data
dict
{ "proceeding": { "id": "12OmNxwnczj", "title": "Design Automation Conference", "acronym": "dac", "groupId": "1000196", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNBt3qmg", "doi": "10.1109/DAC.2002.1012727", "title": "Combined BEM/FEM Substrate Resistance Modeling", "normalizedTitle": "Combined BEM/FEM Substrate Resistance Modeling", "abstract": "For present-day micro-electronic designs, it is becoming ever more important to accurately model substrate coupling effects. Basically, either a Finite Element Method (FEM) or a Boundary Element Method (BEM) can be used. The FEM is the most versatile and flexible whereas the BEM is faster, but requires a stratified, layout-independent doping profile for the substrate. Thus, the BEM is unable to properly model any specific, layout-dependent doping patterns that are usually present in the top layers of the substrate, such as channel stop layers. This paper describes a way to incorporate these doping patterns into our substrate model by combining a BEM for the stratified doping profiles with a 2D FEM for the top-level, layout-dependent doping patterns, thereby achieving improved flexibility compared to BEM and improved speed compared to FEM. The method has been implemented in the SPACE layout to circuit extractor and it has been successfully verified with two other tools.", "abstracts": [ { "abstractType": "Regular", "content": "For present-day micro-electronic designs, it is becoming ever more important to accurately model substrate coupling effects. Basically, either a Finite Element Method (FEM) or a Boundary Element Method (BEM) can be used. The FEM is the most versatile and flexible whereas the BEM is faster, but requires a stratified, layout-independent doping profile for the substrate. Thus, the BEM is unable to properly model any specific, layout-dependent doping patterns that are usually present in the top layers of the substrate, such as channel stop layers. This paper describes a way to incorporate these doping patterns into our substrate model by combining a BEM for the stratified doping profiles with a 2D FEM for the top-level, layout-dependent doping patterns, thereby achieving improved flexibility compared to BEM and improved speed compared to FEM. The method has been implemented in the SPACE layout to circuit extractor and it has been successfully verified with two other tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "For present-day micro-electronic designs, it is becoming ever more important to accurately model substrate coupling effects. Basically, either a Finite Element Method (FEM) or a Boundary Element Method (BEM) can be used. The FEM is the most versatile and flexible whereas the BEM is faster, but requires a stratified, layout-independent doping profile for the substrate. Thus, the BEM is unable to properly model any specific, layout-dependent doping patterns that are usually present in the top layers of the substrate, such as channel stop layers. This paper describes a way to incorporate these doping patterns into our substrate model by combining a BEM for the stratified doping profiles with a 2D FEM for the top-level, layout-dependent doping patterns, thereby achieving improved flexibility compared to BEM and improved speed compared to FEM. The method has been implemented in the SPACE layout to circuit extractor and it has been successfully verified with two other tools.", "fno": "24020771", "keywords": [ "Substrate Noise", "Modeling", "Finite Element Method", "Boundary Element Method" ], "authors": [ { "affiliation": "Delft University of Technology, The Netherlands", "fullName": "E. Schrik", "givenName": "E.", "surname": "Schrik", "__typename": "ArticleAuthorType" }, { "affiliation": "Delft University of Technology, The Netherlands", "fullName": "N.P. van der Meijs", "givenName": "N.P. van der", "surname": "Meijs", "__typename": "ArticleAuthorType" } ], "idPrefix": "dac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-06-01T00:00:00", "pubType": "proceedings", "pages": "771", "year": "2002", "issn": null, "isbn": "1-58113-461-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24020767", "articleId": "12OmNApcuxT", "__typename": "AdjacentArticleType" }, "next": { "fno": "24020777", "articleId": "12OmNzayNca", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2010/4270/0/4270b178", "title": "Study on Acoustic Numerical Value Simulation and Reducing Noise Application of Damping Layer for Rail Wheel", "doi": null, "abstractUrl": "/proceedings-article/iccis/2010/4270b178/12OmNAYGlqO", "parentPublication": { "id": "proceedings/iccis/2010/4270/0", "title": "2010 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/1995/7213/0/00480013", "title": "Extraction of circuit models for substrate cross-talk", "doi": null, "abstractUrl": "/proceedings-article/iccad/1995/00480013/12OmNAoUT4c", "parentPublication": { "id": "proceedings/iccad/1995/7213/0", "title": "Computer-Aided Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2002/2402/0/24020767", "title": "HSpeedEx: A High-Speed Extractor for Substrate Noise Analysis in Complex Mixed-Signal SOC", "doi": null, "abstractUrl": "/proceedings-article/dac/2002/24020767/12OmNApcuxT", "parentPublication": { "id": "proceedings/dac/2002/2402/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1991/2148/0/00139751", "title": "Boundary element methods for solving Poisson equations in computer vision problems", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1991/00139751/12OmNBd9T57", "parentPublication": { "id": "proceedings/cvpr/1991/2148/0", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1999/2634/0/26340549", "title": "Substrate Modeling and Lumped Substrate Resistance Extraction for CMOS ESD/Latchup Circuit Simulation", "doi": null, "abstractUrl": "/proceedings-article/dac/1999/26340549/12OmNCcKQec", "parentPublication": { "id": "proceedings/dac/1999/2634/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167506", "title": "Comprehensive frequency-dependent substrate noise analysis using boundary element methods", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167506/12OmNrY3LBw", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167507", "title": "Theoretical and practical validation of combined BEM/FEM substrate resistance modeling", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167507/12OmNsdo6px", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558279", "title": "The Low Noise Thin-Wall Engine Component Design Based on the Combined FEM-BEM Method and Topology Optimization", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558279/12OmNx9FhPx", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/3/3336e283", "title": "Optimizing the FMM-BEM for 3-D Elastic Problem", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336e283/12OmNxecRSZ", "parentPublication": { "id": "proceedings/csse/2008/3336/3", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdee/2010/4332/0/4332a057", "title": "Mathematical Method of a New Fast BEM for 2D Potential Problems", "doi": null, "abstractUrl": "/proceedings-article/cdee/2010/4332a057/12OmNyeECuF", "parentPublication": { "id": "proceedings/cdee/2010/4332/0", "title": "Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzIUg0K", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "acronym": "iccad", "groupId": "1000151", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNsdo6px", "doi": "10.1109/ICCAD.2002.1167507", "title": "Theoretical and practical validation of combined BEM/FEM substrate resistance modeling", "normalizedTitle": "Theoretical and practical validation of combined BEM/FEM substrate resistance modeling", "abstract": "In mixed-signal designs, substrate noise originating from the digital part can seriously influence the functionality of the analog part. As such, accurately modeling the properties of the substrate as a noise-propagator is becoming ever more important. A model can be obtained through the finite element method (FEM) or the boundary element method (BEM). The FEM performs a full 3D discretization of the substrate, which makes this method very accurate and flexible but also slow. The BEM only discretizes the contact areas on the boundary of the substrate, which makes it less flexible, but significantly faster. A combination between BEM and FEM can be efficient when we need flexibility and speed at the same time. This paper briefly describes the BEM and the FEM and their combination, but mainly concentrates on the theoretical validation of the combined method and the experimental verification through implementation in the SPACE layout to circuit extractor and comparison with commercial BEM and FEM tools.", "abstracts": [ { "abstractType": "Regular", "content": "In mixed-signal designs, substrate noise originating from the digital part can seriously influence the functionality of the analog part. As such, accurately modeling the properties of the substrate as a noise-propagator is becoming ever more important. A model can be obtained through the finite element method (FEM) or the boundary element method (BEM). The FEM performs a full 3D discretization of the substrate, which makes this method very accurate and flexible but also slow. The BEM only discretizes the contact areas on the boundary of the substrate, which makes it less flexible, but significantly faster. A combination between BEM and FEM can be efficient when we need flexibility and speed at the same time. This paper briefly describes the BEM and the FEM and their combination, but mainly concentrates on the theoretical validation of the combined method and the experimental verification through implementation in the SPACE layout to circuit extractor and comparison with commercial BEM and FEM tools.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In mixed-signal designs, substrate noise originating from the digital part can seriously influence the functionality of the analog part. As such, accurately modeling the properties of the substrate as a noise-propagator is becoming ever more important. A model can be obtained through the finite element method (FEM) or the boundary element method (BEM). The FEM performs a full 3D discretization of the substrate, which makes this method very accurate and flexible but also slow. The BEM only discretizes the contact areas on the boundary of the substrate, which makes it less flexible, but significantly faster. A combination between BEM and FEM can be efficient when we need flexibility and speed at the same time. This paper briefly describes the BEM and the FEM and their combination, but mainly concentrates on the theoretical validation of the combined method and the experimental verification through implementation in the SPACE layout to circuit extractor and comparison with commercial BEM and FEM tools.", "fno": "01167507", "keywords": [ "Finite Element Analysis", "Boundary Elements Methods", "Integrated Circuit Modelling", "Electric Resistance", "Integrated Circuit Noise", "Computational Complexity", "Integrated Circuit Layout", "Circuit Layout CAD", "Combined BEM FEM Substrate Resistance Modeling", "Mixed Signal Designs", "Digital Part Substrate Noise", "Analog Part Functionality", "Substrate Modeling", "Noise Propagator", "Finite Element Method", "Boundary Element Method", "3 D Substrate Discretization", "Boundary Contact Areas Discretization", "Model Flexibility", "Model Speed", "SPACE Layout To Circuit Extractor", "FEM Tools", "BEM Tools", "Circuit Noise", "Semiconductor Process Modeling", "Noise Figure", "Doping", "Finite Element Methods", "Boundary Element Methods", "Circuits And Systems", "Fluctuations", "Circuit Optimization", "Convergence" ], "authors": [ { "affiliation": "DIMES, Delft Univ. of Technol., Netherlands", "fullName": "E. Schrik", "givenName": "E.", "surname": "Schrik", "__typename": "ArticleAuthorType" }, { "affiliation": "DIMES, Delft Univ. of Technol., Netherlands", "fullName": "P.M. Dewilde", "givenName": "P.M.", "surname": "Dewilde", "__typename": "ArticleAuthorType" }, { "affiliation": "DIMES, Delft Univ. of Technol., Netherlands", "fullName": "N.P. van der Meijs", "givenName": "N.P.", "surname": "van der Meijs", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccad", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-03-01T00:00:00", "pubType": "proceedings", "pages": "10,11,12,13,14,15", "year": "2002", "issn": "1092-3152", "isbn": "0-7803-7607-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "01167506", "articleId": "12OmNrY3LBw", "__typename": "AdjacentArticleType" }, "next": { "fno": "01167508", "articleId": "12OmNAkWviF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccad/1995/7213/0/00480013", "title": "Extraction of circuit models for substrate cross-talk", "doi": null, "abstractUrl": "/proceedings-article/iccad/1995/00480013/12OmNAoUT4c", "parentPublication": { "id": "proceedings/iccad/1995/7213/0", "title": "Computer-Aided Design, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2002/2402/0/24020767", "title": "HSpeedEx: A High-Speed Extractor for Substrate Noise Analysis in Complex Mixed-Signal SOC", "doi": null, "abstractUrl": "/proceedings-article/dac/2002/24020767/12OmNApcuxT", "parentPublication": { "id": "proceedings/dac/2002/2402/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2009/2353/0/04959574", "title": "Design of large planar diaphragm incorporating multiple vibrators for sound directivity control via FEM and BEM", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04959574/12OmNBSSVk0", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1991/2148/0/00139751", "title": "Boundary element methods for solving Poisson equations in computer vision problems", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1991/00139751/12OmNBd9T57", "parentPublication": { "id": "proceedings/cvpr/1991/2148/0", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2002/2402/0/24020771", "title": "Combined BEM/FEM Substrate Resistance Modeling", "doi": null, "abstractUrl": "/proceedings-article/dac/2002/24020771/12OmNBt3qmg", "parentPublication": { "id": "proceedings/dac/2002/2402/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167506", "title": "Comprehensive frequency-dependent substrate noise analysis using boundary element methods", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167506/12OmNrY3LBw", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558279", "title": "The Low Noise Thin-Wall Engine Component Design Based on the Combined FEM-BEM Method and Topology Optimization", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558279/12OmNx9FhPx", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/3/3336e283", "title": "Optimizing the FMM-BEM for 3-D Elastic Problem", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336e283/12OmNxecRSZ", "parentPublication": { "id": "proceedings/csse/2008/3336/3", "title": "Computer Science and Software Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdee/2010/4332/0/4332a057", "title": "Mathematical Method of a New Fast BEM for 2D Potential Problems", "doi": null, "abstractUrl": "/proceedings-article/cdee/2010/4332a057/12OmNyeECuF", "parentPublication": { "id": "proceedings/cdee/2010/4332/0", "title": "Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2005/07/01498837", "title": "Accurate prediction of substrate parasitics in heavily doped CMOS processes using a calibrated boundary element solver", "doi": null, "abstractUrl": "/journal/si/2005/07/01498837/13rRUxjyX1C", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqBtj7R", "title": "2015 Eighth International Conference on Internet Computing for Science and Engineering (ICICSE)", "acronym": "icicse", "groupId": "1001756", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNvlPkFo", "doi": "10.1109/ICICSE.2015.24", "title": "Review of Analytical Modeling and Computational Solutions for Thermo-electrostatics Effects of Slender Bodies", "normalizedTitle": "Review of Analytical Modeling and Computational Solutions for Thermo-electrostatics Effects of Slender Bodies", "abstract": "Analysis method and computational solutions for thermo-and electrostatics effects of slender bodies often using multi-scale modeling, molecular dynamic simulation and data visualization technique. In the present work, we conduct a review of applying analytical methods such as BEM and FEM and molecular dynamics and computational methodologies to model the thermal and electrostatics effects on the slender body. A molecular dynamics simulation is employed to obtain logical relationships at nano-level in the modeling and simulation. The simulation is conducted on a cloud-based computing system in a heterogeneous computational environment. It helps overcome the technical challenges cause by multiple-scale physics model, and both computational and data intensive simulations.", "abstracts": [ { "abstractType": "Regular", "content": "Analysis method and computational solutions for thermo-and electrostatics effects of slender bodies often using multi-scale modeling, molecular dynamic simulation and data visualization technique. In the present work, we conduct a review of applying analytical methods such as BEM and FEM and molecular dynamics and computational methodologies to model the thermal and electrostatics effects on the slender body. A molecular dynamics simulation is employed to obtain logical relationships at nano-level in the modeling and simulation. The simulation is conducted on a cloud-based computing system in a heterogeneous computational environment. It helps overcome the technical challenges cause by multiple-scale physics model, and both computational and data intensive simulations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Analysis method and computational solutions for thermo-and electrostatics effects of slender bodies often using multi-scale modeling, molecular dynamic simulation and data visualization technique. In the present work, we conduct a review of applying analytical methods such as BEM and FEM and molecular dynamics and computational methodologies to model the thermal and electrostatics effects on the slender body. A molecular dynamics simulation is employed to obtain logical relationships at nano-level in the modeling and simulation. The simulation is conducted on a cloud-based computing system in a heterogeneous computational environment. It helps overcome the technical challenges cause by multiple-scale physics model, and both computational and data intensive simulations.", "fno": "0454a079", "keywords": [ "Computational Modeling", "Finite Element Analysis", "Numerical Models", "Biological System Modeling", "Analytical Models", "Integrated Circuit Modeling", "Object Oriented Modeling", "Cloud Computing", "Nano Scale", "Finite Element", "Boundary Element", "Molecular Dynamics", "FEM", "BEM", "MD" ], "authors": [ { "affiliation": null, "fullName": "Hongsheng Wang", "givenName": "Hongsheng", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhenghao Sun", "givenName": "Zhenghao", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chongdao Wang", "givenName": "Chongdao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qun Hao", "givenName": "Qun", "surname": "Hao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jun Ni", "givenName": "Jun", "surname": "Ni", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-11-01T00:00:00", "pubType": "proceedings", "pages": "79-82", "year": "2015", "issn": null, "isbn": "978-1-5090-0454-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0454a074", "articleId": "12OmNzzfTms", "__typename": "AdjacentArticleType" }, "next": { "fno": "0454a083", "articleId": "12OmNrnJ6Vm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2004/8788/0/87880235", "title": "Augmented Reality with Tangible Auto-Fabricated Models for Molecular Biology Applications", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2004/87880235/12OmNANkoe2", "parentPublication": { "id": "proceedings/ieee-vis/2004/8788/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2017/0958/0/0958a338", "title": "Practical Performance Models for High-Order CFD Simulation", "doi": null, "abstractUrl": "/proceedings-article/cit/2017/0958a338/12OmNvq5jx5", "parentPublication": { "id": "proceedings/cit/2017/0958/0", "title": "2017 IEEE International Conference on Computer and Information Technology (CIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isdea/2014/4261/0/4261b092", "title": "The Structure Optimization of the Siphonic Bedpan's Flow Channel Based on the Numerical Simulation Technology", "doi": null, "abstractUrl": "/proceedings-article/isdea/2014/4261b092/12OmNwB2dVx", "parentPublication": { "id": "proceedings/isdea/2014/4261/0", "title": "2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/2002/7607/0/01167573", "title": "Fast methods for simulation of biomolecule electrostatics", "doi": null, "abstractUrl": "/proceedings-article/iccad/2002/01167573/12OmNwlZu55", "parentPublication": { "id": "proceedings/iccad/2002/7607/0", "title": "2002 IEEE/ACM International Conference on Computer Aided Design (ICCAD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2016/2140/0/2140a854", "title": "Petascale Local Time Stepping for the ADER-DG Finite Element Method", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2016/2140a854/12OmNyQ7FTo", "parentPublication": { "id": "proceedings/ipdps/2016/2140/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1994/6240/0/00324012", "title": "Global methods for simulating contacting flexible bodies", "doi": null, "abstractUrl": "/proceedings-article/ca/1994/00324012/12OmNzahbS3", "parentPublication": { "id": "proceedings/ca/1994/6240/0", "title": "Proceedings of Computer Animation '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/03/ttb2013030799", "title": "A New Approach to Implement Absorbing Boundary Condition in Biomolecular Electrostatics", "doi": null, "abstractUrl": "/journal/tb/2013/03/ttb2013030799/13rRUx0xPgH", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2022/8106/0/810600a402", "title": "Next-Generation Local Time Stepping for the ADER-DG Finite Element Method", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2022/810600a402/1F1VYuhfeXC", "parentPublication": { "id": "proceedings/ipdps/2022/8106/0", "title": "2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeas/2020/9272/0/927200a093", "title": "Optimal Design of Composite Overwrapped Pressure Vessel for Space Application Based on Grid Theory Calculation and Numerical Simulation", "doi": null, "abstractUrl": "/proceedings-article/icmeas/2020/927200a093/1rsiFs5LPri", "parentPublication": { "id": "proceedings/icmeas/2020/9272/0", "title": "2020 6th International Conference on Mechanical Engineering and Automation Science (ICMEAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a999", "title": "Failure analysis of die-casting mold ejector rod based on eigenvalue buckling theory", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a999/1rvCCocUPIc", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRcr", "title": "Intelligent Computing and Cognitive Informatics, International Conference on", "acronym": "icicci", "groupId": "1800127", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNxjBfjY", "doi": "10.1109/ICICCI.2010.99", "title": "Simulation for Cutting Deformable Model Based on X-FEM", "normalizedTitle": "Simulation for Cutting Deformable Model Based on X-FEM", "abstract": "An extended finite element simulation (X-FEM) framework for cutting models is presented. Based on the existing work, a simplified approach to deal with the multiple cuts in a element is proposed. Meanwhile, the simulating method of cutting large deformation models is expressed for the application of computer graphics and virtual reality. Other related issues are also discussion, such as the mass matrix calculation and the approximation function of cutting elements. Experiments prove that the proposed method can effectively improve the efficiency and realistic of the cut simulation in this paper.", "abstracts": [ { "abstractType": "Regular", "content": "An extended finite element simulation (X-FEM) framework for cutting models is presented. Based on the existing work, a simplified approach to deal with the multiple cuts in a element is proposed. Meanwhile, the simulating method of cutting large deformation models is expressed for the application of computer graphics and virtual reality. Other related issues are also discussion, such as the mass matrix calculation and the approximation function of cutting elements. Experiments prove that the proposed method can effectively improve the efficiency and realistic of the cut simulation in this paper.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An extended finite element simulation (X-FEM) framework for cutting models is presented. Based on the existing work, a simplified approach to deal with the multiple cuts in a element is proposed. Meanwhile, the simulating method of cutting large deformation models is expressed for the application of computer graphics and virtual reality. Other related issues are also discussion, such as the mass matrix calculation and the approximation function of cutting elements. Experiments prove that the proposed method can effectively improve the efficiency and realistic of the cut simulation in this paper.", "fno": "4014a436", "keywords": [ "Physically Based Simulation", "Extended Finite Element Method", "Cutting Model", "Without Remeshing" ], "authors": [ { "affiliation": null, "fullName": "Song Chao", "givenName": "Song", "surname": "Chao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icicci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-06-01T00:00:00", "pubType": "proceedings", "pages": "436-439", "year": "2010", "issn": null, "isbn": "978-0-7695-4014-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4014a432", "articleId": "12OmNzlD9cp", "__typename": "AdjacentArticleType" }, "next": { "fno": "4014a440", "articleId": "12OmNCu4new", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2010/4077/2/4077d130", "title": "Research on Cutting Temperature Using FEM Method while Machining Titanium Alloy TC4", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077d130/12OmNAnuTlC", "parentPublication": { "id": "proceedings/icicta/2010/4077/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/2/3804b224", "title": "Simulation of Cutting Force Based on Software Deform", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804b224/12OmNBBhN5s", "parentPublication": { "id": "proceedings/icicta/2009/3804/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/3/3583c083", "title": "FEM Analysis and Optimization of Process Parameters in Precision Bar Cutting Process", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583c083/12OmNCmGNMe", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/focs/2012/4874/0/4874a571", "title": "The Cutting Plane Method Is Polynomial for Perfect Matchings", "doi": null, "abstractUrl": "/proceedings-article/focs/2012/4874a571/12OmNqHqSAj", "parentPublication": { "id": "proceedings/focs/2012/4874/0", "title": "2012 IEEE 53rd Annual Symposium on Foundations of Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031f186", "title": "Dynamics Simulation Study of One-Blade Cutting Sugarcane Process", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031f186/12OmNwDACB3", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/3/3804c341", "title": "Finite Element Simulation of Cutting Temperature Field during High Speed Machining Hardened Steel Based on ABAQUS", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804c341/12OmNy5hRg6", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2015/7644/0/7644a426", "title": "Finite Element Analysis of Milling Parameters for Metallurgy Saw Blade Cutting Process", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a426/12OmNywxlIN", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2009/02/mcg2009020061", "title": "Stable Cutting of Deformable Objects in Virtual Environments Using XFEM", "doi": null, "abstractUrl": "/magazine/cg/2009/02/mcg2009020061/13rRUy0ZzUX", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/11/ttg2011111663", "title": "A Hexahedral Multigrid Approach for Simulating Cuts in Deformable Objects", "doi": null, "abstractUrl": "/journal/tg/2011/11/ttg2011111663/13rRUy0qnGi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hipc/2022/9423/0/942300a198", "title": "Precise Parallel FEM-based Interactive Cutting Simulation of Deformable Bodies", "doi": null, "abstractUrl": "/proceedings-article/hipc/2022/942300a198/1MEXgNeZrhu", "parentPublication": { "id": "proceedings/hipc/2022/9423/0", "title": "2022 IEEE 29th International Conference on High Performance Computing, Data, and Analytics (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNB6UI8L", "title": "2009 International Conference on Computer Modeling and Simulation. ICCMS 2009", "acronym": "iccms", "groupId": "1002645", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNyshmJ6", "doi": "10.1109/ICCMS.2009.23", "title": "Application Research on MTC Technology in Casting Based on FEM Simulation", "normalizedTitle": "Application Research on MTC Technology in Casting Based on FEM Simulation", "abstract": "Application research on Mold Temperature Control (MTC) technology in casting was done based on Finite Element Method (FEM). A MTC forming process is presented here. The mathematical models of numerical computation are established, including heat transfer differential equation and its equivalent integral formulae and FEM combined equations, boundary conditions, processing method of MTC units. The numerical computational software was developed to implement the numerical model, and a control algorithm which is closer to the real process since the MTC units can be automatic controlled in it was presented. The 3D transient heat transfer analyses of three MTC cases were done using the developed software. The computational results indicate that in the second case, the solid-liquid interface keeps near-planar, and the growth velocity of the solid-liquid interface is greater than the first case, performing better than the others. Additionally, the relative errors between the numerical and experimental data are less than 8 percent. Thereby, the MTC technology is propitious to improve the forming quality and efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Application research on Mold Temperature Control (MTC) technology in casting was done based on Finite Element Method (FEM). A MTC forming process is presented here. The mathematical models of numerical computation are established, including heat transfer differential equation and its equivalent integral formulae and FEM combined equations, boundary conditions, processing method of MTC units. The numerical computational software was developed to implement the numerical model, and a control algorithm which is closer to the real process since the MTC units can be automatic controlled in it was presented. The 3D transient heat transfer analyses of three MTC cases were done using the developed software. The computational results indicate that in the second case, the solid-liquid interface keeps near-planar, and the growth velocity of the solid-liquid interface is greater than the first case, performing better than the others. Additionally, the relative errors between the numerical and experimental data are less than 8 percent. Thereby, the MTC technology is propitious to improve the forming quality and efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Application research on Mold Temperature Control (MTC) technology in casting was done based on Finite Element Method (FEM). A MTC forming process is presented here. The mathematical models of numerical computation are established, including heat transfer differential equation and its equivalent integral formulae and FEM combined equations, boundary conditions, processing method of MTC units. The numerical computational software was developed to implement the numerical model, and a control algorithm which is closer to the real process since the MTC units can be automatic controlled in it was presented. The 3D transient heat transfer analyses of three MTC cases were done using the developed software. The computational results indicate that in the second case, the solid-liquid interface keeps near-planar, and the growth velocity of the solid-liquid interface is greater than the first case, performing better than the others. Additionally, the relative errors between the numerical and experimental data are less than 8 percent. Thereby, the MTC technology is propitious to improve the forming quality and efficiency.", "fno": "3562a299", "keywords": [ "Mold Temperature Control", "Finite Element Method", "Casting", "Numerical Simulation" ], "authors": [ { "affiliation": null, "fullName": "D.D. You", "givenName": "D.D.", "surname": "You", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "M. Shao", "givenName": "M.", "surname": "Shao", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccms", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-02-01T00:00:00", "pubType": "proceedings", "pages": "299-302", "year": "2009", "issn": null, "isbn": "978-0-7695-3562-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3562a366", "articleId": "12OmNzC5SCq", "__typename": "AdjacentArticleType" }, "next": { "fno": "3562a303", "articleId": "12OmNB0nWhL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iscsct/2008/3498/2/3498b259", "title": "Research and Development of MFNS Software Based on Software Engineering", "doi": null, "abstractUrl": "/proceedings-article/iscsct/2008/3498b259/12OmNAJm0mh", "parentPublication": { "id": "proceedings/iscsct/2008/3498/1", "title": "2008 International Symposium on Computer Science and Computational Technology (ISCSCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/1/4077a369", "title": "A Study on Mechanical Properties of High-Speed Rotor Plate Based on Finite Element Method (FEM)", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077a369/12OmNAYoKrd", "parentPublication": { "id": "proceedings/icicta/2010/4077/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/2002/2402/0/24020771", "title": "Combined BEM/FEM Substrate Resistance Modeling", "doi": null, "abstractUrl": "/proceedings-article/dac/2002/24020771/12OmNBt3qmg", "parentPublication": { "id": "proceedings/dac/2002/2402/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2011/4455/0/4455a316", "title": "Computational Prediction Model of Macrosegregation in Continuously Casting Steel Blooms", "doi": null, "abstractUrl": "/proceedings-article/icdma/2011/4455a316/12OmNxX3uzX", "parentPublication": { "id": "proceedings/icdma/2011/4455/0", "title": "2011 Second International Conference on Digital Manufacturing & Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b385", "title": "Study on Temperature Field and Thermal Deformation of Roll Sleeve in Twin-Roll Strip Casting", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b385/12OmNxisQVr", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b279", "title": "Numerical Simulation on Solidification and Heat-Transfer of Continuous Casting of Thin Slab", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b279/12OmNy3iFjU", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aici/2010/4225/1/4225a091", "title": "Visual Numerical Simulation of Turning Machining Chip Formation", "doi": null, "abstractUrl": "/proceedings-article/aici/2010/4225a091/12OmNyS6RB3", "parentPublication": { "id": "proceedings/aici/2010/4225/1", "title": "Artificial Intelligence and Computational Intelligence, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2012/1985/0/06258073", "title": "Simulation Analysis for Peak Pressure of Shock Wave Based on Lax-Friedrichs Method", "doi": null, "abstractUrl": "/proceedings-article/icic/2012/06258073/12OmNym2bPP", "parentPublication": { "id": "proceedings/icic/2012/1985/0", "title": "2012 Fifth International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2006/2751/0/04041273", "title": "GSGCP-FEM: A General Service-Oriented Grid Computing Platform for FEM-Based Simulations", "doi": null, "abstractUrl": "/proceedings-article/apscc/2006/04041273/12OmNzVoBKW", "parentPublication": { "id": "proceedings/apscc/2006/2751/0", "title": "2006 IEEE Asia-Pacific Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2018/9120/0/08612800", "title": "Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate Monitoring", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2018/08612800/17D45Vu1Tyg", "parentPublication": { "id": "proceedings/aiccsa/2018/9120/0", "title": "2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzw8jgY", "title": "2006 IEEE Asia-Pacific Conference on Services Computing", "acronym": "apscc", "groupId": "1001486", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzVoBKW", "doi": "10.1109/APSCC.2006.64", "title": "GSGCP-FEM: A General Service-Oriented Grid Computing Platform for FEM-Based Simulations", "normalizedTitle": "GSGCP-FEM: A General Service-Oriented Grid Computing Platform for FEM-Based Simulations", "abstract": "Finite element method (FEM)-based scientific numerical simulations are often computing-extensive and grid platform can speed up the simulation progress significantly. However, the coupling of FEM-based simulation tasks with grid platform isn't so straightforward. Adopting the service-oriented architecture (SOA), we develop a general service-oriented grid computing platform for FEM-based simulations (GSGCP-FEM). GSGCP-FEM provides users with the ability to make a general FEM-based simulation to be service-oriented. Basing on the services provided by GSGCP-FEM and grid middleware, users can deploy new scientific simulation applications easily. In this paper, we explain the design, architecture, and implementation of GSGCP-FEM in detail. We also deploy two practical applications based on GSGCP-FEM to demonstrate its usefulness", "abstracts": [ { "abstractType": "Regular", "content": "Finite element method (FEM)-based scientific numerical simulations are often computing-extensive and grid platform can speed up the simulation progress significantly. However, the coupling of FEM-based simulation tasks with grid platform isn't so straightforward. Adopting the service-oriented architecture (SOA), we develop a general service-oriented grid computing platform for FEM-based simulations (GSGCP-FEM). GSGCP-FEM provides users with the ability to make a general FEM-based simulation to be service-oriented. Basing on the services provided by GSGCP-FEM and grid middleware, users can deploy new scientific simulation applications easily. In this paper, we explain the design, architecture, and implementation of GSGCP-FEM in detail. We also deploy two practical applications based on GSGCP-FEM to demonstrate its usefulness", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Finite element method (FEM)-based scientific numerical simulations are often computing-extensive and grid platform can speed up the simulation progress significantly. However, the coupling of FEM-based simulation tasks with grid platform isn't so straightforward. Adopting the service-oriented architecture (SOA), we develop a general service-oriented grid computing platform for FEM-based simulations (GSGCP-FEM). GSGCP-FEM provides users with the ability to make a general FEM-based simulation to be service-oriented. Basing on the services provided by GSGCP-FEM and grid middleware, users can deploy new scientific simulation applications easily. In this paper, we explain the design, architecture, and implementation of GSGCP-FEM in detail. We also deploy two practical applications based on GSGCP-FEM to demonstrate its usefulness", "fno": "04041273", "keywords": [ "Finite Element Analysis", "Grid Computing", "Middleware", "Software Architecture", "GSGCP FEM", "General Service Oriented Grid Computing Platform", "Finite Element Method", "Scientific Numerical Simulations", "Grid Platform", "Service Oriented Architecture", "FEM Based Simulation", "Grid Middleware", "Grid Computing", "Computational Modeling", "Service Oriented Architecture", "Numerical Simulation", "Web Services", "Finite Element Methods", "Computer Simulation", "Computer Networks", "Computer Architecture", "Circuit Simulation" ], "authors": [ { "affiliation": "South China University of Technology, China", "fullName": "Kejing He", "givenName": "Kejing", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "South China University of Technology, China", "fullName": "Shoubin Dong", "givenName": "Shoubin", "surname": "Dong", "__typename": "ArticleAuthorType" }, { "affiliation": "South China University of Technology, China", "fullName": "Jianfei He", "givenName": "Jianfei", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "South China University of Technology, China", "fullName": "Liqun Tang", "givenName": "Liqun", "surname": "Tang", "__typename": "ArticleAuthorType" } ], "idPrefix": "apscc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "458-465", "year": "2006", "issn": null, "isbn": "0-7695-2751-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27510451", "articleId": "12OmNA1DMnL", "__typename": "AdjacentArticleType" }, "next": { "fno": "27510466", "articleId": "12OmNAlvI2A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/paciia/2008/3490/1/3490a207", "title": "A Security Architecture for Grid-Based Distributed Simulation Platform", "doi": null, "abstractUrl": "/proceedings-article/paciia/2008/3490a207/12OmNBhZ4jK", "parentPublication": { "id": "proceedings/paciia/2008/3490/1", "title": "Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ams/2009/3648/0/3648a584", "title": "PGS: Pervasive Grid Simulator Library", "doi": null, "abstractUrl": "/proceedings-article/ams/2009/3648a584/12OmNC8dghR", "parentPublication": { "id": "proceedings/ams/2009/3648/0", "title": "Asia International Conference on Modelling & Simulation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcc/2008/3449/0/3449a695", "title": "The Simulation of MSC EASY5 Model Based on the Grid", "doi": null, "abstractUrl": "/proceedings-article/gcc/2008/3449a695/12OmNCf1Dts", "parentPublication": { "id": "proceedings/gcc/2008/3449/0", "title": "2008 Seventh International Conference on Grid and Cooperative Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2012/4691/0/4691a873", "title": "Goal-Directed Grid-Enabled Computing for Legacy Simulations", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2012/4691a873/12OmNCga1OO", "parentPublication": { "id": "proceedings/ccgrid/2012/4691/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2009/3900/0/3900a716", "title": "Towards Hybrid Grid Infrastructure for Large Simulations", "doi": null, "abstractUrl": "/proceedings-article/icpads/2009/3900a716/12OmNqNos9h", "parentPublication": { "id": "proceedings/icpads/2009/3900/0", "title": "Parallel and Distributed Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cscwd/2005/0002/1/01504108", "title": "Research on grid-based cooperative platform", "doi": null, "abstractUrl": "/proceedings-article/cscwd/2005/01504108/12OmNwMFMkB", "parentPublication": { "id": "proceedings/cscwd/2005/0002/1", "title": "International Conference on Computer Supported Cooperative Work in Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2010/3962/3/3962e685", "title": "Study on Virtualization-Based Simulation Grid", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e685/12OmNyUFfRx", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2006/2751/0/27510411", "title": "Research on Grid-Based Traffic Simulation Platform", "doi": null, "abstractUrl": "/proceedings-article/apscc/2006/27510411/12OmNz5s0Qo", "parentPublication": { "id": "proceedings/apscc/2006/2751/0", "title": "2006 IEEE Asia-Pacific Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2008/3523/0/3523a557", "title": "Decentralized Dynamic Resource Allocation for Workflows in Grid Environments", "doi": null, "abstractUrl": "/proceedings-article/synasc/2008/3523a557/12OmNzUxOi2", "parentPublication": { "id": "proceedings/synasc/2008/3523/0", "title": "2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933623", "title": "Point Movement in a DSL for Higher-Order FEM Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933623/1fTgIlL5vdS", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy2agRS", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "acronym": "cad-graphics", "groupId": "1001488", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwncAi", "doi": "10.1109/CADGraphics.2013.15", "title": "Fitting Multiple Curves to Point Clouds with Complicated Topological Structures", "normalizedTitle": "Fitting Multiple Curves to Point Clouds with Complicated Topological Structures", "abstract": "We present an automatic method for fitting multiple B-spline curves to unorganized planar points. The method works on point clouds which have complicated topological structures and a single curve is insufficient for fitting the shape. A divide-and-merge algorithm is developed for dividing the unorganized data points into several groups while each group represents a smooth curve. Each point group is then fitted with a B-spline curve by the SDM method. Our algorithm also sets up automatically the control polygon of initial B-spline curves. Experiments demonstrate the capability of the presented algorithm in accurate reconstruction of topological structures of point clouds.", "abstracts": [ { "abstractType": "Regular", "content": "We present an automatic method for fitting multiple B-spline curves to unorganized planar points. The method works on point clouds which have complicated topological structures and a single curve is insufficient for fitting the shape. A divide-and-merge algorithm is developed for dividing the unorganized data points into several groups while each group represents a smooth curve. Each point group is then fitted with a B-spline curve by the SDM method. Our algorithm also sets up automatically the control polygon of initial B-spline curves. Experiments demonstrate the capability of the presented algorithm in accurate reconstruction of topological structures of point clouds.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an automatic method for fitting multiple B-spline curves to unorganized planar points. The method works on point clouds which have complicated topological structures and a single curve is insufficient for fitting the shape. A divide-and-merge algorithm is developed for dividing the unorganized data points into several groups while each group represents a smooth curve. Each point group is then fitted with a B-spline curve by the SDM method. Our algorithm also sets up automatically the control polygon of initial B-spline curves. Experiments demonstrate the capability of the presented algorithm in accurate reconstruction of topological structures of point clouds.", "fno": "06814978", "keywords": [ "Principal Component Analysis", "Splines Mathematics", "Skeleton", "Shape", "Noise", "Global Communication", "Merging", "Squared Distance Minimization", "Point Cloud", "Curve Fitting", "B Spline Curve" ], "authors": [ { "affiliation": null, "fullName": "Dongfang Zhu", "givenName": "Dongfang", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pengbo Bo", "givenName": "Pengbo", "surname": "Bo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yuanfeng Zhou", "givenName": "Yuanfeng", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Caiming Zhang", "givenName": "Caiming", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kuanquan Wang", "givenName": "Kuanquan", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cad-graphics", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2013-11-01T00:00:00", "pubType": "proceedings", "pages": "60-67", "year": "2013", "issn": null, "isbn": "978-1-4799-2576-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06814977", "articleId": "12OmNrHB1Rs", "__typename": "AdjacentArticleType" }, "next": { "fno": "06814979", "articleId": "12OmNButq96", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cadcg/2005/2473/0/01604613", "title": "A fitting approach with dynamic algebraic spline curves", "doi": null, "abstractUrl": "/proceedings-article/cadcg/2005/01604613/12OmNAoUSZM", "parentPublication": { "id": "proceedings/cadcg/2005/2473/0", "title": "Proceedings. Ninth International Conference on Computer Aided Design and Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/1/3682a549", "title": "Two Kinds of Trigonometric Spline Curves with Shape Parameter", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682a549/12OmNBNM8XZ", "parentPublication": { "id": "proceedings/esiat/2009/3682/1", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a252", "title": "An Extension Algorithm for Ball B-Spline Curves with G2 Continuity", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a252/12OmNC8MsKH", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2017/2089/0/2089a126", "title": "Scattered Data Points Fitting Using Ball B-Spline Curves Based on Particle Swarm Optimization", "doi": null, "abstractUrl": "/proceedings-article/cw/2017/2089a126/12OmNCga1Qh", "parentPublication": { "id": "proceedings/cw/2017/2089/0", "title": "2017 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2012/1985/0/06258061", "title": "The Research of the Approximate Algorithm Based on Cubic B-spline Curves", "doi": null, "abstractUrl": "/proceedings-article/icic/2012/06258061/12OmNxTmHM7", "parentPublication": { "id": "proceedings/icic/2012/1985/0", "title": "2012 Fifth International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2015/9403/0/9403a086", "title": "Modelling and Simulation of Weft Knitted Fabric Based on Ball B-Spline Curves and Hooke's Law", "doi": null, "abstractUrl": "/proceedings-article/cw/2015/9403a086/12OmNxjBfkq", "parentPublication": { "id": "proceedings/cw/2015/9403/0", "title": "2015 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/1/3682a553", "title": "Curves that Shape Can Adjust", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682a553/12OmNy68EBx", "parentPublication": { "id": "proceedings/esiat/2009/3682/1", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-cg/2005/2473/0/24730046", "title": "A Fitting Approach with Dynamic Algebraic Spline Curves", "doi": null, "abstractUrl": "/proceedings-article/cad-cg/2005/24730046/12OmNyKa5Y1", "parentPublication": { "id": "proceedings/cad-cg/2005/2473/0", "title": "Ninth International Conference on Computer Aided Design and Computer Graphics (CAD-CG'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2016/4400/0/4400a209", "title": "G2 Blending of Generalized B-Spline Curves and Surfaces by Using Dual Basis", "doi": null, "abstractUrl": "/proceedings-article/icdh/2016/4400a209/12OmNzRZpVS", "parentPublication": { "id": "proceedings/icdh/2016/4400/0", "title": "2016 6th International Conference on Digital Home (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815018", "title": "G2-Continuity Blending of Ball B-Spline Curve Using Extension", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815018/12OmNzX6coq", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNC1oT6m", "title": "Information Technology: New Generations, Third International Conference on", "acronym": "itng", "groupId": "1001685", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNzuZUDJ", "doi": "10.1109/ITNG.2012.119", "title": "XML Querying Using Data Logic Structures and Primitives", "normalizedTitle": "XML Querying Using Data Logic Structures and Primitives", "abstract": "There have been several proposals for transforming and querying XML structures, but very few of them offer a data logic approach. This article describes data structures and some primitives as a framework to efficiently manipulate XML well-formed documents. The implementation of the querying system, based on the proposed framework, is performed in the Prolog programming language. Results indicate that this approach allows the solution of both deductive and recursive queries from XML documents.", "abstracts": [ { "abstractType": "Regular", "content": "There have been several proposals for transforming and querying XML structures, but very few of them offer a data logic approach. This article describes data structures and some primitives as a framework to efficiently manipulate XML well-formed documents. The implementation of the querying system, based on the proposed framework, is performed in the Prolog programming language. Results indicate that this approach allows the solution of both deductive and recursive queries from XML documents.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "There have been several proposals for transforming and querying XML structures, but very few of them offer a data logic approach. This article describes data structures and some primitives as a framework to efficiently manipulate XML well-formed documents. The implementation of the querying system, based on the proposed framework, is performed in the Prolog programming language. Results indicate that this approach allows the solution of both deductive and recursive queries from XML documents.", "fno": "4654a548", "keywords": [ "Data Manipulation", "Data Structures", "Database", "XML Querying", "Datalog", "Prolog" ], "authors": [ { "affiliation": null, "fullName": "Jesus Ubaldo Quevedo-Torrero", "givenName": "Jesus Ubaldo", "surname": "Quevedo-Torrero", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Geno Erickson", "givenName": "Geno", "surname": "Erickson", "__typename": "ArticleAuthorType" } ], "idPrefix": "itng", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-04-01T00:00:00", "pubType": "proceedings", "pages": "548-553", "year": "2012", "issn": null, "isbn": "978-0-7695-4654-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4654a540", "articleId": "12OmNBNM8NL", "__typename": "AdjacentArticleType" }, "next": { "fno": "4654a554", "articleId": "12OmNxveNGU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/2/3735b327", "title": "Querying XML Documents Based on Multi-processor", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735b327/12OmNASraB7", "parentPublication": { "id": "proceedings/fskd/2009/3735/2", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wisa/2009/3874/0/3874a032", "title": "Model Design on DAS and Research of XML Encrypted Data Querying", "doi": null, "abstractUrl": "/proceedings-article/wisa/2009/3874a032/12OmNAkWvuI", "parentPublication": { "id": "proceedings/wisa/2009/3874/0", "title": "Web Information Systems and Applications Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ideas/2006/2577/0/04041612", "title": "Querying Encrypted XML Documents", "doi": null, "abstractUrl": "/proceedings-article/ideas/2006/04041612/12OmNBaBuQJ", "parentPublication": { "id": "proceedings/ideas/2006/2577/0", "title": "2006 10th International Database Engineering and Applications Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wise/2002/1766/0/17660127", "title": "Towards Declarative XML Querying", "doi": null, "abstractUrl": "/proceedings-article/wise/2002/17660127/12OmNBpEeX5", "parentPublication": { "id": "proceedings/wise/2002/1766/0", "title": "Web Information Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a332", "title": "Retrieving Representative Structures from XML Documents Using Clustering Techniques", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a332/12OmNqJ8thS", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2017/3077/0/08284351", "title": "Performance evaluation of various data structures in building efficient indexing schemes for XML documents", "doi": null, "abstractUrl": "/proceedings-article/ic3/2017/08284351/12OmNqJHFA1", "parentPublication": { "id": "proceedings/ic3/2017/3077/0", "title": "2017 Tenth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2011/4538/0/4538a520", "title": "A Data Parallel Approach to XML Parsing and Query", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2011/4538a520/12OmNrNh0MC", "parentPublication": { "id": "proceedings/hpcc-icess/2011/4538/0", "title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dexa/2008/3299/0/3299a365", "title": "Efficient Compression and Querying of XML Repositories", "doi": null, "abstractUrl": "/proceedings-article/dexa/2008/3299a365/12OmNrY3Lsf", "parentPublication": { "id": "proceedings/dexa/2008/3299/0", "title": "2008 19th International Workshop on Database and Expert Systems Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2009/3545/0/3545a553", "title": "Flexible XML Querying Using Skyline Semantics", "doi": null, "abstractUrl": "/proceedings-article/icde/2009/3545a553/12OmNweBUGo", "parentPublication": { "id": "proceedings/icde/2009/3545/0", "title": "2009 IEEE 25th International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2012/4654/0/4654a554", "title": "Watermarking XML Structures Using Multi-valued Dependencies", "doi": null, "abstractUrl": "/proceedings-article/itng/2012/4654a554/12OmNxveNGU", "parentPublication": { "id": "proceedings/itng/2012/4654/0", "title": "Information Technology: New Generations, Third International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1E2weOclERO", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1E2wgicmZGg", "doi": "10.1109/PacificVis53943.2022.00021", "title": "A Study of the Locality of Persistence-Based Queries and Its Implications for the Efficiency of Localized Data Structures", "normalizedTitle": "A Study of the Locality of Persistence-Based Queries and Its Implications for the Efficiency of Localized Data Structures", "abstract": "Scientific datasets are often analyzed and visualized using isosurfaces. The connected components at or above the isovalue defining these isosurfaces are called superlevel-set components. The vertex set of these superlevel-set components can be used to compute local statistics, such as mean temperature or histogram per component, or to segment the data. However, in datasets produced by acquisition devices or simulations, noise induces many spurious components that clutter the visualization and analysis results. Many of these spurious components would disappear if the data values were slightly adjusted. The notion of persistence captures the stability of a component with respect to function value changes, and so we are interested in computing persistence quickly. Locality of computation is critical for parallel scalability, minimization of communication in a distributed environment, or an out-of-core processing. The recently introduced merge forest attained high performance by exploiting locality, thereby avoiding communication until needed to resolve a feature query. We extend the merge forest to support persistence-based queries and study the locality of these queries by evaluating the traversals of regions of data during a query. We confirm that the majority of evaluated datasets have the property that the noise is mostly local, and thus can be efficiently eliminated without performing a global analysis. Finally, we compare the query running times with those of a triplet merge tree because a triplet merge tree answers all proposed queries in constant time and can be constructed from a merge tree in linear time.", "abstracts": [ { "abstractType": "Regular", "content": "Scientific datasets are often analyzed and visualized using isosurfaces. The connected components at or above the isovalue defining these isosurfaces are called superlevel-set components. The vertex set of these superlevel-set components can be used to compute local statistics, such as mean temperature or histogram per component, or to segment the data. However, in datasets produced by acquisition devices or simulations, noise induces many spurious components that clutter the visualization and analysis results. Many of these spurious components would disappear if the data values were slightly adjusted. The notion of persistence captures the stability of a component with respect to function value changes, and so we are interested in computing persistence quickly. Locality of computation is critical for parallel scalability, minimization of communication in a distributed environment, or an out-of-core processing. The recently introduced merge forest attained high performance by exploiting locality, thereby avoiding communication until needed to resolve a feature query. We extend the merge forest to support persistence-based queries and study the locality of these queries by evaluating the traversals of regions of data during a query. We confirm that the majority of evaluated datasets have the property that the noise is mostly local, and thus can be efficiently eliminated without performing a global analysis. Finally, we compare the query running times with those of a triplet merge tree because a triplet merge tree answers all proposed queries in constant time and can be constructed from a merge tree in linear time.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scientific datasets are often analyzed and visualized using isosurfaces. The connected components at or above the isovalue defining these isosurfaces are called superlevel-set components. The vertex set of these superlevel-set components can be used to compute local statistics, such as mean temperature or histogram per component, or to segment the data. However, in datasets produced by acquisition devices or simulations, noise induces many spurious components that clutter the visualization and analysis results. Many of these spurious components would disappear if the data values were slightly adjusted. The notion of persistence captures the stability of a component with respect to function value changes, and so we are interested in computing persistence quickly. Locality of computation is critical for parallel scalability, minimization of communication in a distributed environment, or an out-of-core processing. The recently introduced merge forest attained high performance by exploiting locality, thereby avoiding communication until needed to resolve a feature query. We extend the merge forest to support persistence-based queries and study the locality of these queries by evaluating the traversals of regions of data during a query. We confirm that the majority of evaluated datasets have the property that the noise is mostly local, and thus can be efficiently eliminated without performing a global analysis. Finally, we compare the query running times with those of a triplet merge tree because a triplet merge tree answers all proposed queries in constant time and can be constructed from a merge tree in linear time.", "fno": "233500a121", "keywords": [ "Data Structures", "Graph Theory", "Query Processing", "Set Theory", "Trees Mathematics", "Persistence Based Queries", "Localized Data", "Scientific Datasets", "Isosurfaces", "Connected Components", "Superlevel Set Components", "Vertex Set", "Local Statistics", "Mean Temperature", "Acquisition Devices", "Spurious Components", "Visualization", "Data Values", "Persistence Captures", "Function Value Changes", "Forest Attained High Performance", "Feature Query", "Evaluated Datasets", "Human Computer Interaction", "Temperature Distribution", "Histograms", "Scalability", "Forestry", "Data Structures", "Minimization" ], "authors": [ { "affiliation": "SCI Institute University of Utah", "fullName": "Pavol Klacansky", "givenName": "Pavol", "surname": "Klacansky", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute University of Utah", "fullName": "Attila Gyulassy", "givenName": "Attila", "surname": "Gyulassy", "__typename": "ArticleAuthorType" }, { "affiliation": "LLNL", "fullName": "Peer-Timo Bremer", "givenName": "Peer-Timo", "surname": "Bremer", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute University of Utah", "fullName": "Valerio Pascucci", "givenName": "Valerio", "surname": "Pascucci", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-04-01T00:00:00", "pubType": "proceedings", "pages": "121-130", "year": "2022", "issn": null, "isbn": "978-1-6654-2335-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1E2wgefGLyE", "name": "ppacificvis202223350-09787867s1-mm_233500a121.zip", "size": "7.24 MB", "location": "https://www.computer.org/csdl/api/v1/extra/ppacificvis202223350-09787867s1-mm_233500a121.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "233500a111", "articleId": "1E2wfmNqkPm", "__typename": "AdjacentArticleType" }, "next": { "fno": "233500a131", "articleId": "1E2weXu0aEE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infcom/2002/7476/3/01019374", "title": "Locality in search engine queries and its implications for caching", "doi": null, "abstractUrl": "/proceedings-article/infcom/2002/01019374/12OmNyQGSnL", "parentPublication": { "id": "proceedings/infcom/2002/7476/3", "title": "Proceedings of IEEE Information Communications Conference (INFOCOM 2002)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2022/2335/0/233500a151", "title": "SET-STAT-MAP: Extending Parallel Sets for Visualizing Mixed Data", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2022/233500a151/1E2wfuqTfMY", "parentPublication": { "id": "proceedings/pacificvis/2022/2335/0", "title": "2022 IEEE 15th Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/topoinvis/2022/9354/0/935400a049", "title": "Jacobi Set Driven Search for Flexible Fiber Surface Extraction", "doi": null, "abstractUrl": "/proceedings-article/topoinvis/2022/935400a049/1J2XKqOgZI4", "parentPublication": { "id": "proceedings/topoinvis/2022/9354/0", "title": "2022 Topological Data Analysis and Visualization (TopoInVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794560", "title": "Toward Localized Topological Data Structures: Querying the Forest for the Tree", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794560/1eX8ARELiX6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBqMDAV", "title": "Design Automation Conference", "acronym": "dac", "groupId": "1000196", "volume": "0", "displayVolume": "0", "year": "1990", "__typename": "ProceedingType" }, "article": { "id": "12OmNAo45Kb", "doi": "10.1109/DAC.1990.114900", "title": "A transistor reordering technique for gate matrix layout", "normalizedTitle": "A transistor reordering technique for gate matrix layout", "abstract": "An algorithm is introduced which uses logic equations to determine a gate sequence and a set of nets which optimize the gate matrix layout area. Using logic equations allows the reordering of transistors in a completely general manner. Previous works using net-lists and the concept of delayed binding performed only a small subset of the reordering possible with the proposed algorithm. The algorithm has a time complexity of O(E log E) for a design with E equations. The experimental results show a considerable reduction in layout area.", "abstracts": [ { "abstractType": "Regular", "content": "An algorithm is introduced which uses logic equations to determine a gate sequence and a set of nets which optimize the gate matrix layout area. Using logic equations allows the reordering of transistors in a completely general manner. Previous works using net-lists and the concept of delayed binding performed only a small subset of the reordering possible with the proposed algorithm. The algorithm has a time complexity of O(E log E) for a design with E equations. The experimental results show a considerable reduction in layout area.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An algorithm is introduced which uses logic equations to determine a gate sequence and a set of nets which optimize the gate matrix layout area. Using logic equations allows the reordering of transistors in a completely general manner. Previous works using net-lists and the concept of delayed binding performed only a small subset of the reordering possible with the proposed algorithm. The algorithm has a time complexity of O(E log E) for a design with E equations. The experimental results show a considerable reduction in layout area.", "fno": "00114900", "keywords": [ "Transistor Reordering Technique", "Gate Matrix Layout", "Algorithm", "Logic Equations", "Gate Sequence", "Net Lists", "Delayed Binding", "Time Complexity" ], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Syracuse Univ., NY, USA", "fullName": "Singh", "givenName": null, "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Electr. & Comput. Eng., Syracuse Univ., NY, USA", "fullName": "Chen", "givenName": null, "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "dac", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1990-06-01T00:00:00", "pubType": "proceedings", "pages": "462-467", "year": "1990", "issn": null, "isbn": "0-89791-363-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00114899", "articleId": "12OmNwEJ12Y", "__typename": "AdjacentArticleType" }, "next": { "fno": "00114901", "articleId": "12OmNqGRGdq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccad/1988/0869/0/00122479", "title": "Doubly folded transistor matrix layout", "doi": null, "abstractUrl": "/proceedings-article/iccad/1988/00122479/12OmNAoDieg", "parentPublication": { "id": "proceedings/iccad/1988/0869/0", "title": "1988 IEEE International Conference on Computer-Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1989/310/0/01586350", "title": "Gate Matrix Layout Synthesis with Two-Dimensional Folding", "doi": null, "abstractUrl": "/proceedings-article/dac/1989/01586350/12OmNB8TU43", "parentPublication": { "id": "proceedings/dac/1989/310/0", "title": "26th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1988/0864/0/00014837", "title": "Routing algorithm for gate array macro cells", "doi": null, "abstractUrl": "/proceedings-article/dac/1988/00014837/12OmNwBBqgu", "parentPublication": { "id": "proceedings/dac/1988/0864/0", "title": "Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vtsa/1989/9999/0/00068625", "title": "A grouping heuristic algorithm for gate matrix layout", "doi": null, "abstractUrl": "/proceedings-article/vtsa/1989/00068625/12OmNwtWfQe", "parentPublication": { "id": "proceedings/vtsa/1989/9999/0", "title": "International Symposium on VLSI Technology, Systems and Applications,", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1987/0781/0/01586280", "title": "Automated Layout Generation Using Gate Matrix Approach", "doi": null, "abstractUrl": "/proceedings-article/dac/1987/01586280/12OmNxdVgZI", "parentPublication": { "id": "proceedings/dac/1987/0781/0", "title": "24th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsem/2010/4223/2/4223b160", "title": "Device Simulation on Gate-All-Around Cylindrical Transistor", "doi": null, "abstractUrl": "/proceedings-article/icsem/2010/4223b160/12OmNxwncrF", "parentPublication": { "id": "proceedings/icsem/2010/4223/2", "title": "2010 International Conference on System Science, Engineering Design and Manufacturing Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edtc/1996/7423/0/74230219", "title": "Optimizing CMOS Circuits for Low Power Using Transistor Reordering", "doi": null, "abstractUrl": "/proceedings-article/edtc/1996/74230219/12OmNyQpgRe", "parentPublication": { "id": "proceedings/edtc/1996/7423/0", "title": "European Design and Test Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dac/1989/310/0/01586473", "title": "A Comparison of Four Two-Dimensional Gate Matrix Layout Tools", "doi": null, "abstractUrl": "/proceedings-article/dac/1989/01586473/12OmNyTfg8c", "parentPublication": { "id": "proceedings/dac/1989/310/0", "title": "26th ACM/IEEE Design Automation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2004/2231/0/22310228", "title": "Transistor and Pin Reordering for Gate Oxide Leakage Reduction in Dual T{ox} Circuits", "doi": null, "abstractUrl": "/proceedings-article/iccd/2004/22310228/12OmNzwpU87", "parentPublication": { "id": "proceedings/iccd/2004/2231/0", "title": "IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807245", "title": "GUIRO: User-Guided Matrix Reordering", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807245/1cG64NEzXUY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx4gUtP", "title": "2017 30th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNx3ZjoU", "doi": "10.1109/SIBGRAPI.2017.22", "title": "A Hierarchical Network Simplification via Non-Negative Matrix Factorization", "normalizedTitle": "A Hierarchical Network Simplification via Non-Negative Matrix Factorization", "abstract": "Visualization tools play an important part in assisting analysts in the understanding of networks and underlying phenomena. However these tasks can be hindered by visual clutter. Simplification/decimation schemes have been a main alternative in this context. Nevertheless, network simplification methods have not been properly evaluated w.r.t. their effectiveness in reducing complexity while reserving relevant structures and content. Moreover, most simplification techniques only consider information extracted from the topology of the network, altogether disregarding additional content. In this work we propose a novel methodology to network simplification that leverages topological information and additional content associated with network elements. The proposed methodology relies on non-negative matrix factorization (NMF) and graph matching, combined to generate a hierarchical representation of the network, grouping the most similar elements in each level of the hierarchy. Moreover, the matrix factorization is only performed at the beginning of the process, reducing the computational cost without compromising the quality of the simplification. The effectiveness of the proposed methodology is assessed through a comprehensive set of quantitative evaluations and comparisons, which shows that our approach outperforms existing simplification methods.", "abstracts": [ { "abstractType": "Regular", "content": "Visualization tools play an important part in assisting analysts in the understanding of networks and underlying phenomena. However these tasks can be hindered by visual clutter. Simplification/decimation schemes have been a main alternative in this context. Nevertheless, network simplification methods have not been properly evaluated w.r.t. their effectiveness in reducing complexity while reserving relevant structures and content. Moreover, most simplification techniques only consider information extracted from the topology of the network, altogether disregarding additional content. In this work we propose a novel methodology to network simplification that leverages topological information and additional content associated with network elements. The proposed methodology relies on non-negative matrix factorization (NMF) and graph matching, combined to generate a hierarchical representation of the network, grouping the most similar elements in each level of the hierarchy. Moreover, the matrix factorization is only performed at the beginning of the process, reducing the computational cost without compromising the quality of the simplification. The effectiveness of the proposed methodology is assessed through a comprehensive set of quantitative evaluations and comparisons, which shows that our approach outperforms existing simplification methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visualization tools play an important part in assisting analysts in the understanding of networks and underlying phenomena. However these tasks can be hindered by visual clutter. Simplification/decimation schemes have been a main alternative in this context. Nevertheless, network simplification methods have not been properly evaluated w.r.t. their effectiveness in reducing complexity while reserving relevant structures and content. Moreover, most simplification techniques only consider information extracted from the topology of the network, altogether disregarding additional content. In this work we propose a novel methodology to network simplification that leverages topological information and additional content associated with network elements. The proposed methodology relies on non-negative matrix factorization (NMF) and graph matching, combined to generate a hierarchical representation of the network, grouping the most similar elements in each level of the hierarchy. Moreover, the matrix factorization is only performed at the beginning of the process, reducing the computational cost without compromising the quality of the simplification. The effectiveness of the proposed methodology is assessed through a comprehensive set of quantitative evaluations and comparisons, which shows that our approach outperforms existing simplification methods.", "fno": "2219a119", "keywords": [ "Data Visualisation", "Graph Theory", "Matrix Decomposition", "Network Theory Graphs", "Pattern Clustering", "Topological Information", "Graph Matching", "Hierarchical Network Simplification", "Nonnegative Matrix Factorization", "Visualization Tools", "Visual Clutter", "Hierarchical Clustering", "Decimation Schemes", "Visualization", "Network Topology", "Topology", "Matrix Decomposition", "Tools", "Clutter", "Graph", "Matching", "Simplification", "Non Negative Matrix Factorization" ], "authors": [ { "affiliation": null, "fullName": "Markus Diego Dias", "givenName": "Markus Diego", "surname": "Dias", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Moussa Reda Mansour", "givenName": "Moussa Reda", "surname": "Mansour", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fabio Dias", "givenName": "Fabio", "surname": "Dias", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Fabiano Petronetto", "givenName": "Fabiano", "surname": "Petronetto", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cláudio Teixeira Silva", "givenName": "Cláudio Teixeira", "surname": "Silva", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Luis Gustavo Nonato", "givenName": "Luis Gustavo", "surname": "Nonato", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "119-126", "year": "2017", "issn": "2377-5416", "isbn": "978-1-5386-2219-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2219a111", "articleId": "12OmNyjLoSR", "__typename": "AdjacentArticleType" }, "next": { "fno": "2219a127", "articleId": "12OmNwwuE2p", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cis/2014/7434/0/7434a114", "title": "Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix Factorization", "doi": null, "abstractUrl": "/proceedings-article/cis/2014/7434a114/12OmNBBhN3N", "parentPublication": { "id": "proceedings/cis/2014/7434/0", "title": "2014 Tenth International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a335", "title": "Bayesian Nominal Matrix Factorization for Mining Daily Activity Patterns", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a335/12OmNBNM8R2", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2011/0372/0/06122566", "title": "Non-negative matrix factorization considering given vectors in a basis", "doi": null, "abstractUrl": "/proceedings-article/grc/2011/06122566/12OmNrJAe6u", "parentPublication": { "id": "proceedings/grc/2011/0372/0", "title": "2011 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ias/2009/3744/1/3744a693", "title": "Detecting Insider Attacks Using Non-negative Matrix Factorization", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744a693/12OmNxIRxVg", "parentPublication": { "id": "proceedings/ias/2009/3744/1", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/04/08331168", "title": "Non-Negative Matrix Factorizations for Multiplex Network Analysis", "doi": null, "abstractUrl": "/journal/tp/2019/04/08331168/13rRUwcAqru", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2019/06/08332493", "title": "Flexible Non-Negative Matrix Factorization to Unravel Disease-Related Genes", "doi": null, "abstractUrl": "/journal/tb/2019/06/08332493/13rRUy3gnbU", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2018/9264/0/926400a345", "title": "Graph Spectral Filtering for Network Simplification", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2018/926400a345/17D45VTRosD", "parentPublication": { "id": "proceedings/sibgrapi/2018/9264/0", "title": "2018 31st SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/01/08123883", "title": "Truncated Cauchy Non-Negative Matrix Factorization", "doi": null, "abstractUrl": "/journal/tp/2019/01/08123883/17D45WYQJ6C", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2022/5099/0/509900b011", "title": "Boolean Matrix Factorization for Data with Symmetric Variables", "doi": null, "abstractUrl": "/proceedings-article/icdm/2022/509900b011/1KpCrWy2e0U", "parentPublication": { "id": "proceedings/icdm/2022/5099/0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0/09047276", "title": "A Double Non-Negative Matrix Factorization Model for Signed Network Analysis", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2019/09047276/1iC6ryHUKZi", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2019/4328/0", "title": "2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvk7JKq", "title": "2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422)", "acronym": "ispass", "groupId": "1000547", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNyFU70d", "doi": "10.1109/ISPASS.2000.842275", "title": "Accurate simulation and evaluation of code reordering", "normalizedTitle": "Accurate simulation and evaluation of code reordering", "abstract": "The need for bridging the ever growing gap between memory and processor performance has motivated research for exploiting the memory hierarchy effectively. An important software solution called code reordering produces a new program layout to better utilize the available memory hierarchy. Many algorithms have been proposed. They differ based on: 1) the code granularity assumed by the reordering algorithm, and 2) the models used to guide code placement. In this paper we present a framework that provides accurate simulation and evaluation of code reordering algorithms on an out-of-order superscalar processor. Our approach allows both profile-guided and compile-time approaches to be simulated. Using a single simulation pass, different graph models are constructed and utilized during code placement. Various combinations of basic block/procedure reordering algorithms can be employed. We discuss the necessary modifications made to a detailed simulator of a processor in order to accurately simulate the optimized code layout.", "abstracts": [ { "abstractType": "Regular", "content": "The need for bridging the ever growing gap between memory and processor performance has motivated research for exploiting the memory hierarchy effectively. An important software solution called code reordering produces a new program layout to better utilize the available memory hierarchy. Many algorithms have been proposed. They differ based on: 1) the code granularity assumed by the reordering algorithm, and 2) the models used to guide code placement. In this paper we present a framework that provides accurate simulation and evaluation of code reordering algorithms on an out-of-order superscalar processor. Our approach allows both profile-guided and compile-time approaches to be simulated. Using a single simulation pass, different graph models are constructed and utilized during code placement. Various combinations of basic block/procedure reordering algorithms can be employed. We discuss the necessary modifications made to a detailed simulator of a processor in order to accurately simulate the optimized code layout.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The need for bridging the ever growing gap between memory and processor performance has motivated research for exploiting the memory hierarchy effectively. An important software solution called code reordering produces a new program layout to better utilize the available memory hierarchy. Many algorithms have been proposed. They differ based on: 1) the code granularity assumed by the reordering algorithm, and 2) the models used to guide code placement. In this paper we present a framework that provides accurate simulation and evaluation of code reordering algorithms on an out-of-order superscalar processor. Our approach allows both profile-guided and compile-time approaches to be simulated. Using a single simulation pass, different graph models are constructed and utilized during code placement. Various combinations of basic block/procedure reordering algorithms can be employed. We discuss the necessary modifications made to a detailed simulator of a processor in order to accurately simulate the optimized code layout.", "fno": "641813", "keywords": [], "authors": [ { "affiliation": "Dept. of Electr. & Comput. Eng., Northeastern Univ., Boston, MA, USA", "fullName": "J. Kalamatianos", "givenName": "J.", "surname": "Kalamatianos", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "D.R. Kaeli", "givenName": "D.R.", "surname": "Kaeli", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispass", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-04-01T00:00:00", "pubType": "proceedings", "pages": "13-20", "year": "2000", "issn": null, "isbn": "0-7803-6418-X", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "64187", "articleId": "12OmNBE7Mv8", "__typename": "AdjacentArticleType" }, "next": { "fno": "641821", "articleId": "12OmNzcxZ9c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUPpiN", "doi": "10.1109/IV.2016.22", "title": "Smoothed Multiple Binarization -- Using PQR Tree, Smoothing, Feature Vectors and Thresholding for Matrix Reordering", "normalizedTitle": "Smoothed Multiple Binarization -- Using PQR Tree, Smoothing, Feature Vectors and Thresholding for Matrix Reordering", "abstract": "Finding appropriate permutations of rows and columns of a matrix may help users to see hidden patterns in datasets. This paper presents a set of binarization-based matrix reordering algorithms able to reveal some patterns in a quantitative data set. In these algorithms, matrix binarization converts a matrix into a set of binary ones, from which the algorithms calculate desired groups of similar rows and columns. PQR trees provide a linear order of rows and columns that obey these groups as much as possible. These algorithms use mean or median filter as smoothing techniques to minimize data noise in intermediate matrix permutation steps. They also use feature vectors or thresholding for defining binarization thresholds in intermediate steps. Our experiments with synthetic matrices revealed that our algorithms are competitive with other matrix reordering algorithms in terms of quality of reordering (Moore stress) and runtime. We observed that our set of algorithms is suitable to reveal Circumplex pattern with all tested noise ratios, and other data canonical patterns with low noise ratio.", "abstracts": [ { "abstractType": "Regular", "content": "Finding appropriate permutations of rows and columns of a matrix may help users to see hidden patterns in datasets. This paper presents a set of binarization-based matrix reordering algorithms able to reveal some patterns in a quantitative data set. In these algorithms, matrix binarization converts a matrix into a set of binary ones, from which the algorithms calculate desired groups of similar rows and columns. PQR trees provide a linear order of rows and columns that obey these groups as much as possible. These algorithms use mean or median filter as smoothing techniques to minimize data noise in intermediate matrix permutation steps. They also use feature vectors or thresholding for defining binarization thresholds in intermediate steps. Our experiments with synthetic matrices revealed that our algorithms are competitive with other matrix reordering algorithms in terms of quality of reordering (Moore stress) and runtime. We observed that our set of algorithms is suitable to reveal Circumplex pattern with all tested noise ratios, and other data canonical patterns with low noise ratio.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Finding appropriate permutations of rows and columns of a matrix may help users to see hidden patterns in datasets. This paper presents a set of binarization-based matrix reordering algorithms able to reveal some patterns in a quantitative data set. In these algorithms, matrix binarization converts a matrix into a set of binary ones, from which the algorithms calculate desired groups of similar rows and columns. PQR trees provide a linear order of rows and columns that obey these groups as much as possible. These algorithms use mean or median filter as smoothing techniques to minimize data noise in intermediate matrix permutation steps. They also use feature vectors or thresholding for defining binarization thresholds in intermediate steps. Our experiments with synthetic matrices revealed that our algorithms are competitive with other matrix reordering algorithms in terms of quality of reordering (Moore stress) and runtime. We observed that our set of algorithms is suitable to reveal Circumplex pattern with all tested noise ratios, and other data canonical patterns with low noise ratio.", "fno": "8942a088", "keywords": [ "Clustering Algorithms", "Matrix Converters", "Smoothing Methods", "Stress", "Entropy", "Context", "Buildings", "Pattern Recognition", "Matrix Reordering", "Reordering Algorithm", "PQR Tree" ], "authors": [ { "affiliation": null, "fullName": "Bruno F. Medina", "givenName": "Bruno F.", "surname": "Medina", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Willian H. Kawakami", "givenName": "Willian H.", "surname": "Kawakami", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Maressa R. da Silva", "givenName": "Maressa R.", "surname": "da Silva", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Celmar G. da Silva", "givenName": "Celmar G.", "surname": "da Silva", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "88-93", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a081", "articleId": "12OmNyoAA7i", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a094", "articleId": "12OmNzwZ6qg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccis/2011/4501/0/4501a058", "title": "Analysis of Efficient Band Matrix Storage", "doi": null, "abstractUrl": "/proceedings-article/iccis/2011/4501a058/12OmNrIrPkk", "parentPublication": { "id": "proceedings/iccis/2011/4501/0", "title": "2011 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113355", "title": "HaTen2: Billion-scale tensor decompositions", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113355/12OmNvAiSav", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdp/2004/2083/0/20830066", "title": "Improving the Locality of the Sparse Matrix-Vector Product on Shared Memory Multiprocessors", "doi": null, "abstractUrl": "/proceedings-article/pdp/2004/20830066/12OmNwkR5Cq", "parentPublication": { "id": "proceedings/pdp/2004/2083/0", "title": "12th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP'04)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ewdts/2010/9555/0/05742089", "title": "Coverage method for FPGA fault logic blocks by spares", "doi": null, "abstractUrl": "/proceedings-article/ewdts/2010/05742089/12OmNyvY9uc", "parentPublication": { "id": "proceedings/ewdts/2010/9555/0", "title": "East-West Design & Test Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875988", "title": "Revisiting Bertin Matrices: New Interactions for Crafting Tabular Visualizations", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875988/13rRUwh80uA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2018/8477/0/847700a195", "title": "Software and Hardware Techniques for Reducing the Impact of Quantization Errors in Memristor Crossbar Arrays", "doi": null, "abstractUrl": "/proceedings-article/iccd/2018/847700a195/17D45VsBU1d", "parentPublication": { "id": "proceedings/iccd/2018/8477/0", "title": "2018 IEEE 36th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807245", "title": "GUIRO: User-Guided Matrix Reordering", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807245/1cG64NEzXUY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2021/05/09099403", "title": "BaPa: A Novel Approach of Improving Load Balance in Parallel Matrix Factorization for Recommender Systems", "doi": null, "abstractUrl": "/journal/tc/2021/05/09099403/1k7oRGBWUDK", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "letters/ca/2020/02/09234705", "title": "Adapting In Situ Accelerators for Sparsity with Granular Matrix Reordering", "doi": null, "abstractUrl": "/journal/ca/2020/02/09234705/1oDXEHhZgek", "parentPublication": { "id": "letters/ca", "title": "IEEE Computer Architecture Letters", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2021/3219/0/321900a260", "title": "ReSpar: Reordering Algorithm for ReRAM-based Sparse Matrix-Vector Multiplication Accelerator", "doi": null, "abstractUrl": "/proceedings-article/iccd/2021/321900a260/1zuveVWttoA", "parentPublication": { "id": "proceedings/iccd/2021/3219/0", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzDvSo0", "title": "SC14: International Conference for High Performance Computing, Networking, Storage and Analysis", "acronym": "sc", "groupId": "1000729", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzwpU8u", "doi": "10.1109/SC.2014.80", "title": "Parallelization of Reordering Algorithms for Bandwidth and Wavefront Reduction", "normalizedTitle": "Parallelization of Reordering Algorithms for Bandwidth and Wavefront Reduction", "abstract": "Many sparse matrix computations can be speeded up if the matrix is first reordered. Reordering was originally developed for direct methods but it has recently become popular for improving the cache locality of parallel iterative solvers since reordering the matrix to reduce bandwidth and wave front can improve the locality of reference of sparse matrix-vector multiplication (SpMV), the key kernel in iterative solvers. In this paper, we present the first parallel implementations of two widely used reordering algorithms: Reverse Cut hill-McKee (RCM) and Sloan. On 16 cores of the Stampede supercomputer, our parallel RCM is 5.56 times faster on the average than a state-of-the-art sequential implementation of RCM in the HSL library. Sloan is significantly more constrained than RCM, but our parallel implementation achieves a speedup of 2.88X on the average over sequential HSL-Sloan. Reordering the matrix using our parallel RCM and then performing 100 SpMV iterations is twice as fast as using HSL-RCM and then performing the SpMV iterations, it is also 1.5 times faster than performing the SpMV iterations without reordering the matrix.", "abstracts": [ { "abstractType": "Regular", "content": "Many sparse matrix computations can be speeded up if the matrix is first reordered. Reordering was originally developed for direct methods but it has recently become popular for improving the cache locality of parallel iterative solvers since reordering the matrix to reduce bandwidth and wave front can improve the locality of reference of sparse matrix-vector multiplication (SpMV), the key kernel in iterative solvers. In this paper, we present the first parallel implementations of two widely used reordering algorithms: Reverse Cut hill-McKee (RCM) and Sloan. On 16 cores of the Stampede supercomputer, our parallel RCM is 5.56 times faster on the average than a state-of-the-art sequential implementation of RCM in the HSL library. Sloan is significantly more constrained than RCM, but our parallel implementation achieves a speedup of 2.88X on the average over sequential HSL-Sloan. Reordering the matrix using our parallel RCM and then performing 100 SpMV iterations is twice as fast as using HSL-RCM and then performing the SpMV iterations, it is also 1.5 times faster than performing the SpMV iterations without reordering the matrix.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Many sparse matrix computations can be speeded up if the matrix is first reordered. Reordering was originally developed for direct methods but it has recently become popular for improving the cache locality of parallel iterative solvers since reordering the matrix to reduce bandwidth and wave front can improve the locality of reference of sparse matrix-vector multiplication (SpMV), the key kernel in iterative solvers. In this paper, we present the first parallel implementations of two widely used reordering algorithms: Reverse Cut hill-McKee (RCM) and Sloan. On 16 cores of the Stampede supercomputer, our parallel RCM is 5.56 times faster on the average than a state-of-the-art sequential implementation of RCM in the HSL library. Sloan is significantly more constrained than RCM, but our parallel implementation achieves a speedup of 2.88X on the average over sequential HSL-Sloan. Reordering the matrix using our parallel RCM and then performing 100 SpMV iterations is twice as fast as using HSL-RCM and then performing the SpMV iterations, it is also 1.5 times faster than performing the SpMV iterations without reordering the matrix.", "fno": "5500a921", "keywords": [ "Sparse Matrices", "Arrays", "Bandwidth", "Parallel Processing", "Heuristic Algorithms", "Runtime", "Indexes" ], "authors": [ { "affiliation": null, "fullName": "Konstantinos I. Karantasis", "givenName": "Konstantinos I.", "surname": "Karantasis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrew Lenharth", "givenName": "Andrew", "surname": "Lenharth", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Donald Nguyen", "givenName": "Donald", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mara J. Garzaran", "givenName": "Mara J.", "surname": "Garzaran", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Keshav Pingali", "givenName": "Keshav", "surname": "Pingali", "__typename": "ArticleAuthorType" } ], "idPrefix": "sc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-11-01T00:00:00", "pubType": "proceedings", "pages": "921-932", "year": "2014", "issn": "2167-4337", "isbn": "978-1-4799-5500-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5500a907", "articleId": "12OmNvlg8mE", "__typename": "AdjacentArticleType" }, "next": { "fno": "5500a933", "articleId": "12OmNxQOjBn", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sc/2016/8815/0/8815a480", "title": "Automating Wavefront Parallelization for Sparse Matrix Computations", "doi": null, "abstractUrl": "/proceedings-article/sc/2016/8815a480/12OmNANkohc", "parentPublication": { "id": "proceedings/sc/2016/8815/0", "title": "SC16: International Conference for High Performance Computing, Networking, Storage and Analysis (SC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chinagrid/2011/0885/0/06051743", "title": "COSC: Combine Optimized Sparse Matrix-Vector Multiplication for CSR Format", "doi": null, "abstractUrl": "/proceedings-article/chinagrid/2011/06051743/12OmNAq3hKW", "parentPublication": { "id": "proceedings/chinagrid/2011/0885/0", "title": "2011 Sixth Annual Chinagrid Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2016/2140/0/2140a022", "title": "Rabbit Order: Just-in-Time Parallel Reordering for Fast Graph Analysis", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2016/2140a022/12OmNroijcF", "parentPublication": { "id": "proceedings/ipdps/2016/2140/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispdc/2012/2599/0/06341487", "title": "Performance of a Structure-Detecting SpMV Using the CSR Matrix Representation", "doi": null, "abstractUrl": "/proceedings-article/ispdc/2012/06341487/12OmNwErpIF", "parentPublication": { "id": "proceedings/ispdc/2012/2599/0", "title": "2012 11th International Symposium on Parallel and Distributed Computing (ISPDC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icppw/2004/2198/0/01328025", "title": "Variable reordering for a parallel envelope method", "doi": null, "abstractUrl": "/proceedings-article/icppw/2004/01328025/12OmNyen1rz", "parentPublication": { "id": "proceedings/icppw/2004/2198/0", "title": "Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2016/02/07036061", "title": "Evaluation Criteria for Sparse Matrix Storage Formats", "doi": null, "abstractUrl": "/journal/td/2016/02/07036061/13rRUwjoNwG", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/02/08432126", "title": "Spatiotemporal Graph and Hypergraph Partitioning Models for Sparse Matrix-Vector Multiplication on Many-Core Architectures", "doi": null, "abstractUrl": "/journal/td/2019/02/08432126/17D45Xtvp8B", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09787804", "title": "VCSR: An Efficient GPU Memory-Aware Sparse Format", "doi": null, "abstractUrl": "/journal/td/2022/12/09787804/1DUa58audEI", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-icess/2008/3352/0/04637688", "title": "Reordering Algorithms for Increasing Locality on Multicore Processors", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2008/04637688/1fHFGKz9cUo", "parentPublication": { "id": "proceedings/hpcc-icess/2008/3352/0", "title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2021/4066/0/406600a703", "title": "Speculative Parallel Reverse Cuthill-McKee Reordering on Multi- and Many-core Architectures", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2021/406600a703/1uOw92rPU8o", "parentPublication": { "id": "proceedings/ipdps/2021/4066/0", "title": "2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvjgWMd", "title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "acronym": "hpcc-icess", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "1fHFGKz9cUo", "doi": "10.1109/HPCC.2008.96", "title": "Reordering Algorithms for Increasing Locality on Multicore Processors", "normalizedTitle": "Reordering Algorithms for Increasing Locality on Multicore Processors", "abstract": "In order to efficiently exploit available parallelism, multicore processors must address contention for shared resources as cache hierarchy. This fact becomes even more important when irregular codes are executed on them, which is the case for sparse matrix ones. In this paper a technique for increasing locality of sparse matrix codes on multicore platforms is presented. The technique consists on reorganizing the data guided by a locality model which introduces the concept of windows of locality. The evaluation of the reordering technique has been performed on two different leading multicore platforms: Intel Core2Duo and Intel Xeon. Experimental results show important performance improvements when using our reordered matrices with respect to original ones. In particular, an average execution time reduction of about 30% is achieved considering different number of running threads. These results are due to an improved overall cache behavior. Likewise, a comparison of our proposal with some standard reordering techniques is included in the paper. Results point out that the reordering technique always outperforms standard algorithms and is effective for matrices with any structure.", "abstracts": [ { "abstractType": "Regular", "content": "In order to efficiently exploit available parallelism, multicore processors must address contention for shared resources as cache hierarchy. This fact becomes even more important when irregular codes are executed on them, which is the case for sparse matrix ones. In this paper a technique for increasing locality of sparse matrix codes on multicore platforms is presented. The technique consists on reorganizing the data guided by a locality model which introduces the concept of windows of locality. The evaluation of the reordering technique has been performed on two different leading multicore platforms: Intel Core2Duo and Intel Xeon. Experimental results show important performance improvements when using our reordered matrices with respect to original ones. In particular, an average execution time reduction of about 30% is achieved considering different number of running threads. These results are due to an improved overall cache behavior. Likewise, a comparison of our proposal with some standard reordering techniques is included in the paper. Results point out that the reordering technique always outperforms standard algorithms and is effective for matrices with any structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In order to efficiently exploit available parallelism, multicore processors must address contention for shared resources as cache hierarchy. This fact becomes even more important when irregular codes are executed on them, which is the case for sparse matrix ones. In this paper a technique for increasing locality of sparse matrix codes on multicore platforms is presented. The technique consists on reorganizing the data guided by a locality model which introduces the concept of windows of locality. The evaluation of the reordering technique has been performed on two different leading multicore platforms: Intel Core2Duo and Intel Xeon. Experimental results show important performance improvements when using our reordered matrices with respect to original ones. In particular, an average execution time reduction of about 30% is achieved considering different number of running threads. These results are due to an improved overall cache behavior. Likewise, a comparison of our proposal with some standard reordering techniques is included in the paper. Results point out that the reordering technique always outperforms standard algorithms and is effective for matrices with any structure.", "fno": "04637688", "keywords": [ "Microprocessor Chips", "Multiprocessing Systems", "Sparse Matrices", "Multicore Processors", "Sparse Matrix Code", "Reordering Technique", "Intel Core 2 Duo", "Intel Xeon", "Sparse Matrices", "Distance Measurement", "Program Processors", "Magnetic Cores", "Symmetric Matrices", "Computer Architecture", "Data Models" ], "authors": [ { "affiliation": "Comput. Sci. Dpt, Univ. Carlos III de Madrid, Madrid", "fullName": "Juan C. Pichel", "givenName": "Juan C.", "surname": "Pichel", "__typename": "ArticleAuthorType" }, { "affiliation": "Comput. Sci. Dpt, Univ. Carlos III de Madrid, Madrid", "fullName": "David E. Singh", "givenName": "David E.", "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": "Comput. Sci. Dpt, Univ. Carlos III de Madrid, Madrid", "fullName": "Jesús Carretero", "givenName": "Jesús", "surname": "Carretero", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-icess", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-09-01T00:00:00", "pubType": "proceedings", "pages": "123-130", "year": "2008", "issn": null, "isbn": "978-0-7695-3352-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3352z044", "articleId": "12OmNCyTyop", "__typename": "AdjacentArticleType" }, "next": { "fno": "3352z045", "articleId": "12OmNvD8RyD", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hipc/2014/5976/0/07116882", "title": "A multilevel compressed sparse row format for efficient sparse computations on multicore processors", "doi": null, "abstractUrl": "/proceedings-article/hipc/2014/07116882/12OmNAOsMKh", "parentPublication": { "id": "proceedings/hipc/2014/5976/0", "title": "2014 21st International Conference on High Performance Computing (HiPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2016/2140/0/2140a022", "title": "Rabbit Order: Just-in-Time Parallel Reordering for Fast Graph Analysis", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2016/2140a022/12OmNroijcF", "parentPublication": { "id": "proceedings/ipdps/2016/2140/0", "title": "2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpp/2013/5117/0/5117a150", "title": "Flow Migration on Multicore Network Processors: Load Balancing While Minimizing Packet Reordering", "doi": null, "abstractUrl": "/proceedings-article/icpp/2013/5117a150/12OmNz6iO9X", "parentPublication": { "id": "proceedings/icpp/2013/5117/0", "title": "2013 42nd International Conference on Parallel Processing (ICPP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/2014/5500/0/5500a921", "title": "Parallelization of Reordering Algorithms for Bandwidth and Wavefront Reduction", "doi": null, "abstractUrl": "/proceedings-article/sc/2014/5500a921/12OmNzwpU8u", "parentPublication": { "id": "proceedings/sc/2014/5500/0", "title": "SC14: International Conference for High Performance Computing, Networking, Storage and Analysis", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2009/02/ttd2009020261", "title": "Improving Performance of Dynamic Programming via Parallelism and Locality on Multicore Architectures", "doi": null, "abstractUrl": "/journal/td/2009/02/ttd2009020261/13rRUxAATga", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2017/08/07829317", "title": "Exploiting Locality in Sparse Matrix-Matrix Multiplication on Many-Core Architectures", "doi": null, "abstractUrl": "/journal/td/2017/08/07829317/13rRUxASubn", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiswc/2021/4173/0/417300a101", "title": "Locality Analysis of Graph Reordering Algorithms", "doi": null, "abstractUrl": "/proceedings-article/iiswc/2021/417300a101/1A8gjRkyxOg", "parentPublication": { "id": "proceedings/iiswc/2021/4173/0", "title": "2021 IEEE International Symposium on Workload Characterization (IISWC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2020/9710/0/971000a601", "title": "Exploring Better Speculation and Data Locality in Sparse Matrix-Vector Multiplication on Intel Xeon", "doi": null, "abstractUrl": "/proceedings-article/iccd/2020/971000a601/1pK59bBz1i8", "parentPublication": { "id": "proceedings/iccd/2020/9710/0", "title": "2020 IEEE 38th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgo/2021/8613/0/09370327", "title": "Variable-Sized Blocks for Locality-Aware SpMV", "doi": null, "abstractUrl": "/proceedings-article/cgo/2021/09370327/1rSR4ZZKZ3i", "parentPublication": { "id": "proceedings/cgo/2021/8613/0", "title": "2021 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/05/09516878", "title": "Workload Balancing via Graph Reordering on Multicore Systems", "doi": null, "abstractUrl": "/journal/td/2022/05/09516878/1watZSFykhi", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zuuZU8udVK", "title": "2021 IEEE 39th International Conference on Computer Design (ICCD)", "acronym": "iccd", "groupId": "1000129", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zuveVWttoA", "doi": "10.1109/ICCD53106.2021.00050", "title": "ReSpar: Reordering Algorithm for ReRAM-based Sparse Matrix-Vector Multiplication Accelerator", "normalizedTitle": "ReSpar: Reordering Algorithm for ReRAM-based Sparse Matrix-Vector Multiplication Accelerator", "abstract": "Sparse matrix-vector multiplication (SpMV) serves as a crucial operation for several key application domains, such as graph analytics and scientific computing, in the era of big data. The performance of SpMV is bounded by the data transmissions across memory channels in conventional von Neumann systems. Emerging metal-oxide resistive random access memory (ReRAM) has shown its potential to address this memory wall challenge through performing SpMV directly within its crossbar arrays. However, due to the tightly coupled crossbar structure, it is unlikely to skip all redundant data loading and computations with zero-valued entries of the sparse matrix in such ReRAM-based processing-in-memory architecture. These unnecessary ReRAM writes and computations hurt the energy efficiency. As only the crossbar-sized sub-matrices with full-zero entries can be skipped, prior studies have proposed some matrix reordering methods to aggregate non-zero entries to few crossbar arrays, such that more full-zero crossbar arrays can be skipped. Nevertheless, the effectiveness of prior reordering methods is constrained by the original ordering of matrix rows. In this paper, we show that the amount of full-zero sub-matrices derived by these prior studies are less than a theoretical lower bound in some cases, indicating that there are still rooms for improvement. Hence, we propose a novel reordering algorithm, ReSpar, that aims to aggregate matrix rows with similar non-zero column entries together and concentrates the non-zeros columns to increase the zero-skipping opportunities. Results show that ReSpar achieves 1.68× and 1.37× more energy savings, while reducing the required number of crossbar loads by 40.4% and 27.2% on average.", "abstracts": [ { "abstractType": "Regular", "content": "Sparse matrix-vector multiplication (SpMV) serves as a crucial operation for several key application domains, such as graph analytics and scientific computing, in the era of big data. The performance of SpMV is bounded by the data transmissions across memory channels in conventional von Neumann systems. Emerging metal-oxide resistive random access memory (ReRAM) has shown its potential to address this memory wall challenge through performing SpMV directly within its crossbar arrays. However, due to the tightly coupled crossbar structure, it is unlikely to skip all redundant data loading and computations with zero-valued entries of the sparse matrix in such ReRAM-based processing-in-memory architecture. These unnecessary ReRAM writes and computations hurt the energy efficiency. As only the crossbar-sized sub-matrices with full-zero entries can be skipped, prior studies have proposed some matrix reordering methods to aggregate non-zero entries to few crossbar arrays, such that more full-zero crossbar arrays can be skipped. Nevertheless, the effectiveness of prior reordering methods is constrained by the original ordering of matrix rows. In this paper, we show that the amount of full-zero sub-matrices derived by these prior studies are less than a theoretical lower bound in some cases, indicating that there are still rooms for improvement. Hence, we propose a novel reordering algorithm, ReSpar, that aims to aggregate matrix rows with similar non-zero column entries together and concentrates the non-zeros columns to increase the zero-skipping opportunities. Results show that ReSpar achieves 1.68× and 1.37× more energy savings, while reducing the required number of crossbar loads by 40.4% and 27.2% on average.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Sparse matrix-vector multiplication (SpMV) serves as a crucial operation for several key application domains, such as graph analytics and scientific computing, in the era of big data. The performance of SpMV is bounded by the data transmissions across memory channels in conventional von Neumann systems. Emerging metal-oxide resistive random access memory (ReRAM) has shown its potential to address this memory wall challenge through performing SpMV directly within its crossbar arrays. However, due to the tightly coupled crossbar structure, it is unlikely to skip all redundant data loading and computations with zero-valued entries of the sparse matrix in such ReRAM-based processing-in-memory architecture. These unnecessary ReRAM writes and computations hurt the energy efficiency. As only the crossbar-sized sub-matrices with full-zero entries can be skipped, prior studies have proposed some matrix reordering methods to aggregate non-zero entries to few crossbar arrays, such that more full-zero crossbar arrays can be skipped. Nevertheless, the effectiveness of prior reordering methods is constrained by the original ordering of matrix rows. In this paper, we show that the amount of full-zero sub-matrices derived by these prior studies are less than a theoretical lower bound in some cases, indicating that there are still rooms for improvement. Hence, we propose a novel reordering algorithm, ReSpar, that aims to aggregate matrix rows with similar non-zero column entries together and concentrates the non-zeros columns to increase the zero-skipping opportunities. Results show that ReSpar achieves 1.68× and 1.37× more energy savings, while reducing the required number of crossbar loads by 40.4% and 27.2% on average.", "fno": "321900a260", "keywords": [ "Matrix Algebra", "Matrix Multiplication", "Memory Architecture", "Random Access Storage", "Sparse Matrices", "Vectors", "Re Spar", "Re RAM Based Sparse Matrix Vector Multiplication Accelerator", "Sp MV", "Crucial Operation", "Key Application Domains", "Graph Analytics", "Scientific Computing", "Big Data", "Data Transmissions", "Memory Channels", "Conventional Von Neumann Systems", "Emerging Metal Oxide Resistive Random Access Memory", "Memory Wall Challenge", "Tightly Coupled Crossbar Structure", "Redundant Data Loading", "Zero Valued Entries", "Re RAM Based Processing In Memory Architecture", "Unnecessary Re RAM", "Crossbar Sized Sub Matrices", "Full Zero Entries", "Nonzero Entries", "Full Zero Crossbar Arrays", "Prior Reordering Methods", "Matrix Rows", "Full Zero Sub Matrices", "Novel Reordering Algorithm", "Nonzero Column Entries", "Nonzeros Columns", "Crossbar Loads", "Graphics", "Scientific Computing", "Aggregates", "Conferences", "Resistive RAM", "Loading", "Computer Architecture" ], "authors": [ { "affiliation": "Academia Sinica,Research Center for Information Technology Innovation,Taiwan", "fullName": "Yi-Jou Hsiao", "givenName": "Yi-Jou", "surname": "Hsiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Academia Sinica,Research Center for Information Technology Innovation,Taiwan", "fullName": "Chin-Fu Nien", "givenName": "Chin-Fu", "surname": "Nien", "__typename": "ArticleAuthorType" }, { "affiliation": "Academia Sinica,Research Center for Information Technology Innovation,Taiwan", "fullName": "Hsiang-Yun Cheng", "givenName": "Hsiang-Yun", "surname": "Cheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "260-268", "year": "2021", "issn": null, "isbn": "978-1-6654-3219-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "321900a252", "articleId": "1zuvbuee7AY", "__typename": "AdjacentArticleType" }, "next": { "fno": "321900a269", "articleId": "1zuvbXwjHNK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vlsid/2018/3692/0/3692a439", "title": "Floating Point Multiplication Mapping on ReRAM Based In-memory Computing Architecture", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2018/3692a439/12OmNBK5m8Y", "parentPublication": { "id": "proceedings/vlsid/2018/3692/0", "title": "2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlsid/2017/5740/0/5740a277", "title": "Efficient Binary Basic Linear Algebra Operations on ReRAM Crossbar Arrays", "doi": null, "abstractUrl": "/proceedings-article/vlsid/2017/5740a277/12OmNqGRGg3", "parentPublication": { "id": "proceedings/vlsid/2017/5740/0", "title": "2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2017/06/07840076", "title": "Automatic ReRAM SPICE Model Generation From Empirical Data for Fast ReRAM-Circuit Coevaluation", "doi": null, "abstractUrl": "/journal/si/2017/06/07840076/13rRUILLkBz", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/dc/2017/01/07911265", "title": "An Energy-Efficient Digital ReRAM-Crossbar-Based CNN With Bitwise Parallelism", "doi": null, "abstractUrl": "/journal/dc/2017/01/07911265/13rRUwbs1Wp", "parentPublication": { "id": "trans/dc", "title": "IEEE Journal on Exploratory Solid-State Computational Devices and Circuits", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2022/6186/0/618600a009", "title": "Accurate Prediction of ReRAM Crossbar Performance Under I-V Nonlinearity and IR Drop", "doi": null, "abstractUrl": "/proceedings-article/iccd/2022/618600a009/1JeG6TAYdZ6", "parentPublication": { "id": "proceedings/iccd/2022/6186/0", "title": "2022 IEEE 40th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2022/6186/0/618600a280", "title": "CoDG-ReRAM: An Algorithm-Hardware Co-design to Accelerate Semi-Structured GNNs on ReRAM", "doi": null, "abstractUrl": "/proceedings-article/iccd/2022/618600a280/1JeG7D7BpqE", "parentPublication": { "id": "proceedings/iccd/2022/6186/0", "title": "2022 IEEE 40th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/2020/05/08951116", "title": "Crossbar-Constrained Technology Mapping for ReRAM Based In-Memory Computing", "doi": null, "abstractUrl": "/journal/tc/2020/05/08951116/1goL6iLd4ru", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdps/2020/6876/0/09139778", "title": "Spara: An Energy-Efficient ReRAM-Based Accelerator for Sparse Graph Analytics Applications", "doi": null, "abstractUrl": "/proceedings-article/ipdps/2020/09139778/1lss8KSer5K", "parentPublication": { "id": "proceedings/ipdps/2020/6876/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2021/3333/0/333300a265", "title": "FORMS: Fine-grained Polarized ReRAM-based In-situ Computation for Mixed-signal DNN Accelerator", "doi": null, "abstractUrl": "/proceedings-article/isca/2021/333300a265/1vNjO70ltBu", "parentPublication": { "id": "proceedings/isca/2021/3333/0", "title": "2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsd/2021/2703/0/270300a143", "title": "Network-on-ReRAM for Scalable Processing-in-Memory Architecture Design", "doi": null, "abstractUrl": "/proceedings-article/dsd/2021/270300a143/1xCb8wr11fO", "parentPublication": { "id": "proceedings/dsd/2021/2703/0", "title": "2021 24th Euromicro Conference on Digital System Design (DSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xq6dzm", "doi": "10.1109/CVPR.2018.00278", "title": "Recurrent Slice Networks for 3D Segmentation of Point Clouds", "normalizedTitle": "Recurrent Slice Networks for 3D Segmentation of Point Clouds", "abstract": "Point clouds are an efficient data format for 3D data. However, existing 3D segmentation methods for point clouds either do not model local dependencies [21] or require added computations [14, 23]. This work presents a novel 3D segmentation framework, RSNet1, to efficiently model local structures in point clouds. The key component of the RSNet is a lightweight local dependency module. It is a combination of a novel slice pooling layer, Recurrent Neural Network (RNN) layers, and a slice unpooling layer. The slice pooling layer is designed to project features of unordered points onto an ordered sequence of feature vectors so that traditional end-to-end learning algorithms (RNNs) can be applied. The performance of RSNet is validated by comprehensive experiments on the S3DIS[1], ScanNet[3], and ShapeNet [34] datasets. In its simplest form, RSNets surpass all previous state-of-the-art methods on these benchmarks. And comparisons against previous state-of-the-art methods [21, 23] demonstrate the efficiency of RSNets.", "abstracts": [ { "abstractType": "Regular", "content": "Point clouds are an efficient data format for 3D data. However, existing 3D segmentation methods for point clouds either do not model local dependencies [21] or require added computations [14, 23]. This work presents a novel 3D segmentation framework, RSNet1, to efficiently model local structures in point clouds. The key component of the RSNet is a lightweight local dependency module. It is a combination of a novel slice pooling layer, Recurrent Neural Network (RNN) layers, and a slice unpooling layer. The slice pooling layer is designed to project features of unordered points onto an ordered sequence of feature vectors so that traditional end-to-end learning algorithms (RNNs) can be applied. The performance of RSNet is validated by comprehensive experiments on the S3DIS[1], ScanNet[3], and ShapeNet [34] datasets. In its simplest form, RSNets surpass all previous state-of-the-art methods on these benchmarks. And comparisons against previous state-of-the-art methods [21, 23] demonstrate the efficiency of RSNets.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point clouds are an efficient data format for 3D data. However, existing 3D segmentation methods for point clouds either do not model local dependencies [21] or require added computations [14, 23]. This work presents a novel 3D segmentation framework, RSNet1, to efficiently model local structures in point clouds. The key component of the RSNet is a lightweight local dependency module. It is a combination of a novel slice pooling layer, Recurrent Neural Network (RNN) layers, and a slice unpooling layer. The slice pooling layer is designed to project features of unordered points onto an ordered sequence of feature vectors so that traditional end-to-end learning algorithms (RNNs) can be applied. The performance of RSNet is validated by comprehensive experiments on the S3DIS[1], ScanNet[3], and ShapeNet [34] datasets. In its simplest form, RSNets surpass all previous state-of-the-art methods on these benchmarks. And comparisons against previous state-of-the-art methods [21, 23] demonstrate the efficiency of RSNets.", "fno": "642000c626", "keywords": [ "Image Segmentation", "Learning Artificial Intelligence", "Recurrent Neural Nets", "Stereo Image Processing", "Vectors", "Local Dependencies", "RS Net 1", "Lightweight Local Dependency Module", "Slice Unpooling Layer", "S 3 DIS", "Recurrent Neural Network Layers", "Recurrent Slice Networks", "Slice Pooling Layer", "End To End Learning Algorithms", "3 D Segmentation Methods", "Point Clouds", "Three Dimensional Displays", "Task Analysis", "Two Dimensional Displays", "Semantics", "Shape", "Feature Extraction", "Silicon" ], "authors": [ { "affiliation": null, "fullName": "Qiangui Huang", "givenName": "Qiangui", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Weiyue Wang", "givenName": "Weiyue", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ulrich Neumann", "givenName": "Ulrich", "surname": "Neumann", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "2626-2635", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000c616", "articleId": "17D45VsBTZC", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000c636", "articleId": "17D45W2Wyyl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2017/6067/0/08019484", "title": "Room segmentation in 3D point clouds using anisotropic potential fields", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019484/12OmNvonIH9", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2017/1034/0/1034a716", "title": "Exploring Spatial Context for 3D Semantic Segmentation of Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2017/1034a716/12OmNy6qfJP", "parentPublication": { "id": "proceedings/iccvw/2017/1034/0", "title": "2017 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2018/8497/0/849700a035", "title": "Slice-Based Window Detection from Scene Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2018/849700a035/1a3x7xj68A8", "parentPublication": { "id": "proceedings/icvrv/2018/8497/0", "title": "2018 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805456", "title": "LassoNet: Deep Lasso-Selection of 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805456/1cG4x9FpdAI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093411", "title": "Global Context Reasoning for Semantic Segmentation of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093411/1jPbe7aSc36", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2020/3079/0/307900a604", "title": "3D Landmark Localization in Point Clouds for the Human Ear", "doi": null, "abstractUrl": "/proceedings-article/fg/2020/307900a604/1kecIKZ4saQ", "parentPublication": { "id": "proceedings/fg/2020/3079/0/", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800b797", "title": "Convolution in the Cloud: Learning Deformable Kernels in 3D Graph Convolution Networks for Point Cloud Analysis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800b797/1m3onRq4x3y", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/06/09294112", "title": "Geometry-Aware Generation of Adversarial Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2022/06/09294112/1pA8gc6H8dO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09355025", "title": "Learning of 3D Graph Convolution Networks for Point Cloud Analysis", "doi": null, "abstractUrl": "/journal/tp/2022/08/09355025/1rgCbgC4Z8s", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2020/9594/0/09450222", "title": "Local Learning in Point Clouds based on Spectral Pooling", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2020/09450222/1uqFNri58mQ", "parentPublication": { "id": "proceedings/icci*cc/2020/9594/0", "title": "2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hQqfuoOyHu", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hVlshPEUMM", "doi": "10.1109/ICCV.2019.00937", "title": "Deep Hough Voting for 3D Object Detection in Point Clouds", "normalizedTitle": "Deep Hough Voting for 3D Object Detection in Point Clouds", "abstract": "Current 3D object detection methods are heavily influenced by 2D detectors. In order to leverage architectures in 2D detectors, they often convert 3D point clouds to regular grids (i.e., to voxel grids or to bird's eye view images), or rely on detection in 2D images to propose 3D boxes. Few works have attempted to directly detect objects in point clouds. In this work, we return to first principles to construct a 3D detection pipeline for point cloud data and as generic as possible. However, due to the sparse nature of the data - samples from 2D manifolds in 3D space - we face a major challenge when directly predicting bounding box parameters from scene points: a 3D object centroid can be far from any surface point thus hard to regress accurately in one step. To address the challenge, we propose VoteNet, an end-to-end 3D object detection network based on a synergy of deep point set networks and Hough voting. Our model achieves state-of-the-art 3D detection on two large datasets of real 3D scans, ScanNet and SUN RGB-D with a simple design, compact model size and high efficiency. Remarkably, VoteNet outperforms previous methods by using purely geometric information without relying on color images.", "abstracts": [ { "abstractType": "Regular", "content": "Current 3D object detection methods are heavily influenced by 2D detectors. In order to leverage architectures in 2D detectors, they often convert 3D point clouds to regular grids (i.e., to voxel grids or to bird's eye view images), or rely on detection in 2D images to propose 3D boxes. Few works have attempted to directly detect objects in point clouds. In this work, we return to first principles to construct a 3D detection pipeline for point cloud data and as generic as possible. However, due to the sparse nature of the data - samples from 2D manifolds in 3D space - we face a major challenge when directly predicting bounding box parameters from scene points: a 3D object centroid can be far from any surface point thus hard to regress accurately in one step. To address the challenge, we propose VoteNet, an end-to-end 3D object detection network based on a synergy of deep point set networks and Hough voting. Our model achieves state-of-the-art 3D detection on two large datasets of real 3D scans, ScanNet and SUN RGB-D with a simple design, compact model size and high efficiency. Remarkably, VoteNet outperforms previous methods by using purely geometric information without relying on color images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Current 3D object detection methods are heavily influenced by 2D detectors. In order to leverage architectures in 2D detectors, they often convert 3D point clouds to regular grids (i.e., to voxel grids or to bird's eye view images), or rely on detection in 2D images to propose 3D boxes. Few works have attempted to directly detect objects in point clouds. In this work, we return to first principles to construct a 3D detection pipeline for point cloud data and as generic as possible. However, due to the sparse nature of the data - samples from 2D manifolds in 3D space - we face a major challenge when directly predicting bounding box parameters from scene points: a 3D object centroid can be far from any surface point thus hard to regress accurately in one step. To address the challenge, we propose VoteNet, an end-to-end 3D object detection network based on a synergy of deep point set networks and Hough voting. Our model achieves state-of-the-art 3D detection on two large datasets of real 3D scans, ScanNet and SUN RGB-D with a simple design, compact model size and high efficiency. Remarkably, VoteNet outperforms previous methods by using purely geometric information without relying on color images.", "fno": "480300j276", "keywords": [ "Hough Transforms", "Image Colour Analysis", "Object Detection", "Stereo Image Processing", "Deep Hough Voting", "Point Clouds", "End To End 3 D Object Detection Network", "2 D Images", "Color Images", "Three Dimensional Displays", "Two Dimensional Displays", "Object Detection", "Proposals", "Detectors", "Feature Extraction", "Pipelines" ], "authors": [ { "affiliation": "Facebook AI Research", "fullName": "Charles R. Qi", "givenName": "Charles R.", "surname": "Qi", "__typename": "ArticleAuthorType" }, { "affiliation": "Facebook AI Research", "fullName": "Or Litany", "givenName": "Or", "surname": "Litany", "__typename": "ArticleAuthorType" }, { "affiliation": "Facebook AI Research", "fullName": "Kaiming He", "givenName": "Kaiming", "surname": "He", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Leonidas Guibas", "givenName": "Leonidas", "surname": "Guibas", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "9276-9285", "year": "2019", "issn": null, "isbn": "978-1-7281-4803-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "480300j266", "articleId": "1hQqlpGkSxa", "__typename": "AdjacentArticleType" }, "next": { "fno": "480300j286", "articleId": "1hQqynxcQIU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccsmt/2021/2063/0/206300a131", "title": "Evaluating the Generalization of 3D Detectors with Hybrid Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccsmt/2021/206300a131/1E2wdlTDvji", "parentPublication": { "id": "proceedings/iccsmt/2021/2063/0", "title": "2021 2nd International Conference on Computer Science and Management Technology (ICCSMT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/05/08998337", "title": "Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2020/05/08998337/1hrXgdu8Bkk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a857", "title": "Monocular 3D Object Detection with Pseudo-LiDAR Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a857/1i5mFr4yElW", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2019/5686/0/568600a138", "title": "Comparing Deep Learning Models for Road Asset Detection and Classification in LiDAR Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/sitis/2019/568600a138/1j9xBeBvPoc", "parentPublication": { "id": "proceedings/sitis/2019/5686/0", "title": "2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090401", "title": "Learning to Match 2D Images and 3D LiDAR Point Clouds for Outdoor Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090401/1jIxmhXvH7a", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800e403", "title": "ImVoteNet: Boosting 3D Object Detection in Point Clouds With Image Votes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800e403/1m3nWRV5coU", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800k0605", "title": "Density-Based Clustering for 3D Object Detection in Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800k0605/1m3ngRyinWE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800k0444", "title": "MLCVNet: Multi-Level Context VoteNet for 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800k0444/1m3o9xtotGM", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306522", "title": "Object Detection in 3D Point Clouds via Local Correlation-Aware Point Embedding", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306522/1qcidNRZyRq", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412401", "title": "S-VoteNet: Deep Hough Voting with Spherical Proposal for 3D Object Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412401/1tmi3MdUos8", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kecGUxjQC4", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "acronym": "fg", "groupId": "1002160", "volume": "0", "displayVolume": "1", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kecIKZ4saQ", "doi": "10.1109/FG47880.2020.00095", "title": "3D Landmark Localization in Point Clouds for the Human Ear", "normalizedTitle": "3D Landmark Localization in Point Clouds for the Human Ear", "abstract": "3D landmark localization plays an important role in many aspects of 3D data processing, from morphometric analysis to the initialization of mesh registration algorithms. In this work we address the problem of landmark localization in 3D point clouds by extending leading 2D landmark localization algorithms to the 3D domain. By leveraging the PointNet++ architecture, we can construct an architecture that is invariant to the ordering of the data. Input point clouds are segmented into background and landmark regions, and offset vectors are calculated within the landmark regions to refine predicted landmark locations. We demonstrate a high landmark localization accuracy, even as the number of points in the input point cloud decreases. By making use of a 3D morphable model as a novel means of data augmentation, improved landmark localization accuracy and consistency can be obtained. We present our results for landmark localization on the human ear.", "abstracts": [ { "abstractType": "Regular", "content": "3D landmark localization plays an important role in many aspects of 3D data processing, from morphometric analysis to the initialization of mesh registration algorithms. In this work we address the problem of landmark localization in 3D point clouds by extending leading 2D landmark localization algorithms to the 3D domain. By leveraging the PointNet++ architecture, we can construct an architecture that is invariant to the ordering of the data. Input point clouds are segmented into background and landmark regions, and offset vectors are calculated within the landmark regions to refine predicted landmark locations. We demonstrate a high landmark localization accuracy, even as the number of points in the input point cloud decreases. By making use of a 3D morphable model as a novel means of data augmentation, improved landmark localization accuracy and consistency can be obtained. We present our results for landmark localization on the human ear.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D landmark localization plays an important role in many aspects of 3D data processing, from morphometric analysis to the initialization of mesh registration algorithms. In this work we address the problem of landmark localization in 3D point clouds by extending leading 2D landmark localization algorithms to the 3D domain. By leveraging the PointNet++ architecture, we can construct an architecture that is invariant to the ordering of the data. Input point clouds are segmented into background and landmark regions, and offset vectors are calculated within the landmark regions to refine predicted landmark locations. We demonstrate a high landmark localization accuracy, even as the number of points in the input point cloud decreases. By making use of a 3D morphable model as a novel means of data augmentation, improved landmark localization accuracy and consistency can be obtained. We present our results for landmark localization on the human ear.", "fno": "307900a604", "keywords": [ "Face Recognition", "Image Registration", "Mesh Generation", "Pose Estimation", "High Landmark Localization Accuracy", "Input Point Cloud", "3 D Morphable Model", "Improved Landmark Localization Accuracy", "Point Clouds", "Landmark Regions", "Predicted Landmark Locations", "Three Dimensional Displays", "Ear", "Location Awareness", "Shape", "Two Dimensional Displays", "Solid Modeling", "Feature Extraction", "Landmark Localisation", "Human Ear", "Point Cloud", "Point Convolution", "PCA" ], "authors": [ { "affiliation": "Imperial College,London,UK", "fullName": "Eimear O’ Sullivan", "givenName": "Eimear O’", "surname": "Sullivan", "__typename": "ArticleAuthorType" }, { "affiliation": "Imperial College,London,UK", "fullName": "Stefanos Zafeiriou", "givenName": "Stefanos", "surname": "Zafeiriou", "__typename": "ArticleAuthorType" } ], "idPrefix": "fg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "402-406", "year": "2020", "issn": null, "isbn": "978-1-7281-3079-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "307900a709", "articleId": "1kecISCOYgw", "__typename": "AdjacentArticleType" }, "next": { "fno": "307900a677", "articleId": "1kecIQrqjdK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itme/2016/3906/0/3906a650", "title": "Parallel Registration of 3D Ear Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/itme/2016/3906a650/12OmNAtaRVZ", "parentPublication": { "id": "proceedings/itme/2016/3906/0", "title": "2016 8th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b771", "title": "InstanceRefer: Cooperative Holistic Understanding for Visual Grounding on Point Clouds through Instance Multi-level Contextual Referring", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b771/1BmIKIhHfoY", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c612", "title": "Anomaly Detection in 3D Point Clouds using Deep Geometric Descriptors", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c612/1L6LAu5ndXG", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300e600", "title": "Extending Convolutional Pose Machines for Facial Landmark Localization in 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300e600/1i5mOOf74VG", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigdia/2020/2232/0/223200a443", "title": "The Visual Localization Based On The Semantic Error Image", "doi": null, "abstractUrl": "/proceedings-article/bigdia/2020/223200a443/1stvAhPbnqw", "parentPublication": { "id": "proceedings/bigdia/2020/2232/0", "title": "2020 6th International Conference on Big Data and Information Analytics (BigDIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2021/4989/0/09455953", "title": "The 3rd Grand Challenge of Lightweight 106-Point Facial Landmark Localization on Masked Faces", "doi": null, "abstractUrl": "/proceedings-article/icmew/2021/09455953/1uCgmmxdqxO", "parentPublication": { "id": "proceedings/icmew/2021/4989/0", "title": "2021 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2021/4989/0/09455952", "title": "Robust and Efficient Facial Landmark Localization", "doi": null, "abstractUrl": "/proceedings-article/icmew/2021/09455952/1uCgndxFawM", "parentPublication": { "id": "proceedings/icmew/2021/4989/0", "title": "2021 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09599570", "title": "Impact of Facial Landmark Localization on Facial Expression Recognition", "doi": null, "abstractUrl": "/journal/ta/5555/01/09599570/1yeC4Ux5BqU", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900p5663", "title": "How Privacy-Preserving are Line Clouds? Recovering Scene Details from 3D Lines", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900p5663/1yeK3DSyq9W", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900i959", "title": "Back-tracing Representative Points for Voting-based 3D Object Detection in Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900i959/1yeKXFt3TZ6", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmhN9Q0eg8", "doi": "10.1109/ICPR48806.2021.9412440", "title": "Learning Interpretable Representation for 3D Point Clouds", "normalizedTitle": "Learning Interpretable Representation for 3D Point Clouds", "abstract": "Point clouds have emerged as a popular representation of 3D visual data. With a set of unordered 3D points, one typically needs to transform them into latent representation before further classification and segmentation tasks. However, one cannot easily interpret such encoded latent representation. To address this issue, we propose a unique deep learning framework for disentangling body-type and pose information from 3D point clouds. Extending from autoencoder, we advance adversarial learning a selected feature type, while classification and data recovery can be additionally observed. Our experiments confirm that our model can be successfully applied to perform a wide range of 3D applications like shape synthesis, action translation, shape/action interpolation, and synchronization.", "abstracts": [ { "abstractType": "Regular", "content": "Point clouds have emerged as a popular representation of 3D visual data. With a set of unordered 3D points, one typically needs to transform them into latent representation before further classification and segmentation tasks. However, one cannot easily interpret such encoded latent representation. To address this issue, we propose a unique deep learning framework for disentangling body-type and pose information from 3D point clouds. Extending from autoencoder, we advance adversarial learning a selected feature type, while classification and data recovery can be additionally observed. Our experiments confirm that our model can be successfully applied to perform a wide range of 3D applications like shape synthesis, action translation, shape/action interpolation, and synchronization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Point clouds have emerged as a popular representation of 3D visual data. With a set of unordered 3D points, one typically needs to transform them into latent representation before further classification and segmentation tasks. However, one cannot easily interpret such encoded latent representation. To address this issue, we propose a unique deep learning framework for disentangling body-type and pose information from 3D point clouds. Extending from autoencoder, we advance adversarial learning a selected feature type, while classification and data recovery can be additionally observed. Our experiments confirm that our model can be successfully applied to perform a wide range of 3D applications like shape synthesis, action translation, shape/action interpolation, and synchronization.", "fno": "09412440", "keywords": [ "Data Visualisation", "Feature Extraction", "Image Representation", "Image Segmentation", "Learning Artificial Intelligence", "Solid Modelling", "Interpretable Representation", "Point Clouds", "Popular Representation", "3 D Visual Data", "Unordered 3 D Points", "Classification", "Segmentation Tasks", "Encoded Latent Representation", "Unique Deep Learning Framework", "Data Recovery", "Deep Learning", "Training", "Solid Modeling", "Visualization", "Three Dimensional Displays", "Shape", "Transforms" ], "authors": [ { "affiliation": "Language Technologies Institute, Carnegie Mellon University,USA", "fullName": "Feng-Guang Su", "givenName": "Feng-Guang", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate Institute of Communication Engineering, National Taiwan University,Taiwan", "fullName": "Ci-Siang Lin", "givenName": "Ci-Siang", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "ASUS Intelligent Cloud Services,Taiwan", "fullName": "Yu-Chiang Frank Wang", "givenName": "Yu-Chiang Frank", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "7470-7477", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412226", "articleId": "1tmi3xp4Qpi", "__typename": "AdjacentArticleType" }, "next": { "fno": "09413073", "articleId": "1tmiH5zKlQQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08546232", "title": "Generating Mesh-based Shapes From Learned Latent Spaces of Point Clouds with VAE-GAN", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546232/17D45XDIXQP", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/02/09736689", "title": "PointGLR: Unsupervised Structural Representation Learning of 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2023/02/09736689/1BN1Ot4gcjm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200g515", "title": "Spatio-temporal Self-Supervised Representation Learning for 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200g515/1BmHreVQrSg", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0458", "title": "Point-set Distances for Learning Representations of 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0458/1BmIlciDLLW", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805456", "title": "LassoNet: Deep Lasso-Selection of 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805456/1cG4x9FpdAI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h273", "title": "Sequential 3D Human Pose and Shape Estimation From Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h273/1m3n9ZIA5BS", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09393615", "title": "Transformer for 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2022/08/09393615/1srMB6u9Rxm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/12/09627800", "title": "General Hypernetwork Framework for Creating 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2022/12/09627800/1yQwE0hV26Y", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a156", "title": "Parametric Model Estimation for 3D Clothed Humans from Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a156/1yeD1Xtq86c", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b196", "title": "Geometric Adversarial Attacks and Defenses on 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b196/1zWElzlz47C", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1uqFLXjtNcI", "title": "2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "acronym": "icci*cc", "groupId": "1000097", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1uqFNri58mQ", "doi": "10.1109/ICCICC50026.2020.9450222", "title": "Local Learning in Point Clouds based on Spectral Pooling", "normalizedTitle": "Local Learning in Point Clouds based on Spectral Pooling", "abstract": "As one of the most fundamental geometric data types for the representation of space and object shapes, a point cloud usually maintains much structural information about the spatial relationship between objects and their features. However, the relative sparseness of point clouds sampled in most practical applications make extracting information-rich features a major challenge. Traditionally, feature extraction algorithms resorted to structured feature engineering and used handcrafted representations for some specific problems. Motivated by the development of deep neural networks, many researchers started to handle the unstructured point clouds from the raw data samples of 3D scanning devices. Some important advantages that deep learning frameworks have over traditional feature engineering is generalizing complex features and associated semantic concepts in a hierarchical manner. Deep learning models have achieved significant landmarks in cognitive processing of speech, image, and video signals. However, unlike in 2D image processing, a 3D point cloud is irregular and sparse. Hence, traditional network frameworks are difficult to apply on 3D geometric data directly. In this paper, we propose to integrate a local point convolution network with spectral pooling to aggregate and learn features in 3D point clouds. The benefits of our framework are fast convergence and competitive performance on point cloud classification.", "abstracts": [ { "abstractType": "Regular", "content": "As one of the most fundamental geometric data types for the representation of space and object shapes, a point cloud usually maintains much structural information about the spatial relationship between objects and their features. However, the relative sparseness of point clouds sampled in most practical applications make extracting information-rich features a major challenge. Traditionally, feature extraction algorithms resorted to structured feature engineering and used handcrafted representations for some specific problems. Motivated by the development of deep neural networks, many researchers started to handle the unstructured point clouds from the raw data samples of 3D scanning devices. Some important advantages that deep learning frameworks have over traditional feature engineering is generalizing complex features and associated semantic concepts in a hierarchical manner. Deep learning models have achieved significant landmarks in cognitive processing of speech, image, and video signals. However, unlike in 2D image processing, a 3D point cloud is irregular and sparse. Hence, traditional network frameworks are difficult to apply on 3D geometric data directly. In this paper, we propose to integrate a local point convolution network with spectral pooling to aggregate and learn features in 3D point clouds. The benefits of our framework are fast convergence and competitive performance on point cloud classification.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As one of the most fundamental geometric data types for the representation of space and object shapes, a point cloud usually maintains much structural information about the spatial relationship between objects and their features. However, the relative sparseness of point clouds sampled in most practical applications make extracting information-rich features a major challenge. Traditionally, feature extraction algorithms resorted to structured feature engineering and used handcrafted representations for some specific problems. Motivated by the development of deep neural networks, many researchers started to handle the unstructured point clouds from the raw data samples of 3D scanning devices. Some important advantages that deep learning frameworks have over traditional feature engineering is generalizing complex features and associated semantic concepts in a hierarchical manner. Deep learning models have achieved significant landmarks in cognitive processing of speech, image, and video signals. However, unlike in 2D image processing, a 3D point cloud is irregular and sparse. Hence, traditional network frameworks are difficult to apply on 3D geometric data directly. In this paper, we propose to integrate a local point convolution network with spectral pooling to aggregate and learn features in 3D point clouds. The benefits of our framework are fast convergence and competitive performance on point cloud classification.", "fno": "09450222", "keywords": [ "Convolutional Neural Nets", "Deep Learning Artificial Intelligence", "Feature Extraction", "Image Classification", "Traditional Feature Engineering", "Deep Learning Models", "3 D Geometric Data", "Local Point Convolution Network", "Spectral Pooling", "Point Cloud Classification", "Fundamental Geometric Data Types", "Feature Extraction Algorithms", "Structured Feature Engineering", "Unstructured Point Clouds", "Deep Learning Frameworks", "Information Rich Features Extraction", "Deep Learning", "Three Dimensional Displays", "Shape", "Convolution", "Semantics", "Neural Networks", "Feature Extraction" ], "authors": [ { "affiliation": "The Hong Kong Polytechnic University,Department of Computing", "fullName": "Yushi Li", "givenName": "Yushi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "The Hong Kong Polytechnic University,Department of Computing", "fullName": "George Baciu", "givenName": "George", "surname": "Baciu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icci*cc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "84-91", "year": "2020", "issn": null, "isbn": "978-1-7281-9594-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09450258", "articleId": "1uqFP6LIQh2", "__typename": "AdjacentArticleType" }, "next": { "fno": "09450219", "articleId": "1uqFOwRsT72", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000e548", "title": "Mining Point Cloud Local Structures by Kernel Correlation and Graph Pooling", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000e548/17D45VObpQ5", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10024001", "title": "AGConv: Adaptive Graph Convolution on 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/5555/01/10024001/1K9spf0w0Ug", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805456", "title": "LassoNet: Deep Lasso-Selection of 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805456/1cG4x9FpdAI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800e573", "title": "SpSequenceNet: Semantic Segmentation Network on 4D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800e573/1m3nZX73Hna", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800a389", "title": "A Hierarchical Graph Network for 3D Object Detection on Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800a389/1m3nenT3Qbe", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306522", "title": "Object Detection in 3D Point Clouds via Local Correlation-Aware Point Embedding", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306522/1qcidNRZyRq", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800b018", "title": "Self-Supervised Learning of Point Clouds via Orientation Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800b018/1qyxiloPGBq", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/08/09393615", "title": "Transformer for 3D Point Clouds", "doi": null, "abstractUrl": "/journal/tp/2022/08/09393615/1srMB6u9Rxm", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2020/9594/0/09450255", "title": "SAPCGAN: Self-Attention based Generative Adversarial Network for Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2020/09450255/1uqFO2IzUIg", "parentPublication": { "id": "proceedings/icci*cc/2020/9594/0", "title": "2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b196", "title": "Geometric Adversarial Attacks and Defenses on 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b196/1zWElzlz47C", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeCSUXkdhu", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "acronym": "ismar", "groupId": "1000465", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeD1Xtq86c", "doi": "10.1109/ISMAR52148.2021.00030", "title": "Parametric Model Estimation for 3D Clothed Humans from Point Clouds", "normalizedTitle": "Parametric Model Estimation for 3D Clothed Humans from Point Clouds", "abstract": "This paper presents a novel framework to estimate parametric model- s for 3D clothed humans from partial point clouds. It is a challenging problem due to factors such as arbitrary human shape and pose, large variations in clothing details, and significant missing data. Existing methods mainly focus on estimating the parametric model of undressed bodies or reconstructing the non-parametric 3D shapes from point clouds. In this paper, we propose a hierarchical regression framework to learn the parametric model of detailed human shapes from partial point clouds of a single depth frame. Benefiting from the favorable ability of deep neural networks to model nonlinearity, the proposed framework cascades several successive regression networks to estimate the parameters of detailed 3D human body models in a coarse-to-fine manner. Specifically, the first global regression network extracts global deep features of point clouds to obtain an initial estimation of the undressed human model. Based on the initial estimation, the local regression network then refines the undressed human model by using the local features of neighborhood points of human joints. Finally, the clothing details are inferred as an additive displacement on the refined undressed model using the vertex-level regression network. The experimental results demonstrate that the proposed hierarchical regression approach can accurately predict detailed human shapes from partial point clouds and outperform prior works in the recovery accuracy of 3D human models.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a novel framework to estimate parametric model- s for 3D clothed humans from partial point clouds. It is a challenging problem due to factors such as arbitrary human shape and pose, large variations in clothing details, and significant missing data. Existing methods mainly focus on estimating the parametric model of undressed bodies or reconstructing the non-parametric 3D shapes from point clouds. In this paper, we propose a hierarchical regression framework to learn the parametric model of detailed human shapes from partial point clouds of a single depth frame. Benefiting from the favorable ability of deep neural networks to model nonlinearity, the proposed framework cascades several successive regression networks to estimate the parameters of detailed 3D human body models in a coarse-to-fine manner. Specifically, the first global regression network extracts global deep features of point clouds to obtain an initial estimation of the undressed human model. Based on the initial estimation, the local regression network then refines the undressed human model by using the local features of neighborhood points of human joints. Finally, the clothing details are inferred as an additive displacement on the refined undressed model using the vertex-level regression network. The experimental results demonstrate that the proposed hierarchical regression approach can accurately predict detailed human shapes from partial point clouds and outperform prior works in the recovery accuracy of 3D human models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a novel framework to estimate parametric model- s for 3D clothed humans from partial point clouds. It is a challenging problem due to factors such as arbitrary human shape and pose, large variations in clothing details, and significant missing data. Existing methods mainly focus on estimating the parametric model of undressed bodies or reconstructing the non-parametric 3D shapes from point clouds. In this paper, we propose a hierarchical regression framework to learn the parametric model of detailed human shapes from partial point clouds of a single depth frame. Benefiting from the favorable ability of deep neural networks to model nonlinearity, the proposed framework cascades several successive regression networks to estimate the parameters of detailed 3D human body models in a coarse-to-fine manner. Specifically, the first global regression network extracts global deep features of point clouds to obtain an initial estimation of the undressed human model. Based on the initial estimation, the local regression network then refines the undressed human model by using the local features of neighborhood points of human joints. Finally, the clothing details are inferred as an additive displacement on the refined undressed model using the vertex-level regression network. The experimental results demonstrate that the proposed hierarchical regression approach can accurately predict detailed human shapes from partial point clouds and outperform prior works in the recovery accuracy of 3D human models.", "fno": "015800a156", "keywords": [ "Deep Learning Artificial Intelligence", "Feature Extraction", "Regression Analysis", "Stereo Image Processing", "Partial Point Clouds", "3 D Human Models", "Parametric Model Estimation", "3 D Clothed Humans", "Arbitrary Human Shape", "Clothing Details", "Undressed Bodies", "Nonparametric 3 D Shapes", "Hierarchical Regression Framework", "Human Shapes", "Deep Neural Networks", "Successive Regression Networks", "Global Regression Network", "Undressed Human Model", "Local Regression Network", "Human Joints", "Refined Undressed Model", "Vertex Level Regression Network", "Hierarchical Regression Approach", "3 D Human Body Models", "Deep Learning", "Solid Modeling", "Three Dimensional Displays", "Shape", "Clothing", "Estimation", "Predictive Models", "Detailed Human Shape Estimation", "Parametric Model", "Point Clouds" ], "authors": [ { "affiliation": "Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education", "fullName": "Kangkan Wang", "givenName": "Kangkan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education", "fullName": "Huayu Zheng", "givenName": "Huayu", "surname": "Zheng", "__typename": "ArticleAuthorType" }, { "affiliation": "Zhejiang University,State Key Laboratory of CAD&CG,China", "fullName": "Guofeng Zhang", "givenName": "Guofeng", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education", "fullName": "Jian Yang", "givenName": "Jian", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "156-165", "year": "2021", "issn": "1554-7868", "isbn": "978-1-6654-0158-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "015800a147", "articleId": "1yeCYy4wcZa", "__typename": "AdjacentArticleType" }, "next": { "fno": "015800a166", "articleId": "1yeD0drUK1W", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crv/2015/1986/0/1986a031", "title": "Registration of Noisy Point Clouds Using Virtual Interest Points", "doi": null, "abstractUrl": "/proceedings-article/crv/2015/1986a031/12OmNApLGDA", "parentPublication": { "id": "proceedings/crv/2015/1986/0", "title": "2015 12th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0954", "title": "The Power of Points for Modeling Humans in Clothing", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0954/1BmLrmWbNuM", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2022/5670/0/567000a679", "title": "Neural Point-based Shape Modeling of Humans in Challenging Clothing", "doi": null, "abstractUrl": "/proceedings-article/3dv/2022/567000a679/1KYsvi8qLS0", "parentPublication": { "id": "proceedings/3dv/2022/5670/0", "title": "2022 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f430", "title": "Skeleton-Aware 3D Human Shape Reconstruction From Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f430/1hVlIbqDjtC", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/12/09127813", "title": "Deep Learning for 3D Point Clouds: A Survey", "doi": null, "abstractUrl": "/journal/tp/2021/12/09127813/1l3udiVJLpe", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h273", "title": "Sequential 3D Human Pose and Shape Estimation From Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h273/1m3n9ZIA5BS", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2020/8128/0/812800b018", "title": "Self-Supervised Learning of Point Clouds via Orientation Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2020/812800b018/1qyxiloPGBq", "parentPublication": { "id": "proceedings/3dv/2020/8128/0", "title": "2020 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412440", "title": "Learning Interpretable Representation for 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412440/1tmhN9Q0eg8", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900q6077", "title": "SCALE: Modeling Clothed Humans with a Surface Codec of Articulated Local Elements", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900q6077/1yeIj9jyjks", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2021/2688/0/268800b196", "title": "Geometric Adversarial Attacks and Defenses on 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/3dv/2021/268800b196/1zWElzlz47C", "parentPublication": { "id": "proceedings/3dv/2021/2688/0", "title": "2021 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirt", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WwsQ4S", "doi": "10.1109/CVPR.2018.00010", "title": "Finding Tiny Faces in the Wild with Generative Adversarial Network", "normalizedTitle": "Finding Tiny Faces in the Wild with Generative Adversarial Network", "abstract": "Face detection techniques have been developed for decades, and one of remaining open challenges is detecting small faces in unconstrained conditions. The reason is that tiny faces are often lacking detailed information and blurring. In this paper, we proposed an algorithm to directly generate a clear high-resolution face from a blurry small one by adopting a generative adversarial network (GAN). Toward this end, the basic GAN formulation achieves it by super-resolving and refining sequentially (e.g. SR-GAN and cycle-GAN). However, we design a novel network to address the problem of super-resolving and refining jointly. We also introduce new training losses to guide the generator network to recover fine details and to promote the discriminator network to distinguish real vs. fake and face vs. non-face simultaneously. Extensive experiments on the challenging dataset WIDER FACE demonstrate the effectiveness of our proposed method in restoring a clear high-resolution face from a blurry small one, and show that the detection performance outperforms other state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "Face detection techniques have been developed for decades, and one of remaining open challenges is detecting small faces in unconstrained conditions. The reason is that tiny faces are often lacking detailed information and blurring. In this paper, we proposed an algorithm to directly generate a clear high-resolution face from a blurry small one by adopting a generative adversarial network (GAN). Toward this end, the basic GAN formulation achieves it by super-resolving and refining sequentially (e.g. SR-GAN and cycle-GAN). However, we design a novel network to address the problem of super-resolving and refining jointly. We also introduce new training losses to guide the generator network to recover fine details and to promote the discriminator network to distinguish real vs. fake and face vs. non-face simultaneously. Extensive experiments on the challenging dataset WIDER FACE demonstrate the effectiveness of our proposed method in restoring a clear high-resolution face from a blurry small one, and show that the detection performance outperforms other state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Face detection techniques have been developed for decades, and one of remaining open challenges is detecting small faces in unconstrained conditions. The reason is that tiny faces are often lacking detailed information and blurring. In this paper, we proposed an algorithm to directly generate a clear high-resolution face from a blurry small one by adopting a generative adversarial network (GAN). Toward this end, the basic GAN formulation achieves it by super-resolving and refining sequentially (e.g. SR-GAN and cycle-GAN). However, we design a novel network to address the problem of super-resolving and refining jointly. We also introduce new training losses to guide the generator network to recover fine details and to promote the discriminator network to distinguish real vs. fake and face vs. non-face simultaneously. Extensive experiments on the challenging dataset WIDER FACE demonstrate the effectiveness of our proposed method in restoring a clear high-resolution face from a blurry small one, and show that the detection performance outperforms other state-of-the-art methods.", "fno": "642000a021", "keywords": [ "Image Resolution", "Face Resolution", "WIDER FACE Dataset", "SR GAN Formulation", "Cycle GAN Formulation", "Face Detection Techniques", "Generative Adversarial Network", "Generators", "Generative Adversarial Networks", "Face Detection", "Gallium Nitride", "Detectors", "Spatial Resolution" ], "authors": [ { "affiliation": null, "fullName": "Yancheng Bai", "givenName": "Yancheng", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yongqiang Zhang", "givenName": "Yongqiang", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mingli Ding", "givenName": "Mingli", "surname": "Ding", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bernard Ghanem", "givenName": "Bernard", "surname": "Ghanem", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "21-30", "year": "2018", "issn": null, "isbn": "978-1-5386-6420-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "642000a011", "articleId": "17D45VsBTWM", "__typename": "AdjacentArticleType" }, "next": { "fno": "642000a031", "articleId": "17D45WUj90O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545881", "title": "MMGAN: Manifold-Matching Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546090", "title": "Mutual-optimization Towards Generative Adversarial Networks For Robust Speech Recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546090/17D45WWzW5F", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545119", "title": "Global and Local Consistent Age Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545119/17D45WaTkgS", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545081", "title": "GP-GAN: Gender Preserving GAN for Synthesizing Faces from Landmarks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545081/17D45XDIXOU", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2019/1838/0/183800a129", "title": "Generative Adversarial Networks Using Adaptive Convolution", "doi": null, "abstractUrl": "/proceedings-article/crv/2019/183800a129/1cMGv0MWlrO", "parentPublication": { "id": "proceedings/crv/2019/1838/0", "title": "2019 16th Conference on Computer and Robot Vision (CRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0520", "title": "Boundless: Generative Adversarial Networks for Image Extension", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09117185", "title": "Dynamic Facial Expression Generation on Hilbert Hypersphere With Conditional Wasserstein Generative Adversarial Nets", "doi": null, "abstractUrl": "/journal/tp/2022/02/09117185/1kGfN3QogZq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102788", "title": "Occlusion-Aware GAN for Face De-Occlusion in the Wild", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102788/1kwqZfMSDIc", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2020/4272/0/427200a314", "title": "Face Aging with Conditional Generative Adversarial Network Guided by Ranking-CNN", "doi": null, "abstractUrl": "/proceedings-article/mipr/2020/427200a314/1mAa24QPsEU", "parentPublication": { "id": "proceedings/mipr/2020/4272/0", "title": "2020 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKis4", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45Xtvp9B", "doi": "10.1109/ICDM.2018.00149", "title": "TreeGAN: Syntax-Aware Sequence Generation with Generative Adversarial Networks", "normalizedTitle": "TreeGAN: Syntax-Aware Sequence Generation with Generative Adversarial Networks", "abstract": "Generative Adversarial Networks (GANs) have shown great capacity on image generation, in which a discriminative model guides the training of a generative model to construct images that resemble real images. Recently, GANs have been extended from generating images to generating sequences (e.g., poems, music and codes). Existing GANs on sequence generation mainly focus on general sequences, which are grammar-free. In many real-world applications, however, we need to generate sequences in a formal language with the constraint of its corresponding grammar. For example, to test the performance of a database, one may want to generate a collection of SQL queries, which are not only similar to the queries of real users, but also follow the SQL syntax of the target database. Generating such sequences is highly challenging because both the generator and discriminator of GANs need to consider the structure of the sequences and the given grammar in the formal language. To address these issues, we study the problem of syntax-aware sequence generation with GANs, in which a collection of real sequences and a set of pre-defined grammatical rules are given to both discriminator and generator. We propose a novel GAN framework, namely TreeGAN, to incorporate a given Context-Free Grammar (CFG) into the sequence generation process. In TreeGAN, the generator employs a recurrent neural network (RNN) to construct a parse tree. Each generated parse tree can then be translated to a valid sequence of the given grammar. The discriminator uses a tree-structured RNN to distinguish the generated trees from real trees. We show that TreeGAN can generate sequences for any CFG and its generation fully conforms with the given syntax. Experiments on synthetic and real data sets demonstrated that TreeGAN significantly improves the quality of the sequence generation in context-free languages.", "abstracts": [ { "abstractType": "Regular", "content": "Generative Adversarial Networks (GANs) have shown great capacity on image generation, in which a discriminative model guides the training of a generative model to construct images that resemble real images. Recently, GANs have been extended from generating images to generating sequences (e.g., poems, music and codes). Existing GANs on sequence generation mainly focus on general sequences, which are grammar-free. In many real-world applications, however, we need to generate sequences in a formal language with the constraint of its corresponding grammar. For example, to test the performance of a database, one may want to generate a collection of SQL queries, which are not only similar to the queries of real users, but also follow the SQL syntax of the target database. Generating such sequences is highly challenging because both the generator and discriminator of GANs need to consider the structure of the sequences and the given grammar in the formal language. To address these issues, we study the problem of syntax-aware sequence generation with GANs, in which a collection of real sequences and a set of pre-defined grammatical rules are given to both discriminator and generator. We propose a novel GAN framework, namely TreeGAN, to incorporate a given Context-Free Grammar (CFG) into the sequence generation process. In TreeGAN, the generator employs a recurrent neural network (RNN) to construct a parse tree. Each generated parse tree can then be translated to a valid sequence of the given grammar. The discriminator uses a tree-structured RNN to distinguish the generated trees from real trees. We show that TreeGAN can generate sequences for any CFG and its generation fully conforms with the given syntax. Experiments on synthetic and real data sets demonstrated that TreeGAN significantly improves the quality of the sequence generation in context-free languages.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Generative Adversarial Networks (GANs) have shown great capacity on image generation, in which a discriminative model guides the training of a generative model to construct images that resemble real images. Recently, GANs have been extended from generating images to generating sequences (e.g., poems, music and codes). Existing GANs on sequence generation mainly focus on general sequences, which are grammar-free. In many real-world applications, however, we need to generate sequences in a formal language with the constraint of its corresponding grammar. For example, to test the performance of a database, one may want to generate a collection of SQL queries, which are not only similar to the queries of real users, but also follow the SQL syntax of the target database. Generating such sequences is highly challenging because both the generator and discriminator of GANs need to consider the structure of the sequences and the given grammar in the formal language. To address these issues, we study the problem of syntax-aware sequence generation with GANs, in which a collection of real sequences and a set of pre-defined grammatical rules are given to both discriminator and generator. We propose a novel GAN framework, namely TreeGAN, to incorporate a given Context-Free Grammar (CFG) into the sequence generation process. In TreeGAN, the generator employs a recurrent neural network (RNN) to construct a parse tree. Each generated parse tree can then be translated to a valid sequence of the given grammar. The discriminator uses a tree-structured RNN to distinguish the generated trees from real trees. We show that TreeGAN can generate sequences for any CFG and its generation fully conforms with the given syntax. Experiments on synthetic and real data sets demonstrated that TreeGAN significantly improves the quality of the sequence generation in context-free languages.", "fno": "08594958", "keywords": [ "Syntactics", "Gallium Nitride", "Generators", "Grammar", "Production", "Generative Adversarial Networks", "Training", "Generative Adversarial Networks", "Tree Generation", "Sequence Generation", "Context Free Language" ], "authors": [ { "affiliation": null, "fullName": "Xinyue Liu", "givenName": "Xinyue", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiangnan Kong", "givenName": "Xiangnan", "surname": "Kong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lei Liu", "givenName": "Lei", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kuorong Chiang", "givenName": "Kuorong", "surname": "Chiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1140-1145", "year": "2018", "issn": null, "isbn": "978-1-5386-9159-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08594957", "articleId": "17D45XuDNFg", "__typename": "AdjacentArticleType" }, "next": { "fno": "08594959", "articleId": "17D45VTRoED", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/aipr/2017/1235/0/08457952", "title": "Generative Adversarial Networks for Classification", "doi": null, "abstractUrl": "/proceedings-article/aipr/2017/08457952/13xI8AQ5AJ6", "parentPublication": { "id": "proceedings/aipr/2017/1235/0", "title": "2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acpr/2017/3354/0/3354a115", "title": "Deep Feature Similarity for Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/acpr/2017/3354a115/17D45Wuc39X", "parentPublication": { "id": "proceedings/acpr/2017/3354/0", "title": "2017 4th IAPR Asian Conference on Pattern Recognition (ACPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546039", "title": "3D Convolutional Generative Adversarial Networks for Detecting Temporal Irregularities in Videos", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546039/17D45X7VTeW", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2019/3131/0/313100a018", "title": "Structured Coupled Generative Adversarial Networks for Unsupervised Monocular Depth Estimation", "doi": null, "abstractUrl": "/proceedings-article/3dv/2019/313100a018/1ezRC2U52Vi", "parentPublication": { "id": "proceedings/3dv/2019/3131/0", "title": "2019 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093408", "title": "Image Difficulty Curriculum for Generative Adversarial Networks (CuGAN)", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093408/1jPbnWQYNAA", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102779", "title": "A Multi-Player Minimax Game for Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102779/1kwr6BsKnRu", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipdpsw/2020/7445/0/09150388", "title": "Parallel/distributed implementation of cellular training for generative adversarial neural networks", "doi": null, "abstractUrl": "/proceedings-article/ipdpsw/2020/09150388/1lPGHc3Qm7C", "parentPublication": { "id": "proceedings/ipdpsw/2020/7445/0", "title": "2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i204", "title": "A U-Net Based Discriminator for Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i204/1m3nCvUuTyU", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/05/09290435", "title": "Optimizing Latent Distributions for Non-Adversarial Generative Networks", "doi": null, "abstractUrl": "/journal/tp/2022/05/09290435/1prKHvxF2lW", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbsdiSQRa", "doi": "10.1109/WACV45572.2020.9093603", "title": "Enhanced generative adversarial network for 3D brain MRI super-resolution", "normalizedTitle": "Enhanced generative adversarial network for 3D brain MRI super-resolution", "abstract": "Single image super-resolution (SISR) reconstruction for magnetic resonance imaging (MRI) has generated significant interest because of its potential to not only speed up imaging but to improve quantitative processing and analysis of available image data. Generative Adversarial Networks (GAN) have proven to perform well in image recovery tasks. In this work, we followed the GAN framework and developed a generator coupled with discriminator to tackle the task of 3D SISR on T1 brain MRI images. We developed a novel 3D memory-efficient residual-dense block generator (MRDG) that achieves state-of-the-art performance in terms of SSIM (Structural Similarity), PSNR (Peak Signal to Noise Ratio) and NRMSE (Normalized Root Mean Squared Error) metrics. We also designed a pyramid pooling discriminator (PPD) to recover details on different size scales simultaneously. Finally, we introduced model blending, a simple and computational efficient method to balance between image and texture quality in the final output, to the task of SISR on 3D images.", "abstracts": [ { "abstractType": "Regular", "content": "Single image super-resolution (SISR) reconstruction for magnetic resonance imaging (MRI) has generated significant interest because of its potential to not only speed up imaging but to improve quantitative processing and analysis of available image data. Generative Adversarial Networks (GAN) have proven to perform well in image recovery tasks. In this work, we followed the GAN framework and developed a generator coupled with discriminator to tackle the task of 3D SISR on T1 brain MRI images. We developed a novel 3D memory-efficient residual-dense block generator (MRDG) that achieves state-of-the-art performance in terms of SSIM (Structural Similarity), PSNR (Peak Signal to Noise Ratio) and NRMSE (Normalized Root Mean Squared Error) metrics. We also designed a pyramid pooling discriminator (PPD) to recover details on different size scales simultaneously. Finally, we introduced model blending, a simple and computational efficient method to balance between image and texture quality in the final output, to the task of SISR on 3D images.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Single image super-resolution (SISR) reconstruction for magnetic resonance imaging (MRI) has generated significant interest because of its potential to not only speed up imaging but to improve quantitative processing and analysis of available image data. Generative Adversarial Networks (GAN) have proven to perform well in image recovery tasks. In this work, we followed the GAN framework and developed a generator coupled with discriminator to tackle the task of 3D SISR on T1 brain MRI images. We developed a novel 3D memory-efficient residual-dense block generator (MRDG) that achieves state-of-the-art performance in terms of SSIM (Structural Similarity), PSNR (Peak Signal to Noise Ratio) and NRMSE (Normalized Root Mean Squared Error) metrics. We also designed a pyramid pooling discriminator (PPD) to recover details on different size scales simultaneously. Finally, we introduced model blending, a simple and computational efficient method to balance between image and texture quality in the final output, to the task of SISR on 3D images.", "fno": "09093603", "keywords": [ "Biomedical MRI", "Brain", "Image Reconstruction", "Image Resolution", "Mean Square Error Methods", "Medical Image Processing", "Pyramid Pooling Discriminator", "Texture Quality", "3 D Brain MRI Super Resolution", "Single Image Super Resolution Reconstruction", "Magnetic Resonance Imaging", "Generative Adversarial Networks", "Image Recovery Tasks", "GAN Framework", "Brain MRI Images", "3 D Memory Efficient Residual Dense Block Generator", "Three Dimensional Displays", "Gallium Nitride", "Training", "Generative Adversarial Networks", "Spatial Resolution", "Magnetic Resonance Imaging" ], "authors": [ { "affiliation": "University of Pennsylvania,Penn Image Computing and Science Laboratory,Philadelphia,PA,USA,19104", "fullName": "Jiancong Wang", "givenName": "Jiancong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Department of Bioengineering,Los Angeles,CA,USA,90095", "fullName": "Yuhua Chen", "givenName": "Yuhua", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Penn Image Computing and Science Laboratory,Philadelphia,PA,USA,19104", "fullName": "Yifan Wu", "givenName": "Yifan", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Department of Computer and Information Science,Philadelphia,PA,USA,19104", "fullName": "Jianbo Shi", "givenName": "Jianbo", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Pennsylvania,Penn Image Computing and Science Laboratory,Philadelphia,PA,USA,19104", "fullName": "James Gee", "givenName": "James", "surname": "Gee", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "3616-3625", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093506", "articleId": "1jPbuoxTxcY", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093484", "articleId": "1jPbqkqYrug", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a413", "title": "Monocular Depth Prediction Using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a413/17D45XH89pp", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927955", "title": "A Modified Generative Adversarial Network for Reconstruction of Compressed Sesning MRI", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927955/1J4CFCgLQWs", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/01/08744312", "title": "A Framework of Composite Functional Gradient Methods for Generative Adversarial Models", "doi": null, "abstractUrl": "/journal/tp/2021/01/08744312/1bcHp9xXdoA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a178", "title": "TH-GAN: Generative Adversarial Network Based Transfer Learning for Historical Chinese Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a178/1h81u6jDzSE", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0520", "title": "Boundless: Generative Adversarial Networks for Image Extension", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0520/1hVlEtLruve", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09151087", "title": "Structure Preserving Compressive Sensing MRI Reconstruction using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09151087/1lPH4HitLwI", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h796", "title": "MSG-GAN: Multi-Scale Gradients for Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h796/1m3oneHfgTS", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2020/9274/0/927400a001", "title": "Why are Generative Adversarial Networks so Fascinating and Annoying?", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2020/927400a001/1p2VAkdrCXC", "parentPublication": { "id": "proceedings/sibgrapi/2020/9274/0", "title": "2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2021/2616/0/261600a184", "title": "Learning Structural Coherence Via Generative Adversarial Network for Single Image Super-resolution", "doi": null, "abstractUrl": "/proceedings-article/iccea/2021/261600a184/1y4oyi2g74c", "parentPublication": { "id": "proceedings/iccea/2021/2616/0", "title": "2021 International Conference on Computer Engineering and Application (ICCEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kwqNHC4Fy0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kwr3cBl864", "doi": "10.1109/ICME46284.2020.9102917", "title": "Matchinggan: Matching-Based Few-Shot Image Generation", "normalizedTitle": "Matchinggan: Matching-Based Few-Shot Image Generation", "abstract": "To generate new images for a given category, most deep generative models require abundant training images from this category, which are often too expensive to acquire. To achieve the goal of generation based on only a few images, we propose matching-based Generative Adversarial Network (GAN) for few-shot generation, which includes a matching generator and a matching discriminator. Matching generator can match random vectors with a few conditional images from the same category and generate new images for this category based on the fused features. The matching discriminator extends conventional GAN discriminator by matching the feature of generated image with the fused feature of conditional images. Extensive experiments on three datasets demonstrate the effectiveness of our proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "To generate new images for a given category, most deep generative models require abundant training images from this category, which are often too expensive to acquire. To achieve the goal of generation based on only a few images, we propose matching-based Generative Adversarial Network (GAN) for few-shot generation, which includes a matching generator and a matching discriminator. Matching generator can match random vectors with a few conditional images from the same category and generate new images for this category based on the fused features. The matching discriminator extends conventional GAN discriminator by matching the feature of generated image with the fused feature of conditional images. Extensive experiments on three datasets demonstrate the effectiveness of our proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "To generate new images for a given category, most deep generative models require abundant training images from this category, which are often too expensive to acquire. To achieve the goal of generation based on only a few images, we propose matching-based Generative Adversarial Network (GAN) for few-shot generation, which includes a matching generator and a matching discriminator. Matching generator can match random vectors with a few conditional images from the same category and generate new images for this category based on the fused features. The matching discriminator extends conventional GAN discriminator by matching the feature of generated image with the fused feature of conditional images. Extensive experiments on three datasets demonstrate the effectiveness of our proposed method.", "fno": "09102917", "keywords": [ "Feature Extraction", "Image Matching", "Learning Artificial Intelligence", "Fused Feature", "Conditional Images", "Matching Based Few Shot Image Generation", "Deep Generative Models", "Abundant Training Images", "Matching Generator", "Matching Discriminator", "Conventional GAN Discriminator", "Generative Adversarial Network", "Matching GAN", "Generators", "Generative Adversarial Networks", "Gallium Nitride", "Training", "Fuses", "Decoding", "Image Generation", "Few Shot Learning", "Generative Adversarial Network" ], "authors": [ { "affiliation": "Shanghai Jiao Tong University,MoE Key Lab of Artificial Intelligence,Shanghai,China", "fullName": "Yan Hong", "givenName": "Yan", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,MoE Key Lab of Artificial Intelligence,Shanghai,China", "fullName": "Li Niu", "givenName": "Li", "surname": "Niu", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,MoE Key Lab of Artificial Intelligence,Shanghai,China", "fullName": "Jianfu Zhang", "givenName": "Jianfu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shanghai Jiao Tong University,MoE Key Lab of Artificial Intelligence,Shanghai,China", "fullName": "Liqing Zhang", "givenName": "Liqing", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2020", "issn": null, "isbn": "978-1-7281-1331-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09102897", "articleId": "1kwqSQ2jPfa", "__typename": "AdjacentArticleType" }, "next": { "fno": "09102783", "articleId": "1kwr3mZGzmw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545881", "title": "MMGAN: Manifold-Matching Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545881/17D45WHONmN", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000a821", "title": "FaceID-GAN: Learning a Symmetry Three-Player GAN for Identity-Preserving Face Synthesis", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000a821/17D45Xh13pk", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i443", "title": "LoFGAN: Fusing Local Representations for Few-shot Image Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i443/1BmF1ssyaJ2", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600l1184", "title": "Attribute Group Editing for Reliable Few-shot Image Generation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600l1184/1H1jtqIOq3K", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b065", "title": "Cell Image Segmentation by Integrating Pix2pixs for Each Class", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b065/1iTvfMQjLTa", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093525", "title": "FX-GAN: Self-Supervised GAN Learning via Feature Exchange", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093525/1jPbxvOsk6s", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800a469", "title": "Transformation GAN for Unsupervised Image Synthesis and Representation Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800a469/1m3nzGAm5qg", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2020/9331/0/09306662", "title": "Deep Learning with AnoGAN and Efficient GAN to Judge Agricultural Harvest Image Data", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2020/09306662/1qcigaFrNw4", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2020/9331/0", "title": "2020 Joint 9th International Conference on Informatics, Electronics & Vision (ICIEV) and 2020 4th International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a864", "title": "Generation of malicious webpage samples based on GAN", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a864/1r54cGDIsw0", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVr", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyrIatq", "doi": "10.1109/CVPR.2017.741", "title": "Generative Attribute Controller with Conditional Filtered Generative Adversarial Networks", "normalizedTitle": "Generative Attribute Controller with Conditional Filtered Generative Adversarial Networks", "abstract": "We present a generative attribute controller (GAC), a novel functionality for generating or editing an image while intuitively controlling large variations of an attribute. This controller is based on a novel generative model called the conditional filtered generative adversarial network (CFGAN), which is an extension of the conventional conditional GAN (CGAN) that incorporates a filtering architecture into the generator input. Unlike the conventional CGAN, which represents an attribute directly using an observable variable (e.g., the binary indicator of attribute presence) so its controllability is restricted to attribute labeling (e.g., restricted to an ON or OFF control), the CFGAN has a filtering architecture that associates an attribute with a multi-dimensional latent variable, enabling latent variations of the attribute to be represented. We also define the filtering architecture and training scheme considering controllability, enabling the variations of the attribute to be intuitively controlled using typical controllers (radio buttons and slide bars). We evaluated our CFGAN on MNIST, CUB, and CelebA datasets and show that it enables large variations of an attribute to be not only represented but also intuitively controlled while retaining identity. We also show that the learned latent space has enough expressive power to conduct attribute transfer and attribute-based image retrieval.", "abstracts": [ { "abstractType": "Regular", "content": "We present a generative attribute controller (GAC), a novel functionality for generating or editing an image while intuitively controlling large variations of an attribute. This controller is based on a novel generative model called the conditional filtered generative adversarial network (CFGAN), which is an extension of the conventional conditional GAN (CGAN) that incorporates a filtering architecture into the generator input. Unlike the conventional CGAN, which represents an attribute directly using an observable variable (e.g., the binary indicator of attribute presence) so its controllability is restricted to attribute labeling (e.g., restricted to an ON or OFF control), the CFGAN has a filtering architecture that associates an attribute with a multi-dimensional latent variable, enabling latent variations of the attribute to be represented. We also define the filtering architecture and training scheme considering controllability, enabling the variations of the attribute to be intuitively controlled using typical controllers (radio buttons and slide bars). We evaluated our CFGAN on MNIST, CUB, and CelebA datasets and show that it enables large variations of an attribute to be not only represented but also intuitively controlled while retaining identity. We also show that the learned latent space has enough expressive power to conduct attribute transfer and attribute-based image retrieval.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a generative attribute controller (GAC), a novel functionality for generating or editing an image while intuitively controlling large variations of an attribute. This controller is based on a novel generative model called the conditional filtered generative adversarial network (CFGAN), which is an extension of the conventional conditional GAN (CGAN) that incorporates a filtering architecture into the generator input. Unlike the conventional CGAN, which represents an attribute directly using an observable variable (e.g., the binary indicator of attribute presence) so its controllability is restricted to attribute labeling (e.g., restricted to an ON or OFF control), the CFGAN has a filtering architecture that associates an attribute with a multi-dimensional latent variable, enabling latent variations of the attribute to be represented. We also define the filtering architecture and training scheme considering controllability, enabling the variations of the attribute to be intuitively controlled using typical controllers (radio buttons and slide bars). We evaluated our CFGAN on MNIST, CUB, and CelebA datasets and show that it enables large variations of an attribute to be not only represented but also intuitively controlled while retaining identity. We also show that the learned latent space has enough expressive power to conduct attribute transfer and attribute-based image retrieval.", "fno": "0457h006", "keywords": [ "Image Filtering", "Image Representation", "Image Retrieval", "Neural Nets", "Conditional Filtered Generative Adversarial Network", "CFGAN", "Conventional Conditional GAN", "Filtering Architecture", "Attribute Labeling", "Training Scheme Considering Controllability", "Attribute Transfer", "Generative Attribute Controller", "GAC", "Image Editing", "Multidimensional Latent Variable", "MNIST Datasets", "CUB Datasets", "Celeb A Datasets", "Attribute Representation", "Latent Space Learning", "Attribute Based Image Retrieval", "Gallium Nitride", "Generators", "Aerospace Electronics", "Controllability", "Training", "Glass", "Face" ], "authors": [ { "affiliation": null, "fullName": "Takuhiro Kaneko", "givenName": "Takuhiro", "surname": "Kaneko", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kaoru Hiramatsu", "givenName": "Kaoru", "surname": "Hiramatsu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kunio Kashino", "givenName": "Kunio", "surname": "Kashino", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "7006-7015", "year": "2017", "issn": "1063-6919", "isbn": "978-1-5386-0457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0457g997", "articleId": "12OmNs59JSE", "__typename": "AdjacentArticleType" }, "next": { "fno": "0457h016", "articleId": "12OmNzCWG79", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2018/4886/0/488601b539", "title": "Task Specific Visual Saliency Prediction with Memory Augmented Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/wacv/2018/488601b539/12OmNrAdsui", "parentPublication": { "id": "proceedings/wacv/2018/4886/0", "title": "2018 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2017/0457/0/0457b225", "title": "Learning Residual Images for Face Attribute Manipulation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2017/0457b225/12OmNx8fihM", "parentPublication": { "id": "proceedings/cvpr/2017/0457/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032e520", "title": "Shadow Detection with Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032e520/12OmNyKJifA", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000g606", "title": "Generative Adversarial Image Synthesis with Decision Tree Latent Controller", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000g606/17D45WYQJ62", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d501", "title": "Cross-View Image Synthesis Using Conditional GANs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d501/17D45WwsQ8X", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i202", "title": "Single Image Dehazing via Conditional Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i202/17D45Xi9rWV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2019/0890/0/089000a161", "title": "Collaborative Generative Adversarial Network for Recommendation Systems", "doi": null, "abstractUrl": "/proceedings-article/icdew/2019/089000a161/1bhJ8MxYi4g", "parentPublication": { "id": "proceedings/icdew/2019/0890/0", "title": "2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300k0540", "title": "Attribute Manipulation Generative Adversarial Networks for Fashion Images", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300k0540/1hVloNEYY8w", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102961", "title": "Robust Bidirectional Generative Network For Generalized Zero-Shot Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102961/1kwrcnvJMl2", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBbaH9O", "title": "2017 IEEE International Symposium on Multimedia (ISM)", "acronym": "ism", "groupId": "1001094", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNz61dfA", "doi": "10.1109/ISM.2017.102", "title": "Context-aware Image Generation by Using Generative Adversarial Networks", "normalizedTitle": "Context-aware Image Generation by Using Generative Adversarial Networks", "abstract": "Automatically generating images from text by using generative adversarial networks (GANs) has been actively investigated. To the best of our knowledge, there is no method of generating images with consideration of the given text and its context; therefore, representing a story describing a series of related actions is insufficient for applications such as generating image sequences. In this paper, we propose a method of automatically tuning the noise parameter of GANs and a context-aware GAN model to generate images from a series of text and image pairs. Our method and model can be used for automatically generating visual stories.", "abstracts": [ { "abstractType": "Regular", "content": "Automatically generating images from text by using generative adversarial networks (GANs) has been actively investigated. To the best of our knowledge, there is no method of generating images with consideration of the given text and its context; therefore, representing a story describing a series of related actions is insufficient for applications such as generating image sequences. In this paper, we propose a method of automatically tuning the noise parameter of GANs and a context-aware GAN model to generate images from a series of text and image pairs. Our method and model can be used for automatically generating visual stories.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automatically generating images from text by using generative adversarial networks (GANs) has been actively investigated. To the best of our knowledge, there is no method of generating images with consideration of the given text and its context; therefore, representing a story describing a series of related actions is insufficient for applications such as generating image sequences. In this paper, we propose a method of automatically tuning the noise parameter of GANs and a context-aware GAN model to generate images from a series of text and image pairs. Our method and model can be used for automatically generating visual stories.", "fno": "2937a516", "keywords": [ "Gallium Nitride", "Generators", "Tuning", "Context Modeling", "Image Generation", "Image Sequences", "Data Models", "Generative Adversarial Networks GA Ns", "Context Aware", "Visual Story", "Image Generation" ], "authors": [ { "affiliation": null, "fullName": "Kenki Nakamura", "givenName": "Kenki", "surname": "Nakamura", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qiang Ma", "givenName": "Qiang", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "ism", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "516-523", "year": "2017", "issn": null, "isbn": "978-1-5386-2937-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2937a511", "articleId": "12OmNzV70E5", "__typename": "AdjacentArticleType" }, "next": { "fno": "2937a524", "articleId": "12OmNxzMnXC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2017/1032/0/1032c813", "title": "Least Squares Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032c813/12OmNB7cjhc", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032d430", "title": "Generative Adversarial Networks Conditioned by Brain Signals", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032d430/12OmNCd2rEw", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2018/6060/0/606001a442", "title": "Improving Skin Lesion Segmentation with Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a442/12OmNrkBwzu", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550880", "title": "Image generation using generative adversarial networks and attention mechanism", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550880/12OmNzlD941", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2019/08/08411144", "title": "StackGAN++: Realistic Image Synthesis with Stacked Generative Adversarial Networks", "doi": null, "abstractUrl": "/journal/tp/2019/08/08411144/13rRUynZ5pp", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486440", "title": "Densely Stacked Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486440/14jQfSnkWGs", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2018/9159/0/08594958", "title": "TreeGAN: Syntax-Aware Sequence Generation with Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594958/17D45Xtvp9B", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300d063", "title": "Sparse Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300d063/1i5myXMijcY", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2020/9360/0/09150661", "title": "Real-World Super-Resolution using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2020/09150661/1lPH66Ff2HS", "parentPublication": { "id": "proceedings/cvprw/2020/9360/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800i401", "title": "Noise Robust Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800i401/1m3nDLxMYcU", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKis4", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45XuDNGX", "doi": "10.1109/ICDM.2018.00203", "title": "Density-Adaptive Local Edge Representation Learning with Generative Adversarial Network Multi-label Edge Classification", "normalizedTitle": "Density-Adaptive Local Edge Representation Learning with Generative Adversarial Network Multi-label Edge Classification", "abstract": "Traditional network representation learning techniques aim to learn latent low-dimensional representation of vertices in graphs. This paper presents a novel edge representation learning framework, GANDLERL, that combines generative adversarial network based multi-label classification with density-adaptive local edge representation learning for producing high-quality low-dimensional edge representations. First, we design a generative adversarial network based multi-label edge classification model to classify rarely labeled edges in graphs with a large amount of noise data into K classes. A four-player zero-sum game model, with the mixed training of true and real-looking fake edges as well as a contrastive loss containing a similar-loss and a dissimilar-loss, is proposed to improve the classification quality of unlabeled edges. Second, a local autoencoder edge representation learning method is developed to design K local representation learning models, each with individual parameters and structure to perform local representation learning on each of K classification-based subgraphs with unique local characteristics and jointly optimize the loss functions within and across classes. Third but last, we propose a density-adaptive edge representation learning method with the optimization at both edge and subgraph levels to address the representation learning of graph data with highly imbalanced vertex degree and edge distribution.", "abstracts": [ { "abstractType": "Regular", "content": "Traditional network representation learning techniques aim to learn latent low-dimensional representation of vertices in graphs. This paper presents a novel edge representation learning framework, GANDLERL, that combines generative adversarial network based multi-label classification with density-adaptive local edge representation learning for producing high-quality low-dimensional edge representations. First, we design a generative adversarial network based multi-label edge classification model to classify rarely labeled edges in graphs with a large amount of noise data into K classes. A four-player zero-sum game model, with the mixed training of true and real-looking fake edges as well as a contrastive loss containing a similar-loss and a dissimilar-loss, is proposed to improve the classification quality of unlabeled edges. Second, a local autoencoder edge representation learning method is developed to design K local representation learning models, each with individual parameters and structure to perform local representation learning on each of K classification-based subgraphs with unique local characteristics and jointly optimize the loss functions within and across classes. Third but last, we propose a density-adaptive edge representation learning method with the optimization at both edge and subgraph levels to address the representation learning of graph data with highly imbalanced vertex degree and edge distribution.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Traditional network representation learning techniques aim to learn latent low-dimensional representation of vertices in graphs. This paper presents a novel edge representation learning framework, GANDLERL, that combines generative adversarial network based multi-label classification with density-adaptive local edge representation learning for producing high-quality low-dimensional edge representations. First, we design a generative adversarial network based multi-label edge classification model to classify rarely labeled edges in graphs with a large amount of noise data into K classes. A four-player zero-sum game model, with the mixed training of true and real-looking fake edges as well as a contrastive loss containing a similar-loss and a dissimilar-loss, is proposed to improve the classification quality of unlabeled edges. Second, a local autoencoder edge representation learning method is developed to design K local representation learning models, each with individual parameters and structure to perform local representation learning on each of K classification-based subgraphs with unique local characteristics and jointly optimize the loss functions within and across classes. Third but last, we propose a density-adaptive edge representation learning method with the optimization at both edge and subgraph levels to address the representation learning of graph data with highly imbalanced vertex degree and edge distribution.", "fno": "08595012", "keywords": [ "Generative Adversarial Networks", "Gallium Nitride", "Predictive Models", "Data Models", "Task Analysis", "Games", "Learning Systems", "Generative Adversarial Network Multi Label Edge Classification", "Density Adaptive Local Edge Representation Learning" ], "authors": [ { "affiliation": null, "fullName": "Yang Zhou", "givenName": "Yang", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sixing Wu", "givenName": "Sixing", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chao Jiang", "givenName": "Chao", "surname": "Jiang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zijie Zhang", "givenName": "Zijie", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dejing Dou", "givenName": "Dejing", "surname": "Dou", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ruoming Jin", "givenName": "Ruoming", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Pengwei Wang", "givenName": "Pengwei", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-11-01T00:00:00", "pubType": "proceedings", "pages": "1464-1469", "year": "2018", "issn": null, "isbn": "978-1-5386-9159-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08595011", "articleId": "17D45VTRoEa", "__typename": "AdjacentArticleType" }, "next": { "fno": "08595013", "articleId": "17D45VsBU1A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000f764", "title": "Generative Adversarial Learning Towards Fast Weakly Supervised Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000f764/17D45VObpPy", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000j465", "title": "CartoonGAN: Generative Adversarial Networks for Photo Cartoonization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000j465/17D45VsBTWS", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545119", "title": "Global and Local Consistent Age Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545119/17D45WaTkgS", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546246", "title": "Deep Generative Adversarial Networks for the Sparse Signal Denoising", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546246/17D45X7VTge", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000d664", "title": "Unsupervised Deep Generative Adversarial Hashing Network", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000d664/17D45XDIXXI", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a413", "title": "Monocular Depth Prediction Using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a413/17D45XH89pp", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a178", "title": "TH-GAN: Generative Adversarial Network Based Transfer Learning for Historical Chinese Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a178/1h81u6jDzSE", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300c999", "title": "Differential-Evolution-Based Generative Adversarial Networks for Edge Detection", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300c999/1i5mO9bwor6", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800h222", "title": "Distribution-Induced Bidirectional Generative Adversarial Network for Graph Representation Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800h222/1m3nkKd16dW", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigmm/2020/9325/0/09232507", "title": "Recent Developments in Generative Adversarial Networks: A Review (Workshop Paper)", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2020/09232507/1o56zb8YqU8", "parentPublication": { "id": "proceedings/bigmm/2020/9325/0", "title": "2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1ezRzLyH4bu", "title": "2019 International Conference on 3D Vision (3DV)", "acronym": "3dv", "groupId": "1800494", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1ezRC2U52Vi", "doi": "10.1109/3DV.2019.00012", "title": "Structured Coupled Generative Adversarial Networks for Unsupervised Monocular Depth Estimation", "normalizedTitle": "Structured Coupled Generative Adversarial Networks for Unsupervised Monocular Depth Estimation", "abstract": "Inspired by the success of adversarial learning, we propose a new end-to-end unsupervised deep learning framework for monocular depth estimation consisting of two Generative Adversarial Networks (GAN), deeply coupled with a structured Conditional Random Field (CRF) model. The two GANs aim at generating distinct and complementary disparity maps and at improving the generation quality via exploiting the adversarial learning strategy. The deep CRF coupling model is proposed to fuse the generative and discriminative outputs from the dual GAN nets. As such, the model implicitly constructs mutual constraints on the two network branches and between the generator and discriminator. This facilitates the optimization of the whole network for better disparity generation. Extensive experiments on the KITTI, Cityscapes, and Make3D datasets clearly demonstrate the effectiveness of the proposed approach and show superior performance compared to state of the art methods. The code and models are available at https://github.com/mihaipuscas/3dv-coupled-crf-disparity.", "abstracts": [ { "abstractType": "Regular", "content": "Inspired by the success of adversarial learning, we propose a new end-to-end unsupervised deep learning framework for monocular depth estimation consisting of two Generative Adversarial Networks (GAN), deeply coupled with a structured Conditional Random Field (CRF) model. The two GANs aim at generating distinct and complementary disparity maps and at improving the generation quality via exploiting the adversarial learning strategy. The deep CRF coupling model is proposed to fuse the generative and discriminative outputs from the dual GAN nets. As such, the model implicitly constructs mutual constraints on the two network branches and between the generator and discriminator. This facilitates the optimization of the whole network for better disparity generation. Extensive experiments on the KITTI, Cityscapes, and Make3D datasets clearly demonstrate the effectiveness of the proposed approach and show superior performance compared to state of the art methods. The code and models are available at https://github.com/mihaipuscas/3dv-coupled-crf-disparity.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Inspired by the success of adversarial learning, we propose a new end-to-end unsupervised deep learning framework for monocular depth estimation consisting of two Generative Adversarial Networks (GAN), deeply coupled with a structured Conditional Random Field (CRF) model. The two GANs aim at generating distinct and complementary disparity maps and at improving the generation quality via exploiting the adversarial learning strategy. The deep CRF coupling model is proposed to fuse the generative and discriminative outputs from the dual GAN nets. As such, the model implicitly constructs mutual constraints on the two network branches and between the generator and discriminator. This facilitates the optimization of the whole network for better disparity generation. Extensive experiments on the KITTI, Cityscapes, and Make3D datasets clearly demonstrate the effectiveness of the proposed approach and show superior performance compared to state of the art methods. The code and models are available at https://github.com/mihaipuscas/3dv-coupled-crf-disparity.", "fno": "313100a018", "keywords": [ "Image Fusion", "Optimisation", "Random Processes", "Stereo Image Processing", "Unsupervised Learning", "Video Signal Processing", "Disparity Generation", "Unsupervised Monocular Depth Estimation", "End To End Unsupervised Deep Learning Framework", "Disparity Maps", "Complementary Disparity Maps", "Generation Quality", "Adversarial Learning Strategy", "Deep CRF Coupling Model", "Generative Outputs", "Discriminative Outputs", "Dual GAN Nets", "Structured Coupled Generative Adversarial Networks", "Conditional Random Field Model", "KITTI", "Cityscapes", "Make 3 D Datasets", "Optimization", "Estimation", "Generative Adversarial Networks", "Couplings", "Generators", "Gallium Nitride", "Task Analysis", "Testing", "Unsupervised", "Depth Estimation", "CRF", "GAN", "Unsupervised Monocular Depth Estimation" ], "authors": [ { "affiliation": "Huawei Ireland Research Center", "fullName": "Mihai Marian Puscas", "givenName": "Mihai Marian", "surname": "Puscas", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Oxford", "fullName": "Dan Xu", "givenName": "Dan", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Trento", "fullName": "Andrea Pilzer", "givenName": "Andrea", "surname": "Pilzer", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Trento", "fullName": "Niculae Sebe", "givenName": "Niculae", "surname": "Sebe", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-09-01T00:00:00", "pubType": "proceedings", "pages": "18-26", "year": "2019", "issn": null, "isbn": "978-1-7281-3131-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "313100a009", "articleId": "1ezREda3Yje", "__typename": "AdjacentArticleType" }, "next": { "fno": "313100a027", "articleId": "1ezRBmv2ibK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigmm/2018/5321/0/08499105", "title": "SegGAN: Semantic Segmentation with Generative Adversarial Network", "doi": null, "abstractUrl": "/proceedings-article/bigmm/2018/08499105/17D45WHONn7", "parentPublication": { "id": "proceedings/bigmm/2018/5321/0", "title": "2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545894", "title": "Data Augmentation with Improved Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545894/17D45WKWnJc", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546090", "title": "Mutual-optimization Towards Generative Adversarial Networks For Robust Speech Recognition", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546090/17D45WWzW5F", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000i513", "title": "Multi-agent Diverse Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000i513/17D45WXIkDV", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b498", "title": "Duplex Generative Adversarial Network for Unsupervised Domain Adaptation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b498/17D45WYQJ9i", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccd/2018/8477/0/847700a266", "title": "PIM-TGAN: A Processing-in-Memory Accelerator for Ternary Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/iccd/2018/847700a266/17D45Wt3Ewc", "parentPublication": { "id": "proceedings/iccd/2018/8477/0", "title": "2018 IEEE 36th International Conference on Computer Design (ICCD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000a413", "title": "Monocular Depth Prediction Using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000a413/17D45XH89pp", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a200", "title": "Coupled Generative Adversarial Network for Continuous Fine-Grained Action Segmentation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a200/18j8PzcRT2M", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2019/0890/0/089000a161", "title": "Collaborative Generative Adversarial Network for Recommendation Systems", "doi": null, "abstractUrl": "/proceedings-article/icdew/2019/089000a161/1bhJ8MxYi4g", "parentPublication": { "id": "proceedings/icdew/2019/0890/0", "title": "2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ai4i/2019/4087/0/408700a054", "title": "Interpolation of CNC Toolpaths using Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/ai4i/2019/408700a054/1i2oiry1RNm", "parentPublication": { "id": "proceedings/ai4i/2019/4087/0", "title": "2019 Second International Conference on Artificial Intelligence for Industries (AI4I)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pP3sSVh3BS", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pP3ySmfyq4", "doi": "10.1109/ICTAI50040.2020.00167", "title": "Generative Data Augmentation for Diabetic Retinopathy Classification", "normalizedTitle": "Generative Data Augmentation for Diabetic Retinopathy Classification", "abstract": "A fundamental factor limiting the effectiveness of classification algorithms, especially in the medical imaging domain, has been an insufficient quantity of relevant class-specific data. In particular, positive examples of disease conditions tend to be rare, and represent a common bottleneck in improving model performance. In this paper, we introduce GAN-based generative data augmentation methods with dynamic input sampling, and compare their performance against an image feature transfer technique, towards improving the performance of real-world diabetic retinopathy classification tasks. Results suggest that generative data augmentation has the potential to significantly improve classification performance over the baseline.", "abstracts": [ { "abstractType": "Regular", "content": "A fundamental factor limiting the effectiveness of classification algorithms, especially in the medical imaging domain, has been an insufficient quantity of relevant class-specific data. In particular, positive examples of disease conditions tend to be rare, and represent a common bottleneck in improving model performance. In this paper, we introduce GAN-based generative data augmentation methods with dynamic input sampling, and compare their performance against an image feature transfer technique, towards improving the performance of real-world diabetic retinopathy classification tasks. Results suggest that generative data augmentation has the potential to significantly improve classification performance over the baseline.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A fundamental factor limiting the effectiveness of classification algorithms, especially in the medical imaging domain, has been an insufficient quantity of relevant class-specific data. In particular, positive examples of disease conditions tend to be rare, and represent a common bottleneck in improving model performance. In this paper, we introduce GAN-based generative data augmentation methods with dynamic input sampling, and compare their performance against an image feature transfer technique, towards improving the performance of real-world diabetic retinopathy classification tasks. Results suggest that generative data augmentation has the potential to significantly improve classification performance over the baseline.", "fno": "922800b096", "keywords": [ "Diseases", "Eye", "Gallium Compounds", "Image Classification", "Medical Image Processing", "Pattern Classification", "Disease Conditions", "GAN Based Generative Data Augmentation Methods", "Dynamic Input Sampling", "Image Feature Transfer Technique", "Diabetic Retinopathy Classification", "Medical Imaging Domain", "Class Specific Data", "Training", "Retinopathy", "Tools", "Diabetes", "Task Analysis", "Gallium Nitride", "Biomedical Imaging", "Data Augmentation Generative Training Diabetic Retinopathy Generative Adversarial Networks" ], "authors": [ { "affiliation": "Ophthalmology and Visual Science Academic Clinical Program, Duke-NUS Medical School", "fullName": "Gilbert Lim", "givenName": "Gilbert", "surname": "Lim", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Carnegie Mellon University", "fullName": "Pranav Thombre", "givenName": "Pranav", "surname": "Thombre", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing, National University of Singapore", "fullName": "Mong Li Lee", "givenName": "Mong Li", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing, National University of Singapore", "fullName": "Wynne Hsu", "givenName": "Wynne", "surname": "Hsu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "1096-1103", "year": "2020", "issn": null, "isbn": "978-1-7281-9228-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922800b088", "articleId": "1pP3DhIOBWg", "__typename": "AdjacentArticleType" }, "next": { "fno": "922800b104", "articleId": "1pP3DvvuOAw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic3/2017/3077/0/08284350", "title": "Diabetic retinopathy detection using feedforward neural network", "doi": null, "abstractUrl": "/proceedings-article/ic3/2017/08284350/12OmNzA6GNP", "parentPublication": { "id": "proceedings/ic3/2017/3077/0", "title": "2017 Tenth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwecai/2022/7997/0/799700a495", "title": "Multi-stage classification of diabetic retinopathy based on mixed attention network", "doi": null, "abstractUrl": "/proceedings-article/iwecai/2022/799700a495/1Cugp0ivXzO", "parentPublication": { "id": "proceedings/iwecai/2022/7997/0", "title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2022/8810/0/881000b444", "title": "An Ensembled Method For Diabetic Retinopathy Classification using Transfer Learning", "doi": null, "abstractUrl": "/proceedings-article/compsac/2022/881000b444/1FJ5zI6oyFG", "parentPublication": { "id": "proceedings/compsac/2022/8810/0", "title": "2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cacml/2022/8290/0/829000a228", "title": "Classification for diabetic retinopathy by using staged convolutional neural network", "doi": null, "abstractUrl": "/proceedings-article/cacml/2022/829000a228/1FY1dKvynjG", "parentPublication": { "id": "proceedings/cacml/2022/8290/0", "title": "2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2022/7480/0/748000a570", "title": "Classification of Diabetic Retinopathy Based on B-ResNet", "doi": null, "abstractUrl": "/proceedings-article/dsc/2022/748000a570/1H44mf7ra6I", "parentPublication": { "id": "proceedings/dsc/2022/7480/0", "title": "2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994995", "title": "A Deep Convolutional Neural Network For Diagnosis of Diabetic Retinopathy", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994995/1JC2Wz580IE", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001846", "title": "Diabetic Retinopathy Classification Using a Modified Xception Architecture", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001846/1hHMli1HLr2", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313541", "title": "The contribution of AI in the detection of the Diabetic Retinopathy", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313541/1qmg8qWBsm4", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2021/1685/0/168500a019", "title": "Grading Diabetic Retinopathy Severity Using Modern Convolution Neural Networks (CNN)", "doi": null, "abstractUrl": "/proceedings-article/icdh/2021/168500a019/1ymJhB8je7e", "parentPublication": { "id": "proceedings/icdh/2021/1685/0", "title": "2021 IEEE International Conference on Digital Health (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpbd&is/2021/1327/0/09658352", "title": "A Dual Weighted Shared Capsule Network for Diabetic Retinopathy Fundus Classification", "doi": null, "abstractUrl": "/proceedings-article/hpbd&is/2021/09658352/1zRFiarptZu", "parentPublication": { "id": "proceedings/hpbd&is/2021/1327/0", "title": "2021 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx4gUtQ", "title": "2017 International Symposium on Computer Science and Intelligent Controls (ISCSIC)", "acronym": "iscsic", "groupId": "1824604", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNC0guyu", "doi": "10.1109/ISCSIC.2017.22", "title": "Small-Cell Lung Cancer Detection Using a Supervised Machine Learning Algorithm", "normalizedTitle": "Small-Cell Lung Cancer Detection Using a Supervised Machine Learning Algorithm", "abstract": "Cancer-related medical expenses and labor loss cost annually $10,000 billion worldwide. Lung cancer-related deaths exceed 70,000 cases globally every year. Furthermore, 225,000 new cases were detected in the United States in 2016, and 4.3 million new cases in China in 2015. Statistically, most lung cancer related deaths were due to late stage detection. Like other types of cancer, early detection of lung cancer could be the best strategy to save lives. In this paper, we propose a novel neural-network based algorithm, which we refer to as entropy degradation method (EDM), to detect small cell lung cancer (SCLC) from computed tomography (CT) images. This research could facilitate early detection of lung cancers. The training data and testing data are high-resolution lung CT scans provided by the National Cancer Institute. We selected 12 lung CT scans from the library, 6 of which are for healthy lungs, and the remaining 6 are scans from patients with SCLC. We randomly take 5 scans from each group to train our model, and used the remaining two scans to test. Our algorithms achieves an accuracy of 77.8%.", "abstracts": [ { "abstractType": "Regular", "content": "Cancer-related medical expenses and labor loss cost annually $10,000 billion worldwide. Lung cancer-related deaths exceed 70,000 cases globally every year. Furthermore, 225,000 new cases were detected in the United States in 2016, and 4.3 million new cases in China in 2015. Statistically, most lung cancer related deaths were due to late stage detection. Like other types of cancer, early detection of lung cancer could be the best strategy to save lives. In this paper, we propose a novel neural-network based algorithm, which we refer to as entropy degradation method (EDM), to detect small cell lung cancer (SCLC) from computed tomography (CT) images. This research could facilitate early detection of lung cancers. The training data and testing data are high-resolution lung CT scans provided by the National Cancer Institute. We selected 12 lung CT scans from the library, 6 of which are for healthy lungs, and the remaining 6 are scans from patients with SCLC. We randomly take 5 scans from each group to train our model, and used the remaining two scans to test. Our algorithms achieves an accuracy of 77.8%.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Cancer-related medical expenses and labor loss cost annually $10,000 billion worldwide. Lung cancer-related deaths exceed 70,000 cases globally every year. Furthermore, 225,000 new cases were detected in the United States in 2016, and 4.3 million new cases in China in 2015. Statistically, most lung cancer related deaths were due to late stage detection. Like other types of cancer, early detection of lung cancer could be the best strategy to save lives. In this paper, we propose a novel neural-network based algorithm, which we refer to as entropy degradation method (EDM), to detect small cell lung cancer (SCLC) from computed tomography (CT) images. This research could facilitate early detection of lung cancers. The training data and testing data are high-resolution lung CT scans provided by the National Cancer Institute. We selected 12 lung CT scans from the library, 6 of which are for healthy lungs, and the remaining 6 are scans from patients with SCLC. We randomly take 5 scans from each group to train our model, and used the remaining two scans to test. Our algorithms achieves an accuracy of 77.8%.", "fno": "2941a088", "keywords": [ "Cancer", "Computerised Tomography", "Image Resolution", "Learning Artificial Intelligence", "Lung", "Medical Image Processing", "Neural Nets", "Patient Diagnosis", "Patient Treatment", "Supervised Machine Learning Algorithm", "Small Cell Lung Cancer Detection", "Neural Network Based Algorithm", "Computed Tomography", "National Cancer Institute", "High Resolution Lung CT Scans", "Lung Cancer Related Deaths", "Lung", "Cancer", "Computed Tomography", "Training", "Biomedical Imaging", "Testing", "Histograms", "Image Processing", "Machine Learning", "Computed Tomography", "Small Cell Lung Cancer Detection" ], "authors": [ { "affiliation": null, "fullName": "Qing Wu", "givenName": "Qing", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wenbing Zhao", "givenName": "Wenbing", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscsic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "88-91", "year": "2017", "issn": null, "isbn": "978-1-5386-2941-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2941a082", "articleId": "12OmNAObbGT", "__typename": "AdjacentArticleType" }, "next": { "fno": "2941a092", "articleId": "12OmNAWH9us", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2018/6060/0/606001a244", "title": "Lung Nodule Classification via Deep Transfer Learning in CT Lung Images", "doi": null, "abstractUrl": "/proceedings-article/cbms/2018/606001a244/12OmNzxgHwv", "parentPublication": { "id": "proceedings/cbms/2018/6060/0", "title": "2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2018/8303/0/08648753", "title": "Lung Nodule Detection via 3D U-Net and Contextual Convolutional Neural Network", "doi": null, "abstractUrl": "/proceedings-article/nana/2018/08648753/181W9pgZleh", "parentPublication": { "id": "proceedings/nana/2018/8303/0", "title": "2018 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainit/2021/1296/0/129600a360", "title": "Lung Cancer Diagnosis Based on Convolutional Neural Networks Ensemble Model", "doi": null, "abstractUrl": "/proceedings-article/ainit/2021/129600a360/1BzWxdRmSVq", "parentPublication": { "id": "proceedings/ainit/2021/1296/0", "title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2022/6390/0/09904333", "title": "An Online Database Tool for Glycoproteomics of Lung Cancer Cell Lines for Biomarker Discovery and Anti-Cancer Screening of Natural Products", "doi": null, "abstractUrl": "/proceedings-article/iisa/2022/09904333/1H5KugOETIs", "parentPublication": { "id": "proceedings/iisa/2022/6390/0", "title": "2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956340", "title": "Hand Crafted Features for Efficient Lung Cancer Diagnosis Using Stacked Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956340/1IHp9MBFzvG", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995198", "title": "Time-series lung cancer CT dataset", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995198/1JC22Uri4OQ", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2022/02/09209148", "title": "Spatial Pyramid Pooling With 3D Convolution Improves Lung Cancer Detection", "doi": null, "abstractUrl": "/journal/tb/2022/02/09209148/1nwbasLrTLG", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a728", "title": "Classification of Benign and Metastatic Lymph Nodes in Lung Cancer with Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a728/1pBMxZ3avkI", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09413064", "title": "MTGAN: Mask and Texture-driven Generative Adversarial Network for Lung Nodule Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09413064/1tmi20Gabcs", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icispc/2021/2425/0/242500a030", "title": "Lung Nodule Classification of CT Images Based on the Deep Learning Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icispc/2021/242500a030/1zw6lrlougU", "parentPublication": { "id": "proceedings/icispc/2021/2425/0", "title": "2021 5th International Conference on Imaging, Signal Processing and Communications (ICISPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDSdOB", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNCbU34F", "doi": "10.1109/BIBM.2010.5706572", "title": "Discovering functional gene pathways associated with cancer heterogeneity via sparse supervised learning", "normalizedTitle": "Discovering functional gene pathways associated with cancer heterogeneity via sparse supervised learning", "abstract": "We propose a statistical method for uncovering gene pathways that characterize cancer heterogeneity. To incorporate knowledge of the pathways into the model, we define a set of activities of pathways from microarray gene expression data based on the sparse probabilistic principal component analysis. A pathway activity logistic regression model is then formulated for cancer phenotype. To select pathway activities related to binary cancer phenotypes, we use the elastic net for the parameter estimation and derive a model selection criterion for selecting tuning parameters included in the model estimation. Our proposed method can also reverse-engineer gene networks based on the identified multiple pathways that enables us to discover novel gene-gene associations relating with the cancer phenotypes. We illustrate the whole process of the proposed method through the analysis of breast cancer gene expression data.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a statistical method for uncovering gene pathways that characterize cancer heterogeneity. To incorporate knowledge of the pathways into the model, we define a set of activities of pathways from microarray gene expression data based on the sparse probabilistic principal component analysis. A pathway activity logistic regression model is then formulated for cancer phenotype. To select pathway activities related to binary cancer phenotypes, we use the elastic net for the parameter estimation and derive a model selection criterion for selecting tuning parameters included in the model estimation. Our proposed method can also reverse-engineer gene networks based on the identified multiple pathways that enables us to discover novel gene-gene associations relating with the cancer phenotypes. We illustrate the whole process of the proposed method through the analysis of breast cancer gene expression data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a statistical method for uncovering gene pathways that characterize cancer heterogeneity. To incorporate knowledge of the pathways into the model, we define a set of activities of pathways from microarray gene expression data based on the sparse probabilistic principal component analysis. A pathway activity logistic regression model is then formulated for cancer phenotype. To select pathway activities related to binary cancer phenotypes, we use the elastic net for the parameter estimation and derive a model selection criterion for selecting tuning parameters included in the model estimation. Our proposed method can also reverse-engineer gene networks based on the identified multiple pathways that enables us to discover novel gene-gene associations relating with the cancer phenotypes. We illustrate the whole process of the proposed method through the analysis of breast cancer gene expression data.", "fno": "05706572", "keywords": [ "Bioinformatics", "Biological Techniques", "Biological Tissues", "Cancer", "Genetics", "Learning Artificial Intelligence", "Principal Component Analysis", "Regression Analysis", "Functional Gene Pathway Discovery", "Cancer Heterogeneity", "Sparse Supervised Learning", "Statistical Method", "Pathway Activities", "Microarray Gene Expression Data", "Sparse Probabilistic PCA", "Principal Component Analysis", "Logistic Regression Model", "Binary Cancer Phenotypes", "Elastic Net", "Parameter Estimation", "Gene Networks", "Breast Cancer Gene Expression Data", "Erbium", "Logistics", "Breast Cancer", "Gene Expression", "Tuning", "Probabilistic Logic", "Cancer Heterogeneity", "Gene Network", "Microarray", "Pathway Activity", "Sparse Supervised Learning" ], "authors": [ { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Shuichi Kawano", "givenName": "Shuichi", "surname": "Kawano", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Teppei Shimamura", "givenName": "Teppei", "surname": "Shimamura", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Atsushi Niida", "givenName": "Atsushi", "surname": "Niida", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Seiya Imoto", "givenName": "Seiya", "surname": "Imoto", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Rui Yamaguchi", "givenName": "Rui", "surname": "Yamaguchi", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Masao Nagasaki", "givenName": "Masao", "surname": "Nagasaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Ryo Yoshida", "givenName": "Ryo", "surname": "Yoshida", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Cristin Printe", "givenName": "Cristin", "surname": "Printe", "__typename": "ArticleAuthorType" }, { "affiliation": "Human Genome Center, Institute of Medical Science University of Tokyo, 4-6-1 Shirokanedai, Minato-ku, Tokyo, 108-8639, Japan", "fullName": "Satoru Miyano", "givenName": "Satoru", "surname": "Miyano", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-12-01T00:00:00", "pubType": "proceedings", "pages": "253-258", "year": "2010", "issn": null, "isbn": "978-1-4244-8306-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05706571", "articleId": "12OmNyuPKVV", "__typename": "AdjacentArticleType" }, "next": { "fno": "05706573", "articleId": "12OmNqOwQKW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2009/3885/0/3885a142", "title": "Side Effect Prediction Using Cooperative Pathways", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a142/12OmNqFrGzd", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706578", "title": "Concurrent analysis of copy number variations and expression profiles to identify genes associated with tumorigenesis and survival outcome in lung adenocarcinoma", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706578/12OmNrJAdXI", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706576", "title": "A two-stage machine learning approach for pathway analysis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706576/12OmNvk7JZ6", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2013/1309/0/06732719", "title": "Pathway based identification of rare mutation effect in cancer", "doi": null, "abstractUrl": "/proceedings-article/bibm/2013/06732719/12OmNwekjC5", "parentPublication": { "id": "proceedings/bibm/2013/1309/0", "title": "2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706615", "title": "Discovering negative correlated gene sets from integrative gene expression data for cancer prognosis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706615/12OmNwpoFLf", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a241", "title": "Wnt Signaling Pathway-Based Analysis of Variance on Different Subtypes of Breast", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a241/12OmNzmclFj", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/04/06175008", "title": "Identifying Gene Pathways Associated with Cancer Characteristics via Sparse Statistical Methods", "doi": null, "abstractUrl": "/journal/tb/2012/04/06175008/13rRUxbTMxd", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/03/07874138", "title": "PerPAS: Topology-Based Single Sample Pathway Analysis Method", "doi": null, "abstractUrl": "/journal/tb/2018/03/07874138/13rRUyYBlfj", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07737047", "title": "Extracting Stage-Specific and Dynamic Modules Through Analyzing Multiple Networks Associated with Cancer Progression", "doi": null, "abstractUrl": "/journal/tb/2018/02/07737047/13rRUyeCk8B", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/03/09163238", "title": "Pregnancy Associated Breast Cancer Gene Expressions : New Insights on Their Regulation Based on Rare Correlated Patterns", "doi": null, "abstractUrl": "/journal/tb/2021/03/09163238/1mbbZBEJC4U", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoSbiA", "title": "2016 IEEE 16th International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvKePI1", "doi": "10.1109/BIBE.2016.55", "title": "Detecting Cell Growth and Drug Response in Heterogeneous Populations: A Dynamic Imaging Approach", "normalizedTitle": "Detecting Cell Growth and Drug Response in Heterogeneous Populations: A Dynamic Imaging Approach", "abstract": "Tumor heterogeneity has been increasingly recognized as one of the potentially contributing factors in explaining drug resistance. In order to gain better understanding of heterogeneous cancer cell populations and different cells' responses to various drugs, we use fluorescent proteins to mark the cells and a live-cell dynamic imaging platform to collect cell-by-cell measurements. After addressing the issue of fluorescent reporter variance in a Bayesian inference framework, we decompose the different cell types in the mixture and calculate their proportions and counts over time responding to different drug treatments. Additionally, the drug response as characterized by the cell death rate was also computed for these cells, and their different sensitivity was demonstrated. Overall, this work represents an important advancement toward evaluating cancer heterogeneity and drug responses in heterogeneous cancer cell populations.", "abstracts": [ { "abstractType": "Regular", "content": "Tumor heterogeneity has been increasingly recognized as one of the potentially contributing factors in explaining drug resistance. In order to gain better understanding of heterogeneous cancer cell populations and different cells' responses to various drugs, we use fluorescent proteins to mark the cells and a live-cell dynamic imaging platform to collect cell-by-cell measurements. After addressing the issue of fluorescent reporter variance in a Bayesian inference framework, we decompose the different cell types in the mixture and calculate their proportions and counts over time responding to different drug treatments. Additionally, the drug response as characterized by the cell death rate was also computed for these cells, and their different sensitivity was demonstrated. Overall, this work represents an important advancement toward evaluating cancer heterogeneity and drug responses in heterogeneous cancer cell populations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Tumor heterogeneity has been increasingly recognized as one of the potentially contributing factors in explaining drug resistance. In order to gain better understanding of heterogeneous cancer cell populations and different cells' responses to various drugs, we use fluorescent proteins to mark the cells and a live-cell dynamic imaging platform to collect cell-by-cell measurements. After addressing the issue of fluorescent reporter variance in a Bayesian inference framework, we decompose the different cell types in the mixture and calculate their proportions and counts over time responding to different drug treatments. Additionally, the drug response as characterized by the cell death rate was also computed for these cells, and their different sensitivity was demonstrated. Overall, this work represents an important advancement toward evaluating cancer heterogeneity and drug responses in heterogeneous cancer cell populations.", "fno": "3834a121", "keywords": [ "Bayes Methods", "Biomedical Optical Imaging", "Cancer", "Cellular Biophysics", "Drugs", "Fluorescence", "Molecular Biophysics", "Patient Treatment", "Proteins", "Cell Growth Detection", "Drug Response", "Dynamic Imaging Approach", "Tumor Heterogeneity", "Drug Resistance", "Heterogeneous Cancer Cell Populations", "Fluorescent Proteins", "Live Cell Dynamic Imaging Platform", "Cell By Cell Measurements", "Bayesian Inference Framework", "Drug Treatments", "Cell Death Rate", "Cancer Heterogeneity", "Drugs", "Fluorescence", "Proteins", "Sociology", "Statistics", "Imaging", "Cancer", "Cell Imaging", "Dynamics", "Drug Response", "Bayesian Inference" ], "authors": [ { "affiliation": "Center for Bioinf. & Genomic Syst. Eng., Texas A&M Univ., College Station, TX, USA", "fullName": "Chao Sima", "givenName": "Chao", "surname": "Sima", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Bioinf. & Genomic Syst. Eng., Texas A&M Univ., College Station, TX, USA", "fullName": "Jianping Hua", "givenName": "Jianping", "surname": "Hua", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Bioinf. & Genomic Syst. Eng., Texas A&M Univ., College Station, TX, USA", "fullName": "Rosana Lopes", "givenName": "Rosana", "surname": "Lopes", "__typename": "ArticleAuthorType" }, { "affiliation": "Center for Bioinf. & Genomic Syst. Eng., Texas A&M Univ., College Station, TX, USA", "fullName": "Aniruddha Datta", "givenName": "Aniruddha", "surname": "Datta", "__typename": "ArticleAuthorType" }, { "affiliation": "Translational Genomics Res. Inst., Phoenix, AZ, USA", "fullName": "Michael L. Bittner", "givenName": "Michael L.", "surname": "Bittner", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "121-128", "year": "2016", "issn": "2471-7819", "isbn": "978-1-5090-3834-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3834a113", "articleId": "12OmNviHKlV", "__typename": "AdjacentArticleType" }, "next": { "fno": "3834a129", "articleId": "12OmNvq5jB6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2014/5669/0/06999145", "title": "Drug sensitivity prediction for cancer cell lines based on pairwise kernels and miRNA profiles", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999145/12OmNBkxsvx", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2016/9036/0/9036a024", "title": "Mutations and Drugs Portal (MDP): A Database Linking Drug Response Data and Genomic Information", "doi": null, "abstractUrl": "/proceedings-article/cbms/2016/9036a024/12OmNqJq4h3", "parentPublication": { "id": "proceedings/cbms/2016/9036/0", "title": "2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ims3tw/2008/2395/0/04581629", "title": "Simultaneous optical and fluorescent microscopic measurement of drug retention in single cancer cells", "doi": null, "abstractUrl": "/proceedings-article/ims3tw/2008/04581629/12OmNwwd2Xu", "parentPublication": { "id": "proceedings/ims3tw/2008/2395/0", "title": "2008 IEEE 14th International Mixed-Signals, Sensors, and Systems Test Workshop (IMS3TW 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2015/7143/0/7143b145", "title": "The cDNA Cloning and Expression of EGFP-PSF Fusion Protein in CHO Cell Line", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2015/7143b145/12OmNxTmHI3", "parentPublication": { "id": "proceedings/icmtma/2015/7143/0", "title": "2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572639", "title": "Model based chemotherapeutic drug scheduling: A multi-objective particle swarm optimization approach", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572639/12OmNyjccxG", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08218022", "title": "On the robustness of mixture model-based unsupervised learning in single-cell analyses", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08218022/12OmNzUPpic", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2020/01/08395000", "title": "Drug Selection via Joint Push and Learning to Rank", "doi": null, "abstractUrl": "/journal/tb/2020/01/08395000/13rRUyeCk8F", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2018/9288/0/928800a237", "title": "Drug Vector Minimization in Cancer Therapy Based on Boolean Logic Model of Gene Regulatory Network", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2018/928800a237/18rqxrZe7Ys", "parentPublication": { "id": "proceedings/icdmw/2018/9288/0", "title": "2018 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2023/01/09676451", "title": "Computational Methods for the Analysis and Prediction of EGFR-Mutated Lung Cancer Drug Resistance: Recent Advances in Drug Design, Challenges and Future Prospects", "doi": null, "abstractUrl": "/journal/tb/2023/01/09676451/1A3dhWOWSys", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995622", "title": "Drug response prediction for lung cancer patients using biophysical simulation and machine learning", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995622/1JC3cTvccvu", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqEjhZ6", "title": "2005 IEEE Computational Systems Bioinformatics Conference Workshops and Poster Abstracts", "acronym": "csbw", "groupId": "1002129", "volume": "0", "displayVolume": "0", "year": "2005", "__typename": "ProceedingType" }, "article": { "id": "12OmNxisQZg", "doi": "10.1109/CSBW.2005.33", "title": "Cell Phenotype Classification Based on 3D Cell Image Analysis", "normalizedTitle": "Cell Phenotype Classification Based on 3D Cell Image Analysis", "abstract": "The accuracy of the histological classification of cells plays a determining role in disease diagnosis and treatment. Recent studies have shown that the distribution of chromatin-associated proteins reflects alterations in cell phenotype. Using 3D fluorescence images of cultured human breast epithelial cells with multiple known phenotypes, we have developed an automated method to classify the phenotype of epithelial cells based on their nuclear protein distribution. Features which describe the distribution of specific nuclear proteins are first measured, on a per nucleus basis, by our local bright feature (LBF) analysis technique. Features from thousands of nuclei with multiple, known phenotypes were then grouped by a novel voting-based clustering method into a number of clusters of similar pattern. This allows us to establish the statistical link between clusters and the phenotypes of the cells. Finally, we used this statistical link to predict the probable phenotype of individual or groups of nuclei. The results show that the combined use of 3D confocal imaging, image feature analysis, and clustering analysis provides an efficient way to predict the phenotype of epithelial cells based on the nuclear distribution of chromatin-associated proteins.", "abstracts": [ { "abstractType": "Regular", "content": "The accuracy of the histological classification of cells plays a determining role in disease diagnosis and treatment. Recent studies have shown that the distribution of chromatin-associated proteins reflects alterations in cell phenotype. Using 3D fluorescence images of cultured human breast epithelial cells with multiple known phenotypes, we have developed an automated method to classify the phenotype of epithelial cells based on their nuclear protein distribution. Features which describe the distribution of specific nuclear proteins are first measured, on a per nucleus basis, by our local bright feature (LBF) analysis technique. Features from thousands of nuclei with multiple, known phenotypes were then grouped by a novel voting-based clustering method into a number of clusters of similar pattern. This allows us to establish the statistical link between clusters and the phenotypes of the cells. Finally, we used this statistical link to predict the probable phenotype of individual or groups of nuclei. The results show that the combined use of 3D confocal imaging, image feature analysis, and clustering analysis provides an efficient way to predict the phenotype of epithelial cells based on the nuclear distribution of chromatin-associated proteins.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The accuracy of the histological classification of cells plays a determining role in disease diagnosis and treatment. Recent studies have shown that the distribution of chromatin-associated proteins reflects alterations in cell phenotype. Using 3D fluorescence images of cultured human breast epithelial cells with multiple known phenotypes, we have developed an automated method to classify the phenotype of epithelial cells based on their nuclear protein distribution. Features which describe the distribution of specific nuclear proteins are first measured, on a per nucleus basis, by our local bright feature (LBF) analysis technique. Features from thousands of nuclei with multiple, known phenotypes were then grouped by a novel voting-based clustering method into a number of clusters of similar pattern. This allows us to establish the statistical link between clusters and the phenotypes of the cells. Finally, we used this statistical link to predict the probable phenotype of individual or groups of nuclei. The results show that the combined use of 3D confocal imaging, image feature analysis, and clustering analysis provides an efficient way to predict the phenotype of epithelial cells based on the nuclear distribution of chromatin-associated proteins.", "fno": "24420374", "keywords": [], "authors": [ { "affiliation": "Lawrence Berkeley National Lab, Berkeley, CA", "fullName": "Fuhui Long", "givenName": "Fuhui", "surname": "Long", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Berkeley National Lab, Berkeley, CA", "fullName": "Hanchuan Peng", "givenName": "Hanchuan", "surname": "Peng", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Berkeley National Lab, Berkeley, CA", "fullName": "Damir Sudar", "givenName": "Damir", "surname": "Sudar", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Berkeley National Lab, Berkeley, CA", "fullName": "David Knowles", "givenName": "David", "surname": "Knowles", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Berkeley National Lab, Berkeley, CA", "fullName": "Sophie Leli?vre", "givenName": "Sophie", "surname": "Leli?vre", "__typename": "ArticleAuthorType" } ], "idPrefix": "csbw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2005-08-01T00:00:00", "pubType": "proceedings", "pages": "374", "year": "2005", "issn": null, "isbn": "0-7695-2442-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "24420373", "articleId": "12OmNBO3K1I", "__typename": "AdjacentArticleType" }, "next": { "fno": "24420375", "articleId": "12OmNxvwp1X", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cbms/2017/1710/0/1710a358", "title": "Extracting Disease-Phenotype Relations from Text with Disease-Phenotype Concept Recognisers and Association Rule Mining", "doi": null, "abstractUrl": "/proceedings-article/cbms/2017/1710a358/12OmNANTAsy", "parentPublication": { "id": "proceedings/cbms/2017/1710/0", "title": "2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2009/3885/0/3885a060", "title": "An Algorithm for the Discovery of Phenotype Related Metabolic Pathways", "doi": null, "abstractUrl": "/proceedings-article/bibm/2009/3885a060/12OmNB8CiYZ", "parentPublication": { "id": "proceedings/bibm/2009/3885/0", "title": "2009 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2010/8303/0/05703808", "title": "Clustering-based methodology with minimal user supervision for displaying cell-phenotype signatures in image-based screening", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703808/12OmNCdk2L4", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2017/1629/0/08024647", "title": "Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for gene-phenotype association prediction", "doi": null, "abstractUrl": "/proceedings-article/iscc/2017/08024647/12OmNCesram", "parentPublication": { "id": "proceedings/iscc/2017/1629/0", "title": "2017 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217911", "title": "Measuring phenotype-phenotype similarity through the interactome", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217911/12OmNxdVgQc", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/01/08019821", "title": "PhenoLines: Phenotype Comparison Visualizations for Disease Subtyping via Topic Models", "doi": null, "abstractUrl": "/journal/tg/2018/01/08019821/13rRUwI5U2P", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/01/07534774", "title": "PhenoStacks: Cross-Sectional Cohort Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2017/01/07534774/13rRUy2YLYB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/01/07192670", "title": "PhenoBlocks: Phenotype Comparison Visualizations", "doi": null, "abstractUrl": "/journal/tg/2016/01/07192670/13rRUyYSWt0", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08546040", "title": "Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08546040/17D45WZZ7GJ", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09995118", "title": "Phenotype Prediction by Heterogeneous Molecular Network Embedding", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09995118/1JC2DOPYJiw", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAIMOaS", "title": "2010 IEEE International Conference on Bioinformatics and Bioengineering", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNylsZKa", "doi": "10.1109/BIBE.2010.64", "title": "Identifying Prostate Cancer-Related Networks from Microarray Data Based on Genotype-Phenotype Networks Using Markov Blanket Search", "normalizedTitle": "Identifying Prostate Cancer-Related Networks from Microarray Data Based on Genotype-Phenotype Networks Using Markov Blanket Search", "abstract": "The identification of significant disease-related genes and networks is an important issue in understanding underlying mechanisms of cells. We integrate phenotype networks, protein networks and efficiently utilize gene expression data to identify human disease networks. We use prostate cancer data as our test domain. In comparison with statistical methods such as t-test and Wilcoxon test, our method identifies more prostate cancer-related genes reported in published database and literature. Interleukin-type growth factors, Ras related oncogenes and cytokine interactions canonical pathways are found to be significantly related to prostate cancer.", "abstracts": [ { "abstractType": "Regular", "content": "The identification of significant disease-related genes and networks is an important issue in understanding underlying mechanisms of cells. We integrate phenotype networks, protein networks and efficiently utilize gene expression data to identify human disease networks. We use prostate cancer data as our test domain. In comparison with statistical methods such as t-test and Wilcoxon test, our method identifies more prostate cancer-related genes reported in published database and literature. Interleukin-type growth factors, Ras related oncogenes and cytokine interactions canonical pathways are found to be significantly related to prostate cancer.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The identification of significant disease-related genes and networks is an important issue in understanding underlying mechanisms of cells. We integrate phenotype networks, protein networks and efficiently utilize gene expression data to identify human disease networks. We use prostate cancer data as our test domain. In comparison with statistical methods such as t-test and Wilcoxon test, our method identifies more prostate cancer-related genes reported in published database and literature. Interleukin-type growth factors, Ras related oncogenes and cytokine interactions canonical pathways are found to be significantly related to prostate cancer.", "fno": "4083a302", "keywords": [ "Prostate Cancer", "Microarry Data", "Protein Protein Interaction Networks", "Markov Blanket Search", "Phenotype Networks" ], "authors": [ { "affiliation": null, "fullName": "Hsiang-Yuan Yeh", "givenName": "Hsiang-Yuan", "surname": "Yeh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yi-Yu Liu", "givenName": "Yi-Yu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cheng-Yu Yeh", "givenName": "Cheng-Yu", "surname": "Yeh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Von-Wun Soo", "givenName": "Von-Wun", "surname": "Soo", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-05-01T00:00:00", "pubType": "proceedings", "pages": "302-303", "year": "2010", "issn": null, "isbn": "978-0-7695-4083-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4083a300", "articleId": "12OmNxdVgSO", "__typename": "AdjacentArticleType" }, "next": { "fno": "4083a304", "articleId": "12OmNBQTJm7", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2014/5669/0/06999302", "title": "Protein-protein interaction network constructing based on text mining and reinforcement learning with application to prostate cancer", "doi": null, "abstractUrl": "/proceedings-article/bibm/2014/06999302/12OmNBUS75C", "parentPublication": { "id": "proceedings/bibm/2014/5669/0", "title": "2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/1995/7117/0/71170094", "title": "Prostate Ultrasound Image Analysis: Localization of Cancer Lesions to Assist Biopsy", "doi": null, "abstractUrl": "/proceedings-article/cbms/1995/71170094/12OmNC4wtti", "parentPublication": { "id": "proceedings/cbms/1995/7117/0", "title": "Proceedings Eighth IEEE Symposium on Computer-Based Medical Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2018/5377/0/537701a380", "title": "Mapping the Treatment Journey for Patients with Prostate Cancer", "doi": null, "abstractUrl": "/proceedings-article/ichi/2018/537701a380/12OmNzSQdji", "parentPublication": { "id": "proceedings/ichi/2018/5377/0", "title": "2018 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2016/2109/0/07495622", "title": "Pathology text mining - on Norwegian prostate cancer reports", "doi": null, "abstractUrl": "/proceedings-article/icdew/2016/07495622/12OmNzlD9rW", "parentPublication": { "id": "proceedings/icdew/2016/2109/0", "title": "2016 IEEE 32nd International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a155", "title": "Identification of the PCa28 Gene Signature as a Predictor in Prostate Cancer", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a155/17D45WgziNP", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0/08276897", "title": "Analyse Lifestyle Related Prostate Cancer Risk Factors Retrieved from Literacy", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2017/08276897/17D45XeKgvD", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2017/3066/0", "title": "2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2019/2286/0/228600a355", "title": "Early Radiomic Experiences in Classifying Prostate Cancer Aggressiveness using 3D Local Binary Patterns", "doi": null, "abstractUrl": "/proceedings-article/cbms/2019/228600a355/1cdO39adoQM", "parentPublication": { "id": "proceedings/cbms/2019/2286/0", "title": "2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006036", "title": "Classification Models and Survival Analysis for Prostate Cancer Using RNA Sequencing and Clinical Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006036/1hJsnQmUiEE", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcloud/2020/6547/0/654700a094", "title": "The Risk Prediction of Prostate Cancer Based on A Improved Hybrid Algorithm", "doi": null, "abstractUrl": "/proceedings-article/smartcloud/2020/654700a094/1p6f5ZkqOje", "parentPublication": { "id": "proceedings/smartcloud/2020/6547/0", "title": "2020 IEEE International Conference on Smart Cloud (SmartCloud)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwd2X9", "title": "7th IEEE International Conference on Bioinformatics and Bioengineering", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2007", "__typename": "ProceedingType" }, "article": { "id": "12OmNzTH0XG", "doi": "10.1109/BIBE.2007.4375701", "title": "The GPU on biomedical image processing for color and phenotype analysis", "normalizedTitle": "The GPU on biomedical image processing for color and phenotype analysis", "abstract": "The computational power and memory bandwidth of graphics processing units (GPUs) have turned them into attractive platforms for general-purpose applications. In this paper, we exploit this power in the context of biomedical image processing by establishing a cooperative environment between the CPU and the GPU. We deal with phenotype and color analysis on a wide variety of microscopic images from studies of cartilage and bone tissue regeneration using stem cells and genetics involving cancer pathology. Both processors are used in parallel to map algorithms for computing color histograms, contour detection using the Canny filter and pattern recognition based on the Hough transform. Task, data and instruction parallelism are exploited in the GPU to accomplish performance gains between 4times and 100times more than the typical CPU code.", "abstracts": [ { "abstractType": "Regular", "content": "The computational power and memory bandwidth of graphics processing units (GPUs) have turned them into attractive platforms for general-purpose applications. In this paper, we exploit this power in the context of biomedical image processing by establishing a cooperative environment between the CPU and the GPU. We deal with phenotype and color analysis on a wide variety of microscopic images from studies of cartilage and bone tissue regeneration using stem cells and genetics involving cancer pathology. Both processors are used in parallel to map algorithms for computing color histograms, contour detection using the Canny filter and pattern recognition based on the Hough transform. Task, data and instruction parallelism are exploited in the GPU to accomplish performance gains between 4times and 100times more than the typical CPU code.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The computational power and memory bandwidth of graphics processing units (GPUs) have turned them into attractive platforms for general-purpose applications. In this paper, we exploit this power in the context of biomedical image processing by establishing a cooperative environment between the CPU and the GPU. We deal with phenotype and color analysis on a wide variety of microscopic images from studies of cartilage and bone tissue regeneration using stem cells and genetics involving cancer pathology. Both processors are used in parallel to map algorithms for computing color histograms, contour detection using the Canny filter and pattern recognition based on the Hough transform. Task, data and instruction parallelism are exploited in the GPU to accomplish performance gains between 4times and 100times more than the typical CPU code.", "fno": "04375701", "keywords": [ "Computer Graphics", "Genetics", "Hough Transforms", "Image Colour Analysis", "Image Segmentation", "Medical Image Processing", "Pattern Recognition", "Tissue Engineering", "GPU", "Graphics Processing Unit", "Biomedical Image Processing", "Color Analysis", "Phenotype Analysis", "Cartilage", "Bone Tissue Regeneration", "Stem Cells", "Genetics", "Cancer Pathology", "Color Histogram", "Contour Detection", "Canny Filter", "Pattern Recognition", "Hough Transform", "Image Color Analysis", "Biomedical Image Processing", "Image Analysis", "Central Processing Unit", "Biomedical Computing", "Bandwidth", "Graphics", "Microscopy", "Bone Tissue", "Stem Cells" ], "authors": [ { "affiliation": "Computer Architecture Dept., University of Malaga, ETSI Informática. Campus Teatinos, Malaga 29071, Spain", "fullName": "Antonio Ruiz", "givenName": "Antonio", "surname": "Ruiz", "__typename": "ArticleAuthorType" }, { "affiliation": "Computer Architecture Dept., University of Malaga, ETSI Informática. Campus Teatinos, Malaga 29071, Spain", "fullName": "Manuel Ujaldon", "givenName": "Manuel", "surname": "Ujaldon", "__typename": "ArticleAuthorType" }, { "affiliation": "Cell Biology, Genetics and Phisiology Dept. University of Malaga, Faculty of Sciences. Campus Teatinos, Malaga 29071, Spain", "fullName": "Jose Antonio Andrades", "givenName": "Jose Antonio", "surname": "Andrades", "__typename": "ArticleAuthorType" }, { "affiliation": "Cell Biology, Genetics and Phisiology Dept. University of Malaga, Faculty of Sciences. Campus Teatinos, Malaga 29071, Spain", "fullName": "Jose Becerra", "givenName": "Jose", "surname": "Becerra", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics Dept., Ohio State University, 3197 Graves Hall. 333 W. 10th Ave., Columbus, Ohio 43210. U.S.A.", "fullName": "Kun Huang", "givenName": "Kun", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics Dept., Ohio State University, 3197 Graves Hall. 333 W. 10th Ave., Columbus, Ohio 43210. U.S.A.", "fullName": "Tony Pan", "givenName": "Tony", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "Biomedical Informatics Dept., Ohio State University, 3197 Graves Hall. 333 W. 10th Ave., Columbus, Ohio 43210. U.S.A.", "fullName": "Joel Saltz", "givenName": "Joel", "surname": "Saltz", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2007-10-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2007", "issn": null, "isbn": "1-4244-1509-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04375700", "articleId": "12OmNwcl7DZ", "__typename": "AdjacentArticleType" }, "next": { "fno": "04375702", "articleId": "12OmNAS9zuK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccsit/2008/3308/0/04624866", "title": "Task Scheduling of Parallel Processing in CPU-GPU Collaborative Environment", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2008/04624866/12OmNASraVs", "parentPublication": { "id": "proceedings/iccsit/2008/3308/0", "title": "2008 International Conference on Computer Science and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cluster/2009/5011/0/05289193", "title": "Coordinating the use of GPU and CPU for improving performance of compute intensive applications", "doi": null, "abstractUrl": "/proceedings-article/cluster/2009/05289193/12OmNC3FGnp", "parentPublication": { "id": "proceedings/cluster/2009/5011/0", "title": "2009 IEEE International Conference on Cluster Computing and Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/2011/279/0/05749536", "title": "Parallel Processing of DCT on GPU", "doi": null, "abstractUrl": "/proceedings-article/dcc/2011/05749536/12OmNyVes1L", "parentPublication": { "id": "proceedings/dcc/2011/279/0", "title": "2011 Data Compression Conference (DCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2005/2467/0/24670045", "title": "Development of Semi-Automatic Segmentation Methods for Measuring Tibial Cartilage Volume", "doi": null, "abstractUrl": "/proceedings-article/dicta/2005/24670045/12OmNzl3WQj", "parentPublication": { "id": "proceedings/dicta/2005/2467/0", "title": "Digital Image Computing: Techniques and Applications (DICTA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/clusterwksp/2010/8396/0/05613102", "title": "GPU-based segmentation of cervical vertebra in X-Ray images", "doi": null, "abstractUrl": "/proceedings-article/clusterwksp/2010/05613102/12OmNzsrwlP", "parentPublication": { "id": "proceedings/clusterwksp/2010/8396/0", "title": "2010 IEEE International Conference On Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/06/09767630", "title": "EGraph: Efficient Concurrent GPU-Based Dynamic Graph Processing", "doi": null, "abstractUrl": "/journal/tk/2023/06/09767630/1D4HbHscPZK", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09782546", "title": "Exploring Query Processing on CPU-GPU Integrated Edge Device", "doi": null, "abstractUrl": "/journal/td/2022/12/09782546/1DGShoVYHqo", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2019/2700/0/08888129", "title": "FlowShader: a Generalized Framework for GPU-accelerated VNF Flow Processing", "doi": null, "abstractUrl": "/proceedings-article/icnp/2019/08888129/1ezRJxUria4", "parentPublication": { "id": "proceedings/icnp/2019/2700/0", "title": "2019 IEEE 27th International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a426", "title": "GPU Acceleration of a Best-Features Based Digital Rotoscope", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a426/1gjRqsACMQo", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313307", "title": "GPU-Based Texture Analysis approach for Mammograms Institute of Biomedical Informatics", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313307/1qmfJY8twru", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "183rAcuejpS", "title": "2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)", "acronym": "hpcc-smartcity-dss", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "183rAfb8rTO", "doi": "10.1109/HPCC/SmartCity/DSS.2018.00258", "title": "Automated Counting of Cells in Breast Cytology Images Using Level Set Method", "normalizedTitle": "Automated Counting of Cells in Breast Cytology Images Using Level Set Method", "abstract": "Statistical analysis of cells in breast cytology images is very important for the diagnosis of various diseases in the female population in developed and developing countries. Manual detection and counting of the cancer cell in real time is not only difficult but hugely time-consuming for pathologists. In this paper, we propose an algorithm for automatic analysis of breast cytology using Fine Needle Aspiration Cytology (FNAC) images. The proposed technique uses statistical measures which include perceptual information (like color) and morphological characteristics for the estimation of the initial cell boundary. Similarly, the level set technique is used for efficient and accurate identification of cellular objects which help in the precise counting of individual cancer cell breast cytology images. Experimental results obtained during the demonstration of the proposed approach show high correlations in precision with manual counting by a pathologist. It has been proved that the proposed approach is efficient in processing cells for counting the cancerous cells with high accuracy and avoid discrepancies(like color variations, human error) in manual counting by a pathologist.", "abstracts": [ { "abstractType": "Regular", "content": "Statistical analysis of cells in breast cytology images is very important for the diagnosis of various diseases in the female population in developed and developing countries. Manual detection and counting of the cancer cell in real time is not only difficult but hugely time-consuming for pathologists. In this paper, we propose an algorithm for automatic analysis of breast cytology using Fine Needle Aspiration Cytology (FNAC) images. The proposed technique uses statistical measures which include perceptual information (like color) and morphological characteristics for the estimation of the initial cell boundary. Similarly, the level set technique is used for efficient and accurate identification of cellular objects which help in the precise counting of individual cancer cell breast cytology images. Experimental results obtained during the demonstration of the proposed approach show high correlations in precision with manual counting by a pathologist. It has been proved that the proposed approach is efficient in processing cells for counting the cancerous cells with high accuracy and avoid discrepancies(like color variations, human error) in manual counting by a pathologist.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Statistical analysis of cells in breast cytology images is very important for the diagnosis of various diseases in the female population in developed and developing countries. Manual detection and counting of the cancer cell in real time is not only difficult but hugely time-consuming for pathologists. In this paper, we propose an algorithm for automatic analysis of breast cytology using Fine Needle Aspiration Cytology (FNAC) images. The proposed technique uses statistical measures which include perceptual information (like color) and morphological characteristics for the estimation of the initial cell boundary. Similarly, the level set technique is used for efficient and accurate identification of cellular objects which help in the precise counting of individual cancer cell breast cytology images. Experimental results obtained during the demonstration of the proposed approach show high correlations in precision with manual counting by a pathologist. It has been proved that the proposed approach is efficient in processing cells for counting the cancerous cells with high accuracy and avoid discrepancies(like color variations, human error) in manual counting by a pathologist.", "fno": "661400b578", "keywords": [ "Cancer", "Medical Image Processing", "Statistical Analysis", "Cancerous Cells", "Level Set Method", "Statistical Analysis", "Fine Needle Aspiration Cytology Images", "Statistical Measures", "Level Set Technique", "Automated Cell Counting", "Individual Cancer Cell Breast Cytology Images", "Image Segmentation", "Breast", "Level Set", "Biomedical Imaging", "Cancer", "Image Color Analysis", "Microscopy", "Breast Carcinoma Cytopathologist FNAC CLAHE Olympus BX 51" ], "authors": [ { "affiliation": null, "fullName": "Sana Ullah Khan", "givenName": "Sana Ullah", "surname": "Khan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Naveed Islam", "givenName": "Naveed", "surname": "Islam", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zahoor Jan", "givenName": "Zahoor", "surname": "Jan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hameed Ullah Shah", "givenName": "Hameed Ullah", "surname": "Shah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aziz ud Din", "givenName": "Aziz", "surname": "ud Din", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-smartcity-dss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "1578-1584", "year": "2018", "issn": null, "isbn": "978-1-5386-6614-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "661400b571", "articleId": "183rAcxDuYI", "__typename": "AdjacentArticleType" }, "next": { "fno": "661400b585", "articleId": "183rAeOqxuK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvprw/2017/0733/0/0733a828", "title": "High-Magnification Multi-views Based Classification of Breast Fine Needle Aspiration Cytology Cell Samples Using Fusion of Decisions from Deep Convolutional Networks", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2017/0733a828/12OmNAIvcYM", "parentPublication": { "id": "proceedings/cvprw/2017/0733/0", "title": "2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2013/0400/0/06572677", "title": "Counting clustered cells using distance mapping", "doi": null, "abstractUrl": "/proceedings-article/iciev/2013/06572677/12OmNrJAdMt", "parentPublication": { "id": "proceedings/iciev/2013/0400/0", "title": "2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV 2013)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2017/3050/0/08217719", "title": "Deep learning assessment of tumor proliferation in breast cancer histological images", "doi": null, "abstractUrl": "/proceedings-article/bibm/2017/08217719/12OmNrNh0v7", "parentPublication": { "id": "proceedings/bibm/2017/3050/0", "title": "2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460094", "title": "A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460094/12OmNxd4trg", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706b750", "title": "Study on the Effect of ER-alpha 36 siRNA on the Growth of ER Negative Breast Cancer Cells", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706b750/12OmNzwpUbJ", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669151", "title": "LncRNA PNKY is upregulated in breast cancer and promotes cell proliferation and EMT in breast cancer cells", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669151/1A9WhZQwxna", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbe/2021/0099/0/009900a277", "title": "Assessment of breast cancer mesenchymal tumor infiltrating lymphocytes based on regional segmentation and nuclear segmentation classification", "doi": null, "abstractUrl": "/proceedings-article/icitbe/2021/009900a277/1AH7YLes8Ks", "parentPublication": { "id": "proceedings/icitbe/2021/0099/0", "title": "2021 International Conference on Information Technology and Biomedical Engineering (ICITBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a371", "title": "Breast Tumor Cellularity Assessment Using Deep Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a371/1i5mlWpI0fK", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2019/5052/0/09035244", "title": "Cancer Detection in Breast Histopathology with Convolution Neural Network Based Approach", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2019/09035244/1ifhDojDRF6", "parentPublication": { "id": "proceedings/aiccsa/2019/5052/0", "title": "2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313176", "title": "Image Based Fractal Analysis for Detection of Cancer Cells", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313176/1qmg3CpHoPe", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qmfHK8AjMQ", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "acronym": "bibm", "groupId": "1001586", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qmg3CpHoPe", "doi": "10.1109/BIBM49941.2020.9313176", "title": "Image Based Fractal Analysis for Detection of Cancer Cells", "normalizedTitle": "Image Based Fractal Analysis for Detection of Cancer Cells", "abstract": "Early detection of cancer is crucial to treatment. In this paper, we investigated an image based fractal analysis method for detecting cancer cells. Cancer cells typically display abnormalities including unregulated cell growth. Fractal analysis can be used to analyze irregularly shaped figures and measure morphological complexity. Experiments with images of human breast cancer cells were investigated. Changes in the fractal dimension between cancer cells and healthy cells were analyzed and compared. Our preliminary results show that the image based fractal analysis technique is able to detect breast cancer cells. It has great potential for yielding insight into the morphological characterization of tumor growth and may serve as an indicator for cancer detection and cancer treatment efficiency.", "abstracts": [ { "abstractType": "Regular", "content": "Early detection of cancer is crucial to treatment. In this paper, we investigated an image based fractal analysis method for detecting cancer cells. Cancer cells typically display abnormalities including unregulated cell growth. Fractal analysis can be used to analyze irregularly shaped figures and measure morphological complexity. Experiments with images of human breast cancer cells were investigated. Changes in the fractal dimension between cancer cells and healthy cells were analyzed and compared. Our preliminary results show that the image based fractal analysis technique is able to detect breast cancer cells. It has great potential for yielding insight into the morphological characterization of tumor growth and may serve as an indicator for cancer detection and cancer treatment efficiency.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Early detection of cancer is crucial to treatment. In this paper, we investigated an image based fractal analysis method for detecting cancer cells. Cancer cells typically display abnormalities including unregulated cell growth. Fractal analysis can be used to analyze irregularly shaped figures and measure morphological complexity. Experiments with images of human breast cancer cells were investigated. Changes in the fractal dimension between cancer cells and healthy cells were analyzed and compared. Our preliminary results show that the image based fractal analysis technique is able to detect breast cancer cells. It has great potential for yielding insight into the morphological characterization of tumor growth and may serve as an indicator for cancer detection and cancer treatment efficiency.", "fno": "09313176", "keywords": [ "Biomedical MRI", "Cancer", "Cellular Biophysics", "Fractals", "Medical Image Processing", "Tumours", "Fractal Analysis Method", "Unregulated Cell Growth", "Human Breast Cancer Cells", "Healthy Cells", "Fractal Analysis Technique", "Cancer Detection", "Cancer Treatment Efficiency", "Fractals", "Cancer", "Tumors", "Shape", "Breast Cancer", "Standards", "Prostate Cancer", "Fractal Dimension", "Cancer Detection", "Image Analysis" ], "authors": [ { "affiliation": "Illinois Mathematics and Science Academy,Aurora,IL,USA", "fullName": "Jason Qin", "givenName": "Jason", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Cancer Center – Froedtert Hospital Medical College of Wisconsin,Department of Radiation Oncology,Milwaukee,USA", "fullName": "Lindsay Puckett", "givenName": "Lindsay", "surname": "Puckett", "__typename": "ArticleAuthorType" }, { "affiliation": "Stony Brook University Cancer Center,Department of Radiation Oncology,Stony Brook,NY,USA", "fullName": "Xin Qian", "givenName": "Xin", "surname": "Qian", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "1482-1486", "year": "2020", "issn": null, "isbn": "978-1-7281-6215-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09313566", "articleId": "1qmfLmaV7TW", "__typename": "AdjacentArticleType" }, "next": { "fno": "09313389", "articleId": "1qmfNgx5axO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibmw/2010/8303/0/05703850", "title": "Comparison of triple negative breast cancer between Asian and western data sets", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2010/05703850/12OmNAoDicH", "parentPublication": { "id": "proceedings/bibmw/2010/8303/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2015/8302/0/8302a117", "title": "Identification of Potential Non-invasive Biomarkers for Breast Cancer Prognosis and Treatment by Systematic Bioinformatics Analysis", "doi": null, "abstractUrl": "/proceedings-article/itme/2015/8302a117/12OmNCgJe36", "parentPublication": { "id": "proceedings/itme/2015/8302/0", "title": "2015 7th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icica/2014/3966/0/3966a047", "title": "A Review on Mammogram Image Enhancement Techniques for Breast Cancer Detection", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a047/12OmNCgrCWs", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/artcom/2009/3845/0/3845a532", "title": "Recognition of Cervical Cancer Based on Fractal Dimension", "doi": null, "abstractUrl": "/proceedings-article/artcom/2009/3845a532/12OmNClQ0wj", "parentPublication": { "id": "proceedings/artcom/2009/3845/0", "title": "Advances in Recent Technologies in Communication and Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wccct/2014/2877/0/2877a211", "title": "Using K-Means Clustering Technique to Study of Breast Cancer", "doi": null, "abstractUrl": "/proceedings-article/wccct/2014/2877a211/12OmNwDSdC4", "parentPublication": { "id": "proceedings/wccct/2014/2877/0", "title": "2014 World Congress on Computing and Communication Technologies (WCCCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460094", "title": "A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460094/12OmNxd4trg", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbeb/2012/4706/0/4706b750", "title": "Study on the Effect of ER-alpha 36 siRNA on the Growth of ER Negative Breast Cancer Cells", "doi": null, "abstractUrl": "/proceedings-article/icbeb/2012/4706b750/12OmNzwpUbJ", "parentPublication": { "id": "proceedings/icbeb/2012/4706/0", "title": "Biomedical Engineering and Biotechnology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aicis/2018/9188/0/918800a051", "title": "Breast Cancer Detection and Classification Using Artificial Neural Networks", "doi": null, "abstractUrl": "/proceedings-article/aicis/2018/918800a051/17PYEl27FS1", "parentPublication": { "id": "proceedings/aicis/2018/9188/0", "title": "2018 1st Annual International Conference on Information and Sciences (AiCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669151", "title": "LncRNA PNKY is upregulated in breast cancer and promotes cell proliferation and EMT in breast cancer cells", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669151/1A9WhZQwxna", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2020/8571/0/857100a364", "title": "Comparison of Cancer Morbidity and Mortality Between Developed Countries, Developing Countries, and China", "doi": null, "abstractUrl": "/proceedings-article/icphds/2020/857100a364/1rxhp8KBjpK", "parentPublication": { "id": "proceedings/icphds/2020/8571/0", "title": "2020 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "19JE7TFMLdK", "title": "2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)", "acronym": "paap", "groupId": "1800289", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "19JE9MimPza", "doi": "10.1109/PAAP.2018.00037", "title": "Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework", "normalizedTitle": "Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework", "abstract": "Time series forecasting has been regarded as a key research problem in various fields. such as financial forecasting, traffic flow forecasting, medical monitoring, intrusion detection, anomaly detection, and air quality forecasting etc. In this paper, we propose a sequence-to-sequence deep learning framework for multivariate time series forecasting, which addresses the dynamic, spatial-temporal and nonlinear characteristics of multivariate time series data by LSTM based encoder-decoder architecture. Through the air quality multivariate time series forecasting experiments, we show that the proposed model has better forecasting performance than classic shallow learning and baseline deep learning models. And the predicted PM2.5 value can be well matched with the ground truth value under single timestep and multi-timestep forward forecasting conditions. The experiment results show that our model is capable of dealing with multivariate time series forecasting with satisfied accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Time series forecasting has been regarded as a key research problem in various fields. such as financial forecasting, traffic flow forecasting, medical monitoring, intrusion detection, anomaly detection, and air quality forecasting etc. In this paper, we propose a sequence-to-sequence deep learning framework for multivariate time series forecasting, which addresses the dynamic, spatial-temporal and nonlinear characteristics of multivariate time series data by LSTM based encoder-decoder architecture. Through the air quality multivariate time series forecasting experiments, we show that the proposed model has better forecasting performance than classic shallow learning and baseline deep learning models. And the predicted PM2.5 value can be well matched with the ground truth value under single timestep and multi-timestep forward forecasting conditions. The experiment results show that our model is capable of dealing with multivariate time series forecasting with satisfied accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Time series forecasting has been regarded as a key research problem in various fields. such as financial forecasting, traffic flow forecasting, medical monitoring, intrusion detection, anomaly detection, and air quality forecasting etc. In this paper, we propose a sequence-to-sequence deep learning framework for multivariate time series forecasting, which addresses the dynamic, spatial-temporal and nonlinear characteristics of multivariate time series data by LSTM based encoder-decoder architecture. Through the air quality multivariate time series forecasting experiments, we show that the proposed model has better forecasting performance than classic shallow learning and baseline deep learning models. And the predicted PM2.5 value can be well matched with the ground truth value under single timestep and multi-timestep forward forecasting conditions. The experiment results show that our model is capable of dealing with multivariate time series forecasting with satisfied accuracy.", "fno": "940300a171", "keywords": [ "Time Series Analysis", "Forecasting", "Predictive Models", "Deep Learning", "Hidden Markov Models", "Atmospheric Modeling", "Data Models", "Time Series Forecasting LSTM Encoder Decoder PM 2 5 Sequence To Sequence Deep Learning" ], "authors": [ { "affiliation": null, "fullName": "Shengdong Du", "givenName": "Shengdong", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tianrui Li", "givenName": "Tianrui", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shi-Jinn Horng", "givenName": "Shi-Jinn", "surname": "Horng", "__typename": "ArticleAuthorType" } ], "idPrefix": "paap", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "171-176", "year": "2018", "issn": null, "isbn": "978-1-5386-9403-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "940300a163", "articleId": "19JEa72dINq", "__typename": "AdjacentArticleType" }, "next": { "fno": "940300a177", "articleId": "19JE9vNVH2M", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tp/2023/01/09721108", "title": "Deep Time Series Forecasting With Shape and Temporal Criteria", "doi": null, "abstractUrl": "/journal/tp/2023/01/09721108/1BfU4lCwLTO", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsc/2021/1815/0/181500a083", "title": "Sequence Attention for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/dsc/2021/181500a083/1CuhWbfuEYU", "parentPublication": { "id": "proceedings/dsc/2021/1815/0", "title": "2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956097", "title": "Solar Flare Forecasting with Deep Learning-based Time Series Classifiers", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956097/1IHqFkd02uA", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09950330", "title": "Multivariate Time Series Forecasting with Dynamic Graph Neural ODEs", "doi": null, "abstractUrl": "/journal/tk/5555/01/09950330/1IiLdUwEK7m", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fas*w/2019/2406/0/240600a255", "title": "Best Practices for Time Series Forecasting (Tutorial)", "doi": null, "abstractUrl": "/proceedings-article/fas*w/2019/240600a255/1ckrww1yfKw", "parentPublication": { "id": "proceedings/fas*w/2019/2406/0", "title": "2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2021/06/08907358", "title": "Deep Air Quality Forecasting Using Hybrid Deep Learning Framework", "doi": null, "abstractUrl": "/journal/tk/2021/06/08907358/1f75IU8QX2U", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2019/0858/0/09006192", "title": "Deep Learning for Non-stationary Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2019/09006192/1hJsE3dcmaI", "parentPublication": { "id": "proceedings/big-data/2019/0858/0", "title": "2019 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378380", "title": "Combining Global and Sequential Patterns for Multivariate Time Series Forecasting", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378380/1s64SdG49Hi", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/09/09416768", "title": "Pay Attention to Evolution: Time Series Forecasting With Deep Graph-Evolution Learning", "doi": null, "abstractUrl": "/journal/tp/2022/09/09416768/1t8VSzT9Cj6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2022/02/09495129", "title": "A Type-2 Fuzzy Time Series Model for Pattern Similarity Analysis: A Case Study on Air Quality Forecasting", "doi": null, "abstractUrl": "/magazine/ex/2022/02/09495129/1vyjxeVoFzi", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H1ltj6z9Kg", "doi": "10.1109/CVPR52688.2022.00958", "title": "Semi-Supervised Object Detection via Multi-instance Alignment with Global Class Prototypes", "normalizedTitle": "Semi-Supervised Object Detection via Multi-instance Alignment with Global Class Prototypes", "abstract": "Semi-Supervised object detection (SSOD) aims to improve the generalization ability of object detectors with large-scale unlabeled images. Current pseudo-labeling-based SSOD methods individually learn from labeled data and unlabeled data, without considering the relation be-tween them. To make full use of labeled data, we pro-pose a Multi-instance Alignment model which enhances the prediction consistency based on Global Class Proto-types (MA-GCP). Specifically, we impose the consistency between pseudo ground-truths and their high-IoU candi-dates by minimizing the cross-entropy loss of their class distributions computed based on global class prototypes. These global class prototypes are estimated with the whole labeled dataset via the exponential moving average algorithm. To evaluate the proposed MA-GCP model, we inte-grate it into the state-of-the-art SSOD framework and ex-periments on two benchmark datasets demonstrate the ef-fectiveness of our MA-GCP approach.", "abstracts": [ { "abstractType": "Regular", "content": "Semi-Supervised object detection (SSOD) aims to improve the generalization ability of object detectors with large-scale unlabeled images. Current pseudo-labeling-based SSOD methods individually learn from labeled data and unlabeled data, without considering the relation be-tween them. To make full use of labeled data, we pro-pose a Multi-instance Alignment model which enhances the prediction consistency based on Global Class Proto-types (MA-GCP). Specifically, we impose the consistency between pseudo ground-truths and their high-IoU candi-dates by minimizing the cross-entropy loss of their class distributions computed based on global class prototypes. These global class prototypes are estimated with the whole labeled dataset via the exponential moving average algorithm. To evaluate the proposed MA-GCP model, we inte-grate it into the state-of-the-art SSOD framework and ex-periments on two benchmark datasets demonstrate the ef-fectiveness of our MA-GCP approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Semi-Supervised object detection (SSOD) aims to improve the generalization ability of object detectors with large-scale unlabeled images. Current pseudo-labeling-based SSOD methods individually learn from labeled data and unlabeled data, without considering the relation be-tween them. To make full use of labeled data, we pro-pose a Multi-instance Alignment model which enhances the prediction consistency based on Global Class Proto-types (MA-GCP). Specifically, we impose the consistency between pseudo ground-truths and their high-IoU candi-dates by minimizing the cross-entropy loss of their class distributions computed based on global class prototypes. These global class prototypes are estimated with the whole labeled dataset via the exponential moving average algorithm. To evaluate the proposed MA-GCP model, we inte-grate it into the state-of-the-art SSOD framework and ex-periments on two benchmark datasets demonstrate the ef-fectiveness of our MA-GCP approach.", "fno": "694600j799", "keywords": [ "Entropy", "Learning Artificial Intelligence", "Object Detection", "Large Scale Unlabeled Images", "Current Pseudolabeling Based SSOD", "Unlabeled Data", "Multiinstance Alignment Model", "Global Class Proto Types", "Pseudoground Truths", "Class Distributions", "Global Class Prototypes", "Labeled Dataset", "MA GCP Model", "State Of The Art SSOD Framework", "Semi Supervised Object Detection", "Object Detectors", "Training", "Computer Vision", "Computational Modeling", "Prototypes", "Detectors", "Object Detection", "Predictive Models" ], "authors": [ { "affiliation": "Huawei Noah's Ark Lab,China", "fullName": "Aoxue Li", "givenName": "Aoxue", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Huawei Noah's Ark Lab,China", "fullName": "Peng Yuan", "givenName": "Peng", "surname": "Yuan", "__typename": "ArticleAuthorType" }, { "affiliation": "Huawei Noah's Ark Lab,China", "fullName": "Zhenguo Li", "givenName": "Zhenguo", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "9799-9808", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H1ltfXQkw0", "name": "pcvpr202269460-09878505s1-mm_694600j799.zip", "size": "594 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09878505s1-mm_694600j799.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600j787", "articleId": "1H0KSUmTCdq", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600j809", "articleId": "1H1mUkrQFjO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcc-icess/2008/3352/0/3352a801", "title": "Semi-supervised Discriminant Analyze with Instance-Level Constraints", "doi": null, "abstractUrl": "/proceedings-article/hpcc-icess/2008/3352a801/12OmNASraF4", "parentPublication": { "id": "proceedings/hpcc-icess/2008/3352/0", "title": "High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/1/3735a520", "title": "Rough-Based Semi-supervised Outlier Detection", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735a520/12OmNy6qfIS", "parentPublication": { "id": "proceedings/fskd/2009/3735/1", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200i589", "title": "Self-Supervised Object Detection via Generative Image Synthesis", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200i589/1BmEsmQi8sE", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4462", "title": "Active Teacher for Semi-Supervised Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4462/1H0NnUUqsrm", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600e805", "title": "Dense Learning based Semi-Supervised Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600e805/1H1hWTCcHG8", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4361", "title": "Label Matching Semi-Supervised Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4361/1H1hzLbISis", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600o4177", "title": "SIOD: Single Instance Annotated Per Category Per Image for Object Detection", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600o4177/1H1kVjwmmmA", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300f056", "title": "Semi-Supervised Pedestrian Instance Synthesis and Detection With Mutual Reinforcement", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300f056/1hVlNvIUls4", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c290", "title": "Proposal Learning for Semi-Supervised Object Detection", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c290/1uqGtMR6J3O", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/4.509E84", "title": "Instant-Teaching: An End-to-End Semi-Supervised Object Detection Framework", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/4.509E84/1yeJmqDm3mw", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KfQshha0dW", "title": "2022 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "10020192", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KfT9Dx4d8c", "doi": "10.1109/BigData55660.2022.10020224", "title": "Text Generation to Aid Depression Detection: A Comparative Study of Conditional Sequence Generative Adversarial Networks", "normalizedTitle": "Text Generation to Aid Depression Detection: A Comparative Study of Conditional Sequence Generative Adversarial Networks", "abstract": "Corpuses of unstructured textual data, such as text messages between individuals, are often predictive of medical issues such as depression. The text data usually used in healthcare applications has high value and great variety, but is typically small in volume. Generating labeled unstructured text data is important to improve models by augmenting these small datasets, as well as to facilitate anonymization. While methods for labeled data generation exist, not all of them generalize well to small datasets. In this work, we thus perform a much needed systematic comparison of conditional text generation models that are promising for small datasets due to their unified architectures. We identify and implement a family of nine conditional sequence generative adversarial networks for text generation, which we collectively refer to as cSeqGAN models. These models are characterized along two orthogonal design dimensions: weighting strategies and feedback mechanisms. We conduct a comparative study evaluating the generation ability of the nine cSeqGAN models on three diverse text datasets with depression and sentiment labels. To assess the quality and realism of the generated text, we use standard machine learning metrics as well as human assessment via a user study. While the unconditioned models produced predictive text, the cSeqGAN models produced more realistic text. Our comparative study lays a solid foundation and provides important insights for further text generation research, particularly for the small datasets common within the healthcare domain.", "abstracts": [ { "abstractType": "Regular", "content": "Corpuses of unstructured textual data, such as text messages between individuals, are often predictive of medical issues such as depression. The text data usually used in healthcare applications has high value and great variety, but is typically small in volume. Generating labeled unstructured text data is important to improve models by augmenting these small datasets, as well as to facilitate anonymization. While methods for labeled data generation exist, not all of them generalize well to small datasets. In this work, we thus perform a much needed systematic comparison of conditional text generation models that are promising for small datasets due to their unified architectures. We identify and implement a family of nine conditional sequence generative adversarial networks for text generation, which we collectively refer to as cSeqGAN models. These models are characterized along two orthogonal design dimensions: weighting strategies and feedback mechanisms. We conduct a comparative study evaluating the generation ability of the nine cSeqGAN models on three diverse text datasets with depression and sentiment labels. To assess the quality and realism of the generated text, we use standard machine learning metrics as well as human assessment via a user study. While the unconditioned models produced predictive text, the cSeqGAN models produced more realistic text. Our comparative study lays a solid foundation and provides important insights for further text generation research, particularly for the small datasets common within the healthcare domain.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Corpuses of unstructured textual data, such as text messages between individuals, are often predictive of medical issues such as depression. The text data usually used in healthcare applications has high value and great variety, but is typically small in volume. Generating labeled unstructured text data is important to improve models by augmenting these small datasets, as well as to facilitate anonymization. While methods for labeled data generation exist, not all of them generalize well to small datasets. In this work, we thus perform a much needed systematic comparison of conditional text generation models that are promising for small datasets due to their unified architectures. We identify and implement a family of nine conditional sequence generative adversarial networks for text generation, which we collectively refer to as cSeqGAN models. These models are characterized along two orthogonal design dimensions: weighting strategies and feedback mechanisms. We conduct a comparative study evaluating the generation ability of the nine cSeqGAN models on three diverse text datasets with depression and sentiment labels. To assess the quality and realism of the generated text, we use standard machine learning metrics as well as human assessment via a user study. While the unconditioned models produced predictive text, the cSeqGAN models produced more realistic text. Our comparative study lays a solid foundation and provides important insights for further text generation research, particularly for the small datasets common within the healthcare domain.", "fno": "10020224", "keywords": [ "Behavioural Sciences Computing", "Health Care", "Learning Artificial Intelligence", "Medical Diagnostic Computing", "Neural Nets", "Psychology", "Text Analysis", "Conditional Sequence Generative Adversarial Networks", "Conditional Text Generation Models", "C Seq GAN Models", "Depression Detection", "Diverse Text Datasets", "Feedback Mechanisms", "Generated Text", "Generation Ability", "Healthcare Applications", "Human Assessment", "Labeled Data Generation", "Machine Learning Metrics", "Orthogonal Design Dimensions", "Predictive Text", "Realistic Text", "Text Messages", "Unconditioned Models", "Unstructured Text Data", "Unstructured Textual Data", "Weighting Strategies", "Systematics", "Medical Services", "Machine Learning", "Predictive Models", "Big Data", "Depression", "Generative Adversarial Networks", "Natural Language Processing", "Text Classification", "Sentiment Detection", "Digital Phenotype", "Transfer Learning" ], "authors": [ { "affiliation": "Bryant University,Center for Health & Behavioral Sciences,Department of Information Systems & Analytics,Smithfield,USA,RI 02911", "fullName": "ML Tlachac", "givenName": "ML", "surname": "Tlachac", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute (WPI),Data Science and Computer Science Departments,Worcester,USA,MA 01609", "fullName": "Walter Gerych", "givenName": "Walter", "surname": "Gerych", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute (WPI),Data Science and Computer Science Departments,Worcester,USA,MA 01609", "fullName": "Kratika Agrawal", "givenName": "Kratika", "surname": "Agrawal", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Michigan,School of Information,Ann Arbor,USA,MI 48109", "fullName": "Benjamin Litterer", "givenName": "Benjamin", "surname": "Litterer", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute (WPI),Data Science and Computer Science Departments,Worcester,USA,MA 01609", "fullName": "Nicholas Jurovich", "givenName": "Nicholas", "surname": "Jurovich", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee,Knoxville,TN,37996", "fullName": "Saitheeraj Thatigotla", "givenName": "Saitheeraj", "surname": "Thatigotla", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute (WPI),Data Science and Computer Science Departments,Worcester,USA,MA 01609", "fullName": "Jidapa Thadajarassiri", "givenName": "Jidapa", "surname": "Thadajarassiri", "__typename": "ArticleAuthorType" }, { "affiliation": "Worcester Polytechnic Institute (WPI),Data Science and Computer Science Departments,Worcester,USA,MA 01609", "fullName": "Elke A. Rundensteiner", "givenName": "Elke A.", "surname": "Rundensteiner", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "2804-2813", "year": "2022", "issn": null, "isbn": "978-1-6654-8045-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10020480", "articleId": "1KfQS7s0vtu", "__typename": "AdjacentArticleType" }, "next": { "fno": "10021053", "articleId": "1KfR1etYUxO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2018/3788/0/08545383", "title": "Semantic Image Synthesis via Conditional Cycle-Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545383/17D45VtKius", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545152", "title": "Generating Adversarial Examples With Conditional Generative Adversarial Net", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545152/17D45WHONi6", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a729", "title": "PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a729/1AqwZulK7Ly", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200o4418", "title": "Dual Projection Generative Adversarial Networks for Conditional Image Generation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200o4418/1BmIOa3DnTq", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2019/9552/0/955200b024", "title": "Text-Attentional Conditional Generative Adversarial Network for Super-Resolution of Text Images", "doi": null, "abstractUrl": "/proceedings-article/icme/2019/955200b024/1cdOQIY8asg", "parentPublication": { "id": "proceedings/icme/2019/9552/0", "title": "2019 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/02/09117185", "title": "Dynamic Facial Expression Generation on Hilbert Hypersphere With Conditional Wasserstein Generative Adversarial Nets", "doi": null, "abstractUrl": "/journal/tp/2022/02/09117185/1kGfN3QogZq", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/candarw/2020/9919/0/991900a151", "title": "Art Font Image Generation with Conditional Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/candarw/2020/991900a151/1rqEAweDigM", "parentPublication": { "id": "proceedings/candarw/2020/9919/0", "title": "2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a451", "title": "Artistic Text Style Transfer based on Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a451/1rvCEvTEN7W", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2021/3864/0/09428140", "title": "CI-GAN : Co-Clustering By Information Maximizing Generative Adversarial Networks", "doi": null, "abstractUrl": "/proceedings-article/icme/2021/09428140/1uim9HTyCSk", "parentPublication": { "id": "proceedings/icme/2021/3864/0", "title": "2021 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a063", "title": "Multi-Style Transfer Generative Adversarial Network for Text Images", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a063/1xPsjXkDspq", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KpChQa9kQ0", "title": "2022 IEEE International Conference on Data Mining (ICDM)", "acronym": "icdm", "groupId": "1000179", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KpCCDqvJ04", "doi": "10.1109/ICDM54844.2022.00170", "title": "Deep Spatial Domain Generalization", "normalizedTitle": "Deep Spatial Domain Generalization", "abstract": "Spatial autocorrelation and spatial heterogeneity widely exist in spatial data, which make the traditional machine learning model perform badly. Spatial domain generalization is a spatial extension of domain generalization, which can generalize to unseen spatial domains in continuous 2D space. Specifically, it learns a model under varying data distributions that generalizes to unseen domains. Although tremendous success has been achieved in domain generalization, there exist very few works on spatial domain generalization. The advancement of this area is challenged by: 1) Difficulty in characterizing spatial heterogeneity, and 2) Difficulty in obtaining predictive models for unseen locations without training data. To address these challenges, this paper proposes a generic framework for spatial domain generalization. Specifically, We develop the spatial interpolation graph neural network <sup>1</sup> that handles spatial data as a graph and learns the spatial embedding on each node and their relationships. The spatial interpolation graph neural network infers the spatial embedding of an unseen location during the test phase. Then the spatial embedding of the target location is used to decode the parameters of the downstream-task model directly on the target location. Finally, extensive experiments on ten real-world datasets demonstrate the proposed method&#x2019;s strength.<sup>1</sup>https://github.com/dyu62/Deep-domain-generalization", "abstracts": [ { "abstractType": "Regular", "content": "Spatial autocorrelation and spatial heterogeneity widely exist in spatial data, which make the traditional machine learning model perform badly. Spatial domain generalization is a spatial extension of domain generalization, which can generalize to unseen spatial domains in continuous 2D space. Specifically, it learns a model under varying data distributions that generalizes to unseen domains. Although tremendous success has been achieved in domain generalization, there exist very few works on spatial domain generalization. The advancement of this area is challenged by: 1) Difficulty in characterizing spatial heterogeneity, and 2) Difficulty in obtaining predictive models for unseen locations without training data. To address these challenges, this paper proposes a generic framework for spatial domain generalization. Specifically, We develop the spatial interpolation graph neural network <sup>1</sup> that handles spatial data as a graph and learns the spatial embedding on each node and their relationships. The spatial interpolation graph neural network infers the spatial embedding of an unseen location during the test phase. Then the spatial embedding of the target location is used to decode the parameters of the downstream-task model directly on the target location. Finally, extensive experiments on ten real-world datasets demonstrate the proposed method&#x2019;s strength.<sup>1</sup>https://github.com/dyu62/Deep-domain-generalization", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Spatial autocorrelation and spatial heterogeneity widely exist in spatial data, which make the traditional machine learning model perform badly. Spatial domain generalization is a spatial extension of domain generalization, which can generalize to unseen spatial domains in continuous 2D space. Specifically, it learns a model under varying data distributions that generalizes to unseen domains. Although tremendous success has been achieved in domain generalization, there exist very few works on spatial domain generalization. The advancement of this area is challenged by: 1) Difficulty in characterizing spatial heterogeneity, and 2) Difficulty in obtaining predictive models for unseen locations without training data. To address these challenges, this paper proposes a generic framework for spatial domain generalization. Specifically, We develop the spatial interpolation graph neural network 1 that handles spatial data as a graph and learns the spatial embedding on each node and their relationships. The spatial interpolation graph neural network infers the spatial embedding of an unseen location during the test phase. Then the spatial embedding of the target location is used to decode the parameters of the downstream-task model directly on the target location. Finally, extensive experiments on ten real-world datasets demonstrate the proposed method’s strength.1https://github.com/dyu62/Deep-domain-generalization", "fno": "509900b293", "keywords": [ "Graph Theory", "Interpolation", "Learning Artificial Intelligence", "Neural Nets", "Spatial Autocorrelation", "Spatial Data", "Spatial Domain Generalization", "Spatial Embedding", "Spatial Extension", "Spatial Heterogeneity", "Spatial Interpolation Graph Neural Network", "Unseen Spatial Domains", "Interpolation", "Training Data", "Machine Learning", "Predictive Models", "Spatial Databases", "Graph Neural Networks", "Data Models", "Unseen Domain Generalization", "Spatial", "GNN", "Edge Embedding", "Interpolation" ], "authors": [ { "affiliation": "Emory University,Department of Computer Science,Atlanta,USA", "fullName": "Dazhou Yu", "givenName": "Dazhou", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Emory University,Department of Computer Science,Atlanta,USA", "fullName": "Guangji Bai", "givenName": "Guangji", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "Emory University,Department of Computer Science,Atlanta,USA", "fullName": "Yun Li", "givenName": "Yun", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Emory University,Department of Computer Science,Atlanta,USA", "fullName": "Liang Zhao", "givenName": "Liang", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "1293-1298", "year": "2022", "issn": null, "isbn": "978-1-6654-5099-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "509900b287", "articleId": "1KpCixF2dEY", "__typename": "AdjacentArticleType" }, "next": { "fno": "509900b299", "articleId": "1KpCv1RoimQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2018/6420/0/642000f400", "title": "Domain Generalization with Adversarial Feature Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000f400/17D45XERmmw", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500a579", "title": "Multi-Component Image Translation for Deep Domain Generalization", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500a579/18j8JB7lsty", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/5555/01/09782500", "title": "Generalizing to Unseen Domains: A Survey on Domain Generalization", "doi": null, "abstractUrl": "/journal/tk/5555/01/09782500/1DGRWOb6qCA", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09860025", "title": "Domain Generalization Via Adversarially Learned Novel Domains", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09860025/1G9EPbv3N4c", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600e900", "title": "Towards Unsupervised Domain Generalization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600e900/1H0NuTHB2uc", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600t9055", "title": "Failure Modes of Domain Generalization Algorithms", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600t9055/1H1jLuH9jwc", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600i036", "title": "Causality Inspired Representation Learning for Domain Generalization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i036/1H1kyoypdoA", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600a499", "title": "Empirical Generalization Study: Unsupervised Domain Adaptation vs. Domain Generalization Methods for Semantic Segmentation in the Wild", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600a499/1KxUr97N8uk", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900j619", "title": "Open Domain Generalization with Domain-Augmented Meta-Learning", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900j619/1yeJYwCpnva", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4335", "title": "Adaptive Methods for Real-World Domain Generalization", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4335/1yeLfu8LmJW", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1gysRccRbB6", "title": "2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "acronym": "ase", "groupId": "1000064", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1gysTdAJuU0", "doi": "10.1109/ASE.2019.00148", "title": "Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements", "normalizedTitle": "Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements", "abstract": "High-fidelity GUI prototyping provides a meaningful manner for illustrating the developers' understanding of the requirements formulated by the customer and can be used for productive discussions and clarification of requirements and expectations. However, high-fidelity prototypes are time-consuming and expensive to develop. Furthermore, the interpretation of requirements expressed in informal natural language is often error-prone due to ambiguities and misunderstandings. In this dissertation project, we will develop a methodology based on Natural Language Processing (NLP) for supporting GUI prototyping by automatically translating Natural Language Requirements (NLR) into a formal Domain-Specific Language (DSL) describing the GUI and its navigational schema. The generated DSL can be further translated into corresponding target platform prototypes and directly provided to the user for inspection. Most related systems stop after generating artifacts, however, we introduce an intelligent and automatic interaction mechanism that allows users to provide natural language feedback on generated prototypes in an iterative fashion, which accordingly will be translated into respective prototype changes.", "abstracts": [ { "abstractType": "Regular", "content": "High-fidelity GUI prototyping provides a meaningful manner for illustrating the developers' understanding of the requirements formulated by the customer and can be used for productive discussions and clarification of requirements and expectations. However, high-fidelity prototypes are time-consuming and expensive to develop. Furthermore, the interpretation of requirements expressed in informal natural language is often error-prone due to ambiguities and misunderstandings. In this dissertation project, we will develop a methodology based on Natural Language Processing (NLP) for supporting GUI prototyping by automatically translating Natural Language Requirements (NLR) into a formal Domain-Specific Language (DSL) describing the GUI and its navigational schema. The generated DSL can be further translated into corresponding target platform prototypes and directly provided to the user for inspection. Most related systems stop after generating artifacts, however, we introduce an intelligent and automatic interaction mechanism that allows users to provide natural language feedback on generated prototypes in an iterative fashion, which accordingly will be translated into respective prototype changes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "High-fidelity GUI prototyping provides a meaningful manner for illustrating the developers' understanding of the requirements formulated by the customer and can be used for productive discussions and clarification of requirements and expectations. However, high-fidelity prototypes are time-consuming and expensive to develop. Furthermore, the interpretation of requirements expressed in informal natural language is often error-prone due to ambiguities and misunderstandings. In this dissertation project, we will develop a methodology based on Natural Language Processing (NLP) for supporting GUI prototyping by automatically translating Natural Language Requirements (NLR) into a formal Domain-Specific Language (DSL) describing the GUI and its navigational schema. The generated DSL can be further translated into corresponding target platform prototypes and directly provided to the user for inspection. Most related systems stop after generating artifacts, however, we introduce an intelligent and automatic interaction mechanism that allows users to provide natural language feedback on generated prototypes in an iterative fashion, which accordingly will be translated into respective prototype changes.", "fno": "250800b234", "keywords": [ "Graphical User Interfaces", "Natural Language Interfaces", "Natural Language Processing", "Specification Languages", "DSL", "Intelligent Interaction Mechanism", "Automatic Interaction Mechanism", "Natural Language Feedback", "Automatic Generation", "Graphical User Interface Prototypes", "Unrestricted Natural Language Requirements", "High Fidelity GUI Prototyping", "Natural Language Processing", "Domain Specific Language", "Target Platform Prototypes", "Prototypes", "Graphical User Interfaces", "Natural Languages", "Adaptation Models", "Software", "Navigation", "Computational Modeling", "Graphical", "User", "Interface", "Automatic", "GUI", "Generation", "Processing", "Natural", "Language", "Requirements", "Intelligent", "Interaction", "Prototyping" ], "authors": [ { "affiliation": "Institute for Enterprise Systems (InES), University of Mannheim", "fullName": "Kristian Kolthoff", "givenName": "Kristian", "surname": "Kolthoff", "__typename": "ArticleAuthorType" } ], "idPrefix": "ase", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-11-01T00:00:00", "pubType": "proceedings", "pages": "1234-1237", "year": "2019", "issn": null, "isbn": "978-1-7281-2508-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "250800b230", "articleId": "1gysRGdvNe0", "__typename": "AdjacentArticleType" }, "next": { "fno": "250800b238", "articleId": "1gysTkr5Oms", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/compsacw/2014/3578/0/3578a246", "title": "Automated Generation of User-Interface Prototypes Based on Controlled Natural Language Description", "doi": null, "abstractUrl": "/proceedings-article/compsacw/2014/3578a246/12OmNBTs7w9", "parentPublication": { "id": "proceedings/compsacw/2014/3578/0", "title": "2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiaws/1991/2240/0/00236578", "title": "Natural language interface to a corporate cash management system", "doi": null, "abstractUrl": "/proceedings-article/aiaws/1991/00236578/12OmNBlofMw", "parentPublication": { "id": "proceedings/aiaws/1991/2240/0", "title": "Proceedings First International Conference on Artificial Intelligence Applications on Wall Street", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0/07588866", "title": "Developing a Mobile System for Natural Language Grammar Acquisition", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-datacom-cyberscitech/2016/07588866/12OmNqBtiS4", "parentPublication": { "id": "proceedings/dasc-picom-datacom-cyberscitech/2016/4065/0", "title": "2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mespp/1990/2059/0/00122710", "title": "A natural language interface for expert system help desks", "doi": null, "abstractUrl": "/proceedings-article/mespp/1990/00122710/12OmNrIJqAC", "parentPublication": { "id": "proceedings/mespp/1990/2059/0", "title": "Proceedings IEEE Conference on Managing Expert System Programs and Projects", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2012/0852/0/06344508", "title": "Evaluating a natural language interface for behavioral programming", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2012/06344508/12OmNrkjVmT", "parentPublication": { "id": "proceedings/vlhcc/2012/0852/0", "title": "2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sedc/1994/5870/0/00475317", "title": "Petri net based graphical user interface specification tool", "doi": null, "abstractUrl": "/proceedings-article/sedc/1994/00475317/12OmNwekjEh", "parentPublication": { "id": "proceedings/sedc/1994/5870/0", "title": "Proceedings Software Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2006/07/h0846", "title": "Energy-Efficient Graphical User Interface Design", "doi": null, "abstractUrl": "/journal/tm/2006/07/h0846/13rRUEgs2Mt", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506506", "title": "APPINITE: A Multi-Modal Interface for Specifying Data Descriptions in Programming by Demonstration Using Natural Language Instructions", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506506/17D45Vw15vb", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mobilesoft/2022/9301/0/930100a112", "title": "Mobile GUI test script generation from natural language descriptions using pre-trained model", "doi": null, "abstractUrl": "/proceedings-article/mobilesoft/2022/930100a112/1EpM1KXwB9e", "parentPublication": { "id": "proceedings/mobilesoft/2022/9301/0", "title": "2022 IEEE/ACM 9th International Conference on Mobile Software Engineering and Systems (MobileSoft)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ase/2020/6768/0/676800b297", "title": "GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements", "doi": null, "abstractUrl": "/proceedings-article/ase/2020/676800b297/1pP3JAjqMYo", "parentPublication": { "id": "proceedings/ase/2020/6768/0", "title": "2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qRNrlo577W", "title": "2020 IEEE Visualization Conference (VIS)", "acronym": "vis", "groupId": "1001944", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qROcQvKnM4", "doi": "10.1109/VIS47514.2020.00064", "title": "ProtoViewer: Visual Interpretation and Diagnostics of Deep Neural Networks with Factorized Prototypes", "normalizedTitle": "ProtoViewer: Visual Interpretation and Diagnostics of Deep Neural Networks with Factorized Prototypes", "abstract": "In recent years deep neural networks (DNNs) are increasingly used in a variety of application domains for their state-of-the-art performance in many challenging machine learning tasks. However their lack of interpretability could cause trustability and fairness issues and also makes model diagnostics a difficult task. In this paper we present a novel visual analytics framework to interpret and diagnose DNNs. Our approach utilizes ProtoFac to factorize the latent representations in DNNs into weighted combinations of prototypes, which are exemplar cases (e.g., representative image patches) from the original data. The visual interface uses the factorized prototypes to summarize and explain the model behaviour as well as support comparisons across subsets of data such that the users can form a hypothesis about the model's failure on certain subsets. The method is model-agnostic and provides global explanation of the model behaviour. Furthermore, the system selects prototypes and weights that faithfully represents the model under analysis by mimicking its latent representation and predictions. Example usage scenarios on two DNN architectures and two datasets illustrates the effectiveness and general applicability of the proposed approach.", "abstracts": [ { "abstractType": "Regular", "content": "In recent years deep neural networks (DNNs) are increasingly used in a variety of application domains for their state-of-the-art performance in many challenging machine learning tasks. However their lack of interpretability could cause trustability and fairness issues and also makes model diagnostics a difficult task. In this paper we present a novel visual analytics framework to interpret and diagnose DNNs. Our approach utilizes ProtoFac to factorize the latent representations in DNNs into weighted combinations of prototypes, which are exemplar cases (e.g., representative image patches) from the original data. The visual interface uses the factorized prototypes to summarize and explain the model behaviour as well as support comparisons across subsets of data such that the users can form a hypothesis about the model's failure on certain subsets. The method is model-agnostic and provides global explanation of the model behaviour. Furthermore, the system selects prototypes and weights that faithfully represents the model under analysis by mimicking its latent representation and predictions. Example usage scenarios on two DNN architectures and two datasets illustrates the effectiveness and general applicability of the proposed approach.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In recent years deep neural networks (DNNs) are increasingly used in a variety of application domains for their state-of-the-art performance in many challenging machine learning tasks. However their lack of interpretability could cause trustability and fairness issues and also makes model diagnostics a difficult task. In this paper we present a novel visual analytics framework to interpret and diagnose DNNs. Our approach utilizes ProtoFac to factorize the latent representations in DNNs into weighted combinations of prototypes, which are exemplar cases (e.g., representative image patches) from the original data. The visual interface uses the factorized prototypes to summarize and explain the model behaviour as well as support comparisons across subsets of data such that the users can form a hypothesis about the model's failure on certain subsets. The method is model-agnostic and provides global explanation of the model behaviour. Furthermore, the system selects prototypes and weights that faithfully represents the model under analysis by mimicking its latent representation and predictions. Example usage scenarios on two DNN architectures and two datasets illustrates the effectiveness and general applicability of the proposed approach.", "fno": "801400a286", "keywords": [ "Data Analysis", "Data Visualisation", "Deep Learning Artificial Intelligence", "Set Theory", "Subsets", "Visual Interface", "Representative Image Patches", "Latent Representations", "Visual Analytics Framework", "Model Diagnostics", "Trustability", "Machine Learning", "DNN", "Deep Neural Networks", "Factorized Prototypes", "Proto Viewer", "Latent Representation", "Model Behaviour", "Visual Analytics", "Neural Networks", "Prototypes", "Machine Learning", "Predictive Models", "Data Models", "Task Analysis", "Machine Learning Techniques Machine Learning Statistics Modeling And Simulation Applications Data Analysis Reasoning Problem Solving And Decision Making" ], "authors": [ { "affiliation": "Purdue University", "fullName": "Junhan Zhao", "givenName": "Junhan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Bosch Research North America", "fullName": "Zeng Dai", "givenName": "Zeng", "surname": "Dai", "__typename": "ArticleAuthorType" }, { "affiliation": "Bosch Research North America", "fullName": "Panpan Xu", "givenName": "Panpan", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "Bosch Research North America", "fullName": "Liu Ren", "givenName": "Liu", "surname": "Ren", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "286-290", "year": "2020", "issn": null, "isbn": "978-1-7281-8014-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1qROcHlL2uY", "name": "pvis202080140-09331285s1-mm_801400a286.zip", "size": "2.18 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvis202080140-09331285s1-mm_801400a286.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "801400a281", "articleId": "1qRO9tzh3vG", "__typename": "AdjacentArticleType" }, "next": { "fno": "801400a291", "articleId": "1qRNY3yzSgw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iita/2009/3859/3/3859c466", "title": "Study on the Chinese Character Prototypes Based on Topological Theory", "doi": null, "abstractUrl": "/proceedings-article/iita/2009/3859c466/12OmNAXxX34", "parentPublication": { "id": "proceedings/iita/2009/3859/3", "title": "2009 Third International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/05/mcg2014050070", "title": "Interactive Visual Analysis of Heterogeneous Cohort-Study Data", "doi": null, "abstractUrl": "/magazine/cg/2014/05/mcg2014050070/13rRUyhaIj8", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585720", "title": "A Workflow for Visual Diagnostics of Binary Classifiers using Instance-Level Explanations", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585720/17D45W2WyxO", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08667661", "title": "<italic>DeepVID</italic>: Deep Visual Interpretation and Diagnosis for Image Classifiers via Knowledge Distillation", "doi": null, "abstractUrl": "/journal/tg/2019/06/08667661/18q6nouFfmo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600j799", "title": "Semi-Supervised Object Detection via Multi-instance Alignment with Global Class Prototypes", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600j799/1H1ltj6z9Kg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807354", "title": "VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807354/1cG6pt9f4ly", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802447", "title": "Visual Bird Watcher: Interactive Visual Analysis on Bird Distribution and Migration", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802447/1cJ6YMmczXG", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08827944", "title": "ProtoSteer: Steering Deep Sequence Model with Prototypes", "doi": null, "abstractUrl": "/journal/tg/2020/01/08827944/1ddbirUMtNe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2020/5697/0/09086238", "title": "Visual Interpretation of Recurrent Neural Network on Multi-dimensional Time-series Forecast", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2020/09086238/1kuHkB4vMFG", "parentPublication": { "id": "proceedings/pacificvis/2020/5697/0", "title": "2020 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a448", "title": "Interpreting Deep Neural Networks through Prototype Factorization", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a448/1rgGgYzL6I8", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeLk6GfYBO", "doi": "10.1109/CVPR46437.2021.00829", "title": "Learning Discriminative Prototypes with Dynamic Time Warping", "normalizedTitle": "Learning Discriminative Prototypes with Dynamic Time Warping", "abstract": "Dynamic Time Warping (DTW) is widely used for temporal data processing. However, existing methods can neither learn the discriminative prototypes of different classes nor exploit such prototypes for further analysis. We propose Discriminative Prototype DTW (DP-DTW), a novel method to learn class-specific discriminative prototypes for temporal recognition tasks. DP-DTW shows superior performance compared to conventional DTWs on time series classification benchmarks<sup>1</sup>. Combined with end-to-end deep learning, DP-DTW can handle challenging weakly supervised action segmentation problems and achieves state of the art results on standard benchmarks. Moreover, detailed reasoning on the input video is enabled by the learned action prototypes. Specifically, an action-based video summarization can be obtained by aligning the input sequence with action prototypes.", "abstracts": [ { "abstractType": "Regular", "content": "Dynamic Time Warping (DTW) is widely used for temporal data processing. However, existing methods can neither learn the discriminative prototypes of different classes nor exploit such prototypes for further analysis. We propose Discriminative Prototype DTW (DP-DTW), a novel method to learn class-specific discriminative prototypes for temporal recognition tasks. DP-DTW shows superior performance compared to conventional DTWs on time series classification benchmarks<sup>1</sup>. Combined with end-to-end deep learning, DP-DTW can handle challenging weakly supervised action segmentation problems and achieves state of the art results on standard benchmarks. Moreover, detailed reasoning on the input video is enabled by the learned action prototypes. Specifically, an action-based video summarization can be obtained by aligning the input sequence with action prototypes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Dynamic Time Warping (DTW) is widely used for temporal data processing. However, existing methods can neither learn the discriminative prototypes of different classes nor exploit such prototypes for further analysis. We propose Discriminative Prototype DTW (DP-DTW), a novel method to learn class-specific discriminative prototypes for temporal recognition tasks. DP-DTW shows superior performance compared to conventional DTWs on time series classification benchmarks1. Combined with end-to-end deep learning, DP-DTW can handle challenging weakly supervised action segmentation problems and achieves state of the art results on standard benchmarks. Moreover, detailed reasoning on the input video is enabled by the learned action prototypes. Specifically, an action-based video summarization can be obtained by aligning the input sequence with action prototypes.", "fno": "450900i391", "keywords": [ "Image Classification", "Image Motion Analysis", "Image Segmentation", "Image Sequences", "Learning Artificial Intelligence", "Object Recognition", "Pattern Classification", "Time Series", "Video Signal Processing", "Dynamic Time Warping", "Temporal Data Processing", "Discriminative Prototype DTW", "DP DTW", "Class Specific Discriminative Prototypes", "Temporal Recognition Tasks", "Time Series Classification Benchmarks", "End To End Deep Learning", "Challenging Weakly Supervised Action Segmentation Problems", "Achieves State", "Learned Action Prototypes", "Deep Learning", "Computer Vision", "Heuristic Algorithms", "Time Series Analysis", "Prototypes", "Benchmark Testing", "Data Processing" ], "authors": [ { "affiliation": "Simon Fraser University", "fullName": "Xiaobin Chang", "givenName": "Xiaobin", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "Borealis AI", "fullName": "Frederick Tung", "givenName": "Frederick", "surname": "Tung", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University", "fullName": "Greg Mori", "givenName": "Greg", "surname": "Mori", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "8391-8400", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "450900i381", "articleId": "1yeKIPDDiN2", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900i401", "articleId": "1yeLAUunkkM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2016/5473/0/07837974", "title": "Prefix and Suffix Invariant Dynamic Time Warping", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837974/12OmNAtK4fP", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840d112", "title": "Joint Learning of Discriminative Prototypes and Large Margin Nearest Neighbor Classifiers", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840d112/12OmNqzu6V7", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460623", "title": "Non-Markovian dynamic time warping", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460623/12OmNroijcU", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-euc/2013/5088/0/06831932", "title": "Parallelizing Dynamic Time Warping Algorithm Using Prefix Computations on GPU", "doi": null, "abstractUrl": "/proceedings-article/hpcc-euc/2013/06831932/12OmNxxdZFb", "parentPublication": { "id": "proceedings/hpcc-euc/2013/5088/0", "title": "2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2015/8493/0/8493a440", "title": "Affine and Regional Dynamic Time Warping", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2015/8493a440/12OmNzw8jiF", "parentPublication": { "id": "proceedings/icdmw/2015/8493/0", "title": "2015 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2021/2398/0/239800a589", "title": "Ultra fast warping window optimization for Dynamic Time Warping", "doi": null, "abstractUrl": "/proceedings-article/icdm/2021/239800a589/1AqxaZfSv3G", "parentPublication": { "id": "proceedings/icdm/2021/2398/0", "title": "2021 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956686", "title": "Fast Sparse Dynamic Time Warping", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956686/1IHpYfARxSM", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2019/1664/0/166400a263", "title": "Segmented Dynamic Time Warping Based Signal Pattern Classification", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2019/166400a263/1fHkwDDS10s", "parentPublication": { "id": "proceedings/cse-euc/2019/1664/0", "title": "2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2021/8808/0/09412812", "title": "Time Series Data Augmentation for Neural Networks by Time Warping with a Discriminative Teacher", "doi": null, "abstractUrl": "/proceedings-article/icpr/2021/09412812/1tmjMEzWofu", "parentPublication": { "id": "proceedings/icpr/2021/8808/0", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2021/4252/0/425200a082", "title": "Constructing Knowledge Representation Vectors by Symbolic Fourier Approximation and Dynamic Time Warping to Improve Time Series Classification", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2021/425200a082/1xlzZetGNYQ", "parentPublication": { "id": "proceedings/bigcom/2021/4252/0", "title": "2021 7th International Conference on Big Data Computing and Communications (BigCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdVh2r", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNAo45Rt", "doi": "10.1109/PACIFICVIS.2017.8031600", "title": "Exploring controversy via sentiment divergences of aspects in reviews", "normalizedTitle": "Exploring controversy via sentiment divergences of aspects in reviews", "abstract": "A visual summary of the controversial aspects of an item enables both customers and marketers to identify and address complaints and concerns about the item effectively. In this paper, we propose a novel visual analytics system, to visually explore when a controversy occurs and the causes behind the controversy via user-generated reviews with text and ratings in various domains, such as restaurants, home goods, and cultural products. Quantitative analysis of the ratings of an item is first applied to characterize the evolution of controversy over time. A novel aspect-extraction method based on hierarchical clustering is proposed to identify aspect-level reasons garnered from review texts that explain why a controversy occurs. Our system allows the user to interactively explore the time-evolving controversy trend, major aspects of reviews, and sentiment divergences of aspects to understand in depth the controversy in reviews. We evaluate the effectiveness of the proposed aspect-extraction method by means of accuracy of aspect identification, the usefulness of our system using three case studies in different domains, and a user study.", "abstracts": [ { "abstractType": "Regular", "content": "A visual summary of the controversial aspects of an item enables both customers and marketers to identify and address complaints and concerns about the item effectively. In this paper, we propose a novel visual analytics system, to visually explore when a controversy occurs and the causes behind the controversy via user-generated reviews with text and ratings in various domains, such as restaurants, home goods, and cultural products. Quantitative analysis of the ratings of an item is first applied to characterize the evolution of controversy over time. A novel aspect-extraction method based on hierarchical clustering is proposed to identify aspect-level reasons garnered from review texts that explain why a controversy occurs. Our system allows the user to interactively explore the time-evolving controversy trend, major aspects of reviews, and sentiment divergences of aspects to understand in depth the controversy in reviews. We evaluate the effectiveness of the proposed aspect-extraction method by means of accuracy of aspect identification, the usefulness of our system using three case studies in different domains, and a user study.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A visual summary of the controversial aspects of an item enables both customers and marketers to identify and address complaints and concerns about the item effectively. In this paper, we propose a novel visual analytics system, to visually explore when a controversy occurs and the causes behind the controversy via user-generated reviews with text and ratings in various domains, such as restaurants, home goods, and cultural products. Quantitative analysis of the ratings of an item is first applied to characterize the evolution of controversy over time. A novel aspect-extraction method based on hierarchical clustering is proposed to identify aspect-level reasons garnered from review texts that explain why a controversy occurs. Our system allows the user to interactively explore the time-evolving controversy trend, major aspects of reviews, and sentiment divergences of aspects to understand in depth the controversy in reviews. We evaluate the effectiveness of the proposed aspect-extraction method by means of accuracy of aspect identification, the usefulness of our system using three case studies in different domains, and a user study.", "fno": "08031600", "keywords": [ "Market Research", "Motion Pictures", "Indexes", "Sentiment Analysis", "Visual Analytics", "Voting", "I 3 6 Computer Graphics Methodology And Techniques Interaction Techniques" ], "authors": [ { "affiliation": "State Key Laboratory of CAD&CG, Zhejiang University, China", "fullName": "Jin Xu", "givenName": "Jin", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of CAD&CG, Zhejiang University, China", "fullName": "Yubo Tao", "givenName": "Yubo", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of CAD&CG, Zhejiang University, China", "fullName": "Hai Lin", "givenName": "Hai", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of CAD&CG, Zhejiang University, China", "fullName": "Rongjie Zhu", "givenName": null, "surname": "Rongjie Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of CAD&CG, Zhejiang University, China", "fullName": "Yuyu Yan", "givenName": null, "surname": "Yuyu Yan", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "240-249", "year": "2017", "issn": "2165-8773", "isbn": "978-1-5090-5738-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08031599", "articleId": "12OmNxEjY7F", "__typename": "AdjacentArticleType" }, "next": { "fno": "08031601", "articleId": "12OmNxA3Z6e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2017/3835/0/3835a727", "title": "Aspect Sentiment Model for Micro Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2017/3835a727/12OmNCzb9zN", "parentPublication": { "id": "proceedings/icdm/2017/3835/0", "title": "2017 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2012/4905/0/4905b020", "title": "Learning Attitudes and Attributes from Multi-aspect Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2012/4905b020/12OmNrHSCZJ", "parentPublication": { "id": "proceedings/icdm/2012/4905/0", "title": "2012 IEEE 12th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscmi/2014/6751/0/6751a028", "title": "Aspect Based Sentiment Analysis of Movie Reviews: Finding the Polarity Directing Aspects", "doi": null, "abstractUrl": "/proceedings-article/iscmi/2014/6751a028/12OmNy3iFkP", "parentPublication": { "id": "proceedings/iscmi/2014/6751/0", "title": "2014 International Conference on Soft Computing & Machine Intelligence (ISCMI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800a884", "title": "Controversy Detection Using Reactions on Social Media", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800a884/12OmNyQYtnf", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302a380", "title": "Ratable Aspects over Sentiments: Predicting Ratings for Unrated Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302a380/12OmNyyeWwB", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2015/9504/0/9504a241", "title": "Generative Models for Mining Latent Aspects and Their Ratings from Short Reviews", "doi": null, "abstractUrl": "/proceedings-article/icdm/2015/9504a241/12OmNzxyiDm", "parentPublication": { "id": "proceedings/icdm/2015/9504/0", "title": "2015 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imitec/2021/1749/0/09714655", "title": "Using Deep Learning and Sentiment Analysis to Identify Mismatches between Online Courses&#x2019; Reviews and Ratings", "doi": null, "abstractUrl": "/proceedings-article/imitec/2021/09714655/1BaZIG7eXjW", "parentPublication": { "id": "proceedings/imitec/2021/1749/0", "title": "2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956570", "title": "Deep Hotel Recommender System Using Aspect-based Sentiment Analysis of Users&#x2019; Reviews", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956570/1IHpeD7tWms", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2018/1360/0/136000a270", "title": "Sentilyzer: Aspect-Oriented Sentiment Analysis of Product Reviews", "doi": null, "abstractUrl": "/proceedings-article/csci/2018/136000a270/1gjRpZlWoco", "parentPublication": { "id": "proceedings/csci/2018/1360/0", "title": "2018 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c444", "title": "Importance Evaluation of Movie Aspects: Aspect-Based Sentiment Analysis", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c444/1tzyGVUcMjC", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrHB1Wh", "title": "2016 20th International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNx2zjwS", "doi": "10.1109/IV.2016.67", "title": "Effects of Very High Frame Rate Display in Narrative CGI Animation", "normalizedTitle": "Effects of Very High Frame Rate Display in Narrative CGI Animation", "abstract": "Screen resolution of digital images and digital displays has increased steadily over the last several decades, but there has been comparatively little interest in a parallel increase in temporal resolution, or frame rate. Several groups are experimenting with High Frame Rate (HFR) for live-action cinema, but they do not address the issue with respect to synthetic images (CGI) in animation, nor do they take advantage of the repeatability of synthetic image sequences to study visual differentiation of HFR sequences run at different frame rates. This study is concerned with analyzing animated motion pictures that are created and viewed at very high frame rates, 120 frames-per-second (fps) and higher. To explore these issues we employ high frequency procedural motion data to create repeatable animated sequences at different frame rates while maintaining exact control over action and point of view as well as over techniques of photorealism such as motion blur and camera shutter effects. Holding these factors constant allows us to better understand how the same cinematic narrative is perceived at different frame rates. Our work in this area is just beginning. This paper will reflect our preliminary findings and set a course for our future work in this area.", "abstracts": [ { "abstractType": "Regular", "content": "Screen resolution of digital images and digital displays has increased steadily over the last several decades, but there has been comparatively little interest in a parallel increase in temporal resolution, or frame rate. Several groups are experimenting with High Frame Rate (HFR) for live-action cinema, but they do not address the issue with respect to synthetic images (CGI) in animation, nor do they take advantage of the repeatability of synthetic image sequences to study visual differentiation of HFR sequences run at different frame rates. This study is concerned with analyzing animated motion pictures that are created and viewed at very high frame rates, 120 frames-per-second (fps) and higher. To explore these issues we employ high frequency procedural motion data to create repeatable animated sequences at different frame rates while maintaining exact control over action and point of view as well as over techniques of photorealism such as motion blur and camera shutter effects. Holding these factors constant allows us to better understand how the same cinematic narrative is perceived at different frame rates. Our work in this area is just beginning. This paper will reflect our preliminary findings and set a course for our future work in this area.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Screen resolution of digital images and digital displays has increased steadily over the last several decades, but there has been comparatively little interest in a parallel increase in temporal resolution, or frame rate. Several groups are experimenting with High Frame Rate (HFR) for live-action cinema, but they do not address the issue with respect to synthetic images (CGI) in animation, nor do they take advantage of the repeatability of synthetic image sequences to study visual differentiation of HFR sequences run at different frame rates. This study is concerned with analyzing animated motion pictures that are created and viewed at very high frame rates, 120 frames-per-second (fps) and higher. To explore these issues we employ high frequency procedural motion data to create repeatable animated sequences at different frame rates while maintaining exact control over action and point of view as well as over techniques of photorealism such as motion blur and camera shutter effects. Holding these factors constant allows us to better understand how the same cinematic narrative is perceived at different frame rates. Our work in this area is just beginning. This paper will reflect our preliminary findings and set a course for our future work in this area.", "fno": "8942a395", "keywords": [ "Motion Pictures", "Animation", "Image Resolution", "Games", "Photography", "Cameras", "Standards", "Cinema", "HFR", "CGI Animation", "Narrative" ], "authors": [ { "affiliation": null, "fullName": "John Andrew Berton", "givenName": "John Andrew", "surname": "Berton", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Kai-Lin Chuang", "givenName": "Kai-Lin", "surname": "Chuang", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "395-398", "year": "2016", "issn": "2375-0138", "isbn": "978-1-4673-8942-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "8942a390", "articleId": "12OmNxwENHM", "__typename": "AdjacentArticleType" }, "next": { "fno": "8942a399", "articleId": "12OmNxEBzkP", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic4e/2010/5680/0/05432446", "title": "Calligraphic Creation Based on Flash", "doi": null, "abstractUrl": "/proceedings-article/ic4e/2010/05432446/12OmNANBZiL", "parentPublication": { "id": "proceedings/ic4e/2010/5680/0", "title": "2010 International Conference on e-Education, e-Business, e-Management, and e-Learning, (IC4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2016/2312/0/2312a499", "title": "Research of Animation Shots Principle", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2016/2312a499/12OmNBaT5ZQ", "parentPublication": { "id": "proceedings/icmtma/2016/2312/0", "title": "2016 Eighth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/2001/7237/0/00982394", "title": "A new mathematical development for radiosity animation with Galerkin method", "doi": null, "abstractUrl": "/proceedings-article/ca/2001/00982394/12OmNx8Ouze", "parentPublication": { "id": "proceedings/ca/2001/7237/0", "title": "Proceedings Computer Animation 2001. Fourteenth Conference on Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2014/4761/0/06890271", "title": "Automatic mesh animation preview", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890271/12OmNxWLTzX", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2012/4778/0/4778a037", "title": "A Sketch-based Skeletal Figure Animation Tool for Novice Users", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2012/4778a037/12OmNz4SOso", "parentPublication": { "id": "proceedings/cgiv/2012/4778/0", "title": "2012 Ninth International Conference on Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2013/5048/0/5048a460", "title": "Perception of Emotional Gaits Using Avatar Animation of Real and Artificially Synthesized Gaits", "doi": null, "abstractUrl": "/proceedings-article/acii/2013/5048a460/12OmNzWx07H", "parentPublication": { "id": "proceedings/acii/2013/5048/0", "title": "2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040014", "title": "Premo: DreamWorks Animation's New Approach to Animation", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040014/13rRUwhpBGE", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/mc/2018/04/08334422", "title": "A 120 fps High Frame Rate Real-time HEVC Video Encoder with Parallel Configuration Scalable to 4K", "doi": null, "abstractUrl": "/journal/mc/2018/04/08334422/17D45VVho5e", "parentPublication": { "id": "trans/mc", "title": "IEEE Transactions on Multi-Scale Computing Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377913", "title": "Contrast-resolution Evaluation of Fourier Based High Frame Rate Imaging", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377913/1s64hpSptEA", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2020/1589/0/09408713", "title": "Resolution, Sidelobe, and Contrast Analysis of Ultrasound Fourier Based High Frame Rate Imaging", "doi": null, "abstractUrl": "/proceedings-article/isspit/2020/09408713/1t0Iec7Ar5e", "parentPublication": { "id": "proceedings/isspit/2020/1589/0", "title": "2020 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxwWoT2", "doi": "10.1109/IV.2009.73", "title": "Generating Abstract Networks Using Multi-relational Biological Data", "normalizedTitle": "Generating Abstract Networks Using Multi-relational Biological Data", "abstract": "This paper presents an approach for visual exploration of groups in network data. We let users visually cluster nodes based on common semantic and relational features. We describe the clusters in the context of multi-relational protein data. Finally, we illustrate the clusters as composite nodes using a visual analytic tool and show how to create a meaningful abstracted protein network by connecting these composite nodes based on common membership or common attribute features.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents an approach for visual exploration of groups in network data. We let users visually cluster nodes based on common semantic and relational features. We describe the clusters in the context of multi-relational protein data. Finally, we illustrate the clusters as composite nodes using a visual analytic tool and show how to create a meaningful abstracted protein network by connecting these composite nodes based on common membership or common attribute features.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents an approach for visual exploration of groups in network data. We let users visually cluster nodes based on common semantic and relational features. We describe the clusters in the context of multi-relational protein data. Finally, we illustrate the clusters as composite nodes using a visual analytic tool and show how to create a meaningful abstracted protein network by connecting these composite nodes based on common membership or common attribute features.", "fno": "3733a331", "keywords": [ "Visual Analytics", "Protein Network", "Abstract Networks" ], "authors": [ { "affiliation": null, "fullName": "Paul Caravelli", "givenName": "Paul", "surname": "Caravelli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mitch Beard", "givenName": "Mitch", "surname": "Beard", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Brian Gopolan", "givenName": "Brian", "surname": "Gopolan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Lisa Singh", "givenName": "Lisa", "surname": "Singh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhang-Zhi Hu", "givenName": "Zhang-Zhi", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "331-336", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a317", "articleId": "12OmNzdoMlx", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a337", "articleId": "12OmNCcbE8L", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bibm/2012/2559/0/06392693", "title": "A random walk based approach for improving protein-protein interaction network and protein complex prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2012/06392693/12OmNBpmDK9", "parentPublication": { "id": "proceedings/bibm/2012/2559/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2009/3733/0/3733a337", "title": "Visual Analysis of Overlapping Biological Networks", "doi": null, "abstractUrl": "/proceedings-article/iv/2009/3733a337/12OmNCcbE8L", "parentPublication": { "id": "proceedings/iv/2009/3733/0", "title": "2009 13th International Conference Information Visualisation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imis/2013/4974/0/4974a601", "title": "Multi-generating Procedure and Second Grey Relational Analysis", "doi": null, "abstractUrl": "/proceedings-article/imis/2013/4974a601/12OmNqBtiTa", "parentPublication": { "id": "proceedings/imis/2013/4974/0", "title": "2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2015/6879/0/07156359", "title": "MultiStory: Visual analytics of dynamic multi-relational networks", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2015/07156359/12OmNwK7o9E", "parentPublication": { "id": "proceedings/pacificvis/2015/6879/0", "title": "2015 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921634", "title": "Multi-label collective classification in multi-attribute multi-relational network data", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921634/12OmNxdVgOA", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibmw/2012/2746/0/06470212", "title": "Effectively predicting protein functions by collective classification — An extended abstract", "doi": null, "abstractUrl": "/proceedings-article/bibmw/2012/06470212/12OmNxveNEW", "parentPublication": { "id": "proceedings/bibmw/2012/2746/0", "title": "2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbrn/2010/4210/0/4210a097", "title": "Identifying Abnormal Nodes in Protein-Protein Interaction Networks", "doi": null, "abstractUrl": "/proceedings-article/sbrn/2010/4210a097/12OmNzw8j40", "parentPublication": { "id": "proceedings/sbrn/2010/4210/0", "title": "Neural Networks, Brazilian Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2011/03/ttb2011030621", "title": "A Max-Flow-Based Approach to the Identification of Protein Complexes Using Protein Interaction and Microarray Data", "doi": null, "abstractUrl": "/journal/tb/2011/03/ttb2011030621/13rRUwIF67C", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011121882", "title": "Interactive, Graph-based Visual Analysis of High-dimensional, Multi-parameter Fluorescence Microscopy Data in Toponomics", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011121882/13rRUytWF9i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669468", "title": "Heterogeneous Graph Convolutional Network integrates Multi-modal Similarities for Drug-Target Interaction Prediction", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669468/1A9VJTjqExy", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzYwc3a", "title": "2017 IEEE Workshop on Data Systems for Interactive Analysis (DSIA)", "acronym": "dsia", "groupId": "1824964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxymoc7", "doi": "10.1109/DSIA.2017.8339086", "title": "High-dimensional scientific data exploration via cinema", "normalizedTitle": "High-dimensional scientific data exploration via cinema", "abstract": "Large-scale scientific simulations and experiments generate enormous volumes of data. Data analytics may become a bottleneck to scientific discovery without scalable tools for interactive exploration. Cinema was developed as a way to overcome hurdles by providing an exploratory, image database approach for analyzing large scientific data sets. In the following, we present several new methods for Cinema: 1) a structured data model that lends itself to querying and database support, 2) support for arbitrary data products beyond images, and 3) parameter exploration through high-dimensional visualization. These changes enrich the types of exporatory visualizations and discoveries that are naturally supported by Cinema-style analyses, further enabling data-driven science.", "abstracts": [ { "abstractType": "Regular", "content": "Large-scale scientific simulations and experiments generate enormous volumes of data. Data analytics may become a bottleneck to scientific discovery without scalable tools for interactive exploration. Cinema was developed as a way to overcome hurdles by providing an exploratory, image database approach for analyzing large scientific data sets. In the following, we present several new methods for Cinema: 1) a structured data model that lends itself to querying and database support, 2) support for arbitrary data products beyond images, and 3) parameter exploration through high-dimensional visualization. These changes enrich the types of exporatory visualizations and discoveries that are naturally supported by Cinema-style analyses, further enabling data-driven science.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Large-scale scientific simulations and experiments generate enormous volumes of data. Data analytics may become a bottleneck to scientific discovery without scalable tools for interactive exploration. Cinema was developed as a way to overcome hurdles by providing an exploratory, image database approach for analyzing large scientific data sets. In the following, we present several new methods for Cinema: 1) a structured data model that lends itself to querying and database support, 2) support for arbitrary data products beyond images, and 3) parameter exploration through high-dimensional visualization. These changes enrich the types of exporatory visualizations and discoveries that are naturally supported by Cinema-style analyses, further enabling data-driven science.", "fno": "08339086", "keywords": [ "Motion Pictures", "Data Visualization", "Data Models", "Visual Databases", "Indexing", "Software", "Cinema", "High Dimensional Data", "Databases", "Structural Data", "Parallel Coordinates", "In Situ", "Parameter Exploration", "Image Databases", "Interactive Exploration", "Big Data", "Exascale Supercomputing" ], "authors": [ { "affiliation": "Los Alamos National Laboratory", "fullName": "Jonathan Woodring", "givenName": "Jonathan", "surname": "Woodring", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "James P. Ahrens", "givenName": "James P.", "surname": "Ahrens", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "John Patchett", "givenName": "John", "surname": "Patchett", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory and the New Mexico State University", "fullName": "Cameron Tauxe", "givenName": "Cameron", "surname": "Tauxe", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "David H. Rogers", "givenName": "David H.", "surname": "Rogers", "__typename": "ArticleAuthorType" } ], "idPrefix": "dsia", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2017", "issn": null, "isbn": "978-1-5386-2198-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08339085", "articleId": "12OmNBtl1xc", "__typename": "AdjacentArticleType" }, "next": { "fno": "08339087", "articleId": "12OmNx3Zjp2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wsc/1990/72/0/00129499", "title": "Computer animation with Cinema", "doi": null, "abstractUrl": "/proceedings-article/wsc/1990/00129499/12OmNBhZ4fW", "parentPublication": { "id": "proceedings/wsc/1990/72/0", "title": "1990 Winter Simulation Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2008/2570/0/04607537", "title": "Comparison between JPEG2000 and H.264 for digital cinema", "doi": null, "abstractUrl": "/proceedings-article/icme/2008/04607537/12OmNqzcvCk", "parentPublication": { "id": "proceedings/icme/2008/2570/0", "title": "2008 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1994/2109/0/00717223", "title": "Introduction to SIMAN/Cinema", "doi": null, "abstractUrl": "/proceedings-article/wsc/1994/00717223/12OmNs4S8xV", "parentPublication": { "id": "proceedings/wsc/1994/2109/0", "title": "Proceedings of Winter Simulation Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wsc/1991/0181/0/00185604", "title": "Computer animation with CINEMA", "doi": null, "abstractUrl": "/proceedings-article/wsc/1991/00185604/12OmNybfr3l", "parentPublication": { "id": "proceedings/wsc/1991/0181/0", "title": "1991 Winter Simulation Conference Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2004/8603/1/01394217", "title": "Video coding techniques for digital cinema", "doi": null, "abstractUrl": "/proceedings-article/icme/2004/01394217/12OmNzd7blk", "parentPublication": { "id": "proceedings/icme/2004/8603/1", "title": "2004 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/05/mit2014050050", "title": "Cinema Cloud: An Enabling Technology for the Movie Industry", "doi": null, "abstractUrl": "/magazine/it/2014/05/mit2014050050/13rRUwdrdMA", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000h425", "title": "Now You Shake Me: Towards Automatic 4D Cinema", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000h425/17D45XvMcaC", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2022/03/09826433", "title": "Information-Theoretic Exploration of Multivariate Time-Varying Image Databases", "doi": null, "abstractUrl": "/magazine/cs/2022/03/09826433/1EVdDbjISXK", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2019/0801/0/08940178", "title": "The Research of Seat Differential Pricing in Cinema", "doi": null, "abstractUrl": "/proceedings-article/icis/2019/08940178/1gjRKHDbBIc", "parentPublication": { "id": "proceedings/icis/2019/0801/0", "title": "2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2020/8468/0/846800a037", "title": "Cinema Darkroom: A Deferred Rendering Framework for Large-Scale Datasets", "doi": null, "abstractUrl": "/proceedings-article/ldav/2020/846800a037/1pZ0U4aglxe", "parentPublication": { "id": "proceedings/ldav/2020/8468/0", "title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pZ0TbXJiBq", "title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)", "acronym": "ldav", "groupId": "1800568", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pZ0Ty0tRU4", "doi": "10.1109/LDAV51489.2020.00008", "title": "Data Parallel Hypersweeps for in Situ Topological Analysis", "normalizedTitle": "Data Parallel Hypersweeps for in Situ Topological Analysis", "abstract": "The contour tree is a tool for understanding the topological structure of a scalar field. Recent work has built efficient contour tree algorithms for shared memory parallel computation, driven by the need to analyze large data sets in situ while the simulation is running. Unfortunately, methods for using the contour tree for practical data analysis are still primarily serial, including single isocontour extraction, branch decomposition and simplification. We report data parallel methods for these tasks using a data structure called the hyperstructure and a general purpose approach called a hypersweep. We implement and integrate these methods with a Cinema database that stores features as depth images and with a web server that reconstructs the features for direct visualization.", "abstracts": [ { "abstractType": "Regular", "content": "The contour tree is a tool for understanding the topological structure of a scalar field. Recent work has built efficient contour tree algorithms for shared memory parallel computation, driven by the need to analyze large data sets in situ while the simulation is running. Unfortunately, methods for using the contour tree for practical data analysis are still primarily serial, including single isocontour extraction, branch decomposition and simplification. We report data parallel methods for these tasks using a data structure called the hyperstructure and a general purpose approach called a hypersweep. We implement and integrate these methods with a Cinema database that stores features as depth images and with a web server that reconstructs the features for direct visualization.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The contour tree is a tool for understanding the topological structure of a scalar field. Recent work has built efficient contour tree algorithms for shared memory parallel computation, driven by the need to analyze large data sets in situ while the simulation is running. Unfortunately, methods for using the contour tree for practical data analysis are still primarily serial, including single isocontour extraction, branch decomposition and simplification. We report data parallel methods for these tasks using a data structure called the hyperstructure and a general purpose approach called a hypersweep. We implement and integrate these methods with a Cinema database that stores features as depth images and with a web server that reconstructs the features for direct visualization.", "fno": "846800a012", "keywords": [ "Data Analysis", "Data Structures", "Data Visualisation", "Feature Extraction", "Image Reconstruction", "Parallel Programming", "Trees Mathematics", "Contour Tree", "Topological Structure", "Scalar Field", "Tree Algorithms", "Shared Memory Parallel Computation", "Data Sets", "Data Analysis", "Isocontour Extraction", "Branch Decomposition", "Data Structure", "In Situ Topological Analysis", "Data Parallel Hypersweeps", "Hyperstructure", "Cinema Database", "Web Server", "Feature Reconstruction", "Direct Visualization", "Vegetation", "Data Visualization", "Motion Pictures", "Topology", "Computational Modeling", "Tools", "Volume Measurement", "Contour Tree", "In Situ", "Scalar Field", "Geometric Measures", "Branch Decomposition" ], "authors": [ { "affiliation": "University of Leeds", "fullName": "Petar Hristov", "givenName": "Petar", "surname": "Hristov", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Lawrence Berkeley National Laboratory,Davis", "fullName": "Gunther H. Weber", "givenName": "Gunther H.", "surname": "Weber", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Leeds", "fullName": "Hamish A. Carr", "givenName": "Hamish A.", "surname": "Carr", "__typename": "ArticleAuthorType" }, { "affiliation": "Lawrence Berkeley National Laboratory", "fullName": "Oliver Rübel", "givenName": "Oliver", "surname": "Rübel", "__typename": "ArticleAuthorType" }, { "affiliation": "Los Alamos National Laboratory", "fullName": "James P. Ahrens", "givenName": "James P.", "surname": "Ahrens", "__typename": "ArticleAuthorType" } ], "idPrefix": "ldav", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "12-21", "year": "2020", "issn": null, "isbn": "978-1-7281-8468-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "846800a001", "articleId": "1pZ0TBE8Yjm", "__typename": "AdjacentArticleType" }, "next": { "fno": "846800a022", "articleId": "1pZ0Tm5TBsc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2002/7498/0/7498pascucci", "title": "Efficient Computation of the Topology of Level Sets", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498pascucci/12OmNvkpl7Y", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dsia/2017/2198/0/08339086", "title": "High-dimensional scientific data exploration via cinema", "doi": null, "abstractUrl": "/proceedings-article/dsia/2017/08339086/12OmNxymoc7", "parentPublication": { "id": "proceedings/dsia/2017/2198/0", "title": "2017 IEEE Workshop on Data Systems for Interactive Analysis (DSIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/10/ttg2011101393", "title": "Positional Uncertainty of Isocontours: Condition Analysis and Probabilistic Measures", "doi": null, "abstractUrl": "/journal/tg/2011/10/ttg2011101393/13rRUwkxc5m", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122033", "title": "Visualizing Nuclear Scission through a Multifield Extension of Topological Analysis", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122033/13rRUxNW1Zl", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2006/01/v0014", "title": "Time-Varying Contour Topology", "doi": null, "abstractUrl": "/journal/tg/2006/01/v0014/13rRUzp02oc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440034", "title": "Probabilistic Asymptotic Decider for Topological Ambiguity Resolution in Level-Set Extraction for Uncertain 2D Data", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440034/17D45Vw15xr", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08854335", "title": "Dynamic Nested Tracking Graphs", "doi": null, "abstractUrl": "/journal/tg/2020/01/08854335/1dM2fXNhXK8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08889727", "title": "Scalable Contour Tree Computation by Data Parallel Peak Pruning", "doi": null, "abstractUrl": "/journal/tg/2021/04/08889727/1eBufO7qLle", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/10/09372897", "title": "Optimization and Augmentation for Data Parallel Contour Trees", "doi": null, "abstractUrl": "/journal/tg/2022/10/09372897/1rNP1agwwco", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciddt/2020/0367/0/036700a068", "title": "Research on Attention-guiding Methods in Cinematic Virtual Reality Based on Eye Tracking Analysis", "doi": null, "abstractUrl": "/proceedings-article/iciddt/2020/036700a068/1wutCwJe6ze", "parentPublication": { "id": "proceedings/iciddt/2020/0367/0", "title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wutzGkF9Zu", "title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)", "acronym": "iciddt", "groupId": "1841164", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1wutCwJe6ze", "doi": "10.1109/ICIDDT52279.2020.00020", "title": "Research on Attention-guiding Methods in Cinematic Virtual Reality Based on Eye Tracking Analysis", "normalizedTitle": "Research on Attention-guiding Methods in Cinematic Virtual Reality Based on Eye Tracking Analysis", "abstract": "Reproducing the virtual world is the development direction of film technology and film art. However, the current technology is not ready to build a true \"comprehensive cinema\". However, the current technology is not ready to construct a truly \"total cinema\". The viewer of a 360 degree virtual reality movie can choose viewing directions freely when watching a movie. Therefore, traditional language technique in filmmaking for guiding viewers&#x2019; attention is less effective to a great extent. Viewers are no longer guided by directors or film editors in a passive way, but have almost complete freedom in choosing what they want to watch. This brings new challenges for story-telling. In Cinematic Virtual Reality (CVR), the viewing process is not decided by the filmmaker, instead viewers are guided to watch. Guiding viewers to catch the preset plots effectively and accurately within fixed time can ensure complete viewing experience. Based on eye tracking in CVR, this paper makes an experiment with different attention guiding methods, explores the differences of effects of these methods and attention patterns in watching VR movies, and provides new basis and references for narrative mode in VR movies from the perspective of eye tracking.", "abstracts": [ { "abstractType": "Regular", "content": "Reproducing the virtual world is the development direction of film technology and film art. However, the current technology is not ready to build a true \"comprehensive cinema\". However, the current technology is not ready to construct a truly \"total cinema\". The viewer of a 360 degree virtual reality movie can choose viewing directions freely when watching a movie. Therefore, traditional language technique in filmmaking for guiding viewers&#x2019; attention is less effective to a great extent. Viewers are no longer guided by directors or film editors in a passive way, but have almost complete freedom in choosing what they want to watch. This brings new challenges for story-telling. In Cinematic Virtual Reality (CVR), the viewing process is not decided by the filmmaker, instead viewers are guided to watch. Guiding viewers to catch the preset plots effectively and accurately within fixed time can ensure complete viewing experience. Based on eye tracking in CVR, this paper makes an experiment with different attention guiding methods, explores the differences of effects of these methods and attention patterns in watching VR movies, and provides new basis and references for narrative mode in VR movies from the perspective of eye tracking.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Reproducing the virtual world is the development direction of film technology and film art. However, the current technology is not ready to build a true \"comprehensive cinema\". However, the current technology is not ready to construct a truly \"total cinema\". The viewer of a 360 degree virtual reality movie can choose viewing directions freely when watching a movie. Therefore, traditional language technique in filmmaking for guiding viewers’ attention is less effective to a great extent. Viewers are no longer guided by directors or film editors in a passive way, but have almost complete freedom in choosing what they want to watch. This brings new challenges for story-telling. In Cinematic Virtual Reality (CVR), the viewing process is not decided by the filmmaker, instead viewers are guided to watch. Guiding viewers to catch the preset plots effectively and accurately within fixed time can ensure complete viewing experience. Based on eye tracking in CVR, this paper makes an experiment with different attention guiding methods, explores the differences of effects of these methods and attention patterns in watching VR movies, and provides new basis and references for narrative mode in VR movies from the perspective of eye tracking.", "fno": "036700a068", "keywords": [ "Art", "Cinematography", "Computer Aided Instruction", "Virtual Reality", "Comprehensive Cinema", "Truly Total Cinema", "360 Degree Virtual Reality Movie", "Viewing Directions", "Traditional Language Technique", "Viewers", "Film Editors", "Cinematic Virtual Reality", "Viewing Process", "Complete Viewing Experience", "Different Attention Guiding Methods", "Attention Patterns", "VR Movies", "Attention Guiding Methods", "Eye Tracking Analysis", "Virtual World", "Film Technology", "Film Art", "Technological Innovation", "Art", "Virtual Reality", "Gaze Tracking", "Motion Pictures", "Physiology", "Time Factors", "Eye Tracking", "Response Speed", "VR Movie", "Guiding Methods" ], "authors": [ { "affiliation": "Art School of Jiangsu University,Department of Digital Media and Animation,Zhenjiang,China", "fullName": "Gong Wang", "givenName": "Gong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Art School of Jiangsu University,Department of Digital Media and Animation,Zhenjiang,China", "fullName": "Quan Gan", "givenName": "Quan", "surname": "Gan", "__typename": "ArticleAuthorType" }, { "affiliation": "Art School of Jiangsu University,Department of Visual Communication,Zhenjiang,China", "fullName": "Yubo Li", "givenName": "Yubo", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciddt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-12-01T00:00:00", "pubType": "proceedings", "pages": "68-72", "year": "2020", "issn": null, "isbn": "978-1-6654-0367-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "036700a064", "articleId": "1wutHUvNtEQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "036700a073", "articleId": "1wutCXk7Xa0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892230", "title": "Cinematic virtual reality: Evaluating the effect of display type on the viewing experience for panoramic video", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892230/12OmNx5GTZ2", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446396", "title": "Attention Guiding Using Augmented Reality in Complex Environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446396/13bd1fdV4l1", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699221", "title": "CVR-Analyzer: A Tool for Analyzing Cinematic Virtual Reality Viewing Patterns", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699221/19F1P9DLAdO", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859864", "title": "Evaluating the Effect of Cinematography on the Viewing Experience in Immersive Environment", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859864/1G9ESZcmVtC", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798189", "title": "Interaction Techniques for Cinematic Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798189/1cJ0GcCwwO4", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvris/2019/5050/0/505000a059", "title": "Research on the Artistic Characteristics of VR Films", "doi": null, "abstractUrl": "/proceedings-article/icvris/2019/505000a059/1fHkc7eWgU0", "parentPublication": { "id": "proceedings/icvris/2019/5050/0", "title": "2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdie/2020/5900/0/09150219", "title": "Application of Virtual Reality Combined with Eye Tracking Technology for Design Flows", "doi": null, "abstractUrl": "/proceedings-article/icbdie/2020/09150219/1lPGNkVywSI", "parentPublication": { "id": "proceedings/icbdie/2020/5900/0", "title": "2020 International Conference on Big Data and Informatization Education (ICBDIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2020/8138/0/813800a534", "title": "Expansion or Disruption: Research on the Artistry of VR Films", "doi": null, "abstractUrl": "/proceedings-article/iccst/2020/813800a534/1p1gnyLhhZe", "parentPublication": { "id": "proceedings/iccst/2020/8138/0", "title": "2020 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a600", "title": "Automatic Generation of Diegetic Guidance in Cinematic Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a600/1pysw9jL61i", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsgea/2021/3263/0/326300a231", "title": "Innovation System of Film Art Creation Based on Virtual Reality Technology", "doi": null, "abstractUrl": "/proceedings-article/icsgea/2021/326300a231/1vb9f3YRGP6", "parentPublication": { "id": "proceedings/icsgea/2021/3263/0", "title": "2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyQ7G5V", "title": "2018 Fifth International Conference on eDemocracy & eGovernment (ICEDEG)", "acronym": "icedeg", "groupId": "1803698", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNrJROZ8", "doi": "10.1109/ICEDEG.2018.8372318", "title": "Solar Energy Potential in Ecuador", "normalizedTitle": "Solar Energy Potential in Ecuador", "abstract": "Better knowledge of solar energy potential helps to further exploit this renewable resource. Our study consisted the estimation of the solar energy potential incident in Ecuador applying the mathematical model of Angstrom, using information available from 27 meteorological stations in the period of 2004 to 2014. The data obtained from the stations recorded heliofany, of which the analysis has been performed in two ways, being by region and by altitude. As the average value of the estimated solar energy potential for the 2004–2014 series has been 4,378 (kW – h/m2 day). The highest solar radiation estimated in the country occurred in the Highland region, due to its Altitude. There, the solar rays that incur in the surface are less distorted by ozone, cloudiness or other atmospheric gases, allowing the total solar radiation to be higher.", "abstracts": [ { "abstractType": "Regular", "content": "Better knowledge of solar energy potential helps to further exploit this renewable resource. Our study consisted the estimation of the solar energy potential incident in Ecuador applying the mathematical model of Angstrom, using information available from 27 meteorological stations in the period of 2004 to 2014. The data obtained from the stations recorded heliofany, of which the analysis has been performed in two ways, being by region and by altitude. As the average value of the estimated solar energy potential for the 2004–2014 series has been 4,378 (kW – h/m2 day). The highest solar radiation estimated in the country occurred in the Highland region, due to its Altitude. There, the solar rays that incur in the surface are less distorted by ozone, cloudiness or other atmospheric gases, allowing the total solar radiation to be higher.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Better knowledge of solar energy potential helps to further exploit this renewable resource. Our study consisted the estimation of the solar energy potential incident in Ecuador applying the mathematical model of Angstrom, using information available from 27 meteorological stations in the period of 2004 to 2014. The data obtained from the stations recorded heliofany, of which the analysis has been performed in two ways, being by region and by altitude. As the average value of the estimated solar energy potential for the 2004–2014 series has been 4,378 (kW – h/m2 day). The highest solar radiation estimated in the country occurred in the Highland region, due to its Altitude. There, the solar rays that incur in the surface are less distorted by ozone, cloudiness or other atmospheric gases, allowing the total solar radiation to be higher.", "fno": "08372318", "keywords": [ "Solar Radiation", "Mathematical Model", "Solar Energy", "Sun", "Meteorology", "Estimation", "Brightness", "Solar Rays", "Heliofany", "Angstrom", "Equatorial Line" ], "authors": [ { "affiliation": "Universidad de las Fuerzas Armadas, ESPE, Sangolquí,Ecuador", "fullName": "Richard Caleb Echegaray-Aveiga", "givenName": "Richard Caleb", "surname": "Echegaray-Aveiga", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de las Fuerzas Armadas, ESPE, Sangolquí,Ecuador", "fullName": "Marco Masabanda", "givenName": "Marco", "surname": "Masabanda", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de las Fuerzas Armadas, ESPE, Sangolquí,Ecuador", "fullName": "Fabián Rodríguez", "givenName": "Fabián", "surname": "Rodríguez", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de las Fuerzas Armadas, ESPE, Sangolquí,Ecuador", "fullName": "Theofilos Toulkeridis", "givenName": "Theofilos", "surname": "Toulkeridis", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidad de las Fuerzas Armadas, ESPE, Sangolquí,Ecuador", "fullName": "Fernando Mato", "givenName": "Fernando", "surname": "Mato", "__typename": "ArticleAuthorType" } ], "idPrefix": "icedeg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-04-01T00:00:00", "pubType": "proceedings", "pages": "46-51", "year": "2018", "issn": "2573-1998", "isbn": "978-1-5386-2521-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08372313", "articleId": "12OmNAQJzVb", "__typename": "AdjacentArticleType" }, "next": { "fno": "08372309", "articleId": "12OmNx9WSYh", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cdciem/2011/4350/0/4350b900", "title": "The Solar Collector Calculation in Integrative Solar Architecture", "doi": null, "abstractUrl": "/proceedings-article/cdciem/2011/4350b900/12OmNAlNiHy", "parentPublication": { "id": "proceedings/cdciem/2011/4350/0", "title": "Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2011/4353/2/05750860", "title": "Solar Radiation Resources Applications in Agriculture Based on GIS in Ningxia YanChi", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750860/12OmNBCZnTi", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2011/688/0/05954619", "title": "The Calculation and Distribution of Total Radiation in Jiangsu Province", "doi": null, "abstractUrl": "/proceedings-article/icic/2011/05954619/12OmNCfjezp", "parentPublication": { "id": "proceedings/icic/2011/688/0", "title": "2011 Fourth International Conference on Information and Computing (ICIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloudcom/2016/1445/0/07830688", "title": "Towards a Cloud Based Decision Support System for Solar Map Generation", "doi": null, "abstractUrl": "/proceedings-article/cloudcom/2016/07830688/12OmNCgJeay", "parentPublication": { "id": "proceedings/cloudcom/2016/1445/0", "title": "2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1988/8923/0/00074149", "title": "Global change: the solar influence", "doi": null, "abstractUrl": "/proceedings-article/sc/1988/00074149/12OmNvT2oMS", "parentPublication": { "id": "proceedings/sc/1988/8923/0", "title": "Proceedings of the 1988 ACM/IEEE conference on Supercomputing vol. 2", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2013/5033/0/06686402", "title": "Design Aspects of Solar Thermal Power Generation in an Educational Institute", "doi": null, "abstractUrl": "/proceedings-article/icacc/2013/06686402/12OmNvTk06T", "parentPublication": { "id": "proceedings/icacc/2013/5033/0", "title": "2013 Third International Conference on Advances in Computing and Communications (ICACC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gtsd/2016/3638/0/3638a049", "title": "A low consuming power solar heat collection tracker for solar thermal applications", "doi": null, "abstractUrl": "/proceedings-article/gtsd/2016/3638a049/12OmNvwkumX", "parentPublication": { "id": "proceedings/gtsd/2016/3638/0", "title": "2016 3rd International Conference on Green Technology and Sustainable Development (GTSD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2014/5172/0/06897230", "title": "Solar radiation modelling for the estimation of the solar energy generation", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897230/12OmNx7ouTQ", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdma/2013/5016/0/5016a329", "title": "Calculating the Optimum Tilt Angle for Parabolic Solar Trough Concentrator with&#x00A0;&#x00A0;the North-South Tilt Tracking Mode", "doi": null, "abstractUrl": "/proceedings-article/icdma/2013/5016a329/12OmNyUnEA5", "parentPublication": { "id": "proceedings/icdma/2013/5016/0", "title": "2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0/08726487", "title": "SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata/2018/08726487/1axfao5AgeI", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata/2018/7975/0", "title": "2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxFJXGd", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "acronym": "icme", "groupId": "1000477", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvonIH9", "doi": "10.1109/ICME.2017.8019484", "title": "Room segmentation in 3D point clouds using anisotropic potential fields", "normalizedTitle": "Room segmentation in 3D point clouds using anisotropic potential fields", "abstract": "Emerging applications, such as indoor navigation or facility management, present new requirements of automatic and robust partitioning of indoor 3D point clouds into rooms. Previous research is either based on the Manhattan-world assumption or relies on the availability of the scanner pose information. We address these limitations by following the architectural definition of a room, where the room is an inner free space separated from other spaces through openings or partitions. For this we formulate an anisotropic potential field for 3D environments and illustrate how it can be used for room segmentation in the proposed segmentation pipeline. The experimental results confirm that our method outperforms state-of-the-art methods on a number of datasets including those that violate the Manhattan-world assumption.", "abstracts": [ { "abstractType": "Regular", "content": "Emerging applications, such as indoor navigation or facility management, present new requirements of automatic and robust partitioning of indoor 3D point clouds into rooms. Previous research is either based on the Manhattan-world assumption or relies on the availability of the scanner pose information. We address these limitations by following the architectural definition of a room, where the room is an inner free space separated from other spaces through openings or partitions. For this we formulate an anisotropic potential field for 3D environments and illustrate how it can be used for room segmentation in the proposed segmentation pipeline. The experimental results confirm that our method outperforms state-of-the-art methods on a number of datasets including those that violate the Manhattan-world assumption.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Emerging applications, such as indoor navigation or facility management, present new requirements of automatic and robust partitioning of indoor 3D point clouds into rooms. Previous research is either based on the Manhattan-world assumption or relies on the availability of the scanner pose information. We address these limitations by following the architectural definition of a room, where the room is an inner free space separated from other spaces through openings or partitions. For this we formulate an anisotropic potential field for 3D environments and illustrate how it can be used for room segmentation in the proposed segmentation pipeline. The experimental results confirm that our method outperforms state-of-the-art methods on a number of datasets including those that violate the Manhattan-world assumption.", "fno": "08019484", "keywords": [ "Three Dimensional Displays", "Buildings", "Clutter", "Robot Sensing Systems", "Two Dimensional Displays", "Indoor Environments", "Room Segmentation", "Indoor Reconstruction", "Point Cloud", "Unsupervised Clustering" ], "authors": [ { "affiliation": "Technical University of Munich, Munich, Germany", "fullName": "Dmytro Bobkov", "givenName": "Dmytro", "surname": "Bobkov", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Munich, Munich, Germany", "fullName": "Martin Kiechle", "givenName": "Martin", "surname": "Kiechle", "__typename": "ArticleAuthorType" }, { "affiliation": "NavVis GmbH, Munich, Germany", "fullName": "Sebastian Hilsenbeck", "givenName": "Sebastian", "surname": "Hilsenbeck", "__typename": "ArticleAuthorType" }, { "affiliation": "Technical University of Munich, Munich, Germany", "fullName": "Eckehard Steinbach", "givenName": "Eckehard", "surname": "Steinbach", "__typename": "ArticleAuthorType" } ], "idPrefix": "icme", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "727-732", "year": "2017", "issn": "1945-788X", "isbn": "978-1-5090-6067-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08019483", "articleId": "12OmNz6iOse", "__typename": "AdjacentArticleType" }, "next": { "fno": "08019485", "articleId": "12OmNwqfsY3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2016/0641/0/07477631", "title": "Omnidirectional image capture on mobile devices for fast automatic generation of 2.5D indoor maps", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477631/12OmNqN6QXW", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2015/9711/0/5720a418", "title": "Improving Indoor Mobility of the Visually Impaired with Depth-Based Spatial Sound", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2015/5720a418/12OmNxRWIdk", "parentPublication": { "id": "proceedings/iccvw/2015/9711/0", "title": "2015 IEEE International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851b525", "title": "Three-Dimensional Object Detection and Layout Prediction Using Clouds of Oriented Gradients", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851b525/12OmNxecS8h", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2014/7000/2/7000b103", "title": "Interactive Mapping of Indoor Building Structures through Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/3dv/2014/7000b103/12OmNyGtjhU", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000c051", "title": "LayoutNet: Reconstructing the 3D Room Layout from a Single RGB Image", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000c051/17D45W9KVIS", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2022/0915/0/091500a235", "title": "Learning to Reconstruct 3D Non-Cuboid Room Layout from a Single RGB Image", "doi": null, "abstractUrl": "/proceedings-article/wacv/2022/091500a235/1B13jeDLlG8", "parentPublication": { "id": "proceedings/wacv/2022/0915/0", "title": "2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900f188", "title": "3D Room Layout Recovery Generalizing across Manhattan and Non-Manhattan Worlds", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900f188/1G565Rf5zFu", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a875", "title": "Robust Planar Optimization for General 3D Room Layout Estimation", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a875/1J7W8qbNT56", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/10/08737746", "title": "Clouds of Oriented Gradients for 3D Detection of Objects, Surfaces, and Indoor Scene Layouts", "doi": null, "abstractUrl": "/journal/tp/2020/10/08737746/1mP22G2vmOA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900c133", "title": "Zillow Indoor Dataset: Annotated Floor Plans With 360&#x00B0; Panoramas and 3D Room Layouts", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900c133/1yeKk438NjO", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzWfp8t", "title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)", "acronym": "iciev-iscmht", "groupId": "1802578", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwMFMg7", "doi": "10.1109/ICIEV.2017.8338559", "title": "Monitoring daily variations of atmospheric electric fields using data mining methods", "normalizedTitle": "Monitoring daily variations of atmospheric electric fields using data mining methods", "abstract": "The atmospheric electric field potential gradient is studied during snowfall, and the intensity of snowflakes electrifying depending on weather conditions is estimated. Applying modern data mining methods and high-mountain monitoring, where the anthropogenic factors on the electric field variations is insignificant, enables the identification of the influence of snowfall and snowstorms on the electric field's daily variations. Numerical data of the electrification process in the atmosphere are obtained, and relationships between electric field values and snowfall intensity, wind speed and temperature are demonstrated. Modern neural network techniques for data mining are applied in this context.", "abstracts": [ { "abstractType": "Regular", "content": "The atmospheric electric field potential gradient is studied during snowfall, and the intensity of snowflakes electrifying depending on weather conditions is estimated. Applying modern data mining methods and high-mountain monitoring, where the anthropogenic factors on the electric field variations is insignificant, enables the identification of the influence of snowfall and snowstorms on the electric field's daily variations. Numerical data of the electrification process in the atmosphere are obtained, and relationships between electric field values and snowfall intensity, wind speed and temperature are demonstrated. Modern neural network techniques for data mining are applied in this context.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The atmospheric electric field potential gradient is studied during snowfall, and the intensity of snowflakes electrifying depending on weather conditions is estimated. Applying modern data mining methods and high-mountain monitoring, where the anthropogenic factors on the electric field variations is insignificant, enables the identification of the influence of snowfall and snowstorms on the electric field's daily variations. Numerical data of the electrification process in the atmosphere are obtained, and relationships between electric field values and snowfall intensity, wind speed and temperature are demonstrated. Modern neural network techniques for data mining are applied in this context.", "fno": "08338559", "keywords": [ "Biological Neural Networks", "Neurons", "Atmospheric Measurements", "Meteorology", "Data Mining", "Electric Variables Measurement" ], "authors": [ { "affiliation": "High-Mountain Geophysical Institute, Nalchik, Russia", "fullName": "Anatoly Adzhiev", "givenName": "Anatoly", "surname": "Adzhiev", "__typename": "ArticleAuthorType" }, { "affiliation": "High-Mountain Geophysical Institute, Nalchik, Russia", "fullName": "Lianna Malkandueva", "givenName": "Lianna", "surname": "Malkandueva", "__typename": "ArticleAuthorType" }, { "affiliation": "High-Mountain Geophysical Institute, Nalchik, Russia", "fullName": "Anton Boldyrev", "givenName": "Anton", "surname": "Boldyrev", "__typename": "ArticleAuthorType" }, { "affiliation": "Scientific Research Institute of Multiprocessor Computer Systems, Southern Federal University, Taganrog, Russia", "fullName": "Dmitry Bespalov", "givenName": "Dmitry", "surname": "Bespalov", "__typename": "ArticleAuthorType" }, { "affiliation": "Scientific Research Institute of Multiprocessor Computer Systems, Southern Federal University, Taganrog, Russia", "fullName": "Iakov Korovin", "givenName": "Iakov", "surname": "Korovin", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Loughborough University, Loughborough, U.K.", "fullName": "Gerald Schaefer", "givenName": "Gerald", "surname": "Schaefer", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciev-iscmht", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-09-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2017", "issn": null, "isbn": "978-1-5386-1023-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08338558", "articleId": "12OmNyNzhuI", "__typename": "AdjacentArticleType" }, "next": { "fno": "08338560", "articleId": "12OmNz61dFk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mmbia/2012/0354/0/06164751", "title": "Non-rigid image registration using electric current flow", "doi": null, "abstractUrl": "/proceedings-article/mmbia/2012/06164751/12OmNB9bvkU", "parentPublication": { "id": "proceedings/mmbia/2012/0354/0", "title": "2012 IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760183", "title": "Investigating the influence of thunderstorms on atmospheric electric field potential gradient variations", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760183/12OmNBp52sF", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icece/2010/4031/0/4031d343", "title": "Analysis of the Line-Frequency Electric Field Intensity around EHV Transmission", "doi": null, "abstractUrl": "/proceedings-article/icece/2010/4031d343/12OmNvAiSi5", "parentPublication": { "id": "proceedings/icece/2010/4031/0", "title": "Electrical and Control Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdl/2002/7350/0/01022749", "title": "Nonuniform electric field vector distribution in a dielectric liquid using optical measurement system with parallel processing", "doi": null, "abstractUrl": "/proceedings-article/icdl/2002/01022749/12OmNwtn3BC", "parentPublication": { "id": "proceedings/icdl/2002/7350/0", "title": "Proceedings of 14th International Conference on Dielectric Liquids", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imccc/2016/1195/0/07774747", "title": "Composite Capacitive Electric Field Analysis of UHV DC Bushing", "doi": null, "abstractUrl": "/proceedings-article/imccc/2016/07774747/12OmNwxlrcr", "parentPublication": { "id": "proceedings/imccc/2016/1195/0", "title": "2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/delta/2004/2081/0/01409848", "title": "SOC-B design and testing technique of IS-95C CDMA transmitter for measurement of electric field intensity using FPGA and ASIC", "doi": null, "abstractUrl": "/proceedings-article/delta/2004/01409848/12OmNzVoBH7", "parentPublication": { "id": "proceedings/delta/2004/2081/0", "title": "Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccpqt/2022/7020/0/702000a219", "title": "False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning", "doi": null, "abstractUrl": "/proceedings-article/ccpqt/2022/702000a219/1Iiu7lGDscw", "parentPublication": { "id": "proceedings/ccpqt/2022/7020/0", "title": "2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2019/2632/0/263200a474", "title": "Uncertainty Evaluation and Calibrationof Electric Field Probe Under GTEM Cell", "doi": null, "abstractUrl": "/proceedings-article/icris/2019/263200a474/1cI6poWfsd2", "parentPublication": { "id": "proceedings/icris/2019/2632/0", "title": "2019 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ifeea/2020/9627/0/962700a227", "title": "Verification and Improvement of Electric Coupler Plugging in Spacecraft", "doi": null, "abstractUrl": "/proceedings-article/ifeea/2020/962700a227/1rvCBIwIHwQ", "parentPublication": { "id": "proceedings/ifeea/2020/9627/0", "title": "2020 7th International Forum on Electrical Engineering and Automation (IFEEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2021/3892/0/389200a414", "title": "External Acceleration Noise Control of Electric Vehicles Based on Sound Intensity Measurement Method", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2021/389200a414/1t2nnNP3Nx6", "parentPublication": { "id": "proceedings/icmtma/2021/3892/0", "title": "2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxdVh2r", "title": "2017 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNy6HQVS", "doi": "10.1109/PACIFICVIS.2017.8031584", "title": "Exploring the evolution of pressure-perturbations to understand atmospheric phenomena", "normalizedTitle": "Exploring the evolution of pressure-perturbations to understand atmospheric phenomena", "abstract": "Atmospheric sciences is the study of physical and chemical phenomena occurring within the Earth's atmosphere. The study entails understanding the state of the Earth's atmosphere, how it is changing over time and why. Understanding how various weather events develop and evolve is often conducted through retrospective analysis of past atmospheric events. Atmospheric scientists can then utilize tools to better predict potential hazards and provide earlier warnings for events that may impact life and property. Several atmospheric state variables can be measured to identify high-impact events, one of which is surface atmospheric pressure. Many weather events are characterized by variations in surface pressure from the mean pressure value (i.e., pressure-perturbations). Accordingly, there is significant interest in extracting and tracking pressure-perturbations both spatially and temporally to better understand the evolution of weather events. Here, we present a visualization and analysis environment that allows interactive exploration of pressure-perturbation data sets. Our system, for the first time, enables atmospheric scientists to interactively explore the spatiotemporal behaviors of pressure-perturbations for a range of values and provides support to leverage other conventional data sets such as radar imagery and wind observations. It also allows atmospheric scientists to evaluate model and parameter sensitivity, which is difficult if not impossible with conventional visualization tools in atmospheric sciences. Finally, we demonstrate the utility of our approach for retrospective analysis using different case studies of recorded severe weather events.", "abstracts": [ { "abstractType": "Regular", "content": "Atmospheric sciences is the study of physical and chemical phenomena occurring within the Earth's atmosphere. The study entails understanding the state of the Earth's atmosphere, how it is changing over time and why. Understanding how various weather events develop and evolve is often conducted through retrospective analysis of past atmospheric events. Atmospheric scientists can then utilize tools to better predict potential hazards and provide earlier warnings for events that may impact life and property. Several atmospheric state variables can be measured to identify high-impact events, one of which is surface atmospheric pressure. Many weather events are characterized by variations in surface pressure from the mean pressure value (i.e., pressure-perturbations). Accordingly, there is significant interest in extracting and tracking pressure-perturbations both spatially and temporally to better understand the evolution of weather events. Here, we present a visualization and analysis environment that allows interactive exploration of pressure-perturbation data sets. Our system, for the first time, enables atmospheric scientists to interactively explore the spatiotemporal behaviors of pressure-perturbations for a range of values and provides support to leverage other conventional data sets such as radar imagery and wind observations. It also allows atmospheric scientists to evaluate model and parameter sensitivity, which is difficult if not impossible with conventional visualization tools in atmospheric sciences. Finally, we demonstrate the utility of our approach for retrospective analysis using different case studies of recorded severe weather events.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Atmospheric sciences is the study of physical and chemical phenomena occurring within the Earth's atmosphere. The study entails understanding the state of the Earth's atmosphere, how it is changing over time and why. Understanding how various weather events develop and evolve is often conducted through retrospective analysis of past atmospheric events. Atmospheric scientists can then utilize tools to better predict potential hazards and provide earlier warnings for events that may impact life and property. Several atmospheric state variables can be measured to identify high-impact events, one of which is surface atmospheric pressure. Many weather events are characterized by variations in surface pressure from the mean pressure value (i.e., pressure-perturbations). Accordingly, there is significant interest in extracting and tracking pressure-perturbations both spatially and temporally to better understand the evolution of weather events. Here, we present a visualization and analysis environment that allows interactive exploration of pressure-perturbation data sets. Our system, for the first time, enables atmospheric scientists to interactively explore the spatiotemporal behaviors of pressure-perturbations for a range of values and provides support to leverage other conventional data sets such as radar imagery and wind observations. It also allows atmospheric scientists to evaluate model and parameter sensitivity, which is difficult if not impossible with conventional visualization tools in atmospheric sciences. Finally, we demonstrate the utility of our approach for retrospective analysis using different case studies of recorded severe weather events.", "fno": "08031584", "keywords": [ "Feature Extraction", "Data Visualization", "Radar Tracking", "Correlation", "Meteorology", "Atmospheric Measurements", "Atmospheric Modeling", "E 1 Data Structures Graphs And Networks", "J 2 Physical Sciences And Engineering Earth And Atmospheric Sciences" ], "authors": [ { "affiliation": "SCI Institute, University of Utah, United States of America", "fullName": "Wathsala Widanagamaachchi", "givenName": "Wathsala", "surname": "Widanagamaachchi", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Atmospheric Sciences, University of Utah, United States of America", "fullName": "Alexander Jacques", "givenName": "Alexander", "surname": "Jacques", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah, United States of America", "fullName": "Bei Wang", "givenName": null, "surname": "Bei Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Atmospheric Sciences, University of Utah, United States of America", "fullName": "Erik Crosman", "givenName": "Erik", "surname": "Crosman", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah, United States of America", "fullName": "Peer-Timo Bremer", "givenName": "Peer-Timo", "surname": "Bremer", "__typename": "ArticleAuthorType" }, { "affiliation": "SCI Institute, University of Utah, United States of America", "fullName": "Valerio Pascucci", "givenName": "Valerio", "surname": "Pascucci", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Atmospheric Sciences, University of Utah, United States of America", "fullName": "John Horel", "givenName": "John", "surname": "Horel", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "101-110", "year": "2017", "issn": "2165-8773", "isbn": "978-1-5090-5738-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08031583", "articleId": "12OmNC8dgnl", "__typename": "AdjacentArticleType" }, "next": { "fno": "08031585", "articleId": "12OmNBkxssJ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hpcmp-ugc/2010/986/0/06017989", "title": "Atmospheric Turbulence Forecasts for Air Force and Missile Defense Applications", "doi": null, "abstractUrl": "/proceedings-article/hpcmp-ugc/2010/06017989/12OmNASrb02", "parentPublication": { "id": "proceedings/hpcmp-ugc/2010/986/0", "title": "2010 DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2010/3967/0/3967a451", "title": "Grid Computing Environment to Characterize Atmospheric Profiles", "doi": null, "abstractUrl": "/proceedings-article/cisis/2010/3967a451/12OmNqOwQCf", "parentPublication": { "id": "proceedings/cisis/2010/3967/0", "title": "2010 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-iscmht/2017/1023/0/08338559", "title": "Monitoring daily variations of atmospheric electric fields using data mining methods", "doi": null, "abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338559/12OmNwMFMg7", "parentPublication": { "id": "proceedings/iciev-iscmht/2017/1023/0", "title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/esiat/2009/3682/1/3682a653", "title": "Developments of GNSS Radio Occultation for Sounding Atmosphere", "doi": null, "abstractUrl": "/proceedings-article/esiat/2009/3682a653/12OmNx5GU2d", "parentPublication": { "id": "proceedings/esiat/2009/3682/1", "title": "Environmental Science and Information Application Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc/2017/3790/0/379001b379", "title": "Estimating Gradient Direction of Atmospheric Pressure Using Pressure Sensor Array", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc/2017/379001b379/17D45WaTki8", "parentPublication": { "id": "proceedings/ispa-iucc/2017/3790/0", "title": "2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2018/9156/0/915600a283", "title": "A Web Service Architecture for Objective Station Classification Purposes", "doi": null, "abstractUrl": "/proceedings-article/e-science/2018/915600a283/17D45Wc1IIe", "parentPublication": { "id": "proceedings/e-science/2018/9156/0", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2018/0169/0/016900a481", "title": "Study on Standardization of Detection Data of Atmospheric Microparticle Lidar Based on Metadata", "doi": null, "abstractUrl": "/proceedings-article/cis/2018/016900a481/17D45WgziN8", "parentPublication": { "id": "proceedings/cis/2018/0169/0", "title": "2018 14th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800a512", "title": "Design of Portable Barometric Altimeter System Based on SCP1000-D01", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800a512/1ByeGDhUlYQ", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020656", "title": "Toward High-Resolution Regional Atmospheric Reanalysis for Japan: An Overview of the ClimCORE Project", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020656/1KfSt6Nrn3O", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2021/1893/0/09516859", "title": "Weather Map Prediction Using RGB Metaphorical Feature Extraction for Atmospheric Pressure Patterns", "doi": null, "abstractUrl": "/proceedings-article/icis/2021/09516859/1wiRAP7qmoo", "parentPublication": { "id": "proceedings/icis/2021/1893/0", "title": "2021 IEEE/ACIS 19th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiru", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "acronym": "cvprw", "groupId": "1001809", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WrVg5c", "doi": "10.1109/CVPRW.2018.00142", "title": "Scene Understanding Networks for Autonomous Driving Based on Around View Monitoring System", "normalizedTitle": "Scene Understanding Networks for Autonomous Driving Based on Around View Monitoring System", "abstract": "Modern driver assistance systems rely on a wide range of sensors (RADAR, LIDAR, ultrasound and cameras) for scene understanding and prediction. These sensors are typically used for detecting traffic participants and scene elements required for navigation. In this paper we argue that relying on camera based systems, specifically Around View Monitoring (AVM) system has great potential to achieve these goals in both parking and driving modes with decreased costs. The contributions of this paper are as follows: we present a new end-to-end solution for delimiting the safe drivable area for each frame by means of identifying the closest obstacle in each direction from the driving vehicle, we use this approach to calculate the distance to the nearest obstacles and we incorporate it into a unified end-to-end architecture capable of joint object detection, curb detection and safe drivable area detection. Furthermore, we describe the family of networks for both a high accuracy solution and a low complexity solution. We also introduce further augmentation of the base architecture with 3D object detection.", "abstracts": [ { "abstractType": "Regular", "content": "Modern driver assistance systems rely on a wide range of sensors (RADAR, LIDAR, ultrasound and cameras) for scene understanding and prediction. These sensors are typically used for detecting traffic participants and scene elements required for navigation. In this paper we argue that relying on camera based systems, specifically Around View Monitoring (AVM) system has great potential to achieve these goals in both parking and driving modes with decreased costs. The contributions of this paper are as follows: we present a new end-to-end solution for delimiting the safe drivable area for each frame by means of identifying the closest obstacle in each direction from the driving vehicle, we use this approach to calculate the distance to the nearest obstacles and we incorporate it into a unified end-to-end architecture capable of joint object detection, curb detection and safe drivable area detection. Furthermore, we describe the family of networks for both a high accuracy solution and a low complexity solution. We also introduce further augmentation of the base architecture with 3D object detection.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Modern driver assistance systems rely on a wide range of sensors (RADAR, LIDAR, ultrasound and cameras) for scene understanding and prediction. These sensors are typically used for detecting traffic participants and scene elements required for navigation. In this paper we argue that relying on camera based systems, specifically Around View Monitoring (AVM) system has great potential to achieve these goals in both parking and driving modes with decreased costs. The contributions of this paper are as follows: we present a new end-to-end solution for delimiting the safe drivable area for each frame by means of identifying the closest obstacle in each direction from the driving vehicle, we use this approach to calculate the distance to the nearest obstacles and we incorporate it into a unified end-to-end architecture capable of joint object detection, curb detection and safe drivable area detection. Furthermore, we describe the family of networks for both a high accuracy solution and a low complexity solution. We also introduce further augmentation of the base architecture with 3D object detection.", "fno": "610000b074", "keywords": [ "Object Detection", "Road Safety", "Road Vehicles", "Traffic Engineering Computing", "Scene Understanding Networks", "Autonomous Driving", "RADAR", "LIDAR", "Ultrasound Cameras", "Traffic Participants", "Scene Elements", "Camera Based Systems", "Driving Modes", "Closest Obstacle", "Driving Vehicle", "Joint Object Detection", "Curb Detection", "Safe Drivable Area Detection", "3 D Object Detection", "Driving Mode", "Parking Mode", "AVM System", "Driver Assistance Systems", "Around View Monitoring System", "Object Detection", "Computer Architecture", "Three Dimensional Displays", "Cameras", "Task Analysis", "Complexity Theory", "Two Dimensional Displays" ], "authors": [ { "affiliation": null, "fullName": "JeongYeol Baek", "givenName": "JeongYeol", "surname": "Baek", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ioana Veronica Chelu", "givenName": "Ioana Veronica", "surname": "Chelu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Livia Iordache", "givenName": "Livia", "surname": "Iordache", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vlad Paunescu", "givenName": "Vlad", "surname": "Paunescu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "HyunJoo Ryu", "givenName": "HyunJoo", "surname": "Ryu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alexandru Ghiuta", "givenName": "Alexandru", "surname": "Ghiuta", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrei Petreanu", "givenName": "Andrei", "surname": "Petreanu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "YunSung Soh", "givenName": "YunSung", "surname": "Soh", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Andrei Leica", "givenName": "Andrei", "surname": "Leica", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "ByeongMoon Jeon", "givenName": "ByeongMoon", "surname": "Jeon", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvprw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-06-01T00:00:00", "pubType": "proceedings", "pages": "1074-10747", "year": "2018", "issn": null, "isbn": "978-1-5386-6100-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "610000b067", "articleId": "17D45VTRonK", "__typename": "AdjacentArticleType" }, "next": { "fno": "610000b082", "articleId": "17D45WUj90D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wacv/2015/6683/0/6683a231", "title": "Vision-Based Offline-Online Perception Paradigm for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/wacv/2015/6683a231/12OmNwIpNod", "parentPublication": { "id": "proceedings/wacv/2015/6683/0", "title": "2015 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2018/6100/0/610000b067", "title": "The ApolloScape Dataset for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2018/610000b067/17D45VTRonK", "parentPublication": { "id": "proceedings/cvprw/2018/6100/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2019/1198/0/119800a163", "title": "Efficient Multi-person Hierarchical 3D Pose Estimation for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/mipr/2019/119800a163/19wB22E8lb2", "parentPublication": { "id": "proceedings/mipr/2019/1198/0", "title": "2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671392", "title": "Drivable Area Detection Using Deep Learning Models for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671392/1A8iXikehqw", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200k0468", "title": "Exploring Simple 3D Multi-Object Tracking for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200k0468/1BmEtXCZ02I", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5784", "title": "MGNet: Monocular Geometric Scene Understanding for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5784/1BmH4JULI9W", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300g850", "title": "Accurate Monocular 3D Object Detection via Color-Embedded 3D Reconstruction for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300g850/1hVlp6O3s6k", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800n3012", "title": "IDA-3D: Instance-Depth-Aware 3D Object Detection From Stereo Vision for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800n3012/1m3o8mse49O", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800c443", "title": "Scalability in Perception for Autonomous Driving: Waymo Open Dataset", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800c443/1m3ofPIr8Q0", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900h073", "title": "Multi-Modal Fusion Transformer for End-to-End Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900h073/1yeJa4WXSAE", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1DNCoflPzUc", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1DNDboKLEnC", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00338", "title": "Analysis of a Severe Convective Weather Process Based on Potential Vorticity Theory on 13 June 2018", "normalizedTitle": "Analysis of a Severe Convective Weather Process Based on Potential Vorticity Theory on 13 June 2018", "abstract": "An extreme severe convective weather process occurred in Qingdao urban district on 13 June 2018, accompanied by lightning, strong wind, short-term heavy rainfall, hail and tornado. The reanalysis data of ERA5 were used to analyze the weather process by using the method of potential vorticity and moist potential vorticity. The analysis revealed that the process was caused by the combined acting from the two systems of surface low pressure and upper-level cold vortex, resulting in the occurrence of local severe convective weather. The development mechanism was that, first, the upper-level dynamic tropopause collapsed, and the dry and cold air layer invaded downward from the upper, resulting in the strong baroclinic instability in the middle and high level; second, the large positive potential vorticity reached the middle troposphere and triggered the cyclonic circulation in the middle troposphere. In addition, it was more accurate for both the timing and the wetted regions by using the moist potential vorticity to characterize the stratification instability region. The formation and evolution of the positive center of MPV2 component were about 2&#x007E;3 hours ahead of the development of severe convective weather.", "abstracts": [ { "abstractType": "Regular", "content": "An extreme severe convective weather process occurred in Qingdao urban district on 13 June 2018, accompanied by lightning, strong wind, short-term heavy rainfall, hail and tornado. The reanalysis data of ERA5 were used to analyze the weather process by using the method of potential vorticity and moist potential vorticity. The analysis revealed that the process was caused by the combined acting from the two systems of surface low pressure and upper-level cold vortex, resulting in the occurrence of local severe convective weather. The development mechanism was that, first, the upper-level dynamic tropopause collapsed, and the dry and cold air layer invaded downward from the upper, resulting in the strong baroclinic instability in the middle and high level; second, the large positive potential vorticity reached the middle troposphere and triggered the cyclonic circulation in the middle troposphere. In addition, it was more accurate for both the timing and the wetted regions by using the moist potential vorticity to characterize the stratification instability region. The formation and evolution of the positive center of MPV2 component were about 2&#x007E;3 hours ahead of the development of severe convective weather.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An extreme severe convective weather process occurred in Qingdao urban district on 13 June 2018, accompanied by lightning, strong wind, short-term heavy rainfall, hail and tornado. The reanalysis data of ERA5 were used to analyze the weather process by using the method of potential vorticity and moist potential vorticity. The analysis revealed that the process was caused by the combined acting from the two systems of surface low pressure and upper-level cold vortex, resulting in the occurrence of local severe convective weather. The development mechanism was that, first, the upper-level dynamic tropopause collapsed, and the dry and cold air layer invaded downward from the upper, resulting in the strong baroclinic instability in the middle and high level; second, the large positive potential vorticity reached the middle troposphere and triggered the cyclonic circulation in the middle troposphere. In addition, it was more accurate for both the timing and the wetted regions by using the moist potential vorticity to characterize the stratification instability region. The formation and evolution of the positive center of MPV2 component were about 2~3 hours ahead of the development of severe convective weather.", "fno": "945700c258", "keywords": [ "Atmospheric Humidity", "Atmospheric Movements", "Atmospheric Temperature", "Convection", "Rain", "Storms", "Troposphere", "Vortices", "Weather Forecasting", "Wind", "Upper Level Dynamic Tropopause", "Dry Air Layer", "Cold Air Layer", "Strong Baroclinic Instability", "Positive Potential Vorticity", "Moist Potential Vorticity", "Potential Vorticity Theory", "13 June 2018", "Extreme Severe Convective Weather Process", "Qingdao Urban District", "Strong Wind", "Short Term Heavy Rainfall", "Hail", "Tornado", "Reanalysis Data", "ERA 5", "Local Severe Convective Weather", "Time 2 0 Hour To 3 0 Hour", "Wind", "Terrestrial Atmosphere", "Water Heating", "Lightning", "Tornadoes", "Timing", "Surface Treatment", "Severe Convective Weather", "Development Mechanism", "Potential Vorticity", "Moist Potential Vorticity" ], "authors": [ { "affiliation": "Qingdao Engineering Technology Research Center for Meteorological Disaster Prevention, Qingdao Meteorology Bureau,Qingdao,China", "fullName": "Huaji Pang", "givenName": "Huaji", "surname": "Pang", "__typename": "ArticleAuthorType" }, { "affiliation": "Qingdao Engineering Technology Research Center for Meteorological Disaster Prevention, Qingdao Meteorology Bureau,Qingdao,China", "fullName": "Han Yao", "givenName": "Han", "surname": "Yao", "__typename": "ArticleAuthorType" }, { "affiliation": "Qingdao Engineering Technology Research Center for Meteorological Disaster Prevention, Qingdao Meteorology Bureau,Qingdao,China", "fullName": "Feiyan Guo", "givenName": "Feiyan", "surname": "Guo", "__typename": "ArticleAuthorType" }, { "affiliation": "Qingdao Engineering Technology Research Center for Meteorological Disaster Prevention, Qingdao Meteorology Bureau,Qingdao,China", "fullName": "Fujing Wan", "givenName": "Fujing", "surname": "Wan", "__typename": "ArticleAuthorType" }, { "affiliation": "Public Meteorological Service Center, China Meteorological Administration,Beijing,China", "fullName": "Shudong Wang", "givenName": "Shudong", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Public Meteorological Service Center, China Meteorological Administration,Beijing,China", "fullName": "Guoping Zhang", "givenName": "Guoping", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "2258-2263", "year": "2021", "issn": null, "isbn": "978-1-6654-9457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "945700c253", "articleId": "1DNCVSpLwsw", "__typename": "AdjacentArticleType" }, "next": { "fno": "945700c264", "articleId": "1DNE3EnpOZa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccms/2010/3941/1/3941a243", "title": "Simulation and Comparison of Two Kinds of Severe Convective Weather Processes", "doi": null, "abstractUrl": "/proceedings-article/iccms/2010/3941a243/12OmNAYXWG5", "parentPublication": { "id": "proceedings/iccms/2010/3941/3", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcmpugc/2006/2797/0/04134069", "title": "Characterization of Stratospheric Clear Air Turbulence for Air Force Platforms", "doi": null, "abstractUrl": "/proceedings-article/hpcmpugc/2006/04134069/12OmNy4r3N4", "parentPublication": { "id": "proceedings/hpcmpugc/2006/2797/0", "title": "2006 HPCMP Users Group Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/netcit/2021/0070/0/007000a012", "title": "Research on the short-range forecast and warning method of strong convective weather for flight test", "doi": null, "abstractUrl": "/proceedings-article/netcit/2021/007000a012/1BERYReaCcg", "parentPublication": { "id": "proceedings/netcit/2021/0070/0", "title": "2021 International Conference on Networking, Communications and Information Technology (NetCIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700c264", "title": "Supercell Storm and Extreme Wind in a Linear Mesoscale Convective System", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700c264/1DNE3EnpOZa", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700c222", "title": "Characteristics of 26 strong long-lived convective cells in Shandong", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700c222/1DNEdcXCePK", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ1aEpf4wo", "doi": "10.1109/VR.2019.8798224", "title": "Viscosity-based Vorticity Correction for Turbulent SPH Fluids", "normalizedTitle": "Viscosity-based Vorticity Correction for Turbulent SPH Fluids", "abstract": "A critical problem of Smooth Particle Hydrodynamics (SPH) methods is the numerical dissipation in viscosity computation. This leads to unrealistic results where high frequency details, like turbulence, are smoothed out. To address this issue, we introduce a viscosity-based vorticity correction scheme for SPH fluids, without complex time integration or limited time steps. In our method, the energy difference in viscosity computation is used to correct the vorticity field. Instead of solving Biot-Savart integrals, we adopt stream function, which is easier to solve and more efficient, to recover the velocity field from the vorticity difference. Our method can increase the existing vortex significantly and generate additional turbulence at potential position. Moreover, it is simple to implement and can be easily integrated with other SPH methods.", "abstracts": [ { "abstractType": "Regular", "content": "A critical problem of Smooth Particle Hydrodynamics (SPH) methods is the numerical dissipation in viscosity computation. This leads to unrealistic results where high frequency details, like turbulence, are smoothed out. To address this issue, we introduce a viscosity-based vorticity correction scheme for SPH fluids, without complex time integration or limited time steps. In our method, the energy difference in viscosity computation is used to correct the vorticity field. Instead of solving Biot-Savart integrals, we adopt stream function, which is easier to solve and more efficient, to recover the velocity field from the vorticity difference. Our method can increase the existing vortex significantly and generate additional turbulence at potential position. Moreover, it is simple to implement and can be easily integrated with other SPH methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A critical problem of Smooth Particle Hydrodynamics (SPH) methods is the numerical dissipation in viscosity computation. This leads to unrealistic results where high frequency details, like turbulence, are smoothed out. To address this issue, we introduce a viscosity-based vorticity correction scheme for SPH fluids, without complex time integration or limited time steps. In our method, the energy difference in viscosity computation is used to correct the vorticity field. Instead of solving Biot-Savart integrals, we adopt stream function, which is easier to solve and more efficient, to recover the velocity field from the vorticity difference. Our method can increase the existing vortex significantly and generate additional turbulence at potential position. Moreover, it is simple to implement and can be easily integrated with other SPH methods.", "fno": "08798224", "keywords": [ "Computational Fluid Dynamics", "External Flows", "Hydrodynamics", "Integral Equations", "Smoothed Particle Hydrodynamics", "Turbulence", "Viscosity", "Vortices", "Smooth Particle Hydrodynamics Methods", "Velocity Field", "Biot Savart Integrals", "Vorticity Field", "Energy Difference", "Viscosity Based Vorticity Correction Scheme", "Viscosity Computation", "Numerical Dissipation", "Turbulent SPH Fluids", "Conferences", "Virtual Reality", "Three Dimensional Displays", "User Interfaces", "Smooth Particle Hydrodynamics", "Turbulence", "Lagrangian Vortex Method", "Fluid Simulation", "I 3 7 Three Dimensional Graphics And Realism", "H 5 1 Multimedia Information Systems Artificial Augmented And Virtual Realities" ], "authors": [ { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Sinuo Liu", "givenName": "Sinuo", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Xiaokun Wang", "givenName": "Xiaokun", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Xiaojuan Ban", "givenName": "Xiaojuan", "surname": "Ban", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Yanrui Xu", "givenName": "Yanrui", "surname": "Xu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Jing Zhou", "givenName": "Jing", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer and Communication Engineering, University of Science and Technology Beijing", "fullName": "Yalan Zhang", "givenName": "Yalan", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1048-1049", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08797836", "articleId": "1cJ0U5VsKhq", "__typename": "AdjacentArticleType" }, "next": { "fno": "08797821", "articleId": "1cJ0QWVjZ5u", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cad-graphics/2013/2576/0/06815003", "title": "Synthesizing Solid-Induced Turbulence for Particle-Based Fluids", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815003/12OmNzlD9EF", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2014/4258/0/4258a065", "title": "SPH Fluids for Viscous Jet Buckling", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2014/4258a065/12OmNzn38LQ", "parentPublication": { "id": "proceedings/sibgrapi/2014/4258/0", "title": "2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/05/v1055", "title": "Visualization of Vorticity and Vortices in Wall-Bounded Turbulent Flows", "doi": null, "abstractUrl": "/journal/tg/2007/05/v1055/13rRUILLkvi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/03/07487018", "title": "Divergence-Free SPH for Incompressible and Viscous Fluids", "doi": null, "abstractUrl": "/journal/tg/2017/03/07487018/13rRUxASuhF", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/06/08353115", "title": "Turbulent Micropolar SPH Fluids with Foam", "doi": null, "abstractUrl": "/journal/tg/2019/06/08353115/13rRUxNW1Zu", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/12/07775068", "title": "Prescribed Velocity Gradients for Highly Viscous SPH Fluids with Vorticity Diffusion", "doi": null, "abstractUrl": "/journal/tg/2017/12/07775068/13rRUxjQyvt", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a393", "title": "Real-Time Viscoelastic Fluid Simulation and Solid Melting Process Based on AVR-SPH", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a393/1ap5BtapJ5u", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2018/7500/0/750000a128", "title": "Viscosity Variability Impact on 2D Laminar and Turbulent Poiseuille Velocity Profiles; Characteristic-Based Split (CBS) Stabilization", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2018/750000a128/1bXcRvtzuec", "parentPublication": { "id": "proceedings/mcsi/2018/7500/0", "title": "2018 5th International Conference on Mathematics and Computers in Sciences and Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090460", "title": "Robust turbulence simulation for particle-based fluids using the Rankine vortex model", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090460/1jIxpVaNpEQ", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/09/09343711", "title": "Adapted SIMPLE Algorithm for Incompressible SPH Fluids With a Broad Range Viscosity", "doi": null, "abstractUrl": "/journal/tg/2022/09/09343711/1qRJcoI7GdG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoiYVp", "title": "2016 Fourth International Conference on 3D Vision (3DV)", "acronym": "3dv", "groupId": "1800494", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyugyRN", "doi": "10.1109/3DV.2016.42", "title": "Tracking Deformable Surfaces That Undergo Topological Changes Using an RGB-D Camera", "normalizedTitle": "Tracking Deformable Surfaces That Undergo Topological Changes Using an RGB-D Camera", "abstract": "We present a method for 3D tracking of deformable surfaces with dynamic topology, for instance a paper that undergoes cutting or tearing. Existing template-based methods assume a template of fixed topology. Thus, they fail in tracking deformable objects that undergo topological changes. In our work, we employ a dynamic template (3D mesh) whose topology evolves based on the topological changes of the observed geometry. Our tracking framework deforms the defined template based on three types of constraints: (a) the surface of the template has to be registered to the 3D shape of the tracked surface, (b) the template deformation should respect feature (SIFT) correspondences between selected pairs of frames, and (c) the lengths of the template edges should be preserved. The latter constraint is relaxed when an edge is found to lie on a \"geometric gap\", that is, when a significant depth discontinuity is detected along this edge. The topology of the template is updated on the fly by removing overstretched edges that lie on a geometric gap. The proposed method has been evaluated quantitatively and qualitatively in both synthetic and real sequences of monocular RGB-D views of surfaces that undergo various types of topological changes. The obtained results show that our approach tracks effectively objects with evolving topology and outperforms state of the art methods in tracking accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "We present a method for 3D tracking of deformable surfaces with dynamic topology, for instance a paper that undergoes cutting or tearing. Existing template-based methods assume a template of fixed topology. Thus, they fail in tracking deformable objects that undergo topological changes. In our work, we employ a dynamic template (3D mesh) whose topology evolves based on the topological changes of the observed geometry. Our tracking framework deforms the defined template based on three types of constraints: (a) the surface of the template has to be registered to the 3D shape of the tracked surface, (b) the template deformation should respect feature (SIFT) correspondences between selected pairs of frames, and (c) the lengths of the template edges should be preserved. The latter constraint is relaxed when an edge is found to lie on a \"geometric gap\", that is, when a significant depth discontinuity is detected along this edge. The topology of the template is updated on the fly by removing overstretched edges that lie on a geometric gap. The proposed method has been evaluated quantitatively and qualitatively in both synthetic and real sequences of monocular RGB-D views of surfaces that undergo various types of topological changes. The obtained results show that our approach tracks effectively objects with evolving topology and outperforms state of the art methods in tracking accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a method for 3D tracking of deformable surfaces with dynamic topology, for instance a paper that undergoes cutting or tearing. Existing template-based methods assume a template of fixed topology. Thus, they fail in tracking deformable objects that undergo topological changes. In our work, we employ a dynamic template (3D mesh) whose topology evolves based on the topological changes of the observed geometry. Our tracking framework deforms the defined template based on three types of constraints: (a) the surface of the template has to be registered to the 3D shape of the tracked surface, (b) the template deformation should respect feature (SIFT) correspondences between selected pairs of frames, and (c) the lengths of the template edges should be preserved. The latter constraint is relaxed when an edge is found to lie on a \"geometric gap\", that is, when a significant depth discontinuity is detected along this edge. The topology of the template is updated on the fly by removing overstretched edges that lie on a geometric gap. The proposed method has been evaluated quantitatively and qualitatively in both synthetic and real sequences of monocular RGB-D views of surfaces that undergo various types of topological changes. The obtained results show that our approach tracks effectively objects with evolving topology and outperforms state of the art methods in tracking accuracy.", "fno": "5407a333", "keywords": [ "Three Dimensional Displays", "Topology", "Shape", "Image Edge Detection", "Two Dimensional Displays", "Deformable Models", "Surface Reconstruction" ], "authors": [ { "affiliation": null, "fullName": "Aggeliki Tsoli", "givenName": "Aggeliki", "surname": "Tsoli", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonis A. Argyros", "givenName": "Antonis A.", "surname": "Argyros", "__typename": "ArticleAuthorType" } ], "idPrefix": "3dv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "333-341", "year": "2016", "issn": null, "isbn": "978-1-5090-5407-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5407a323", "articleId": "12OmNzSyCjs", "__typename": "AdjacentArticleType" }, "next": { "fno": "5407a342", "articleId": "12OmNvjgWvj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2015/8391/0/8391c183", "title": "Deformable 3D Fusion: From Partial Dynamic 3D Observations to Complete 4D Models", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391c183/12OmNCdk2AZ", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2011/0063/0/06130447", "title": "A pixel-based approach to template-based monocular 3D reconstruction of deformable surfaces", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2011/06130447/12OmNCga1RM", "parentPublication": { "id": "proceedings/iccvw/2011/0063/0", "title": "2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2015/8391/0/8391a918", "title": "Direct, Dense, and Deformable: Template-Based Non-rigid 3D Reconstruction from RGB Video", "doi": null, "abstractUrl": "/proceedings-article/iccv/2015/8391a918/12OmNrAv3HN", "parentPublication": { "id": "proceedings/iccv/2015/8391/0", "title": "2015 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2017/6067/0/08019318", "title": "Global alignment of deformable objects captured by a single RGB-D camera", "doi": null, "abstractUrl": "/proceedings-article/icme/2017/08019318/12OmNwseEXh", "parentPublication": { "id": "proceedings/icme/2017/6067/0", "title": "2017 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2011/0529/0/05981724", "title": "Resolving occlusion in multiframe reconstruction of deformable surfaces", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2011/05981724/12OmNyUnEA0", "parentPublication": { "id": "proceedings/cvprw/2011/0529/0", "title": "CVPR 2011 WORKSHOPS", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2018/08/08010838", "title": "Tracking-by-Detection of 3D Human Shapes: From Surfaces to Volumes", "doi": null, "abstractUrl": "/journal/tp/2018/08/08010838/13rRUxBa5yP", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805436", "title": "Multi-Scale Topological Analysis of Asymmetric Tensor Fields on Surfaces", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805436/1cG4IGNd2Y8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2019/4803/0/480300a901", "title": "Deformable Surface Tracking by Graph Matching", "doi": null, "abstractUrl": "/proceedings-article/iccv/2019/480300a901/1hQqlPMirWU", "parentPublication": { "id": "proceedings/iccv/2019/4803/0", "title": "2019 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2019/6092/0/609200a011", "title": "RGB-D Object Tracking with Occlusion Detection", "doi": null, "abstractUrl": "/proceedings-article/cis/2019/609200a011/1i5m4SLK9BC", "parentPublication": { "id": "proceedings/cis/2019/6092/0", "title": "2019 15th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09224154", "title": "Mode Surfaces of Symmetric Tensor Fields: Topological Analysis and Seamless Extraction", "doi": null, "abstractUrl": "/journal/tg/2021/02/09224154/1nV63QG11le", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBzRNrw", "title": "2013 46th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2013", "__typename": "ProceedingType" }, "article": { "id": "12OmNqI04L2", "doi": "10.1109/HICSS.2013.556", "title": "Topological analysis of longitudinal networks", "normalizedTitle": "Topological analysis of longitudinal networks", "abstract": "Longitudinal networks evolve over time through the addition or deletion of nodes and edges. A longitudinal network can be viewed as a single static network that aggregates all edges observed over some time period (i.e., structure of network is fixed), or as a series of static networks observed in different point of time over the entire network observation period (i.e., structure of network is changing over time). By following a topological approach (i.e., static topology and dynamic topology), this paper first proposes a framework to analyze longitudinal networks. In static topology, SNA methods are applied to the aggregated network of entire observation period. Smaller segments of network data (i.e., short-interval network) that are accumulated in less time compared to the entire network observation period are used in dynamic topology for analysis purpose. Based on this framework, this study then conducts a topological analysis of email communication networks of an organization during its different operational conditions to explore changes in the behavior of actor-level dynamics.", "abstracts": [ { "abstractType": "Regular", "content": "Longitudinal networks evolve over time through the addition or deletion of nodes and edges. A longitudinal network can be viewed as a single static network that aggregates all edges observed over some time period (i.e., structure of network is fixed), or as a series of static networks observed in different point of time over the entire network observation period (i.e., structure of network is changing over time). By following a topological approach (i.e., static topology and dynamic topology), this paper first proposes a framework to analyze longitudinal networks. In static topology, SNA methods are applied to the aggregated network of entire observation period. Smaller segments of network data (i.e., short-interval network) that are accumulated in less time compared to the entire network observation period are used in dynamic topology for analysis purpose. Based on this framework, this study then conducts a topological analysis of email communication networks of an organization during its different operational conditions to explore changes in the behavior of actor-level dynamics.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Longitudinal networks evolve over time through the addition or deletion of nodes and edges. A longitudinal network can be viewed as a single static network that aggregates all edges observed over some time period (i.e., structure of network is fixed), or as a series of static networks observed in different point of time over the entire network observation period (i.e., structure of network is changing over time). By following a topological approach (i.e., static topology and dynamic topology), this paper first proposes a framework to analyze longitudinal networks. In static topology, SNA methods are applied to the aggregated network of entire observation period. Smaller segments of network data (i.e., short-interval network) that are accumulated in less time compared to the entire network observation period are used in dynamic topology for analysis purpose. Based on this framework, this study then conducts a topological analysis of email communication networks of an organization during its different operational conditions to explore changes in the behavior of actor-level dynamics.", "fno": "4892d931", "keywords": [ "Network Topology", "Topology", "Social Network Services", "Communication Networks", "Analytical Models", "Electronic Mail", "Computational Modeling", "Dynamic Topology", "Longitudinal Networks", "Topological Analysis", "Static Topology" ], "authors": [ { "affiliation": "Centre for Complex Syst. Res., Univ. of Sydney, Sydney, NSW, Australia", "fullName": "S. Uddin", "givenName": "S.", "surname": "Uddin", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Complex Syst. Res., Univ. of Sydney, Sydney, NSW, Australia", "fullName": "M. Piraveenan", "givenName": "M.", "surname": "Piraveenan", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Complex Syst. Res., Univ. of Sydney, Sydney, NSW, Australia", "fullName": "K. S. K. Chung", "givenName": "K. S. K.", "surname": "Chung", "__typename": "ArticleAuthorType" }, { "affiliation": "Centre for Complex Syst. Res., Univ. of Sydney, Sydney, NSW, Australia", "fullName": "L. Hossain", "givenName": "L.", "surname": "Hossain", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2013-01-01T00:00:00", "pubType": "proceedings", "pages": "3931-3940", "year": "2013", "issn": "1530-1605", "isbn": "978-1-4673-5933-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4892d930", "articleId": "12OmNBiPRBP", "__typename": "AdjacentArticleType" }, "next": { "fno": "4892d941", "articleId": "12OmNyeECDy", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/infcom/1990/2049/0/00091251", "title": "Topological reconfiguration of ATM networks", "doi": null, "abstractUrl": "/proceedings-article/infcom/1990/00091251/12OmNBRsVAX", "parentPublication": { "id": "proceedings/infcom/1990/2049/0", "title": "IEEE INFOCOM '90", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799b006", "title": "Capturing actor-level dynamics of longitudinal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799b006/12OmNCmGO1r", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2014/6204/0/6204a368", "title": "Analysis of Topology Algorithms for Commercial Airborne Networks", "doi": null, "abstractUrl": "/proceedings-article/icnp/2014/6204a368/12OmNqAU6Ge", "parentPublication": { "id": "proceedings/icnp/2014/6204/0", "title": "2014 IEEE 22nd International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2014/4277/0/06912529", "title": "Topological routing for Heterogeneous Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2014/06912529/12OmNwIHoAF", "parentPublication": { "id": "proceedings/iscc/2014/4277/0", "title": "2014 IEEE Symposium on Computers and Communication (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2010/4047/3/4047c210", "title": "Test and Simulation Study on the Longitudinal Impact of Heavy-haul Train", "doi": null, "abstractUrl": "/proceedings-article/icic/2010/4047c210/12OmNwoPtu0", "parentPublication": { "id": "proceedings/icic/2010/4047/3", "title": "2010 Third International Conference on Information and Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2010/3962/3/3962e900", "title": "The Longitudinal Dynamics of Heavy-Haul Trains in the Asynchronous Brake Control System", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2010/3962e900/12OmNz61dbS", "parentPublication": { "id": "proceedings/icmtma/2010/3962/3", "title": "2010 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2015/3854/0/07403547", "title": "Topological resilience analysis of supply networks under random disruptions and targeted attacks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2015/07403547/12OmNzT7Oyx", "parentPublication": { "id": "proceedings/asonam/2015/3854/0", "title": "2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/1992/0602/0/00263487", "title": "Topological design of interconnected LAN-MAN networks", "doi": null, "abstractUrl": "/proceedings-article/infcom/1992/00263487/12OmNzVXNV1", "parentPublication": { "id": "proceedings/infcom/1992/0602/0", "title": "IEEE INFOCOM '92: The Conference on Computer Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csie/2009/3507/1/3507a252", "title": "Study of Topological Dynamics and Periodicity of LEO Satellite Networks Based on Spectral Analysis", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507a252/12OmNzayNjX", "parentPublication": { "id": "csie/2009/3507/1", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/12/ttg2011122283", "title": "Asymmetric Relations in Longitudinal Social Networks", "doi": null, "abstractUrl": "/journal/tg/2011/12/ttg2011122283/13rRUx0xPIC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx5GU1K", "title": "2009 IEEE International Conference on Granular Computing", "acronym": "grc", "groupId": "1001626", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxA3YUF", "doi": "10.1109/GRC.2009.5255088", "title": "On the topological properties of intuitionistic fuzzy rough sets", "normalizedTitle": "On the topological properties of intuitionistic fuzzy rough sets", "abstract": "This paper is devoted to the discussion of the relationship between intuitionistic fuzzy rough set models and intuitionistic fuzzy topologies on a finite universe. The IFT Condition for intuitionistic fuzzy topology is proposed. It is proved that the set of all lower approximation sets based on a reflexive and transitive intuitionistic fuzzy relation consists of a intuitionistic fuzzy topology which satisfies IFT Condition.", "abstracts": [ { "abstractType": "Regular", "content": "This paper is devoted to the discussion of the relationship between intuitionistic fuzzy rough set models and intuitionistic fuzzy topologies on a finite universe. The IFT Condition for intuitionistic fuzzy topology is proposed. It is proved that the set of all lower approximation sets based on a reflexive and transitive intuitionistic fuzzy relation consists of a intuitionistic fuzzy topology which satisfies IFT Condition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper is devoted to the discussion of the relationship between intuitionistic fuzzy rough set models and intuitionistic fuzzy topologies on a finite universe. The IFT Condition for intuitionistic fuzzy topology is proposed. It is proved that the set of all lower approximation sets based on a reflexive and transitive intuitionistic fuzzy relation consists of a intuitionistic fuzzy topology which satisfies IFT Condition.", "fno": "05255088", "keywords": [ "Fuzzy Set Theory", "Rough Set Theory", "Topological Properties", "Intuitionistic Fuzzy Rough Sets", "Finite Universe", "IFT Condition", "Intuitionistic Fuzzy Topology", "Fuzzy Sets", "Rough Sets", "Topology", "Set Theory", "Fuzzy Set Theory", "Physics", "Information Science", "Pattern Analysis", "Pattern Recognition", "Rough Set", "Approximation Operator", "Fuzzy Set", "Intuitionistic Fuzzy Topology" ], "authors": [ { "affiliation": "Department of Mathematics &Physics, Zhejiang Shuren University, Hangzhou, 310015, China", "fullName": "Renbing Lin", "givenName": "Renbing", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mathematics and Information Science, Zhejiang Normal University, Jinhua, 321004, China", "fullName": "Jiyi Wang", "givenName": "Jiyi", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "grc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-08-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2009", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05255002", "articleId": "12OmNvAAtzc", "__typename": "AdjacentArticleType" }, "next": { "fno": "05255089", "articleId": "12OmNBgz4Ab", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2009/4830/0/05255087", "title": "On structure of generalized intuitionistic fuzzy rough sets", "doi": null, "abstractUrl": "/proceedings-article/grc/2009/05255087/12OmNA0dMTe", "parentPublication": { "id": "proceedings/grc/2009/4830/0", "title": "2009 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/6/3735f123", "title": "Bifuzzy Probabilistic Sets and r-intuitionistic Fuzzy Sets", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735f123/12OmNApLGOM", "parentPublication": { "id": "proceedings/fskd/2009/3735/6", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/6/3735f167", "title": "Cut Sets on Interval-Valued Intuitionistic Fuzzy Sets", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735f167/12OmNB9t6oS", "parentPublication": { "id": "proceedings/fskd/2009/3735/6", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icacc/2012/4723/0/4723a001", "title": "'NTV' Metric Based New Similarity Measure for Intuitionistic Fuzzy Sets with Its Computational Application in Medical Diagnosis", "doi": null, "abstractUrl": "/proceedings-article/icacc/2012/4723a001/12OmNBQTJeQ", "parentPublication": { "id": "proceedings/icacc/2012/4723/0", "title": "2012 International Conference on Advances in Computing and Communications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/maee/2013/4975/0/4975a157", "title": "Distance and Similarity between Intuitionistic Fuzzy Sets", "doi": null, "abstractUrl": "/proceedings-article/maee/2013/4975a157/12OmNBTs7o0", "parentPublication": { "id": "proceedings/maee/2013/4975/0", "title": "2013 International Conference on Mechanical and Automation Engineering (MAEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2010/7964/0/05575989", "title": "Intuitionistic Fuzzy Rough Sets Determined by Intuitionistic Fuzzy Implicators", "doi": null, "abstractUrl": "/proceedings-article/grc/2010/05575989/12OmNCm7BNS", "parentPublication": { "id": "proceedings/grc/2010/7964/0", "title": "2010 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/grc/2010/7964/0/05575940", "title": "Intuitionistic Fuzzy Rough Approximation Operators Based on Intuitionistic Fuzzy Triangle Norm", "doi": null, "abstractUrl": "/proceedings-article/grc/2010/05575940/12OmNx8Outw", "parentPublication": { "id": "proceedings/grc/2010/7964/0", "title": "2010 IEEE International Conference on Granular Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccis/2013/5004/0/5004a832", "title": "Some Operations on Interval-Valued Intuitionistic Fuzzy Sets", "doi": null, "abstractUrl": "/proceedings-article/iccis/2013/5004a832/12OmNyNQSII", "parentPublication": { "id": "proceedings/iccis/2013/5004/0", "title": "2013 International Conference on Computational and Information Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccie/2010/4026/2/4026b265", "title": "Topological Properties of Rough Approximation Operation Based on IF Sets", "doi": null, "abstractUrl": "/proceedings-article/ccie/2010/4026b265/12OmNyQpgMV", "parentPublication": { "id": "proceedings/ccie/2010/4026/2", "title": "Computing, Control and Industrial Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2009/3605/1/3605a497", "title": "Target Group Division Methods Based on Intuitionistic Fuzzy S-Rough Assistant Sets", "doi": null, "abstractUrl": "/proceedings-article/cso/2009/3605a497/12OmNySosJG", "parentPublication": { "id": "cso/2009/3605/1", "title": "2009 International Joint Conference on Computational Sciences and Optimization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxuXcDH", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "acronym": "bracis", "groupId": "1803430", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNzV70A5", "doi": "10.1109/BRACIS.2014.71", "title": "Data Clustering Using Topological Features", "normalizedTitle": "Data Clustering Using Topological Features", "abstract": "Clustering is one of the most used data mining techniques, while computational topology is a very recent field bridging abstract mathematics with concrete computational techniques. In this paper, we explore the hypothesis that topologically-similar clusters may indicate meaningful relationships. Our approach has an efficient implementation based on computing Minimum Spanning Trees to obtain topological information of each cluster. We then compute a discreteness and a disconnectedness index, used to characterize each cluster, thus allowing the retrieval of equivalence classes. We show that for a real-world high-dimensional network intrusion data set, the topologically-similar clusters retrieved by our approach do indeed correspond to meaningful equivalence classes present in the data set.", "abstracts": [ { "abstractType": "Regular", "content": "Clustering is one of the most used data mining techniques, while computational topology is a very recent field bridging abstract mathematics with concrete computational techniques. In this paper, we explore the hypothesis that topologically-similar clusters may indicate meaningful relationships. Our approach has an efficient implementation based on computing Minimum Spanning Trees to obtain topological information of each cluster. We then compute a discreteness and a disconnectedness index, used to characterize each cluster, thus allowing the retrieval of equivalence classes. We show that for a real-world high-dimensional network intrusion data set, the topologically-similar clusters retrieved by our approach do indeed correspond to meaningful equivalence classes present in the data set.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Clustering is one of the most used data mining techniques, while computational topology is a very recent field bridging abstract mathematics with concrete computational techniques. In this paper, we explore the hypothesis that topologically-similar clusters may indicate meaningful relationships. Our approach has an efficient implementation based on computing Minimum Spanning Trees to obtain topological information of each cluster. We then compute a discreteness and a disconnectedness index, used to characterize each cluster, thus allowing the retrieval of equivalence classes. We show that for a real-world high-dimensional network intrusion data set, the topologically-similar clusters retrieved by our approach do indeed correspond to meaningful equivalence classes present in the data set.", "fno": "5618a360", "keywords": [ "Data Mining", "Pattern Clustering", "Security Of Data", "Trees Mathematics", "High Dimensional Network Intrusion Data Set", "Equivalence Class Retrieval", "Disconnectedness Index", "Discreteness Index", "Cluster Topological Information", "Minimum Spanning Trees", "Computational Techniques", "Computational Topology", "Data Mining Techniques", "Topological Features", "Data Clustering", "Topology", "Feature Extraction", "Indexes", "Extraterrestrial Measurements", "Clustering Algorithms", "Indium Phosphide", "Data Mining", "Clustering", "Topology", "Topological Features" ], "authors": [ { "affiliation": "Inst. of Math. & Comput. Sci., Sao Carlos, Brazil", "fullName": "Cássio M.M. Pereira", "givenName": "Cássio M.M.", "surname": "Pereira", "__typename": "ArticleAuthorType" }, { "affiliation": "Inst. of Math. & Comput. Sci., Sao Carlos, Brazil", "fullName": "Rodrigo F. De Mello", "givenName": "Rodrigo F.", "surname": "De Mello", "__typename": "ArticleAuthorType" } ], "idPrefix": "bracis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-10-01T00:00:00", "pubType": "proceedings", "pages": "360-365", "year": "2014", "issn": null, "isbn": "978-1-4799-5618-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "5618a354", "articleId": "12OmNC2OSH1", "__typename": "AdjacentArticleType" }, "next": { "fno": "5618a366", "articleId": "12OmNzBOhPm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/1994/6270/2/00576905", "title": "A maximum entropy approach to pairwise data clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/1994/00576905/12OmNAY79hx", "parentPublication": { "id": "proceedings/icpr/1994/6270/2", "title": "Proceedings of 12th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2008/2161/0/04498337", "title": "Message from the SISAP'08 program committee co-chairs", "doi": null, "abstractUrl": "/proceedings-article/icdew/2008/04498337/12OmNBE7Muf", "parentPublication": { "id": "proceedings/icdew/2008/2161/0", "title": "2008 IEEE 24th International Conference on Data Engineering Workshop", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004281", "title": "Knowledge-based clustering of ship trajectories using density-based approach", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004281/12OmNBp52As", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/2002/7402/2/05745014", "title": "Using inter-positional Transfer Functions in 3D-sound", "doi": null, "abstractUrl": "/proceedings-article/icassp/2002/05745014/12OmNBqdr8I", "parentPublication": { "id": "proceedings/icassp/2002/7402/2", "title": "Proceedings of International Conference on Acoustics, Speech and Signal Processing (CASSP'02)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/digitel/2010/3993/0/3993a185", "title": "Document Clustering Method Using Weighted Semantic Features and Cluster Similarity", "doi": null, "abstractUrl": "/proceedings-article/digitel/2010/3993a185/12OmNs0kyER", "parentPublication": { "id": "proceedings/digitel/2010/3993/0", "title": "Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2013/3142/0/3143b105", "title": "A Multi Density-Based Clustering Algorithm for Data Stream with Noise", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2013/3143b105/12OmNwkhTdJ", "parentPublication": { "id": "proceedings/icdmw/2013/3142/0", "title": "2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/01/ttk2013010062", "title": "Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm", "doi": null, "abstractUrl": "/journal/tk/2013/01/ttk2013010062/13rRUwInuWU", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2020/01/08567922", "title": "Persistence Paths and Signature Features in Topological Data Analysis", "doi": null, "abstractUrl": "/journal/tp/2020/01/08567922/17D45VsBU7g", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669771", "title": "Analysis of Brain fMRI Data via Topological Data Clustering Method IoPS", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669771/1A9VMgDOmhG", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09448469", "title": "A Topological Similarity Measure Between Multi-Resolution Reeb Spaces", "doi": null, "abstractUrl": "/journal/tg/2022/12/09448469/1ugE7gaINC8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwogh4x", "title": "2017 IEEE International Conference on Information Reuse and Integration (IRI)", "acronym": "iri", "groupId": "1001046", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzZWbFj", "doi": "10.1109/IRI.2017.41", "title": "Mining Social Media Data Using Topological Data Analysis", "normalizedTitle": "Mining Social Media Data Using Topological Data Analysis", "abstract": "Topological data analysis is a noble method to analyze high-dimensional qualitative data using a set of properties from topology. In this paper, we explore the feasibility of topological data analysis for mining social media data by investigating the problem of image popularity. We randomly crawl images from Instagram, convert their captions to 300 dimensional numerical vectors using Word2vec, calculate cosine distances to evaluate the similarities of the caption vectors, and then apply the distances to a topological data analysis algorithm called mapper.With caption vectors, the results show that topological data analysis is able to cluster the images related to the images' popularity. Moreover, the results show relationships between the clusters that are represented as a monotonic increase of popularity. This approach is compared with traditional clustering algorithms, including k-means and hierarchical clustering, and the results show that topological data analysis outperforms the others.", "abstracts": [ { "abstractType": "Regular", "content": "Topological data analysis is a noble method to analyze high-dimensional qualitative data using a set of properties from topology. In this paper, we explore the feasibility of topological data analysis for mining social media data by investigating the problem of image popularity. We randomly crawl images from Instagram, convert their captions to 300 dimensional numerical vectors using Word2vec, calculate cosine distances to evaluate the similarities of the caption vectors, and then apply the distances to a topological data analysis algorithm called mapper.With caption vectors, the results show that topological data analysis is able to cluster the images related to the images' popularity. Moreover, the results show relationships between the clusters that are represented as a monotonic increase of popularity. This approach is compared with traditional clustering algorithms, including k-means and hierarchical clustering, and the results show that topological data analysis outperforms the others.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Topological data analysis is a noble method to analyze high-dimensional qualitative data using a set of properties from topology. In this paper, we explore the feasibility of topological data analysis for mining social media data by investigating the problem of image popularity. We randomly crawl images from Instagram, convert their captions to 300 dimensional numerical vectors using Word2vec, calculate cosine distances to evaluate the similarities of the caption vectors, and then apply the distances to a topological data analysis algorithm called mapper.With caption vectors, the results show that topological data analysis is able to cluster the images related to the images' popularity. Moreover, the results show relationships between the clusters that are represented as a monotonic increase of popularity. This approach is compared with traditional clustering algorithms, including k-means and hierarchical clustering, and the results show that topological data analysis outperforms the others.", "fno": "1562a144", "keywords": [ "Data Analysis", "Data Mining", "Pattern Clustering", "Social Networking Online", "Vectors", "High Dimensional Qualitative Data", "Topological Data Analysis Algorithm", "K Means Clustering", "Cosine Distances", "Word 2 Vec", "Hierarchical Clustering", "Caption Vectors", "Mapper", "Numerical Vectors", "Instagram", "Image Popularity", "Social Media Data Mining", "Data Analysis", "Social Network Services", "Topology", "Shape", "Data Mining", "Algorithm Design And Analysis", "Clustering Algorithms", "Topological Data Analysis", "Social Network Analysis And Mining", "Machine Learning", "Clustering" ], "authors": [ { "affiliation": null, "fullName": "Khaled Almgren", "givenName": "Khaled", "surname": "Almgren", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Minkyu Kim", "givenName": "Minkyu", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jeongkyu Lee", "givenName": "Jeongkyu", "surname": "Lee", "__typename": "ArticleAuthorType" } ], "idPrefix": "iri", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "144-153", "year": "2017", "issn": null, "isbn": "978-1-5386-1562-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1562a137", "articleId": "12OmNBSBkjC", "__typename": "AdjacentArticleType" }, "next": { "fno": "1562a154", "articleId": "12OmNxzMnTR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/grc/2007/3032/0/30320770", "title": "Measuring Topological Anonymity in Social Networks", "doi": null, "abstractUrl": "/proceedings-article/grc/2007/30320770/12OmNx0RIJX", "parentPublication": { "id": "proceedings/grc/2007/3032/0", "title": "2007 IEEE International Conference on Granular Computing (GRC 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bracis/2014/5618/0/5618a360", "title": "Data Clustering Using Topological Features", "doi": null, "abstractUrl": "/proceedings-article/bracis/2014/5618a360/12OmNzV70A5", "parentPublication": { "id": "proceedings/bracis/2014/5618/0", "title": "2014 Brazilian Conference on Intelligent Systems (BRACIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/09/ttk2013092090", "title": "Mining Graph Topological Patterns: Finding Covariations among Vertex Descriptors", "doi": null, "abstractUrl": "/journal/tk/2013/09/ttk2013092090/13rRUILtJzQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/12/ttg2012122382", "title": "Multivariate Data Analysis Using Persistence-Based Filtering and Topological Signatures", "doi": null, "abstractUrl": "/journal/tg/2012/12/ttg2012122382/13rRUxly8SV", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08258003", "title": "Mining pros and cons of actions from social media for decision support", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08258003/17D45Wuc329", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400a350", "title": "Towards Longitudinal Analytics on Social Media Data", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400a350/1aDT0SjPBte", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805451", "title": "The Effect of Data Transformations on Scalar Field Topological Analysis of High-Order FEM Solutions", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805451/1cG4q4sh1bq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222093", "title": "Localized Topological Simplification of Scalar Data", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222093/1nTrExzmT5e", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbdss/2020/9751/0/975100a005", "title": "The Plausibility of Topological Data Analysis in Providing Internet Services", "doi": null, "abstractUrl": "/proceedings-article/icbdss/2020/975100a005/1tROwnNVkyc", "parentPublication": { "id": "proceedings/icbdss/2020/9751/0", "title": "2020 International Conference on Big Data and Social Sciences (ICBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2020/9264/0/926400a108", "title": "Research on Topic Clustering Mining Algorithm for Social Media Big Data", "doi": null, "abstractUrl": "/proceedings-article/icaml/2020/926400a108/1yLPbYG8TJu", "parentPublication": { "id": "proceedings/icaml/2020/9264/0", "title": "2020 2nd International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipN", "title": "2017 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45XDIXOG", "doi": "10.1109/BigData.2017.8258232", "title": "Evaluating the quality of graph embeddings via topological feature reconstruction", "normalizedTitle": "Evaluating the quality of graph embeddings via topological feature reconstruction", "abstract": "In this paper we study three state-of-the-art, but competing, approaches for generating graph embeddings using unsupervised neural networks. Graph embeddings aim to discover the ‘best’ representation for a graph automatically and have been applied to graphs from numerous domains, including social networks. We evaluate their effectiveness at capturing a good representation of a graph's topological structure by using the embeddings to predict a series of topological features at the vertex level. We hypothesise that an ‘ideal’ high quality graph embedding should be able to capture key parts of the graph's topology, thus we should be able to use it to predict common measures of the topology, for example vertex centrality. This could also be used to better understand which topological structures are truly being captured by the embeddings. We first review these three graph embedding techniques and then evaluate how close they are to being ‘ideal’. We provide a framework, with extensive experimental evaluation on empirical and synthetic datasets, to assess the effectiveness of several approaches at creating graph embeddings which capture detailed topological structure.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper we study three state-of-the-art, but competing, approaches for generating graph embeddings using unsupervised neural networks. Graph embeddings aim to discover the ‘best’ representation for a graph automatically and have been applied to graphs from numerous domains, including social networks. We evaluate their effectiveness at capturing a good representation of a graph's topological structure by using the embeddings to predict a series of topological features at the vertex level. We hypothesise that an ‘ideal’ high quality graph embedding should be able to capture key parts of the graph's topology, thus we should be able to use it to predict common measures of the topology, for example vertex centrality. This could also be used to better understand which topological structures are truly being captured by the embeddings. We first review these three graph embedding techniques and then evaluate how close they are to being ‘ideal’. We provide a framework, with extensive experimental evaluation on empirical and synthetic datasets, to assess the effectiveness of several approaches at creating graph embeddings which capture detailed topological structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper we study three state-of-the-art, but competing, approaches for generating graph embeddings using unsupervised neural networks. Graph embeddings aim to discover the ‘best’ representation for a graph automatically and have been applied to graphs from numerous domains, including social networks. We evaluate their effectiveness at capturing a good representation of a graph's topological structure by using the embeddings to predict a series of topological features at the vertex level. We hypothesise that an ‘ideal’ high quality graph embedding should be able to capture key parts of the graph's topology, thus we should be able to use it to predict common measures of the topology, for example vertex centrality. This could also be used to better understand which topological structures are truly being captured by the embeddings. We first review these three graph embedding techniques and then evaluate how close they are to being ‘ideal’. We provide a framework, with extensive experimental evaluation on empirical and synthetic datasets, to assess the effectiveness of several approaches at creating graph embeddings which capture detailed topological structure.", "fno": "08258232", "keywords": [ "Topology", "Social Network Services", "Network Topology", "Neural Networks", "Predictive Models", "Feature Extraction", "Graph Embeddings", "Feature Learning", "Deep Learning" ], "authors": [ { "affiliation": "Department of Computer Science, Durham University, Durham, UK", "fullName": "Stephen Bonner", "givenName": "Stephen", "surname": "Bonner", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Durham University, Durham, UK", "fullName": "John Brennan", "givenName": "John", "surname": "Brennan", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Durham University, Durham, UK", "fullName": "Ibad Kureshi", "givenName": "Ibad", "surname": "Kureshi", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science and Engineering, SUSTech, Shenzhen, China", "fullName": "Georgios Theodoropoulos", "givenName": "Georgios", "surname": "Theodoropoulos", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computing, Newcastle University, Newcastle, UK", "fullName": "Andrew Stephen McGough", "givenName": "Andrew Stephen", "surname": "McGough", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Durham University, Durham, UK", "fullName": "Boguslaw Obara", "givenName": "Boguslaw", "surname": "Obara", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-12-01T00:00:00", "pubType": "proceedings", "pages": "2691-2700", "year": "2017", "issn": null, "isbn": "978-1-5386-2715-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08258231", "articleId": "17D45Xi9rXt", "__typename": "AdjacentArticleType" }, "next": { "fno": "08258233", "articleId": "17D45WZZ7Fq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asonam/2016/2846/0/07752355", "title": "A new topological metric for link prediction in directed, weighted and temporal networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2016/07752355/12OmNAlvHGS", "parentPublication": { "id": "proceedings/asonam/2016/2846/0", "title": "2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2012/4925/0/4925a898", "title": "Supporting the Discovery of Relevant Topological Patterns in Attributed Graphs", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2012/4925a898/12OmNBNM91z", "parentPublication": { "id": "proceedings/icdmw/2012/4925/0", "title": "2012 IEEE 12th International Conference on Data Mining Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcasia/1997/7901/0/79010073", "title": "Embeddings into the pancake interconnection network", "doi": null, "abstractUrl": "/proceedings-article/hpcasia/1997/79010073/12OmNBlFQVa", "parentPublication": { "id": "proceedings/hpcasia/1997/7901/0", "title": "High Performance Computing and Grid in Asia Pacific Region, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2016/2020/0/07498312", "title": "Minfer: A method of inferring motif statistics from sampled edges", "doi": null, "abstractUrl": "/proceedings-article/icde/2016/07498312/12OmNCesr9L", "parentPublication": { "id": "proceedings/icde/2016/2020/0", "title": "2016 IEEE 32nd International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892d931", "title": "Topological analysis of longitudinal networks", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892d931/12OmNqI04L2", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2017/1562/0/1562a144", "title": "Mining Social Media Data Using Topological Data Analysis", "doi": null, "abstractUrl": "/proceedings-article/iri/2017/1562a144/12OmNzZWbFj", "parentPublication": { "id": "proceedings/iri/2017/1562/0", "title": "2017 IEEE International Conference on Information Reuse and Integration (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2013/09/ttk2013092090", "title": "Mining Graph Topological Patterns: Finding Covariations among Vertex Descriptors", "doi": null, "abstractUrl": "/journal/tk/2013/09/ttk2013092090/13rRUILtJzQ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2016/11/07530854", "title": "An Approach to Cold-Start Link Prediction: Establishing Connections between Non-Topological and Topological Information", "doi": null, "abstractUrl": "/journal/tk/2016/11/07530854/13rRUwjGoGp", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09721603", "title": "Topological Simplifications of Hypergraphs", "doi": null, "abstractUrl": "/journal/tg/5555/01/09721603/1BhzoNy6wWA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2022/6819/0/09994863", "title": "Alignment of Dynamic Networks based on Temporal Embeddings", "doi": null, "abstractUrl": "/proceedings-article/bibm/2022/09994863/1JC1XkYTA2I", "parentPublication": { "id": "proceedings/bibm/2022/6819/0", "title": "2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1qJud3DwlXi", "title": "2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "acronym": "cyberc", "groupId": "1002974", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1qJuddOwE6I", "doi": "10.1109/CyberC49757.2020.00053", "title": "Evaluating the Structural Model using Internet Interdomain Topological Datasets", "normalizedTitle": "Evaluating the Structural Model using Internet Interdomain Topological Datasets", "abstract": "Recently we proposed a structural model of the Internet interdomain topology. The model partitioned the nodes of the topology into seven categories, which is helpful for the deep cognition of Internet structure. However, the correctness of the model was only confirmed on some local geographical topologies obtained by a certain measurement method, and neglects the verification on global topologies and the characteristic analysis on evolution process. This paper chooses two global topological datasets, explored by BGP (Border Gateway Protocol) routing table and traceroute-based measurement respectively, to verify the effectiveness of the model, and applies the structural properties described by the model to analyze the differences and the evolutionary behaviors of the topological datasets obtained by the two commonly-used measurement methods. Using the datasets explored from September 1999 to March 2018, we determine that the seven-node-category structure always exist but has distinct node partition percentages for different measurement methods, and most of the node categories remain stable percentages under the evolution (scale growth) of the Internet, namely this paper shows that the model captures plenty of size-indepe-ndent structural characteristics, which is effective for different commonly-used measurement methods.", "abstracts": [ { "abstractType": "Regular", "content": "Recently we proposed a structural model of the Internet interdomain topology. The model partitioned the nodes of the topology into seven categories, which is helpful for the deep cognition of Internet structure. However, the correctness of the model was only confirmed on some local geographical topologies obtained by a certain measurement method, and neglects the verification on global topologies and the characteristic analysis on evolution process. This paper chooses two global topological datasets, explored by BGP (Border Gateway Protocol) routing table and traceroute-based measurement respectively, to verify the effectiveness of the model, and applies the structural properties described by the model to analyze the differences and the evolutionary behaviors of the topological datasets obtained by the two commonly-used measurement methods. Using the datasets explored from September 1999 to March 2018, we determine that the seven-node-category structure always exist but has distinct node partition percentages for different measurement methods, and most of the node categories remain stable percentages under the evolution (scale growth) of the Internet, namely this paper shows that the model captures plenty of size-indepe-ndent structural characteristics, which is effective for different commonly-used measurement methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently we proposed a structural model of the Internet interdomain topology. The model partitioned the nodes of the topology into seven categories, which is helpful for the deep cognition of Internet structure. However, the correctness of the model was only confirmed on some local geographical topologies obtained by a certain measurement method, and neglects the verification on global topologies and the characteristic analysis on evolution process. This paper chooses two global topological datasets, explored by BGP (Border Gateway Protocol) routing table and traceroute-based measurement respectively, to verify the effectiveness of the model, and applies the structural properties described by the model to analyze the differences and the evolutionary behaviors of the topological datasets obtained by the two commonly-used measurement methods. Using the datasets explored from September 1999 to March 2018, we determine that the seven-node-category structure always exist but has distinct node partition percentages for different measurement methods, and most of the node categories remain stable percentages under the evolution (scale growth) of the Internet, namely this paper shows that the model captures plenty of size-indepe-ndent structural characteristics, which is effective for different commonly-used measurement methods.", "fno": "844800a283", "keywords": [ "Internet", "Routing Protocols", "Telecommunication Network Topology", "Global Topological Datasets", "Border Gateway Protocol", "Structural Properties", "Seven Node Category Structure", "Distinct Node Partition Percentages", "Structural Model", "Internet Structure", "Local Geographical Topologies", "Internet Interdomain Topological Datasets", "Size Independent Structural Characteristics", "Trace Route Based Measurement", "BGP", "Analytical Models", "Q Measurement", "Current Measurement", "Size Measurement", "Routing", "Topology", "Internet Topology", "Structural Model", "Measurement Datasets", "Performance Evaluation" ], "authors": [ { "affiliation": "School of Mathematics and Big Data Foshan University,Foshan,China,528000", "fullName": "Bo Jiao", "givenName": "Bo", "surname": "Jiao", "__typename": "ArticleAuthorType" } ], "idPrefix": "cyberc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "283-286", "year": "2020", "issn": null, "isbn": "978-1-7281-8448-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "844800a276", "articleId": "1qJuhjTMQTe", "__typename": "AdjacentArticleType" }, "next": { "fno": "844800a287", "articleId": "1qJufRywja8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icoin/2015/8342/0/07057917", "title": "Effective bandwidth measurement for Dynamic Adaptive Streaming over HTTP", "doi": null, "abstractUrl": "/proceedings-article/icoin/2015/07057917/12OmNApcuCh", "parentPublication": { "id": "proceedings/icoin/2015/8342/0", "title": "2015 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367e970", "title": "A Systemic Approach for Evaluating and Developing IT Outsourcing Measurement Systems", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367e970/12OmNC2fGsG", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2007/0802/0/04221711", "title": "Structural Selectivity Estimation for XML Documents", "doi": null, "abstractUrl": "/proceedings-article/icde/2007/04221711/12OmNroijlS", "parentPublication": { "id": "proceedings/icde/2007/0802/0", "title": "2007 IEEE 23rd International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/collaboratecom/2012/2740/0/06450960", "title": "Preservation of structural properties in anonymized social networks", "doi": null, "abstractUrl": "/proceedings-article/collaboratecom/2012/06450960/12OmNvIfDOf", "parentPublication": { "id": "proceedings/collaboratecom/2012/2740/0", "title": "2012 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsm-mensura/2016/4147/0/4147a182", "title": "Evaluating Security in Web Application Design Using Functional and Structural Size Measurements", "doi": null, "abstractUrl": "/proceedings-article/iwsm-mensura/2016/4147a182/12OmNwAKCLt", "parentPublication": { "id": "proceedings/iwsm-mensura/2016/4147/0", "title": "2016 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement (IWSM-MENSURA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom-bigdatase-i-spa/2015/7952/1/07345270", "title": "Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor Networks", "doi": null, "abstractUrl": "/proceedings-article/trustcom-bigdatase-i-spa/2015/07345270/12OmNwNwzKF", "parentPublication": { "id": "proceedings/trustcom-bigdatase-i-spa/2015/7952/2", "title": "2015 IEEE Trustcom/BigDataSE/I​SPA", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/qsic/2008/3312/0/3312a305", "title": "Towards a Method for Evaluating the Precision of Software Measures (Short Paper)", "doi": null, "abstractUrl": "/proceedings-article/qsic/2008/3312a305/12OmNznCl02", "parentPublication": { "id": "proceedings/qsic/2008/3312/0", "title": "Eighth International Conference on Quality Software. QSIC 2008", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ism/2021/3734/0/373400a166", "title": "Novel Datasets for Evaluating Song Popularity Prediction Tasks", "doi": null, "abstractUrl": "/proceedings-article/ism/2021/373400a166/1A3j3MQbKBG", "parentPublication": { "id": "proceedings/ism/2021/3734/0", "title": "2021 IEEE International Symposium on Multimedia (ISM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisce/2019/3681/0/368100a319", "title": "Time Delay Performance Analysis of Distributed Communication Platform Based on ZeroMQ", "doi": null, "abstractUrl": "/proceedings-article/cisce/2019/368100a319/1cI5ZhLskZW", "parentPublication": { "id": "proceedings/cisce/2019/3681/0", "title": "2019 International Conference on Communications, Information System and Computer Engineering (CISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600c205", "title": "Structure optimization of four-electrode detector for CFRP damage detection", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600c205/1x3ktIFWWn6", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jPbbHBGDHq", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "acronym": "wacv", "groupId": "1000040", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jPbhvKoICs", "doi": "10.1109/WACV45572.2020.9093592", "title": "Figure Captioning with Relation Maps for Reasoning", "normalizedTitle": "Figure Captioning with Relation Maps for Reasoning", "abstract": "Figures, such as line plots, pie charts, bar charts, are widely used to convey important information in a concise format. In this work, we investigate the problem of figure caption generation where the goal is to automatically generate a natural language description for a given figure. While natural image captioning has been studied extensively, figure captioning has received relatively little attention and remains a challenging problem. A successful solution to this task has many potential applications, such as: 1) automatic parsing large amount of figures in PDF document; 2) improving user experience by allowing figure content to be accessible to those with visual impairment. To solve this problem, we introduce a dataset FigCAP and propose novel attention mechanism. In order to solve the exposure bias issue, we further train the captioning model with sequence-level policy based on reinforcement learning, which directly optimizes evaluation metrics. Extensive experiments show that the proposed method outperforms the baselines, thus demonstrating a significant potential for automatic generating captions for figures.", "abstracts": [ { "abstractType": "Regular", "content": "Figures, such as line plots, pie charts, bar charts, are widely used to convey important information in a concise format. In this work, we investigate the problem of figure caption generation where the goal is to automatically generate a natural language description for a given figure. While natural image captioning has been studied extensively, figure captioning has received relatively little attention and remains a challenging problem. A successful solution to this task has many potential applications, such as: 1) automatic parsing large amount of figures in PDF document; 2) improving user experience by allowing figure content to be accessible to those with visual impairment. To solve this problem, we introduce a dataset FigCAP and propose novel attention mechanism. In order to solve the exposure bias issue, we further train the captioning model with sequence-level policy based on reinforcement learning, which directly optimizes evaluation metrics. Extensive experiments show that the proposed method outperforms the baselines, thus demonstrating a significant potential for automatic generating captions for figures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Figures, such as line plots, pie charts, bar charts, are widely used to convey important information in a concise format. In this work, we investigate the problem of figure caption generation where the goal is to automatically generate a natural language description for a given figure. While natural image captioning has been studied extensively, figure captioning has received relatively little attention and remains a challenging problem. A successful solution to this task has many potential applications, such as: 1) automatic parsing large amount of figures in PDF document; 2) improving user experience by allowing figure content to be accessible to those with visual impairment. To solve this problem, we introduce a dataset FigCAP and propose novel attention mechanism. In order to solve the exposure bias issue, we further train the captioning model with sequence-level policy based on reinforcement learning, which directly optimizes evaluation metrics. Extensive experiments show that the proposed method outperforms the baselines, thus demonstrating a significant potential for automatic generating captions for figures.", "fno": "09093592", "keywords": [ "Image Representation", "Image Retrieval", "Learning Artificial Intelligence", "Natural Language Processing", "Object Detection", "Text Analysis", "Figure Captioning", "Relation Maps", "Line Plots", "Pie Charts", "Bar Charts", "Concise Format", "Figure Caption Generation", "Natural Language Description", "Natural Image Captioning", "Relatively Little Attention", "Automatic Parsing", "Figure Content", "Captioning Model", "Automatic Generating Captions", "Fig CAP Dataset", "Bars", "Training", "Visualization", "Decoding", "Computational Modeling", "Task Analysis", "Portable Document Format" ], "authors": [ { "affiliation": "Ohio University", "fullName": "Charles Chen", "givenName": "Charles", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Duke University", "fullName": "Ruiyi Zhang", "givenName": "Ruiyi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Eunyee Koh", "givenName": "Eunyee", "surname": "Koh", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Sungchul Kim", "givenName": "Sungchul", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Scott Cohen", "givenName": "Scott", "surname": "Cohen", "__typename": "ArticleAuthorType" }, { "affiliation": "Adobe Research", "fullName": "Ryan Rossi", "givenName": "Ryan", "surname": "Rossi", "__typename": "ArticleAuthorType" } ], "idPrefix": "wacv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "1526-1534", "year": "2020", "issn": null, "isbn": "978-1-7281-6553-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09093523", "articleId": "1jPbuLQHNhm", "__typename": "AdjacentArticleType" }, "next": { "fno": "09093638", "articleId": "1jPbdnFWBnW", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdar/2013/4999/0/06628599", "title": "Figure Metadata Extraction from Digital Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628599/12OmNAKM00Y", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2013/4999/0/06628707", "title": "Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features", "doi": null, "abstractUrl": "/proceedings-article/icdar/2013/06628707/12OmNCdBDEx", "parentPublication": { "id": "proceedings/icdar/2013/4999/0", "title": "2013 12th International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2011/1799/0/06120505", "title": "An Automatic System for Extracting Figures and Captions in Biomedical PDF Documents", "doi": null, "abstractUrl": "/proceedings-article/bibm/2011/06120505/12OmNCgJe9W", "parentPublication": { "id": "proceedings/bibm/2011/1799/0", "title": "2011 IEEE International Conference on Bioinformatics and Biomedicine", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/jcdl/2016/4229/0/07559577", "title": "PDFFigures 2.0: Mining figures from research papers", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2016/07559577/12OmNwE9OBq", "parentPublication": { "id": "proceedings/jcdl/2016/4229/0", "title": "2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a789", "title": "Convolutional Neural Networks for Figure Extraction in Historical Technical Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a789/12OmNz6iOhI", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a035", "title": "LineCap: Line Charts for Data Visualization Captioning Models", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a035/1J6hb0AkF20", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdarw/2019/5054/1/505401a074", "title": "DocFigure: A Dataset for Scientific Document Figure Classification", "doi": null, "abstractUrl": "/proceedings-article/icdarw/2019/505401a074/1eLyj2dzwOI", "parentPublication": { "id": "proceedings/icdarw/2019/5054/1", "title": "2019 International Conference on Document Analysis and Recognition Workshops (ICDARW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/11/09085944", "title": "Chart Mining: A Survey of Methods for Automated Chart Analysis", "doi": null, "abstractUrl": "/journal/tp/2021/11/09085944/1jE1Hu1xUzu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093269", "title": "LEAF-QA: Locate, Encode &#x0026; Attend for Figure Question Answering", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093269/1jPbCCFUgrC", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800k0887", "title": "Better Captioning With Sequence-Level Exploration", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800k0887/1m3nUAoUsIE", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4r3R2", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwvVrCj", "doi": "10.1109/CVPR.2009.5206722", "title": "On bias correction for geometric parameter estimation in computer vision", "normalizedTitle": "On bias correction for geometric parameter estimation in computer vision", "abstract": "Maximum likelihood (ML) estimation is widely used in many computer vision problems involving the estimation of geometric parameters, from conic fitting to bundle adjustment for structure and motion. This paper presents a detailed discussion on the bias of ML estimates derived for these problems. Statistical theory states that although ML estimates attain maximum accuracy in the limit as the sample size goes to infinity, they can have non-negligible bias with small sample sizes. In the case of computer vision problems, the ML optimality holds when regarding variance in observation errors as the sample size. A natural question is how large the bias will be for a given strength of observation errors. To answer this for a general class of problems, we analyze the mechanism of how the bias of ML estimates emerges, and show that the differential geometric properties of geometric constraints used in the problems determines the magnitude of bias. Based on this result, we present a numerical method of computing bias-corrected estimates.", "abstracts": [ { "abstractType": "Regular", "content": "Maximum likelihood (ML) estimation is widely used in many computer vision problems involving the estimation of geometric parameters, from conic fitting to bundle adjustment for structure and motion. This paper presents a detailed discussion on the bias of ML estimates derived for these problems. Statistical theory states that although ML estimates attain maximum accuracy in the limit as the sample size goes to infinity, they can have non-negligible bias with small sample sizes. In the case of computer vision problems, the ML optimality holds when regarding variance in observation errors as the sample size. A natural question is how large the bias will be for a given strength of observation errors. To answer this for a general class of problems, we analyze the mechanism of how the bias of ML estimates emerges, and show that the differential geometric properties of geometric constraints used in the problems determines the magnitude of bias. Based on this result, we present a numerical method of computing bias-corrected estimates.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Maximum likelihood (ML) estimation is widely used in many computer vision problems involving the estimation of geometric parameters, from conic fitting to bundle adjustment for structure and motion. This paper presents a detailed discussion on the bias of ML estimates derived for these problems. Statistical theory states that although ML estimates attain maximum accuracy in the limit as the sample size goes to infinity, they can have non-negligible bias with small sample sizes. In the case of computer vision problems, the ML optimality holds when regarding variance in observation errors as the sample size. A natural question is how large the bias will be for a given strength of observation errors. To answer this for a general class of problems, we analyze the mechanism of how the bias of ML estimates emerges, and show that the differential geometric properties of geometric constraints used in the problems determines the magnitude of bias. Based on this result, we present a numerical method of computing bias-corrected estimates.", "fno": "05206722", "keywords": [ "Computer Vision", "Geometry", "Maximum Likelihood Estimation", "Bias Correction", "Geometric Parameter Estimation", "Computer Vision", "Maximum Likelihood Estimation", "Conic Fitting", "Parameter Estimation", "Computer Vision", "Maximum Likelihood Estimation", "Motion Estimation", "Computer Errors", "Gaussian Distribution", "H Infinity Control", "Error Correction", "Error Analysis", "Least Squares Approximation" ], "authors": [ { "affiliation": "Tohoku University, Japan", "fullName": "Takayuki Okatani", "givenName": "Takayuki", "surname": "Okatani", "__typename": "ArticleAuthorType" }, { "affiliation": "Tohoku University, Japan", "fullName": "Koichiro Deguchi", "givenName": "Koichiro", "surname": "Deguchi", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-06-01T00:00:00", "pubType": "proceedings", "pages": "959-966", "year": "2009", "issn": "1063-6919", "isbn": "978-1-4244-3992-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05206721", "articleId": "12OmNqyUUEk", "__typename": "AdjacentArticleType" }, "next": { "fno": "05206719", "articleId": "12OmNAQrYEj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2010/4109/0/4109a005", "title": "Hyper Least Squares and Its Applications", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109a005/12OmNBTawz2", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itng/2015/8828/0/8828a127", "title": "On Bias Corrected Estimators of the Two Parameter Gamma Distribution", "doi": null, "abstractUrl": "/proceedings-article/itng/2015/8828a127/12OmNvAiSCp", "parentPublication": { "id": "proceedings/itng/2015/8828/0", "title": "2015 12th International Conference on Information Technology - New Generations (ITNG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1988/0878/0/00028204", "title": "A new look at system parameter estimation via signal processing", "doi": null, "abstractUrl": "/proceedings-article/icpr/1988/00028204/12OmNwe2IsP", "parentPublication": { "id": "proceedings/icpr/1988/0878/0", "title": "9th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2009/4420/0/05459388", "title": "Improving accuracy of geometric parameter estimation using projected score method", "doi": null, "abstractUrl": "/proceedings-article/iccv/2009/05459388/12OmNx0RISt", "parentPublication": { "id": "proceedings/iccv/2009/4420/0", "title": "2009 IEEE 12th International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icassp/1991/0003/0/00150126", "title": "Performance analysis of parameter estimation of superimposed signals by dynamic programming", "doi": null, "abstractUrl": "/proceedings-article/icassp/1991/00150126/12OmNy50ga8", "parentPublication": { "id": "proceedings/icassp/1991/0003/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2008/3456/0/3456a412", "title": "Post-hoc Correction Techniques for Constrained Parameter Estimation in Computer Vision", "doi": null, "abstractUrl": "/proceedings-article/dicta/2008/3456a412/12OmNyNzhsu", "parentPublication": { "id": "proceedings/dicta/2008/3456/0", "title": "2008 Digital Image Computing: Techniques and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2004/2158/1/01315073", "title": "L/sub /spl infin// minimization in geometric reconstruction problems", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2004/01315073/12OmNz61ds9", "parentPublication": { "id": "proceedings/cvpr/2004/2158/1", "title": "Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issre/1991/2143/0/00145350", "title": "Parameter estimation of the hyper-geometric distribution model for real test/debug data", "doi": null, "abstractUrl": "/proceedings-article/issre/1991/00145350/12OmNzcxZku", "parentPublication": { "id": "proceedings/issre/1991/2143/0", "title": "Proceedings. 1991 International Symposium on Software Reliability Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2017/2715/0/08257976", "title": "Bias correction in clustering coefficient estimation", "doi": null, "abstractUrl": "/proceedings-article/big-data/2017/08257976/17D45XdBRRs", "parentPublication": { "id": "proceedings/big-data/2017/2715/0", "title": "2017 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08794768", "title": "Evaluating Perceptual Bias During Geometric Scaling of Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2020/01/08794768/1cr2ZlCC2xG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMF8oE0kI8", "title": "2019 23rd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF8TTAeAw", "doi": "10.1109/IV.2019.00020", "title": "A Technique for Selection and Drawing of Scatterplots for Multi-Dimensional Data Visualization", "normalizedTitle": "A Technique for Selection and Drawing of Scatterplots for Multi-Dimensional Data Visualization", "abstract": "Scatterplot matrix and parallel coordinate plots are well-used multi-dimensional data visualization techniques. These techniques have a problem that they need a very large screen space when an input dataset has an enormous number of dimensions. To solve this problem, we propose a method for selecting important scatterplots from all scatterplots generated from input datasets and for drawing the scatterplots as &#x201D;outliers&#x201D; and &#x201D;regions enclosing non-outlier plots.&#x201D; The technique is useful for users to determine whether to delete outliers from the datasets and form mathematical models of non-outlier plots. This paper introduces an example of visualization using this technique with a retail transaction dataset and climate values.", "abstracts": [ { "abstractType": "Regular", "content": "Scatterplot matrix and parallel coordinate plots are well-used multi-dimensional data visualization techniques. These techniques have a problem that they need a very large screen space when an input dataset has an enormous number of dimensions. To solve this problem, we propose a method for selecting important scatterplots from all scatterplots generated from input datasets and for drawing the scatterplots as &#x201D;outliers&#x201D; and &#x201D;regions enclosing non-outlier plots.&#x201D; The technique is useful for users to determine whether to delete outliers from the datasets and form mathematical models of non-outlier plots. This paper introduces an example of visualization using this technique with a retail transaction dataset and climate values.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Scatterplot matrix and parallel coordinate plots are well-used multi-dimensional data visualization techniques. These techniques have a problem that they need a very large screen space when an input dataset has an enormous number of dimensions. To solve this problem, we propose a method for selecting important scatterplots from all scatterplots generated from input datasets and for drawing the scatterplots as ”outliers” and ”regions enclosing non-outlier plots.” The technique is useful for users to determine whether to delete outliers from the datasets and form mathematical models of non-outlier plots. This paper introduces an example of visualization using this technique with a retail transaction dataset and climate values.", "fno": "283800a062", "keywords": [ "Climatology", "Data Analysis", "Data Mining", "Data Visualisation", "Matrix Algebra", "Retail Data Processing", "Transaction Processing", "Nonoutlier Plots", "Retail Transaction Dataset", "Climate Values", "Scatterplot Matrix", "Multidimensional Data Visualization Techniques", "Screen Space", "Input Dataset", "Mathematical Models", "Data Visualization", "Mathematical Model", "Correlation", "Meteorology", "Market Research", "Image Color Analysis", "Data Mining", "Multi Dimensional Data Visualization Scatterplot" ], "authors": [ { "affiliation": "Ochanomizu University", "fullName": "Takayuki Itoh", "givenName": "Takayuki", "surname": "Itoh", "__typename": "ArticleAuthorType" }, { "affiliation": "Ochanomizu University", "fullName": "Asuka Nakabayashi", "givenName": "Asuka", "surname": "Nakabayashi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "62-67", "year": "2019", "issn": null, "isbn": "978-1-7281-2838-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "283800a056", "articleId": "1cMFaoRMwYE", "__typename": "AdjacentArticleType" }, "next": { "fno": "283800a068", "articleId": "1cMFafh6Ttu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iv/2017/0831/0/0831a078", "title": "A Scatterplots Selection Technique for Multi-dimensional Data Visualization Combining with Parallel Coordinate Plots", "doi": null, "abstractUrl": "/proceedings-article/iv/2017/0831a078/12OmNARRYtP", "parentPublication": { "id": "proceedings/iv/2017/0831/0", "title": "2017 21st International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2016/8942/0/8942a063", "title": "Time-Varying Data Visualization Using Clustered Heatmap and Dual Scatterplots", "doi": null, "abstractUrl": "/proceedings-article/iv/2016/8942a063/12OmNqJHFtQ", "parentPublication": { "id": "proceedings/iv/2016/8942/0", "title": "2016 20th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/10/08078198", "title": "Cartogram Visualization for Bivariate Geo-Statistical Data", "doi": null, "abstractUrl": "/journal/tg/2018/10/08078198/13rRUx0xPZE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06875982", "title": "Visual Abstraction and Exploration of Multi-class Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2014/12/06875982/13rRUygT7ye", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09904433", "title": "Evaluating the Use of Uncertainty Visualisations for Imputations of Data Missing At Random in Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2023/01/09904433/1H1gkkbe0hy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2022/6814/0/681400a122", "title": "An Extended Scatterplot Selection Technique for Representing Three Numeric Variables", "doi": null, "abstractUrl": "/proceedings-article/cw/2022/681400a122/1I6RMxpWlLG", "parentPublication": { "id": "proceedings/cw/2022/6814/0", "title": "2022 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809844", "title": "A Recursive Subdivision Technique for Sampling Multi-class Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809844/1cHEfHRrSOQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09226404", "title": "Evaluation of Sampling Methods for Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2021/02/09226404/1nYqk0TjyeY", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2020/8316/0/831600a372", "title": "LP-Explain: Local Pictorial Explanation for Outliers", "doi": null, "abstractUrl": "/proceedings-article/icdm/2020/831600a372/1r54AqoaifC", "parentPublication": { "id": "proceedings/icdm/2020/8316/0", "title": "2020 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09556578", "title": "The Weighted Average Illusion: Biases in Perceived Mean Position in Scatterplots", "doi": null, "abstractUrl": "/journal/tg/2022/01/09556578/1xlvYaEQTNC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMFqXmYQRW", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)", "acronym": "icse", "groupId": "1000691", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMFvs0gd6o", "doi": "10.1109/ICSE.2019.00079", "title": "Investigating the Effects of Gender Bias on GitHub", "normalizedTitle": "Investigating the Effects of Gender Bias on GitHub", "abstract": "Diversity, including gender diversity, is valued by many software development organizations, yet the field remains dominated by men. One reason for this lack of diversity is gender bias. In this paper, we study the effects of that bias by using an existing framework derived from the gender studies literature.We adapt the four main effects proposed in the framework by posing hypotheses about how they might manifest on GitHub,then evaluate those hypotheses quantitatively. While our results how that effects of gender bias are largely invisible on the GitHub platform itself, there are still signals of women concentrating their work in fewer places and being more restrained in communication than men.", "abstracts": [ { "abstractType": "Regular", "content": "Diversity, including gender diversity, is valued by many software development organizations, yet the field remains dominated by men. One reason for this lack of diversity is gender bias. In this paper, we study the effects of that bias by using an existing framework derived from the gender studies literature.We adapt the four main effects proposed in the framework by posing hypotheses about how they might manifest on GitHub,then evaluate those hypotheses quantitatively. While our results how that effects of gender bias are largely invisible on the GitHub platform itself, there are still signals of women concentrating their work in fewer places and being more restrained in communication than men.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Diversity, including gender diversity, is valued by many software development organizations, yet the field remains dominated by men. One reason for this lack of diversity is gender bias. In this paper, we study the effects of that bias by using an existing framework derived from the gender studies literature.We adapt the four main effects proposed in the framework by posing hypotheses about how they might manifest on GitHub,then evaluate those hypotheses quantitatively. While our results how that effects of gender bias are largely invisible on the GitHub platform itself, there are still signals of women concentrating their work in fewer places and being more restrained in communication than men.", "fno": "086900a700", "keywords": [ "Gender Issues", "Software Development Management", "Software Metrics", "Gender Bias", "Gender Diversity", "Software Development Organizations", "Gender Studies", "Git Hub", "Software", "Software Engineering", "Companies", "Correlation", "Encoding", "Computer Science", "Gender Bias", "Software Engineering" ], "authors": [ { "affiliation": "North Carolina State University", "fullName": "Nasif Imtiaz", "givenName": "Nasif", "surname": "Imtiaz", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University", "fullName": "Justin Middleton", "givenName": "Justin", "surname": "Middleton", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University", "fullName": "Joymallya Chakraborty", "givenName": "Joymallya", "surname": "Chakraborty", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University", "fullName": "Neill Robson", "givenName": "Neill", "surname": "Robson", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University", "fullName": "Gina Bai", "givenName": "Gina", "surname": "Bai", "__typename": "ArticleAuthorType" }, { "affiliation": "Google LLC", "fullName": "Emerson Murphy-Hill", "givenName": "Emerson", "surname": "Murphy-Hill", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-05-01T00:00:00", "pubType": "proceedings", "pages": "700-711", "year": "2019", "issn": null, "isbn": "978-1-7281-0869-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "086900a688", "articleId": "1cMFtEI5ea4", "__typename": "AdjacentArticleType" }, "next": { "fno": "086900a712", "articleId": "1cMFwUT1qb6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ge/2018/5738/0/573801a014", "title": "Gender Bias in Artificial Intelligence: The Need for Diversity and Gender Theory in Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/ge/2018/573801a014/13l5NXTR1sw", "parentPublication": { "id": "proceedings/ge/2018/5738/0", "title": "2018 IEEE/ACM 1st International Workshop on Gender Equality in Software Engineering (GE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2019/01/08491276", "title": "OpenStack Gender Diversity Report", "doi": null, "abstractUrl": "/magazine/so/2019/01/08491276/17D45WnnFYb", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08658912", "title": "Going Beyond Gender Balance: Understanding the Intersection of Gender and the Engineering Experiences of Alumni", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08658912/18j9iDlPVCg", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2022/9594/0/959400a001", "title": "A New Approach Towards Ensuring Gender Inclusive SE Job Advertisements", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2022/959400a001/1EmrgmV2yGc", "parentPublication": { "id": "proceedings/icse-seis/2022/9594/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2022/9342/0/934200a056", "title": "Seeking New Measures for Gender Bias Effects in Open-Source Software", "doi": null, "abstractUrl": "/proceedings-article/chase/2022/934200a056/1Eo5M6pq9m8", "parentPublication": { "id": "proceedings/chase/2022/9342/0", "title": "2022 IEEE/ACM 15th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833146", "title": "Evaluating Gender Bias in Pair Programming Conversations with an Agent", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833146/1FUSK75ML7y", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/03/09120355", "title": "Gender Differences in Personality Traits of Software Engineers", "doi": null, "abstractUrl": "/journal/ts/2022/03/09120355/1kLe91Ts2Ck", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/so/2021/02/09250363", "title": "Insights Into Nonmerged Pull Requests in GitHub: Is There Evidence of Bias Based on Perceptible Race?", "doi": null, "abstractUrl": "/magazine/so/2021/02/09250363/1oxkjlJSimA", "parentPublication": { "id": "mags/so", "title": "IEEE Software", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/respect/2020/7172/1/09272454", "title": "A Lightweight Intervention to Decrease Gender Bias in Student Evaluations of Teaching", "doi": null, "abstractUrl": "/proceedings-article/respect/2020/09272454/1phRX13xrlS", "parentPublication": { "id": "proceedings/respect/2020/7172/1", "title": "2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/respect/2021/4905/0/09620659", "title": "CS1 Students&#x0027; Perspectives on the Computer Science Gender Gap: Achieving Equity Requires Awareness", "doi": null, "abstractUrl": "/proceedings-article/respect/2021/09620659/1yXuIb7pwKk", "parentPublication": { "id": "proceedings/respect/2021/4905/0", "title": "2021 Conference on Research in Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqJ8tgY", "title": "2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C)", "acronym": "icse-c", "groupId": "1002125", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNASraVb", "doi": "", "title": "Toward Arbitrary Mapping for Debugging Visualizations", "normalizedTitle": "Toward Arbitrary Mapping for Debugging Visualizations", "abstract": "Despite the progress that has been made in the field of program visualization, programmers nowadays still rely on inserting extra code (e.g. print statements) to visualize complicated program states during debugging. There are many obstacles that have impeded and continue to impede program visualization for practical use. One such major obstacle is that a wide variety of data types and interpretations from data to visualizations are arbitrary. It is unlikely that visualizations will be available a priori to cover everything that might be of interest. In an attempt to address the problem, a debugging visualization tool called xDIVA is presented here. A practical application of xDIVA in EDA(Electronic Design Automation) industry is described. Demonstrations and tool download can be accessed at ''http://oolab.csie.ncu.edu.tw/xDIVA''.", "abstracts": [ { "abstractType": "Regular", "content": "Despite the progress that has been made in the field of program visualization, programmers nowadays still rely on inserting extra code (e.g. print statements) to visualize complicated program states during debugging. There are many obstacles that have impeded and continue to impede program visualization for practical use. One such major obstacle is that a wide variety of data types and interpretations from data to visualizations are arbitrary. It is unlikely that visualizations will be available a priori to cover everything that might be of interest. In an attempt to address the problem, a debugging visualization tool called xDIVA is presented here. A practical application of xDIVA in EDA(Electronic Design Automation) industry is described. Demonstrations and tool download can be accessed at ''http://oolab.csie.ncu.edu.tw/xDIVA''.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Despite the progress that has been made in the field of program visualization, programmers nowadays still rely on inserting extra code (e.g. print statements) to visualize complicated program states during debugging. There are many obstacles that have impeded and continue to impede program visualization for practical use. One such major obstacle is that a wide variety of data types and interpretations from data to visualizations are arbitrary. It is unlikely that visualizations will be available a priori to cover everything that might be of interest. In an attempt to address the problem, a debugging visualization tool called xDIVA is presented here. A practical application of xDIVA in EDA(Electronic Design Automation) industry is described. Demonstrations and tool download can be accessed at ''http://oolab.csie.ncu.edu.tw/xDIVA''.", "fno": "4205a605", "keywords": [ "Data Visualization", "Visualization", "Debugging", "Computer Languages", "Shape", "Integrated Circuits", "Industries", "Visualization", "Debugging Visualization", "Debuggers" ], "authors": [ { "affiliation": null, "fullName": "Yung-Pin Cheng", "givenName": "Yung-Pin", "surname": "Cheng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chiu-Yu Ku", "givenName": "Chiu-Yu", "surname": "Ku", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Wei-Chen Pan", "givenName": "Wei-Chen", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chuan Yang", "givenName": "Chuan", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ting-Shu Lin", "givenName": "Ting-Shu", "surname": "Lin", "__typename": "ArticleAuthorType" } ], "idPrefix": "icse-c", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "605-608", "year": "2016", "issn": null, "isbn": "978-1-4503-4205-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4205a601", "articleId": "12OmNAFFdIh", "__typename": "AdjacentArticleType" }, "next": { "fno": "4205a609", "articleId": "12OmNyuya9j", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2016/1790/0/07757692", "title": "Learning principles in program visualizations: A systematic literature review", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757692/12OmNroijlX", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1994/5602/0/0288199", "title": "Toward flexible control of the temporal mapping from concurrent program events to animations", "doi": null, "abstractUrl": "/proceedings-article/ipps/1994/0288199/12OmNvkGW6b", "parentPublication": { "id": "proceedings/ipps/1994/5602/0", "title": "Parallel Processing Symposium, International", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hics/1998/8341/0/83410160", "title": "Cognitive Activities and Support in Debugging", "doi": null, "abstractUrl": "/proceedings-article/hics/1998/83410160/12OmNwtn3Eu", "parentPublication": { "id": "proceedings/hics/1998/8341/0", "title": "Human Interaction with Complex Systems, Annual Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740640", "title": "A visualization-based environment for top-down debugging of parallel programs", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740640/12OmNwwd2VH", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mascot/1994/5292/0/00284394", "title": "On-the-fly visualization and debugging of parallel programs", "doi": null, "abstractUrl": "/proceedings-article/mascot/1994/00284394/12OmNxecRYJ", "parentPublication": { "id": "proceedings/mascot/1994/5292/0", "title": "Proceedings of International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vissoft/2014/6150/0/6150a112", "title": "The Challenge of Helping the Programmer during Debugging", "doi": null, "abstractUrl": "/proceedings-article/vissoft/2014/6150a112/12OmNzYwc3V", "parentPublication": { "id": "proceedings/vissoft/2014/6150/0", "title": "2014 Second IEEE Working Conference on Software Visualization (VISSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2018/5663/0/566301a089", "title": "VisuFlow: A Debugging Environment for Static Analyses", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2018/566301a089/13bd1gCd7Tl", "parentPublication": { "id": "proceedings/icse-companion/2018/5663/0", "title": "2018 IEEE/ACM 40th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2021/02/08580420", "title": "Fault Analysis and Debugging of Microservice Systems: Industrial Survey, Benchmark System, and Empirical Study", "doi": null, "abstractUrl": "/journal/ts/2021/02/08580420/17D45W9KVH4", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833002", "title": "Time-Travel Debugging with Visualization of Data-Structures Based on Instrumentation", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833002/1FUSHmZwgow", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2019/1736/0/173600a194", "title": "Suspend-Less Debugging for Interactive and/or Realtime Programs", "doi": null, "abstractUrl": "/proceedings-article/icst/2019/173600a194/1aDT6DMuliw", "parentPublication": { "id": "proceedings/icst/2019/1736/0", "title": "2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirc", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "acronym": "bibe", "groupId": "1000075", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WgziPp", "doi": "10.1109/BIBE.2018.00067", "title": "Using NIRS to Detect Brain oxyHb Changes During Short-Term Memory Tasks", "normalizedTitle": "Using NIRS to Detect Brain oxyHb Changes During Short-Term Memory Tasks", "abstract": "We performed subjective physiological assessment of brain activity using the visually performed n-back task and the n-back task performed by the auditory sense. The visually performed n-back task was done with two tasks that were performed while memorizing presented numbers and the result of computational problems. We characterized and compared the oxygenated hemoglobin concentration change in the brain during the working memory task using near-infrared spectroscopy measurement. Changes in activation of brain activity were observed due to differences in tasks. The difference in the presentation method resulted in a difference in activation of brain activity. Furthermore, the computational n-back task with execution function in working memory induced more brain activity than the usual n-back task. Thus, the computed n-back task is a suitable task to train workers.", "abstracts": [ { "abstractType": "Regular", "content": "We performed subjective physiological assessment of brain activity using the visually performed n-back task and the n-back task performed by the auditory sense. The visually performed n-back task was done with two tasks that were performed while memorizing presented numbers and the result of computational problems. We characterized and compared the oxygenated hemoglobin concentration change in the brain during the working memory task using near-infrared spectroscopy measurement. Changes in activation of brain activity were observed due to differences in tasks. The difference in the presentation method resulted in a difference in activation of brain activity. Furthermore, the computational n-back task with execution function in working memory induced more brain activity than the usual n-back task. Thus, the computed n-back task is a suitable task to train workers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We performed subjective physiological assessment of brain activity using the visually performed n-back task and the n-back task performed by the auditory sense. The visually performed n-back task was done with two tasks that were performed while memorizing presented numbers and the result of computational problems. We characterized and compared the oxygenated hemoglobin concentration change in the brain during the working memory task using near-infrared spectroscopy measurement. Changes in activation of brain activity were observed due to differences in tasks. The difference in the presentation method resulted in a difference in activation of brain activity. Furthermore, the computational n-back task with execution function in working memory induced more brain activity than the usual n-back task. Thus, the computed n-back task is a suitable task to train workers.", "fno": "247100a311", "keywords": [ "Biomedical Measurement", "Bio Optics", "Brain", "Infrared Spectra", "Neurophysiology", "Proteins", "Short Term Memory Tasks", "Subjective Physiological Assessment", "Brain Activity", "Oxygenated Hemoglobin Concentration Change", "Working Memory Task", "Brain Oxy Hb Changes", "NIRS", "Auditory Sense", "Visually Performed N Back Task", "Near Infrared Spectroscopy Measurement", "Task Analysis", "Auditory System", "Sleep", "Psychology", "Sociology", "Statistics", "NIRS", "Oxy Hb", "N Back Task", "NASA TLX", "RAS" ], "authors": [ { "affiliation": null, "fullName": "Takuya Sasabe", "givenName": "Takuya", "surname": "Sasabe", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Hiroshi Hagiwara", "givenName": "Hiroshi", "surname": "Hagiwara", "__typename": "ArticleAuthorType" } ], "idPrefix": "bibe", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-10-01T00:00:00", "pubType": "proceedings", "pages": "311-314", "year": "2018", "issn": null, "isbn": "978-1-5386-6217-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "247100a305", "articleId": "17D45WwsQ7R", "__typename": "AdjacentArticleType" }, "next": { "fno": "247100a315", "articleId": "17D45VsBTTU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/snpd/2014/5604/0/06888727", "title": "Brain activity measurement during program comprehension with NIRS", "doi": null, "abstractUrl": "/proceedings-article/snpd/2014/06888727/12OmNAfy7HZ", "parentPublication": { "id": "proceedings/snpd/2014/5604/0", "title": "2014 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/is3c/2016/3071/0/3071a247", "title": "The Performance Comparison of Two Kinds of Decoders in Brain-Machine Interface", "doi": null, "abstractUrl": "/proceedings-article/is3c/2016/3071a247/12OmNrkBwE6", "parentPublication": { "id": "proceedings/is3c/2016/3071/0", "title": "2016 International Symposium on Computer, Consumer and Control (IS3C)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/prni/2012/4765/0/4765a061", "title": "Decoding Spontaneous Brain Activity from fMRI Using Gaussian Processes: Tracking Brain Reactivation", "doi": null, "abstractUrl": "/proceedings-article/prni/2012/4765a061/12OmNwE9ODq", "parentPublication": { "id": "proceedings/prni/2012/4765/0", "title": "Pattern Recognition in NeuroImaging, IEEE International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smrlo/2016/9941/0/9941a197", "title": "Brain Inspired Automatic Directory", "doi": null, "abstractUrl": "/proceedings-article/smrlo/2016/9941a197/12OmNwdbVaf", "parentPublication": { "id": "proceedings/smrlo/2016/9941/0", "title": "2016 Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2017/3567/0/356701a110", "title": "EEG Brain Connectivity Analysis to Detect Driver Drowsiness Using Coherence", "doi": null, "abstractUrl": "/proceedings-article/fit/2017/356701a110/12OmNxIRxUT", "parentPublication": { "id": "proceedings/fit/2017/3567/0", "title": "2017 International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2013/2885/0/06805906", "title": "Brain Waves Reflect Your Memories", "doi": null, "abstractUrl": "/proceedings-article/gcis/2013/06805906/12OmNzmclFh", "parentPublication": { "id": "proceedings/gcis/2013/2885/0", "title": "2013 Fourth Global Congress on Intelligent Systems (GCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2018/6217/0/247100a247", "title": "Psycho-Physiological Changes Depend on Differences in the Presentation Ratio of Non-target Stimuli", "doi": null, "abstractUrl": "/proceedings-article/bibe/2018/247100a247/17D45XeKgpD", "parentPublication": { "id": "proceedings/bibe/2018/6217/0", "title": "2018 IEEE 18th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09854202", "title": "Event Related Brain Responses Reveal the Impact of Spatial Augmented Reality Predictive Cues on Mental Effort", "doi": null, "abstractUrl": "/journal/tg/5555/01/09854202/1FJ0TF9D3Jm", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a046", "title": "PRAGMA: Interactively Constructing Functional Brain Parcellations", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a046/1qROcmsxnYA", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2020/8571/0/857100a039", "title": "A Paradigm for Working Memory Research : The N-Back Tasks Collaborating with Information Theory", "doi": null, "abstractUrl": "/proceedings-article/icphds/2020/857100a039/1rxht5YTiDu", "parentPublication": { "id": "proceedings/icphds/2020/8571/0", "title": "2020 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cpqjBXCukg", "title": "2019 IEEE Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMF6tApFao", "doi": "10.1109/PacificVis.2019.00017", "title": "The Role of Working Memory Capacity in Graph Reading Performance", "normalizedTitle": "The Role of Working Memory Capacity in Graph Reading Performance", "abstract": "We process information in memory and different people have different memory capacity. It is therefore important to understand possible impact of memory capacity when it comes to graph comprehension. In an attempt towards this direction, we conducted a user study investigating the impact of working memory capacity on graph reading task performance. Forty-six university students participated in the study performing a graph reading task with one hundred graph drawings of different complexity levels. Their working memory capacity and task performance (accuracy and time) were measured and recorded. The results of regression analyses indicated that working memory capacity was a significant predictor of performance accuracy, but not for response time. In this paper, we present the details of the study and discuss our findings and limitations of the study. Possible future research directions are also suggested.", "abstracts": [ { "abstractType": "Regular", "content": "We process information in memory and different people have different memory capacity. It is therefore important to understand possible impact of memory capacity when it comes to graph comprehension. In an attempt towards this direction, we conducted a user study investigating the impact of working memory capacity on graph reading task performance. Forty-six university students participated in the study performing a graph reading task with one hundred graph drawings of different complexity levels. Their working memory capacity and task performance (accuracy and time) were measured and recorded. The results of regression analyses indicated that working memory capacity was a significant predictor of performance accuracy, but not for response time. In this paper, we present the details of the study and discuss our findings and limitations of the study. Possible future research directions are also suggested.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We process information in memory and different people have different memory capacity. It is therefore important to understand possible impact of memory capacity when it comes to graph comprehension. In an attempt towards this direction, we conducted a user study investigating the impact of working memory capacity on graph reading task performance. Forty-six university students participated in the study performing a graph reading task with one hundred graph drawings of different complexity levels. Their working memory capacity and task performance (accuracy and time) were measured and recorded. The results of regression analyses indicated that working memory capacity was a significant predictor of performance accuracy, but not for response time. In this paper, we present the details of the study and discuss our findings and limitations of the study. Possible future research directions are also suggested.", "fno": "922600a077", "keywords": [ "Data Visualisation", "Graph Theory", "Regression Analysis", "Graph Reading Task Performance", "Working Memory Capacity", "Graph Comprehension", "Graph Drawings", "Regression Analyses", "Task Analysis", "Complexity Theory", "Data Visualization", "Regression Analysis", "Psychology", "Australia", "Atmospheric Measurements", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods" ], "authors": [ { "affiliation": "Western Sydney University", "fullName": "Ciara Fletcher", "givenName": "Ciara", "surname": "Fletcher", "__typename": "ArticleAuthorType" }, { "affiliation": "Swinburne University of Technology", "fullName": "Weidong Huang", "givenName": "Weidong", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Western Sydney University", "fullName": "David Arness", "givenName": "David", "surname": "Arness", "__typename": "ArticleAuthorType" }, { "affiliation": "Western Sydney University", "fullName": "Quang Vinh Nguyen", "givenName": "Quang Vinh", "surname": "Nguyen", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-04-01T00:00:00", "pubType": "proceedings", "pages": "77-81", "year": "2019", "issn": null, "isbn": "978-1-5386-9226-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "922600a047", "articleId": "1cMF84PcOCQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "922600a082", "articleId": "1cMF8150We4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2014/4038/0/4038a520", "title": "Learners' Working Memory Capacity Modeling Based on Fuzzy Logic", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a520/12OmNAY79fh", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2009/4404/0/04906848", "title": "A graph reading behavior: Geodesic-path tendency", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2009/04906848/12OmNAmE60c", "parentPublication": { "id": "proceedings/pacificvis/2009/4404/0", "title": "2009 IEEE Pacific Visualization Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2013/5009/0/5009a333", "title": "Recommendation Mechanism Based on Students' Working Memory Capacity in Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/icalt/2013/5009a333/12OmNrJiCDl", "parentPublication": { "id": "proceedings/icalt/2013/5009/0", "title": "2013 IEEE 13th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2015/7334/0/7334a118", "title": "The Effect of Signals in Hypertext Reading by Tablet Computers", "doi": null, "abstractUrl": "/proceedings-article/icalt/2015/7334a118/12OmNxHJ9rX", "parentPublication": { "id": "proceedings/icalt/2015/7334/0", "title": "2015 IEEE 15th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142841", "title": "Work in progress — The role of working memory and epistemic beliefs on open-ended problem solving", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142841/12OmNy4r3Xr", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/devlrn/2005/9226/0/01490944", "title": "Impaired visual working memory capacity in case of motion direction and??color-shape feature binding", "doi": null, "abstractUrl": "/proceedings-article/devlrn/2005/01490944/12OmNzRHOSK", "parentPublication": { "id": "proceedings/devlrn/2005/9226/0", "title": "International Conference on Development and Learning", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a057", "title": "Adaptive Recommendations to Students Based on Working Memory Capacity", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a057/12OmNzmtWvx", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797797", "title": "Working Memory Load Performance Based on Collocation of Virtual and Physical Hands", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797797/1cJ1gejsg2Q", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iri/2019/1337/0/133700a208", "title": "Eye Tracking Area of Interest in the Context of Working Memory Capacity Tasks", "doi": null, "abstractUrl": "/proceedings-article/iri/2019/133700a208/1dUngc0AhR6", "parentPublication": { "id": "proceedings/iri/2019/1337/0", "title": "2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2020/8571/0/857100a039", "title": "A Paradigm for Working Memory Research : The N-Back Tasks Collaborating with Information Theory", "doi": null, "abstractUrl": "/proceedings-article/icphds/2020/857100a039/1rxht5YTiDu", "parentPublication": { "id": "proceedings/icphds/2020/8571/0", "title": "2020 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1dsfR2yEMbS", "title": "2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vl-hcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1dsfSv30u52", "doi": "10.1109/VLHCC.2019.8818870", "title": "Toward Accessible Graphics and Visualization (Invited Keynote)", "normalizedTitle": "Toward Accessible Graphics and Visualization (Invited Keynote)", "abstract": "Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Computer science has become an increasingly visual discipline. Tools in a wide variety of domains, from gaming environments to programming or scientific ones, use graphics for a variety of purposes (e.g., entertainment, knowledge acquisition, general user interactions). While the impact is clear enough for the general population, the disabilities community can have significant challenges in using such content, especially the blind or visually impaired. In this talk, we will discuss the research challenges involved in making graphical and visualization technologies accessible. This will include discussion of new techniques for designing interactive graphical applications that are usable even by those that cannot see the screen.", "abstracts": [ { "abstractType": "Regular", "content": "Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Computer science has become an increasingly visual discipline. Tools in a wide variety of domains, from gaming environments to programming or scientific ones, use graphics for a variety of purposes (e.g., entertainment, knowledge acquisition, general user interactions). While the impact is clear enough for the general population, the disabilities community can have significant challenges in using such content, especially the blind or visually impaired. In this talk, we will discuss the research challenges involved in making graphical and visualization technologies accessible. This will include discussion of new techniques for designing interactive graphical applications that are usable even by those that cannot see the screen.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Computer science has become an increasingly visual discipline. Tools in a wide variety of domains, from gaming environments to programming or scientific ones, use graphics for a variety of purposes (e.g., entertainment, knowledge acquisition, general user interactions). While the impact is clear enough for the general population, the disabilities community can have significant challenges in using such content, especially the blind or visually impaired. In this talk, we will discuss the research challenges involved in making graphical and visualization technologies accessible. This will include discussion of new techniques for designing interactive graphical applications that are usable even by those that cannot see the screen.", "fno": "08818870", "keywords": [ "Data Visualisation", "Handicapped Aids", "Interactive Systems", "User Interfaces", "Disabilities Community", "Interactive Graphical Applications", "Graphical Technologies", "Visualization Technologies", "Visualization", "Statistics", "Software", "Sociology", "Programming Profession", "Entertainment Industry", "Data Visualization" ], "authors": [ { "affiliation": "Department of Computer Science, University of Nevada, Las Vegas, Las Vegas, Nevada, USA", "fullName": "Andreas Stefik", "givenName": "Andreas", "surname": "Stefik", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl-hcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "3-3", "year": "2019", "issn": null, "isbn": "978-1-7281-0810-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08818860", "articleId": "1dsfS17KfVm", "__typename": "AdjacentArticleType" }, "next": { "fno": "08818832", "articleId": "1dsfUTwV6Bq", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/re/2017/3191/0/3191a512", "title": "Toward Automating Crowd RE", "doi": null, "abstractUrl": "/proceedings-article/re/2017/3191a512/12OmNAq3hMI", "parentPublication": { "id": "proceedings/re/2017/3191/0", "title": "2017 IEEE 25th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a268", "title": "Workshop on augmented reality for good", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a268/12OmNB8Cjak", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vaat/2015/6518/0/07155402", "title": "Gaming and entertainment technologies for includification", "doi": null, "abstractUrl": "/proceedings-article/vaat/2015/07155402/12OmNBpEeWb", "parentPublication": { "id": "proceedings/vaat/2015/6518/0", "title": "2015 3rd IEEE VR International Workshop on Virtual and Augmented Assistive Technology (VAAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670d829", "title": "Inter-Generational Comparison of Social Media Use: Investigating the Online Behavior of Different Generational Cohorts", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670d829/12OmNrkBwpL", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-iscmht/2017/1023/0/08338610", "title": "Playable cities: A short survey (Keynote paper)", "doi": null, "abstractUrl": "/proceedings-article/iciev-iscmht/2017/08338610/12OmNz5s0Qd", "parentPublication": { "id": "proceedings/iciev-iscmht/2017/1023/0", "title": "2017 6th International Conference on Informatics, Electronics and Vision & 2017 7th International Symposium in Computational Medical and Health Technology (ICIEV-ISCMHT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nicoint/2016/2305/0/2305a128", "title": "MIB: A Bubble Maker Type Media Recorder", "doi": null, "abstractUrl": "/proceedings-article/nicoint/2016/2305a128/12OmNzcPAaI", "parentPublication": { "id": "proceedings/nicoint/2016/2305/0", "title": "2016 Nicograph International (NicoInt)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07759987", "title": "The future of brain-computer interfacing (keynote paper)", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07759987/12OmNzt0IKi", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2018/02/mic2018020062", "title": "Toward Accessible Authentication: Learning from People with Visual Impairments", "doi": null, "abstractUrl": "/magazine/ic/2018/02/mic2018020062/13rRUxcKzSY", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/contie/2020/8342/0/834200a133", "title": "Development of an Accessible Website for People with Visual Disability on Personal Software Process (PSP)", "doi": null, "abstractUrl": "/proceedings-article/contie/2020/834200a133/1sZ2TejPkti", "parentPublication": { "id": "proceedings/contie/2020/8342/0", "title": "2020 3rd International Conference of Inclusive Technology and Education (CONTIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576226", "title": "Changing Computing To Make It &#x201C;For All&#x201D; (Invited Keynote)", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576226/1y63pL31K5a", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oFGBxwA7AI", "title": "2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)", "acronym": "micro", "groupId": "1000440", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oFGGbRD5zW", "doi": "10.1109/MICRO50266.2020.00039", "title": "DUAL: Acceleration of Clustering Algorithms using Digital-based Processing In-Memory", "normalizedTitle": "DUAL: Acceleration of Clustering Algorithms using Digital-based Processing In-Memory", "abstract": "Today's applications generate a large amount of data that need to be processed by learning algorithms. In practice, the majority of the data are not associated with any labels. Unsupervised learning, i.e., clustering methods, are the most commonly used algorithms for data analysis. However, running clustering algorithms on traditional cores results in high energy consumption and slow processing speed due to a large amount of data movement between memory and processing units. In this paper, we propose DUAL, a Digital-based Unsupervised learning AcceLeration, which supports a wide range of popular algorithms on conventional crossbar memory. Instead of working with the original data, DUAL maps all data points into high-dimensional space, replacing complex clustering operations with memory-friendly operations. We accordingly design a PIM-based architecture that supports all essential operations in a highly parallel and scalable way. DUAL supports a wide range of essential operations and enables in-place computations, allowing data points to remain in memory. We have evaluated DUAL on several popular clustering algorithms for a wide range of large-scale datasets. Our evaluation shows that DUAL provides a comparable quality to existing clustering algorithms while using a binary representation and a simplified distance metric. DUAL also provides 58.8&#x00D7; speedup and 251.2&#x00D7; energy efficiency improvement as compared to the state-of-the-art solution running on GPU.", "abstracts": [ { "abstractType": "Regular", "content": "Today's applications generate a large amount of data that need to be processed by learning algorithms. In practice, the majority of the data are not associated with any labels. Unsupervised learning, i.e., clustering methods, are the most commonly used algorithms for data analysis. However, running clustering algorithms on traditional cores results in high energy consumption and slow processing speed due to a large amount of data movement between memory and processing units. In this paper, we propose DUAL, a Digital-based Unsupervised learning AcceLeration, which supports a wide range of popular algorithms on conventional crossbar memory. Instead of working with the original data, DUAL maps all data points into high-dimensional space, replacing complex clustering operations with memory-friendly operations. We accordingly design a PIM-based architecture that supports all essential operations in a highly parallel and scalable way. DUAL supports a wide range of essential operations and enables in-place computations, allowing data points to remain in memory. We have evaluated DUAL on several popular clustering algorithms for a wide range of large-scale datasets. Our evaluation shows that DUAL provides a comparable quality to existing clustering algorithms while using a binary representation and a simplified distance metric. DUAL also provides 58.8&#x00D7; speedup and 251.2&#x00D7; energy efficiency improvement as compared to the state-of-the-art solution running on GPU.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Today's applications generate a large amount of data that need to be processed by learning algorithms. In practice, the majority of the data are not associated with any labels. Unsupervised learning, i.e., clustering methods, are the most commonly used algorithms for data analysis. However, running clustering algorithms on traditional cores results in high energy consumption and slow processing speed due to a large amount of data movement between memory and processing units. In this paper, we propose DUAL, a Digital-based Unsupervised learning AcceLeration, which supports a wide range of popular algorithms on conventional crossbar memory. Instead of working with the original data, DUAL maps all data points into high-dimensional space, replacing complex clustering operations with memory-friendly operations. We accordingly design a PIM-based architecture that supports all essential operations in a highly parallel and scalable way. DUAL supports a wide range of essential operations and enables in-place computations, allowing data points to remain in memory. We have evaluated DUAL on several popular clustering algorithms for a wide range of large-scale datasets. Our evaluation shows that DUAL provides a comparable quality to existing clustering algorithms while using a binary representation and a simplified distance metric. DUAL also provides 58.8× speedup and 251.2× energy efficiency improvement as compared to the state-of-the-art solution running on GPU.", "fno": "738300a356", "keywords": [ "Data Analysis", "Learning Artificial Intelligence", "Pattern Clustering", "Unsupervised Learning", "Data Analysis", "Clustering Algorithm", "Data Movement", "Conventional Crossbar Memory", "Digital Based Processing In Memory", "Digital Based Unsupervised Learning Acceleration", "PIM Based Architecture", "Memory Friendly Operations", "Data Points", "DUAL Maps", "Microarchitecture", "Memory Management", "Clustering Algorithms", "Graphics Processing Units", "Energy Efficiency", "Acceleration", "Unsupervised Learning", "Processing In Memory", "Unsupervised Learning", "Hyperdimensional Computing", "Algorithm Hardware Co Design" ], "authors": [ { "affiliation": "UC,Department of Computer Science,Irvine", "fullName": "Mohsen Imani", "givenName": "Mohsen", "surname": "Imani", "__typename": "ArticleAuthorType" }, { "affiliation": "UC,Department of Computer Science and Engineering,San Diego", "fullName": "Saikishan Pampana", "givenName": "Saikishan", "surname": "Pampana", "__typename": "ArticleAuthorType" }, { "affiliation": "UC,Department of Computer Science and Engineering,San Diego", "fullName": "Saransh Gupta", "givenName": "Saransh", "surname": "Gupta", "__typename": "ArticleAuthorType" }, { "affiliation": "UC,Department of Computer Science and Engineering,San Diego", "fullName": "Minxuan Zhou", "givenName": "Minxuan", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "DGIST,Department of Information and Communication Engineering", "fullName": "Yeseong Kim", "givenName": "Yeseong", "surname": "Kim", "__typename": "ArticleAuthorType" }, { "affiliation": "UC,Department of Computer Science and Engineering,San Diego", "fullName": "Tajana Rosing", "givenName": "Tajana", "surname": "Rosing", "__typename": "ArticleAuthorType" } ], "idPrefix": "micro", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-10-01T00:00:00", "pubType": "proceedings", "pages": "356-371", "year": "2020", "issn": null, "isbn": "978-1-7281-7383-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "738300a342", "articleId": "1oFGEcCB39e", "__typename": "AdjacentArticleType" }, "next": { "fno": "738300a372", "articleId": "1oFGDuiTY2I", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic2e/2016/1961/0/1961a222", "title": "Exploring GPU Acceleration of Apache Spark", "doi": null, "abstractUrl": "/proceedings-article/ic2e/2016/1961a222/12OmNCzKlLZ", "parentPublication": { "id": "proceedings/ic2e/2016/1961/0", "title": "2016 IEEE International Conference on Cloud Engineering (IC2E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2007/2874/2/28740240", "title": "Fuzzy Clustering Ensemble Based on Dual Boosting", "doi": null, "abstractUrl": "/proceedings-article/fskd/2007/28740240/12OmNqH9hgA", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2017/1072/0/1072a013", "title": "A Dual-Buffer Based Acceleration Strategy for FW Block Algorithm on GPUS", "doi": null, "abstractUrl": "/proceedings-article/cbd/2017/1072a013/12OmNwIYZEH", "parentPublication": { "id": "proceedings/cbd/2017/1072/0", "title": "2017 Fifth International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2016/5473/0/07837983", "title": "Robust Convex Clustering Analysis", "doi": null, "abstractUrl": "/proceedings-article/icdm/2016/07837983/12OmNwcUjXv", "parentPublication": { "id": "proceedings/icdm/2016/5473/0", "title": "2016 IEEE 16th International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2015/7964/0/07113373", "title": "Oracle Database In-Memory: A dual format in-memory database", "doi": null, "abstractUrl": "/proceedings-article/icde/2015/07113373/12OmNxFsmEn", "parentPublication": { "id": "proceedings/icde/2015/7964/0", "title": "2015 IEEE 31st International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isca/2017/4892/0/08192490", "title": "Stream-dataflow acceleration", "doi": null, "abstractUrl": "/proceedings-article/isca/2017/08192490/12OmNxdDFDZ", "parentPublication": { "id": "proceedings/isca/2017/4892/0", "title": "2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2016/9005/0/07840629", "title": "I/O chunking and latency hiding approach for out-of-core sorting acceleration using GPU and flash NVM", "doi": null, "abstractUrl": "/proceedings-article/big-data/2016/07840629/12OmNz4BdlX", "parentPublication": { "id": "proceedings/big-data/2016/9005/0", "title": "2016 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2017/11/07995073", "title": "Robust Dual Clustering with Adaptive Manifold Regularization", "doi": null, "abstractUrl": "/journal/tk/2017/11/07995073/13rRUy0qnGO", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2021/03/09201530", "title": "PQC Acceleration Using GPUs: FrodoKEM, NewHope, and Kyber", "doi": null, "abstractUrl": "/journal/td/2021/03/09201530/1niUwFL8NI4", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2022/07/09353224", "title": "What and How: Generalized Lifelong Spectral Clustering via Dual Memory", "doi": null, "abstractUrl": "/journal/tp/2022/07/09353224/1r8knzBTSWA", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6h6YYG9sA", "doi": "10.1109/VIS54862.2022.00018", "title": "Visual Auditor: Interactive Visualization for Detection and Summarization of Model Biases", "normalizedTitle": "Visual Auditor: Interactive Visualization for Detection and Summarization of Model Biases", "abstract": "As machine learning (ML) systems become increasingly widespread, it is necessary to audit these systems for biases prior to their de-ployment. Recent research has developed algorithms for effectively identifying intersectional bias in the form of interpretable, underper-forming subsets (or slices) of the data. However, these solutions and their insights are limited without a tool for visually understanding and interacting with the results of these algorithms. We propose Visual Auditor, an interactive visualization tool for auditing and summarizing model biases. Visual Auditor assists model validation by providing an interpretable overview of intersectional bias (bias that is present when examining populations defined by multiple features), details about relationships between problematic data slices, and a comparison between underperforming and overper-forming data slices in a model. Our open-source tool runs directly in both computational notebooks and web browsers, making model auditing accessible and easily integrated into current ML development workflows. An observational user study in collaboration with domain experts at Fiddler AI highlights that our tool can help ML practitioners identify and understand model biases.", "abstracts": [ { "abstractType": "Regular", "content": "As machine learning (ML) systems become increasingly widespread, it is necessary to audit these systems for biases prior to their de-ployment. Recent research has developed algorithms for effectively identifying intersectional bias in the form of interpretable, underper-forming subsets (or slices) of the data. However, these solutions and their insights are limited without a tool for visually understanding and interacting with the results of these algorithms. We propose Visual Auditor, an interactive visualization tool for auditing and summarizing model biases. Visual Auditor assists model validation by providing an interpretable overview of intersectional bias (bias that is present when examining populations defined by multiple features), details about relationships between problematic data slices, and a comparison between underperforming and overper-forming data slices in a model. Our open-source tool runs directly in both computational notebooks and web browsers, making model auditing accessible and easily integrated into current ML development workflows. An observational user study in collaboration with domain experts at Fiddler AI highlights that our tool can help ML practitioners identify and understand model biases.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As machine learning (ML) systems become increasingly widespread, it is necessary to audit these systems for biases prior to their de-ployment. Recent research has developed algorithms for effectively identifying intersectional bias in the form of interpretable, underper-forming subsets (or slices) of the data. However, these solutions and their insights are limited without a tool for visually understanding and interacting with the results of these algorithms. We propose Visual Auditor, an interactive visualization tool for auditing and summarizing model biases. Visual Auditor assists model validation by providing an interpretable overview of intersectional bias (bias that is present when examining populations defined by multiple features), details about relationships between problematic data slices, and a comparison between underperforming and overper-forming data slices in a model. Our open-source tool runs directly in both computational notebooks and web browsers, making model auditing accessible and easily integrated into current ML development workflows. An observational user study in collaboration with domain experts at Fiddler AI highlights that our tool can help ML practitioners identify and understand model biases.", "fno": "881200a045", "keywords": [ "Data Visualisation", "Learning Artificial Intelligence", "Public Domain Software", "Resource Allocation", "Interactive Visualization Tool", "Intersectional Bias", "Machine Learning Systems", "ML Development Workflow", "Open Source Tool", "Visual Auditor", "Machine Learning Algorithms", "Computational Modeling", "Visual Analytics", "Sociology", "Data Visualization", "Collaboration", "Machine Learning", "Human Centered Computing", "Visualization" ], "authors": [ { "affiliation": "Georgia Tech.", "fullName": "David Munechika", "givenName": "David", "surname": "Munechika", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Tech.", "fullName": "Zijie J. Wang", "givenName": "Zijie J.", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Fiddler AI.", "fullName": "Jack Reidy", "givenName": "Jack", "surname": "Reidy", "__typename": "ArticleAuthorType" }, { "affiliation": "Fiddler AI.", "fullName": "Josh Rubin", "givenName": "Josh", "surname": "Rubin", "__typename": "ArticleAuthorType" }, { "affiliation": "Fiddler AI.", "fullName": "Krishna Gade", "givenName": "Krishna", "surname": "Gade", "__typename": "ArticleAuthorType" }, { "affiliation": "Fiddler AI.", "fullName": "Krishnaram Kenthapadi", "givenName": "Krishnaram", "surname": "Kenthapadi", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Tech.", "fullName": "Duen Horng Chau", "givenName": "Duen Horng", "surname": "Chau", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "45-49", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J6h6NHy85G", "name": "pvis202288120-09973204s1-mm_881200a045.zip", "size": "109 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvis202288120-09973204s1-mm_881200a045.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "881200a040", "articleId": "1J6h94pcgCs", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a050", "articleId": "1J6h9Nc827C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vast/2017/3163/0/08585669", "title": "Warning, Bias May Occur: A Proposed Approach to Detecting Cognitive Bias in Interactive Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585669/17D45X0yjSw", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/01/09693359", "title": "Visual Analytics for Human-Centered Machine Learning", "doi": null, "abstractUrl": "/magazine/cg/2022/01/09693359/1As7zEHCGn6", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200o4810", "title": "Understanding and Evaluating Racial Biases in Image Captioning", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200o4810/1BmHtVQPJcs", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a060", "title": "TimberTrek: Exploring and Curating Sparse Decision Trees with Interactive Visualization", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a060/1J6halInwS4", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807301", "title": "<bold>VisTA</bold>: Integrating Machine Intelligence with <bold>Vis</bold>ualization to Support the Investigation of <bold>T</bold>hink-<bold>A</bold>loud Sessions", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807301/1cG6uY7sFEs", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2018/6861/0/08802447", "title": "Visual Bird Watcher: Interactive Visual Analysis on Bird Distribution and Migration", "doi": null, "abstractUrl": "/proceedings-article/vast/2018/08802447/1cJ6YMmczXG", "parentPublication": { "id": "proceedings/vast/2018/6861/0", "title": "2018 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a434", "title": "Digital Auditor: A Framework for Matching Duplicate Invoices", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a434/1h81zLBF2mY", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222086", "title": "<italic>PipelineProfiler:</italic> A Visual Analytics Tool for the Exploration of AutoML Pipelines", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222086/1nTrpup4LZe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2021/1967/0/196700a013", "title": "Person Perception Biases Exposed: Revisiting the First Impressions Dataset", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2021/196700a013/1sZ3qxvgYfu", "parentPublication": { "id": "proceedings/wacvw/2021/1967/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552229", "title": "FairRankVis: A Visual Analytics Framework for Exploring Algorithmic Fairness in Graph Mining Models", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552229/1xic387kwVy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KfQshha0dW", "title": "2022 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "10020192", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KfTcrlfNdu", "doi": "10.1109/BigData55660.2022.10020585", "title": "Visual Analytics System of Comprehensive Data Quality Improvement for Machine Learning using Data- and Process-driven Strategies", "normalizedTitle": "Visual Analytics System of Comprehensive Data Quality Improvement for Machine Learning using Data- and Process-driven Strategies", "abstract": "Machine learning (ML) models are used to mine inconspicuous information in big data. The model and data quality influence the performance of a ML model. However, modifying the ML model while measuring performance is impractical, and low-quality data causes biased model training. Therefore, improving the data quality is essential. Visual analytics systems supporting DQI (Data Quality Improvement) have been proposed in the past. However, in the studies, it is difficult for users to assess comprehensive data quality improvement methods for machine learning and to determine an appropriate data quality improvement process. In this paper, we propose a novel visual analytics system for managing data quality used in machine learning models.", "abstracts": [ { "abstractType": "Regular", "content": "Machine learning (ML) models are used to mine inconspicuous information in big data. The model and data quality influence the performance of a ML model. However, modifying the ML model while measuring performance is impractical, and low-quality data causes biased model training. Therefore, improving the data quality is essential. Visual analytics systems supporting DQI (Data Quality Improvement) have been proposed in the past. However, in the studies, it is difficult for users to assess comprehensive data quality improvement methods for machine learning and to determine an appropriate data quality improvement process. In this paper, we propose a novel visual analytics system for managing data quality used in machine learning models.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Machine learning (ML) models are used to mine inconspicuous information in big data. The model and data quality influence the performance of a ML model. However, modifying the ML model while measuring performance is impractical, and low-quality data causes biased model training. Therefore, improving the data quality is essential. Visual analytics systems supporting DQI (Data Quality Improvement) have been proposed in the past. However, in the studies, it is difficult for users to assess comprehensive data quality improvement methods for machine learning and to determine an appropriate data quality improvement process. In this paper, we propose a novel visual analytics system for managing data quality used in machine learning models.", "fno": "10020585", "keywords": [ "Data Analysis", "Data Visualisation", "Learning Artificial Intelligence", "Quality Management", "Appropriate Data Quality Improvement Process", "Big Data", "Comprehensive Data Quality Improvement Methods", "Low Quality Data", "Machine Learning Models", "ML Model", "Model Training", "Novel Visual Analytics System", "Process Driven Strategies", "Training", "Performance Evaluation", "Analytical Models", "Data Integrity", "Visual Analytics", "Machine Learning", "Big Data", "Data Quality", "Machine Learning", "Visual Analytics System" ], "authors": [ { "affiliation": "Sejong University,Department of Computer Engineering and Convergence Engineering for Intelligent Drone,Seoul,South Korea", "fullName": "Hyein Hong", "givenName": "Hyein", "surname": "Hong", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering,Seoul,South Korea", "fullName": "Sangbong Yoo", "givenName": "Sangbong", "surname": "Yoo", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering,Seoul,South Korea", "fullName": "Yejin Jin", "givenName": "Yejin", "surname": "Jin", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering and Convergence Engineering for Intelligent Drone,Seoul,South Korea", "fullName": "Chanyoung Yoon", "givenName": "Chanyoung", "surname": "Yoon", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering and Convergence Engineering for Intelligent Drone,Seoul,South Korea", "fullName": "Soobin Yim", "givenName": "Soobin", "surname": "Yim", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering and Convergence Engineering for Intelligent Drone,Seoul,South Korea", "fullName": "Seokhwan Choi", "givenName": "Seokhwan", "surname": "Choi", "__typename": "ArticleAuthorType" }, { "affiliation": "Sejong University,Department of Computer Engineering and Convergence Engineering for Intelligent Drone,Seoul,South Korea", "fullName": "Yun Jang", "givenName": "Yun", "surname": "Jang", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "396-401", "year": "2022", "issn": null, "isbn": "978-1-6654-8045-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "10020719", "articleId": "1KfQBkDLI6A", "__typename": "AdjacentArticleType" }, "next": { "fno": "10020832", "articleId": "1KfR0LXil3O", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bigdata-congress/2015/7278/0/07207250", "title": "Big Data Analytics Framework for System Health Monitoring", "doi": null, "abstractUrl": "/proceedings-article/bigdata-congress/2015/07207250/12OmNB836Le", "parentPublication": { "id": "proceedings/bigdata-congress/2015/7278/0", "title": "2015 IEEE International Congress on Big Data (BigData Congress)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2018/4133/0/413301a280", "title": "TBD-DP: Telco Big Data Visual Analytics with Data Postdiction", "doi": null, "abstractUrl": "/proceedings-article/mdm/2018/413301a280/12OmNznkK6o", "parentPublication": { "id": "proceedings/mdm/2018/4133/0", "title": "2018 19th IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2017/03/mit2017030014", "title": "Mobile Data Analytics", "doi": null, "abstractUrl": "/magazine/it/2017/03/mit2017030014/13rRUNvgz0k", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/02/mcg2014020026", "title": "DIVE: A Graph-Based Visual-Analytics Framework for Big Data", "doi": null, "abstractUrl": "/magazine/cg/2014/02/mcg2014020026/13rRUwh80Jb", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2021/3902/0/09671890", "title": "QMLEx: Data Driven Digital Transformation in Marketing Analytics", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671890/1A8gpPHovjq", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vahc/2022/0103/0/10108522", "title": "Applying Visual Analytics to Develop a Clinical Workflow Analysis Tool (CWAT) to Explore Time and Motion Data in Healthcare", "doi": null, "abstractUrl": "/proceedings-article/vahc/2022/10108522/1MIgSA5zSgg", "parentPublication": { "id": "proceedings/vahc/2022/0103/0", "title": "2022 Workshop on Visual Analytics in Healthcare (VAHC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/10/08423105", "title": "Commercial Visual Analytics Systems&#x2013;Advances in the Big Data Analytics Field", "doi": null, "abstractUrl": "/journal/tg/2019/10/08423105/1cYd7bZMLp6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a415", "title": "Big Data Visualization and Visual Analytics of COVID-19 Data", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a415/1rSRdimCgJG", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a958", "title": "Temporal Data Analytics on COVID-19 Data with Ubiquitous Computing", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a958/1ua4I0GzXiM", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/04/09672706", "title": "FeatureEnVi: Visual Analytics for Feature Engineering Using Stepwise Selection and Semi-Automatic Extraction Approaches", "doi": null, "abstractUrl": "/journal/tg/2022/04/09672706/1zWzKvgmhhK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwDAC4L", "title": "2006 IEEE Symposium On Visual Analytics Science And Technology", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNA14Aii", "doi": "10.1109/VAST.2006.261419", "title": "Visual Analytics Education", "normalizedTitle": "Visual Analytics Education", "abstract": "Visual analytics is a newly evolving field that spans across several more established disciplines. This panel discusses how VA system developers and researchers are best educated at the MS and PhD levels. This paper describes several ways in which VA can be characterized - with the goal of using these characterizations to identify knowledge domains that can be used to define VA curricula. Also, a digital library of VA educational resources is described", "abstracts": [ { "abstractType": "Regular", "content": "Visual analytics is a newly evolving field that spans across several more established disciplines. This panel discusses how VA system developers and researchers are best educated at the MS and PhD levels. This paper describes several ways in which VA can be characterized - with the goal of using these characterizations to identify knowledge domains that can be used to define VA curricula. Also, a digital library of VA educational resources is described", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual analytics is a newly evolving field that spans across several more established disciplines. This panel discusses how VA system developers and researchers are best educated at the MS and PhD levels. This paper describes several ways in which VA can be characterized - with the goal of using these characterizations to identify knowledge domains that can be used to define VA curricula. Also, a digital library of VA educational resources is described", "fno": "04035767", "keywords": [ "Computer Science Education", "Data Analysis", "Data Visualisation", "Digital Libraries", "Visual Analytics Education", "Knowledge Domain Identification", "Digital Library", "Educational Resources", "Visual Analytics", "Taxonomy", "Data Visualization", "Computer Science Education", "Information Analysis", "Time Series Analysis", "Software Libraries", "Financial Management", "Knowledge Management", "Software Development Management", "Visual Analytics Education", "Visual Analytics Curricula" ], "authors": [ { "affiliation": "Georgia Tech, foley@cc.gatech.edu", "fullName": "James Foley", "givenName": "James", "surname": "Foley", "__typename": "ArticleAuthorType" }, { "affiliation": "PARC, card@parc.com", "fullName": "Stu Card", "givenName": "Stu", "surname": "Card", "__typename": "ArticleAuthorType" }, { "affiliation": "Purdue, ebertd@ecn.purdue.edu", "fullName": "David Ebert", "givenName": "David", "surname": "Ebert", "__typename": "ArticleAuthorType" }, { "affiliation": "Penn State, maceachren@psu.edu", "fullName": "A. MacEachren", "givenName": "A.", "surname": "MacEachren", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Charlotte, ribarsky@uncc.edu", "fullName": "Bill Ribarsky", "givenName": "Bill", "surname": "Ribarsky", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2006-10-01T00:00:00", "pubType": "proceedings", "pages": "209-211", "year": "2006", "issn": null, "isbn": "1-4244-0591-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04035766", "articleId": "12OmNxecRVy", "__typename": "AdjacentArticleType" }, "next": { "fno": "04035752", "articleId": "12OmNz61ds4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/re/2013/5765/0/06636762", "title": "Visual analytics for software requirements engineering", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636762/12OmNrJ11yp", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892c416", "title": "Visual Analytics for Public Health: Supporting Knowledge Construction and Decision-Making", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892c416/12OmNrJiCNq", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040063", "title": "The Top 10 Challenges in Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040063/13rRUxC0SGA", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/02/mcg2015020016", "title": "Preparing Undergraduates for Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2015/02/mcg2015020016/13rRUxjQyjN", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/04/mcg2012040023", "title": "Extreme-Scale Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2012/04/mcg2012040023/13rRUxjQyxF", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/03/06908006", "title": "Personal Visualization and Personal Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2015/03/06908006/13rRUyYBlgA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09906559", "title": "In Defence of Visual Analytics Systems: Replies to Critics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09906559/1H5F2wJXT4Q", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805439", "title": "The Validity, Generalizability and Feasibility of Summative Evaluation Methods in Visual Analytics", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805439/1cG4DVd6FcQ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2020/9134/0/913400a368", "title": "A Characterization of Data Exchange between Visual Analytics Tools", "doi": null, "abstractUrl": "/proceedings-article/iv/2020/913400a368/1rSRaA2LJBK", "parentPublication": { "id": "proceedings/iv/2020/9134/0", "title": "2020 24th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trex/2021/1817/0/181700a014", "title": "Making and Trusting Decisions in Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/trex/2021/181700a014/1yQB6h3HL6o", "parentPublication": { "id": "proceedings/trex/2021/1817/0", "title": "2021 IEEE Workshop on TRust and EXpertise in Visual Analytics (TREX)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy4IF3s", "title": "2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "12OmNC0PGPd", "doi": "10.1109/ICALT.2018.00051", "title": "Assessing Learning Analytics Systems Impact by Summative Measures", "normalizedTitle": "Assessing Learning Analytics Systems Impact by Summative Measures", "abstract": "This paper introduces a randomized study conducted among a group of 48 student Java programmers to assess the impact of learning analytics (LA) on their academic performance. The LA system design incorporated both cognitive and metacognitive tools to help learners take possession of their learning processes. Participation was voluntary and data about potential confounding factors were also collected to minimize bias by blocking on two or more factors (future work). This paper summarily explores the relationships between students' programming expertise, coding assignments, user experience and satisfaction, and academic performance. The results of this preliminary exploration are inconclusive as to whether the LA system made a difference in academic performance. Nevertheless, they seem to indicate that LA was beneficial to student programmers and that summative measures such as grades are not a proper metric to measure the usefulness of LA systems.", "abstracts": [ { "abstractType": "Regular", "content": "This paper introduces a randomized study conducted among a group of 48 student Java programmers to assess the impact of learning analytics (LA) on their academic performance. The LA system design incorporated both cognitive and metacognitive tools to help learners take possession of their learning processes. Participation was voluntary and data about potential confounding factors were also collected to minimize bias by blocking on two or more factors (future work). This paper summarily explores the relationships between students' programming expertise, coding assignments, user experience and satisfaction, and academic performance. The results of this preliminary exploration are inconclusive as to whether the LA system made a difference in academic performance. Nevertheless, they seem to indicate that LA was beneficial to student programmers and that summative measures such as grades are not a proper metric to measure the usefulness of LA systems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper introduces a randomized study conducted among a group of 48 student Java programmers to assess the impact of learning analytics (LA) on their academic performance. The LA system design incorporated both cognitive and metacognitive tools to help learners take possession of their learning processes. Participation was voluntary and data about potential confounding factors were also collected to minimize bias by blocking on two or more factors (future work). This paper summarily explores the relationships between students' programming expertise, coding assignments, user experience and satisfaction, and academic performance. The results of this preliminary exploration are inconclusive as to whether the LA system made a difference in academic performance. Nevertheless, they seem to indicate that LA was beneficial to student programmers and that summative measures such as grades are not a proper metric to measure the usefulness of LA systems.", "fno": "604901a188", "keywords": [ "Cognition", "Computer Aided Instruction", "Computer Science Education", "Human Factors", "Java", "LA System Design", "Metacognitive Tools", "User Experience", "Coding Assignment", "Student Java Programmers", "Learning Analytics Systems", "Encoding", "Java", "Task Analysis", "Programming Profession", "Tools", "Atmospheric Measurements", "Learning Analytics Coding Summative Feedback Academic Performance User Experience Competence Assessment" ], "authors": [ { "affiliation": null, "fullName": "Rebecca Guillot", "givenName": "Rebecca", "surname": "Guillot", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jeremie Seanosky", "givenName": "Jeremie", "surname": "Seanosky", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Isabelle Guillot", "givenName": "Isabelle", "surname": "Guillot", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Boulanger", "givenName": "David", "surname": "Boulanger", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Claudia Guillot", "givenName": "Claudia", "surname": "Guillot", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Vivekanandan Kumar", "givenName": "Vivekanandan", "surname": "Kumar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shawn N. Fraser", "givenName": "Shawn N.", "surname": "Fraser", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": ". Kinshuk", "givenName": ".", "surname": "Kinshuk", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "188-190", "year": "2018", "issn": "2161-377X", "isbn": "978-1-5386-6049-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "604901a183", "articleId": "12OmNzZmZyF", "__typename": "AdjacentArticleType" }, "next": { "fno": "604901a191", "articleId": "12OmNBpEePE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/t4e/2016/6115/0/6115a240", "title": "An Experience Report of Flipped Classroom Strategy Implementation for Java Programming Course", "doi": null, "abstractUrl": "/proceedings-article/t4e/2016/6115a240/12OmNAZfxIc", "parentPublication": { "id": "proceedings/t4e/2016/6115/0", "title": "2016 IEEE Eighth International Conference on Technology for Education (T4E)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2013/5261/0/06685069", "title": "Integrating cohorts to improve student career self-efficacy", "doi": null, "abstractUrl": "/proceedings-article/fie/2013/06685069/12OmNBfqG4i", "parentPublication": { "id": "proceedings/fie/2013/5261/0", "title": "2013 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2014/2504/0/2504a442", "title": "You Said What? Assessing the Impact of Collaboration Technologies and Message Characteristics Using Physiological Measures", "doi": null, "abstractUrl": "/proceedings-article/hicss/2014/2504a442/12OmNwNOaO6", "parentPublication": { "id": "proceedings/hicss/2014/2504/0", "title": "2014 47th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2011/468/0/06142772", "title": "Assessing the impact of faculty advising and mentoring in a project-based learning environment on student learning outcomes, persistence in engineering and post-graduation plans", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142772/12OmNx3q6VQ", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a264", "title": "Real-Time Visual Feedback: A Study in Coding Analytics", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a264/12OmNxwWoLP", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2016/1790/0/07757545", "title": "Determining progress in writing competency by assessing students' argumentation", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757545/12OmNzZmZxj", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a579", "title": "Introducing the JLoad: A Java Learning Object to Assist the Deaf", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a579/12OmNznkJX6", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659279", "title": "Shift in Mid-Year Engineering Students&#x2019; Perceptions of Their Future Careers Over Time", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659279/18j9cH87Q7m", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2019/3485/0/348500a170", "title": "Assessing Learning Analytics Impact on Coding Competence Growth", "doi": null, "abstractUrl": "/proceedings-article/icalt/2019/348500a170/1cYi3Uput4Q", "parentPublication": { "id": "proceedings/icalt/2019/3485/2161-377X", "title": "2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2020/6090/0/09155543", "title": "Hindi-CNL Coder - A Desktop Application for Learning Programming using Native Controlled Natural Language", "doi": null, "abstractUrl": "/proceedings-article/icalt/2020/09155543/1m1j25ieDyo", "parentPublication": { "id": "proceedings/icalt/2020/6090/0", "title": "2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvlxJwO", "title": "2016 International Conference on Networking and Network Applications (NaNA)", "acronym": "nana", "groupId": "1814765", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAq3hHS", "doi": "10.1109/NaNA.2016.89", "title": "A Preliminary Design and Implementation of Location-Based Mobile Advertising Schemes with Plot Placement Animation over a Cyber-Physical System", "normalizedTitle": "A Preliminary Design and Implementation of Location-Based Mobile Advertising Schemes with Plot Placement Animation over a Cyber-Physical System", "abstract": "Recent advances in wireless communications, mobile connectivity, and cloud computing have paved a way for all the devices and applications of Internet of Things (IoT), within which information from all related perspectives is closely monitored and synchronized between physical facilities, such as transportation carriers and the cyber computational space. Smartphone and tablets have developed into popular devices with the proper permission from the message recipients for reading and watching many forms of mobile advertisement. Advertisers endeavor to attract their target customers by fully presenting their ads fluently. While 2D Animation has been a category of completely mature art forms, there is broad space for collaborative utilization on both commercial and artistic value. The animated film possesses excellent cost-performance ratio to be produced, broadcasted and decoded adaptively in various transmission and display media especially when it comes to real-time and personal-profiled plot placement marketing along with geo-information technologies. A cyber-physical system (CPS) framework for mobile advertising with location-based plot placement 2D animation has been derived and yet to be implemented and deployed. In this work, we derived the flowcharts and experience use case. A high-level operational architecture is then designed. Based on user experience theories, the marketing plans for plot placement are proposed and examined. With the high global penetration of mobile devices and the prosperous development of IoT solutions, the schemes of internet marketing are to be highly cross-fielded and plot placement 2D animation CPS will surely play a very important role.", "abstracts": [ { "abstractType": "Regular", "content": "Recent advances in wireless communications, mobile connectivity, and cloud computing have paved a way for all the devices and applications of Internet of Things (IoT), within which information from all related perspectives is closely monitored and synchronized between physical facilities, such as transportation carriers and the cyber computational space. Smartphone and tablets have developed into popular devices with the proper permission from the message recipients for reading and watching many forms of mobile advertisement. Advertisers endeavor to attract their target customers by fully presenting their ads fluently. While 2D Animation has been a category of completely mature art forms, there is broad space for collaborative utilization on both commercial and artistic value. The animated film possesses excellent cost-performance ratio to be produced, broadcasted and decoded adaptively in various transmission and display media especially when it comes to real-time and personal-profiled plot placement marketing along with geo-information technologies. A cyber-physical system (CPS) framework for mobile advertising with location-based plot placement 2D animation has been derived and yet to be implemented and deployed. In this work, we derived the flowcharts and experience use case. A high-level operational architecture is then designed. Based on user experience theories, the marketing plans for plot placement are proposed and examined. With the high global penetration of mobile devices and the prosperous development of IoT solutions, the schemes of internet marketing are to be highly cross-fielded and plot placement 2D animation CPS will surely play a very important role.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent advances in wireless communications, mobile connectivity, and cloud computing have paved a way for all the devices and applications of Internet of Things (IoT), within which information from all related perspectives is closely monitored and synchronized between physical facilities, such as transportation carriers and the cyber computational space. Smartphone and tablets have developed into popular devices with the proper permission from the message recipients for reading and watching many forms of mobile advertisement. Advertisers endeavor to attract their target customers by fully presenting their ads fluently. While 2D Animation has been a category of completely mature art forms, there is broad space for collaborative utilization on both commercial and artistic value. The animated film possesses excellent cost-performance ratio to be produced, broadcasted and decoded adaptively in various transmission and display media especially when it comes to real-time and personal-profiled plot placement marketing along with geo-information technologies. A cyber-physical system (CPS) framework for mobile advertising with location-based plot placement 2D animation has been derived and yet to be implemented and deployed. In this work, we derived the flowcharts and experience use case. A high-level operational architecture is then designed. Based on user experience theories, the marketing plans for plot placement are proposed and examined. With the high global penetration of mobile devices and the prosperous development of IoT solutions, the schemes of internet marketing are to be highly cross-fielded and plot placement 2D animation CPS will surely play a very important role.", "fno": "9803a196", "keywords": [ "Animation", "Internet Of Things", "Mobile Handsets", "Advertising", "Two Dimensional Displays", "Servers", "Mobile Communication", "Plot Placement Advertising", "Cyber Physical System", "Io T", "Location Based", "Mobile Advertising", "2 D Animation" ], "authors": [ { "affiliation": null, "fullName": "Ru-Hung Lee", "givenName": "Ru-Hung", "surname": "Lee", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "An-Yi Chen", "givenName": "An-Yi", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chih-Chung Chiang", "givenName": "Chih-Chung", "surname": "Chiang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu-Shan Athena Chen", "givenName": "Yu-Shan Athena", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chun-Hung Liu", "givenName": "Chun-Hung", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "nana", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-07-01T00:00:00", "pubType": "proceedings", "pages": "196-201", "year": "2016", "issn": null, "isbn": "978-1-4673-9803-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9803a190", "articleId": "12OmNzwHvnj", "__typename": "AdjacentArticleType" }, "next": { "fno": "9803a202", "articleId": "12OmNy7h3cw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/kse/2009/3846/0/3846a081", "title": "Fast and Realistic 2D Facial Animation Based on Image Warping", "doi": null, "abstractUrl": "/proceedings-article/kse/2009/3846a081/12OmNqGA59e", "parentPublication": { "id": "proceedings/kse/2009/3846/0", "title": "Knowledge and Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icios/2012/5092/0/4936a013", "title": "Mobile Advertising Using Location Based Services", "doi": null, "abstractUrl": "/proceedings-article/icios/2012/4936a013/12OmNwDAC55", "parentPublication": { "id": "proceedings/icios/2012/5092/0", "title": "2012 IEEE First International Conference on Internet Operating Systems (ICIOS 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2005/2389/0/23890307", "title": "An Image-Based Shading Pipeline for 2D Animation", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2005/23890307/12OmNx8wTgw", "parentPublication": { "id": "proceedings/sibgrapi/2005/2389/0", "title": "XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ca/1994/6240/0/00323994", "title": "Computer animation of clouds", "doi": null, "abstractUrl": "/proceedings-article/ca/1994/00323994/12OmNzVGcTg", "parentPublication": { "id": "proceedings/ca/1994/6240/0", "title": "Proceedings of Computer Animation '94", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2012/03/ttg2012030475", "title": "AniPaint: Interactive Painterly Animation from Video", "doi": null, "abstractUrl": "/journal/tg/2012/03/ttg2012030475/13rRUygT7sB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmew/2022/7218/0/09859278", "title": "A Low-Cost Virtual 2D Spokes-Character Advertising Framework", "doi": null, "abstractUrl": "/proceedings-article/icmew/2022/09859278/1G4EVRT38wE", "parentPublication": { "id": "proceedings/icmew/2022/7218/0", "title": "2022 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiars/2022/5457/0/545700a310", "title": "Automatic Matching Technology of Two-dimensional Animation Pixels Based on Edge Features", "doi": null, "abstractUrl": "/proceedings-article/aiars/2022/545700a310/1J2XTCy32uI", "parentPublication": { "id": "proceedings/aiars/2022/5457/0", "title": "2022 International Conference on Artificial Intelligence and Autonomous Robot Systems (AIARS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090619", "title": "Group-Based Expert Walkthroughs: How Immersive Technologies Can Facilitate the Collaborative Authoring of Character Animation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090619/1jIxo3Ftt3a", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090677", "title": "PoseMMR: A Collaborative Mixed Reality Authoring Tool for Character Animation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090677/1jIxxM75R4I", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a406", "title": "Interactive Narrative Facial Expression Animation Generation by Intuitive Curve Drawing", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a406/1tnXNLPhC7K", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy3iFub", "title": "Proceedings 13th Brazilian Symposium on Computer Graphics and Image Processing (Cat. No.PR00878)", "acronym": "sibgrapi", "groupId": "1000131", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNwpGgOz", "doi": "10.1109/SIBGRA.2000.883915", "title": "A Control Theory Approach for Real-Time Animation of Artificial Agents", "normalizedTitle": "A Control Theory Approach for Real-Time Animation of Artificial Agents", "abstract": "We propose basic mechanisms in support to autonomous, artificial animated agents. We use an approach based on robotics control theory, dealing with physics constraints and dynamics and kinematics issues, providing a well structured way to control the agent resources. We validate the mechanisms by presenting three computer animated platforms with different structures (sensors, actuators, and dynamics) which have used them. As a practical result, our animated agents are able to perform different tasks on the top of the same control structure.", "abstracts": [ { "abstractType": "Regular", "content": "We propose basic mechanisms in support to autonomous, artificial animated agents. We use an approach based on robotics control theory, dealing with physics constraints and dynamics and kinematics issues, providing a well structured way to control the agent resources. We validate the mechanisms by presenting three computer animated platforms with different structures (sensors, actuators, and dynamics) which have used them. As a practical result, our animated agents are able to perform different tasks on the top of the same control structure.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose basic mechanisms in support to autonomous, artificial animated agents. We use an approach based on robotics control theory, dealing with physics constraints and dynamics and kinematics issues, providing a well structured way to control the agent resources. We validate the mechanisms by presenting three computer animated platforms with different structures (sensors, actuators, and dynamics) which have used them. As a practical result, our animated agents are able to perform different tasks on the top of the same control structure.", "fno": "08780211", "keywords": [ "Virtual Reality Control Theory Approach Real Time Animation Robotics Control Theory Autonomous Artificial Animated Agents Physics Constraints Kinematics Issues Agent Resources Computer Animated Platforms Sensors Actuators Dynamics Animated Agents Control Structure" ], "authors": [ { "affiliation": "Univ. Fed. do Rio de Janeiro, Brazil", "fullName": "F. Wagner da Silva", "givenName": "F.", "surname": "Wagner da Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Fed. do Rio de Janeiro, Brazil", "fullName": "L.M. Garcia", "givenName": "L.M.", "surname": "Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Fed. do Rio de Janeiro, Brazil", "fullName": "R.C. Farias", "givenName": "R.C.", "surname": "Farias", "__typename": "ArticleAuthorType" }, { "affiliation": "Univ. Fed. do Rio de Janeiro, Brazil", "fullName": "A.A.F. Oliveira", "givenName": "A.A.F.", "surname": "Oliveira", "__typename": "ArticleAuthorType" } ], "idPrefix": "sibgrapi", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "211", "year": "2000", "issn": "1530-1834", "isbn": "0-7695-0878-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08780203", "articleId": "12OmNBTJIyz", "__typename": "AdjacentArticleType" }, "next": { "fno": "08780219", "articleId": "12OmNwfKj9c", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBk5J", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "acronym": "dasc", "groupId": "1001364", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNx1Iwdq", "doi": "10.1109/DASC.2009.76", "title": "Mobile Phones as 3-DOF Controllers: A Comparative Study", "normalizedTitle": "Mobile Phones as 3-DOF Controllers: A Comparative Study", "abstract": "Conventional input devices such as the mouse and keyboard lack in intuitiveness when it comes to 3D manipulation tasks. In this paper, we explore the use of accelerometer and digital compass equipped mobile phones as 3-DOF controllers in a 3D object rotation task. We put the mobile phone up against the established standards, a mouse and a touch pen and compare their performance in a rotation task. Our preliminary evaluation indicates that for this type of task, with only 5 minutes of practice the mobile phone is significantly faster than both the mouse and the touch pen.", "abstracts": [ { "abstractType": "Regular", "content": "Conventional input devices such as the mouse and keyboard lack in intuitiveness when it comes to 3D manipulation tasks. In this paper, we explore the use of accelerometer and digital compass equipped mobile phones as 3-DOF controllers in a 3D object rotation task. We put the mobile phone up against the established standards, a mouse and a touch pen and compare their performance in a rotation task. Our preliminary evaluation indicates that for this type of task, with only 5 minutes of practice the mobile phone is significantly faster than both the mouse and the touch pen.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Conventional input devices such as the mouse and keyboard lack in intuitiveness when it comes to 3D manipulation tasks. In this paper, we explore the use of accelerometer and digital compass equipped mobile phones as 3-DOF controllers in a 3D object rotation task. We put the mobile phone up against the established standards, a mouse and a touch pen and compare their performance in a rotation task. Our preliminary evaluation indicates that for this type of task, with only 5 minutes of practice the mobile phone is significantly faster than both the mouse and the touch pen.", "fno": "3929a345", "keywords": [ "Mobile Phone", "3 DOF Controller", "Spatial Input", "Bimanual Input", "3 D Rotation", "Accelerometer", "Digital Compass", "Magnetometer", "MEMS", "Virtual Sphere" ], "authors": [ { "affiliation": null, "fullName": "Nicholas Katzakis", "givenName": "Nicholas", "surname": "Katzakis", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Masahiro Hori", "givenName": "Masahiro", "surname": "Hori", "__typename": "ArticleAuthorType" } ], "idPrefix": "dasc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "345-349", "year": "2009", "issn": null, "isbn": "978-0-7695-3929-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3929a339", "articleId": "12OmNASILUr", "__typename": "AdjacentArticleType" }, "next": { "fno": "3929a353", "articleId": "12OmNwIpNiw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2016/0842/0/07460079", "title": "Collaborative 3D manipulation using mobile phones", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460079/12OmNBTs7vS", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcs/1999/0253/1/02539777", "title": "User Interface for a PCS Smart Phone", "doi": null, "abstractUrl": "/proceedings-article/icmcs/1999/02539777/12OmNrGb2e9", "parentPublication": { "id": "proceedings/icmcs/1999/0253/1", "title": "Multimedia Computing and Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sutc/2008/3158/0/3158a531", "title": "Usability Comparison of Pen-Based Input for Young Children on Mobile Devices", "doi": null, "abstractUrl": "/proceedings-article/sutc/2008/3158a531/12OmNrNh0y2", "parentPublication": { "id": "proceedings/sutc/2008/3158/0", "title": "2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2010/6846/0/05444700", "title": "Mobile devices as multi-DOF controllers", "doi": null, "abstractUrl": "/proceedings-article/3dui/2010/05444700/12OmNrYCXW8", "parentPublication": { "id": "proceedings/3dui/2010/6846/0", "title": "2010 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2004/2186/0/21860110", "title": "A Comparative Investigation into Two Pointing Systems for Use with Wearable Computers While Mobile", "doi": null, "abstractUrl": "/proceedings-article/iswc/2004/21860110/12OmNsd6vrl", "parentPublication": { "id": "proceedings/iswc/2004/2186/0", "title": "Eighth International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2019/4540/0/08864589", "title": "The Golden Bullet: A Comparative Study for Target Acquisition, Pointing and Shooting", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2019/08864589/1e5ZtZ7mbZK", "parentPublication": { "id": "proceedings/vs-games/2019/4540/0", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNx5GU2z", "title": "2015 International Conference on Information Networking (ICOIN)", "acronym": "icoin", "groupId": "1000363", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNzA6GPN", "doi": "10.1109/ICOIN.2015.7057856", "title": "User authentication using mobile phones for mobile payment", "normalizedTitle": "User authentication using mobile phones for mobile payment", "abstract": "Mobile authentication systems for mobile payment often use either the web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.", "abstracts": [ { "abstractType": "Regular", "content": "Mobile authentication systems for mobile payment often use either the web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mobile authentication systems for mobile payment often use either the web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.", "fno": "07057856", "keywords": [ "Authentication", "Mobile Handsets", "Protocols", "Servers", "Mobile Communication", "Software", "Software Token", "Mutual Authentication", "Mobile Payment Protocol", "Mobile Phone", "Transaction Certificate" ], "authors": [ { "affiliation": "Software Research Center (SOREC), Dept. of Computer Science and Engineering College of Engineering, Chungnam National University, Yuseong-gu, Daejeon, South Korea, 305-764", "fullName": "Soonhwa Sung", "givenName": null, "surname": "Soonhwa Sung", "__typename": "ArticleAuthorType" }, { "affiliation": "Software Research Center (SOREC), Dept. of Computer Science and Engineering College of Engineering, Chungnam National University, Yuseong-gu, Daejeon, South Korea, 305-764", "fullName": "Cheong Youn", "givenName": null, "surname": "Cheong Youn", "__typename": "ArticleAuthorType" }, { "affiliation": "Software Research Center (SOREC), Dept. of Computer Science and Engineering College of Engineering, Chungnam National University, Yuseong-gu, Daejeon, South Korea, 305-764", "fullName": "Eunbae Kong", "givenName": null, "surname": "Eunbae Kong", "__typename": "ArticleAuthorType" }, { "affiliation": "Software Research Center (SOREC), Dept. of Computer Science and Engineering College of Engineering, Chungnam National University, Yuseong-gu, Daejeon, South Korea, 305-764", "fullName": "Jaecheol Ryou", "givenName": null, "surname": "Jaecheol Ryou", "__typename": "ArticleAuthorType" } ], "idPrefix": "icoin", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-01-01T00:00:00", "pubType": "proceedings", "pages": "51-56", "year": "2015", "issn": null, "isbn": "978-1-4799-8342-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07057855", "articleId": "12OmNviHK9P", "__typename": "AdjacentArticleType" }, "next": { "fno": "07057857", "articleId": "12OmNzX6cnC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wowmom/2016/2185/0/07523547", "title": "An open, NFC enabler independent Mobile payment and identification method: NFC feature box", "doi": null, "abstractUrl": "/proceedings-article/wowmom/2016/07523547/12OmNASraE2", "parentPublication": { "id": "proceedings/wowmom/2016/2185/0", "title": "2016 IEEE 17th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc/2013/2482/0/06726262", "title": "Enhancing the Security of Mobile Applications by Using TEE and (U)SIM", "doi": null, "abstractUrl": "/proceedings-article/uic-atc/2013/06726262/12OmNAYGloh", "parentPublication": { "id": "proceedings/uic-atc/2013/2482/0", "title": "2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted Computing (UIC/ATC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/waina/2017/6231/0/6231a570", "title": "An Off-Line Mobile Payment Protocol Providing Double-Spending Detection", "doi": null, "abstractUrl": "/proceedings-article/waina/2017/6231a570/12OmNCwlakj", "parentPublication": { "id": "proceedings/waina/2017/6231/0", "title": "2017 31st International Conference on Advanced Information Networking and Applications: Workshops (WAINA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2009/3823/4/3823e436", "title": "Social Authentication Protocol for Mobile Phones", "doi": null, "abstractUrl": "/proceedings-article/cse/2009/3823e436/12OmNqN6R7e", "parentPublication": { "id": "proceedings/cse/2009/3823/2", "title": "2009 International Conference on Computational Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2014/6513/0/6513a422", "title": "Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2014/6513a422/12OmNwBT1qx", "parentPublication": { "id": "proceedings/trustcom/2014/6513/0", "title": "2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nfc/2012/4678/0/06176334", "title": "A Survey about User Experience Improvement in Mobile Proximity Payment", "doi": null, "abstractUrl": "/proceedings-article/nfc/2012/06176334/12OmNyKJiBR", "parentPublication": { "id": "proceedings/nfc/2012/4678/0", "title": "Near Field Communication, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asiajcis/2016/2285/0/2285a024", "title": "NFC-based Mobile Payment Protocol with User Anonymity", "doi": null, "abstractUrl": "/proceedings-article/asiajcis/2016/2285a024/12OmNyYDDAs", "parentPublication": { "id": "proceedings/asiajcis/2016/2285/0", "title": "2016 11th Asia Joint Conference on Information Security (AsiaJCIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/imis/2012/4684/0/4684a617", "title": "A Proposal of a Mobile Payment System Based on Android", "doi": null, "abstractUrl": "/proceedings-article/imis/2012/4684a617/12OmNylKAVi", "parentPublication": { "id": "proceedings/imis/2012/4684/0", "title": "Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmecg/2008/3366/0/3366a036", "title": "Design of Lottery Betting Payment System Based on Mobile Terminal", "doi": null, "abstractUrl": "/proceedings-article/icmecg/2008/3366a036/12OmNzsrwnn", "parentPublication": { "id": "proceedings/icmecg/2008/3366/0", "title": "Management of e-Commerce and e-Government, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/03/mit2014030036", "title": "Secure Mobile Payment Systems", "doi": null, "abstractUrl": "/magazine/it/2014/03/mit2014030036/13rRUxNW1VM", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1B60Rx6oYq4", "title": "2021 3rd International Conference on Applied Machine Learning (ICAML)", "acronym": "icaml", "groupId": "1834865", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1B61221aCwE", "doi": "10.1109/ICAML54311.2021.00015", "title": "Animation Character Action Feature Extraction Based on Pyramid LK Optical Flow Algorithm", "normalizedTitle": "Animation Character Action Feature Extraction Based on Pyramid LK Optical Flow Algorithm", "abstract": "Driven by network communication technology and mobile software and hardware technology, China&#x0027;s animation industry has been developing rapidly in recent years and is full of promising prospects for development. As a good animated work generates great economic value, there are many cases of animation infringement. In recent years, China has attached great importance to the protection of the intellectual property economy, of which animation is an important part. In order to apply this in infringement situations where the animated characters are inconsistent but the actions of the characters are consistent. In this paper, the Pyramid LK optical flow method is used to extract the motion characteristics of animated characters in simple scenes. Combined with the image pyramid method can be a good solution to the aperture problem caused by the expression exaggeration effect.", "abstracts": [ { "abstractType": "Regular", "content": "Driven by network communication technology and mobile software and hardware technology, China&#x0027;s animation industry has been developing rapidly in recent years and is full of promising prospects for development. As a good animated work generates great economic value, there are many cases of animation infringement. In recent years, China has attached great importance to the protection of the intellectual property economy, of which animation is an important part. In order to apply this in infringement situations where the animated characters are inconsistent but the actions of the characters are consistent. In this paper, the Pyramid LK optical flow method is used to extract the motion characteristics of animated characters in simple scenes. Combined with the image pyramid method can be a good solution to the aperture problem caused by the expression exaggeration effect.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Driven by network communication technology and mobile software and hardware technology, China's animation industry has been developing rapidly in recent years and is full of promising prospects for development. As a good animated work generates great economic value, there are many cases of animation infringement. In recent years, China has attached great importance to the protection of the intellectual property economy, of which animation is an important part. In order to apply this in infringement situations where the animated characters are inconsistent but the actions of the characters are consistent. In this paper, the Pyramid LK optical flow method is used to extract the motion characteristics of animated characters in simple scenes. Combined with the image pyramid method can be a good solution to the aperture problem caused by the expression exaggeration effect.", "fno": "212500a032", "keywords": [ "Computer Animation", "Feature Extraction", "Image Motion Analysis", "Image Sequences", "Industrial Property", "Motion Estimation", "Animation Industry", "Promising Prospects", "Good Animated Work", "Great Economic Value", "Animation Infringement", "Intellectual Property Economy", "Infringement Situations", "Animated Characters", "Pyramid LK Optical Flow Method", "Image Pyramid Method", "Animation Character Action Feature Extraction", "Pyramid LK Optical Flow Algorithm", "Network Communication Technology", "Mobile Software", "Hardware Technology", "Machine Learning Algorithms", "Tracking", "Target Recognition", "Optical Switches", "Apertures", "Animation", "Feature Extraction", "Copyright Of Animations", "Motion Target Recognition", "Pyramid LK Optical Flow Algorithm", "Scene Segmentation", "Corner Point Detection" ], "authors": [ { "affiliation": "Yanbian University,Department of Computer Science,Yanji,China", "fullName": "Junjie Nan", "givenName": "Junjie", "surname": "Nan", "__typename": "ArticleAuthorType" }, { "affiliation": "Yanbian University,Department of Computer Science,Yanji,China", "fullName": "Lingyu Wang", "givenName": "Lingyu", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Yanbian University,Department of Computer Science,Yanji,China", "fullName": "De Li", "givenName": "De", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icaml", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-07-01T00:00:00", "pubType": "proceedings", "pages": "32-36", "year": "2021", "issn": null, "isbn": "978-1-6654-2125-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "212500a028", "articleId": "1B60XekMm3K", "__typename": "AdjacentArticleType" }, "next": { "fno": "212500a037", "articleId": "1B60SrmnUKQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ca/1996/7588/0/75880098", "title": "Facial Animation", "doi": null, "abstractUrl": "/proceedings-article/ca/1996/75880098/12OmNvT2oR2", "parentPublication": { "id": "proceedings/ca/1996/7588/0", "title": "Computer Animation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvmp/2010/4268/0/4268a171", "title": "Prominence Driven Character Animation", "doi": null, "abstractUrl": "/proceedings-article/cvmp/2010/4268a171/12OmNxFaLtB", "parentPublication": { "id": "proceedings/cvmp/2010/4268/0", "title": "2010 Conference on Visual Media Production", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2011/4419/0/4419a008", "title": "A New Hybrid Approach to the Animation of Complex Character Interactions in Games", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2011/4419a008/12OmNxTVTYY", "parentPublication": { "id": "proceedings/vs-games/2011/4419/0", "title": "Games and Virtual Worlds for Serious Applications, Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/viz/2009/3734/0/3734a072", "title": "Effects of Character Geometric Model on Perception of Sign Language Animation", "doi": null, "abstractUrl": "/proceedings-article/viz/2009/3734a072/12OmNzFdt4M", "parentPublication": { "id": "proceedings/viz/2009/3734/0", "title": "Visualisation, International Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2010/4124/0/4124a012", "title": "Physics-Based Character Animation for AR Applications", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2010/4124a012/12OmNzzP5BN", "parentPublication": { "id": "proceedings/isuvr/2010/4124/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/04/mcg2015040014", "title": "Premo: DreamWorks Animation's New Approach to Animation", "doi": null, "abstractUrl": "/magazine/cg/2015/04/mcg2015040014/13rRUwhpBGE", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/05/07891591", "title": "Virtual Character Animation Based on Affordable Motion Capture and Reconfigurable Tangible Interfaces", "doi": null, "abstractUrl": "/journal/tg/2018/05/07891591/13rRUwjGoLN", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a056", "title": "Physics-based character animation for Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a056/1CJdEcF4PjG", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09914804", "title": "Animated Vega-Lite: Unifying Animation with a Grammar of Interactive Graphics", "doi": null, "abstractUrl": "/journal/tg/2023/01/09914804/1Hmgc5h7Clq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a076", "title": "Research on Movie Role Shaping Method Based on Computer 3D Animation Technology", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a076/1rSRgr6RuE0", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1MNgk3BHlS0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2023", "__typename": "ProceedingType" }, "article": { "id": "1MNgtBAIjG8", "doi": "10.1109/VR55154.2023.00082", "title": "Comparing Scatterplot Variants for Temporal Trends Visualization in Immersive Virtual Environments", "normalizedTitle": "Comparing Scatterplot Variants for Temporal Trends Visualization in Immersive Virtual Environments", "abstract": "Trends are changes in variables or attributes over time, often represented by line plots or scatterplot variants, with time being one of the axes. Interpreting tendencies and estimating trends require observing the lines or points behavior regarding increments, decrements, or both (reversals) in the value of the observed variable. Previous work assessed variants of scatterplots like Animation, Small Multiples, and Overlaid Trails for comparing the effectiveness of trends representation using large and small displays and found differences between them. In this work, we study how best to enable the analyst to explore and perform temporal trend tasks with these same techniques in immersive virtual environments. We designed and conducted a user study based on the approaches followed by previous works regarding visualization and interaction techniques, as well as tasks for comparisons in three-dimensional settings. Results show that Overlaid Trails are the fastest overall, followed by Animation and Small Multiples, while accuracy is task-dependent. We also report results from interaction measures and questionnaires.", "abstracts": [ { "abstractType": "Regular", "content": "Trends are changes in variables or attributes over time, often represented by line plots or scatterplot variants, with time being one of the axes. Interpreting tendencies and estimating trends require observing the lines or points behavior regarding increments, decrements, or both (reversals) in the value of the observed variable. Previous work assessed variants of scatterplots like Animation, Small Multiples, and Overlaid Trails for comparing the effectiveness of trends representation using large and small displays and found differences between them. In this work, we study how best to enable the analyst to explore and perform temporal trend tasks with these same techniques in immersive virtual environments. We designed and conducted a user study based on the approaches followed by previous works regarding visualization and interaction techniques, as well as tasks for comparisons in three-dimensional settings. Results show that Overlaid Trails are the fastest overall, followed by Animation and Small Multiples, while accuracy is task-dependent. We also report results from interaction measures and questionnaires.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Trends are changes in variables or attributes over time, often represented by line plots or scatterplot variants, with time being one of the axes. Interpreting tendencies and estimating trends require observing the lines or points behavior regarding increments, decrements, or both (reversals) in the value of the observed variable. Previous work assessed variants of scatterplots like Animation, Small Multiples, and Overlaid Trails for comparing the effectiveness of trends representation using large and small displays and found differences between them. In this work, we study how best to enable the analyst to explore and perform temporal trend tasks with these same techniques in immersive virtual environments. We designed and conducted a user study based on the approaches followed by previous works regarding visualization and interaction techniques, as well as tasks for comparisons in three-dimensional settings. Results show that Overlaid Trails are the fastest overall, followed by Animation and Small Multiples, while accuracy is task-dependent. We also report results from interaction measures and questionnaires.", "fno": "481500a669", "keywords": [ "Visualization", "Three Dimensional Displays", "Virtual Environments", "User Interfaces", "Market Research", "Animation", "Behavioral Sciences", "Evaluation", "Graphical Perception", "Immersive Analytics", "Trend Visualization", "Virtual Reality" ], "authors": [ { "affiliation": "Federal University of Rio Grande do Sul,Brazil", "fullName": "Carlos Quijano-Chavez", "givenName": "Carlos", "surname": "Quijano-Chavez", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Rio Grande do Sul,Brazil", "fullName": "Luciana Nedel", "givenName": "Luciana", "surname": "Nedel", "__typename": "ArticleAuthorType" }, { "affiliation": "Federal University of Rio Grande do Sul,Brazil", "fullName": "Carla M. D. S. Freitas", "givenName": "Carla M. D. S.", "surname": "Freitas", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2023-03-01T00:00:00", "pubType": "proceedings", "pages": "669-679", "year": "2023", "issn": null, "isbn": "979-8-3503-4815-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1MNgsGiRD4Q", "name": "pvr202348150-010108445s1-mm_481500a669.zip", "size": "148 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvr202348150-010108445s1-mm_481500a669.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "481500a658", "articleId": "1MNgN5chdRu", "__typename": "AdjacentArticleType" }, "next": { "fno": "481500a680", "articleId": "1MNgp7L6LcY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/searis/2012/1249/0/06231167", "title": "The ICEA plug-in for virtual reality, immersive creation and edition of animation", "doi": null, "abstractUrl": "/proceedings-article/searis/2012/06231167/12OmNAQJzOL", "parentPublication": { "id": "proceedings/searis/2012/1249/0", "title": "2012 5th Workshop on Software Engineering and Architectures for Realtime Interactive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2008/06/ttg2008061325", "title": "Effectiveness of Animation in Trend Visualization", "doi": null, "abstractUrl": "/journal/tg/2008/06/ttg2008061325/13rRUILtJzq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/1999/04/v0281", "title": "A Rule-Based Interactive Behavioral Animation System for Humanoids", "doi": null, "abstractUrl": "/journal/tg/1999/04/v0281/13rRUwInveU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0/541700a470", "title": "Overview of Interactive Visualization Methods", "doi": null, "abstractUrl": "/proceedings-article/ithings-greencom-cpscom-smartdata-cybermatics/2022/541700a470/1HcmV9IYE9O", "parentPublication": { "id": "proceedings/ithings-greencom-cpscom-smartdata-cybermatics/2022/5417/0", "title": "2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a613", "title": "Evaluating Modifying Teacher Avatar Clip Sequencing Based on Eye-Tracked Visual Attention in Educational VR", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a613/1J7WepoS2w8", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2023/4544/0/10042520", "title": "Casual chatter or speaking up? Adjusting articulatory effort in generation of speech and animation for conversational characters", "doi": null, "abstractUrl": "/proceedings-article/fg/2023/10042520/1KOv20cA4SY", "parentPublication": { "id": "proceedings/fg/2023/4544/0", "title": "2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iucc-cit-dsci-smartcns/2022/7726/0/772600a294", "title": "An individual dribbling control strategy for virtual humans combining kinetic animation and lightweight physics", "doi": null, "abstractUrl": "/proceedings-article/iucc-cit-dsci-smartcns/2022/772600a294/1M4rdZdmGl2", "parentPublication": { "id": "proceedings/iucc-cit-dsci-smartcns/2022/7726/0", "title": "2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805428", "title": "A Comparative Evaluation of Animation and Small Multiples for Trend Visualization on Mobile Phones", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805428/1cG4IjitDr2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/12/09206143", "title": "Spatial Presence, Performance, and Behavior between Real, Remote, and Virtual Immersive Environments", "doi": null, "abstractUrl": "/journal/tg/2020/12/09206143/1npxM6fDN7i", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09495125", "title": "Being an Avatar &#x201C;for Real&#x201D;: A Survey on Virtual Embodiment in Augmented Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09495125/1vyju4jl6AE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vmLvNYq8QU", "title": "2021 2nd International Conference on Education, Knowledge and Information Management (ICEKIM)", "acronym": "icekim", "groupId": "1841184", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1vmLF7c0KaY", "doi": "10.1109/ICEKIM52309.2021.00118", "title": "Mobile Payment as a Trend: Impetus and Barriers behind this Technology", "normalizedTitle": "Mobile Payment as a Trend: Impetus and Barriers behind this Technology", "abstract": "Mobile payment refers to a convenient way of paying through mobile devices supported by technologies such as Short Message Service (SMS) and Quick Response (QR) code. Recent research has suggested that mobile payment has become a trend in China, and this technology has contributed to economic growth. As there are millions of users who trust and rely on mobile payment, further research is needed to explore the impetus and barriers behind this technology, so that related companies can further develop this technology to better fulfill users&#x0027; needs. This research intends to use expert authoritative testimony to discover the impetus and barriers, and to explain why mobile payment has become a trend. It turns out that the development of technologies like SMS and QR code, and the convenient payment platform offered by mobile apps like WeChat and Alipay are the main impetus, while perceived privacy and financial risks are the barriers. This research may help both companies and users. Mobile payment is gradually replacing traditional payment. It is time for related companies to take steps and offer possible advances in technology to ensure privacy and lessen risk, so that mobile payment will better serve the society.", "abstracts": [ { "abstractType": "Regular", "content": "Mobile payment refers to a convenient way of paying through mobile devices supported by technologies such as Short Message Service (SMS) and Quick Response (QR) code. Recent research has suggested that mobile payment has become a trend in China, and this technology has contributed to economic growth. As there are millions of users who trust and rely on mobile payment, further research is needed to explore the impetus and barriers behind this technology, so that related companies can further develop this technology to better fulfill users&#x0027; needs. This research intends to use expert authoritative testimony to discover the impetus and barriers, and to explain why mobile payment has become a trend. It turns out that the development of technologies like SMS and QR code, and the convenient payment platform offered by mobile apps like WeChat and Alipay are the main impetus, while perceived privacy and financial risks are the barriers. This research may help both companies and users. Mobile payment is gradually replacing traditional payment. It is time for related companies to take steps and offer possible advances in technology to ensure privacy and lessen risk, so that mobile payment will better serve the society.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Mobile payment refers to a convenient way of paying through mobile devices supported by technologies such as Short Message Service (SMS) and Quick Response (QR) code. Recent research has suggested that mobile payment has become a trend in China, and this technology has contributed to economic growth. As there are millions of users who trust and rely on mobile payment, further research is needed to explore the impetus and barriers behind this technology, so that related companies can further develop this technology to better fulfill users' needs. This research intends to use expert authoritative testimony to discover the impetus and barriers, and to explain why mobile payment has become a trend. It turns out that the development of technologies like SMS and QR code, and the convenient payment platform offered by mobile apps like WeChat and Alipay are the main impetus, while perceived privacy and financial risks are the barriers. This research may help both companies and users. Mobile payment is gradually replacing traditional payment. It is time for related companies to take steps and offer possible advances in technology to ensure privacy and lessen risk, so that mobile payment will better serve the society.", "fno": "683400a512", "keywords": [ "Data Privacy", "Financial Data Processing", "Mobile Commerce", "Risk Management", "Mobile Payment", "Expert Authoritative Testimony", "Mobile Apps", "Privacy Risk", "Financial Risk", "Privacy", "Online Banking", "Social Networking Online", "Companies", "Market Research", "Message Service", "Mobile Handsets", "Mobile Payment", "Trend", "Impetus And Barriers", "SMS", "QR Code" ], "authors": [ { "affiliation": "Programme of English language and literature studies, United International College,Division of humanities and social sciences,Zhuhai,Guangdong,China", "fullName": "Ma Xiao", "givenName": "Ma", "surname": "Xiao", "__typename": "ArticleAuthorType" }, { "affiliation": "Programme of English language and literature studies, United International College,Division of humanities and social sciences,Zhuhai,Guangdong,China", "fullName": "Ma Junjie", "givenName": "Ma", "surname": "Junjie", "__typename": "ArticleAuthorType" } ], "idPrefix": "icekim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "512-515", "year": "2021", "issn": null, "isbn": "978-1-7281-6834-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "683400a503", "articleId": "1vmLObrGDi8", "__typename": "AdjacentArticleType" }, "next": { "fno": "683400a516", "articleId": "1vmLDrtTuDu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icnisc/2015/1843/0/1843a435", "title": "The Design and Implementation of an Innovative Mobile Payment System Based on QR Bar Code", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2015/1843a435/12OmNrkBwEX", "parentPublication": { "id": "proceedings/icnisc/2015/1843/0", "title": "2015 International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/03/mit2014030036", "title": "Secure Mobile Payment Systems", "doi": null, "abstractUrl": "/magazine/it/2014/03/mit2014030036/13rRUxNW1VM", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/it/2014/03/mit2014030022", "title": "Mobile Banking and Payment in China", "doi": null, "abstractUrl": "/magazine/it/2014/03/mit2014030022/13rRUynpT9E", "parentPublication": { "id": "mags/it", "title": "IT Professional", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdsba/2021/4590/0/459000a450", "title": "Analysis of Stackelberg Game in Central bank Digital Currencies and Digital Payment Platform - Case Study of Chinese Digital Currency", "doi": null, "abstractUrl": "/proceedings-article/icdsba/2021/459000a450/1AH7GqyCyME", "parentPublication": { "id": "proceedings/icdsba/2021/4590/0", "title": "2021 5th Annual International Conference on Data Science and Business Analytics (ICDSBA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictech/2022/9694/0/969400a003", "title": "Security Enhancement for SMS Verification Code in Mobile Payment", "doi": null, "abstractUrl": "/proceedings-article/ictech/2022/969400a003/1FWmEyvxecU", "parentPublication": { "id": "proceedings/ictech/2022/9694/0", "title": "2022 11th International Conference of Information and Communication Technology (ICTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icore/2022/3390/0/339000a222", "title": "Performance Analysis of Mobile Payment Solutions and Services in the Philippines", "doi": null, "abstractUrl": "/proceedings-article/icore/2022/339000a222/1LSONnCLHgI", "parentPublication": { "id": "proceedings/icore/2022/3390/0", "title": "2022 2nd International Conference in Information and Computing Research (iCORE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2018/1390/0/139000a156", "title": "The Effect of Personal Factors on Consumers&#x2019; Trust in Mobile Payment Systems in Australia", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2018/139000a156/1dPoOMM3buE", "parentPublication": { "id": "proceedings/apwc-on-cse/2018/1390/0", "title": "2018 5th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bdeim/2020/0331/0/033100a128", "title": "Brief Analysis Report on Mobile Payment Usage of Middle School Students in the New Financial Environment", "doi": null, "abstractUrl": "/proceedings-article/bdeim/2020/033100a128/1sZ3fQq1wpq", "parentPublication": { "id": "proceedings/bdeim/2020/0331/0", "title": "2020 International Conference on Big Data Economy and Information Management (BDEIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2022/05/09507277", "title": "A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy", "doi": null, "abstractUrl": "/journal/tq/2022/05/09507277/1vNfOvIpFu0", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnisc/2021/0232/0/023200a065", "title": "Discussion on the Security Mechanism of Mobile Payment", "doi": null, "abstractUrl": "/proceedings-article/icnisc/2021/023200a065/1yLPBj0e34c", "parentPublication": { "id": "proceedings/icnisc/2021/0232/0", "title": "2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy5hRcV", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNC3FG7f", "doi": "10.1109/INFVIS.2000.885098", "title": "ThemeRiver: Visualizing Theme Changes over Time", "normalizedTitle": "ThemeRiver: Visualizing Theme Changes over Time", "abstract": "ThemeRiver(tm) is a prototype system that visualizes thematic variations over time within a large collection of documents. The \"river\" flows from left to right through time, changing width to depict changes in thematic strength of temporally associated documents. Colored \"currents\" flowing within the river narrow or widen to indicate decreases or increases in the strength of an individual topic or a group of topics in the associated documents. The river is shown within the context of a timeline and a corresponding textual presentation of external events.", "abstracts": [ { "abstractType": "Regular", "content": "ThemeRiver(tm) is a prototype system that visualizes thematic variations over time within a large collection of documents. The \"river\" flows from left to right through time, changing width to depict changes in thematic strength of temporally associated documents. Colored \"currents\" flowing within the river narrow or widen to indicate decreases or increases in the strength of an individual topic or a group of topics in the associated documents. The river is shown within the context of a timeline and a corresponding textual presentation of external events.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "ThemeRiver(tm) is a prototype system that visualizes thematic variations over time within a large collection of documents. The \"river\" flows from left to right through time, changing width to depict changes in thematic strength of temporally associated documents. Colored \"currents\" flowing within the river narrow or widen to indicate decreases or increases in the strength of an individual topic or a group of topics in the associated documents. The river is shown within the context of a timeline and a corresponding textual presentation of external events.", "fno": "08040115", "keywords": [ "Visualization Metaphors", "Trend Analysis", "Timeline" ], "authors": [ { "affiliation": "Battelle Pacific Northwest Division", "fullName": "Susan Havre", "givenName": "Susan", "surname": "Havre", "__typename": "ArticleAuthorType" }, { "affiliation": "Battelle Pacific Northwest Division", "fullName": "Beth Hetzler", "givenName": "Beth", "surname": "Hetzler", "__typename": "ArticleAuthorType" }, { "affiliation": "Battelle Pacific Northwest Division", "fullName": "Lucy Nowell", "givenName": "Lucy", "surname": "Nowell", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "115", "year": "2000", "issn": "1522-404X", "isbn": "0-7695-0804-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08040105", "articleId": "12OmNyqRnkV", "__typename": "AdjacentArticleType" }, "next": { "fno": "08040125", "articleId": "12OmNyuya23", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz61dBt", "title": "2010 14th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNvrdI4Y", "doi": "10.1109/IV.2010.52", "title": "Taggram: Exploring Geo-data on Maps through a Tag Cloud-Based Visualization", "normalizedTitle": "Taggram: Exploring Geo-data on Maps through a Tag Cloud-Based Visualization", "abstract": "Searching and exploring on digital maps are normally performed through simple text boxes and zoom-and-pan interfaces. In this paper, however, we present a novel technique, namely Taggram, which combines texts onto maps to support geo-tagged data exploration. It is designed to show geo-tagged data in form of size-varied and colorized tags, benefiting by the concepts of Tag Clouds, and to support exploring those data interactively through a fisheye menu adaptation. The technique was demonstrated for geo-tagged data exploration; however, as other thematic geo-data can be partially represented in abstract form of texts, Taggram can be a method for the presentation and exploration of such geo-data in other application scenarios.", "abstracts": [ { "abstractType": "Regular", "content": "Searching and exploring on digital maps are normally performed through simple text boxes and zoom-and-pan interfaces. In this paper, however, we present a novel technique, namely Taggram, which combines texts onto maps to support geo-tagged data exploration. It is designed to show geo-tagged data in form of size-varied and colorized tags, benefiting by the concepts of Tag Clouds, and to support exploring those data interactively through a fisheye menu adaptation. The technique was demonstrated for geo-tagged data exploration; however, as other thematic geo-data can be partially represented in abstract form of texts, Taggram can be a method for the presentation and exploration of such geo-data in other application scenarios.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Searching and exploring on digital maps are normally performed through simple text boxes and zoom-and-pan interfaces. In this paper, however, we present a novel technique, namely Taggram, which combines texts onto maps to support geo-tagged data exploration. It is designed to show geo-tagged data in form of size-varied and colorized tags, benefiting by the concepts of Tag Clouds, and to support exploring those data interactively through a fisheye menu adaptation. The technique was demonstrated for geo-tagged data exploration; however, as other thematic geo-data can be partially represented in abstract form of texts, Taggram can be a method for the presentation and exploration of such geo-data in other application scenarios.", "fno": "05571243", "keywords": [ "Abstract Data Types", "Data Visualisation", "Geography", "Interactive Systems", "Taggram", "Tag Cloud Based Visualization", "Digital Maps", "Zoom And Pan Interfaces", "Geo Tagged Data Exploration", "Interactive Data Exploration", "Fisheye Menu Adaptation", "Thematic Geo Data", "Abstract Form", "Tag Clouds", "Data Visualization", "Clouds", "Shape", "Skeleton", "Joining Processes", "Visualization", "Text Visualization", "Tag Clouds", "Geo Tagging", "Map Labeling", "Cartography" ], "authors": [ { "affiliation": null, "fullName": "Dinh-Quyen Nguyen", "givenName": "Dinh-Quyen", "surname": "Nguyen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heidrun Schumann", "givenName": "Heidrun", "surname": "Schumann", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-07-01T00:00:00", "pubType": "proceedings", "pages": "322-328", "year": "2010", "issn": "1550-6037", "isbn": "978-1-4244-7846-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05571250", "articleId": "12OmNxeut7K", "__typename": "AdjacentArticleType" }, "next": { "fno": "05571244", "articleId": "12OmNqzu6LL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2014/4761/0/06890307", "title": "Building geo-aware tag features for image classification", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890307/12OmNAle6i6", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2014/2874/0/2874a177", "title": "Revisiting Crisis Maps with Geo-temporal Tag Visualization", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2014/2874a177/12OmNCmpcOL", "parentPublication": { "id": "proceedings/pacificvis/2014/2874/0", "title": "2014 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550845", "title": "TweeVist: A geo-tweet visualization system for web based on spatio-temporal events", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550845/12OmNzGDsMN", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pacificvis/2011/935/0/05742383", "title": "Exploring geo-temporal differences using GTdiff", "doi": null, "abstractUrl": "/proceedings-article/pacificvis/2011/05742383/12OmNzIUfN9", "parentPublication": { "id": "proceedings/pacificvis/2011/935/0", "title": "2011 IEEE Pacific Visualization Symposium (PacificVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdew/2016/2109/0/07495640", "title": "Querying and mining geo-textual data for exploration: Challenges and opportunities", "doi": null, "abstractUrl": "/proceedings-article/icdew/2016/07495640/12OmNzmclVB", "parentPublication": { "id": "proceedings/icdew/2016/2109/0", "title": "2016 IEEE 32nd International Conference on Data Engineering Workshops (ICDEW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/06/08320795", "title": "Predominance Tag Maps", "doi": null, "abstractUrl": "/journal/tg/2018/06/08320795/13rRUwhHcJq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2018/7202/0/720200a122", "title": "Depth-Enhanced Tag Cloud Maps", "doi": null, "abstractUrl": "/proceedings-article/iv/2018/720200a122/17D45XeKgo7", "parentPublication": { "id": "proceedings/iv/2018/7202/0", "title": "2018 22nd International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933654", "title": "Time Varying Predominance Tag Maps", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933654/1fTgI2WaxuE", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/12/09143452", "title": "PyramidTags: Context-, Time- and Word Order-Aware Tag Maps to Explore Large Document Collections", "doi": null, "abstractUrl": "/journal/tg/2021/12/09143452/1lxmwM0AM9O", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2021/1865/0/186500a104", "title": "Exploring the Spatial-Visual Locality of Geo-tagged Urban Street Images", "doi": null, "abstractUrl": "/proceedings-article/mipr/2021/186500a104/1xPskaVXHR6", "parentPublication": { "id": "proceedings/mipr/2021/1865/0", "title": "2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6h4A8ldF6", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "acronym": "vis", "groupId": "9973064", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6hbizj1Xq", "doi": "10.1109/VIS54862.2022.00041", "title": "Beyond Visuals: Examining the Experiences of Geoscience Professionals With Vision Disabilities in Accessing Data Visualizations", "normalizedTitle": "Beyond Visuals: Examining the Experiences of Geoscience Professionals With Vision Disabilities in Accessing Data Visualizations", "abstract": "Data visualizations are ubiquitous in all disciplines and have become the primary means of analysing data and communicating insights. However, the predominant reliance on visual encoding of data con-tinues to create accessibility barriers for people who are blind/vision impaired resulting in their under representation in Science, Tech-nology, Engineering and Mathematics (STEM) disciplines. This research study seeks to understand the experiences of professionals who are blind/vision impaired in one such STEM discipline (geo-sciences) in accessing data visualizations. In-depth, semi-structured interviews with seven professionals were conducted to examine the accessibility barriers and areas for improvement to inform acces-sibility research pertaining to data visualizations through a socio-technical lens. A reflexive thematic analysis revealed the negative impact of visualizations in influencing their career path, lack of data exploration tools for research, barriers in accessing works of peers and mismatched pace of visualization and accessibility research. The article also includes recommendations from the participants to address some of these accessibility barriers.", "abstracts": [ { "abstractType": "Regular", "content": "Data visualizations are ubiquitous in all disciplines and have become the primary means of analysing data and communicating insights. However, the predominant reliance on visual encoding of data con-tinues to create accessibility barriers for people who are blind/vision impaired resulting in their under representation in Science, Tech-nology, Engineering and Mathematics (STEM) disciplines. This research study seeks to understand the experiences of professionals who are blind/vision impaired in one such STEM discipline (geo-sciences) in accessing data visualizations. In-depth, semi-structured interviews with seven professionals were conducted to examine the accessibility barriers and areas for improvement to inform acces-sibility research pertaining to data visualizations through a socio-technical lens. A reflexive thematic analysis revealed the negative impact of visualizations in influencing their career path, lack of data exploration tools for research, barriers in accessing works of peers and mismatched pace of visualization and accessibility research. The article also includes recommendations from the participants to address some of these accessibility barriers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data visualizations are ubiquitous in all disciplines and have become the primary means of analysing data and communicating insights. However, the predominant reliance on visual encoding of data con-tinues to create accessibility barriers for people who are blind/vision impaired resulting in their under representation in Science, Tech-nology, Engineering and Mathematics (STEM) disciplines. This research study seeks to understand the experiences of professionals who are blind/vision impaired in one such STEM discipline (geo-sciences) in accessing data visualizations. In-depth, semi-structured interviews with seven professionals were conducted to examine the accessibility barriers and areas for improvement to inform acces-sibility research pertaining to data visualizations through a socio-technical lens. A reflexive thematic analysis revealed the negative impact of visualizations in influencing their career path, lack of data exploration tools for research, barriers in accessing works of peers and mismatched pace of visualization and accessibility research. The article also includes recommendations from the participants to address some of these accessibility barriers.", "fno": "881200a160", "keywords": [ "Data Analysis", "Data Visualisation", "Government Data Processing", "Handicapped Aids", "Socio Economic Effects", "Accessibility Barriers", "Accessibility Research", "Accessing Data Visualizations", "Analysing Data", "Data Con Tinues", "Data Exploration Tools", "Geoscience Professionals", "Mathematics Disciplines", "STEM Discipline", "Vision Disabilities", "Visual Encoding", "Visualization", "Visuals", "Engineering Profession", "Visual Analytics", "Design Methodology", "Data Visualization", "Geoscience", "Encoding", "Interviews", "Human Centered Computing", "Visualization", "Visualization Design And Evaluation Methods", "Accessibility", "Accessibility Technologies" ], "authors": [ { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "Nihanth W. Cherukuru", "givenName": "Nihanth W.", "surname": "Cherukuru", "__typename": "ArticleAuthorType" }, { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "David A. Bailey", "givenName": "David A.", "surname": "Bailey", "__typename": "ArticleAuthorType" }, { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "Tiffany Fourment", "givenName": "Tiffany", "surname": "Fourment", "__typename": "ArticleAuthorType" }, { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "Becca Hatheway", "givenName": "Becca", "surname": "Hatheway", "__typename": "ArticleAuthorType" }, { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "Marika M. Holland", "givenName": "Marika M.", "surname": "Holland", "__typename": "ArticleAuthorType" }, { "affiliation": "National Center for Atmospheric Research (NCAR) University Corporation for Atmospheric Research (UCAR)", "fullName": "Matt Rehme", "givenName": "Matt", "surname": "Rehme", "__typename": "ArticleAuthorType" } ], "idPrefix": "vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "160-164", "year": "2022", "issn": null, "isbn": "978-1-6654-8812-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1J6hbeRX8Ri", "name": "pvis202288120-09973220s1-mm_881200a160.zip", "size": "61.7 kB", "location": "https://www.computer.org/csdl/api/v1/extra/pvis202288120-09973220s1-mm_881200a160.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "881200a155", "articleId": "1J6h9t3Kc3S", "__typename": "AdjacentArticleType" }, "next": { "fno": "881200a165", "articleId": "1J6hbs21TOM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2016/1790/0/07757722", "title": "The roles of socializers in career choice decisions for high school students in rural central Appalachia: “Who's doing what?”", "doi": null, "abstractUrl": "/proceedings-article/fie/2016/07757722/12OmNvAAtu6", "parentPublication": { "id": "proceedings/fie/2016/1790/0", "title": "2016 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2015/8454/0/07344400", "title": "Modeling student perceived costs and benefits to cooperative education programs (Co-ops) and pathways to participation", "doi": null, "abstractUrl": "/proceedings-article/fie/2015/07344400/12OmNx8wTwO", "parentPublication": { "id": "proceedings/fie/2015/8454/0", "title": "2015 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004255", "title": "Web-based visual analytics for extreme scale climate science", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004255/12OmNyFU7bR", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2014/4038/0/4038a564", "title": "An Online Educational Portal for Supporting Open Access to Teaching and Learning of People with Disabilities", "doi": null, "abstractUrl": "/proceedings-article/icalt/2014/4038a564/12OmNzT7Otk", "parentPublication": { "id": "proceedings/icalt/2014/4038/0", "title": "2014 IEEE 14th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2018/1174/0/08659328", "title": "Factors Mediating Learning and Application of Computational Modeling by Life Scientists", "doi": null, "abstractUrl": "/proceedings-article/fie/2018/08659328/18j9lADjzP2", "parentPublication": { "id": "proceedings/fie/2018/1174/0", "title": "2018 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962400", "title": "Bridging the Gender Gap through Problem-Based Learning in STEM Labs: What can we learn from Biotechnology?", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962400/1IHo0Evncvm", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2019/4752/0/09212977", "title": "Towards the Gamification of Assistive Technology for Professionals with Severe Impairments", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2019/09212977/1nHRRJf6yiY", "parentPublication": { "id": "proceedings/icvrv/2019/4752/0", "title": "2019 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsme/2020/5619/0/561900a707", "title": "Examining The Work Experience of Programmers with Visual Impairments", "doi": null, "abstractUrl": "/proceedings-article/icsme/2020/561900a707/1oqKIQzGVnG", "parentPublication": { "id": "proceedings/icsme/2020/5619/0", "title": "2020 IEEE International Conference on Software Maintenance and Evolution (ICSME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/01/09552177", "title": "Towards Understanding Sensory Substitution for Accessible Visualization: An Interview Study", "doi": null, "abstractUrl": "/journal/tg/2022/01/09552177/1xic9a4I0pi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/respect/2021/4905/0/09620628", "title": "Teachers&#x0027; Perceptions of Barriers Influencing African American and Hispanic Students with Disabilities&#x0027; Participation in K-12 Computer Science Education", "doi": null, "abstractUrl": "/proceedings-article/respect/2021/09620628/1yXuFSp9u7e", "parentPublication": { "id": "proceedings/respect/2021/4905/0", "title": "2021 Conference on Research in Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyr8Ytt", "title": "2015 19th International Conference on Information Visualisation (iV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNs59JK1", "doi": "10.1109/iV.2015.24", "title": "FATuM - Fast Animated Transitions Using Multi-buffers", "normalizedTitle": "FATuM - Fast Animated Transitions Using Multi-buffers", "abstract": "The rise of Big Data and powerful mobile devices calls for libraries able to render a large number of visual elements and make fast animations without loss of frame rate. We introduce the FATuM library as a middleware for visualization. With a single abstraction for visual elements based on the work of Bertin and adaptation of the double buffering technique, we enable animated visualization of large datasets in native applications and in the browser using the same codebase. Our system does not differentiate animated from static rendering, thus reducing code complexity and guaranteeing smooth animation. We show that our system maintains 60fps for up to 200.000 visual elements in a native application and 30fps for 100.000 visual elements in a web browser.", "abstracts": [ { "abstractType": "Regular", "content": "The rise of Big Data and powerful mobile devices calls for libraries able to render a large number of visual elements and make fast animations without loss of frame rate. We introduce the FATuM library as a middleware for visualization. With a single abstraction for visual elements based on the work of Bertin and adaptation of the double buffering technique, we enable animated visualization of large datasets in native applications and in the browser using the same codebase. Our system does not differentiate animated from static rendering, thus reducing code complexity and guaranteeing smooth animation. We show that our system maintains 60fps for up to 200.000 visual elements in a native application and 30fps for 100.000 visual elements in a web browser.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The rise of Big Data and powerful mobile devices calls for libraries able to render a large number of visual elements and make fast animations without loss of frame rate. We introduce the FATuM library as a middleware for visualization. With a single abstraction for visual elements based on the work of Bertin and adaptation of the double buffering technique, we enable animated visualization of large datasets in native applications and in the browser using the same codebase. Our system does not differentiate animated from static rendering, thus reducing code complexity and guaranteeing smooth animation. We show that our system maintains 60fps for up to 200.000 visual elements in a native application and 30fps for 100.000 visual elements in a web browser.", "fno": "7568a075", "keywords": [ "Data Visualization", "Libraries", "Visualization", "Animation", "Shape", "Rendering Computer Graphics", "Graphics Processing Units", "Transitions", "Animation", "Library" ], "authors": [ { "affiliation": null, "fullName": "Alexandre Perrot", "givenName": "Alexandre", "surname": "Perrot", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "David Auber", "givenName": "David", "surname": "Auber", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-07-01T00:00:00", "pubType": "proceedings", "pages": "75-82", "year": "2015", "issn": "1550-6037", "isbn": "978-1-4673-7568-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7568a068", "articleId": "12OmNqBtiYm", "__typename": "AdjacentArticleType" }, "next": { "fno": "7568a083", "articleId": "12OmNzVXNRE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/1990/9999/2/00205228", "title": "A programmer's interface: a visually enhanced and animated programming environment", "doi": null, "abstractUrl": "/proceedings-article/hicss/1990/00205228/12OmNywfKEM", "parentPublication": { "id": "proceedings/hicss/1990/9999/2", "title": "Twenty-Third Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nooric/2013/2823/0/2823a178", "title": "Random Animated Transition Using Quranic Verses", "doi": null, "abstractUrl": "/proceedings-article/nooric/2013/2823a178/12OmNyxFKfv", "parentPublication": { "id": "proceedings/nooric/2013/2823/0", "title": "2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/09/08031015", "title": "A Vector Field Design Approach to Animated Transitions", "doi": null, "abstractUrl": "/journal/tg/2018/09/08031015/13rRUB7a117", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/05/06658746", "title": "GraphDiaries: Animated Transitions and Temporal Navigation for Dynamic Networks", "doi": null, "abstractUrl": "/journal/tg/2014/05/06658746/13rRUxBrGgZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876010", "title": "The Not-so-Staggering Effect of Staggered Animated Transitions on Visual Tracking", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876010/13rRUxD9gXK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2007/06/v1240", "title": "Animated Transitions in Statistical Data Graphics", "doi": null, "abstractUrl": "/journal/tg/2007/06/v1240/13rRUxNW1TO", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805431", "title": "Common Fate for Animated Transitions in Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805431/1cG4F76usA8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09234027", "title": "Gemini: A Grammar and Recommender System for Animated Transitions in Statistical Graphics", "doi": null, "abstractUrl": "/journal/tg/2021/02/09234027/1o531wbxsSk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ldav/2020/8468/0/846800a027", "title": "Interactive Visualization of Terascale Data in the Browser: Fact or Fiction?", "doi": null, "abstractUrl": "/proceedings-article/ldav/2020/846800a027/1pZ0TITco5q", "parentPublication": { "id": "proceedings/ldav/2020/8468/0", "title": "2020 IEEE 10th Symposium on Large Data Analysis and Visualization (LDAV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a141", "title": "Improving Engagement of Animated Visualization with Visual Foreshadowing", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a141/1qRNNrMSIrm", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCaLEnv", "title": "Proceedings Fifth International Conference on Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2001", "__typename": "ProceedingType" }, "article": { "id": "12OmNwBT1mq", "doi": "10.1109/IV.2001.942076", "title": "Animated Illuminated Lines for Flow Visualization", "normalizedTitle": "Animated Illuminated Lines for Flow Visualization", "abstract": "Abstract: A method of using a dynamic texture map on 3D polylines to represent field streamlines is described for the purpose of visualizing continuous fluid dynamics fields. The method combines stream lines and particle animation into one hybrid technique, and employs texture display on lines to represent full 3D lighting, motion and 3D flow structure in one view. The technique exploits texture graphics systems in common use for games, and achieves high graphics efficiency during animation.", "abstracts": [ { "abstractType": "Regular", "content": "Abstract: A method of using a dynamic texture map on 3D polylines to represent field streamlines is described for the purpose of visualizing continuous fluid dynamics fields. The method combines stream lines and particle animation into one hybrid technique, and employs texture display on lines to represent full 3D lighting, motion and 3D flow structure in one view. The technique exploits texture graphics systems in common use for games, and achieves high graphics efficiency during animation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Abstract: A method of using a dynamic texture map on 3D polylines to represent field streamlines is described for the purpose of visualizing continuous fluid dynamics fields. The method combines stream lines and particle animation into one hybrid technique, and employs texture display on lines to represent full 3D lighting, motion and 3D flow structure in one view. The technique exploits texture graphics systems in common use for games, and achieves high graphics efficiency during animation.", "fno": "11950317", "keywords": [ "Illuminated Lines", "Interpolation", "Fluid Dynamics", "Color", "Flow Visualization", "Texture", "Animation" ], "authors": [ { "affiliation": "Advanced Visual Systems Ltd.", "fullName": "Ian Curington", "givenName": "Ian", "surname": "Curington", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": false, "showBuyMe": true, "hasPdf": true, "pubDate": "2001-07-01T00:00:00", "pubType": "proceedings", "pages": "0317", "year": "2001", "issn": null, "isbn": "0-7695-1195-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "11950311", "articleId": "12OmNxecRUp", "__typename": "AdjacentArticleType" }, "next": { "fno": "11950323", "articleId": "12OmNx8wTiw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBUAvUQ", "title": "Information Visualization, IEEE Symposium on", "acronym": "ieee-infovis", "groupId": "1000371", "volume": "0", "displayVolume": "0", "year": "2003", "__typename": "ProceedingType" }, "article": { "id": "12OmNwMXntl", "doi": "10.1109/INFVIS.2003.1249025", "title": "Causality Visualization Using Animated Growing Polygons", "normalizedTitle": "Causality Visualization Using Animated Growing Polygons", "abstract": "We present Growing Polygons, a novel visualization technique for the graphical representation of causal relations and information flow in a system of interacting processes. Using this method, individual processes are displayed as partitioned polygons with color-coded segments showing dependencies to other processes. The entire visualization is also animated to communicate the dynamic execution of the system to the user. The results from a comparative user study of the method show that the Growing Polygons technique is significantly more efficient than the traditional Hasse diagram visualization for analysis tasks related to deducing information ow in a system for both small and large executions. Furthermore, our findings indicate that the correctness when solving causality tasks is significantly improved using our method. In addition, the subjective ratings of the users rank the method as superior in all regards, including usability, efficiency, and enjoyability.", "abstracts": [ { "abstractType": "Regular", "content": "We present Growing Polygons, a novel visualization technique for the graphical representation of causal relations and information flow in a system of interacting processes. Using this method, individual processes are displayed as partitioned polygons with color-coded segments showing dependencies to other processes. The entire visualization is also animated to communicate the dynamic execution of the system to the user. The results from a comparative user study of the method show that the Growing Polygons technique is significantly more efficient than the traditional Hasse diagram visualization for analysis tasks related to deducing information ow in a system for both small and large executions. Furthermore, our findings indicate that the correctness when solving causality tasks is significantly improved using our method. In addition, the subjective ratings of the users rank the method as superior in all regards, including usability, efficiency, and enjoyability.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present Growing Polygons, a novel visualization technique for the graphical representation of causal relations and information flow in a system of interacting processes. Using this method, individual processes are displayed as partitioned polygons with color-coded segments showing dependencies to other processes. The entire visualization is also animated to communicate the dynamic execution of the system to the user. The results from a comparative user study of the method show that the Growing Polygons technique is significantly more efficient than the traditional Hasse diagram visualization for analysis tasks related to deducing information ow in a system for both small and large executions. Furthermore, our findings indicate that the correctness when solving causality tasks is significantly improved using our method. In addition, the subjective ratings of the users rank the method as superior in all regards, including usability, efficiency, and enjoyability.", "fno": "20550024", "keywords": [ "Causal Relations", "Information Visualization", "Interactive Animation" ], "authors": [ { "affiliation": "Chalmers University of Technology, Sweden", "fullName": "Niklas Elmqvist", "givenName": "Niklas", "surname": "Elmqvist", "__typename": "ArticleAuthorType" }, { "affiliation": "Chalmers University of Technology, Sweden", "fullName": "Philippas Tsigas", "givenName": "Philippas", "surname": "Tsigas", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-infovis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2003-10-01T00:00:00", "pubType": "proceedings", "pages": "24", "year": "2003", "issn": null, "isbn": "0-7695-2055-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "20550023", "articleId": "12OmNBInLjT", "__typename": "AdjacentArticleType" }, "next": { "fno": "20550025", "articleId": "12OmNwFidg8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2000/6478/0/64780028", "title": "Interactive Visualization of Protein Dynamics", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780028/12OmNAtK4q0", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdip/2009/3565/0/3565a366", "title": "A New Algorithm for Watermarking Building Polygons", "doi": null, "abstractUrl": "/proceedings-article/icdip/2009/3565a366/12OmNwwMf5J", "parentPublication": { "id": "proceedings/icdip/2009/3565/0", "title": "Digital Image Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2000/6478/0/64780029", "title": "Interactive Visualization of Particle-In-Cell Simulations", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780029/12OmNxHJ9sZ", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-infovis/2005/2790/0/01532149", "title": "Temporal visualization of planning polygons for efficient partitioning of geo-spatial data", "doi": null, "abstractUrl": "/proceedings-article/ieee-infovis/2005/01532149/12OmNyuy9Sb", "parentPublication": { "id": "proceedings/ieee-infovis/2005/2790/0", "title": "Information Visualization, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2005/2397/0/23970896", "title": "Faster Is Better: Optimal Speed of Animated Visualizations for Decision Makers", "doi": null, "abstractUrl": "/proceedings-article/iv/2005/23970896/12OmNywfKEC", "parentPublication": { "id": "proceedings/iv/2005/2397/0", "title": "Ninth International Conference on Information Visualisation (IV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infvis/2005/9464/0/01532149", "title": "Temporal visualization of planning polygons for efficient partitioning of geo-spatial data", "doi": null, "abstractUrl": "/proceedings-article/infvis/2005/01532149/12OmNzaQoLh", "parentPublication": { "id": "proceedings/infvis/2005/9464/0", "title": "IEEE Symposium on Information Visualization (InfoVis 05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2015/05/mcg2015050076", "title": "Contiguous Animated Edge-Based Cartograms for Traffic Visualization", "doi": null, "abstractUrl": "/magazine/cg/2015/05/mcg2015050076/13rRUwI5Uai", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/05/mcg2008050022", "title": "Visualization Research is Growing and Expanding", "doi": null, "abstractUrl": "/magazine/cg/2008/05/mcg2008050022/13rRUzpzeDv", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805431", "title": "Common Fate for Animated Transitions in Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805431/1cG4F76usA8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2020/8014/0/801400a141", "title": "Improving Engagement of Animated Visualization with Visual Foreshadowing", "doi": null, "abstractUrl": "/proceedings-article/vis/2020/801400a141/1qRNNrMSIrm", "parentPublication": { "id": "proceedings/vis/2020/8014/0", "title": "2020 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyS6RMB", "title": "2009 13th International Conference Information Visualisation", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNxRnvSe", "doi": "10.1109/IV.2009.89", "title": "Slices of Time - Appraising the Use of Dynamics in Design", "normalizedTitle": "Slices of Time - Appraising the Use of Dynamics in Design", "abstract": "Dynamics, movement, kinetics, animation: So many names for an area so frequently ignored in graphics. Ephemeral by nature, such transient devices are frequently ignored over the concrete and contextual. Yet the screen has become the primary source for accessing information and is ubiquitous in urban advertising, stimulating graphics increasingly to include dynamics and visual momentum in their design. This paper seeks to reappraise the application of dynamics for representation and appeal, drawing on implied dynamics in static images, dynamics within the frame and dynamic editing. Using illustrative examples this paper discusses whether a commonality of kinetic perception in dynamics can be relied upon for engagement and appeal, and offers a new conceptual model for event perception, drawing on cognitive psychology, montage theory and eye tracking technology. The paper posits that motion is a primary perceptual form and that its application in visualization boosts gestalt comprehension.", "abstracts": [ { "abstractType": "Regular", "content": "Dynamics, movement, kinetics, animation: So many names for an area so frequently ignored in graphics. Ephemeral by nature, such transient devices are frequently ignored over the concrete and contextual. Yet the screen has become the primary source for accessing information and is ubiquitous in urban advertising, stimulating graphics increasingly to include dynamics and visual momentum in their design. This paper seeks to reappraise the application of dynamics for representation and appeal, drawing on implied dynamics in static images, dynamics within the frame and dynamic editing. Using illustrative examples this paper discusses whether a commonality of kinetic perception in dynamics can be relied upon for engagement and appeal, and offers a new conceptual model for event perception, drawing on cognitive psychology, montage theory and eye tracking technology. The paper posits that motion is a primary perceptual form and that its application in visualization boosts gestalt comprehension.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Dynamics, movement, kinetics, animation: So many names for an area so frequently ignored in graphics. Ephemeral by nature, such transient devices are frequently ignored over the concrete and contextual. Yet the screen has become the primary source for accessing information and is ubiquitous in urban advertising, stimulating graphics increasingly to include dynamics and visual momentum in their design. This paper seeks to reappraise the application of dynamics for representation and appeal, drawing on implied dynamics in static images, dynamics within the frame and dynamic editing. Using illustrative examples this paper discusses whether a commonality of kinetic perception in dynamics can be relied upon for engagement and appeal, and offers a new conceptual model for event perception, drawing on cognitive psychology, montage theory and eye tracking technology. The paper posits that motion is a primary perceptual form and that its application in visualization boosts gestalt comprehension.", "fno": "3733a598", "keywords": [ "Dynamics", "Animation", "Perception", "Cognition", "Visualization" ], "authors": [ { "affiliation": null, "fullName": "Carol MacGillivray", "givenName": "Carol", "surname": "MacGillivray", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-07-01T00:00:00", "pubType": "proceedings", "pages": "598-604", "year": "2009", "issn": null, "isbn": "978-0-7695-3733-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3733a702", "articleId": "12OmNrYCXRV", "__typename": "AdjacentArticleType" }, "next": { "fno": "3733a607", "articleId": "12OmNCmpcLL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ieee-vis/2000/6478/0/64780028", "title": "Interactive Visualization of Protein Dynamics", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2000/64780028/12OmNAtK4q0", "parentPublication": { "id": "proceedings/ieee-vis/2000/6478/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2016/8851/0/8851d521", "title": "Newtonian Image Understanding: Unfolding the Dynamics of Objects in Static Images", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2016/8851d521/12OmNC3FG4S", "parentPublication": { "id": "proceedings/cvpr/2016/8851/0", "title": "2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pdis/1991/2295/0/00183089", "title": "Cooperative visualization of computational fluid dynamics", "doi": null, "abstractUrl": "/proceedings-article/pdis/1991/00183089/12OmNxymo79", "parentPublication": { "id": "proceedings/pdis/1991/2295/0", "title": "Proceedings of the First International Conference on Parallel and Distributed Information Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498lum", "title": "Kinetic Visualization - A Technique for Illustrating 3D Shape and Structure", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498lum/12OmNyNQSCD", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2009/3571/4/3571d290", "title": "The Research of Perception Marketing System Model and Simulation Based on Systems Dynamics", "doi": null, "abstractUrl": "/proceedings-article/gcis/2009/3571d290/12OmNyQ7FUN", "parentPublication": { "id": "proceedings/gcis/2009/3571/4", "title": "2009 WRI Global Congress on Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2016/0641/0/07477712", "title": "The geometry of a scene: On deep semantics for visual perception driven cognitive film, studies", "doi": null, "abstractUrl": "/proceedings-article/wacv/2016/07477712/12OmNzQzqfL", "parentPublication": { "id": "proceedings/wacv/2016/0641/0", "title": "2016 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fg/2011/9140/0/05771471", "title": "Mapping and manipulating facial dynamics", "doi": null, "abstractUrl": "/proceedings-article/fg/2011/05771471/12OmNznkJVg", "parentPublication": { "id": "proceedings/fg/2011/9140/0", "title": "Face and Gesture 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/1996/02/mcg1996020050", "title": "Animating Human Locomotion with Inverse Dynamics", "doi": null, "abstractUrl": "/magazine/cg/1996/02/mcg1996020050/13rRUxASujP", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805431", "title": "Common Fate for Animated Transitions in Visualization", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805431/1cG4F76usA8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icid/2020/1481/0/440500a219", "title": "Research on the dynamic principle of visual perception in product design", "doi": null, "abstractUrl": "/proceedings-article/icid/2020/440500a219/1taFpWqwgzC", "parentPublication": { "id": "proceedings/icid/2020/1481/0", "title": "2020 International Conference on Intelligent Design (ICID)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tTtoVK3gYg", "title": "2021 IEEE 14th Pacific Visualization Symposium (PacificVis)", "acronym": "pacificvis", "groupId": "1001657", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tTtsrCBB8A", "doi": "10.1109/PacificVis52677.2021.00033", "title": "A Visual Analytics Approach for the Diagnosis of Heterogeneous and Multidimensional Machine Maintenance Data", "normalizedTitle": "A Visual Analytics Approach for the Diagnosis of Heterogeneous and Multidimensional Machine Maintenance Data", "abstract": "Analysis of large, high-dimensional, and heterogeneous datasets is challenging as no one technique is suitable for visualizing and clustering such data in order to make sense of the underlying information. For instance, heterogeneous logs detailing machine repair and maintenance in an organization often need to be analyzed to diagnose errors and identify abnormal patterns, formalize root-cause analyses, and plan preventive maintenance. Such real-world datasets are also beset by issues such as inconsistent and/or missing entries. To conduct an effective diagnosis, it is important to extract and understand patterns from the data with support from analytic algorithms (e.g., finding that certain kinds of machine complaints occur more in the summer) while involving the human-in-the-loop. To address these challenges, we adopt existing techniques for dimensionality reduction (DR) and clustering of numerical, categorical, and text data dimensions, and introduce a visual analytics approach that uses multiple coordinated views to connect DR + clustering results across each kind of the data dimension stated. To help analysts label the clusters, each clustering view is supplemented with techniques and visualizations that contrast a cluster of interest with the rest of the dataset. Our approach assists analysts to make sense of machine maintenance logs and their errors. Then the gained insights help them carry out preventive maintenance. We illustrate and evaluate our approach through use cases and expert studies respectively, and discuss generalization of the approach to other heterogeneous data.", "abstracts": [ { "abstractType": "Regular", "content": "Analysis of large, high-dimensional, and heterogeneous datasets is challenging as no one technique is suitable for visualizing and clustering such data in order to make sense of the underlying information. For instance, heterogeneous logs detailing machine repair and maintenance in an organization often need to be analyzed to diagnose errors and identify abnormal patterns, formalize root-cause analyses, and plan preventive maintenance. Such real-world datasets are also beset by issues such as inconsistent and/or missing entries. To conduct an effective diagnosis, it is important to extract and understand patterns from the data with support from analytic algorithms (e.g., finding that certain kinds of machine complaints occur more in the summer) while involving the human-in-the-loop. To address these challenges, we adopt existing techniques for dimensionality reduction (DR) and clustering of numerical, categorical, and text data dimensions, and introduce a visual analytics approach that uses multiple coordinated views to connect DR + clustering results across each kind of the data dimension stated. To help analysts label the clusters, each clustering view is supplemented with techniques and visualizations that contrast a cluster of interest with the rest of the dataset. Our approach assists analysts to make sense of machine maintenance logs and their errors. Then the gained insights help them carry out preventive maintenance. We illustrate and evaluate our approach through use cases and expert studies respectively, and discuss generalization of the approach to other heterogeneous data.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Analysis of large, high-dimensional, and heterogeneous datasets is challenging as no one technique is suitable for visualizing and clustering such data in order to make sense of the underlying information. For instance, heterogeneous logs detailing machine repair and maintenance in an organization often need to be analyzed to diagnose errors and identify abnormal patterns, formalize root-cause analyses, and plan preventive maintenance. Such real-world datasets are also beset by issues such as inconsistent and/or missing entries. To conduct an effective diagnosis, it is important to extract and understand patterns from the data with support from analytic algorithms (e.g., finding that certain kinds of machine complaints occur more in the summer) while involving the human-in-the-loop. To address these challenges, we adopt existing techniques for dimensionality reduction (DR) and clustering of numerical, categorical, and text data dimensions, and introduce a visual analytics approach that uses multiple coordinated views to connect DR + clustering results across each kind of the data dimension stated. To help analysts label the clusters, each clustering view is supplemented with techniques and visualizations that contrast a cluster of interest with the rest of the dataset. Our approach assists analysts to make sense of machine maintenance logs and their errors. Then the gained insights help them carry out preventive maintenance. We illustrate and evaluate our approach through use cases and expert studies respectively, and discuss generalization of the approach to other heterogeneous data.", "fno": "393100a196", "keywords": [ "Data Analysis", "Data Reduction", "Data Visualisation", "Feature Extraction", "Mechanical Engineering Computing", "Pattern Clustering", "Preventive Maintenance", "Text Analysis", "Visual Analytics", "Multidimensional Machine Maintenance Data", "Heterogeneous Datasets", "Heterogeneous Logs", "Machine Repair", "Root Cause Analyses", "Preventive Maintenance", "Numerical Data Clustering", "Machine Maintenance Logs", "Categorical Data Clustering", "Text Data Clustering", "Data Visualization", "Dimensionality Reduction", "Learning Systems", "Dimensionality Reduction", "Visual Analytics", "Data Visualization", "Clustering Algorithms", "Organizations", "Data Mining", "Visual Analytics", "Heterogeneous Data", "High Dimensional Data", "Machine Learning", "Text Analytics", "Maintenance Logs" ], "authors": [ { "affiliation": "University of California,Davis", "fullName": "Xiaoyu Zhang", "givenName": "Xiaoyu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Davis", "fullName": "Takanori Fujiwara", "givenName": "Takanori", "surname": "Fujiwara", "__typename": "ArticleAuthorType" }, { "affiliation": "Delft University of Technology", "fullName": "Senthil Chandrasegaran", "givenName": "Senthil", "surname": "Chandrasegaran", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Michael P. Brundage", "givenName": "Michael P.", "surname": "Brundage", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Thurston Sexton", "givenName": "Thurston", "surname": "Sexton", "__typename": "ArticleAuthorType" }, { "affiliation": "National Institute of Standards and Technology", "fullName": "Alden Dima", "givenName": "Alden", "surname": "Dima", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California,Davis", "fullName": "Kwan-Liu Ma", "givenName": "Kwan-Liu", "surname": "Ma", "__typename": "ArticleAuthorType" } ], "idPrefix": "pacificvis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-04-01T00:00:00", "pubType": "proceedings", "pages": "196-205", "year": "2021", "issn": null, "isbn": "978-1-6654-3931-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "393100a186", "articleId": "1tTtslm0K4g", "__typename": "AdjacentArticleType" }, "next": { "fno": "393100a206", "articleId": "1tTtpeWwWuQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2013/4932/0/4932a950", "title": "Research on the Optimal Preventive Maintenance Cost of Electronic Equipments", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2013/4932a950/12OmNyqRnii", "parentPublication": { "id": "proceedings/icmtma/2013/4932/0", "title": "2013 Fifth International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2011/04/ttg2011040440", "title": "Forecasting Hotspots—A Predictive Analytics Approach", "doi": null, "abstractUrl": "/journal/tg/2011/04/ttg2011040440/13rRUwdrdSv", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/01/mcg2014010042", "title": "Visual Analytics for Power Grid Contingency Analysis", "doi": null, "abstractUrl": "/magazine/cg/2014/01/mcg2014010042/13rRUyg2jNr", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09903343", "title": "RankAxis: Towards a Systematic Combination of Projection and Ranking in Multi-Attribute Data Exploration", "doi": null, "abstractUrl": "/journal/tg/2023/01/09903343/1GZooOkjYzK", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/06/09878189", "title": "Integrating Constraints Into Dimensionality Reduction for Visualization: A Survey", "doi": null, "abstractUrl": "/journal/ai/2022/06/09878189/1GrP8bfHhFm", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2022/8812/0/881200a080", "title": "Uniform Manifold Approximation with Two-phase Optimization", "doi": null, "abstractUrl": "/proceedings-article/vis/2022/881200a080/1J6hbOw1XBC", "parentPublication": { "id": "proceedings/vis/2022/8812/0", "title": "2022 IEEE Visualization and Visual Analytics (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vds/2022/5721/0/572100a001", "title": "Case Study Comparison of Computational Notebook Platforms for Interactive Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vds/2022/572100a001/1JezLhI4Vm8", "parentPublication": { "id": "proceedings/vds/2022/5721/0", "title": "2022 IEEE Visualization in Data Science (VDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805461", "title": "Supporting Analysis of Dimensionality Reduction Results with Contrastive Learning", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805461/1cG4ulCK5S8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08809834", "title": "An Incremental Dimensionality Reduction Method for Visualizing Streaming Multidimensional Data", "doi": null, "abstractUrl": "/journal/tg/2020/01/08809834/1cHEiLzaKw8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/03/09632413", "title": "RCMVis: A Visual Analytics System for Route Choice Modeling", "doi": null, "abstractUrl": "/journal/tg/2023/03/09632413/1yYPkLFxoTC", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoSbiB", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNz5apw2", "doi": "10.1109/EISIC.2016.038", "title": "A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment", "normalizedTitle": "A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment", "abstract": "This paper presents a framework that supports the detection and mitigation of cognitive biases in visual analytics environments for criminal analysis. Criminal analysts often use visual analytics environments for their analysis of large data sets, for gaining insights on criminal events and patterns of criminal events, and for drawing conclusions and making decisions. However, due to the nature of human cognition, these cognitive processes may lead to systematic errors, so-called cognitive biases. The most prominent and relevant cognitive bias in the intelligence field is the confirmation bias, in which an analyst disproportionally considers and selects information that supports the initial expectation and hypothesis. The framework presented in this paper describes a model, how the possible occurence of the confirmation bias can be detected automatically, while the analyst makes use of the visual environment. Moreover, based on this information, different feedback methods are employed that support and encourage the mitigation of the confirmation bias. This framework is in a work-in-progress state and contains research objectives and directions, the framework design, initial implementations, plans for further development and integration, as well as user-centric evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "This paper presents a framework that supports the detection and mitigation of cognitive biases in visual analytics environments for criminal analysis. Criminal analysts often use visual analytics environments for their analysis of large data sets, for gaining insights on criminal events and patterns of criminal events, and for drawing conclusions and making decisions. However, due to the nature of human cognition, these cognitive processes may lead to systematic errors, so-called cognitive biases. The most prominent and relevant cognitive bias in the intelligence field is the confirmation bias, in which an analyst disproportionally considers and selects information that supports the initial expectation and hypothesis. The framework presented in this paper describes a model, how the possible occurence of the confirmation bias can be detected automatically, while the analyst makes use of the visual environment. Moreover, based on this information, different feedback methods are employed that support and encourage the mitigation of the confirmation bias. This framework is in a work-in-progress state and contains research objectives and directions, the framework design, initial implementations, plans for further development and integration, as well as user-centric evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper presents a framework that supports the detection and mitigation of cognitive biases in visual analytics environments for criminal analysis. Criminal analysts often use visual analytics environments for their analysis of large data sets, for gaining insights on criminal events and patterns of criminal events, and for drawing conclusions and making decisions. However, due to the nature of human cognition, these cognitive processes may lead to systematic errors, so-called cognitive biases. The most prominent and relevant cognitive bias in the intelligence field is the confirmation bias, in which an analyst disproportionally considers and selects information that supports the initial expectation and hypothesis. The framework presented in this paper describes a model, how the possible occurence of the confirmation bias can be detected automatically, while the analyst makes use of the visual environment. Moreover, based on this information, different feedback methods are employed that support and encourage the mitigation of the confirmation bias. This framework is in a work-in-progress state and contains research objectives and directions, the framework design, initial implementations, plans for further development and integration, as well as user-centric evaluation.", "fno": "07870211", "keywords": [ "Cognition", "Data Analysis", "Data Visualisation", "Decision Making", "Digital Forensics", "Feedback", "Cognitive Bias Detection", "Cognitive Bias Mitigation", "Visual Analytics Environments", "Criminal Analysis", "Criminal Events", "Decision Making", "Human Cognition", "Cognitive Processes", "Systematic Errors", "Confirmation Bias", "Visual Environment", "Work In Progress State", "User Centric Evaluation", "Visual Analytics", "Data Visualization", "Systematics", "Context", "Uncertainty", "Software", "Visual Analytics", "Criminal Intelligence", "Cognitive Bias" ], "authors": [ { "affiliation": null, "fullName": "Alexander Nussbaumer", "givenName": "Alexander", "surname": "Nussbaumer", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Katrien Verbert", "givenName": "Katrien", "surname": "Verbert", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Eva-Catherine Hillemann", "givenName": "Eva-Catherine", "surname": "Hillemann", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Michael A. Bedek", "givenName": "Michael A.", "surname": "Bedek", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dietrich Albert", "givenName": "Dietrich", "surname": "Albert", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-08-01T00:00:00", "pubType": "proceedings", "pages": "148-151", "year": "2016", "issn": null, "isbn": "978-1-5090-2857-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07870210", "articleId": "12OmNqIzha2", "__typename": "AdjacentArticleType" }, "next": { "fno": "07870212", "articleId": "12OmNzdoMGi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2017/2385/0/2385a151", "title": "A Framework for Measuring Imagination in Visual Analytics Systems", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385a151/12OmNAJVcGb", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367b138", "title": "Interactivity in Visual Analytics: Use of Conceptual Frameworks to Support Human-Centered Design of a Decision-Support Tool", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367b138/12OmNB06l9m", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2015/8657/0/8657a125", "title": "The Role of Cognitive Biases in Criminal Intelligence Analysis and Approaches for their Mitigation", "doi": null, "abstractUrl": "/proceedings-article/eisic/2015/8657a125/12OmNqAU6oo", "parentPublication": { "id": "proceedings/eisic/2015/8657/0", "title": "2015 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718616", "title": "Pair Analytics: Capturing Reasoning Processes in Collaborative Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718616/12OmNvAiShB", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2008/01/mcg2008010018", "title": "An Information-Theoretic View of Visual Analytics", "doi": null, "abstractUrl": "/magazine/cg/2008/01/mcg2008010018/13rRUB6SpRW", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2014/12/06876049", "title": "Progressive Visual Analytics: User-Driven Visual Exploration of In-Progress Analytics", "doi": null, "abstractUrl": "/journal/tg/2014/12/06876049/13rRUyogGAd", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585665", "title": "The Anchoring Effect in Decision-Making with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585665/17D45WZZ7CL", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585669", "title": "Warning, Bias May Occur: A Proposed Approach to Detecting Cognitive Bias in Interactive Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585669/17D45X0yjSw", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833151", "title": "A Crowdsourced Study of Visual Strategies for Mitigating Confirmation Bias", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833151/1FUSHzAGmm4", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mlui/2018/4063/0/10075559", "title": "Speculative Execution for Guided Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/mlui/2018/10075559/1LIRzgCUp7a", "parentPublication": { "id": "proceedings/mlui/2018/4063/0", "title": "2018 IEEE Workshop on Machine Learning from User Interaction for Visualization and Analytics (MLUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKirC", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "acronym": "vast", "groupId": "1001630", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45X0yjSw", "doi": "10.1109/VAST.2017.8585669", "title": "Warning, Bias May Occur: A Proposed Approach to Detecting Cognitive Bias in Interactive Visual Analytics", "normalizedTitle": "Warning, Bias May Occur: A Proposed Approach to Detecting Cognitive Bias in Interactive Visual Analytics", "abstract": "Visual analytic tools combine the complementary strengths of humans and machines in human-in-the-loop systems. Humans provide invaluable domain expertise and sensemaking capabilities to this discourse with analytic models; however, little consideration has yet been given to the ways inherent human biases might shape the visual analytic process. In this paper, we establish a conceptual framework for considering bias assessment through human-in-the-loop systems and lay the theoretical foundations for bias measurement. We propose six preliminary metrics to systematically detect and quantify bias from user interactions and demonstrate how the metrics might be implemented in an existing visual analytic system, InterAxis. We discuss how our proposed metrics could be used by visual analytic systems to mitigate the negative effects of cognitive biases by making users aware of biased processes throughout their analyses.", "abstracts": [ { "abstractType": "Regular", "content": "Visual analytic tools combine the complementary strengths of humans and machines in human-in-the-loop systems. Humans provide invaluable domain expertise and sensemaking capabilities to this discourse with analytic models; however, little consideration has yet been given to the ways inherent human biases might shape the visual analytic process. In this paper, we establish a conceptual framework for considering bias assessment through human-in-the-loop systems and lay the theoretical foundations for bias measurement. We propose six preliminary metrics to systematically detect and quantify bias from user interactions and demonstrate how the metrics might be implemented in an existing visual analytic system, InterAxis. We discuss how our proposed metrics could be used by visual analytic systems to mitigate the negative effects of cognitive biases by making users aware of biased processes throughout their analyses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Visual analytic tools combine the complementary strengths of humans and machines in human-in-the-loop systems. Humans provide invaluable domain expertise and sensemaking capabilities to this discourse with analytic models; however, little consideration has yet been given to the ways inherent human biases might shape the visual analytic process. In this paper, we establish a conceptual framework for considering bias assessment through human-in-the-loop systems and lay the theoretical foundations for bias measurement. We propose six preliminary metrics to systematically detect and quantify bias from user interactions and demonstrate how the metrics might be implemented in an existing visual analytic system, InterAxis. We discuss how our proposed metrics could be used by visual analytic systems to mitigate the negative effects of cognitive biases by making users aware of biased processes throughout their analyses.", "fno": "08585669", "keywords": [ "Cognition", "Data Analysis", "Data Visualisation", "Human Computer Interaction", "Sensemaking Capabilities", "Bias Assessment", "Human In The Loop Systems", "Bias Measurement", "User Interactions", "Cognitive Bias", "Interactive Visual Analytics", "Visual Analytic Tools", "Human Biases", "Inter Axis", "Domain Expertise", "Visual Analytics", "Cognition", "Analytical Models", "Measurement", "Decision Making", "Computational Modeling", "Data Analysis", "Cognitive Bias", "Visual Analytics", "Human In The Loop", "Mixed Initiative", "User Interaction", "H 5 0 Information Systems Human Computer Interaction General" ], "authors": [ { "affiliation": "Georgia Tech", "fullName": "Emily Wall", "givenName": "Emily", "surname": "Wall", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Laboratory", "fullName": "Leslie M. Blaha", "givenName": "Leslie M.", "surname": "Blaha", "__typename": "ArticleAuthorType" }, { "affiliation": "Pacific Northwest National Laboratory", "fullName": "Lyndsey Franklin", "givenName": "Lyndsey", "surname": "Franklin", "__typename": "ArticleAuthorType" }, { "affiliation": "Georgia Tech", "fullName": "Alex Endert", "givenName": "Alex", "surname": "Endert", "__typename": "ArticleAuthorType" } ], "idPrefix": "vast", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "104-115", "year": "2017", "issn": null, "isbn": "978-1-5386-3163-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08585498", "articleId": "17D45XvMccM", "__typename": "AdjacentArticleType" }, "next": { "fno": "08585665", "articleId": "17D45WZZ7CL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2011/9618/0/05718571", "title": "An Experimental Study of Financial Portfolio Selection with Visual Analytics for Decision Support", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718571/12OmNAlvHqY", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2013/5765/0/06636762", "title": "Visual analytics for software requirements engineering", "doi": null, "abstractUrl": "/proceedings-article/re/2013/06636762/12OmNrJ11yp", "parentPublication": { "id": "proceedings/re/2013/5765/0", "title": "2013 IEEE 21st International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870211", "title": "A Framework for Cognitive Bias Detection and Feedback in a Visual Analytics Environment", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870211/12OmNz5apw2", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b426", "title": "Introduction to the Minitrack on Interactive Visual Decision Analytics", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b426/12OmNzWfoUn", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2017/3163/0/08585665", "title": "The Anchoring Effect in Decision-Making with Visual Analytics", "doi": null, "abstractUrl": "/proceedings-article/vast/2017/08585665/17D45WZZ7CL", "parentPublication": { "id": "proceedings/vast/2017/3163/0", "title": "2017 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440809", "title": "Mitigating the Attraction Effect with Visualizations", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440809/17D45XH89qj", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08805420", "title": "FairSight: Visual Analytics for Fairness in Decision Making", "doi": null, "abstractUrl": "/journal/tg/2020/01/08805420/1cG4psmkNQA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acii/2019/3888/0/08925466", "title": "Unintentional affective priming during labeling may bias labels", "doi": null, "abstractUrl": "/proceedings-article/acii/2019/08925466/1fHGBfUYXkY", "parentPublication": { "id": "proceedings/acii/2019/3888/0", "title": "2019 8th International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2019/4941/0/08933611", "title": "Toward a Design Space for Mitigating Cognitive Bias in Vis", "doi": null, "abstractUrl": "/proceedings-article/vis/2019/08933611/1fTgFpDHY3u", "parentPublication": { "id": "proceedings/vis/2019/4941/0", "title": "2019 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09233264", "title": "Selection-Bias-Corrected Visualization via Dynamic Reweighting", "doi": null, "abstractUrl": "/journal/tg/2021/02/09233264/1o53XOFTPP2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1JezJxTlu8M", "title": "2022 IEEE Visualization in Data Science (VDS)", "acronym": "vds", "groupId": "9982289", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1JezLhI4Vm8", "doi": "10.1109/VDS57266.2022.00005", "title": "Case Study Comparison of Computational Notebook Platforms for Interactive Visual Analytics", "normalizedTitle": "Case Study Comparison of Computational Notebook Platforms for Interactive Visual Analytics", "abstract": "The way of using computational notebooks is quite different between data science and visual analytics. Data scientists focus on data exploration with the code, while visual analytics users are interested in engaging with interactive visual interfaces to facilitate analytical reasoning. Such a difference leads to design contradictions while merging visual analytics tools with data science tools in computational notebooks. In this work, we investigated the problem using an example called &#x201C;Andromeda,&#x201D; which is an interactive dimension reduction algorithm, and implemented it using three different notebook platforms: 1) Python code in a Jupyter Notebook, 2) JavaScript code in an Observable Notebook, and 3) embedding both Python (data science use) and JavaScript (visual analytics use) in a Jupyter Notebook. Advantages and disadvantages are concluded for each platform by making comparisons based on various aspects, such as design logic, coding differences, performance, and usability. Laying the groundwork for data scientists, advice and recommendations are made on architecting similar notebooks and which platform to choose in various situations.", "abstracts": [ { "abstractType": "Regular", "content": "The way of using computational notebooks is quite different between data science and visual analytics. Data scientists focus on data exploration with the code, while visual analytics users are interested in engaging with interactive visual interfaces to facilitate analytical reasoning. Such a difference leads to design contradictions while merging visual analytics tools with data science tools in computational notebooks. In this work, we investigated the problem using an example called &#x201C;Andromeda,&#x201D; which is an interactive dimension reduction algorithm, and implemented it using three different notebook platforms: 1) Python code in a Jupyter Notebook, 2) JavaScript code in an Observable Notebook, and 3) embedding both Python (data science use) and JavaScript (visual analytics use) in a Jupyter Notebook. Advantages and disadvantages are concluded for each platform by making comparisons based on various aspects, such as design logic, coding differences, performance, and usability. Laying the groundwork for data scientists, advice and recommendations are made on architecting similar notebooks and which platform to choose in various situations.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The way of using computational notebooks is quite different between data science and visual analytics. Data scientists focus on data exploration with the code, while visual analytics users are interested in engaging with interactive visual interfaces to facilitate analytical reasoning. Such a difference leads to design contradictions while merging visual analytics tools with data science tools in computational notebooks. In this work, we investigated the problem using an example called “Andromeda,” which is an interactive dimension reduction algorithm, and implemented it using three different notebook platforms: 1) Python code in a Jupyter Notebook, 2) JavaScript code in an Observable Notebook, and 3) embedding both Python (data science use) and JavaScript (visual analytics use) in a Jupyter Notebook. Advantages and disadvantages are concluded for each platform by making comparisons based on various aspects, such as design logic, coding differences, performance, and usability. Laying the groundwork for data scientists, advice and recommendations are made on architecting similar notebooks and which platform to choose in various situations.", "fno": "572100a001", "keywords": [ "Authoring Languages", "Data Visualisation", "Interactive Systems", "Notebook Computers", "Python", "Analytical Reasoning", "Andromeda", "Architecting Similar Notebooks", "Case Study Comparison", "Computational Notebook Platforms", "Computational Notebooks", "Data Exploration", "Data Science Tools", "Data Science Usage", "Data Scientists", "Interactive Dimension Reduction Algorithm", "Interactive Visual Analytics", "Interactive Visual Interfaces", "Java Script Code", "Jupyter Notebook", "Notebook Platforms", "Observable Notebook", "Visual Analytics Tools", "Visual Analytics Usage", "Visual Analytics Users", "Dimensionality Reduction", "Codes", "Visual Analytics", "Merging", "Data Visualization", "Data Science", "Encoding", "Visual Analytics", "Data Science", "Computational Notebooks", "Dimension Reduction" ], "authors": [ { "affiliation": "Sanghani Center at Virginia Tech.", "fullName": "Han Liu", "givenName": "Han", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Sanghani Center at Virginia Tech.", "fullName": "Chris North", "givenName": "Chris", "surname": "North", "__typename": "ArticleAuthorType" } ], "idPrefix": "vds", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-5", "year": "2022", "issn": null, "isbn": "978-1-6654-5721-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "572100z005", "articleId": "1JezJZjCJhe", "__typename": "AdjacentArticleType" }, "next": { "fno": "572100a006", "articleId": "1JezMbpIoX6", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/jcdl/2017/3861/0/07991618", "title": "Using the Jupyter Notebook as a Tool for Open Science: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/jcdl/2017/07991618/12OmNyUnEBw", "parentPublication": { "id": "proceedings/jcdl/2017/3861/0", "title": "2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a253", "title": "Error Identification Strategies for Python Jupyter Notebooks", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a253/1EpKDu1Oj96", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833128", "title": "Exploring Organization of Computational Notebook Cells in 2D Space", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833128/1FUSKPSqVuE", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2022/3786/0/378600a492", "title": "ReSplit: Improving the Structure of Jupyter Notebooks by Re-Splitting Their Cells", "doi": null, "abstractUrl": "/proceedings-article/saner/2022/378600a492/1FbT3fltoMU", "parentPublication": { "id": "proceedings/saner/2022/3786/0", "title": "2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwsc/2022/8447/0/844700a062", "title": "Comparing Execution Traces of Jupyter Notebook for Checking Correctness of Refactoring", "doi": null, "abstractUrl": "/proceedings-article/iwsc/2022/844700a062/1J6hLFggMQ8", "parentPublication": { "id": "proceedings/iwsc/2022/8447/0", "title": "2022 IEEE 16th International Workshop on Software Clones (IWSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2022/6124/0/612400a393", "title": "Context-Aware Notebook Search in a Jupyter-Based Virtual Research Environment", "doi": null, "abstractUrl": "/proceedings-article/e-science/2022/612400a393/1J6huJxWbtK", "parentPublication": { "id": "proceedings/e-science/2022/6124/0", "title": "2022 IEEE 18th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2022/6124/0/612400a542", "title": "Benefits and Limitations of Jupyter-based Scientific Web Applications", "doi": null, "abstractUrl": "/proceedings-article/e-science/2022/612400a542/1J6huz2uLXG", "parentPublication": { "id": "proceedings/e-science/2022/6124/0", "title": "2022 IEEE 18th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2020/7628/0/762800a310", "title": "DS Lab Notebook: A new tool for data science applications", "doi": null, "abstractUrl": "/proceedings-article/synasc/2020/762800a310/1rtXDb2wi2Y", "parentPublication": { "id": "proceedings/synasc/2020/7628/0", "title": "2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cs/2021/02/09387474", "title": "Jupyter in Computational Science", "doi": null, "abstractUrl": "/magazine/cs/2021/02/09387474/1smCYUmppoQ", "parentPublication": { "id": "mags/cs", "title": "Computing in Science & Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576363", "title": "Immediate Feedback for Students to Solve Notebook Reproducibility Problems in the Classroom", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576363/1y63uJPLgYw", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1grQiYe8KaY", "title": "2019 IEEE Workshop on Visual Analytics in Healthcare (VAHC)", "acronym": "vahc", "groupId": "1826204", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1grQjnSzdYs", "doi": "10.1109/VAHC47919.2019.8945029", "title": "Dynamic Hierarchical Aggregation, Selection Bias Tracking, and Detailed Subset Comparison for High-Dimensional Event Sequence Data", "normalizedTitle": "Dynamic Hierarchical Aggregation, Selection Bias Tracking, and Detailed Subset Comparison for High-Dimensional Event Sequence Data", "abstract": "With the increase in collection of temporal event data, especially electronic health record (EHR) data, numerous different visualization and analysis techniques have been developed to assist with the interpretation of such data. As datasets grow increasingly large in both number of event sequences and number of event types, two problems arise: how to group event types, and how to describe selection bias that can occur when selecting cohorts. This poster summarizes two papers, conditionally accepted to VAST, that introduce a dynamic and interactive algorithm for hierarchical event grouping, a scented scatter-plus-focus visualization that supports hierarchical exploration, a tree-based cohort provenance visualization, and a set of visualizations that provide per-dimension selection bias information for pairs of cohorts [2, 4]. These methods are integrated into the web-based interactive medical analysis tool Cadence.", "abstracts": [ { "abstractType": "Regular", "content": "With the increase in collection of temporal event data, especially electronic health record (EHR) data, numerous different visualization and analysis techniques have been developed to assist with the interpretation of such data. As datasets grow increasingly large in both number of event sequences and number of event types, two problems arise: how to group event types, and how to describe selection bias that can occur when selecting cohorts. This poster summarizes two papers, conditionally accepted to VAST, that introduce a dynamic and interactive algorithm for hierarchical event grouping, a scented scatter-plus-focus visualization that supports hierarchical exploration, a tree-based cohort provenance visualization, and a set of visualizations that provide per-dimension selection bias information for pairs of cohorts [2, 4]. These methods are integrated into the web-based interactive medical analysis tool Cadence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the increase in collection of temporal event data, especially electronic health record (EHR) data, numerous different visualization and analysis techniques have been developed to assist with the interpretation of such data. As datasets grow increasingly large in both number of event sequences and number of event types, two problems arise: how to group event types, and how to describe selection bias that can occur when selecting cohorts. This poster summarizes two papers, conditionally accepted to VAST, that introduce a dynamic and interactive algorithm for hierarchical event grouping, a scented scatter-plus-focus visualization that supports hierarchical exploration, a tree-based cohort provenance visualization, and a set of visualizations that provide per-dimension selection bias information for pairs of cohorts [2, 4]. These methods are integrated into the web-based interactive medical analysis tool Cadence.", "fno": "08945029", "keywords": [ "Data Aggregation", "Data Analysis", "Data Integrity", "Data Visualisation", "Electronic Health Records", "Interactive Systems", "Internet", "Medical Computing", "Trees Mathematics", "Visualization Technique", "Analysis Technique", "EHR Data", "Selection Bias Information", "Web Based Interactive Medical Analysis Tool", "Cadence Tool", "Electronic Health Record Data", "Temporal Event Data", "High Dimensional Event Sequence Data", "Detailed Subset Comparison", "Selection Bias Tracking", "Dynamic Hierarchical Aggregation", "Tree Based Cohort Provenance Visualization", "Hierarchical Exploration", "Scented Scatter Plus Focus Visualization", "Hierarchical Event Grouping", "Interactive Algorithm", "Dynamic Algorithm", "Event Types", "Event Sequences", "Data Visualization", "Pain", "Obesity", "Tools", "Visualization", "Correlation", "Sleep Apnea", "Temporal Event Sequence Visualization", "Visual Analytics", "Hierarchical Aggregation", "Medical Informatics", "High Dimensional Visualization", "Cohort Selection", "Selection Bias" ], "authors": [ { "affiliation": "UNC-Chapel Hill", "fullName": "Jonathan Zhang", "givenName": "Jonathan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "David Borland", "givenName": "David", "surname": "Borland", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "Wenyuan Wang", "givenName": "Wenyuan", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "Joshua Shrestha", "givenName": "Joshua", "surname": "Shrestha", "__typename": "ArticleAuthorType" }, { "affiliation": "UNC-Chapel Hill", "fullName": "David Gotz", "givenName": "David", "surname": "Gotz", "__typename": "ArticleAuthorType" } ], "idPrefix": "vahc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-10-01T00:00:00", "pubType": "proceedings", "pages": "56-57", "year": "2019", "issn": null, "isbn": "978-1-7281-2423-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08945037", "articleId": "1grQjCKwms0", "__typename": "AdjacentArticleType" }, "next": { "fno": "08945028", "articleId": "1grQjcChZZK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2018/01/08025640", "title": "Sequence Synopsis: Optimize Visual Summary of Temporal Event Data", "doi": null, "abstractUrl": "/journal/tg/2018/01/08025640/13rRUyft7D8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/01/08440811", "title": "Visual Progression Analysis of Event Sequence Data", "doi": null, "abstractUrl": "/journal/tg/2019/01/08440811/17D45WXIkG6", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/03/08283817", "title": "Using Dashboard Networks to Visualize Multiple Patient Histories: A Design Study on Post-Operative Prostate Cancer", "doi": null, "abstractUrl": "/journal/tg/2019/03/08283817/17D45XacGi3", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icci*cc/2021/2119/0/09811333", "title": "An Interactive Approach to Bias Mitigation in Machine Learning", "doi": null, "abstractUrl": "/proceedings-article/icci*cc/2021/09811333/1EJGHuCmPew", "parentPublication": { "id": "proceedings/icci*cc/2021/2119/0", "title": "2021 IEEE 20th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2022/4214/0/09833151", "title": "A Crowdsourced Study of Visual Strategies for Mitigating Confirmation Bias", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2022/09833151/1FUSHzAGmm4", "parentPublication": { "id": "proceedings/vl-hcc/2022/4214/0", "title": "2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600v1443", "title": "VIsCUIT: Visual Auditor for Bias in CNN Image Classifier", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600v1443/1H1lhwFQixa", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807220", "title": "Visual Analysis of High-Dimensional Event Sequence Data via Dynamic Hierarchical Aggregation", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807220/1cG6bfa8KkM", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/01/08807213", "title": "Selection Bias Tracking and Detailed Subset Comparison for High-Dimensional Data", "doi": null, "abstractUrl": "/journal/tg/2020/01/08807213/1cG6uHFRwqI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09233264", "title": "Selection-Bias-Corrected Visualization via Dynamic Reweighting", "doi": null, "abstractUrl": "/journal/tg/2021/02/09233264/1o53XOFTPP2", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2021/05/09494334", "title": "Gender Bias in Online Language Translators: Visualization, Human Perception, and Bias/Accuracy Tradeoffs", "doi": null, "abstractUrl": "/magazine/ic/2021/05/09494334/1vyjlFSnjyM", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBbaH9R", "title": "1991 Third International Conference on Tools for Artificial Intelligence", "acronym": "tai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNrIJqr2", "doi": "10.1109/TAI.1991.167100", "title": "Hierarchical stereo matching using feature groupings", "normalizedTitle": "Hierarchical stereo matching using feature groupings", "abstract": "A feature based stereo matching system is designed. A hierarchical grouping process that groups line segments into more complex structures that are easier to match is proposed. The hierarchy consists of lines, vertices, edges and surfaces. Matching starts at the highest level of the hierarchy (surfaces) and proceeds to the lowest (lines). Higher level features are easier to match, because they are fewer in number and more distinct in form. These matches then constrain the matches at lower levels. Perceptual and structural relations are used to group matches into islands of certainty. A truth maintenance system (TMS) is used to enforce grouping constraints and eliminates inconsistent match groupings.<>", "abstracts": [ { "abstractType": "Regular", "content": "A feature based stereo matching system is designed. A hierarchical grouping process that groups line segments into more complex structures that are easier to match is proposed. The hierarchy consists of lines, vertices, edges and surfaces. Matching starts at the highest level of the hierarchy (surfaces) and proceeds to the lowest (lines). Higher level features are easier to match, because they are fewer in number and more distinct in form. These matches then constrain the matches at lower levels. Perceptual and structural relations are used to group matches into islands of certainty. A truth maintenance system (TMS) is used to enforce grouping constraints and eliminates inconsistent match groupings.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A feature based stereo matching system is designed. A hierarchical grouping process that groups line segments into more complex structures that are easier to match is proposed. The hierarchy consists of lines, vertices, edges and surfaces. Matching starts at the highest level of the hierarchy (surfaces) and proceeds to the lowest (lines). Higher level features are easier to match, because they are fewer in number and more distinct in form. These matches then constrain the matches at lower levels. Perceptual and structural relations are used to group matches into islands of certainty. A truth maintenance system (TMS) is used to enforce grouping constraints and eliminates inconsistent match groupings.", "fno": "00167100", "keywords": [ "Pattern Recognition", "Picture Processing", "Feature Groupings", "Stereo Matching System", "Hierarchical Grouping Process", "Line Segments", "Lines", "Vertices", "Edges", "Surfaces", "Truth Maintenance System", "Layout", "Process Design", "Instruments", "Uncertainty", "Cameras", "Geometry", "Image Segmentation", "Topology", "Educational Institutions", "Polynomials" ], "authors": [ { "affiliation": "Texas Instruments, Dallas, TX, USA", "fullName": "V. Venkateswar", "givenName": "V.", "surname": "Venkateswar", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "R. Chellappa", "givenName": "R.", "surname": "Chellappa", "__typename": "ArticleAuthorType" } ], "idPrefix": "tai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "238,239,240,241,242,243,244,245", "year": "1991", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00167099", "articleId": "12OmNAkWvLx", "__typename": "AdjacentArticleType" }, "next": { "fno": "00167101", "articleId": "12OmNA1VnuO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wvm/1991/2153/0/00212774", "title": "Hierarchical feature based matching for motion correspondence", "doi": null, "abstractUrl": "/proceedings-article/wvm/1991/00212774/12OmNvSKO1r", "parentPublication": { "id": "proceedings/wvm/1991/2153/0", "title": "Proceedings of the IEEE Workshop on Visual Motion", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dicta/2005/2467/0/24670069", "title": "Stereo Reconstruction Using an Image Noise Model", "doi": null, "abstractUrl": "/proceedings-article/dicta/2005/24670069/12OmNwF0BK1", "parentPublication": { "id": "proceedings/dicta/2005/2467/0", "title": "Digital Image Computing: Techniques and Applications (DICTA'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1990/2062/1/00118106", "title": "Experimental analysis of a number of stereo matching components using LMA", "doi": null, "abstractUrl": "/proceedings-article/icpr/1990/00118106/12OmNy49sLy", "parentPublication": { "id": "proceedings/icpr/1990/2062/1", "title": "Proceedings 10th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/1988/0878/0/00028261", "title": "Structural matching for stereo vision", "doi": null, "abstractUrl": "/proceedings-article/icpr/1988/00028261/12OmNyL0TAB", "parentPublication": { "id": "proceedings/icpr/1988/0878/0", "title": "9th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1992/2855/0/00223142", "title": "Hierarchical waveform matching: a new feature-based stereo technique", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1992/00223142/12OmNyO8tSm", "parentPublication": { "id": "proceedings/cvpr/1992/2855/0", "title": "Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1992/2720/0/00220126", "title": "A multistage stereo method giving priority to reliable matching", "doi": null, "abstractUrl": "/proceedings-article/robot/1992/00220126/12OmNyrqzqk", "parentPublication": { "id": "proceedings/robot/1992/2720/0", "title": "Proceedings 1992 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1990/2057/0/00139551", "title": "Feature matching for object localization in the presence of uncertainty", "doi": null, "abstractUrl": "/proceedings-article/iccv/1990/00139551/12OmNz4Bdms", "parentPublication": { "id": "proceedings/iccv/1990/2057/0", "title": "Proceedings Third International Conference on Computer Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2009/3992/0/05206793", "title": "Stereo matching with nonparametric smoothness priors in feature space", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2009/05206793/12OmNzvQI7W", "parentPublication": { "id": "proceedings/cvpr/2009/3992/0", "title": "2009 IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2000/12/i1381", "title": "Uncertainty Propagation and the Matching of Junctions as Feature Groupings", "doi": null, "abstractUrl": "/journal/tp/2000/12/i1381/13rRUwbJD5X", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1994/09/i0869", "title": "Learning and Feature Selection in Stereo Matching", "doi": null, "abstractUrl": "/journal/tp/1994/09/i0869/13rRUxBJhnB", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzSh1ax", "title": "Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "1991", "__typename": "ProceedingType" }, "article": { "id": "12OmNrMHOeq", "doi": "10.1109/CVPR.1991.139778", "title": "Extracting surfaces of revolution by perceptual grouping of ellipses", "normalizedTitle": "Extracting surfaces of revolution by perceptual grouping of ellipses", "abstract": "Ellipses seen in an image may be the 2-D projection of 3-D circles from the scene. Given this assumption, ellipses can be grouped into perceptual groups from which inferences about the 3-D structure of objects can be made. Methods are proposed for extracting groupings corresponding to surfaces of revolution. A Hough transform approach is used for grouping, after which the confidence in the plausibility of the perceptual group is improved by detecting symmetry groupings.<>", "abstracts": [ { "abstractType": "Regular", "content": "Ellipses seen in an image may be the 2-D projection of 3-D circles from the scene. Given this assumption, ellipses can be grouped into perceptual groups from which inferences about the 3-D structure of objects can be made. Methods are proposed for extracting groupings corresponding to surfaces of revolution. A Hough transform approach is used for grouping, after which the confidence in the plausibility of the perceptual group is improved by detecting symmetry groupings.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ellipses seen in an image may be the 2-D projection of 3-D circles from the scene. Given this assumption, ellipses can be grouped into perceptual groups from which inferences about the 3-D structure of objects can be made. Methods are proposed for extracting groupings corresponding to surfaces of revolution. A Hough transform approach is used for grouping, after which the confidence in the plausibility of the perceptual group is improved by detecting symmetry groupings.", "fno": "00139778", "keywords": [ "Pattern Recognition", "Picture Processing", "Transforms", "2 D Projections", "3 D Circles", "Ellipses Grouping", "Surfaces Of Revolution", "Perceptual Grouping", "Hough Transform Approach", "Symmetry Groupings", "Layout", "Surface Reconstruction", "Image Edge Detection", "Australia", "Image Recognition", "Humans", "Visual System", "Surface Fitting", "Linear Regression", "Image Reconstruction" ], "authors": [ { "affiliation": "Sch. of Comput. Sci., Curtin Univ. of Technol., Perth, WA, Australia", "fullName": "P.L. Rosin", "givenName": "P.L.", "surname": "Rosin", "__typename": "ArticleAuthorType" }, { "affiliation": "Sch. of Comput. Sci., Curtin Univ. of Technol., Perth, WA, Australia", "fullName": "G.A.W. West", "givenName": "G.A.W.", "surname": "West", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "1991-01-01T00:00:00", "pubType": "proceedings", "pages": "677,678", "year": "1991", "issn": "1063-6919", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00139777", "articleId": "12OmNrNh0IP", "__typename": "AdjacentArticleType" }, "next": { "fno": "00139779", "articleId": "12OmNApu5fX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ssiai/2014/4053/0/06806055", "title": "Referenceless perceptual image defogging", "doi": null, "abstractUrl": "/proceedings-article/ssiai/2014/06806055/12OmNARRYmt", "parentPublication": { "id": "proceedings/ssiai/2014/4053/0", "title": "2014 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2000/0750/1/07501295", "title": "Integration of Perceptual Grouping and Depth", "doi": null, "abstractUrl": "/proceedings-article/icpr/2000/07501295/12OmNx76TQ1", "parentPublication": { "id": "proceedings/icpr/2000/0750/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsit/2009/4519/0/05234642", "title": "A hierarchy grouping model based on gestalt perceptual cues", "doi": null, "abstractUrl": "/proceedings-article/iccsit/2009/05234642/12OmNxHJ9uB", "parentPublication": { "id": "proceedings/iccsit/2009/4519/0", "title": "Computer Science and Information Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cybvis/1996/8058/0/00629460", "title": "Segmentation of lines using perceptual organization with active contour functions", "doi": null, "abstractUrl": "/proceedings-article/cybvis/1996/00629460/12OmNxj235A", "parentPublication": { "id": "proceedings/cybvis/1996/8058/0", "title": "Proceedings II Workshop on Cybernetic Vision", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicic/2008/3161/0/31610444", "title": "A Modified RHT Method for Ellipse Detection Based on Geometric Constraints and Perceptual Grouping", "doi": null, "abstractUrl": "/proceedings-article/icicic/2008/31610444/12OmNxzMnOz", "parentPublication": { "id": "proceedings/icicic/2008/3161/0", "title": "Innovative Computing ,Information and Control, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/1994/5825/0/00323811", "title": "Detection of buildings using perceptual grouping and shadows", "doi": null, "abstractUrl": "/proceedings-article/cvpr/1994/00323811/12OmNy50g76", "parentPublication": { "id": "proceedings/cvpr/1994/5825/0", "title": "Proceedings of IEEE Conference on Computer Vision and Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/camp/1995/7134/0/71340323", "title": "Parallelization of perceptual grouping on distributed memory machines", "doi": null, "abstractUrl": "/proceedings-article/camp/1995/71340323/12OmNz61cYT", "parentPublication": { "id": "proceedings/camp/1995/7134/0", "title": "Computer Architectures for Machine Perception, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscv/1995/7190/0/71900611", "title": "A probabilistic framework for grouping image features", "doi": null, "abstractUrl": "/proceedings-article/iscv/1995/71900611/12OmNzYwbZL", "parentPublication": { "id": "proceedings/iscv/1995/7190/0", "title": "Computer Vision, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2015/6964/0/07298795", "title": "Making better use of edges via perceptual grouping", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2015/07298795/12OmNznkJRh", "parentPublication": { "id": "proceedings/cvpr/2015/6964/0", "title": "2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1989/11/i1121", "title": "Using Perceptual Organization to Extract 3D Structures", "doi": null, "abstractUrl": "/journal/tp/1989/11/i1121/13rRUxbTMzU", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }