technology on Complex Electronic System Simulation Laboratory, Space Engineering University", "fullName": "Wei Xiong", "givenName": "Wei", "surname": "Xiong", "__typename": "ArticleAuthorType" }, { "affiliation": "Science and Technology on Complex Electronic System Simulation Laboratory, Space Engineering University", "fullName": "Ping Jian", "givenName": "Ping", "surname": "Jian", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-06-01T00:00:00", "pubType": "proceedings", "pages": "188-195", "year": "2019", "issn": null, "isbn": "978-1-7281-4528-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "452800a183", "articleId": "1fHjPHOJm8w", "__typename": "AdjacentArticleType" }, "next": { "fno": "452800a196", "articleId": "1fHjQxnLs9a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/paciia/2008/3490/1/3490a305", "title": "An Immune Recognition Based Algorithm for Finding Non-Dominated Set in Multi-Objective Optimization", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a305/12OmNARRYgk", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2015/0163/0/0163b005", "title": "Interactive Preference Incorporation in Evolutionary Multi-objective Engineering Design", "doi": null, "abstractUrl": "/proceedings-article/ictai/2015/0163b005/12OmNrGsDqT", "parentPublication": { "id": "proceedings/ictai/2015/0163/0", "title": "2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2017/5738/0/08031609", "title": "Making many-to-many parallel coordinate plots scalable by asymmetric biclustering", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2017/08031609/12OmNrHjqNa", "parentPublication": { "id": "proceedings/pacificvis/2017/5738/0", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisw/2007/3073/0/30730195", "title": "Fuzzy-Dominance and Its Application in Evolutionary Many Objective Optimization", "doi": null, "abstractUrl": "/proceedings-article/cisw/2007/30730195/12OmNvAAtgR", "parentPublication": { "id": "proceedings/cisw/2007/3073/0", "title": "Computational Intelligence and Security Workshops, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicic/2007/2882/0/28820617", "title": "A New Fuzzy Dominance GA Applied to Solve Many-Objective Optimization Problem", "doi": null, "abstractUrl": "/proceedings-article/icicic/2007/28820617/12OmNx38vRZ", "parentPublication": { "id": "proceedings/icicic/2007/2882/0", "title": "2007 Second International Conference on Innovative Computing, Information and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscbi/2014/7551/0/07119529", "title": "Evaluation of Vector Evaluated Particle Swarm Optimisation Enhanced with Non-dominated Solutions and Multiple Nondominated Leaders Based on WFG Test Functions", "doi": null, "abstractUrl": "/proceedings-article/iscbi/2014/07119529/12OmNxy4N2u", "parentPublication": { "id": "proceedings/iscbi/2014/7551/0", "title": "2014 2nd International Symposium on Computational and Business Intelligence (ISCBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2012/4896/0/4896a071", "title": "Preference-Based Evolutionary Multi-objective Optimization", "doi": null, "abstractUrl": "/proceedings-article/cis/2012/4896a071/12OmNySosIx", "parentPublication": { "id": "proceedings/cis/2012/4896/0", "title": "2012 Eighth International Conference on Computational Intelligence and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2019/9226/0/922600a232", "title": "Interactive Spatiotemporal Visualization of Phase Space Particle Trajectories Using Distance Plots", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2019/922600a232/1cMF7xn5Rbq", "parentPublication": { "id": "proceedings/pacificvis/2019/9226/0", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/10/09374716", "title": "Improving Visualization Design for Effective Multi-Objective Decision Making", "doi": null, "abstractUrl": "/journal/tg/2022/10/09374716/1rR7UXLteHS", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400b998", "title": "A New Visualization for Many-Objective Optimization", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400b998/1tzze2WAC0E", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hVlL8ucCje", "doi": "10.1109/ICCV.2019.00932", "title": "Video Object Segmentation Using Space-Time Memory Networks", "normalizedTitle": "Video Object Segmentation Using Space-Time Memory Networks", "abstract": "We propose a novel solution for semi-supervised video object segmentation. By the nature of the problem, available cues (e.g. video frame(s) with object masks) become richer with the intermediate predictions. However, the existing methods are unable to fully exploit this rich source of information. We resolve the issue by leveraging memory networks and learn to read relevant information from all available sources. In our framework, the past frames with object masks form an external memory, and the current frame as the query is segmented using the mask information in the memory. Specifically, the query and the memory are densely matched in the feature space, covering all the space-time pixel locations in a feed-forward fashion. Contrast to the previous approaches, the abundant use of the guidance information allows us to better handle the challenges such as appearance changes and occlussions. We validate our method on the latest benchmark sets and achieved the state-of-the-art performance (overall score of 79.4 on Youtube-VOS val set, J of 88.7 and 79.2 on DAVIS 2016/2017 val set respectively) while having a fast runtime (0.16 second/frame on DAVIS 2016 val set).", "abstracts": [ { "abstractType": "Regular", "content": "We propose a novel solution for semi-supervised video object segmentation. By the nature of the problem, available cues (e.g. video frame(s) with object masks) become richer with the intermediate predictions. However, the existing methods are unable to fully exploit this rich source of information. We resolve the issue by leveraging memory networks and learn to read relevant information from all available sources. In our framework, the past frames with object masks form an external memory, and the current frame as the query is segmented using the mask information in the memory. Specifically, the query and the memory are densely matched in the feature space, covering all the space-time pixel locations in a feed-forward fashion. Contrast to the previous approaches, the abundant use of the guidance information allows us to better handle the challenges such as appearance changes and occlussions. We validate our method on the latest benchmark sets and achieved the state-of-the-art performance (overall score of 79.4 on Youtube-VOS val set, J of 88.7 and 79.2 on DAVIS 2016/2017 val set respectively) while having a fast runtime (0.16 second/frame on DAVIS 2016 val set).", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a novel solution for semi-supervised video object segmentation. By the nature of the problem, available cues (e.g. video frame(s) with object masks) become richer with the intermediate predictions. However, the existing methods are unable to fully exploit this rich source of information. We resolve the issue by leveraging memory networks and learn to read relevant information from all available sources. In our framework, the past frames with object masks form an external memory, and the current frame as the query is segmented using the mask information in the memory. Specifically, the query and the memory are densely matched in the feature space, covering all the space-time pixel locations in a feed-forward fashion. Contrast to the previous approaches, the abundant use of the guidance information allows us to better handle the challenges such as appearance changes and occlussions. We validate our method on the latest benchmark sets and achieved the state-of-the-art performance (overall score of 79.4 on Youtube-VOS val set, J of 88.7 and 79.2 on DAVIS 2016/2017 val set respectively) while having a fast runtime (0.16 second/frame on DAVIS 2016 val set).", "fno": "480300j225", "keywords": [ "Image Segmentation", "Learning Artificial Intelligence", "Query Processing", "Video Signal Processing", "Space Time Memory Networks", "Semisupervised Video Object Segmentation", "Object Masks", "External Memory", "Mask Information", "Feature Space", "Space Time Pixel Locations", "Feed Forward Fashion", "Guidance Information", "Query Processing", "Object Segmentation", "Task Analysis", "Micromechanical Devices", "Feature Extraction", "Visualization", "Tensile Stress", "Benchmark Testing" ], "authors": [ { "affiliation": "Yonsei Univeristy", "fullName": "Seoung Wug Oh", "givenName": "Seoung Wug", "surname": "Oh", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Joon-Young Lee", "givenName": "Joon-Young", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Ning Xu", "givenName": "Ning", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Yonsei Univ.", "fullName": "Seon Joo Kim", "givenName": "Seon Joo", "surname": "Kim", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "9225-9234", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "480300j216", "articleId": "1hVlrbYG1YA", "__typename": "AdjacentArticleType" }, "next": { "fno": "480300j235", "articleId": "1hQqlcKJFcY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032e491", "title": "Learning Video Object Segmentation with Visual Memory", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032e491/12OmNx5GU9V", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200m2869", "title": "Hierarchical Memory Matching Network for Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200m2869/1BmLdwZB9uM", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i045", "title": "Video Object Segmentation with Dynamic Memory Networks and Adaptive Object Alignment", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i045/1BmLea2zVT2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09745367", "title": "Video Object Segmentation Using Kernelized Memory Network With Multiple Kernels", "doi": null, "abstractUrl": "/journal/tp/2023/02/09745367/1CagD3UBmko", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2022/9774/0/977400a075", "title": "Adaptive Memory Management for Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/crv/2022/977400a075/1GeCuZAnvBC", "parentPublication": { "id": "proceedings/crv/2022/9774/0", "title": "2022 19th Conference on Robots and Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600b342", "title": "Per-Clip Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600b342/1H1kgDVlyuI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600b352", "title": "SWEM: Towards Real-Time Video Object Segmentation with Sequential Weighted Expectation-Maximization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600b352/1H1lFieHhMk", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800j381", "title": "State-Aware Tracker for Real-Time Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800j381/1m3opvZvFcY", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900b286", "title": "Efficient Regional Memory Network for Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900b286/1yeI8CC56uI", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E147", "title": "Learning Position and Target Consistency for Memory-based Video Object Segmentation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E147/1yeIVgPHg2I", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMZ", "title": "2008 