@article {17238, title = {Integrating Statistics and Visualization for Exploratory Power: From Long-Term Case Studies to Design Guidelines}, journal = {IEEE Computer Graphics and Applications}, volume = {29}, year = {2009}, month = {2009/06//May}, pages = {39 - 51}, abstract = {Evaluating visual-analytics systems is challenging because laboratory-based controlled experiments might not effectively represent analytical tasks. One such system, Social Action, integrates statistics and visualization in an interactive exploratory tool for social network analysis. This article describes results from long-term case studies with domain experts and extends established design goals for information visualization.}, keywords = {case studies, Control systems, Data analysis, data mining, data visualisation, Data visualization, data-mining, design guidelines, Employment, exploration, Filters, Guidelines, Information Visualization, insights, laboratory-based controlled experiments, Performance analysis, social network analysis, Social network services, social networking (online), social networks, SocialAction, statistical analysis, Statistics, visual analytics, visual-analytics systems, Visualization}, isbn = {0272-1716}, doi = {10.1109/MCG.2009.44}, author = {Perer,A. and Shneiderman, Ben} } @article {17203, title = {Human Responsibility for Autonomous Agents}, journal = {IEEE Intelligent Systems}, volume = {22}, year = {2007}, month = {2007/04//March}, pages = {60 - 61}, abstract = {Automated or autonomous systems can sometimes fail harmlessly, but they can also destroy data, compromise privacy, and consume resources, such as bandwidth or server capacity. What{\textquoteright}s more troubling is that automated systems embedded in vital systems can cause financial losses, destruction of property, and loss of life. Controlling these dangers will increase trust while enabling broader use of these systems with higher degrees of safety. Obvious threats stem from design errors and software bugs, but we can{\textquoteright}t overlook mistaken assumptions by designers, unanticipated actions by humans, and interference from other computerized systems. This article is part of a special issue on Interacting with Autonomy.}, keywords = {Automatic control, Autonomous agents, autonomous systems, Bandwidth, Computer bugs, Computer errors, Control systems, data privacy, Human-computer interaction, HUMANS, Robots, Safety, Software design}, isbn = {1541-1672}, doi = {10.1109/MIS.2007.32}, author = {Shneiderman, Ben} } @conference {19670, title = {What Are the Ants Doing? Vision-Based Tracking and Reconstruction of Control Programs}, booktitle = {Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005}, year = {2005}, month = {2005/04//}, pages = {4182 - 4187}, abstract = {In this paper, we study the problem of going from a real-world, multi-agent system to the generation of control programs in an automatic fashion. In particular, a computer vision system is presented, capable of simultaneously tracking multiple agents, such as social insects. Moreover, the data obtained from this system is fed into a mode-reconstruction module that generates low-complexity control programs, i.e. strings of symbolic descriptions of control-interrupt pairs, consistent with the empirical data. The result is a mechanism for going from the real system to an executable implementation that can be used for controlling multiple mobile robots.}, keywords = {Animals, Automatic generation control, Biological information theory, Computer vision, Control systems, Mobile robots, Probability distribution, Robot control, target tracking, Trajectory}, author = {Egerstedt, M. and Balch, T. and Dellaert, F. and Delmotte, F. and Zia Khan} } @conference {15840, title = {The effect of bilingual term list size on dictionary-based cross-language information retrieval}, booktitle = {Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003}, year = {2003}, month = {2003/01/06/9}, publisher = {IEEE}, organization = {IEEE}, abstract = {Bilingual term lists are extensively used as a resource for dictionary-based cross-language information retrieval (CLIR), in which the goal is to find documents written in one natural language based on queries that are expressed in another. This paper identifies eight types of terms that affect retrieval effectiveness in CLIR applications through their coverage by general-purpose bilingual term lists, and reports results from an experimental evaluation of the coverage of 35 bilingual term lists in news retrieval application. Retrieval effectiveness was found to be strongly influenced by term list size for lists that contain between 3,000 and 30,000 unique terms per language. Supplemental techniques for named entity translation were found to be useful with even the largest lexicons. The contribution of named-entity translation was evaluated in a cross-language experiment involving English and Chinese. Smaller effects were observed from deficiencies in the coverage of domain-specific terminology when searching news stories.}, keywords = {bilingual term list, Chinese language, Computer science, Control systems, Cross-language information retrieval, data mining, Dictionaries, dictionary-based information retrieval, Educational institutions, English language, Frequency, Information retrieval, language translation, named-entity translation, natural languages, Surface morphology, Terminology}, isbn = {0-7695-1874-5}, doi = {10.1109/HICSS.2003.1174250}, author = {Demner-Fushman,D. and Oard, Douglas} } @conference {14235, title = {New eyes for robotics}, booktitle = {2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2003. (IROS 2003). Proceedings}, volume = {1}, year = {2003}, month = {2003/10/27/31}, pages = {1018- 1023 vol.1 - 1018- 1023 vol.1}, publisher = {IEEE}, organization = {IEEE}, abstract = {This paper describes an imaging system that has been designed to facilitate robotic tasks of motion. The system consists of a number of cameras in a network arranged so that they sample different parts of the visual sphere. This geometric configuration has provable advantages compared to small field of view cameras for the estimation of the system{\textquoteright}s own motion and consequently the estimation of shape models from the individual cameras. The reason is that inherent ambiguities of confusion between translation and rotation disappear. Pairs of cameras may also be arranged in multiple stereo configurations which provide additional advantages for segmentation. Algorithms for the calibration of the system and the 3D motion estimation are provided.}, keywords = {3D motion estimation, Argus eye, array signal processing, Birds, Calibration, CAMERAS, Control systems, Eyes, geometric configuration, imaging, imaging system, Layout, Motion estimation, multiple stereo configurations, Robot kinematics, robot vision, Robot vision systems, ROBOTICS, Robotics and automation, SHAPE, shape models}, isbn = {0-7803-7860-1}, doi = {10.1109/IROS.2003.1250761}, author = {Baker, P. and Ogale, A. S and Ferm{\"u}ller, Cornelia and Aloimonos, J.} } @conference {14795, title = {Active Harmony: Towards Automated Performance Tuning}, booktitle = {Supercomputing, ACM/IEEE 2002 Conference}, year = {2002}, month = {2002/11//}, pages = {44 - 44}, publisher = {IEEE}, organization = {IEEE}, abstract = {In this paper, we present the Active Harmony automated runtime tuning system. We describe the interface used by programs to make applications tunable. We present the Library Specification Layer which helps program library developers expose multiple variations of the same API using different algorithms.The Library Specification Language helps to select the most appropriate program library to tune the overall performance. We also present the optimization algorithm used to adjust parameters in the application and the libraries. Finally, we present results that show how the system is able to tune several real applications. The automated tuning system is able to tune the application parameers to within a few percent of the best value after evaluating only 11 out of over 1,700 possible configurations.}, keywords = {Application software, Automatic control, Computational modeling, Computer science, Computerized monitoring, Control systems, grid computing, Runtime library, software libraries, Specification languages}, isbn = {0-7695-1524-X}, doi = {10.1109/SC.2002.10062}, author = {Tapus, C. and I-Hsin Chung and Hollingsworth, Jeffrey K} } @conference {18464, title = {Smart videoconferencing}, booktitle = {2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000}, volume = {3}, year = {2000}, month = {2000///}, pages = {1597-1600 vol.3 - 1597-1600 vol.3}, publisher = {IEEE}, organization = {IEEE}, abstract = {The combination of acoustical and video processing to achieve a smart audio and video feed from a set of N microphones and M cameras is a task that might conventionally be accomplished by camera persons and control room staff. However, in the context of videoconferencing, this process needs to be performed by control software. We discuss the use of a multi-camera multi-microphone set-up for unattended videoconferencing, and present details of a prototype implementation being developed}, keywords = {acoustical processing, Automatic control, CAMERAS, computerised control, control software, Control systems, Intelligent sensors, Layout, Microphones, multi-camera multi-microphone set-up, multimedia systems, Protocols, prototype implementation, Prototypes, sensor fusion, smart videoconferencing, Switches, Teleconferencing, unattended videoconferencing, video processing}, isbn = {0-7803-6536-4}, doi = {10.1109/ICME.2000.871075}, author = {Zotkin,Dmitry N and Duraiswami, Ramani and Philomin,V. and Davis, Larry S.} } @article {16788, title = {Timing Requirements for Time-Driven Systems Using Augmented Petri Nets}, journal = {IEEE Transactions on Software Engineering}, volume = {SE-9}, year = {1983}, month = {1983/09//}, pages = {603 - 616}, abstract = {A methodology for the statement of timing requirements is presented for a class of embedded computer systems. The notion of a "time-driven" system is introduced which is formalized using a Petri net model augmented with timing information. Several subclasses of time-driven systems are defined with increasing levels of complexity. By deriving the conditions under which the Petri net model can be proven to be safe in the presence of time, timing requirements for modules in the system can be obtained. Analytical techniques are developed for proving safeness in the presence of time for the net constructions used in the defined subclasses of time-driven systems.}, keywords = {Application software, Concurrent computing, Control systems, Embedded computing, Embedded system, Helium, Modeling methodology, performance specifications, Petri nets, Power system modeling, Real time systems, real-time systems, Timing, timing requirements}, isbn = {0098-5589}, doi = {10.1109/TSE.1983.235261}, author = {Coolahan,J. E. and Roussopoulos, Nick} }