12th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOllkb", "doi": "10.1109/IV.2008.78", "title": "Visualise Undrawable Euler Diagrams", "normalizedTitle": "Visualise Undrawable Euler Diagrams", "abstract": "Given a group of overlapping sets, it is not always possible to represent it with Euler diagrams. Euler diagram characteristics might collide with the sets relationships to depict, making it impossible to outline a correct draw. In order to be able to show a greater class of instances, Euler diagrams have been extended allowing more general patterns, but so far all the most common definitions cannot represent all the possible connection between sets.We aim to introduce methods and constructions to produce a clear representation, as close as possible to Euler diagrams, even for sets that are not formally drawable in that way.We will investigate on the reasons that make a diagram undrawable, in order to evaluate how and when to apply the mentioned structures, and to give the foundations necessary to design algorithms for this purpose.", "abstracts": [ { "abstractType": "Regular", "content": "Given a group of overlapping sets, it is not always possible to represent it with Euler diagrams. Euler diagram characteristics might collide with the sets relationships to depict, making it impossible to outline a correct draw. In order to be able to show a greater class of instances, Euler diagrams have been extended allowing more general patterns, but so far all the most common definitions cannot represent all the possible connection between sets.We aim to introduce methods and constructions to produce a clear representation, as close as possible to Euler diagrams, even for sets that are not formally drawable in that way.We will investigate on the reasons that make a diagram undrawable, in order to evaluate how and when to apply the mentioned structures, and to give the foundations necessary to design algorithms for this purpose.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Given a group of overlapping sets, it is not always possible to represent it with Euler diagrams. Euler diagram characteristics might collide with the sets relationships to depict, making it impossible to outline a correct draw. In order to be able to show a greater class of instances, Euler diagrams have been extended allowing more general patterns, but so far all the most common definitions cannot represent all the possible connection between sets.We aim to introduce methods and constructions to produce a clear representation, as close as possible to Euler diagrams, even for sets that are not formally drawable in that way.We will investigate on the reasons that make a diagram undrawable, in order to evaluate how and when to apply the mentioned structures, and to give the foundations necessary to design algorithms for this purpose.", "fno": "3268a594", "keywords": [ "Euler Diagrams", "Overlapping Clustering" ], "authors": [ { "affiliation": null, "fullName": "Paolo Simonetto", "givenName": "Paolo", "surname": "Simonetto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Auber", "givenName": "David", "surname": "Auber", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "594-599", "year": "2008", "issn": "1550-6037", "isbn": "978-0-7695-3268-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3268a585", "articleId": "12OmNyuya3M", "__typename": "AdjacentArticleType" }, "next": { "fno": "3268a600", "articleId": "12OmNAXPy46", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2009/3733/0/3733a673", "title": "An Heuristic for the Construction of Intersection Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a673/12OmNrY3LCy", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070382", "title": "SketchSet: Creating Euler diagrams using pen or mouse", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070382/12OmNx965CA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAQJzK8", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNvA1hE8", "doi": "10.1109/VLHCC.2014.6883063", "title": "Properties of euler diagrams and graphs in combination", "normalizedTitle": "Properties of euler diagrams and graphs in combination", "abstract": "Euler diagrams and graphs are used as visualisations individually in a large variety of application areas such as network analysis, medicine and engineering. Existing methods which combine both Euler diagrams and graphs such as Bubble Sets and Euler View provide somewhat limited results with suboptimal layout. In particular, they do not produce diagrams that are known to be most effective for performing user-driven tasks. That said, our knowledge is rather limited about what constitutes an effective layout for Euler diagrams and graphs in combination. Our ultimate aim is to automatically visualise large networks in an effective manner. To produce effective layouts, we need to identify properties that may correlate with effective layouts of Euler diagrams combined with graphs. Such properties are considered in this paper. In future, empirical studies will be conducted to inform and validate the combined properties.", "abstracts": [ { "abstractType": "Regular", "content": "Euler diagrams and graphs are used as visualisations individually in a large variety of application areas such as network analysis, medicine and engineering. Existing methods which combine both Euler diagrams and graphs such as Bubble Sets and Euler View provide somewhat limited results with suboptimal layout. In particular, they do not produce diagrams that are known to be most effective for performing user-driven tasks. That said, our knowledge is rather limited about what constitutes an effective layout for Euler diagrams and graphs in combination. Our ultimate aim is to automatically visualise large networks in an effective manner. To produce effective layouts, we need to identify properties that may correlate with effective layouts of Euler diagrams combined with graphs. Such properties are considered in this paper. In future, empirical studies will be conducted to inform and validate the combined properties.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Euler diagrams and graphs are used as visualisations individually in a large variety of application areas such as network analysis, medicine and engineering. Existing methods which combine both Euler diagrams and graphs such as Bubble Sets and Euler View provide somewhat limited results with suboptimal layout. In particular, they do not produce diagrams that are known to be most effective for performing user-driven tasks. That said, our knowledge is rather limited about what constitutes an effective layout for Euler diagrams and graphs in combination. Our ultimate aim is to automatically visualise large networks in an effective manner. To produce effective layouts, we need to identify properties that may correlate with effective layouts of Euler diagrams combined with graphs. Such properties are considered in this paper. In future, empirical studies will be conducted to inform and validate the combined properties.", "fno": "06883063", "keywords": [ "Layout", "Visualization", "Concurrent Computing", "Brushes", "Data Visualization", "Educational Institutions", "Distance Measurement" ], "authors": [ { "affiliation": "University of Brighton, UK", "fullName": "Mithileysh Sathiyanarayanan", "givenName": "Mithileysh", "surname": "Sathiyanarayanan", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton, UK", "fullName": "Gem Stapleton", "givenName": "Gem", "surname": "Stapleton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton, UK", "fullName": "Jim Burton", "givenName": "Jim", "surname": "Burton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton, UK", "fullName": "John Howse", "givenName": "John", "surname": "Howse", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "217-218", "year": "2014", "issn": null, "isbn": "978-1-4799-4035-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06883062", "articleId": "12OmNylKAIu", "__typename": "AdjacentArticleType" }, "next": { "fno": "06883064", "articleId": "12OmNrYlmCv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2010/8485/0/05635206", "title": "Euler Graph Transformations for Euler Diagram Layout", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2010/05635206/12OmNA0vnUl", "parentPublication": { "id": "proceedings/vlhcc/2010/8485/0", "title": "2010 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2009/4876/0/05295268", "title": "Changing euler diagram properties by edge transformation of euler dual graphs", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2009/05295268/12OmNAIdBQa", "parentPublication": { "id": "proceedings/vlhcc/2009/4876/0", "title": "2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645262", "title": "Improving user comprehension of Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645262/12OmNxveNOL", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380712", "title": "Spherule diagrams: A matrix-based set visualization compared with Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380712/12OmNyvGyfY", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552459", "title": "<sc>SP</sc>E<sc>ULER</sc>: Semantics-preserving Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552459/1xibZ9AqsLu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxQOjzF", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNvD8RBs", "doi": "10.1109/IV.2003.1217990", "title": "Layout Metrics for Euler Diagrams", "normalizedTitle": "Layout Metrics for Euler Diagrams", "abstract": "We present an aesthetics based method for drawing Euler diagrams. Aesthetic layout metrics have been found to be useful in graph drawing algorithms, which use metrics motivated by aesthetic principles that aid user understanding of diagrams. We have taken a similar approach to Euler diagram drawing, and have defined a set of suitable metrics to be used within a hill climbing multicriteria optimiser to produce \"good\" drawings. There are added difficulties when drawing Euler diagrams as they are made up of contours whose structural properties of intersection and containment must be preserved under any layout improvements. In this paper we describe our Java implementation of a pair of hill climbing variants to find good drawings, a set of metrics that measure aesthetics for good diagram layout, and issues concerning the choice of weightings for a useful combination of the metrics.", "abstracts": [ { "abstractType": "Regular", "content": "We present an aesthetics based method for drawing Euler diagrams. Aesthetic layout metrics have been found to be useful in graph drawing algorithms, which use metrics motivated by aesthetic principles that aid user understanding of diagrams. We have taken a similar approach to Euler diagram drawing, and have defined a set of suitable metrics to be used within a hill climbing multicriteria optimiser to produce \"good\" drawings. There are added difficulties when drawing Euler diagrams as they are made up of contours whose structural properties of intersection and containment must be preserved under any layout improvements. In this paper we describe our Java implementation of a pair of hill climbing variants to find good drawings, a set of metrics that measure aesthetics for good diagram layout, and issues concerning the choice of weightings for a useful combination of the metrics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an aesthetics based method for drawing Euler diagrams. Aesthetic layout metrics have been found to be useful in graph drawing algorithms, which use metrics motivated by aesthetic principles that aid user understanding of diagrams. We have taken a similar approach to Euler diagram drawing, and have defined a set of suitable metrics to be used within a hill climbing multicriteria optimiser to produce \"good\" drawings. There are added difficulties when drawing Euler diagrams as they are made up of contours whose structural properties of intersection and containment must be preserved under any layout improvements. In this paper we describe our Java implementation of a pair of hill climbing variants to find good drawings, a set of metrics that measure aesthetics for good diagram layout, and issues concerning the choice of weightings for a useful combination of the metrics.", "fno": "19880272", "keywords": [ "Euler Diagrams", "Graph Drawing", "Layout Metrics" ], "authors": [ { "affiliation": "University of Brighton, UK", "fullName": "Jean Flower", "givenName": "Jean", "surname": "Flower", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kent, UK", "fullName": "Peter Rodgers", "givenName": "Peter", "surname": "Rodgers", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kent, UK", "fullName": "Paul Mutton", "givenName": "Paul", "surname": "Mutton", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-07-01T00:00:00", "pubType": "proceedings", "pages": "272", "year": "2003", "issn": "1093-9547", "isbn": "0-7695-1988-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "19880264", "articleId": "12OmNyrIavq", "__typename": "AdjacentArticleType" }, "next": { "fno": "19880281", "articleId": "12OmNBtUdJd", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a673", "title": "An Heuristic for the Construction of Intersection Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a673/12OmNrY3LCy", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192693", "title": "A Simple Approach for Boundary Improvement of Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192693/13rRUwInvfb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZfq", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNvpew49", "doi": "10.1109/VLHCC.2011.6070401", "title": "Drawing Euler diagrams with circles and ellipses", "normalizedTitle": "Drawing Euler diagrams with circles and ellipses", "abstract": "The use of Euler diagrams as a basis for visual languages is commonplace and they are often used for visualizing information. The ability to automatically draw these diagrams is, therefore, likely to be of widespread practical use. The Euler diagram drawing problem is recognized as challenging, but the potential pay-off from the derivation of a comprehensive solution, that produces usable and effective diagrams, is significant. Previous research on automated Euler diagram drawing has used various different approaches, each of which had their own problems, including: (a) failure to draw a diagram in all cases, (b) poor diagram layout, and (c) inability to ensure that certain wellformedness properties of the drawn diagrams hold. In this paper, we present a novel approach to Euler diagram drawing that draws diagrams with circles, ellipses and curves in general. This new approach will draw a diagram in all cases, avoiding bad layout where possible (by the use of `nice' geometric shapes) and can enforce wellformedness properties as chosen by the user.", "abstracts": [ { "abstractType": "Regular", "content": "The use of Euler diagrams as a basis for visual languages is commonplace and they are often used for visualizing information. The ability to automatically draw these diagrams is, therefore, likely to be of widespread practical use. The Euler diagram drawing problem is recognized as challenging, but the potential pay-off from the derivation of a comprehensive solution, that produces usable and effective diagrams, is significant. Previous research on automated Euler diagram drawing has used various different approaches, each of which had their own problems, including: (a) failure to draw a diagram in all cases, (b) poor diagram layout, and (c) inability to ensure that certain wellformedness properties of the drawn diagrams hold. In this paper, we present a novel approach to Euler diagram drawing that draws diagrams with circles, ellipses and curves in general. This new approach will draw a diagram in all cases, avoiding bad layout where possible (by the use of `nice' geometric shapes) and can enforce wellformedness properties as chosen by the user.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of Euler diagrams as a basis for visual languages is commonplace and they are often used for visualizing information. The ability to automatically draw these diagrams is, therefore, likely to be of widespread practical use. The Euler diagram drawing problem is recognized as challenging, but the potential pay-off from the derivation of a comprehensive solution, that produces usable and effective diagrams, is significant. Previous research on automated Euler diagram drawing has used various different approaches, each of which had their own problems, including: (a) failure to draw a diagram in all cases, (b) poor diagram layout, and (c) inability to ensure that certain wellformedness properties of the drawn diagrams hold. In this paper, we present a novel approach to Euler diagram drawing that draws diagrams with circles, ellipses and curves in general. This new approach will draw a diagram in all cases, avoiding bad layout where possible (by the use of `nice' geometric shapes) and can enforce wellformedness properties as chosen by the user.", "fno": "06070401", "keywords": [ "Visualization", "Layout", "Shape", "Educational Institutions", "Semantics", "Presses", "Object Oriented Modeling" ], "authors": [ { "affiliation": "Univ. of Brighton, Brighton, UK", "fullName": "G. Stapleton", "givenName": "G.", "surname": "Stapleton", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Kent, Canterbury, UK", "fullName": "P. Rodgers", "givenName": "P.", "surname": "Rodgers", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "209-212", "year": "2011", "issn": "1943-6092", "isbn": "978-1-4577-1246-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06070400", "articleId": "12OmNzIl3yw", "__typename": "AdjacentArticleType" }, "next": { "fno": "06070402", "articleId": "12OmNxdDFPl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2009/4876/0/05295268", "title": "Changing euler diagram properties by edge transformation of euler dual graphs", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2009/05295268/12OmNAIdBQa", "parentPublication": { "id": "proceedings/vlhcc/2009/4876/0", "title": "2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2004/8696/0/86960147", "title": "Dynamic Euler Diagram Drawing", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2004/86960147/12OmNAgoV6r", "parentPublication": { "id": "proceedings/vlhcc/2004/8696/0", "title": "Proceedings. 2004 IEEE Symposium on Visual Languages and Human Centric Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070382", "title": "SketchSet: Creating Euler diagrams using pen or mouse", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070382/12OmNx965CA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645262", "title": "Improving user comprehension of Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645262/12OmNxveNOL", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192693", "title": "A Simple Approach for Boundary Improvement of Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192693/13rRUwInvfb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzcxZfq", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNx965CA", "doi": "10.1109/VLHCC.2011.6070382", "title": "SketchSet: Creating Euler diagrams using pen or mouse", "normalizedTitle": "SketchSet: Creating Euler diagrams using pen or mouse", "abstract": "Euler diagrams form the basis of various visual languages but tool support for creating them is generally limited to generic diagram editing software using mouse and keyboard interaction. A more natural and convenient mode of entry is via a sketching interface which facilitates greater cognitive focus on the task of diagram creation. Previous work has developed sketching interfaces for Euler diagrams drawn with ellipses. This paper presents SketchSet, the first sketch tool for Euler diagrams whose curves can be circles, ellipses, or arbitrary shapes. SketchSet allows the creation of formal diagrams via point and click interaction. The user drawn diagram, in sketched or formal format, is automatically converted to a diagram in the other format, thus maintaining both views. We provide a mechanism that allows semantic differences between the sketch and the formal diagram to be rectified automatically. Finally, we present a user study that evaluates the effectiveness of the tool.", "abstracts": [ { "abstractType": "Regular", "content": "Euler diagrams form the basis of various visual languages but tool support for creating them is generally limited to generic diagram editing software using mouse and keyboard interaction. A more natural and convenient mode of entry is via a sketching interface which facilitates greater cognitive focus on the task of diagram creation. Previous work has developed sketching interfaces for Euler diagrams drawn with ellipses. This paper presents SketchSet, the first sketch tool for Euler diagrams whose curves can be circles, ellipses, or arbitrary shapes. SketchSet allows the creation of formal diagrams via point and click interaction. The user drawn diagram, in sketched or formal format, is automatically converted to a diagram in the other format, thus maintaining both views. We provide a mechanism that allows semantic differences between the sketch and the formal diagram to be rectified automatically. Finally, we present a user study that evaluates the effectiveness of the tool.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Euler diagrams form the basis of various visual languages but tool support for creating them is generally limited to generic diagram editing software using mouse and keyboard interaction. A more natural and convenient mode of entry is via a sketching interface which facilitates greater cognitive focus on the task of diagram creation. Previous work has developed sketching interfaces for Euler diagrams drawn with ellipses. This paper presents SketchSet, the first sketch tool for Euler diagrams whose curves can be circles, ellipses, or arbitrary shapes. SketchSet allows the creation of formal diagrams via point and click interaction. The user drawn diagram, in sketched or formal format, is automatically converted to a diagram in the other format, thus maintaining both views. We provide a mechanism that allows semantic differences between the sketch and the formal diagram to be rectified automatically. Finally, we present a user study that evaluates the effectiveness of the tool.", "fno": "06070382", "keywords": [ "Semantics", "Visualization", "Software", "Libraries", "Shape", "Mice", "Character Recognition" ], "authors": [ { "affiliation": "Univ. of Auckland, Auckland, New Zealand", "fullName": "Mengdi Wang", "givenName": null, "surname": "Mengdi Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Auckland, Auckland, New Zealand", "fullName": "B. Plimmer", "givenName": "B.", "surname": "Plimmer", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Auckland, Auckland, New Zealand", "fullName": "P. Schmieder", "givenName": "P.", "surname": "Schmieder", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Brighton, Brighton, UK", "fullName": "G. Stapleton", "givenName": "G.", "surname": "Stapleton", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Kent, Canterbury, UK", "fullName": "P. Rodgers", "givenName": "P.", "surname": "Rodgers", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. of Brighton, Brighton, UK", "fullName": "A. Delaney", "givenName": "A.", "surname": "Delaney", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "75-82", "year": "2011", "issn": "1943-6092", "isbn": "978-1-4577-1246-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06070381", "articleId": "12OmNCf1DoL", "__typename": "AdjacentArticleType" }, "next": { "fno": "06070383", "articleId": "12OmNwHhoVh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645262", "title": "Improving user comprehension of Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645262/12OmNxveNOL", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2009/4876/0/05295265", "title": "Interactive visual classification with Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2009/05295265/12OmNzgwmPF", "parentPublication": { "id": "proceedings/vlhcc/2009/4876/0", "title": "2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192693", "title": "A Simple Approach for Boundary Improvement of Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192693/13rRUwInvfb", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNylsZKk", "title": "2007 11th International Conference Information Visualization (IV '07)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNxjjEhx", "doi": "10.1109/IV.2007.45", "title": "Evaluating the Comprehension of Euler Diagrams", "normalizedTitle": "Evaluating the Comprehension of Euler Diagrams", "abstract": "We describe an empirical investigation into layout criteria that can help with the comprehension of Euler diagrams. Euler diagrams are used to represent set inclusion in applications such as teaching set theory, database querying, software engineering, filing system organisation and bio-informatics. Research in automatically laying out Euler diagrams for use with these applications is at an early stage, and our work attempts to aid this research by informing layout designers about the importance of various Euler diagram aesthetic criteria. The three criteria under investigation were: contour jaggedness, zone area inequality and edge closeness. Subjects were asked to interpret diagrams with different combinations of levels for each of the criteria. Results for this investigation indicate that, within the parameters of the study, all three criteria are important for understanding Euler diagrams and we have a preliminary indication of the ordering of their importance.", "abstracts": [ { "abstractType": "Regular", "content": "We describe an empirical investigation into layout criteria that can help with the comprehension of Euler diagrams. Euler diagrams are used to represent set inclusion in applications such as teaching set theory, database querying, software engineering, filing system organisation and bio-informatics. Research in automatically laying out Euler diagrams for use with these applications is at an early stage, and our work attempts to aid this research by informing layout designers about the importance of various Euler diagram aesthetic criteria. The three criteria under investigation were: contour jaggedness, zone area inequality and edge closeness. Subjects were asked to interpret diagrams with different combinations of levels for each of the criteria. Results for this investigation indicate that, within the parameters of the study, all three criteria are important for understanding Euler diagrams and we have a preliminary indication of the ordering of their importance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We describe an empirical investigation into layout criteria that can help with the comprehension of Euler diagrams. Euler diagrams are used to represent set inclusion in applications such as teaching set theory, database querying, software engineering, filing system organisation and bio-informatics. Research in automatically laying out Euler diagrams for use with these applications is at an early stage, and our work attempts to aid this research by informing layout designers about the importance of various Euler diagram aesthetic criteria. The three criteria under investigation were: contour jaggedness, zone area inequality and edge closeness. Subjects were asked to interpret diagrams with different combinations of levels for each of the criteria. Results for this investigation indicate that, within the parameters of the study, all three criteria are important for understanding Euler diagrams and we have a preliminary indication of the ordering of their importance.", "fno": "29000771", "keywords": [ "Euler Diagrams", "Graph Drawing" ], "authors": [ { "affiliation": "University of Kent", "fullName": "Florence Benoy", "givenName": "Florence", "surname": "Benoy", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kent", "fullName": "Peter Rodgers", "givenName": "Peter", "surname": "Rodgers", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-06-01T00:00:00", "pubType": "proceedings", "pages": "771-780", "year": "2007", "issn": null, "isbn": "0-7695-2907-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "29000765", "articleId": "12OmNyoiYZs", "__typename": "AdjacentArticleType" }, "next": { "fno": "29000781", "articleId": "12OmNBaT5Yu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883063", "title": "Properties of euler diagrams and graphs in combination", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883063/12OmNvA1hE8", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wpc/2005/2254/0/22540317", "title": "On Evaluating the Layout of UML Class Diagrams for Program Comprehension", "doi": null, "abstractUrl": "/proceedings-article/wpc/2005/22540317/12OmNxEjXXP", "parentPublication": { "id": "proceedings/wpc/2005/2254/0", "title": "Proceedings. 13th International Workshop on Program Comprehension", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645262", "title": "Improving user comprehension of Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645262/12OmNxveNOL", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAkWvHg", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxveNOL", "doi": "10.1109/VLHCC.2013.6645262", "title": "Improving user comprehension of Euler diagrams", "normalizedTitle": "Improving user comprehension of Euler diagrams", "abstract": "The graphical choices made when laying out Euler diagrams impact upon both aesthetic quality and comprehensiveness. Graphical choices include the shape, size and colour of closed curves which are commonly described as retinal variables to which we are known to be perceptually sensitive. There is copious literature providing guidance as to how best use retinal variables to visualise both quantitative and qualitative information for a wide range range of diagram types. Further, this guidance is explicitly defined to optimise the users' comprehension of such information. However, there exists little, if any, literature affording guidance as to how best to use retinal variables when laying out Euler diagrams. Here we present a novel insight as to where retinal variables manifest in Euler diagrams, how they might influence our perception of Euler diagrams and, as a consequence, provide motivation and guidance for establishing layout guidelines.", "abstracts": [ { "abstractType": "Regular", "content": "The graphical choices made when laying out Euler diagrams impact upon both aesthetic quality and comprehensiveness. Graphical choices include the shape, size and colour of closed curves which are commonly described as retinal variables to which we are known to be perceptually sensitive. There is copious literature providing guidance as to how best use retinal variables to visualise both quantitative and qualitative information for a wide range range of diagram types. Further, this guidance is explicitly defined to optimise the users' comprehension of such information. However, there exists little, if any, literature affording guidance as to how best to use retinal variables when laying out Euler diagrams. Here we present a novel insight as to where retinal variables manifest in Euler diagrams, how they might influence our perception of Euler diagrams and, as a consequence, provide motivation and guidance for establishing layout guidelines.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The graphical choices made when laying out Euler diagrams impact upon both aesthetic quality and comprehensiveness. Graphical choices include the shape, size and colour of closed curves which are commonly described as retinal variables to which we are known to be perceptually sensitive. There is copious literature providing guidance as to how best use retinal variables to visualise both quantitative and qualitative information for a wide range range of diagram types. Further, this guidance is explicitly defined to optimise the users' comprehension of such information. However, there exists little, if any, literature affording guidance as to how best to use retinal variables when laying out Euler diagrams. Here we present a novel insight as to where retinal variables manifest in Euler diagrams, how they might influence our perception of Euler diagrams and, as a consequence, provide motivation and guidance for establishing layout guidelines.", "fno": "06645262", "keywords": [ "Shape", "Visualization", "Retina", "Layout", "Syntactics", "Image Color Analysis" ], "authors": [ { "affiliation": "University of Brighton", "fullName": "Andrew Blake", "givenName": "Andrew", "surname": "Blake", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton", "fullName": "Gem Stapleton", "givenName": "Gem", "surname": "Stapleton", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Kent", "fullName": "Peter Rodgers", "givenName": "Peter", "surname": "Rodgers", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton", "fullName": "Liz Cheek", "givenName": "Liz", "surname": "Cheek", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Brighton", "fullName": "John Howse", "givenName": "John", "surname": "Howse", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-09-01T00:00:00", "pubType": "proceedings", "pages": "189-190", "year": "2013", "issn": "1943-6092", "isbn": "978-1-4799-0369-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06645261", "articleId": "12OmNBgQFMh", "__typename": "AdjacentArticleType" }, "next": { "fno": "06645263", "articleId": "12OmNB8TUdu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2014/4035/0/06883063", "title": "Properties of euler diagrams and graphs in combination", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883063/12OmNvA1hE8", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a243", "title": "Automatic Assessment of Student Answers Consisting of Venn and Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a243/12OmNwF0BKj", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070382", "title": "SketchSet: Creating Euler diagrams using pen or mouse", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070382/12OmNx965CA", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icgciot/2015/7910/0/07380712", "title": "Spherule diagrams: A matrix-based set visualization compared with Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/icgciot/2015/07380712/12OmNyvGyfY", "parentPublication": { "id": "proceedings/icgciot/2015/7910/0", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMZ", "title": "2008 12th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNyuya3M", "doi": "10.1109/IV.2008.57", "title": "Embedding Wellformed Euler Diagrams", "normalizedTitle": "Embedding Wellformed Euler Diagrams", "abstract": "Euler diagrams are collections of labelled closed curves. They are often used to represent information about the relationship between sets and, as such, they have numerous applications including: visualizing biological data, diagrammatic logics, and visual database querying. Various methods to automatically generate Euler diagrams have been proposed recently. Typically, the generation process starts with an abstract description of an Euler diagram, which is then converted to a planar dual graph. Finally, the process attempts to embed the Euler diagram from the dual graph. This paper describes a method for embedding wellformed Euler diagrams from dual graphs. There are several mechanisms to generate dual graphs but, prior to the novel work described here, no general method for embedding a wellformed Euler diagram from a dual graph had been demonstrated. The method in this paper achieves an embedding of any wellformed Euler diagram. The method first triangulates the dual graph. Then, using the faces of the triangulated graph, an edge labelling technique identifies the vertices of polygons which form the closed curves of the Euler diagram. The method is demonstrated by a Java implementation. In addition, this paper discusses a number of layout improvements that can be explored for this embedding method.", "abstracts": [ { "abstractType": "Regular", "content": "Euler diagrams are collections of labelled closed curves. They are often used to represent information about the relationship between sets and, as such, they have numerous applications including: visualizing biological data, diagrammatic logics, and visual database querying. Various methods to automatically generate Euler diagrams have been proposed recently. Typically, the generation process starts with an abstract description of an Euler diagram, which is then converted to a planar dual graph. Finally, the process attempts to embed the Euler diagram from the dual graph. This paper describes a method for embedding wellformed Euler diagrams from dual graphs. There are several mechanisms to generate dual graphs but, prior to the novel work described here, no general method for embedding a wellformed Euler diagram from a dual graph had been demonstrated. The method in this paper achieves an embedding of any wellformed Euler diagram. The method first triangulates the dual graph. Then, using the faces of the triangulated graph, an edge labelling technique identifies the vertices of polygons which form the closed curves of the Euler diagram. The method is demonstrated by a Java implementation. In addition, this paper discusses a number of layout improvements that can be explored for this embedding method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Euler diagrams are collections of labelled closed curves. They are often used to represent information about the relationship between sets and, as such, they have numerous applications including: visualizing biological data, diagrammatic logics, and visual database querying. Various methods to automatically generate Euler diagrams have been proposed recently. Typically, the generation process starts with an abstract description of an Euler diagram, which is then converted to a planar dual graph. Finally, the process attempts to embed the Euler diagram from the dual graph. This paper describes a method for embedding wellformed Euler diagrams from dual graphs. There are several mechanisms to generate dual graphs but, prior to the novel work described here, no general method for embedding a wellformed Euler diagram from a dual graph had been demonstrated. The method in this paper achieves an embedding of any wellformed Euler diagram. The method first triangulates the dual graph. Then, using the faces of the triangulated graph, an edge labelling technique identifies the vertices of polygons which form the closed curves of the Euler diagram. The method is demonstrated by a Java implementation. In addition, this paper discusses a number of layout improvements that can be explored for this embedding method.", "fno": "3268a585", "keywords": [ "Euler Diagrams", "Venn Diagrams", "Graph Drawing", "Information Visualization" ], "authors": [ { "affiliation": null, "fullName": "Peter Rodgers", "givenName": "Peter", "surname": "Rodgers", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Leishi Zhang", "givenName": "Leishi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gem Stapleton", "givenName": "Gem", "surname": "Stapleton", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew Fish", "givenName": "Andrew", "surname": "Fish", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-07-01T00:00:00", "pubType": "proceedings", "pages": "585-593", "year": "2008", "issn": "1550-6037", "isbn": "978-0-7695-3268-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3268a575", "articleId": "12OmNz61dp2", "__typename": "AdjacentArticleType" }, "next": { "fno": "3268a594", "articleId": "12OmNBOllkb", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2009/4876/0/05295268", "title": "Changing euler diagram properties by edge transformation of euler dual graphs", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2009/05295268/12OmNAIdBQa", "parentPublication": { "id": "proceedings/vlhcc/2009/4876/0", "title": "2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a594", "title": "Visualise Undrawable Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a594/12OmNBOllkb", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a673", "title": "An Heuristic for the Construction of Intersection Graphs", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a673/12OmNrY3LCy", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/1999/0409/0/04090319", "title": "Finding Double Euler Trails of Planar Graphs in Linear Time", "doi": null, "abstractUrl": "/proceedings-article/focs/1999/04090319/12OmNzvz6NW", "parentPublication": { "id": "proceedings/focs/1999/0409/0", "title": "40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/07/05999665", "title": "Wellformedness Properties in Euler Diagrams: Which Should Be Used?", "doi": null, "abstractUrl": "/journal/tg/2012/07/05999665/13rRUILLkvo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAle6xQ", "title": "2015 International Conference on Green Computing and Internet of Things (ICGCIoT)", "acronym": "icgciot", "groupId": "1810365", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyvGyfY", "doi": "10.1109/ICGCIoT.2015.7380712", "title": "Spherule diagrams: A matrix-based set visualization compared with Euler diagrams", "normalizedTitle": "Spherule diagrams: A matrix-based set visualization compared with Euler diagrams", "abstract": "The explosive growth of the internet, the overall computerization of the engineering, medical, business and defense sectors have created a widespread need of visualization techniques to explore large and complex datasets. As the data keeps growing in complexity, users find it difficult to navigate and understand the relationships between the sets. There are limitations such as scalability and sub-optimal layouts being produced with the state-of-the-art visualization methods such as Euler diagrams, Treemap diagrams and ConSets. So, an effective visual method is in great need to produce an optimal layout and identify set properties with ease. This motivated us to develop a novel visual method called “Spherule diagrams” to improve the analysis of set relationships effectively. Then a small-scale user preference study was conducted to compare Euler diagrams with Spherule diagrams, where 80% participants preferred Spherule diagrams for its simplicity, navigation, better layout and set ordering characteristics. The other results based on error rate and rating, Spherule diagrams outperformed Euler diagrams. Thus, we provide evidence that Spherule diagrams are preferred over Euler diagrams for visualizing set relations.", "abstracts": [ { "abstractType": "Regular", "content": "The explosive growth of the internet, the overall computerization of the engineering, medical, business and defense sectors have created a widespread need of visualization techniques to explore large and complex datasets. As the data keeps growing in complexity, users find it difficult to navigate and understand the relationships between the sets. There are limitations such as scalability and sub-optimal layouts being produced with the state-of-the-art visualization methods such as Euler diagrams, Treemap diagrams and ConSets. So, an effective visual method is in great need to produce an optimal layout and identify set properties with ease. This motivated us to develop a novel visual method called “Spherule diagrams” to improve the analysis of set relationships effectively. Then a small-scale user preference study was conducted to compare Euler diagrams with Spherule diagrams, where 80% participants preferred Spherule diagrams for its simplicity, navigation, better layout and set ordering characteristics. The other results based on error rate and rating, Spherule diagrams outperformed Euler diagrams. Thus, we provide evidence that Spherule diagrams are preferred over Euler diagrams for visualizing set relations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The explosive growth of the internet, the overall computerization of the engineering, medical, business and defense sectors have created a widespread need of visualization techniques to explore large and complex datasets. As the data keeps growing in complexity, users find it difficult to navigate and understand the relationships between the sets. There are limitations such as scalability and sub-optimal layouts being produced with the state-of-the-art visualization methods such as Euler diagrams, Treemap diagrams and ConSets. So, an effective visual method is in great need to produce an optimal layout and identify set properties with ease. This motivated us to develop a novel visual method called “Spherule diagrams” to improve the analysis of set relationships effectively. Then a small-scale user preference study was conducted to compare Euler diagrams with Spherule diagrams, where 80% participants preferred Spherule diagrams for its simplicity, navigation, better layout and set ordering characteristics. The other results based on error rate and rating, Spherule diagrams outperformed Euler diagrams. Thus, we provide evidence that Spherule diagrams are preferred over Euler diagrams for visualizing set relations.", "fno": "07380712", "keywords": [ "Visualization", "Data Visualization", "Yttrium", "Layout", "Navigation", "Error Analysis", "Green Computing", "Human Computer Interaction", "Set Theory", "Euler Diagrams", "Information Visualization", "Visualization Techniques" ], "authors": [ { "affiliation": "School of Computing, University of Brighton, UK", "fullName": "Mithileysh Sathiyanarayanan", "givenName": "Mithileysh", "surname": "Sathiyanarayanan", "__typename": "ArticleAuthorType" }, { "affiliation": "Dipartimento di Informatica, Università di Salerno, Italy", "fullName": "Donato Pirozzi", "givenName": "Donato", "surname": "Pirozzi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icgciot", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-10-01T00:00:00", "pubType": "proceedings", "pages": "1543-1548", "year": "2015", "issn": null, "isbn": "978-1-4673-7910-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07380711", "articleId": "12OmNyuPL30", "__typename": "AdjacentArticleType" }, "next": { "fno": "07380713", "articleId": "12OmNy87QwD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlhcc/2014/4035/0/06883063", "title": "Properties of euler diagrams and graphs in combination", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2014/06883063/12OmNvA1hE8", "parentPublication": { "id": "proceedings/vlhcc/2014/4035/0", "title": "2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2003/1988/0/19880272", "title": "Layout Metrics for Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2003/19880272/12OmNvD8RBs", "parentPublication": { "id": "proceedings/iv/2003/1988/0", "title": "Proceedings on Seventh International Conference on Information Visualization, 2003. IV 2003.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2011/1246/0/06070401", "title": "Drawing Euler diagrams with circles and ellipses", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2011/06070401/12OmNvpew49", "parentPublication": { "id": "proceedings/vlhcc/2011/1246/0", "title": "2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2007/2900/0/29000771", "title": "Evaluating the Comprehension of Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2007/29000771/12OmNxjjEhx", "parentPublication": { "id": "proceedings/iv/2007/2900/0", "title": "2007 11th International Conference Information Visualization (IV '07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2013/0369/0/06645262", "title": "Improving user comprehension of Euler diagrams", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2013/06645262/12OmNxveNOL", "parentPublication": { "id": "proceedings/vlhcc/2013/0369/0", "title": "2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2008/3268/0/3268a585", "title": "Embedding Wellformed Euler Diagrams", "doi": null, "abstractUrl": "/proceedings-article/iv/2008/3268a585/12OmNyuya3M", "parentPublication": { "id": "proceedings/iv/2008/3268/0", "title": "2008 12th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/07/ttg2011071020", "title": "Drawing Euler Diagrams with Circles: The Theory of Piercings", "doi": null, "abstractUrl": "/journal/tg/2011/07/ttg2011071020/13rRUEgarBq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2010/06/ttg2010061090", "title": "Untangling Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2010/06/ttg2010061090/13rRUILtJm3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/01/ttg2011010088", "title": "Inductively Generating Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2011/01/ttg2011010088/13rRUNvgziB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552459", "title": "<sc>SP</sc>E<sc>ULER</sc>: Semantics-preserving Euler Diagrams", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552459/1xibZ9AqsLu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqMDnV", "title": "2012 IEEE 26th International Conference on Advanced Information Networking and Applications", "acronym": "aina", "groupId": "1000008", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNAYoKwg", "doi": "10.1109/AINA.2012.73", "title": "Uncertainty in Probabilistic Trust Models", "normalizedTitle": "Uncertainty in Probabilistic Trust Models", "abstract": "Computational models of trust try to transfer the concept of trust from the real to the virtual world. While such models have been widely investigated in the past decade, the uncertainty involved in trust computation has been overlooked in the literature. In this paper, uncertainty of probabilistic trust models is quantified using confidence intervals and its factors are determined through simulation. The results confirm the importance and highlight the amount of uncertainty in the Beta and HMM (Hidden Markov Model) trust models. In addition, an uncertainty-driven method is proposed which reduces the risk involved in the trust-based utility maximization according to uncertainty.", "abstracts": [ { "abstractType": "Regular", "content": "Computational models of trust try to transfer the concept of trust from the real to the virtual world. While such models have been widely investigated in the past decade, the uncertainty involved in trust computation has been overlooked in the literature. In this paper, uncertainty of probabilistic trust models is quantified using confidence intervals and its factors are determined through simulation. The results confirm the importance and highlight the amount of uncertainty in the Beta and HMM (Hidden Markov Model) trust models. In addition, an uncertainty-driven method is proposed which reduces the risk involved in the trust-based utility maximization according to uncertainty.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Computational models of trust try to transfer the concept of trust from the real to the virtual world. While such models have been widely investigated in the past decade, the uncertainty involved in trust computation has been overlooked in the literature. In this paper, uncertainty of probabilistic trust models is quantified using confidence intervals and its factors are determined through simulation. The results confirm the importance and highlight the amount of uncertainty in the Beta and HMM (Hidden Markov Model) trust models. In addition, an uncertainty-driven method is proposed which reduces the risk involved in the trust-based utility maximization according to uncertainty.", "fno": "06184913", "keywords": [ "Data Privacy", "Hidden Markov Models", "Risk Management", "Probabilistic Trust Model", "Trust Computational Model", "Beta Trust Model", "HMM Trust Model", "Hidden Markov Model", "Uncertainty Driven Method", "Trust Based Utility Maximization", "Risk Reduction", "Hidden Markov Models", "Uncertainty", "Computational Modeling", "Stability Analysis", "History", "Mathematical Model", "Probabilistic Logic", "Probabilistic Trust Model", "Uncertainty", "Risk Reduction" ], "authors": [ { "affiliation": null, "fullName": "Sadegh Dorri Nogoorani", "givenName": "Sadegh", "surname": "Dorri Nogoorani", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Rasool Jalili", "givenName": "Rasool", "surname": "Jalili", "__typename": "ArticleAuthorType" } ], "idPrefix": "aina", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-03-01T00:00:00", "pubType": "proceedings", "pages": "511-517", "year": "2012", "issn": "1550-445X", "isbn": "978-1-4673-0714-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4651a503", "articleId": "12OmNxETajY", "__typename": "AdjacentArticleType" }, "next": { "fno": "4651a518", "articleId": "12OmNx7G5Wa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2011/4596/0/4596a336", "title": "Under Uncertainty Trust Estimation through Unknown Agents, in a Multi-valued Trust Environment", "doi": null, "abstractUrl": "/proceedings-article/ictai/2011/4596a336/12OmNARAn9R", "parentPublication": { "id": "proceedings/ictai/2011/4596/0", "title": "2011 IEEE 23rd International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2009/3801/3/3801c139", "title": "Probabilistic Relational Models with Relational Uncertainty: An Early Study in Web Page Classification", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2009/3801c139/12OmNvA1hxH", "parentPublication": { "id": "proceedings/wi-iat/2009/3801/3", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/2011/4568/0/4568a080", "title": "Uncertainty Propagation through Software Dependability Models", "doi": null, "abstractUrl": "/proceedings-article/issre/2011/4568a080/12OmNxZBSAT", "parentPublication": { "id": "proceedings/issre/2011/4568/0", "title": "2011 IEEE 22nd International Symposium on Software Reliability Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2013/3218/0/06778650", "title": "Survey of Probabilistic Graphical Models", "doi": null, "abstractUrl": "/proceedings-article/wisa/2013/06778650/12OmNz2TCvI", "parentPublication": { "id": "proceedings/wisa/2013/3218/0", "title": "2013 10th Web Information System and Application Conference (WISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2015/9618/2/9618b125", "title": "Reasoning with Trust and Uncertainty Illustration in the Internet of Things", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2015/9618b125/12OmNzBOi2a", "parentPublication": { "id": "proceedings/wi-iat/2015/9618/2", "title": "2015 IEEE / WIC / ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/passat-socialcom/2011/1931/0/06113252", "title": "A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems", "doi": null, "abstractUrl": "/proceedings-article/passat-socialcom/2011/06113252/12OmNzYwchI", "parentPublication": { "id": "proceedings/passat-socialcom/2011/1931/0", "title": "2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2010/07/ttm2010071035", "title": "Uncertainty Modeling and Reduction in MANETs", "doi": null, "abstractUrl": "/journal/tm/2010/07/ttm2010071035/13rRUwInvJY", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccairo/2018/9576/0/08698415", "title": "Qualitative Geometrical Uncertainty in a Topological Robot Localization System", "doi": null, "abstractUrl": "/proceedings-article/iccairo/2018/08698415/19wB06ZmdAQ", "parentPublication": { "id": "proceedings/iccairo/2018/9576/0", "title": "2018 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2020/06/09194322", "title": "Towards Trust-Aware Collaborative Business Processes: An Approach to Identify Uncertainty", "doi": null, "abstractUrl": "/magazine/ic/2020/06/09194322/1n0E7HwjAYw", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552465", "title": "Visualizing Uncertainty in Probabilistic Graphs with Network Hypothetical Outcome Plots (NetHOPs)", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552465/1xic9toQQrC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBk6i", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNrFkeWk", "doi": "10.1109/INFVIS.2002.1173145", "title": "Visualizing Data with Bounded Uncertainty", "normalizedTitle": "Visualizing Data with Bounded Uncertainty", "abstract": "Visualization is a powerful way to facilitate data analysis, but it is crucial that visualization systems explicitly convey the presence, nature, and degree of uncertainty to users. Otherwise, there is a danger that data will be falsely interpreted, potentially leading to inaccurate conclusions. A common method for denoting uncertainty is to use error bars or similar techniques designed to convey the degree of statistical uncertainty. While uncertainty can often be modeled statistically, a second form of uncertainty, bounded uncertainty, can also arise that has very different properties than statistical uncertainty. Error bars should not be used for bounded uncertainty because they do not convey the correct properties, so a different technique should be used instead. In this paper we describe a technique for conveying bounded uncertainty in visualizations and show how it can be applied systematically to common displays of abstract charts and graphs. Interestingly, it is not always possible to show the exact degree of uncertainty, and in some cases it can only be displayed approximately.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization is a powerful way to facilitate data analysis, but it is crucial that visualization systems explicitly convey the presence, nature, and degree of uncertainty to users. Otherwise, there is a danger that data will be falsely interpreted, potentially leading to inaccurate conclusions. A common method for denoting uncertainty is to use error bars or similar techniques designed to convey the degree of statistical uncertainty. While uncertainty can often be modeled statistically, a second form of uncertainty, bounded uncertainty, can also arise that has very different properties than statistical uncertainty. Error bars should not be used for bounded uncertainty because they do not convey the correct properties, so a different technique should be used instead. In this paper we describe a technique for conveying bounded uncertainty in visualizations and show how it can be applied systematically to common displays of abstract charts and graphs. Interestingly, it is not always possible to show the exact degree of uncertainty, and in some cases it can only be displayed approximately.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization is a powerful way to facilitate data analysis, but it is crucial that visualization systems explicitly convey the presence, nature, and degree of uncertainty to users. Otherwise, there is a danger that data will be falsely interpreted, potentially leading to inaccurate conclusions. A common method for denoting uncertainty is to use error bars or similar techniques designed to convey the degree of statistical uncertainty. While uncertainty can often be modeled statistically, a second form of uncertainty, bounded uncertainty, can also arise that has very different properties than statistical uncertainty. Error bars should not be used for bounded uncertainty because they do not convey the correct properties, so a different technique should be used instead. In this paper we describe a technique for conveying bounded uncertainty in visualizations and show how it can be applied systematically to common displays of abstract charts and graphs. Interestingly, it is not always possible to show the exact degree of uncertainty, and in some cases it can only be displayed approximately.", "fno": "17510037", "keywords": [ "Uncertainty Visualization", "Bounded Uncertainty" ], "authors": [ { "affiliation": "Stanford University", "fullName": "Chris Olston", "givenName": "Chris", "surname": "Olston", "__typename": "ArticleAuthorType" }, { "affiliation": "Palo Alto Research Center", "fullName": "Jock D. Mackinlay", "givenName": "Jock D.", "surname": "Mackinlay", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-10-01T00:00:00", "pubType": "proceedings", "pages": "37", "year": "2002", "issn": "1522-404X", "isbn": "0-7695-1751-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "17510033", "articleId": "12OmNwEJ0TU", "__typename": "AdjacentArticleType" }, "next": { "fno": "17510051", "articleId": "12OmNvzJGeF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/focs/2008/3436/0/3436a125", "title": "Degree Bounded Network Design with Metric Costs", "doi": null, "abstractUrl": "/proceedings-article/focs/2008/3436a125/12OmNqBKU1U", "parentPublication": { "id": "proceedings/focs/2008/3436/0", "title": "2008 49th Annual IEEE Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1996/3673/0/36730249", "title": "UFLOW: Visualizing Uncertainty in Fluid Flow", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1996/36730249/12OmNs59JIG", "parentPublication": { "id": "proceedings/ieee-vis/1996/3673/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1988/0852/0/00012193", "title": "Robust control of unconstrained maneuver and collision for a robot manipulator with bounded parameter uncertainty", "doi": null, "abstractUrl": "/proceedings-article/robot/1988/00012193/12OmNyoAA83", "parentPublication": { "id": "proceedings/robot/1988/0852/0", "title": "Proceedings. 1988 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192667", "title": "Visual Encodings of Temporal Uncertainty: A Comparative User Study", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192667/13rRUwjGoLH", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/04376197", "title": "Visualizing Large-Scale Uncertainty in Astrophysical Data", "doi": null, "abstractUrl": "/journal/tg/2007/06/04376197/13rRUy0qnGe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1640", "title": "Visualizing Large-Scale Uncertainty in Astrophysical Data", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1640/13rRUy3gn7p", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122526", "title": "Visualizing Flow of Uncertainty through Analytical Processes", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122526/13rRUyY28Yv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vds/2017/3185/0/08573448", "title": "Visualizing Sensor Network Coverage with Location Uncertainty", "doi": null, "abstractUrl": "/proceedings-article/vds/2017/08573448/17D45VsBU5G", "parentPublication": { "id": "proceedings/vds/2017/3185/0", "title": "2017 IEEE Visualization in Data Science (VDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08848845", "title": "Winglets: Visualizing Association with Uncertainty in Multi-class Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2020/01/08848845/1dC4K1H2UBG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis4dh/2021/1370/0/137000a012", "title": "Uncertainty-aware Topic Modeling Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis4dh/2021/137000a012/1yNiG9yU9JS", "parentPublication": { "id": "proceedings/vis4dh/2021/1370/0", "title": "2021 IEEE 6th Workshop on Visualization for the Digital Humanities (VIS4DH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqIhFP5", "title": "Information Technology and Applications, International Forum on", "acronym": "ifita", "groupId": "1002862", "volume": "1", "displayVolume": "1", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQ7FFE", "doi": "10.1109/IFITA.2009.544", "title": "Supporting Uncertainty in Indexing and Querying of Moving Objects in Networks Databases", "normalizedTitle": "Supporting Uncertainty in Indexing and Querying of Moving Objects in Networks Databases", "abstract": "In order to get more accurate movement information of moving objects, and to capture the temporal trajectory of the spatial uncertainty, This article describes the uncertain trajectory model of the moving objects in the road networks databases, and extends the structure of the MON-tree index based on the road network. The uncertain geometry between two sampling points is divided into pieces, which are stored into the uncertain area list according to time sorting. To enable them to effectively support the uncertainty of moving objects in the road network, and the probabilistic query of the uncertain region of the moving objects trajectory is carried out on this basis of them. The experiment shows that the index structure as well as the probabilistic query with a better performance and higher accuracy inquiries", "abstracts": [ { "abstractType": "Regular", "content": "In order to get more accurate movement information of moving objects, and to capture the temporal trajectory of the spatial uncertainty, This article describes the uncertain trajectory model of the moving objects in the road networks databases, and extends the structure of the MON-tree index based on the road network. The uncertain geometry between two sampling points is divided into pieces, which are stored into the uncertain area list according to time sorting. To enable them to effectively support the uncertainty of moving objects in the road network, and the probabilistic query of the uncertain region of the moving objects trajectory is carried out on this basis of them. The experiment shows that the index structure as well as the probabilistic query with a better performance and higher accuracy inquiries", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to get more accurate movement information of moving objects, and to capture the temporal trajectory of the spatial uncertainty, This article describes the uncertain trajectory model of the moving objects in the road networks databases, and extends the structure of the MON-tree index based on the road network. The uncertain geometry between two sampling points is divided into pieces, which are stored into the uncertain area list according to time sorting. To enable them to effectively support the uncertainty of moving objects in the road network, and the probabilistic query of the uncertain region of the moving objects trajectory is carried out on this basis of them. The experiment shows that the index structure as well as the probabilistic query with a better performance and higher accuracy inquiries", "fno": "3600a182", "keywords": [ "Moving Objects Databases Uncertainty Probabilistic Range Query" ], "authors": [ { "affiliation": null, "fullName": "Song Guangjun", "givenName": "Song", "surname": "Guangjun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hao Zhong-xiao", "givenName": "Hao", "surname": "Zhong-xiao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wang Lijie", "givenName": "Wang", "surname": "Lijie", "__typename": "ArticleAuthorType" } ], "idPrefix": "ifita", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-05-01T00:00:00", "pubType": "proceedings", "pages": "182-186", "year": "2009", "issn": null, "isbn": "978-0-7695-3600-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3600a178", "articleId": "12OmNB6UIbf", "__typename": "AdjacentArticleType" }, "next": { "fno": "3600a187", "articleId": "12OmNAtK4pG", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mdm/2002/1500/0/15000121", "title": "Query Processing for Moving Objects with Space-Time Grid Storage Model", "doi": null, "abstractUrl": "/proceedings-article/mdm/2002/15000121/12OmNCfSqTR", "parentPublication": { "id": "proceedings/mdm/2002/1500/0", "title": "Proceedings Third International Conference on Mobile Data Management MDM 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2012/4637/0/4637a537", "title": "Navigational Information Update Mechanism Based on Moving Objects Databases", "doi": null, "abstractUrl": "/proceedings-article/icicta/2012/4637a537/12OmNqEATaB", "parentPublication": { "id": "proceedings/icicta/2012/4637/0", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccgi/2009/3751/0/3751a007", "title": "An Efficient Index Method for Moving Objects Databases in Fixed Networks", "doi": null, "abstractUrl": "/proceedings-article/iccgi/2009/3751a007/12OmNrkBwuh", "parentPublication": { "id": "proceedings/iccgi/2009/3751/0", "title": "Computing in the Global Information Technology, International Multi-Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2011/4436/1/4436a068", "title": "DIME: Disposable Index for Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/mdm/2011/4436a068/12OmNvkplcn", "parentPublication": { "id": "proceedings/mdm/2011/4436/1", "title": "2011 IEEE 12th International Conference on Mobile Data Management", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2008/3154/0/3154a033", "title": "UTR-Tree: An Index Structure for the Full Uncertain Trajectories of Network-Constrained Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/mdm/2008/3154a033/12OmNypIYEh", "parentPublication": { "id": "proceedings/mdm/2008/3154/0", "title": "The Ninth International Conference on Mobile Data Management (mdm 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icrccs/2009/3927/0/3927a210", "title": "Scalable Processing of Continuous K-Nearest Neighbor Queries with Uncertainty in Spatio-Temporal Databases", "doi": null, "abstractUrl": "/proceedings-article/icrccs/2009/3927a210/12OmNyr8YpF", "parentPublication": { "id": "proceedings/icrccs/2009/3927/0", "title": "Research Challenges in Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csa/2008/3428/0/3428a017", "title": "Quadtree and Hash Table Based Index Structure for Indexing the Past, Present and Future Positions of Moving Objects", "doi": null, "abstractUrl": "/proceedings-article/csa/2008/3428a017/12OmNywxlSE", "parentPublication": { "id": "proceedings/csa/2008/3428/0", "title": "2008 International Symposium on Computer Science and its Applications (CSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2002/1668/0/16680698", "title": "Real-Time Traffic Updates in Moving Objects Databases", "doi": null, "abstractUrl": "/proceedings-article/dexa/2002/16680698/12OmNzgwmS2", "parentPublication": { "id": "proceedings/dexa/2002/1668/0", "title": "Proceedings. 13th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2002/10/t1124", "title": "Query Indexing and Velocity Constrained Indexing: Scalable Techniques for Continuous Queries on Moving Objects", "doi": null, "abstractUrl": "/journal/tc/2002/10/t1124/13rRUIJuxoF", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45Vu1Tya", "doi": "10.1109/BigData.2017.8257906", "title": "Collective subjective logic: Scalable uncertainty-based opinion inference", "normalizedTitle": "Collective subjective logic: Scalable uncertainty-based opinion inference", "abstract": "Subjective Logic (SL), as one of the state-of-the-art belief models, has been proposed to model an opinion that explicitly deals with its uncertainty. SL offers a variety of operators to update opinions consisting of belief, disbelief, and uncertainty. However, SL operators lack scalability to derive opinions from a large-scale network data due to the sequential procedures of combining two opinions, instead of collective procedures dealing with multiple opinions concurrently. In addition, SL's performance in predicting unknown opinions has been validated only when the uncertainty mass is sufficiently low. To enhance scalability and prediction accuracy of unknown opinions in SL, we take a hybrid approach by combining SL with Probabilistic Soft Logic (PSL). PSL provides collective reasoning with high scalability based on relationships between opinions but does not deal with uncertainty. By taking the merits of both SL and PSL, we propose a probabilistic logic algorithm, called Collective Subjective Logic (CSL) that provides high scalability and high prediction accuracy while dealing with uncertain opinions. Our proposed CSL is generic to deal with uncertain opinions with both high scalability and high prediction accuracy of unknown opinions over a large-scale network dataset. Through the extensive simulation experiments, we validated the outperformance of CSL compared against SL and PSL in terms of prediction accuracy of unknown opinions and algorithmic complexity using Epinions and two road traffic datasets.", "abstracts": [ { "abstractType": "Regular", "content": "Subjective Logic (SL), as one of the state-of-the-art belief models, has been proposed to model an opinion that explicitly deals with its uncertainty. SL offers a variety of operators to update opinions consisting of belief, disbelief, and uncertainty. However, SL operators lack scalability to derive opinions from a large-scale network data due to the sequential procedures of combining two opinions, instead of collective procedures dealing with multiple opinions concurrently. In addition, SL's performance in predicting unknown opinions has been validated only when the uncertainty mass is sufficiently low. To enhance scalability and prediction accuracy of unknown opinions in SL, we take a hybrid approach by combining SL with Probabilistic Soft Logic (PSL). PSL provides collective reasoning with high scalability based on relationships between opinions but does not deal with uncertainty. By taking the merits of both SL and PSL, we propose a probabilistic logic algorithm, called Collective Subjective Logic (CSL) that provides high scalability and high prediction accuracy while dealing with uncertain opinions. Our proposed CSL is generic to deal with uncertain opinions with both high scalability and high prediction accuracy of unknown opinions over a large-scale network dataset. Through the extensive simulation experiments, we validated the outperformance of CSL compared against SL and PSL in terms of prediction accuracy of unknown opinions and algorithmic complexity using Epinions and two road traffic datasets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Subjective Logic (SL), as one of the state-of-the-art belief models, has been proposed to model an opinion that explicitly deals with its uncertainty. SL offers a variety of operators to update opinions consisting of belief, disbelief, and uncertainty. However, SL operators lack scalability to derive opinions from a large-scale network data due to the sequential procedures of combining two opinions, instead of collective procedures dealing with multiple opinions concurrently. In addition, SL's performance in predicting unknown opinions has been validated only when the uncertainty mass is sufficiently low. To enhance scalability and prediction accuracy of unknown opinions in SL, we take a hybrid approach by combining SL with Probabilistic Soft Logic (PSL). PSL provides collective reasoning with high scalability based on relationships between opinions but does not deal with uncertainty. By taking the merits of both SL and PSL, we propose a probabilistic logic algorithm, called Collective Subjective Logic (CSL) that provides high scalability and high prediction accuracy while dealing with uncertain opinions. Our proposed CSL is generic to deal with uncertain opinions with both high scalability and high prediction accuracy of unknown opinions over a large-scale network dataset. Through the extensive simulation experiments, we validated the outperformance of CSL compared against SL and PSL in terms of prediction accuracy of unknown opinions and algorithmic complexity using Epinions and two road traffic datasets.", "fno": "08257906", "keywords": [ "Uncertainty", "Scalability", "Probabilistic Logic", "Cognition", "Prediction Algorithms", "Decision Making", "Markov Random Fields" ], "authors": [ { "affiliation": "Computer Science Department, University at Albany - SUNY, Albany, NY, USA", "fullName": "Feng Chen", "givenName": "Feng", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Science Department, University at Albany - SUNY, Albany, NY, USA", "fullName": "Chunpai Wang", "givenName": "Chunpai", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "US Army Research Laboratory, Adelphi, USA", "fullName": "Jin-Hee Cho", "givenName": "Jin-Hee", "surname": "Cho", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "7-16", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08257905", "articleId": "17D45Xi9rVR", "__typename": "AdjacentArticleType" }, "next": { "fno": "08257907", "articleId": "17D45X2fUGO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dexa/2015/7581/0/07406284", "title": "Incremental Data Uncertainty Handling Using Evidence Combination: A Case Study on Maritime Data Reasoning", "doi": null, "abstractUrl": "/proceedings-article/dexa/2015/07406284/12OmNwpXRTp", "parentPublication": { "id": "proceedings/dexa/2015/7581/0", "title": "2015 26th International Workshop on Database and Expert Systems Applications (DEXA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssiai/2018/6568/0/08470359", "title": "FUSED REASONING UNDER UNCERTAINTY FOR SOLDIER CENTRIC HUMAN-AGENT DECISION MAKING", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2018/08470359/13WBGNbHGd0", "parentPublication": { "id": "proceedings/ssiai/2018/6568/0", "title": "2018 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ci/2017/04/07516616", "title": "A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust Inference", "doi": null, "abstractUrl": "/journal/ci/2017/04/07516616/13rRUwcS1v5", "parentPublication": { "id": "trans/ci", "title": "IEEE Transactions on Computational Intelligence and AI in Games", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594905", "title": "Deep Learning Based Scalable Inference of Uncertain Opinions", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594905/17D45VtKitP", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/2.812E131", "title": "Uncertainty-Guided Transformer Reasoning for Camouflaged Object Detection", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/2.812E131/1BmHu3IcZxe", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10053625", "title": "Personalized Latent Structure Learning for Recommendation", "doi": null, "abstractUrl": "/journal/tp/5555/01/10053625/1L1HWDsHp0k", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006319", "title": "Uncertainty-Aware Opinion Inference Under Adversarial Attacks", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006319/1hJskkmpcQw", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/skg/2019/5823/0/582300a081", "title": "Efforts towards Combining Graphics, Uncertainty, and Semantics: A Survey", "doi": null, "abstractUrl": "/proceedings-article/skg/2019/582300a081/1ivtYOTaUQE", "parentPublication": { "id": "proceedings/skg/2019/5823/0", "title": "2019 15th International Conference on Semantics, Knowledge and Grids (SKG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cogmi/2020/4144/0/414400a082", "title": "On Uncertainty and Robustness in Large-Scale Intelligent Data Fusion Systems", "doi": null, "abstractUrl": "/proceedings-article/cogmi/2020/414400a082/1qyxQjrWRpu", "parentPublication": { "id": "proceedings/cogmi/2020/4144/0", "title": "2020 IEEE Second International Conference on Cognitive Machine Intelligence (CogMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2021/2856/0/285600a450", "title": "Pri-AwaRE: Tool Support for priority-aware decision-making under uncertainty", "doi": null, "abstractUrl": "/proceedings-article/re/2021/285600a450/1yDjO0fAyf6", "parentPublication": { "id": "proceedings/re/2021/2856/0", "title": "2021 IEEE 29th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }